Emotet botnet down for maintenance
June's Global Threat Index from Check Point reveals that the botnet behind the Emotet banking Trojan has been inactive for most of the month.
Check Point's researchers believe that Emotet's infrastructure could be offline for maintenance and upgrade operations, and that as soon as its servers are up and running again, it will be reactivated with new, enhanced threat capabilities.
Managing third-party risk costs the healthcare industry over $23 billion a year
The ability to adequately assess and understand the risks that vendors pose is a problem for healthcare providers, and a costly one at that, according to a new report.
The study by risk management platform Censinet and the Ponemon Institute shows the yearly hidden cost of managing vendor risk is $3.8 million per healthcare provider, higher than the $2.9 million that each data breach costs providers. This adds up to a total cost across the industry of $23.7 billion.
It's 2029, you're paying more to read this page at peak time (and we're paying your ISP to stop you visiting other tech sites)
What would a world be like where ISPs and businesses are in control of everything you see and do online? A world, in other words, without net neutrality.
VPN comparison site TheBestVPN.com has been considering this and has created an interactive simulator looking at what the web without net neutrality could look like in 2029.
Financial services businesses at high risk of mobile attacks
Financial services are at greater risk of phishing and man-in-the-middle attacks on mobile devices than businesses in other industries according to a new report.
The study from mobile security specialist Wandera analyzed mobile device data from 225 financial services customers and reveals financial services organizations are experiencing a higher volume of phishing attacks than their peers in other sectors (57 percent compared to 42 percent cross-industry).
Cyber incidents cost $45 billion in 2018
Cybercriminals are getting better at monetizing their activities, with more than two million cyber incidents in 2018 resulting in over $45 billion in losses, with actual numbers expected to be much higher as many cyber incidents are never reported.
The Internet Society's Online Trust Alliance (OTA) has released a report which finds the financial impact of ransomware rose by 60 percent last year, and losses from business email compromise doubled, despite the fact that overall breaches and exposed records were down.
Seven out of 10 Brits want tougher penalties for breaching privacy rules
According to a new survey carried out by YouGov for data privacy company myGaru 71 percent of of UK adults want to see tougher action in penalizing companies that abuse data privacy by misusing third party data.
Around a third of the public (34 percent) have already made changes to the privacy settings of one or more of their social media accounts since the Cambridge Analytica Facebook scandal and 19 percent say they would make more or new changes in the future.
Companies turn to instant messaging in response to rising email threats
In a new study of IT decision makers by Barracuda Network, 94 percent of participants admit that email is still the most vulnerable part of their organization's cyber security.
The survey of 280 decision makers focused on the email threat landscape and email security practises. It discovered that 75 percent have been hit with brand impersonation emails, the largest threat as identified in the survey with ransomware coming in second on 47 percent.
Poor management of data harms businesses' ability to gain value from it
Less than 40 percent of companies in Europe, the Middle East and Africa (EMEA) are confident they can manage, secure and gain insight from data, and use it responsibly according to new research from Oracle.
The study finds that on average 42 percent of respondents do not have a data management strategy in place. Only 35 percent are highly confident they can manage data to generate meaningful insights, and key departments are still not accepting both accountability and responsibility for data management. In addition data security protocols are often not understood, or followed.
Second screens could be dragging down corporate networks
Having a second monitor is a great way of improving your productivity, but new research from network solutions company Gigamon suggests this could also be driving higher bandwidth consumption.
Of the 200+ IT professionals surveyed, 59 percent believe that second screens are, or could be, being used for non-work-related activity, like streaming music or watching videos.
Microsoft launches Threat and Vulnerability Management for enterprises
Scheduled vulnerability scanning can leave blind spots between scans leaving organizations vulnerable.
In response to this problem, Microsoft has partnered with a number of enterprise customers to create a new Threat and Vulnerability Management solution as a built-in feature of Microsoft Defender Advanced Threat Protection.
UK gets an easier way to switch mobile providers
If you've ever tried to switch mobile phone providers in the UK you'll know that if you want to keep your existing number after the transfer it involves getting a PAC (porting authorization code) from your old provider.
Obtaining this has in the past involved phoning them up and having them plead with you not to leave while offering you all kinds of special deals to persuade you to stay. Well not any more.
Exploring the ethics of AI
Artificial intelligence is appearing in more and more of our everyday technology. But it raises a number of questions about how it will react in challenging situations.
Security education comparison site Cyber Security Degrees has produced an infographic looking at the ethics of AI and how we feel about its impact on our lives.
A smart retro-look microphone for gaming or conferencing -- MXL AC-404-LED [Review]
Is Google Safe Browsing falling short on mobile?
Google has a pretty good record when it comes to protecting its users against online threats. Part of this is its Safe Browsing technology which scans billions of URLs each day to discover dangerous websites.
But research by mobile threat defense specialist Wandera has discovered a disparity between the protections available within Google’s desktop browser compared to its mobile browser.
New offering gives enterprises greater flexibility in security training
Cybersecurity is often as much about people as it is about technology. But despite increasing their spending, organizations are still struggling to close the cybersecurity skills gap.
Training and certification company Offensive Security is launching a new program for enterprises designed to simplify the cybersecurity training process and allow organizations to invest more in cybersecurity skills development.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.
