Search

Results 41-60 of 110 for cybersecurity.

Cybersecurity 2022: More Fraud, More Fakes, More Crypto Scams

Cybercriminals in 2022 will move from identity theft to identity fraud, predicted the Identity Theft Resource Center. Bad actors are accumulating personal identifying information, but they're not using it to target consumers as much as they used to do. Rather, they're using it in credential attacks ...

Deadly Log4j Hole Expands Victim Vulnerability

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

Talent Firm Flags Best US Cities for Hiring Remote Tech Workers

With remote work here to stay, a conundrum for many firms is where to tap into the stay-at-home workforce. Karat, a maker of a talent platform for developers, has an answer to that riddle. The company has identified what it considers the 10 best cities -- outside major tech hubs like the San Francis...

Collaboration Apps Creating Productivity Concerns for IT Leaders: Study

Growing use of unified communication and collaboration tools in organizations could hurt productivity in the short term, according to a study released last week by a service assurance and cybersecurity company. In a survey commissioned by Netscout, of Westford, Mass., more than nine in 10 of the 30...

CyberSec Researchers Reveal 2M Devices Vulnerable as Botnet Launchpad

Firmware security firm Eclypsium and the Synopsys Cybersecurity Research Center (CyRC) have issued reports about global hardware flaws and multiple API holes discovered in a call center software suite. The separate reports come on the heels of news from F-Secure that 150 different HP multifunction p...

Cybersecurity Pros Uneasy Over Prospect of Quantum Sneak Attack

Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...

Holidays Fuel Surge of Mobile, Online Phishing Scams

'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...

OSS News: Enterprise Linux, Microsoft Replacements, Fuzzy Linux Solutions

Open-source innovations and the Linux operating system continue to set complacency aside. Here's a roundup of the latest developments from the Linux Foundation, Red Hat Enterprise Linux, SoftMaker, and the Google Open Source Security Team.

Bugcrowd Reports Ethical Hackers Prevented $27B in Cybercrime

Over the last year, ethical hackers have prevented more than US$27 billion in cybercrime, according to a report by a leading bug bounty platform. In its annual Inside the Mind of a Hacker report, Bugcrowd maintained that ethical hackers working on its platform were able to prevent those cybercrime l...

SMBs Report Sense of Security Despite Rise in Cyberattacks

Entrepreneurs might well be the latest heroes in cyberwarfare. Despite increasing odds of malicious attacks, SMB owners are forging ahead with a newfound sense of security. Untangle's fourth annual SMB IT Security Report shows that SMBs have adapted to a changing work environment, addressed an influ...

Cloud Security Holes Are Invites for Ransomware: Report

While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...

The Challenge and Promise of Quantum Computing

Despite becoming increasingly viable, many people don't understand what quantum computing is, and how it differs from classical or binary computing. We spoke with experts in the field of quantum computing to help explain; and get their assessment of how this emerging technology could eventually chan...

Canonical Breathes Longer Life Into Two Ubuntu Aging Releases

The prolonged lifecycle of Ubuntu 14.04 LTS and 16.04 LTS turns a new page in Canonical's commitment to enabling enterprise environments, said Nikos Mavrogiannopoulos, product manager at Canonical. By prolonging the operating system lifecycle to 10 years, Canonical is helping organizations to better...

‘Shadow Code’ Creates Risk for 99% of Websites

Shadow code -- third-party scripts and libraries often added to web applications without security validation -- pose risks to websites and jeopardize compliance with privacy regulations, according to new research conducted by Osterman Research for PerimeterX. Third-party code leaves organizations vu...

SPDX Becomes New Standard for Open-Source Software, Security

Backed by many of the world's largest companies for more than a decade, the Software Package Data Exchange specification is now an internationally recognized ISO/IEC JTC 1 standard. This comes during a transformational time for software and supply chain security. The Linux Foundation announced Thur...

Amazon, AWS Trumpet Free Cybersecurity Initiatives

Beginning in October, which is Cybersecurity Awareness Month, Amazon will make available to the public the training materials it's developed in-house to keep its employees and sensitive information safe from cyberattacks. It also offer "qualified" AWS customers a free multifactor authentication devi...

Unsupported IoT Devices Are Cyber-Trouble Waiting To Happen

Imagine finding out that your neighbor's identity was stolen and their life savings cleaned out by criminals who entered through their 'smart' washing machine. Ridiculous, you say? Well, have you checked your home Wi-Fi network lately? You might have several connected household gadgets and other dev...

Study Warns Easy Access to Cloud Apps Putting Business Data at Risk

Businesses are flocking to software-as-a-service applications as a means to improve the efficiency of their operations and the productivity of their employees, but weak control of access to cloud apps is putting the data of many organizations at risk. According to a study by DoControl, the average 1...

Half of IT Pros Say Remote Workers Dodging Security Precautions

Hackers aren't the only ones evading security measures of many organizations. So are their remote workers. In a new report on remote workforce security, 52 percent of the U.S. IT and cybersecurity professionals surveyed revealed they experienced remote workers finding workarounds to their organizati...

Researchers Track Linux Intrusions to Cryptojacking Gang

Bitdefender security researchers have uncovered a Romanian-based threat group active since at least last year targeting Linux-based machines with weak Secure Shell Protocol (SSH) credentials. The researchers discovered the group was deploying Monero mining malware used to steal cryptocurrency.

LinuxInsider Channels