Security News

Latest stories from HelpNetSecurity
  1. WPA2, a protocol that secures modern protected Wi-Fi networks, sports serious weaknesses that can allow attackers to read and capture information that users believe to be encrypted (e.g. passwords, payment card numbers, etc.). “Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites, says Mathy Vanhoef, a postdoc at Belgian University of Leuven, who discovered the … More
  2. Over 1,100 organizations ranging from single-person businesses to companies with more than 10,000 employees participated in a survey from various regions around the globe including North America, Europe, the Middle East, and Africa. The Barracuda Networks survey aimed to measure trends around the adoption and use of Microsoft Office 365, including contributing factors for decisions about migration versus remaining with an existing platform. Additional information was gathered about customer use of third-party security and data … More
  3. A survey of over 200 board level UK executives has found that while over half of businesses sampled are planning blockchain initiatives, less than 1 in 10 believe they have the required skill sets in place within their organisations. At the same time, more than 40 per cent of non-IT/data senior executives admit to not fully understanding blockchain technology. The lack of regulation (23 per cent) is seen as the biggest barrier to the adoption … More
  4. Here’s an overview of some of last week’s most interesting news and articles: Inventive cyber gang steals millions from East European banks Trustwave researchers have uncovered a series of ingenious bank heists that cost several Eastern European and Russian banks up to $10 millions each, and they believe financial institutions in European, North American, Asian and Australian regions could be targeted with the same within the next year. Hackers use organizations’ resources for stealthy cryptocurrency … More
  5. CloudAI delivers advanced analytics that leverage artificial intelligence LogRhythm introduced CloudAI, an advanced cloud-based security analytics offering. Initially focused on extending and enhancing LogRhythm’s existing user and entity behavior analytics (UEBA) capabilities, CloudAI uses artificial intelligence to detect advanced threats that employ unknown attacks and unknown methods and provide security teams visibility into emerging and active user-based threats. ObserveIT is evolving its solution for identifying and preventing user-based risk ObserveIT 7.1 features capabilities to thwart … More
  6. If breaches can’t be entirely blocked, what can IT professionals in higher education do to prevent these kinds of disaster scenarios? The GovEd team at Logicalis US says there are four important steps that will bolster college and university cybersecurity plans. Conduct a data security audit Knowing what you’re trying to protect and identifying some of the common ways that data could be breached is a logical first step. An in-depth data security audit performed … More