30 Aug 2019

The Implementation Of Facial Recognition Can Be Risky. Here’s Why..

While facial recognition holds great promise for the security industry as a more secure authentication mechanism than passwords or PINS, the technology does come with various risks according to Allerin CEO Naveen Joshi. The risks stem from the fact that facial recognition algorithms, like other technologies leveraging artificial intelligence (AI),

Read More
27 Aug 2019

Growing cloud adoption introduces visibility gaps and security complications

Nearly half (48%) of organizations say they don’t have sufficient visibility into the data they process, which can put these organizations at risk of sophisticated attacks according to a new SANS Institute survey. The study also highlights several common issues that prevent companies from protecting themselves against advanced threats, including

Read More
27 Aug 2019

Microsoft: Using multi-factor authentication blocks 99.9% of account hacks

Microsoft says that user accounts are “more than 99.9% less likely to be compromised” if the user has enabled multi-factor authentication (MFA). This even applies for relatively weak MFA solutions like SMS-based one-time passwords, the company claims. Microsoft registers more than 300 million fraudulent sign-in attempts on its cloud services

Read More
23 Aug 2019

Cyber attackers exploiting poor cloud security

A new report by Outpost24 indicates that even though 42% of organizations are worried about cloud security, many are not doing enough to protect their cloud environment. For example, 11% of firms never perform cloud security tests and 19% do so only once a year. This is worrisome, for cyberattacks

Read More
23 Aug 2019

IT Security Pros: Encryption Backdoors Are Election Hacking Risk

The vast majority (80%) of security professionals believe that government-mandated backdoors in tech products would put countries at risk of cyberattacks targeting election infrastructure, and 74% believe they render states vulnerable to nation-state attacks. These views contrast with United States Attorney General William Barr’s recent claims that increased encryption of

Read More
22 Aug 2019

Companies Act to Defend Privacy of Kazakhstanis

Google and Mozilla this week took steps to undermine the efforts of the Kazakhstan government to intercept all HTTPS traffic within its borders. Kazakhstan started the practice last month. A report by Censored Planet found evidence that the government was ordering local Internet providers to enforce the installation of a

Read More
21 Aug 2019

Visa Adds New Threat Detection to Prevent Payment Fraud

Visa is upping the ante in its fight against cybercrime by providing new anti-fraud solutions that aim to improve the security of transactions. The new tech includes threat detection and blocking technology that is immediately available to all customers for free. The firms is adding four new features, namely: Visa

Read More
21 Aug 2019

Making Tough Choices: How CISOs Manage Resources To Protect Their Brand’s Most Valuable Assets

84% of CISOs think that cyberattacks are a growing threat and 21% believe that threat campaigns are evolving faster than the defensive capabilities of organizations, a new study by Forbes and Fortinet shows. The survey, which sheds light on the views and decision making strategies of CISOs, identifies efforts to protecting

Read More
20 Aug 2019

Organizations Expose Sensitive Data via Malware Analysis Sandboxes

Companies are leaking data by uploading sensitive files to online malware analysis sandboxes that verify if the documents are safe, but may also make them publicly accessible, a recent Cyjax study found. Researchers scrutinized three popular online malware analysis solutions, all of which let users access certain files that were

Read More
20 Aug 2019

Millions Of Home Internet Routers Open To Cyberattack, New Study Warns

New research[pdf] by Ben-Gurion University outlines how security vulnerabilities in modern routers could enable threat actors with access to a guest network that is separated from a host network to exfiltrate data from the host network or launch an attack to compromise it. The researchers have developed attacks that use

Read More