Advertisement
Top

Tag: risks


Threats & Malware, Vulnerabilities

New Attack Shows Risks of Browsers Giving Websites Access to GPU 

March 18, 2024

Via: Security Week

The research focused on WebGPU, an API that enables web developers to use the underlying system’s GPU to carry out high-performance computations in a web browser. By leveraging this API, they have demonstrated an attack that works entirely from the […]


Cloud security, Security

The knowledge gap around runtime security and the associated risks

July 26, 2021

Via: Help Net Security

According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This result is especially alarming […]


Cloud security

How Can Companies Move the Needle on Enterprise Cloud Security Risks and Compliance?

November 9, 2018

Via: Security Intelligence

More than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe most […]


Threats & Malware, Vulnerabilities

Stop Counting Vulnerabilities & Start Measuring Risk

October 31, 2017

Via: Dark Reading

As a security team, you are what you measure. The problem is that too many security teams are counting vulnerabilities, not measuring risk. It’s time we examine how vital it is for security teams to establish risk-based metrics, while offering […]


Security, Tech

AI will change the face of security, but is it still the stuff of sci-fi?

September 18, 2017

Via: Help Net Security

The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will revolutionise our lives. Artificial intelligence is the latest technology to be […]


Cyber-crime, Data loss

What is the biggest threat from the Equifax breach? Account takeovers

September 12, 2017

Via: CSO Online

Yes, there will be some tax and banking fraud as a result of the gargantuan data breach at Equifax. The biggest impact, however, will be felt by enterprises that rely on credit reporting bureaus to verify the identity of people […]


Hacker, Threats & Malware

Insurers increasingly concerned about silent cyber exposure

September 11, 2017

Via: Help Net Security

Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically designed to cover cyber risk – as growing over the coming year, according to Willis […]


Security, Threats & Malware

Insider threats and ransomware are most feared, followed by DDoS attacks

September 8, 2017

Via: Help Net Security

A new SANS survey found that ransomware, insider threats and denial of service are considered the top three threats organizations face when it comes to securing sensitive data. According to the study, 78 percent of respondents report encountering two or […]


Cyber-crime, Hacker

Dragonfly hackers gained operational access to European, US power companies

September 7, 2017

Via: Help Net Security

The Dragonfly hacking group is back – or should we say it probably never went away – and is still interested in penetrating the networks of European and US companies in the energy sector. Even worse, their efforts have been […]


Privacy protection

Tempted to join the games in the crytpcurrency playground?

September 5, 2017

Via: Naked Security

Should central banks be worried about cryptocurrency – Bitcoin, Ethereum, Zcash, Monero and hundreds of others? Perhaps more important, should you – the average, privacy-conscious person or even the not-so-average Dark Web drug dealer – be worried? That depends in […]


Data loss

More than 700 million email addresses leaked in huge data breach

September 4, 2017

Via: We Live Security

A spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. […]


Editorial, Privacy protection

I spy with my digital eye… smartphone-induced risks

August 1, 2017

Via: Russel Edwards

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave […]


Application security

My Precious Data: Digital clutter and its dangers

March 17, 2017

Via: Kaspersky Blog

The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android apps every month but delete only 10, in effect adding two apps […]


Network security

Poor robot security could lead to ‘Skynet’ nightmare, warn researchers

March 3, 2017

Via: Naked Security

The robot industry has become better at building eye-catching demonstration machines than securing them, consultancy IOActive has concluded after pen-testing some famous examples. After a process described as “not even a deep, extensive security audit”, Hacking Robots Before Skynet uncovered 50 vulnerabilities […]


Network security

Does Reliable Real Time Detection Demand Prevention?

February 23, 2017

Via: Tao Security

First, although you can reliably detect a problem, you may not be able to do anything about it. The security team may lack the authority, or technical capability, to implement a preventive action. Second, although you can reliably detect a […]


Editorial, Vulnerabilities

Beware the traps of security automation

February 1, 2017

Via: Russel Edwards

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. […]


Mobile security

Data Privacy Day: know the risks of Amazon Alexa and Google Home

January 30, 2017

Via: Naked Security

Voice-activated, internet-connected personal assistants are all the rage these days. Ask a group of friends what they got for Christmas and at least one will tell you how much they love their new Amazon Echo, Google Home or some equivalent. […]


Network security

Connected homes and new hacking risks

January 30, 2017

Via: Help Net Security

Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, increasing the risk of home cyber attacks, according to The […]


Application security, Mobile security

Android VPNs Introduce Security, Privacy Risks: Study

January 27, 2017

Via: Security Week

Researchers have analyzed hundreds of virtual private network (VPN) applications for Android and determined that many of them introduce serious privacy and security risks. A team of experts from the University of California, Berkeley, the Data 61 research unit at […]


Cyber-crime, Mobile security

Trump’s Still Using His Old Android Phone. That’s Very, Very Risky

January 26, 2017

Via: Wired

As part of a broader look at President Donald Trump’s acclimation to the White House, the New York Times noted on Wednesday that Trump still uses his personal, consumer-grade Android smartphone in the White House. That’s worrying. Even if you’re […]