menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

The Fintech Times

1M

read

154

img
dot

Online Fraud Charter Hasn’t Had Desired Impact: 6.6mil UK Adult Fall Victim to Fraud Finds Which?

  • Consumer champion Which? has revealed that despite the Online Fraud Charter launched by the UK government last year, online scams continue to be rife and that shortfalls in the charter remain.
  • Which? surveyed over 2,000 UK adults to discover if the charter has had an positive impact on UK consumers' experiences when online.
  • Twenty-two percent of those surveyed said they had seen suspicious ads while using online platforms in the past six months.
  • Fraud was found to be rife on social media (63%), search engines (42%), online marketplaces (39%) and messaging apps (23%).
  • Major tech companies that collectively agreed to adopt measures that would curb fraud include Amazon, Facebook, Instagram, Snapchat, Tiktok, Twitter, and YouTube.
  • Nearly three-quarters (73%) of UK adults do not trust the veracity of ads they encounter online.
  • Just 3% of respondents to Which?'s survey felt more confident using online platforms than they did a year ago since the launch of the Online Fraud Charter.
  • Platforms in scope of the fraudulent advertising duties in the Online Safety Act may not be held accountable until 2027–this, says Which?, is not good enough.
  • Ofcom needs to implement the regulations prescribed in the Act more quickly. Which? suggests that Fraud Minister Lord Hanson should coordinate a more cohesive approach to fraud prevention among regulators and the tech, banking and telecoms sectors.
  • Bring forward implementation of the Online Safety Act in its entirety to better protect consumers from fraudsters, says Consumer champion, Which?.

Read Full Article

like

9 Likes

source image

Cybersecurity-Insiders

1M

read

394

img
dot

Image Credit: Cybersecurity-Insiders

VPN Risk Survey Reveals: 92% of Companies Are Concerned About VPN Security

  • A Virtual Private Network (VPN) is no longer robust enough for secure, segmented access that organizations require. VPNs will often grant full access to the corporate network increasing the risk of cyberattacks once cybercriminals obtain login credentials. The adoption of Zero Trust Network Access (ZTNA) has made teams gravitate towards more reliable and secure technology that better suits their business needs.
  • The survey report states that 92% of respondents are concerned that VPNs will jeopardize their ability to keep their environment secure. The dissatisfaction rate among users with their VPN experience shared by 81% of respondents. 75% view Zero Trust as a priority for their business and 56% of respondents are looking to alternative solutions to traditional endpoint security, in particular ZTNA.
  • With 96% of organizations using VPNs to secure access to private applications, the adoption of remote access solutions has increased. Additionally, 43% of organizations use VPNs to connect multiple sites and 33% secure third-party access through VPNs, needs that stretch beyond the intended purpose of employee remote access. The survey reveals that 58% of users use VPNs daily, and 92% use it at least once a week.
  • VPNs pose a wide range of user experiences with prominent concerns being sluggish connection speed by 28% of users, frequent connection drops at 20%, difficulties in connecting to the VPN or accessing applications at 18%, complexity in the VPN authentication process at 14%, and authentication problems at 12%. To enhance the access experience, end-users demand a more user-centric approach.
  • The adoption of a Zero Trust strategy is increasingly significant for organizations to enhance their cybersecurity posture in response to evolving threats, remote work challenges, and persistent VPN issues. Among respondents, 75% view it as a priority for their business with 59% having adopted or planning to adopt ZTNA within the next two years.
  • A significant 78% of respondents believe that it’s important for a ZTNA service to fully replace VPN. However, many ZTNA technologies on the market cannot fully replace VPN due to limitations on port and protocol support. As organizations chart their adoption course, they should consider solutions that embody essential Zero Trust principles and robust Security Service Edge (SSE) architectures.
  • The survey covers various remote access solutions, analyzing their strengths and limitations while bringing forth effective measures. The 2024 VPN Risk Report based on a survey of 593 IT professionals reveals how VPNs can increase the risk of cyberattacks and shares insights into the future of secure remote access and its implications for businesses.
  • The survey was conducted in December of 2023, with a diverse sample of 593 respondents from a variety of industries and organizational sizes, from IT professionals to decision makers responsible for their organization’s network security and remote access strategies.
  • This report was published by Cybersecurity Insider, that brings together 600,000+ IT security professionals and world-class technology vendors. They provide comprehensive research studies, unbiased product reviews, and practical e-guides to boost cybersecurity presence and demand.

Read Full Article

like

23 Likes

source image

Neuways

1M

read

289

img
dot

Image Credit: Neuways

83% of Organisations Experienced Insider Attacks in 2024

  • 83% of organisations faced insider attacks last year.
  • Insider attacks can cost businesses between $100,000 and $2 million.
  • Factors contributing to the rise in insider threats include complex IT environments, outdated security measures, lack of employee training, and weak enforcement of security policies.
  • Recommended measures for 2025 include adopting a Zero-Trust Framework, implementing advanced monitoring tools, automating threat detection and response, enhancing employee training, strengthening access controls, conducting regular security audits, and developing a comprehensive incident response plan.

Read Full Article

like

17 Likes

source image

VoIP

1M

read

430

img
dot

Image Credit: VoIP

BT Launches Advanced SASE Solution with Fortinet Partnership

  • BT has introduced a new managed Secure Access Service Edge (SASE) service to enhance its secure networking offerings for UK businesses.
  • The service incorporates advanced technology from Fortinet to improve cloud data and application protection and simplify network security management.
  • It includes AI-powered Security Service Edge capabilities and addresses the needs of businesses transitioning to cloud-based operations and remote workstations.
  • BT's partnership with Fortinet aims to provide customers with secure and robust network capabilities for enhanced cloud experiences.

Read Full Article

like

25 Likes

source image

Dev

1M

read

18

img
dot

Image Credit: Dev

Understanding SSH Key Pairs: A Developer's Guide

  • SSH key pairs are cryptographic credentials consisting of two parts: A private key and a public key.
  • SSH key pairs provide secure authentication without transmitting sensitive information over the network.
  • RSA's brilliance lies in the elegant use of prime numbers and modular arithmetic.
  • Ed25519 operates on a specialized Edwards curve.
  • ECDSA uses the NIST P-curves, which are defined over prime fields.
  • The security of these algorithms depends on different hard mathematical problems.
  • The advent of quantum computers poses different threats to these algorithms.
  • The choice between these algorithms goes beyond mathematics—it's about balancing security, compatibility, and performance.
  • Ed25519 represents the future: mathematically elegant, computationally efficient, and designed with modern threats in mind.
  • For systems requiring broad compatibility, RSA with 4096 bits remains a solid choice.

Read Full Article

like

1 Like

source image

Securityaffairs

1M

read

326

img
dot

Image Credit: Securityaffairs

Thai police arrested Chinese hackers involved in SMS blaster attacks

  • Thai police arrested Chinese hackers involved in SMS blaster attacks
  • Fraud gangs in Bangkok were arrested for conducting SMS blaster attacks.
  • The attackers used fake cell towers to send malicious SMS messages to nearby phones.
  • Thai authorities discovered call center gangs using fake '02' numbers for scams and fraudulent investments.

Read Full Article

like

19 Likes

source image

Medium

1M

read

208

img
dot

Image Credit: Medium

How to Instantly Transform Your Home with Decorative Window Film!

  • Decorative window films are a fresh and affordable alternative to traditional window coverings like curtains or blinds to bring color, texture, and personality to your space
  • Decorative window films are versatile and provide various design options such as frosted effect, bold geometric patterns, or customized designs that match your unique style or business branding.
  • These films offer privacy, style, and essential benefits without blocking out natural light, which curtains or blinds tend to do.
  • Window films are easy to apply, stay neat and tidy while providing a sleek look which curtains tend to lose over time.
  • Privacy window films are perfect for anyone who prefers clean lines and simplicity, as they can achieve their desired level of coverage and regulate light entering their space.
  • Decorative window films have practical sides too and can strengthen the glass on your windows, increasing your home’s security or keeping prying eyes away.
  • Decorative window films also play an important role in making your space more energy-efficient, reducing the load on your HVAC system and making them a sustainable choice.
  • Window films can add character and style to every room in the home, and also help create a productive, stylish atmosphere in offices and commercial spaces, or serve as unique advertising or designs in retail spaces.
  • The benefits of decorative window films include privacy, aesthetic appeal, light control, security, and energy-efficiency.
  • Privacy window films are perfect for those who require full coverage for a bathroom window or a subtle frosted effect in their living room.

Read Full Article

like

12 Likes

source image

Dev

1M

read

81

img
dot

Image Credit: Dev

Access to Google Cloud Virtual Machine through SSH

  • Establishing a secure remote connection to your virtual machine (VM) instance in Google Cloud Platform (GCP) is a crucial step after provisioning it.
  • SSH is a cryptographic network protocol that is the de facto standard for secure remote login and command execution on Unix-like operating systems.
  • SSH provides a secure encrypted channel over an unsecured network, preventing potential eavesdropping, packet sniffing or man-in-the-middle attacks that could compromise login credentials or sensitive data.
  • Before initiating an SSH connection to a VM instance on GCP, make sure to configure and set up SSH on your local machine.
  • The ssh-keygen utility allows generating cryptographic key pairs consisting of a public and private key to establish a secure SSH connection.
  • Private keys must always remain secured and never be shared, while public keys are used to access the VM.
  • To enable more secure and reliable authentication mechanisms when accessing your VM instance on GCP, disabling password authentication is recommended.
  • SSH key pairs provide better audit trails and monitoring capabilities, making them a better option to use rather than passwords to access remote servers.
  • Enforcing key-based authentication eliminates the risk of users setting weak or easily-guessable passwords, which is a common vulnerability.
  • By enforcing key-based authentication and disabling password logins, one significantly enhances the security of your SSH server and remote access to virtual machines, which aligns to industry practices for secure system administration.

Read Full Article

like

4 Likes

source image

Medium

1M

read

226

img
dot

Image Credit: Medium

Solid Security Pro Review

  • Solid Security Pro is a WordPress security plugin that protects websites from cyber threats.
  • The plugin features advanced authentication methods such as two-factor authentication, passkeys, and magic links.
  • Real-time security monitoring, vulnerability detection, and a Brute Force Protection Network help keep malicious actors at bay.
  • A trusted devices feature restricts logins from unrecognized devices, alerting users of suspicious activity.
  • Solid Security Pro offers custom delay periods for updates, automatic patching for vulnerabilities, and private, ticketed support.
  • In addition to its powerful security features, Solid Security Pro gives businesses peace of mind through industry-standard best practices and a global community of users focused on online safety.
  • A risk-free trial of the basic version is available, with upgrading to Pro feeling like an essential next step.
  • Solid Security Pro offers a robust yet straightforward solution to website security.
  • The plugin is designed for both seasoned web admins and beginners.
  • Choosing Solid Security Pro means investing in peace of mind and the assurance that your online home remains safe and secure.

Read Full Article

like

13 Likes

source image

Siliconangle

1M

read

1.1k

img
dot

Image Credit: Siliconangle

Halcyon nabs $100M to block ransomware with capsule neural networks

  • Halcyon Tech Inc. has raised a $100 million Series C round to strengthen its fight against ransomware attacks.
  • The startup uses capsule neural networks, based on the CapsNet architecture, to detect ransomware and prevent data loss.
  • Halcyon's AI models are trained on millions of ransomware-related data points and can detect when ransomware attempts to move files out of an organization's network.
  • The funding will be used to enhance the technology and expand Halcyon's customer base.

Read Full Article

like

3 Likes

source image

Medium

1M

read

330

img
dot

Image Credit: Medium

What Are the Hidden Benefits of Using Window Films for Light Control?

  • Enhanced Privacy: Privacy window films are a great way to block prying eyes without sacrificing natural light. They offer the perfect balance between privacy and visibility.
  • Improved Security: Security window films add a protective layer to glass windows, reducing the risk of breakage and making your home or business more secure.
  • Energy Efficiency: By blocking out heat in the summer and keeping warmth inside during the winter, window films help reduce the need for air conditioning and heating, leading to lower energy bills.
  • Light Control: Window films allow you to control the amount of light entering your space, improving comfort and reducing glare on screens and furniture.

Read Full Article

like

19 Likes

source image

Medium

1M

read

181

img
dot

Image Credit: Medium

Protecting Your Data Privacy — Part 4

  • AI, the Internet of Things, and Post-Quantum Encryption are set to have a significant impact on data privacy.
  • AI models are only limited by the size of the datasets they’re trained on, meaning companies are scraping all publicly available sources of data to feed their models.
  • AI can process vast amounts of data in seconds and identify anomalies that may be too subtle for human attention.
  • Smart devices connect to the internet, collect data, and may share it with third parties, so it’s important to review privacy settings and limit data collection.
  • Post-quantum cryptography is still under development, as current encryption standards are expected to become vulnerable with the arrival of new quantum computers set to arrive by 2030.
  • Harvest now, decrypt later is a strategy that bad actors may use to store encrypted data now and decrypt it in the future with the arrival of new technology.
  • Organisations, governments, and businesses already take precautions against Q-Day attacks, but consumers can also stay informed and adopt post-quantum encryption standards for safer products.
  • Opting out of having personal data used to train AI is an available option on social media platforms and some dating apps.
  • Privacy policies are evolving quickly in response to AI, but currently everything posted publicly can be used to train AI models.
  • Limiting post visibility settings to “friends” or “followers” only is a way to protect personal information (for now).

Read Full Article

like

10 Likes

source image

Medium

1M

read

412

img
dot

Image Credit: Medium

Shop For Discounted VPN

  • Investing in a VPN Virtual Private Network protects your online activities by encrypting your internet connection. NordVPN offers advanced security features, military-grade encryption, and a steadfast commitment to protecting your personal data. NordVPN offers the ability to connect to up to 10 devices and helps to simplify your online experience through its password manager and secure cloud storage. With NordVPN’s encryption capabilities, you can confidently share files, knowing that they remain secure and out of reach from unwanted eyes. During promotional periods, NordVPN discounts its prices by 70%, making it the perfect time to upgrade your security without breaking the bank.
  • With a VPN, you can enjoy a safer, more private online experience, keeping your data out of the hands of potential cybercriminals. NordVPN is known for its advanced security features and military-grade encryption. NordVPN provides peace of mind by ensuring your online presence is far more secure than without it. NordVPN envelops you in a cocoon of safety, no matter where you are. With NordVPN, you can wave goodbye to the frustration of password resets and the anxiety of forgotten logins. NordVPN offers a range of plans that can cater to different users, from occasional browsers to heavy streamers.
  • During select promotional periods, NordVPN discounts its prices by 70%, making it the perfect time to upgrade your security without breaking the bank. Choosing to invest in a VPN service like NordVPN isn’t merely a choice for security; it’s an investment in your peace of mind. With the ability to protect your information, manage your passwords, and store files securely, investing in NordVPN becomes not just practical but fundamentally essential to maintaining your digital life in a world so heavily influenced by the internet.
  • NordVPN is constantly updating its features to stay one step ahead of potential security threats. This means you get to enjoy the peace of mind that comes with knowing you’re protected against the ever-evolving landscape of online dangers, all while enjoying the freedom to navigate the internet without limits. NordVPN simplifies your online experience significantly by adding a premium password manager into your toolkit. NordVPN offers secure cloud storage, making it easy to protect your valuable assets through this innovative solution.
  • With NordVPN’s encryption capabilities, you can confidently share files, knowing that they remain secure and out of reach from unwanted eyes. Furthermore, NordVPN’s versatility enables you to utilize this service on a myriad of devices, whether they’re Windows, Mac, Linux, or even mobile devices. With NordVPN, you won’t simply be gaining security; you’ll also find your overall browsing experience significantly enhanced by encrypting connections, offering a seamless experience that enhances the joy of discovery that comes with exploring the internet.

Read Full Article

like

24 Likes

source image

Pymnts

1M

read

249

img
dot

Image Credit: Pymnts

Ransomware Attack Targets Supply Chain Management Software Provider Blue Yonder

  • Supply chain management software provider Blue Yonder has been targeted by a ransomware attack.
  • The attack has affected customers like Starbucks and U.K. grocery chain Morrisons.
  • Blue Yonder is working with external cybersecurity firms to recover from the attack.
  • Starbucks and Morrisons have implemented backup systems while waiting for services to be restored.

Read Full Article

like

14 Likes

source image

Siliconangle

1M

read

77

img
dot

Image Credit: Siliconangle

Ransomware attack on Panasonic’s Blue Yonder disrupts supply chains in UK and US

  • A ransomware attack on Panasonic Corp.-owned supply chain management company Blue Yonder Group Inc. caused disruptions and delays in the U.K. and U.S.
  • The attack was detected on Nov. 21, and Blue Yonder has provided updates on its website, but without much detail.
  • Blue Yonder is working with external cybersecurity firms to restore systems safely, with no timeline for restoration at this point.
  • The outage has impacted grocery chains in the U.K. and affected companies in the U.S., including Starbucks, Proctor & Gamble, and Albertsons.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app