Security News
An August Beyond Identity report takes a look at people's password protection habits as well as their tendencies to guess other folk's passwords. Last month, Beyond Identity published the results of a survey highlighting password protection habits, office password "Guessing games" and more.
After spending five years poring over port scan results, infosec firm Imperva reckons there's about 12,000 vulnerability-containing databases accessible through the internet. The news might prompt responsible database owners to double-check their updates and patching status, given the increasing attractiveness of databases and their contents to criminals and hostile foreign states alike.
Lots of companies these days either run bug bounties, or hire an outside company to look after bug submissions, which shows that they are genuinely interested in knowing about security vulnerabilities in their products or services. Secondly, even researchers who do this sort of thing for a living need to know the right place to start, and having a standardised storage place for contact details makes bug reporting easier for everyone.
On Wednesday, Verizon released the results from a new survey, detailing sentiment among business leaders about the economic impacts of COVID-19, labor shortages, network security in the age of remote work and more. In August 2021, 90% of business owners and decision-makers said they were very or somewhat concerned about the impact of COVID-19 on small U.S. businesses, a 2% decrease from August 2020, per Verizon.
On Thursday, HP released an HP Wolf Security report titled "Rebellions & Rejection." The findings detail employee pushback due to company cybersecurity policies and operational drawbacks for IT teams overseeing these networks. At the same time, these new operations also presented security risks with remote workers logging on from home on a mixed bag of personal and company devices.
A recent Authentication Security Strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method. How much longer organizations expect to use passwords.
Proxyware services are attractive to businesses that use them for internet-related traffic research, such as search engine optimization. For consumers, Cisco points out, proxyware services are "Advertised as a means to circumvent geolocation checks on streaming or gaming platforms," while at the same time allowing consumers to generate income for the use of their bandwidth.
Analysts reviewed 13 million security incidents and found that end-of-life versions of Linux distributions were at the biggest risk. Linux now has been around long enough that old versions are causing security problems, according to a new report from Trend Micro.
Facebook has revealed a report that shows the most-shared link on the platform in the first three months of 2021 described questionable interpretation of a death attributed to a COVID-19 vaccination - but only did so after publishing a later and more flattering report. The document wasn't Facebook's first such report.
71% of vulnerabilities found in the first half of 2021 are classified as high or critical, and 90% are of low complexity, meaning an attacker can expect repeated success under a variety of conditions, says Claroty. Industrial cybersecurity company Claroty has released a report on the state of vulnerabilities in industrial control systems in the first half of 2021, and the data reveals several serious issues that should leave any business with an ICS system on high alert.