Guest Post – Cybersecurity Trends to Know in 2019

Here’s a contribution from Orla Forrest at Irish cloud services provider Paradyn.


In this guide, we examine some emerging innovations that are helping organisations to bolster their security in 2019.

In 2019, organisations are facing an ever-growing range of cyber-threats. In fact, according to a 2018 study from Bromium, the cybercrime economy was estimated to be worth $1.5 trillion. As ...

Continue Reading →
0

Mis-Adventures in Biometrics

Recently there were a couple of notable fails in biometric authentication.  The fingerprint reader in Samsung’s Galaxy S10 and Note10 smartphones will allow any finger to open the phone if the user has installed a cheap screen protector film.  In security parlance, this is a “fail-open” or “false positive” scenario.  An update is pending.  And Google’s new Pixel 4 phone’s facial recognition security ...

Continue Reading →
0

Password Managers Look For Breached Passwords

Creating and remembering strong (long) passwords is a chore, and leads to poor security practices such as shorter passwords, reuse of passwords, and writing down passwords in a password list or book that could be stolen.  The best way to create strong passwords and store them for use is a password manager.

The easiest password managers are found in popular web browsers such as Chrome, Firefox, and Edge.  Safari uses the Apple ...

Continue Reading →
0

Authentication Without Passwords

The password represents one of the weakest links in the cybersecurity chain, and is frequently one of the opening points of an attack.  Passwords can be collected in cleartext through phishing exploits such as an email link that directs you to a fake login page, or social engineering ploys such as bogus calls from “IT” or “tech support,” or keylogging software that captures the entire user name/password/web address triad.  Passwords can ...

Continue Reading →
0

Remote Desktop Protocol is Still a Top Attack Vector

Phishing for login credentials may still be the way most network breaches happen, but insecure use of remote desktop protocol is another favorite vulnerability used by attackers to enter a network..  Sophos Naked Security reported their findings on the use of RDP or the Remote Desktop Protocol as a launch vector for accessing and compromising ...

Continue Reading →
0
Page 1 of 12 12345...»