More stories

  • in

    LinkedIn has massively cut the time it takes to detect security threats. Here's how it did it

    Image: Getty Protecting against phishing, malware and other cyber threats is a difficult cybersecurity challenge for any organization — but when your business has over 20,000 employees and runs a service used by almost a billion people, the challenge is even tougher. But that’s precisely the challenge that’s facing LinkedIn: the world’s largest professional network […] More

  • in

    Instagram is making it easier to get your account back if you've been hacked

    Image: Ivan Pantic/Getty Images Facebook parent Meta has announced a raft of new security support initiatives, including Instagram’s new account support service that helps users who’ve had their accounts compromised.   Instagram has rolled out the page — instagram.com/hacked — where users can go if they can’t log in to their account. Whatever the cause, be it […] More

  • in

    Australia releases cloud security reference guides for SMBs

    Australia has released a series of guides it says are designed to help small and midsize businesses (SMBs) safeguard their cloud environments and against common cybersecurity incidents. These include technical guidelines for multi-factor authentication and patch management. The Australian Cyber Security Centre (ACSC) on Friday said it had developed the Small Business Cloud Security Guides in recognition that SMBs might not have the resources to understand the complexities of operating online or responding to potential cyber risks. The government agency said the guides would help these businesses understand such risks as well as how to work with managed service providers or their own IT teams to ensure a robust cyber hygiene. The cloud security guides were developed with Microsoft, said ACSC’s head Abigail Bradshaw, who added that working with both public and private organisations helped establish Australia as “a hard target” for cybercriminals. The government agency said it received more than 76,000 cybercrime reports in the past year, which translated to one in every 7 minutes. This was up 13% from the previous financial year, when one cybercrime case was reported every 8 minutes. Alexi Boyd, CEO of Australia’s Council of Small Business Organisations, noted: “A cybercrime can be devastating and can cause significant financial loss for a small business. On average, cyber incidents cost small businesses over $39,000. These guides are designed to help businesses secure their systems and data.”The SMB guides highlight the “Essential Eight” principles to secure environments using Microsoft 365, but are not designed to help organisations reach “a particular maturity level”, said ACSC. The guides include technical examples of multi-factor authentication, patch management, and application control. The documents are developed for SMBs using Microsoft 365 as a SaaS (software-as-a-service), with devices configured with Microsoft Intune. The technical guides also use low cost or free solutions where possible, though, many security configuration options are not available in entry-level Microsoft 365 subscriptions, according to ACSC.To adopt the technical examples, organisations will need subscriptions to Microsoft 365 Business Premium or the equivalent.RELATED COVERAGE More

  • in

    Windows: Still insecure after all these years

    For longer than some of you have been alive, I’ve been preaching the gospel of using more secure desktop operating systems. You see, Windows has been insecure since 1985’s Windows 1.0, really an MS-DOS extension, rolled out the door. Then, as now, there were more secure options. Then it was Unix desktop operating systems. Today […] More

  • in

    What is a Bitwarden Secure note and how do you create one?

    iStockphoto/Getty Images Sometimes you might want to save something to your password manager other than login credentials. Good password managers allow you to save other types of information, such as identities, credit cards, and even notes. More how-tos That’s right, and Bitwarden is no stranger to secure notes. In fact, the tool has a feature […] More

  • in

    Prosecutors charge six, seize 48 domains over DDoS-for-hire services

    Image: Getty The Department of Justice (DoJ) has been authorized to seize 48 internet domains and has laid criminal charges against six individuals who allegedly ran distributed denial of service (DDoS) or “booter” or “stresser” services from the US.  The FBI is seizing the 48 domains that facilitated DDoS attacks for paying customers against targeted […] More

  • in

    These hackers used Microsoft-signed malicious drivers to further their ransomware attacks

    Image: Getty Security firms have reported that multiple hacking groups have been using drivers signed by Microsoft in a series of attacks, including the deployment of Cuba ransomware.  That development matters because many security services will implicitly trust anything signed by Microsoft, During this month’s Patch Tuesday, Microsoft acknowledged reports by SentinelOne, Google-owned Mandiant, and […] More