The Latest F-Secure News
Product and Solution Information, Press Releases, Announcements
Cyberattacks Linked to Russian Intelligence Gathering
Specific targets of the attacks discussed in the report include the former Georgian Information Center on NATO (now called the Information Center on NATO and EU), the Ministry of Defense of Georgia, the ministries of foreign affairs in both Turkey and Uganda, and other government institutions and political think tanks in the United States, Europe, and Central Asia.
New Research Reveals Online Tracking Slows Down Web Browsing, Wastes Data
According to Sean Sullivan, F-Secure Security Advisor, the results show that online tracking has become a serious problem, and is costing people time and money. "Websites can typically justify some degree of online tracking to help them deliver better services to people, but this experiment shows that it's gotten way out of hand." said Sullivan. "The amount of tracking is increasing the amount of work browsers are doing and giving people a browsing experience like they, or maybe their parents, got in the 90's with dial-up Internet. It's basically becoming digital pollution that's eating up bandwidth, which justifies higher prices for data, which are then passed on to consumers."
Unpatched Software Vulnerabilities Continue to Plague Businesses
However, many businesses continue to neglect the importance and value of updating their software. A recent F-Secure survey** found that only 27 percent of companies have a patch management solution. The problem was particularly evident in France, where only 15 percent of respondents said their companies had a tool to manage software updates. On the other hand, 46 percent of Nordic companies had a patch management solution, making them better prepared to protect their company assets against threats designed to capitalize on software vulnerabilities.
Businesses Beware: New Research Warns of BYOD Security Gaps
This problem was particularly pronounced in businesses with 25-199 employees, who lagged behind larger enterprises in protecting BYOD fleets, and mobile devices in general. Specific gaps in this segment's security include:
Privacy Protection Made Easy for Apple Watch Owners
"Wearables are letting people use their wireless devices for new things, so products like the Apple Watch are very exciting," said Pirttilahti. "But new kinds of apps tend to produce new habits, which will change the way people are using their iPhones. Apple Watch owners will need to stay on top of how changes in their habits could expose their data to risks, and allowing them to control Freedome with their Apple Watch will make this process easy and accessible."
F-Secure and Mad Croc Bring Freedome to Mobile Gamers
Freedome images are included prominently in each of the game's levels, but the popular privacy and security app can also be used to give players an extra power boost. Players that download Freedome for their iOS or Android device will receive a free in-game armor upgrade, making both their in-game croc and their mobile device more secure. Downloading Freedome through the game will also allow players that haven't already installed Freedome to get an extended 3-month free trial for the VPN.
F-Secure Joins Calls to Kill Flash
"Criminals using exploit kits typically target insecure software that's widely used, and Flash has given them an easy target for at least the past seven or eight months," said F-Secure Senior Researcher Timo Hirvonen. "Newer technologies are available and becoming more popular anyway, so it would really be worth the effort to just speed up the adoption of newer, more secure technologies, and stop using Flash completely."
F-Secure SAFE Will Support Windows 10, Adds Network Checker
Microsoft has announced that they plan to release Windows 10 on July 29, and offer it as a free upgrade for anyone currently running Windows 7 or Windows 8.1 on their PCs.*
F-Secure and Tonino Lamborghini Join Forces to Offer Luxury Protection on Luxury Phones
"Personal data has become a key resource for attackers, and people really need to re-examine the assumptions they have about their security and privacy," said Samu Konttinen, F-Secure Executive Vice President, Consumer Security. "Attackers can buy personal data stolen by other hackers and combine that with details they learn about people from social media. This allows attackers to target potential victims with a degree of sophistication most people aren't expecting, and the end result is an attack by con artists disguised as a fairly detailed personal or business correspondence."