Ian Barker

Better customer experience can turn travel searchers into bookers

plane smartphone

When people are booking travel, companies like travel agencies, hotel chains and airlines have an opportunity to gain a loyal customer.

But a new survey of more than 500 travelers from data science specialist Boxever suggests that the window to turn searchers into bookers and beat the competition is a narrow one.

Continue reading

Social engineering tops the hacking pops

Faceless cyber criminal hacker

Hackers are constantly seeking new ways to attack systems and gain insider access to data. A new survey from IT security company Balabit reveals the 10 most popular hacking methods to help companies understand how to protect themselves.

The survey of almost 500 IT security practitioners reveals that social engineering is the most popular means of attack. Hackers aim to get a 'low level' insider user account by means of phishing and escalate its privileges.

Continue reading

ISP filters could be harming UK users’ love lives

rose keyboard notebook laptop flower

Content filters are supposed to protect you from bad stuff, but they can have unexpected side effects and block things you want to access.

As we approach Valentine's Day a new survey by UK broadband comparison site Broadband Genie has discovered that filters may be preventing Brits from finding love by blocking online dating sites.

Continue reading

The top threats to watch for in 2016

Hidden threat

Messaging and infrastructure security specialist Cloudmark has released its Annual Global Threat Report for 2015 which reveals the biggest current threats based on its crowd sourced security platform, which analyses user behavior from more than a billion subscribers.

Top of the list is the Swizzor malware which delivers unsolicited ads, modifying browser settings without user permission. This silent threat delivers booby-trapped emails to unsuspecting users with varying subject lines. Each email contains a zip file carrying the malware payload, this uses a simple domain generation algorithm for command and control synchronization to create a large number of domains that then clash with legitimate websites and make it difficult for them to be taken down.

Continue reading

Dating apps -- the good the bad and the ugly

cupid broken heart

It's coming up to Valentine's Day, so inevitably the IT industry turns its thoughts towards dating apps. Two new reports show that the apps may not be living up to expectations, and that users of them could be revealing more than they intend to.

New research from app quality researcher Applause shows that consumers are more dissatisfied with dating apps than any other type.

Continue reading

Poor app security can lose businesses money

mobile security

The app market is booming, with revenues expected to top $140 billion this year, but lack of investment in security could be putting these revenues at risk.

A new study by Bluebox Security has examined three popular mobile apps -- Hulu, Tinder and the Kylie Jenner Official App -- all examples of apps that lack self-defense capabilities to protect against tampering, resigning and redistribution. It shows that attackers can easily defraud enterprises of app revenue by disabling advertising, accessing premium features for free, and bypassing subscription payments.

Continue reading

Bromium launches next generation endpoint protection

Laptop protection

Endpoint systems often represent the weakest element in the security of any corporate network. In order to guard against attacks, protection specialist Bromium is launching the latest version of its security product.

Bromium Advanced Endpoint Security integrates threat isolation and analysis, plus has newly introduced continuous host monitoring to enable organizations to protect, detect and respond to targeted attacks, zero-day threats and breaches in real time.

Continue reading

The economic cost of being hacked


We all know that hacking is big business, 2015 proved to be a record year for cyber crime, and it's predicted that 2016 could be even worse. But aside from the worry of putting customer and employee information at risk, what are the financial penalties of being hacked?

Cyber security specialist Praesidio has put together an infographic looking at just how expensive a cyber attack can be.

Continue reading

IT security teams face increased pressures

Network security firewall

Security teams face threats from outside the organization but also challenges within to put protection in place and satisfy executive and regulatory demands.

Managed security company Trustwave has published its latest Security Pressures Report, compiling the thoughts of more than 1,400 IT security professionals around the world, addressing which emerging technologies pose the greatest risks, the top fears of post-breach repercussions, which security responsibilities are top priorities, and more.

Continue reading

Lack of expertise passes security as top cloud challenge


The latest State of the Cloud report from cloud management specialist RightScale reveals that a lack of resources and expertise is now the top cloud challenge -- cited by 32 percent of respondents.

This means it has overtaken security, mentioned by only 29 percent. Even the most security conscious respondents -- enterprise central IT teams and security pros -- no longer see security as their main challenge.

Continue reading

Looker brings business analytics to big data

Big data magnifier

We hear a lot about big data, but collecting lots of information is of no use unless you’re able to get some practical benefit from it.

Business intelligence platform Looker is expanding its support for big data with new products supporting SQL query engines Presto and Spark as well as updates elsewhere.

Continue reading

New platform helps techies discover their market value

Business recruitment

Not everyone is on the lookout for a new job, but it's always interesting to know what opportunities are available and what your worth might be.

San Francisco-based Woo is launching its platform for letting tech talent gauge their market value and find potential opportunities.

Continue reading

US employees waste 30 percent of their work week on status meetings

Meeting bored

Meetings are often seen as one of the great time wasters of the workplace. A new survey from business collaboration specialist Clarizen suggests that this is more than just supposition.

It reveals that US workers spend on average 11.8 hours per week preparing for and attending staus meetings. Assuming a 40 hour working week this means they could be wasting up to 30 percent of their time on them.

Continue reading

Cato Cloud aims to simplify network security


The growth of distributed enterprise networks and changes in traffic patterns as data moves to the cloud has presented companies with problems in ensuring that all of their information and endpoints are properly protected.

To address this, Israeli company Cato Networks is launching its new network security as a service (NSaaS) platform. Cato Cloud is aimed at making network security simple and cost-effective for the distributed, cloud-centric and mobile-first enterprise.

Continue reading

Installing apps at the weekend? You're probably using iOS


Companies looking to market to mobile users rely on being able to reach users at the times and places when they're most receptive.

A new report from mobile advertising company AppsFlyer looks at the behavior of app users and how it differs between operating systems and around the world.

Continue reading

Ian's Latest Tweets

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.