Ian Barker

Companies shouldn't 'over think' internet of things security

Internet of Things

The internet of things opens up a vast range of new opportunities for individuals and businesses. But as we saw yesterday with expert predictions on the impact of the Apple Watch it also brings additional risks.

Analysts at Gartner are predicting that by 2017 more than 20 percent of businesses will have security devices aimed at protecting services and devices in the internet of things.

Continue reading

Data center market will show massive change over the next two years

IT server data datacenter enterprise

Four major factors will bring about dramatic change in the data center market by the end of 2016, according to a new report released by Gartner.

The factors are: highly disruptive competition, big cloud provider dominance, economic warfare, and nationalism. All of these will occur with different intensities over different time frames but will have a significant impact on the market.

Continue reading

Apple Watch will boost wearable adoption and add risk say experts

Apple announces its first wearable -- the Apple Watch

The adoption of wearable technology is on the verge of becoming mainstream and that process can only be accelerated by the release of the Apple Watch.

A recent study by Acquity, part of the Accenture consulting group, shows that wearable fitness devices are already taking off. By the end of 2015 they’re expected to reach 22 percent adoption and 43 percent within five years.

Continue reading

Fewer than half of European businesses are ready for the cloud


Given the hype surrounding it, it’s easy to believe that the cloud is increasingly the first choice when it comes to business systems.

Yet a new survey by IDC reveals that a majority of European IT departments have yet to fully embrace its benefits. When asked about their readiness to move to a cloud-based strategy levels of confidence were low.

Continue reading

Heartbleed bug not exploited before disclosure

Heartbleed logo

The Heartbleed bug has gone down in history as one of the most serious flaws to affect the internet. But new research reveals that prior to its disclosure in April there's no evidence of Heartbleed having being exploited.

The disclosure of Heartbleed sent websites scrambling to apply patches. However, a study by academics at a number of US universities allays fears that the flaw may have been exploited for surveillance by government agencies before it became public.

Continue reading

CEOs take to social media to gain business benefits

Executives CIO CTO CDO CEO E-I-E-I-O

A new infographic created by social insight tool company Refresh looks at over 1,300 CEOs on social media to determine how they use the technology.

Not surprisingly it's younger CEOs that are most likely to embrace social media, with 61 percent being under 40. Some 89 percent are male though that perhaps reflects the low number of female CEOs rather than their willingness to use social tools.

Continue reading

Shippable wants to help developer teams innovate faster

Cloud developer tablet

In a fast-changing world there's demand for new applications to be delivered quickly and traditional development processes often can't keep pace.

Seattle-based startup Shippable has announced a new version of its platform that helps developers to innovate and deliver more quickly using open source Docker containers. Docker -- in case you didn't know -- isolates resources of the Linux kernel to allow independent software containers to run on one Linux platform without the need to launch virtual machines. Docker containers can be run on any Linux machine whether on site or in the cloud.

Continue reading

Dyreza trojan may pose a risk for Salesforce users

Trojan horse a

A warning has gone out to customers of Salesforce.com that the Dyreza trojan, previously targeted at banking sites, may be a risk to users of the CRM solution.

The malware uses social engineering techniques to get the victim to infect the system via email. Once installed it uses "browser hooking" to allow Dyreza to intercept content entered by the user into the web browser before that content is transmitted over the network to a web site. Critically this allows the interception to occur before the data is encrypted.

Continue reading

iOS performance in the spotlight ahead of Apple's launch event

Mobile device apps

In the run up to Apple's latest eagerly anticipated launch event, mobile benchmarking specialist Crittercism has released an Apple edition of its Mobile Experience Benchmark Report.

Focussing on statistics gathered from over a billion users across more than 120 countries it looks at key performance metrics including crash rates across iOS versions and devices along with latency by carrier and Wi-Fi.

Continue reading

Major malvertising network targets Windows and Mac users

Scam advert

A new malicious advertising network is affecting sites including Amazon, Yahoo and YouTube. Dubbed "Kyle and Stan" by the Cisco Talos Security Research group that uncovered it, the malware is able to mutate to attack both Windows and Mac systems.

Online advertising has relatively few major distribution networks, by getting ads onto one of these an attacker has the potential to get malicious content in front of large numbers of users.

Continue reading

One in three financial services firms inadequately protected against cyberattack

Piggy bank theft

We trust financial services organizations with some of our most precious data, but are these companies doing enough to protect the information?

According to a new survey by Kaspersky Lab and market research company B2B International, 93 percent of financial services organizations have experienced some form of cyberthreat in the past 12 months.

Continue reading

New collaboration tool to make online discussions more productive


Business collaboration is most often organized by email, but it isn't always the most efficient way of ensuring things get done and it can be time consuming to deal with.

A recent survey by the McKinsey Institute shows that an average American spends 28 percent -- around 9 hours -- of their work week just dealing with emails. You can see how this time breaks down in infographic form below.

Continue reading

Lighter, thinner, tougher and more productive -- Dell's new commercial PCs

Dell Latitude 3000

As summer draws to a close and people start to go back to school or back to work technology manufacturers like to tempt them with new and shiny kit.

Today is the turn of Dell as it launches its latest commercial PC range aimed at offering productivity, manageability and security for business users in smaller, thinner and generally nicer packages.

Continue reading

Trustwave ethical hacking lab looks to counter hidden threats

Hacker detection

Security exploits aren't always aimed at computers or mobile devices. Often they target the infrastructure devices like ATMs and point of sale terminals that we take for granted in our everyday lives.

In order to protect against these threats, enterprise security specialist Trustwave has announced that it's enhancing its capabilities with the opening of an ethical hacking lab at the company’s Chicago HQ.

Continue reading

Privacy and financial threats top mobile malware trends

malware mobile

With mobile malware showing a 68 percent increase over the first half of last year it seems that, as with the PC malware field, profit is the main driving force behind it.

New data released by security specialist NQ Mobile shows that infections were detected in 37.5 million Android devices in NQ Mobile's database of 136 million active user accounts worldwide, an increase of 78.6 percent over last year.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.