BetaNews Staff

Security breaches don't lead to a change in IT policy

Cyber attack

A survey conducted by training company QA, reveals that eight out of ten (81 percent) UK IT decision makers experienced some sort of data or cyber security breach in their organization in 2015. Sixty-six percent said that the breach had led to a loss of data, 45 percent said that it had resulted in a loss of revenue, and 42 percent said that it had resulted in a PR nightmare for the business.

Despite this, however, less than a third (27 percent) plan to invest in cyber security technologies next year. It would also appear that not all organizations have learnt from their experience, with less than half (43 percent) of IT decision makers saying that the breach had not resulted in a change of policy and procedure.

Continue reading

Samsung's first 128 GB DDR4 RAM modules for servers go into production

Samsung 128GB RAM

Samsung has announced that it is starting mass production of the industry’s first "through silicon via" (TSV) 128GB DDR4 memory modules for high-end enterprise and data centre servers.

This news follows on from its successful introduction of the 64GB 3D TSV DDR4 DRAM last year, which was an industry first.

Continue reading

Lenovo fixes two security vulnerabilities in its preloaded Windows tools


Lenovo has issued a patch which fixes vulnerabilities located in the software which comes preloaded with some of the laptops it sells.

The company recently released version 5.07.0019 of Lenovo System Update. This tool is made to keep the BIOS and drivers updated, previously called ThinkVantage System Update.

Continue reading

Combating insider threats: The pillars of an effective program

Insider threat

Insider threats can be the most dangerous threats to an organization -- and they’re difficult to detect through standard information security methods. That’s partially because the majority of employees unknowingly pose a risk while performing their regular business activities.

According to data we collected from analyzing the behaviors of more than a million insiders across organizations, in approximately 90 percent of data loss prevention incidents, the employees are legitimate users who innocently send out data for business purposes. They are exhibiting normal behavior to their peers and department, even though it might be in violation of the established business policy and a significant risk to their employer.

Continue reading

Dell announces Datacenter Scalable Solutions server line

servers cloud

In an effort to expand its share of the server market, Dell has announced today that it will be launching a new line of servers targeting companies that do not require the server volume of a hyperscale data center.

Instead, Dell will be catering to companies involved in web technology, telecommunications, hosting, utilities such as oil and gas, and research institutions. Dell hopes to meet the unique needs of companies in these fields with its Datacenter Scalable Solutions (DDS) units.

Continue reading

Post Deletion Stress Disorder: Is it real?

Google's latest Transparency Report shows a drop in Government data removal requests

A recent study, which asked 1,000 UK consumers about their digital device habits, has revealed that more than half of them (56 percent) delete things from their devices to make room for something else, and then regret doing so.

The move is called Post Deletion Stress Disorder and, according to a press release from the study’s maker WD, is only set to continue.

Continue reading

UK banking customers believe PIN will soon be obsolete


A grim future awaits the PIN code, if Brits are to be believed. According to a recent survey, a majority of Brits believe PIN will be a thing of the past, and soon.

In a survey of 2,000 UK banking customers, financial technology company Intelligent Environments has found that two thirds of Brits (67 percent) believe the PIN will soon be obsolete. When those respondents were asked to predict how quickly this might happen, the average response was just under five years.

Continue reading

Security tips for Black Friday shoppers

Black Friday

More than a quarter of UK and US-based online shoppers would proceed with a bargain purchase without first checking if the website is secure, a new survey has shown.

Moreover, shoppers in the US are more likely to put themselves at risk than those in the UK, with more than a third of US-based respondents admitting that they wouldn’t check the website’s security before purchasing. This is particularly worrying given that more than half of shoppers are expecting to use their credit or debit card to purchase goods this Black Friday weekend.

Continue reading

BullGuard Internet Security 2016 offers good value for home users [Review]


Recent reports have highlighted that it’s security at the endpoint which often leaves businesses exposed. This applies not just to machines in the office but also to mobile and BYOD devices, so some sort of security solution is essential.

BullGuard has released its latest Internet Security suite this month which is fully Windows 10 compatible and includes a number of things that make it an attractive option for business users. New features like Dropbox compatible backup and storage ensure that business data is properly protected.

Continue reading

Companies want to go after their attackers

fight fighters boxing kick

Corporates on both sides of the Atlantic are calling for changes in the law to allow them to fight back against the current wave of cybercrime.

As things now stand, corporates are discovering that the very laws meant to protect individuals against being hacked are now serving to protect the organized criminal gangs (OCGs) who are stealing billions from their accounts, compromising sensitive customer data and ransoming their most confidential data.

Continue reading

Li-Fi wireless transfers are 100 times faster than Wi-Fi


Li-Fi, the technology which uses light instead of radio waves to transmit data has been tested outside the laboratory environment. The result? Possible Internet speeds a hundred times faster than what we currently have.

So how does this technology work? An LED flicks on and off at speeds imperceptible to the naked eye which can be used to write and transmit information in binary code. It’s basically Morse code, only for computers.

Continue reading

Budget airlines driving in-flight Wi-Fi adoption

Man holding an iPad tablet on a plane next to the window

A new study from Juniper Research, titled In-Flight Entertainment & Wi-Fi Connectivity, Market prospects 2015-2020, has revealed that the adoption of in-flight Wi-Fi by budget airlines will provide a boost to the connected IFE (in-flight entertainment) market.

Juniper’s findings suggest that budget airlines hosting in-flight Wi-Fi will drive the number of connected commercial aircraft to over 10,400 by 2020, which is a threefold increase from an estimated 3,200 this year.

Continue reading

Five best practices for securing mobile devices and everything they touch

mobile security

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, and another 1.4 million were lost, according to Consumer Reports. For businesses and other organizations, every one of those losses and thefts could enable multiple security breaches. That’s because confidential data stored on the phone isn’t the only asset that’s vulnerable. As a trusted device, that phone also has access to corporate networks and the data stored on them.

More than half of North American and European companies are developing a bring-your-own-device (BYOD) policy, Forrester Research says. These policies implicate security risks because, for example, employees are reluctant to give their IT departments the power to remotely erase their smartphone or tablet when it’s lost, stolen, or the employee separates from the company. Part of employees’ fear is that the device will be wiped by mistake, costing them irreplaceable personal data such as photos.

Continue reading

SAP's customers are tired of hearing buzzwords

Tired, Exasperated, Frustrated man at mac

SAP customers are growing tired of vendor buzzwords and hype, desiring more practical advice on digital products, according to a recent survey.

Research conducted by the UK & Ireland SAP User Group found that 80 percent of respondents were skeptical of terms such as "digitalization" and "digital transformation". Fifty-eight percent of SAP customers also believe that vendors over-hype their terminology.

Continue reading

Adware uses Android's accessibility features to install malware

Aggressive Android app ads annoy and interfere

There’s an adware out there which uses features for the visually impaired to install malicious apps on an Android-powered device. The worst part is that it doesn’t use a vulnerability in the system, but instead abuses a service’s legitimate features.

Researchers from mobile security provider Lookout have spotted the abusers and published a blog post about it.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.