Latest Technology News

Blancco partners with Lenovo to offer secure data erasure for enterprises

Sweep away data

Enterprises are dealing with ever greater volumes of data and that brings with it added risk as well as compliance issues and management costs.

In particular, it's important for security and compliance to be able to securely dispose of data that's no longer required. This is why data erasure specialist Blancco Technology Group is announcing a global collaboration with Lenovo to provide secure data erasure as part of the Lenovo ThinkShield security solution.

Continue reading

The way AI is enhancing online security

AI

In an era marked by the relentless expansion of digital connectivity, the assurance of robust online security stands as a critical imperative. Cyber threats, characterized by their growing sophistication and frequency, demand innovative solutions to safeguard sensitive data and preserve privacy.

Among these solutions, artificial intelligence emerges as a transformative force reshaping the landscape of online security. This article delves into the many ways in which AI is revolutionizing online security protocols, from proactive threat detection to dynamic risk assessment and adaptive response strategies.

Continue reading

Web app attacks target security misconfigurations

New research from Barracuda finds that 30 percent of all attacks against web applications target security misconfigurations -- such as coding and implementation errors.

Analysis of incidents detected and mitigated by Barracuda Application Security during December shows 21 percent involved code injection. Though these were more than just SQL injections, generally designed to steal, destroy, or manipulate data.

Continue reading

Improving visibility into end-user computing [Q&A]

endpoint data

In the wake of the coronavirus pandemic we've seen greater focus on workplace flexibility with many employees being in the office for fewer days each week.

But to make this work, enterprises must be able to track the state of their end-user computing to understand their access, performance and user satisfaction.

Continue reading

Mozilla Monitor Plus launches with new automatic data removal service

Mozilla Monitor, formerly known as Firefox Monitor, has introduced a subscription-based service named Mozilla Monitor Plus. This paid service aims to provide a comprehensive solution for individuals concerned about their online privacy, especially in the wake of increasing data breaches.

Mozilla Monitor has garnered a subscriber base of 23,000, indicating a significant interest in personal data security. The new service, Mozilla Monitor Plus, is a response to the concerns of 42 percent of young adults (aged 18-24), who have expressed a desire to understand and control the personal data that companies hold about them.

Continue reading

Winlator, the app that lets you play Windows PC games on your Android phone, gets a big update

Playing Android games on your PC is easy enough. You have the option of using third-party emulators such as Bluestacks or NoxPlayer, or you can take advantage of the built-in Windows Subsystem for Android, available on Windows 11.

However, if you wish to flip the script and play Windows games on your Android device, the process is somewhat more complex, but not impossible. To do this, you’ll need Winlator, which has just been updated to version 5, improving compatibility and performance, and resolving various issues.

Continue reading

Breaking Bitlocker: Watch Microsoft's Windows disk encryption being bypassed in just 43 seconds

Microsoft BitLocker is a full-disk encryption feature included in certain editions of Windows operating systems, designed to enhance the security of data stored on a computer or external drives. It serves as a crucial component of Microsoft's broader approach to data protection and aims to safeguard sensitive information against unauthorized access, particularly in scenarios where devices might be lost, stolen, or otherwise fall into the wrong hands.

BitLocker operates by encrypting the entire contents of a disk drive, including the operating system, system files, and user data. It uses a symmetric encryption algorithm, typically AES (Advanced Encryption Standard), to secure the data. To access the encrypted information, a user must provide a pre-boot authentication password or use additional authentication methods, such as a PIN or a USB key.

Continue reading

Safeguards for using Artificial Intelligence in election administration

Election administration is an essential component of the democratic process, but is also very challenging. The number of voters involved, which can climb into the tens of millions, requires the use of systems that have been fine-tuned for maximum efficiency. Managing the complexity of those systems, which are often spread out over vast geographical areas, is daunting, especially considering the task often relies on a volunteer staff with high turnover rates. Looming over the entire enterprise is the requirement for unquestionable accuracy and crystal-clear transparency.

Artificial intelligence, which thrives at optimizing systems for maximum efficiency and accuracy, has the potential to provide valuable support for election administration. Leveraging it for that purpose, however, also requires that strong safeguards be put in place.

Continue reading

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing -- which utilizes quantum mechanics to solve complex problems faster than conventional computers -- could potentially turn data security on its head.

IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality. In fact the global quantum computing market size in terms of revenue was estimated to be USD 866 Million in 2023 and is poised to reach USD 4,375 Million by 2028, growing at a CAGR of 38.3 percent from 2023 to 2028. This is raising concerns that these computers might pose a threat to current public-key cryptography algorithms and potentially expose sensitive data. As such, data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world.

Continue reading

X (Twitter) alternative BlueSky opens sign-ups for everyone

Bluesky butterfly logo

If you always wanted to sign-up for the X (Twitter) alternative BlueSky but never managed to get your hands on an invite code, you will be glad to hear that these codes are no longer required to create an account.

The social media service, which managed to grow to over 3 million users already, is now available for everyone. The number of users pales in comparison to the 130 million that Meta's Threads managed to accumulate, but it is more than Mastadon's 1.8 million.

Continue reading

Tech businesses turn to AI to improve revenues and compliance

Process efficiency and cost-saving are top priorities for life sciences and high-tech executives, with greater emphasis placed on advanced analytics and artificial intelligence (AI) to achieve these priorities according to a new report.

The study from Model N shows three-quarters of executives say their current approach to revenue optimization needs improvement, and survey responses show plans to bolster revenue operations by incorporating advanced analytics (68 percent), AI (59 percent), and robotic process automation (46 percent).

Continue reading

As-a-Service tools dominate the cyber threat landscape

malware alert

Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools now make up the majority of malicious tools in use by attackers, according to a new study.

The report from Darktrace shows malware loaders (77 percent of investigated threats) are the most common tool, followed by cryptominers (52 percent), and botnets (39 percent).

Continue reading

Plugable launches USBC-HDMI8K USB-C to HDMI 8K adapter

Plugable has launched its new USB-C to HDMI 8K Adapter. Dubbed "USBC-HDMI8K," this latest model is an advancement from its predecessor, featuring HDMI 2.1 compatibility, which allows for improved video and audio performance.

The USBC-HDMI8K adapter is targeted at a diverse user base, including gamers, video editors, and 3D enthusiasts, promising to deliver high-definition visuals with its support for 8K 60Hz, 4K 144Hz, HDR, Dolby Vision, and Dolby Atmos. The adapter's capabilities are aimed at providing a premium viewing and gaming experience, with its support for HDMI 2.1's 48Gbps throughput.

Continue reading

Cisco adds new AI and security innovations

Security and networking specialist Cisco is announcing changes to its Cisco Security Cloud as part of its mission to simplify security.

Cisco Identity Intelligence -- available from July this year -- will run on top of customers' existing identity stores and provides unified visibility, as well as AI-driven analytics.

Continue reading

TEAMGROUP unveils PD20M Magnetic External SSD with Apple MagSafe compatibility for iPhone

TEAMGROUP has announced the PD20M Magnetic External SSD, which is compatible with Apple’s MagSafe technology. In other words, the SSD can magnetically attach to the rear of any iPhone that features MagSafe (iPhone 12 and newer).

The PD20M is equipped with a USB Type-C interface, supporting a wide range of devices, including the latest Apple iPhone 15 Pro and Pro Max smartphones. The drive features a weight of just 40 grams and a thinness of 0.82 cm. The PD20M boasts a magnetic strength of over 0.8 kg, ensuring a secure and instant attachment.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.