Ian Barker

How to stop Windows 10 sharing your data

Stop hand signal

Earlier this week we reported on how Windows 10 could be sharing your activity data even if you had told it not to.

In response Microsoft has released a statement from Marisa Rogers, privacy officer at its Windows and Devices Group.

Continue reading

Education sector poorly prepared for cyberthreats

Education internet

Data is a vital resource in the education sector and increasingly schools and colleges store information in digital form. Digital technology is also moving into the classroom, but of course all this comes with greater risk.

Yet according to new research from security rating service SecurityScorecard, across 17 industries in the US education comes second to last in terms of total cybersecurity.

Continue reading

Email security systems leave organizations vulnerable

email icon

Email and data security company Mimecast has released the results of its latest Email Security Risk Assessment (ESRA) which finds that mail security systems inaccurately deemed nearly 17,000 dangerous files 'safe' this quarter.

That represents a 25 percent increase over the previous quarter. Dangerous file types like jsp, .exe, .dll and .src are rarely emailed for legitimate purposes and can be used launch a cyberattack.

Continue reading

60 percent of organizations have suffered disruptive cyber events in the last two years

Cyber disruption

A new study reveals that 60 percent of organizations globally have suffered two or more business-disrupting cyber events -- defined as cyberattacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment -- in the last 24 months.

What's more the research, carried out by the Ponemon Institute for cyber risk specialist Tenable, shows 91 percent have suffered at least one such cyber event in the same time period.

Continue reading

2018's worst password fails revealed

password note

Despite newer technologies, most of us still rely on passwords to secure our accounts. We are not, however, very good at choosing them or looking after them.

Password management company Dashlane has produced a list of the 10 worst password fails of 2018.

Continue reading

Phishing improves in quality as major brands are targeted

Phishing lock

It used to be easy to spot a phishing email, you just looked out for bad grammar and URLs that clearly didn't correspond to the organization being impersonated.

Recently though they've become harder to detect. According to the latest Global Threat Report from Comodo Cybersecurity, phishing really is getting better and it now represents one in every 100 emails received by enterprises.

Continue reading

Amplification bots used to raise the popularity and legitimacy of Twitter posts

Twitter bird megaphone

Earlier this year we looked at Duo Security's research into Twitter bots which focused on fake followers. The company has now published some further research looking at amplification bots.

So what is an amplification bot? They exist to boost content through likes and retweets. Duo has produced an algorithm to identify these bots and was able to find more than 7,000 over a 24 hour period.

Continue reading

Enterprises turn to software solutions to manage endpoint devices

endpoint data

As businesses embrace digital transformation, things like the growth of distributed workforces and remote work are impacting both the day-to-day responsibilities and long-term plans of IT managers.

Software and cloud managed services company Unify Square has commissioned a survey from Osterman Research to sample the views of IT managers who oversee unified communications (UC) and workstream collaboration (WSC) environments.

Continue reading

Christmas tech gadgets increase household cyber risks

Christmas smartphone worker

Many people will be receiving new tech gadgets over the Christmas period, including smartphones, gaming consoles, tablets, connected toys, and a whole range of apps to go with them.

But new research from from cybersecurity training organization the SANS Institute finds that while people are aware of the risks these devices can pose, they may not have the skills to properly protect them.

Continue reading

Windows 10 sends activity history to Microsoft even when told not to

Windows 10

We all know that Windows 10 logs data about what you do on your PC. What you may not be aware of is that it still sends that information to Microsoft even if you have told it not to. Sneaky, huh?

People on Reddit have been discussing the issue and finding that even if the option to send data to the cloud is turned off it still shows in the online Privacy Dashboard.

Continue reading

The benefits of a cloud-based testing regime [Q&A]


DevOps teams are under constant pressure to release faster, improve quality and keep costs under control. This means testing increasingly becomes a priority to ensure accelerated releases and many companies are turning to cloud-based testing tools.

However, as with any move to the cloud, there are some challenges that need to be overcome. We spoke to Uzi Eilon, chief technology officer at cloud-based testing platform Perfecto to find out more.

Continue reading

How deception can provide an edge in fighting cyberattacks [Q&A]

Deception man woman

Businesses are starting to recognize that it may be impossible to keep attackers completely out of their networks, so they are starting to look for ways of fighting them more efficiently.

One of the ways of doing this is to use decoys to lure attackers and allow the threat to be dealt with before it affects live systems. We spoke to Carolyn Crandall, chief deception officer at Attivo Networks to find out more about how this deception technology works and what it can do.

Continue reading

96 percent of employees struggle to locate files

File not found

According to a new report, 96 percent of all employees face some sort of difficulty when looking for the most recent version of a document or file.

The study from information management company M-Files also reveals that 83 percent of staff worldwide are forced to recreate documents that already exist but can't be found.

Continue reading

Oaxis Timepiece -- smart style meets smart tech

Oaxis Timepiece

For many people wearing a watch is as much about how it looks as how it works. In these days of smart devices that often requires a trade off between style and function.

Do you leave your good-looking watch at home while you wear your smart watch, or do you look a bit needy by putting a wearable fitness tracker or similar on your other wrist? With the Oaxis Timepiece you no longer have to make the choice.

Continue reading

69 percent of employees use work devices for personal tasks

Facebook in work meeting

New research released by security awareness and email protection company Mimecast finds that more than two-thirds of employees admit to personal use of work devices during office hours.

Mimecast surveyed more than 1,000 people who use company-issued devices (such as mobile phones, desktop computers or laptops) in the workplace, in order to understand their behavior, but also their awareness of basic threats plaguing organizations.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.