Ian Barker

Vulnerabilities allow hackers access to two popular VPNs

VPN tiles

New research from VPNpro has found that two of the top 20 premium VPN apps have crucial vulnerabilities that can allow hackers to push fake updates and install malicious programs or steal user data.

The vulnerabilities in PrivateVPN and Betternet, can allow hackers to intercept communications and force the apps to download a fake update. The update may be automatically installed or the user prompted to install it.

Continue reading

Women are better at cybersecurity than men

Couple with laptops

Women are better at cybersecurity and protecting themselves online, new research by password manager app NordPass suggests.

The survey shows that women are more concerned about the potential harm of their personal online accounts being hacked. They also tend to use unique passwords more often than men.

Continue reading

ESET improves security management for Azure users

cloud padlock

As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.

Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.

Continue reading

How mobile data costs compare around the world

Mobile cash

If you have a monthly mobile phone plan you may not think too much about the price you pay for mobile data. However, comparison site cable.co.uk has been looking at mobile data costs around the world with some surprising results.

The United States is one of the most expensive developed nations for purchasing mobile data, coming in 188th in the world, with an average 1GB cost of $8.00 -- well above the global average of $5.09.

Continue reading

More than half of cyberattacks infiltrate environments without detection

Attack route

While organizations continue to invest significant amounts in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowledge.

This is among the findings of a new report from Mandiant Solutions -- the threat intelligence arm of FireEye -- based on real attacks, specific malicious behaviors, and actor-attributed techniques and tactics.

Continue reading

'SideScanning' technology offers deeper multi-cloud visibility

Cloud visibilty

While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.

Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.

Continue reading

IBM and Red Hat launch edge computing solutions for the 5G era

Edge computing

The rollout of the 5G network, bringing greater speed and lower latency to mobile data, is going to provide a boost to the utility of edge computing.

The second announcement to come from IBM's virtual Think conference today is a set of new offerings built on Red Hat OpenShift, allowing enterprises to autonomously manage workloads across a massive volume of edge devices.

Continue reading

IBM uses the power of Watson to automate IT operations

Automation

Normally at this time of year IBM's annual Think conference would be getting underway. This year's event is, of course, being held digitally and has kicked off with some new announcements.

The first is the unveiling of IBM Watson AIOps, a new offering that uses AI to automate how enterprises self-detect, diagnose and respond to IT anomalies in real time.

Continue reading

New free tool makes it easy to create videos for work and education

Panopto screenshot

The current shift to remote work and distance learning has meant many professionals and teachers communicating for the first time using recorded video.

But the complex steps and costly tools required to capture high-quality presentations are a barrier to them sharing their videos with colleagues and students. Seattle-based Panopto is launching a new, free tool to help people make video presentations by simply visiting a website.

Continue reading

SMBs are ahead of the game on security

security meter

It’s a generally held view that smaller businesses are more vulnerable to cyber threats than larger ones but a new report from Cisco Security suggests this may not actually be the case.

In its 2020 SMB Cybersecurity Report the company reveals that SMBs are maturing and mirroring larger organizations' approaches to a variety of security issues, including data breach disclosure, customer data inquiries, threat hunting and more.

Continue reading

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

Ransomware

Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?

We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.

Continue reading

Check Point uncovers flaws in online learning platforms

Online learning

Researchers from Check Point have found serious vulnerabilities in the widely-used WordPress plugins that are used for large-scale online learning by top academic institutions and major businesses.

By exploiting the flaws in LearnPress, LearnDash and LifterLMS, students, as well as unauthenticated users, can abuse security flaws in order to steal personal information, siphon money and attain teacher privileges on the platform.

Continue reading

How businesses can benefit from process automation [Q&A]

Automation

As the robotic process automation (RPA) market heats up, more businesses are looking to bring RPA into their business processes, but where do they start?

Enterprises are in the dark about how to integrate bots into their existing processes, and those that go into the buying process without a clear vision will meet roadblocks.

Continue reading

Clumio adds Microsoft 365 protection to its SaaS enterprise backup solution

Backup key

Enterprises and their data are vulnerable, perhaps more so than ever right now, with COVID related phishing scams booming.

Backup specialist Clumio is adding Microsoft 365 to its secure backup as a service offering, providing organizations running Microsoft 365 with a globally consolidated data protection service.

Continue reading

Remote operation changes the working day

Working late at home

The shift to working from home has had a major impact on people's lives, but one of the unexpected effects is how it has changed the working day.

New research from digital experience management company Aternity shows that in the Northeast and West regions of the US the working day starts and ends between 30 and 60 minutes later for remote workers compared to those in offices.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.