SMBs are underprepared for cyberattacks

Attack protection

No business is immune from cyber attack, and smaller companies are often targeted as they lack the resources to put into first class protection.

A new survey by cybersecurity company Webroot of 600 IT decision makers (ITDMs) at small- to medium-sized businesses, finds that the attacks organizations believed themselves to be most susceptible to in 2017 are rapidly shifting in 2018, while businesses still feel underprepared.

Continue reading

Free benchmarking tool helps developers understand their apps

Performance meter

The performance of an app can have a big impact on how users see the business behind it. For developers therefore it's important to understand how their app will work in the real world.

To help with this, mobile analytics specialist Adjust is launching a benchmarking tool that will enable companies to understand how well their app is performing across markets and platforms.

Continue reading

Consumers don't fully trust digital assistants

Broken trust

Given recent scares about digital assistants recording conversations, it's perhaps not surprising that levels of trust in these devices are not high.

The latest State of Digital Lifestyles survey from Limelight Networks reveals that adoption of digital assistants is highest in the US where 35 percent of consumers currently own one, however, these consumers still have major trust issues with the devices.

Continue reading

How we've come to rely on voice search

Smartphone voice command

Voice search has become increasingly popular in the last few years and figures from Seotribunal show that around half of teens and 41 percent of adults are using it in their day-to-day activities.

That number is still rising too with 1.8 million people expected to be using voice search daily by 2021. Seotribunal has put together an infographic showing how the technology is being used and more.

Continue reading

Average initial coin offering has at least five vulnerabilities

Cryptocurrency coins

Every month there are fresh cryptocurrencies springing up, but new research by Positive.com has discovered an average of five separate vulnerabilities in each initial coin offering (ICO) project examined in 2017.

What's more, 47 percent of the ICO vulnerabilities uncovered were medium to high severity. Just one vulnerability is enough for attackers to steal investors' money and do irreparable damage to corporate reputation.

Continue reading

Battery saving app infects over 60,000 Android devices

Mobile malware

Researchers at RiskIQ have uncovered a scam app that seeks to steal information and launches advert clicking to make money for the scammers.

The app is advertised as a battery saver. The twist here is that though it will actually do what it says and cut battery use, it does a lot of nasty stuff too.

Continue reading

New tool provides email protection for Office 365

Email attack

Office 365's dominant share of the online business tools market has made it a popular target for cybercriminals launching phishing and malware attacks.

To offer users extra protection, email security specialist Vade Secure is launching a new solution that's fully integrated into Office 365 and offers filtering powered by artificial intelligence.

Continue reading

Attackers use hidden tunnels to steal financial data

money tunnel

Global financial services organizations are targeted by sophisticated cyber attackers in an attempt to steal critical data, according to a new report.

The study from threat hunting company Vectra says attackers build 'hidden tunnels' masquerading as other web traffic to break into networks and access critical data and personal information. These tunnels are used to remotely control an attack and steal data while remaining largely undetected.

Continue reading

Average UK home has more than £2,000 worth of broken gadgets

Broken phone

UK households are home to thousands of pounds' worth of broken gadgets, according to new research from technology retailer Laptops Direct.

The survey of more than 1,000 UK adults shows that the average household is currently harboring £2,460 of broken technology and gadgets. Smartphones are the most common items in these technology graveyards with 78 percent holding onto them even though they’re broken.

Continue reading

Automation of endpoint security is top priority for IT pros

Endpoint protection

A new survey of IT professionals finds that automating endpoint detection and response processes is a top priority.

The study from cyber security training company, the SANS Institute, shows 42 percent of the IT professionals surveyed say their endpoints had been breached, and 82 percent of that group say their breaches involved desktops, while 69 percent cited corporate laptops and 42 percent claimed involvement of employee-owned laptops (42 percent).

Continue reading

IBM celebrates 10 years of DevOps with new releases

IBM logo

Over the past decade, DevOps techniques have helped to transform software development teams with a new and more agile approach.

But now companies are starting to move beyond the standard DevOps approach in what is being called 'Day 2' DevOps, a world that emphasizes scalability and teamwork. In such environments, development teams shift one way, operations teams shift the other and together they can deliver and manage multiple, complex applications at the same time.

Continue reading

Website attacks up as smaller businesses are targeted

On screen lock

Website attacks increased 14 percent in the first quarter of 2018 compared to the final quarter of 2017 as cybercriminals set their sights on independent websites and small businesses.

Figures from website security specialist SiteLock show that one percent of sampled sites are infected at any one time. This may not sound much, but it means 18.7 million sites are infected.

Continue reading

Fans targeted by phishing campaign as World Cup gets underway

Football

As the FIFA World Cup tournament enters its second week, cybercriminals are using a phishing campaign to trick fans into opening an infected attachment.

Emails identified by Check Point attempt to lure would-be victims into downloading a schedule of fixtures and a result tracker, but doing so will prove to be an own goal.

Continue reading

72 percent of people fear the theft of their data from company hacks

identity theft

A new survey of 2,000 UK adults reveals that almost three quarters worry that their details will be stolen every time they hand over bank details and email addresses to companies.

What’s more around one in five have already had their data stolen according to the study commissioned by BullGuard, and almost a third of these had been out of pocket as a result.

Continue reading

Most organizations are not fully embracing DevOps

DevOps

Although many businesses have begun moving to DevOps-style processes, eight out of 10 respondents to a new survey say they still have separate teams for managing infrastructure/operations and development.

The study by managed cloud specialist 2nd Watch of more than 1,000 IT professionals indicates that a majority of companies have yet to fully commit to the DevOps process.

Continue reading

Load More Articles