Windows 10 April 2018 -- what's new for IT pros?

Windows 10 superhero

As the keenly awaited Windows 10 April 2018 update (Windows 10 1803) begins its roll out, IT professionals will be interested to see what features it offers them.

Among the developments of interest to professionals is the Windows Autopilot feature which offers cloud powered device management. Using Intune, Autopilot now allows the device to be locked during provisioning until policies and settings for the device get provisioned, ensuring that by the time the user gets to the desktop, the device is secured and configured correctly.

Continue reading

The impact of AI in the data center [Q&A]

data center

The rise of artificial intelligence (AI), automation and machine learning is changing the way IT professionals approach data center operations and management. And the possibilities are endless -- from lowering operational costs and reducing time to deploy new applications -- there’s no doubt that AI is transforming the data center.

We spoke with Hal Woods, chief technology officer of storage and data management specialist Datera, to learn more.

Continue reading

81 percent of organizations see an increase in cyber security challenges

security threats

A new study from IT solutions provider US Signal reveals that businesses are seeing a greater number of security challenges.

The survey of security experts from a cross-section of organizations also shows 40 percent of respondents experienced at least one security incident in the last year, and 13 percent didn't know if they had.

Continue reading

Long-lasting DDoS attacks make a comeback as numbers of attacks and targets rise

DDoS attacks

Long-lasting DDoS attacks made a return in the first quarter of 2018 with the longest attack seen lasting 297 hours (more than 12 days). The last time a longer attack than this occurred was at the end of 2015.

This is among the findings of Kaspersky Lab's latest DDoS intelligence report which reveals that in the first quarter of 2018, DDoS attacks were registered against targets in 79 countries.

Continue reading

Configuration vulnerability could leave SAP systems open to compromise

data threat

A vulnerability arising from the default installation of popular business management platform SAP could lead to a full compromise of the system say researchers.

SAP security and compliance specialist Onapsis has revealed the flaw which is found in SAP Netweaver and can be compromised by a remote unauthenticated attacker with only network access to the system.

Continue reading

North Korean leaders abandon western social media

North Korea keyboard

Chances are you're not currently friends with Kim Jong Un on Facebook. And it's not likely to happen any time soon according to researchers at Recorded Future who have been looking at the internet usage patterns of North Korea's leaders.

In July last year they found that the country's ruling elite were plugged into contemporary internet society, were technologically savvy, and had patterns of internet use that were very similar to users in the West.

Continue reading

Cohesity simplifies the creation of cloud development environments

cloud development

Secondary storage specialist Cohesity is launching new capabilities that allow organizations to leverage the public cloud for faster application testing and development, while still ensuring seamless backup and recovery.

A growing number of enterprises are moving application testing and development onto public cloud infrastructure, taking advantage of its agility and elasticity to speed time to market. Using Cohesity CloudSpin, users can instantly convert backup data stored on Cohesity DataPlatform into a new virtual machine for testing or development in the cloud.

Continue reading

Security flaw could allow hackers to create hotel master keys

Hotel lock

Most hotel chains these days rely on some sort of electronic key card mechanism rather than more traditional locks.

Researchers at F-Secure have found that hotels worldwide are using an electronic lock system with a flaw that could be exploited by an attacker to gain access to any room in the building.

Continue reading

Endpoints still vulnerable despite advances in protection technology

Endpoint protection

Although endpoint security solutions have improved, a new survey of IT security professionals finds that three quarters believe their existing anti-malware solutions would be able to prevent no more than 70 percent of infections.

The study from anti-evasion specialist Minerva Labs shows nearly half of the respondents surveyed (48 percent) say that they have seen about the same number of malware infections than previous years while 32 percent claim to have seen an increase in infections.

Continue reading

90 percent of malware given unhelpful labels by AV tools

virus label

According to a new study, 90 percent of malicious files are given generic labels by AV tools, such as 'trojan.generic', providing limited guidance for successful remediation and leaving enterprises exposed to subsequent attacks resulting from compromised credentials.

The study by breach protection specialist Lastline analyzed tens of millions of samples that were for the most part scanned and released by other security solutions.

Continue reading

Robin the AI-based assistant automates tedious sales tasks

Sales graph

Sales staff often find themselves spending time on administrative tasks that keep them away from actual selling.

San Francisco-based company SalesHero is aiming to change that with the launch of Robin, a new AI assistant for sales staff that learns from the user's actions and automates processes to improve daily productivity.

Continue reading

Online banking security improves but only a third are free of critical vulnerabilities

Bank card security

The percentage of critical vulnerabilities in online banking systems is falling, but two thirds still contain at least one critical vulnerability according to a new report.

Enterprise security specialist Positive Technologies has released its Financial Application Vulnerabilities Report, drawn from audits performed by the company.

Continue reading

Companies are keen to move analytics to the cloud

Cloud growth arrow

The cloud is the best place to run analytics according to 83 percent of the world’s biggest companies.

A new survey for Teradata conducted by Vanson Bourne shows that by 2023, most organizations want to run all of their analytics in the cloud. But an overwhelming 91 percent say that analytics should be moving to the public cloud at a faster rate.

Continue reading

Martin Lewis suing Facebook over fake ads

Facebook icon on iPhone 8

We reported just over a week ago that fake ads promoting cryptocurrency scams were using the names of leading UK business figures.

Now one of those whose names has been featured, consumer advice expert Martin Lewis, is suing Facebook for defamation over the use of his face and name.

Continue reading

Cybercrime revenues hit $1.5 trillion a year

bag of money

We reported earlier this month on the ways in which cyber criminals spend their ill-gotten gains.

The company behind those findings, Bromium, has now released more details from its research, which exposes a huge cybercrime-based economy and the professionalization of cybercrime.

Continue reading

Load More Articles