Bot traffic takes back the web

Bot net

Just over a year ago we reported that, for the first time in five years, human web traffic had overtaken bot traffic.

It seems, however, that human dominance was short lived. The latest Imperva Incapsula Bot Traffic Report shows that in 2016 the bots were back on top with 51.8 percent of online activity, although it's an increase in good bot activity that has driven the trend.

Continue reading

New platform brings enterprise-grade eCommerce to smaller businesses

Ve Interactive platform

Doing business on the internet is deceptively simple, but for start-ups and smaller businesses, having the resources to do it well can prove elusive.

UK-based website conversion and digital advertising company Ve Interactive  is launching a new self-service platform aimed at giving smaller companies full control of their online marketing and generate more online sales.

Continue reading

Cyber criminals develop service to protect themselves from scammers

cyber criminal

Cyber crime is a competitive business, particularly for those who buy and sell their dubious services via online marketplaces.

But that competition can lead to the scammers being scammed. So called 'rippers' seek to defraud other criminals by selling dumps of fake social media credentials or invalid credit card details, or taking money without delivering the promised goods.

Continue reading

Aegis launches new generation secure flash drive

Aegis 3z

Last year we reviewed the Aegis Secure Key 3.0 encrypted flash drive. Apricorn, the company behind it, has now launched a new 3z version delivering even more security.

The Secure Key 3z offers top-level security innovation (FIPS 140-2 level 3 validation pending) at a lower cost and in a smaller form factor than before. It's accompanied by Aegis Configurator, a Windows-based software package that allows 10 or more compatible Aegis Secure Devices to be set up and configured simultaneously.

Continue reading

93 percent of organizations have technical challenges protecting data

data protection jigsaw

Data breaches can be extremely damaging for enterprises, leading to loss of consumer confidence, loss of revenue and even regulatory fines.

But despite the importance of data security a new study by Forrester Consulting on behalf of data protection specialist Varonis Systems, finds that organizations are often focused on threats rather than their data and don't have a good handle on understanding and controlling sensitive information.

Continue reading

Let there be light (and sound) -- Inateck Tomons DL1101 [Review]

DL1101 speaker color

Is it a lamp? Is it a speaker? Is it a media player? Is it a radio? Actually the DL1101 is all of these things rolled into one. It can connect to a sound source via Bluetooth or play music from a Micro SD card, there's a built-in FM receiver and it lights up, all of this for around $20.

The on-board battery needs to be charged through its USB connection. It can deliver up to eight hours of life on a full charge but this obviously depends on volume levels and how bright you have the light.

Continue reading

AI-powered chatbot helps combat cyber attacks

Endgame Artemis

The key to defeating cyber attacks lies in being able to make the correct response in a timely manner, but frontline security staff may lack the skills or resources to spot problems early.

Endpoint security company Endgame is launching an intelligent assistant built to automate security operations analyst actions and guide users of any skill level to detect and respond to advanced attacks.

Continue reading

Data breaches up by 40 percent in 2016

data breach

The last year has seen fewer of the large scale breaches that made the headlines in 2014 and 2015, but that doesn’t mean the problem has gone away.

A new report from CyberScout and the Identity Theft Resource Center (ITRC) has found a 40 percent increase in the US with a total of 1,093 data breaches in 2016, up from 780 in 2015.

Continue reading

Consumers are starting to get the message on phishing

Phishing

According to a new report from security awareness training company Wombat Security, people are starting to get the message on phishing.

When asked, 'What is phishing?', 65 percent of those surveyed in the US answered correctly. Ransomware remains a bit of a mystery for many, however, 52 percent were not even able to hazard a guess in response to 'what is ransomware?'

Continue reading

Work and personal app usage blurs as enterprise users change their habits

Office staff

The use of the cloud and as-a-service software models is having a big impact on the way businesses operate, but just how is this shift playing out?

Identity management specialist Okta has collected anonymized data from its customers' networks around the world to create the third edition of its Businesses @ Work report looking at how organizations and the people who work for and with them get work done.

Continue reading

Why advertisers need to wake up to mobile games

Happy mobile user

Mobile devices are increasingly used for many aspects of our lives and that includes playing games. But what does this mean for enterprises looking to promote their brands?

New research from mobile engagement platform Tapjoy suggests that consumers are twice as likely to say they feel relaxed when playing mobile games than they are when using social apps and that means more potential for advertisers to get their message across.

Continue reading

Taxi drivers, cashiers and other jobs facing extinction by technology

Boss firing employee message card

One of the challenges facing developed economies is that increased use of technology is set to wipe out many jobs. This is leading politicians to explore schemes like national basic incomes so that people can support themselves in a world where work is less certain.

But which jobs are most at risk of disappearing? UK services marketplace Bidvine has conducted a survey to find out how the public think advances in technology are changing the job market.

Continue reading

Businesses not prepared for the risk from mobile and IoT apps

Internet of things

Despite widespread concern about the security of mobile and IoT applications, organizations are ill-prepared for the risks they pose, according to new research.

The study from threat prevention company Arxan Technologies, IBM Security  and the Ponemon Institute reveals that 60 percent of respondents believe it’s either certain or likely their organization has experienced a material data breach or cyber attack over the past 12 months that was caused by an insecure mobile app.

Continue reading

Many consumers don't care about the impact of piracy

cd_dvd_piracy

Almost a third of consumers watch pirated content even though they know it's illegal to do so and that it deprives the content creators of revenue.

The study for platform security company Irdeto conducted by YouGov finds that 74 percent of US consumers know that sharing pirated content is illegal and 69 percent that downloading it is.

Continue reading

New Flock plug-in targets fake news -- you'll never guess what happens next

Fake/genuine

Fake and misleading stories plague the internet and there's always a risk that if not spotted they can influence decisions within an organization.

Enterprise collaboration platform Flock is aiming to stop the spread of unreliable news, especially within business environments with the launch of a Fake News Detector plug-in.

Continue reading

Load More Articles