BetaNews Staff

The beginning of the end: Is the Ethereum bubble about to burst?

Ethereum (or more specifically the unit of currency associated with it -- Ether), has seen immense growth so far in 2017. Of course, with any meteoric gains in crypto, it’s never long before the term "bubble" starts getting thrown around. Many within the industry have raised concerns about the rapidly escalating value of the digital currency hot on the heels of Bitcoin in terms of dominance within the space, thinking its decline is inevitable. The ETH/USD rate has shot up, and it is now traded at $294.

To correctly assess whether the Ethereum bubble is about to burst, we must first look at what a bubble is, and decide if the rapid increase in price experienced by Ether thus far in 2017 falls into the category of bubble at all.

Continue reading

How to protect your company from 'zero-day' exploits

Is your company protected from zero-day exploits? Do you even understand what these threats are and how they can affect you? If you don’t, chances are you won’t be prepared when a hacker takes advantage of one of these exploits and steals a large amount of sensitive information from you.

Zero-day exploits are no joke -- some of the most costly cyber-attacks in history have come from hackers using these vulnerabilities. They can cost you more than just a lot of money; they can make your customers lose faith in your ability to protect their information. What can you do to deal with these exploits? Fortunately, there are a few ways to keep your network and the data you store safe and sound.

Continue reading

New auto technology, new consumer considerations

Our taste for new tech has compressed the adoption cycle and introduced fresh technology into a variety of industries, including automotive. By 2020, 10 million self-driving cars will be on the road. Think about it -- that’s just three years away.

So soon, in fact, that it’s snuck up on many of us. So, what else can we expect? Here are three to keep an eye on.

Continue reading

How to properly implement identity and access management

ID verification

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and being able to prove that all the access is legitimate. But as those heavily involved in IAM know, that is much easier said than done. There’s a lot that goes into getting all of these elements "right."

First, you must set up the accounts that enable a user to get to the resources they need -- often called provisioning (and its dangerous sister, de-provisioning, when said user no longer needs that access). Second, in order for that account to grant the appropriate access, there has to be a concept of authorization which provides a definition for what is allowed and not allowed with that access. And third, there should be some way to make sure that provisioning and de-provisioning are done securely with efficiency and that the associated authorization is accurate -- i.e. everyone has exactly the access they need, nothing more and nothing less.

Continue reading

UK businesses have a culture of secrecy towards data breaches

security breach

At a time when British businesses should be bolstering and updating their data protection policies in preparation for new legislation, it is worrying to report a culture of secrecy and ambivalence towards data breaches across the country.

With the EU General Data Protection Regulation (GDPR) due to come into force on May 25 next year, bringing with it huge fines of up to 20m Euros or four percent of turnover, a survey has revealed the real extent of Britain’s data breach problem.

Continue reading

GDPR is a set of security best practices, not a burden

Business security

The General Data Protection Regulation (GDPR) that takes effect May 25th 2018 is still raising serious compliance concerns for most UK companies, according to a Bitdefender survey. With companies becoming more enthusiastic in deploying hybrid infrastructures that involve leveraging the capabilities of both the public and the private cloud, 85 percent of UK respondents agree encryption is the most effective way to secure public cloud data.

Interestingly, only one third of UK respondents actually secure between 31 and 60 percent of cloud-stored data, while 21 percent encrypt everything stored within the public cloud. With GDPR placing tough restrictions regarding how "any information relating to an identified or identifiable natural personal" is handled, encryption plays a vital role in achieving this.

Continue reading

How Dubai Airport handles 90 million passengers a year

Heading to the airport has become a necessary process for almost all business professionals these days, but all too often, the airport can be a minefield of potential hold-ups or stressful procedures.

However this may all be about the change, as Dubai Airport is looking to introduce a new way of traveling that uses the latest connected technology to ensure their passengers have as smooth as journey as possible.

Continue reading

Protect yourself against malicious websites using Web of Trust

We might regard ourselves as advanced web users, but occasionally we still double-take when visiting a new website. Google a search term and you see a whole host possible options, including paid website ads and there’s very little stopping a rogue retailer from popping up and populating their store with known brands.

Anyone can register a .com or .co.uk and you can host one of these domains from any location. There’s simply nothing stopping a company in Asia, from obtaining a .co.uk and then setting up a store with a bunch of fake products.

Continue reading

Ransomware is reaching 'epidemic levels'

Ransomware

Ransomware has been named as one of the most pressing threats to society by officers at Europol.

The force has released a new report which claims that ransomware is reaching "epidemic" levels, eclipsing other areas of cybercrime such as data breaches, pornography and card fraud.

Continue reading

Doogee BL7000 is an affordable smartphone with a huge battery and nice hardware [Review]

Chinese smartphone manufacturer Doogee seems to be on fire; the outfit, which is several orders of magnitude smaller than bigger names like Lenovo, Huawei, Oppo and Xiaomi, has been pushing out new models like there’s no tomorrow. The vendor embraced a niche approach with the S-series (for secure), the BL series, the Mix (bezel-less), the Shoot series (for photography aficionados) and a few more.

After the Doogee Mix and the Doogee T5 and just before we review the S60 rugged smartphone, we’re taking a look at the BL7000 with the first two letters meaning "Battery Life" and 7000 representing the battery capacity (in mAh).

Continue reading

Blockchain's usefulness extends beyond the financial market

Blockchain

Blockchain technology is a key disruption enabler of established and, most importantly, trusted broker industries -- financial services being the biggest and most lucrative trusted broker service in the world. Trillions of pounds are moved around the archaic global financial system every day and billions of businesses and private individuals are serviced by companies that make up the vast industry. Still heavily reliant on manual processes, though dressed in a digital façade, finance system productivity is anchored with process delays, ever-rising expenses and is a relentless target for crime and fraud.

In an attempt to solve these ever-growing issues, blockchain, originally developed as the technology behind cryptocurrencies like Bitcoin, has been heavily invested in over the last few years. Investment to date has been primarily targeted at finance-focused blockchain start-ups and this focus of investment has lured many into the belief that the technology only has real potential in the world of finance.

Continue reading

BlackBerry is on the road to recovery

Blackberry logo

Rumors of BlackBerry's death may have been somewhat premature. The company just revealed its latest financial results, showing significant profits.

The former smartphone giant posted a stronger-than-expected second quarter, after, according to BlackBerry, its "complete transformation to a software company."

Continue reading

IoT adoption is rising in the enterprise

Businesses are embracing the Internet of Things (IoT) faster than ever before, with 2017 marking a landmark year in terms of adoption.

That’s according to the fifth annual Vodafone IoT Barometer Report, which reveals a huge uptake in terms of IoT projects being undertaken across the world.

Continue reading

Germany is the biggest source of botnets in Europe

Network security

Just a year after the Mirai malware infected connected devices to create the first IoT botnet, new research from Norton shows that global botnets have continued to grow and spread as a result of unaware users inadvertently infecting others.

According to Norton, the top three countries responsible for hosting the highest number of bots in Europe are Germany at just over eight percent, Italy at 10 percent and Russia at almost 14 percent.

Continue reading

UK businesses don't prioritize security training

secure payments lock

As the cost of dealing with the aftermath of a security breach has risen significantly in the past year alone, new research has revealed that staff training can greatly help reduce the risk of cyber attacks.

A new survey from Accenture found that 55 percent of workers in the UK could not recall ever receiving training regarding cyber threats, meaning many of them are often unsure what to do in order to prevent, identify or respond to a cyber attack.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.