BetaNews Staff

Chinese citizens can be tracked in real time

gchq_surveillance_eye_key_hole

A group of researchers have revealed that the Chinese government is collecting data on its citizens to an extent where their movements can even be tracked in real-time using their mobile devices.

This discovery was made by The Citizen Lab at the University of Toronto's Munk School of Global Affairs who specialize in studying the ways in which information technology affects both personal and human rights worldwide.

Continue reading

UK companies take too long to react to Internet disruptions

clock timer

Internet disruptions, in their biggest part, are taking place outside a company’s network, a new report by Dyn claims. The report also says having poor visibility beyond "company walls" makes it harder for those companies to react on time.

More than half (57 percent) of all Internet disruptions UK companies faced in the last year happened outside company networks. These companies need double the time to react compared to companies in the US.

Continue reading

European businesses are not ready for ransomware attacks

Ransomware skull

Ransomware was the number one way hackers attacked businesses in 2016, a new report by Radware confirms. Entitled Global Application and Network Security Report 2016-2017, it says 49 percent of European businesses confirmed cyber-ransom as the biggest motivator last year.

That basically represents a 100 percent increase compared to a year before, when it stood at 25 percent.

Continue reading

IT spending will increase by 2.7 percent in 2017

Spending Money Dollar

Gartner has tweaked its IT spending predictions for 2017, and now says the three percent increase in spending is not exactly realistic. It's going to be less -- 2.7 percent to be exact, which is still a positive prognosis, keeping in mind we're talking about growth.

The reduced spending is mostly to blame on the "wait-and-see" approach many companies are taking, caused by political and economic uncertainty.

Continue reading

People, not technology, drive innovation

Innovation

Anyone who has worked in the technology industry for a long time will develop a healthy cynicism towards industry buzzwords. They may also come to realize that the majority of technology "paradigms" are adaptations of concepts that have been done before. Digital disruption is not the automatic result of the arrival of new types of tech. Disruption, transformation, innovation -- call it what you will -- comes about as a result of human ingenuity, good fortune, and hard work -- in addition to technology.

Take Pokémon Go as an example. Plenty of analysis has been done on why it was so successful. Nothing about it was particularly radical; the smartphone, mapping, GPS, AR and, of course, the Pokémon themselves are not new. However the combination of these things tapped into a desire for nostalgia, collectables, and the need to complete and compete. Originally developed as an April Fool’s joke, it was, by all accounts, a highly successful mistake.

Continue reading

Why you should be thanking hackers

hands shaking computer monitors

With titles like "cyber terrorist" floating around, hackers have been associated with all things criminal, malicious, and in some cases, just plain psychotic. A fair argument, considering how many cases of identity theft, loss of income, slander, and more have come from a data breach thanks to a keyboard and a few hours.

So why should you be thanking hackers?

Continue reading

4 reasons to move from Big Data to the Age of Insights

big_data

In the online world, where data aggregates, compounds and grows at a tremendous pace, your business probably has multiple tools for collecting data. But how many tools does it have for making sense of that data?

Are you able to merge or fuse sets of data together to fully understand your users? Do you have a single source of data in order to understand the complete user journey? Are you able to use the data to answer complex business questions? If you answered "yes" to the above questions, you’re a step ahead of many others. According to , online companies are continuously investing more in analytics. At the same time, however, their satisfaction continues to decline. How can online businesses become more confident about their analytics tools?

Continue reading

Yahoo's security is a huge mess

Yahoo sign logo building

The latest reports on the data breach revelations at Yahoo, suggest that the company lost data for more than one billion users as far back as August 2013 and that the data is suspected to contain names, email addresses, hashed passwords, security questions and associated answers. In addition, Yahoo has stated that the attackers have accessed Yahoo proprietary code used to generate cookies for user access without credentials.

This major breach raises a number of questions, including: why did it take so long to identify and notify authorities about it? What are the implications for Yahoo users? What might this mean for Yahoo going forward? And what can other companies learn from these events?

Continue reading

Citrix acquires Unidesk for its layering technology

Citrix

Citrix has announced that it has acquired Unidesk, a company that created layering. The technology allows for the separation of Windows applications from the operating system.

The value of the acquisition was not disclosed. What we do know, however, is that we can expect a much tighter cooperation between Microsoft and Citrix.

Continue reading

What won't be reported in 2017 -- Even though it's likely to happen

crystal ball

Last year, more than a few stories didn’t make headlines that I thought should have. Whether they weren’t sexy or sensational enough for mainstream news channels, I don’t know.

My inner Nostradamus is telling me that the trend will continue and, therefore, I’m predicting seven storylines that should be covered in 2017, but that most likely will never cross your daily news feeds.

Continue reading

Cyberattacks against IoT devices tripled in 2016

Attack button

It only takes one successful cyber-attack to seriously hurt a company, so it’s shocking to see that UK businesses suffered, on average, almost 230,000 cyber-attacks in 2016.

This is according to Beaming. The ISP says a third of attacks was targeting company databases, but two thirds were, in fact, attacking connected devices, such as security cameras or building control systems. Such devices can be controlled remotely, through the internet.

Continue reading

One in three companies plans to embrace DevOps by 2019

DevOps

Almost half of large organizations (47 percent) have a DevOps approach to at least some, if not all, of their projects. This is according to a new report by Redgate Software, entitled State of Database DevOps.

The company says it has polled 1,000 SQL Server professionals all over the globe, with more than half working at companies with 500 employees or more.

Continue reading

The biggest security threats in 2017

security skull

It’s that time of the year again: when the great and good of the cybersecurity industry reach for their crystal balls to anticipate what the threat landscape might look like in the next 12 months. We all know cybercriminals by and large don’t operate to annual deadlines.

But December still represents a good opportunity for us to point out what might be coming down the road. It’s what Trend Micro’s 1,200-strong global threat research team does all year round to ensure we’re prepared for anything the black hats can throw at us. The good news for the UK’s CISOs is that much of what we’ll see is a steady evolution from threats that will already be familiar to many. The bad news: that won’t make them any less dangerous.

Continue reading

Artificial intelligence grabs headlines, but the true impact of robotics is in the back office

process automation

The hype over machine learning masks the real changes happening in the workplace.

Looking back on 2016, it would be easy to think that this was the year that artificial intelligence arrived, borne in by an army of automated workers. Media outlets bombarded us with news on the future of AI and automation. The vision of a dystopian future where robots do all the work and humans are trapped in a jobless, meaningless existence drove headlines of all kind. In politics, this ranged from speculation around a universal basic income, to debates over whether Donald Trump can reverse decades of technological progress in US manufacturing. In AI, the latest tangential development from any tech giant was duly reported as headline news.

Continue reading

How to take control of BYOD bandwidth use

smartphones office desk team meeting break

The trend for increasing numbers of employees and customers bringing their own devices into a workplace can seriously impair a businesses’ access to the Internet.

The problem is that as more mobile devices connect to the network, a business can quickly discover that its cloud-based applications, payments systems, accounting, stock control, customer relationship management (CRM) and business applications have become hopelessly sluggish.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.