New version of RAA ransomware only goes after business users

Ransomware

A new version of the RAA ransomware was found recently by security researchers at Kaspersky Lab. This one, written completely in Jscript, seems to be targeting business users exclusively, the researchers claim.

It comes as they all do: through an email with the malicious attachment. This one, however, comes in a password-protected zip file. This method does two things:

Continue reading

Google wants to buy cloud software company Apigee

Google logo sign building

Google has announced that it will acquire the cloud software company Apigee Corp in a move that will likely help boost its own cloud offerings.

The deal is valued at around $625 million and Google has agreed to pay Apigee shareholders $17.40 for each share of the company's stock which amounts to a 6.5 percent premium on its closing price the day before the announcement.

Continue reading

PayPal teams up with Mastercard for in-store payments

PayPal

Just days after announcing a similar deal with Visa, PayPal has now announced it has come to an agreement with MasterCard, as well. This will allow customers to use PayPal to pay in stores, it was said, through the use of smartphones and contactless payment cards. According to multiple media reports, this deal actually means losses for PayPal in the short term.

Wall Street Journal reported that PayPal is "shifting away from promoting free bank transfers to fund customers' transactions and toward the networks, which charge a fee". But with strong competition coming from the likes of Apple or Stripe, PayPal wants to become a "ubiquitous" payment tool, as soon as possible.

Continue reading

What the rise of the darknet could mean for you

data engineering

The darknet can be described as the internet black market, home to sites that sell drugs, weapons, leaked security data, and even assassins -- and it’s so well-organized, it’s practically the dark cousin of Amazon.

In simple terms, it operates like a ghost. The websites within it coexist with the rest of the internet, but are inaccessible unless you have the software to open a window for you between realms. For example, this is a darknet URL: http://dppmfxaacucguzpc.onion/. If you have Tor -- the software designed to grant you access to the darknet -- it will lead you to the Tor webpage. If you don’t, it leads absolutely nowhere. On darknet, you’re untraceable and completely anonymous.

Continue reading

Intel Security will revert to the McAfee name

Intel Security McAfee

Intel has made the decision to sell off a majority stake in its security software arm, which was previously known as McAfee, to the private equity firm TPG.

In 2010, the chip maker acquired the security software company for $7.6 billion and then four years later it decided to do away with the McAfee name entirely in favor of Intel Security. TPG, which will own 51 percent of the company after the sale, will be reverting the company name back to McAfee, likely due to the security software being a household name and having a large user base.

Continue reading

Box users will soon be able to edit Google documents

Box Google

During BoxWorks 2016, the annual Box conference taking place in San Francisco, the enterprise content platform announced it is teaming up with Google to make working and collaborating in the cloud simpler and easier.

Box will become third-party content repository for Google Docs, Google Sheets and Google Slides, it was unveiled during the conference. Once the new offering is available, it will enable Box users to create and edit Google documents directly from its cloud services.

Continue reading

Box and IBM team up to increase productivity in cloud workflows

Box Relay

Thanks to a new partnership between Box and IBM, Box users will be getting a new workflow solution which will allow any business users to build, manage and track custom and pre-built workflows.

The new solution, called Box Relay, will be a part of the "all new Box", to be presented during BoxWorks 2016, Box's annual San Francisco conference.

Continue reading

Protecting your wireless security camera footage

BetaNews_Image1

About four years ago, before I had children, I was quite surprised when friends of mine had a baby monitor with a video display -- not because I didn't think something like that was possible, but the fact that it was normal and available in a nice wireless package was striking for someone inexperienced in the baby world.

Several years later, my wife now checks on our younger child every night with one. The sense of security and convenience that come with a device to instantly check on someone or something that you care about can be extremely valuable.

Continue reading

Oracle buys LogFire to boost supply chain management tools

Oracle

In order to boost the features of its supply chain management cloud offering, Oracle will be acquiring the Atlanta-based LogFire that provides cloud-based warehouse management applications.

Oracle believes that LogFire's applications will really help complement the logistics functionality of its own Oracle Supply Chain Management (SCM), through the addition of the ability to manage warehouses. The financial terms of the company's proposed acquisition have yet to be disclosed, but both LogFire's employees and management will be joining the Oracle SCM Cloud Team.

Continue reading

GoDaddy acquires ManageWP for its WordPress management tool

ManageWP GoDaddy Acquisition

Internet domain registrar, and web hosting company GoDaddy, has announced that it has acquired ManageWP. ManageWP is a WordPress dashboard, allowing webmasters to manage multiple WordPress sites from a single dashboard.

"GoDaddy is serious about investing in WordPress and ManageWP is by far the leading tool for managing WordPress sites", says Jeff King, SVP of Hosting at GoDaddy. "Together, we’ll bring ManageWP to the scale of GoDaddy, helping web designers and developers save thousands of work hours and touch millions of websites globally, no matter where they are hosted".

Continue reading

Few business leaders understand their digital strategy

business integration

Despite the pressure modern organizations face to embrace new technologies and adopt digital processes, only four percent of business leaders completely understand their company's digital business strategy.

That's one of the main findings from a new Forrester report looking at "business and technology leadership in a post-digital era", commissioned by Huawei and launched last week at Huawei Connect 2016 in Shanghai.

Continue reading

Android's September security update patches Quadrooter flaws

Samsung Galaxy S7

Google has released a new Android security fix that deals with the final two flaws in the Quadrooter set of vulnerabilities that was discovered last month.

Quadrooter refers to four undiscovered security vulnerabilities found in Android phones and tablets containing Qualcomm chips. These vulnerabilities are particularly troubling as they were found on every version of Android and affected at least 900 million devices.

Continue reading

SoftBank completes $31.4 billion ARM acquisition

SoftBank

In July, SoftBank revealed its plan to acquire the British chip designer ARM Holdings for $31.4 billion and now, less than two months later, the company has announced that the acquisition is officially complete.

The Japanese telecom company has been expanding its company lately through a series of acquisitions and investments, including purchasing Sprint for $20 billion and investing $15 billion into the Japanese division of Vodafone.

Continue reading

Emergency communications in the modern age

emergency

Organizations have an increasing number of employees who travel. According to a 2015 report by Strategy Analytics, the global mobile workforce is expected to grow to more than 1.75 billion by 2020, accounting for almost half of employees. For organizations of all sizes, mobile workers make communicating in an emergency increasingly difficult.

In the event of an emergency effective communication is crucial. The safety of employees is of importance to organizations. When a location-based crisis occurs (such as a fire, explosion, natural disaster or terrorist attack) organisations need to have the tools in place to communicate with employees quickly and reliably. For example, if there were riots taking place in the same area an employee was traveling, it is important for an organization to be able to notify that person and make them aware of the danger, as well as provide the necessary actions to guide them to safety.

Continue reading

Three will continue with ad-blocking plan in 2017

Three

UK carrier Three is committed to its plan to offer ad-blocking for customers using its network at some point in 2017, despite opposition from the EU.

In May, the carrrier first revealed its plan to block mobile ads for its customers for the entirety of one day in June. Three is of the belief that its users should not be forced to use their mobile data to display ads which are irrelevant to them and often invade their privacy.

Continue reading

Load More Articles