EE plans to cover the whole of the UK with 4G

4G

Mobile operator EE said it will cover the entire UK (well, 95 percent of it, at least) with 4G connectivity by 2020. It also said it will shut down its customer call centers in India and create 600 new jobs in the UK and Ireland.

The announcement comes after EE landed a contract with the Government, under which it will replace the Airwave radio network and eliminate blinds spots, or 'not-spots' in connectivity, The Telegraph reported recently.

Continue reading

How firms can fight back against ransomware attacks

Ransomware eye

There is no denying that ransomware attacks are a very real threat for businesses. Given the ever-growing value of data and the importance of business continuity, organizations that have fallen victim to such attacks either face a period of downtime or they pay out in order to retrieve their data to resume business as normal.

Headline-grabbing examples, such those affecting the Hollywood Presbyterian Medical Center, or Lincolnshire County Council, are no doubt only the tip of the iceberg. How many others are giving in to ransomware demands without revealing they ever had a problem in the first place?

Continue reading

Commercial notebook shipments return to growth

Man Laptop Dark

Commercial notebook shipments have returned to growth in the first quarter of 2016, new figures by market analysts IDC say. New form factors, guided by the ever increasing desire for mobility, aided by the new Windows 10 operating system and the Skylake processors were key drivers for this growth.

HP was the biggest winner of the new change, with Dell also outperforming the market average, IDC’s report says. Asus, Apple and Fujitsu posted some strong results, as well.

Continue reading

Chip-enabled cards lead to a decrease in fraudulent transactions in US

Bank card security

Credit and debit cards with embedded microchips have finally begun to become widely available in the US and, according to Visa, they have already prevented a great deal of fraud with some large merchants seeing an 18 percent decrease in counterfeit transactions.

The company noted that 25 merchants had suffered heavily from fraud in 2014. Five of them decided to begin processing credit and debit cards equipped with EMV (Europay, MasterCard and Visa) technology and this led to an 18.3 percent decrease in fraud. Another five of those merchants did not have the necessary equipment to utilize chip-enabled cards and as a result they saw a 11.4 percent increase in fraudulent transactions.

Continue reading

Nearly half of EU businesses don't know where their data's located

servers cloud

According to a survey by the cloud hosting firm UKFast, nearly half of businesses are clueless as to where their data is located.

To come to its findings, the company surveyed over 300 IT decision makers in EU businesses, with 47 percent of them unaware of where their personal and company data was hosted.

Continue reading

More apps and websites leak credit card data on enterprise handsets

leaky_pipe

In its latest quarterly Mobile Data Report, Wandera has revealed a significant rise in apps leaking credit card data on enterprise mobile devices.

The company, which specializes in mobile data security and management, compiled the report by analyzing the data usage trends and traffic patterns across its global network of enterprise mobile devices. Between Q4 2015 and Q1 2016, there has been a 17 percent increase in apps and mobile websites leaking credit card data.

Continue reading

Merchants are not security savvy

security padlock

More than a third (38.5 percent) of merchants don’t even know what type of risks new technologies such as mCommerce bring. They most likely wouldn’t recognize a fraud threat even if they were right in the middle of it.

Those are the conclusions written in the new 2016 Mobile Payments & Fraud Survey, released by Kount. The figures are quite a surprise, knowing that mobile fraud increased by 81 percent between 2011 and 2015.

Continue reading

Google no longer lists its own site as 'partially dangerous'

google_search

According to Google’s online transparency report, Google.com had been considered a "partially dangerous" website.

In the report under the Safe Browsing section, the company listed its own website as one that could be dangerous to its visitors followed by a list of site safety details along with testing details.

Continue reading

More UK adults taking online courses

laptop woman

Adults in the UK are turning to online learning platforms in order to stay competitive in their fields and to learn new skills, despite their increasingly busy schedules.

Coursera, which offers online courses from some of the top universities worldwide, has noticed that the number of new users registering for its educational platform has increased by 50 percent over the course of the past 12 months.

Continue reading

Free Wi-Fi hotspots are a major security threat for businesses

Public wi-fi

Free Wi-Fi hotspots are the biggest security threat for mobile workers, according to new reports.

The recently released iPass Mobile Security Report says that 62 per cent of organizations are banning their mobile workers from using free Wi-Fi hotspots, with another 20 percent planning on doing the same in the future.

Continue reading

AI platform better predicts cyber attacks thanks to human experts

AI

Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have collaborated alongside the machine learning startup PatternEx to demonstrate how an artificial intelligence platform that makes use of continuous input from human experts would be able to predict cyber attacks better than the systems that exist today.

CSAIL and PatternEx are calling their new AI platform AI² due to how it combines the intuition of analysts with artificial intelligence.

Continue reading

Migrating Oracle apps to the cloud

Cloud access

With companies of all sizes across the globe waking up to the benefits of moving some or all Oracle applications to the cloud, the cloud is rapidly becoming a star in many IT strategies of organizations. The benefits include the reduced need for up-front capital investment in order to accelerate return on investment, as well as gaining greater business insight and an excellent user experience.

The reality of today’s cloud technology is now matching -- or even exceeding -- the hype of a few years ago. However, some organizations are still cautious about moving business-critical applications to the cloud, based on perceived risks that are often overstated and based on outdated concerns.

Continue reading

Microsoft Azure's Container Service now generally available

Shipping containers

Microsoft Azure's Container Service in now available to help companies deploy and manage containers using their choice of software.

Users of the service will be able to move their container workloads to the cloud easily and can still run their operations using open-source tools. The two most popular tools -- Mesosphere’s Data Centre Operating System (DC/OS) and Docker’s Swarm and Compose -- will be both be supported by Azure Container Service and users will be able to continue running their operations using the one they prefer.

Continue reading

Only 23 percent of businesses can effectively respond to cyber attacks

Cyber attack

NTT Com Security today released its annual Global Threat Intelligence Report (GTIR), which examines the threat landscape by analyzing the attacks, threats and trends from the previous year.

This year’s report is the most comprehensive to date, featuring key findings from partners including Lockheed Martin and the Center for Internet Security and pulling information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks and nearly 8,000 security clients across six continents.

Continue reading

ISPs offer inadequate DDoS protection

DDoS attack start

A new report from Corero Network Security, which provides security solutions against distributed denial of service (DDoS) attacks, shows that 85 percent of enterprise end users want their Internet Service Providers (ISPs) to offer better protection against DDoS attacks.

To compile its research, the security company polled more than 100 ISPs and 75 enterprise customers in regards to their DDoS mitigation strategies. Corero found that a high number of ISPs still rely on outdated technologies to protect their customers from these attacks.

Continue reading

Load More Articles