BetaNews Staff

The Big Brother in your pocket: How a US company secretly tracks and rates half of the world's mobile users

Big-Brother-Smartphone

Imagine a hidden system that tracks and scores you based on every phone call you make or take. It might sound like something straight out of a Black Mirror episode and remind you of China's controversial social credit system. But surprisingly, half of the world's mobile phone users are already part of a similar system, and many of them are Europeans, who are supposed to enjoy the strongest privacy protections.

NOYB, a privacy advocacy group, has filed a lawsuit against the US company TeleSign, a Belgian telecom provider BICS, and their mutual parent Proximus. They claim these companies are unauthorizedly profiling billions of phone users to assign them a 'reputation' or 'trust' score.

Continue reading

How Artificial Intelligence enhances mergers and acquisitions

The use of artificial intelligence (AI) is transforming how tech assets are evaluated for mergers and acquisitions (M&A) through more efficient, accurate, and predictive analyses.

M&A involves complex activities across multiple phases, requiring cohesive cooperation within a competitive timeframe. However, technologies like AI and data analytics have emerged as crucial drivers for successful M&A transactions. As Kevin Knoepp, operating partner and CTO at Trilogy Search Partners, notes, these tools significantly accelerate each step of the M&A process.

Continue reading

Hacking hybrid: Closing security gaps in a distributed workforce 

Hacker

When, where, and how we work has evolved. And in the past few years, the rise of flexible working patterns has helped improve employee wellbeing and created new opportunities to innovate. According to the Office of National Statistics, 44 percent of people in the UK work in a hybrid model -- making it almost as common as commuting to the office.

At the same time, these new freedoms have ushered in new priorities for security teams. Securing the enterprise is now more complex because the perimeter has become blurred. To address this, focus must be put on securing endpoints, such as PCs and printers -- the "ground zero" for most attacks. New cybersecurity strategies are needed to prevent, detect, and contain cyber-threats, but also enhance remote PC management to mitigate the risks associated with lost or stolen devices.

Continue reading

Blockchain and proptech are transforming real estate security

Blockchain-house

Infrastructure is becoming more vulnerable to cyber threats. Therefore, everyone from tech enthusiasts to real estate professionals must pay attention to how blockchain and proptech advancements change the game to keep stakeholders, business owners and tenants safe and sound.

Blockchain is a part of the proptech umbrella, but it encompasses so much -- and blockchain enhances it all.

Continue reading

The future of web hosting: Predictions and trends for 2023 and beyond

Web hosting design.

In the Internet of Things (IoT) era, putting your business at the forefront of your consumers is the most fool-proof way of improving your business branding. One of the core business digitalization trends that have catapulted many companies, especially during the pandemic, is the use of websites.

With the internet's help, consumers can access these websites and make research, transactions, and purchases seamlessly, without going from application to application. But how are these websites set up, and what features does web hosting have that make it more attractive for businesses as years go by?

Continue reading

Enterprise search: Myth vs reality

data search

When you think of a search engine, you probably associate to Google or Bing. Those are great for navigating the public web. But they are not going to let you locate an email exchange from nine years ago or find a footnote reference in millions of office files. For that, you need a different product category, enterprise search.

With enterprise search, one or more concurrent search threads can instantly search terabytes of organizational data, including over 25 different full-text and metadata search options and the display of retrieved items with highlighted hits. Sounds cut-and-dried, does it not? But scratch a bit deeper, and you’ll find some myths about enterprise search that are quite at odds with its reality. While some myths are relatively inconsequential, others can have effects that you need to be aware of in terms of the reach of enterprise search.

Continue reading

Next gen SIEM: Unleashing the power of AI in cybersecurity

AI has been in the news over the past several months, but not everyone is welcoming it excitedly. Many renowned tech personalities have expressed their concerns over the risks associated with it and there are valid fears about artificial intelligence doing more harm than good. For example, there have been reports of AI helping cybercriminals produce less detectable malware.

It is reassuring to know that cybersecurity is among the early adopters in harnessing the benefits of artificial intelligence. Cybersecurity firms have been developing ways to integrate AI into their detection, mitigation, and prevention capabilities. Next gen security information and event management (SIEM), in particular, is gaining traction as organizations try to keep up with the growing aggressiveness and complexity of cyber threats.

Continue reading

Combating e-commerce fraud: Harnessing the power of AI, ML, and RPA to safeguard profits

Fraud stop

The rise of the e-commerce industry has brought immense convenience and opportunities for businesses and consumers alike. However, this growth has been met with an increase in fraudulent activity, causing significant financial losses for companies. Merchant losses related to online payment fraud are expected to exceed $343 billion by 2027. To combat this persistent threat, the e-commerce industry can harness the power of artificial intelligence (AI), machine learning (ML), and robotic process automation (RPA) to help mitigate these losses, prepare for new fraud attempts and ensure that the customer experience remains intact. 

Utilizing AI-enabled, automated financial operations (FinOps) solutions allows for continuous real-time transaction monitoring. These technologies can effectively bolster security measures by enabling vendors to monitor transactions in real-time, compare them to historical data and safeguard against fraudulent activities by identifying suspicious activity that deviates from normal behavior. Moreover, the adaptive nature of AI empowers it to continually learn and adapt to emerging dishonest tactics, making it an indispensable asset in the relentless battle against illicit activities.

Continue reading

Unveiling retail's success roadmap for the tech industry

Amidst the ever-evolving post-COVID-19 era, the tech industry has been met with unprecedented challenges such as budget constraints, mass layoffs, and the urgent need for adaptability. In the face of these uncertainties, tech companies can draw valuable insights from numerous retailers who demonstrated remarkable resilience during the pandemic. How did these retailers triumph amidst one of the most challenging periods in recent history? In this article, we explore key takeaways that hold immense potential to benefit the tech industry in the current economic landscape.

Retailers have demonstrated unwavering dedication to improving customer service, cultivating loyalty, and fostering trust, resulting in strong and enduring customer relationships. Tech companies can adopt a similar approach to enhance their customer service efforts, aiming for frictionless user experiences and delivering personalized recommendations. Embracing innovative channels like chatbots, virtual assistants, and social media platforms enables real-time support and fosters immediate engagement, nurturing long-lasting connections with customers.

Continue reading

The straightforward guide to digital transformation

Digital transformation

Businesses must embrace a digital future for multiple reasons: to avoid falling behind competitors, to strengthen security and cut down on security breaches, and to remove the reliance on legacy software.

We know it is important, but where do you start with approaching digital transformation? In this handy guide, we explain and break down digital transformation, as well as offer tips to success with going digital and unlocking future success.

Continue reading

The five most common network automation objectives

Automation-endpoints

For a modern organization to meet its business goals it's essential to have a reliable, high-performing network. But as networks get more complex and heterogeneous (frequently consisting of both on-premise and cloud environments), they are becoming more difficult to manage and operate, requiring skills and resources which are inherently limited in availability.

Regular and necessary workflows performed by network engineers can quickly become overwhelming and even prohibitive due to the time it would take to execute at scale. And when these workflows continue to be manually executed, extended problem resolution timelines result since the volume of service tickets continues to climb. And these problems that need to be addressed can range from the mundane to the mission critical -- in some extreme cases shutting down key business services entirely during resolution.

Continue reading

ChatGPT's role in the fake news phenomenon

Following its explosion onto the scene in November 2022, it has been hard to ignore ChatGPT. With the ability to answer questions, solve problems, and create content -- to name just a few of its competencies -- the artificial intelligence (AI) chatbot can be hugely beneficial to businesses and employees. Whether used to avoid trawling the internet for the answer to a question, write a blog post, or simply inspire an idea for a new product, it can certainly help cut costs and save time and resources.

Yet, the use of ChatGPT has caused a lot of debate and controversy. One of the main areas of concern is around employment -- if AI can do the same, if not a better, job than humans, for a fraction of the cost, are business leaders likely to replace humans with this technology? Goldman Sachs has predicted that as many as 300 million full-time jobs could be diminished or lost to AI and automation technology. However, it is not as straightforward as some of the most pessimistic outlooks make it seem.

Continue reading

The new challenger bank ethos: Why sustainability is fueling the next wave of disruption

If you were to take their marketing at face value, you’d assume that big banks were leading the finance sector’s charge regarding sustainability. And while they undoubtedly play an essential role, especially when financing major renewable energy projects and the like, the biggest disruption comes from challenger banks.

Increasingly, popular challenger banks such as Monzo and Starling, for example, are marketing themselves as more sustainable, capitalizing on a growing desire for banks to prioritize the environment. In fact, a recent report found that 67 percent of customers want their bank to be more sustainable.

Continue reading

The SaaS-data protection disconnect: Are you sleepwalking into a catastrophe?

Sleepwalker

In recent years, demand for Software-as-a-Service (SaaS) solutions such as Salesforce, Google Workspace and Microsoft Office 365 has exploded. Indeed, by 2025 it’s been projected that SaaS will account for 85 percent of the software that organizations use.

While these cloud-powered software services are now mission-critical for most organizations, many are sleepwalking their way into a potential data loss disaster. Why? Because they’re relying on their SaaS providers to do all the heavy lifting where data protection is concerned.

Continue reading

Three must-know cybersecurity building blocks

Cybersecurity-blocks

The increasing sophistication of cybercriminals significantly influences the rise in cybercrime, the frequent lack of sufficient cybersecurity measures, and the high profitability of cybercrime. Cybercriminals constantly refine their skills, developing advanced malware and phishing techniques to bypass security protocols. This progress often outpaces many businesses' and individuals' ability to safeguard their digital assets -- as a lack of resources, underestimation of risk, or insufficient awareness often results in inadequate cybersecurity measures. Further fueling this upward trend is the lucrative nature of cybercrime, with offenders able to amass significant profits from stolen money or data, often with a low risk of apprehension due to the anonymity of the internet and digital currencies. 

A recent BlackBerry Global Threat Intelligence Report observed up to 12 attacks per minute from December 2022 to February 2023, and the number of unique attacks using new malware samples skyrocketed by 50 percent -- from one per minute in the previous report to 1.5 per minute during this reporting period. The most common weapons were droppers, downloaders, remote access tools (RATs), and ransomware, with the most significant target being the healthcare industry.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.