The $13 billion problem: Tackling the growing sophistication of account takeovers
Fraudsters have used account takeovers (ATOs) to victimize 29 percent of internet users, resulting in $13 billion in losses in 2023. Over three-quarters of security leaders listed ATOs as one of the most concerning cyber threats, and the danger grows as bad actors leverage AI to launch more potent attacks.
The Snowflake breach demonstrates the devastating consequences of ATOs. Attackers gained access to 165 of the data platform’s customers’ systems, including AT&T and Ticketmaster, and exfiltrated hundreds of millions of records containing sensitive data. The attack wasn’t some brilliant hacking scheme -- the bad actors simply used legitimate credentials to log into the platform.
OWC launches Envoy Ultra Thunderbolt 5 SSD with blazing 6000MB/s speeds
OWC has announced the release of its Envoy Ultra Thunderbolt 5 SSD, which is now available for pre-order and will start shipping in October. This cutting-edge SSD is designed to work seamlessly with Mac and PC devices equipped with Thunderbolt 5, Thunderbolt 4, Thunderbolt 3, and USB4.
The Envoy Ultra Thunderbolt 5 SSD is engineered for both professionals and enthusiasts. It offers speeds surpassing 6000MB/s, doubling the performance of Thunderbolt 4 and USB4. The device optimizes performance across Thunderbolt 5, Thunderbolt 4, Thunderbolt 3, and USB4 machines, making it capable of handling both daily tasks and pro-level creative projects.
Say goodbye to TeamViewer: Get AnyViewer Professional for free -- save $42.96
TeamViewer and AnyViewer are both popular remote desktop software solutions, but they cater to slightly different needs and user bases. TeamViewer is a well-established player in the remote desktop space, offering a wide range of features such as cross-platform compatibility, remote printing, file sharing, and even support for IoT devices. It’s widely used by businesses for IT support and remote collaboration, as well as by individual users who need to access their devices from anywhere.
TeamViewer provides strong security with end-to-end encryption and supports remote sessions with minimal latency. Although there’s a version that’s free for private use, the software's pricing can be a drawback for business users, as it operates on a subscription model which can prove to be rather expensive over time.
Druva launches natural language tool to help cybersecurity investigations
When investigating an incident to contain and remediate a threat, security teams need to understand complex attack patterns, such as malware gestation, score, and sprawl -- the answers to which all lie in the data and systems.
To help with this process Druva is releasing Dru Investigate, a GenAI-powered tool that guides data security investigations using a natural language interface.
Linux desktop environment Cinnamon 6.4 aims to fix its outdated look with a fresh default theme
Linux Mint has long been praised for its user-friendly design, with the Cinnamon desktop being a core feature. However, Cinnamon's look outside the Mint distro often leaves users unimpressed. In many distributions, Cinnamon’s default visual style feels outdated and unrefined, giving the impression that its aesthetics have been neglected.
Part of the reason for this is Mint’s focus on the Mint-Y theme, which brings a more polished and modern appearance to the desktop. The default Cinnamon theme, however, is largely left untouched, serving as a fallback option for troubleshooting. With little attention from theme developers, this results in a less-than-appealing experience for users of other distributions that don’t implement Mint-Y.
Attacks related to non-human identities increase
New data shows that one in five organizations has experienced a security incident related to non-human identities; and only 15 percent remain confident in their ability to secure them.
A report from the Cloud Security Alliance (CSA), and Astrix Security reveals that there is a growing recognition of the importance of investing in NHI security with a quarter of organizations already investing in these capabilities and an additional 60 percent planning to within the next twelve months.
Save $34.99! Get 'Python and SQL Bible' for FREE
Embark on a transformative journey with this course designed to equip you with robust Python and SQL skills. Starting with an introduction to Python, you'll delve into fundamental building blocks, control flow, functions, and object-oriented programming.
As you progress, you'll master data structures, file I/O, exception handling, and the Python Standard Library, ensuring a solid foundation in Python. The course then transitions to SQL, beginning with an introduction and covering basics, and proceeding to advanced querying techniques.
Why third-party email filters may be ineffective in Microsoft 365 environments
Because email is the primary source of initial entry in many breaches, many organizations pay for sophisticated, third-party email filtering solutions on top of the protections afforded by Microsoft 365. This is a wise investment; having layers of protection by different vendors helps eliminate blind spots found in any one vendor solution and provides complexity that can foil attack attempts.
Yet, few know that threat actors can easily bypass these third-party filtering products by directing emails to onmicrosoft.com domains that are an inherent part of the Microsoft 365 configuration.
Ransomware poses a threat to education
As we begin a new school year, a survey of 250 IT leaders from educational institutions in the US and UK highlights the potential damage from cyberattacks on schools.
The study from Action1 shows 20 percent of respondents believe that the current level of support from their school board is insufficient, with a high risk of significant impact on education quality due to ransomware.
Cybersecurity qualification adds new quantum and AI modules
The Chartered Institute of Information Security (CIISec) is announcing the addition of artificial intelligence (AI) and quantum computing modules to its CyberEPQ qualification for all students from September 2024 onwards.
Available to any student over the age of 14 in the UK, the CyberEPQ (Extended Project Qualification) is aimed at bringing new and diverse talent into the industry, representing an ideal stepping stone into a cybersecurity career.
UK government announces new plans to protect data centers
Data centers powering the UK economy will be designated as Critical National Infrastructure alongside energy and water systems under new government plans.
This is the first Critical National Infrastructure (CNI) designation in almost a decade, since the space and defense sectors gained the same status in 2015.
Meta is training its AI using an entire nation’s data… with no opt-out
The question of how to train and improve AI tools is one that triggers fierce debate, and this is something that has come into sharp focus as It becomes clear just how Meta is teaching its own artificial intelligence.
The social media giant is -- perhaps unsurprisingly to many -- using data scrapped from Facebook and Instagram posts, but only in Australia. Why Australia? Unlike Europe where General Data Protection Regulation (GDPR) necessitated Meta to give users a way to opt out of having their data used in this way, Australia has not been afforded this same opportunity. What does this mean?
Samsung begins mass production of QLC 9th-generation V-NAND
Samsung has announced the mass production of its groundbreaking one-terabit (Tb) quad-level cell (QLC) 9th-generation vertical NAND (V-NAND). This follows the successful rollout of the triple-level cell (TLC) version earlier this year.
Samsung’s QLC 9th-generation V-NAND brings several innovations, including the industry’s highest layer count achieved through its Channel Hole Etching technology and a double stack structure. This new NAND offers an 86 percent higher bit density compared to the previous generation, further optimizing performance for AI-driven enterprise SSD applications.
Apple Intelligence will launch in beta and that’s unacceptable for a trillion-dollar company
Apple, a company worth over 3 trillion dollars, has announced Apple Intelligence, a personal AI system, will begin rolling out in October alongside iOS 18.1, iPadOS 18.1, and macOS Sequoia 15.1. Despite being one of the wealthiest companies on the planet, Apple is choosing to release this highly anticipated feature as a beta, and that’s a huge problem. Users will essentially be treated like testers, expected to troubleshoot and report bugs, instead of receiving a polished, fully functional system out of the gate.
What’s even more frustrating is that Apple Intelligence won’t be ready in time for the iPhone 16 lineup launch this month. It’s criminal for Apple to ask for so much money for these phones -- marketed as AI-powered -- when the core intelligence feature won’t even be available at launch. Customers are paying top dollar for devices that won’t include one of the main selling points on day one.
Scosche launches new accessories for Apple's latest devices
Scosche has unveiled a new collection of accessories tailored for Apple's latest devices, including the iPhone 16, Apple Watch Series 10, and AirPods 4, following Apple's recent event. These accessories, designed for practicality and style, enhance the functionality of Apple’s latest tech.
One of the key products is the BaseLynx 2.0 Modular Charging System (seen above), which offers users a customizable and versatile charging solution. The system, featuring fast charging modules for everything from AirPods to MacBook Air, is ideal for home, office, or even on-the-go in RVs and boats. The BaseLynx 2.0 kits and modules are available starting at $69.99 on Apple.com and select stores.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.