How technology can cut the rise of voice fraud


Coverage of fraud tends to focus on the online methods such as phishing, credential stuffing, opening fake accounts and so on.
But there's another side to the problem in the form of voice fraud via 'vishing' and the use of social engineering techniques, this is made simpler by the ease with which numbers can be spoofed so a call can appear to come from a legitimate number such as your bank.
SMEs make a rapid shift to hybrid working


According to new research 42 percent of SMEs have moved, or are planning to move, offices to facilitate hybrid working, with those downsizing reducing their office space requirements by an average of 38 percent.
The study from UK data center specialists ServerChoice shows that these office moves are causing SME business leaders to rethink their IT strategies and shift their server infrastructure away from on-premises to either co-location facilities or public/private cloud.
Why supply chain security blind spots put enterprises at risk [Q&A]


Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.
Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.
Summer is here and data still needs to be protected


The summer of 2021 is upon us and everyone is excited to get back out and enjoy national parks, oceanfront beaches, amusement parks, campgrounds and so much more. With a large number of employees still working from home and taking time off this summer, it is still critical to protect your organization's data as it travels for summer holiday.
Ransomware attacks are on the rise and continue to be a disruptive force affecting everything from financial institutions, healthcare to SLED (state and local government and education). Due to the rise in remote work prompted by the pandemic, attacks are up 148 percent.
3 ways to streamline your document processing with AI


While Artificial Intelligence (AI) has gained traction with enterprises in other industries, insurance providers have been slower to adopt. In 2016, research by Deloitte noted that less than 2 percent of insurance companies were currently investing in artificial intelligence technologies.
This same research noted that overall funding in AI development was projected to reach $47 billion by 2020. Today, as AI has become prevalent, more and more insurance companies are looking for advanced solutions that will help them effectively process their repositories of day-to-day paperwork and the unstructured data they contain. Intelligent Document Processing (IDP) platform solutions that leverage AI technology are uniquely positioned to help these companies realize significant gains.
Get 'The Adaptation Advantage: Let Go, Learn Fast, and Thrive in the Future of Work' ($17 value) FREE for a limited time


Technology is changing work as we know it. Cultural norms are undergoing tectonic shifts. A global pandemic proves that we are inextricably connected whether we choose to be or not. So much change, so quickly, is disorienting. It's undermining our sense of identity and challenging our ability to adapt. But where so many see these changes as threatening,
Heather McGowan and Chris Shipley see the opportunity to open the flood gates of human potential -- if we can change the way we think about work and leadership. They have dedicated the last 5 years to understanding how technical, business, and cultural shifts affecting the workplace have brought us to this crossroads, The result is a powerful and practical guide to the future of work for leaders and employees.
OnMail launches new feature to help with email fatigue


We all know the feeling, you're happily working away when an email pings into your inbox, you look at it, you might even answer it, but then you have to refocus back to what you were doing before.
It can be a problem in your personal life too, when quality time with the family is interrupted by business emails. Annoying, isn't it? Well email service OnMail clearly thinks so because it's introducing a new feature that allows you to take designated 'inbox breaks'.
Cado offers enterprises a free cloud security investigation


The rapid shift to cloud and remote working environments has raised security concerns for businesses and also meant hackers have increasingly turned their attention to cloud-native systems.
In response to this, digital forensics platform Cado Security is offering enterprises unlimited access to its Cado Response platform, including container and memory forensics, for 14-days, allowing them to carry out a free investigation.
Poor security practice leaves industry open to cyber threats


Despite a marked increase in concerns around malware attacks and third-party risk, only eight percent of organizations with web applications for file uploads have fully implemented the best practices for file upload security.
This is among the findings of the latest Web Application Security Report from critical infrastructure protection specialist OPSWAT.
UK unveils post-Brexit data plans to boost digital trade and end annoying cookie confirmation pop-ups


In the first signs of UK data policy starting to diverge from the EU, the government has today announced a package of measures to help it seize the opportunities of data to boost growth, trade and improve public services.
Plans include 'data adequacy' partnerships with 10 countries including the US, Australia and Republic of Korea, and the appointment of a new Information Commissioner to oversee the changes.
IObit Uninstaller 11 lands with permission management, Windows 11 support and more


Just about every computer in use around the world has a hard drive that contains at least some software that isn’t used or needed. You can, of course, remove apps you don't want by using the Apps & features section of Settings, but this is not guaranteed to get rid of every last trace of any given app.
And this is precisely why software unsinstallers like IObit Uninstaller 11 are so valuable. This tool monitors installations so it knows exactly which files have been added or changed, making it much easier to completely remove apps during uninstallation.
Microsoft releases KB5005932 update for Windows 10 to fix PSFX_E_MATCHING_BINARY_MISSING errors


Microsoft has released a compatibility fix to Windows Setup to address a problem in Windows 10 versions 2004, 20H2 and 21H1. The issue means that some people trying to install the latest cumulative updates (LCU) for Windows see a PSFX_E_MATCHING_BINARY_MISSING error.
The procedure for installing the update and then fixing the problem is a little out of the ordinary, but Microsoft has provided full details about how to complete the process so future LCUs can be successfully installed.
How to pre-order Microsoft's Limited Edition 20th Anniversary Halo Infinite Xbox Series X


If you are an Xbox fan, there's a good chance you already own one of Microsoft's newest game consoles. Whether it is Xbox Series S or X, both gaming systems play the same games, but the latter is more powerful than the former. With all of that said, the latest Xbox consoles can still be hard to buy due to low supply and high demand. The COVID-19 pandemic has definitely contributed to this.
For those of you that still don't have one of the latest consoles, today, Microsoft unveils an insanely cool new variant of the Xbox Series X. To celebrate the 20th Anniversary of the much-respected Halo franchise, the Windows 11-maker announces a new Limited Edition Halo Infinite Xbox Series X ($549.99) will launch on November 15. It comes with a digital copy of the upcoming Halo Infinite game. In addition, the company is selling a Halo Infinite Limited Edition Elite Series 2 controller ($199.99). While pre-orders have largely sold out already, you can still score a Halo Infinite Xbox Series X pre-order today.
Real-time analysis critical for detecting phishing threats


The latest analysis of phishing data from the Cyren Incident and Response team shows that 88 percent of evasive threats were detected using real-time techniques like machine learning.
Of the remainder six percent were found with proprietary threat intelligence or readily matched patterns from previous attacks, and the remaining six percent were suspicious messages that required human analysis to confirm the detection.
Protecting Kubernetes from ransomware [Q&A]


Many organizations have been quick to adopt containerization and particularly Kubernetes. But while there are advantages in scale and flexibility, it also raises issues around cloud-native data protection practices.
So how can businesses adopt the technology but still protect their information? We spoke to Gaurav Rishi, VP product, at Kubernetes backup specialist Kasten by Veeam to find out.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.