60 percent of UK consumers not happy with their data being used for analytics

personal data

Customers are more worried than ever about the way their data is used and shared by companies, particularly for analytics, according to a new report.

The Customer State of Mind survey from data protection specialist Trūata shows 60 percent of UK customers are uneasy with companies using their personal data for analytics. Recent high-profile data leaks have also added to this negative perception of the way personal data is managed by brands.

Continue reading

Norman the Cryptominer uses sophisticated techniques to avoid discovery

cryptocurrency mining

Researchers at Varonis have released information on a new cryptominer variant, which the team has dubbed 'Norman', that uses various techniques to hide and avoid discovery.

Norman was discovered during investigations of an ongoing cryptomining infection that had spread to nearly every device at a midsize company.

Continue reading

Education is top target for cyberattacks

teacher and students

The education sector has become one of the most sought after targets for cybercriminals, according to the latest report from Malwarebytes Labs.

In the first half of 2019, the top three largest categories of threats identified among education institutions' devices are adware (43 percent), Trojans (25 percent) and backdoors (three percent). However, ransomware dropped to less than one percent in this period -- though it was higher both before and after the study.

Continue reading

Facebook has been paying people to listen to your Messenger conversations

Facebook Messenger

It probably comes as absolutely no surprise to anyone, but Facebook is just the same as Google, Amazon and Apple when it comes to listening in on your conversations -- the ones you thought (or at least hoped) were private.

Following a report from Bloomberg News, Facebook has confirmed that paid contractors have been listening to audio of conversations. The company says, however, that it has put the brakes on the practice -- for now, at least.

Continue reading

Personal data breaches and securing IoT devices

IoT devices

The Internet of Things (IoT) is taking the world by storm as interconnected devices fill workplaces and homes across the US. While the intention of these devices is always to make our lives easier, their ability to connect to the internet turns them into ticking time bombs, lying in wait until their weaknesses can be exploited by opportunistic hackers.

Personal data breaches are skyrocketing in America, increasing by 60% in the last year and by 157 percent since 2015. As our interconnectivity grows, so do the opportunities that our technology will be hacked. Since every IoT device is connected to the internet, each one is vulnerable to external access if not secured properly. In the rush to manufacture these devices and get them onto the market, security has been an afterthought which needs to be urgently addressed if the number of yearly data breaches is to be tackled.

Continue reading

Americans would rather get food poisoning on vacation than not have internet access

I'm a big fan of raw clams and oysters on the half shell. For the most part, I have had a good experience eating them. True, eating raw mollusks is sort of like playing a game of Russian Roulette, but I have historically been very lucky. One time, however, I got violently sick -- the day before I was to take a plane from New York to Florida. Believe it or not, I still took the trip, but having intestinal distress when flying is absolutely horrid. Flight aside, I spent a good portion of my time in Florida in the fetal position, sweating and swearing off raw clams (I have since eaten them again).

Since I know how horrific food poisoning can be, I am quite perplexed by a new study commissioned by Roku. Apparently, Americans would rather get food poisoning while on vacation than not have internet access. Think about that for a second -- people would rather get violently ill while vacationing than not have access to Instagram and email. Really, America?

Continue reading

Parallels Desktop 15 ramps up graphics performance with Apple Metal support, unveils new integration features

Parallels IP Holdings GmbH has released Parallels Desktop 15.0, the latest major update of its popular Mac virtualization tool.

Parallels Desktop 15 adds support for the forthcoming MacOS Catalina (10.15) release, plus taps into the Apple Metal framework in macOS 10.14 or later to deliver major graphics improvements alongside other performance tweaks and a smattering of new integration features.

Continue reading

Free VPN apps pose a privacy risk on both Android and iOS

VPN tiles

Both Apple and Google are allowing numerous potentially unsafe free VPN apps to remain in their app stores, despite being aware of privacy risks according to research from Top10VPN.com.

Among the string of serious privacy issues uncovered but not acted upon is the discovery that nearly 60 percent of the most popular free VPN apps are secretly Chinese-owned.

Continue reading

British Airways e-ticketing leaves passengers' sensitive data at risk

BA plane

Less than a year on from a breach which exposed the details of hundreds of thousands of customers, British Airways systems are still leaving passengers' personal information at risk.

New research from mobile security provider Wandera has discovered an e-ticketing system vulnerability that leaves passengers' personally identifiable information (PII) exposed.

Continue reading

Microsoft cancels major Super Duper Graphics Pack update for Minecraft

Minecraft

It is now two years since Microsoft announced the Super Duper Graphics Pack for Minecraft, a major upgrade and new look for the game, but now the update has been canceled.

The company says that the "ambitious initiative" has "proved too technically demanding to implement as planned".  Performance is cited as a reason for ditching the update, but Microsoft promises that it will work on developing a new look for Minecraft in other ways.

Continue reading

Verizon sells Tumblr to WordPress owner, Automattic

Tumblr

A mere two years after acquiring it, Verizon is selling Tumblr. Full details of the deal have not yet been revealed, but the micro-blogging service is being bought by Automattic, the company behind WordPress.

Tumblr came into the spotlight last year when it introduced a ban on all adult content, and anyone hoping for this to change is going to be disappointed. Automattic says the ban will remain in place.

Continue reading

Eben Upton dismisses the Raspberry Pi 4's USB-C flaw, blames people for owning expensive chargers

Two months ago, the Raspberry Pi Foundation brought out a brand new version of its hugely popular uncased credit-card sized computer. The Raspberry Pi 4 is described as being a "complete desktop system" for just $35.

While it’s a great little computer, it does have one big flaw -- due to a design issue, many chargers aren’t compatible with the new board’s USB-C port, so they won’t work.

Continue reading

Moving beyond the spreadsheet for vendor risk management

Spreadsheet

In today’s business landscape, many enterprise companies look to third-party vendors to provide them with organizational value and competitive advantage. While outsourcing has always existed in some form, globalization and the internet have caused the use of third-party vendors to increase exponentially. Previously, companies relied on third parties for non-core functions. Today, more and more critical functions are outsourced to find cost savings and efficiencies.

Because third-party vendors are an extension of an organization, businesses are held accountable for things like safety, ethics, business practices, and more. With more at risk than ever before, organizations must ensure third-party partners behave appropriately.

Continue reading

Getting IT & OT to speak the common language of IIoT vulnerability management

Industrial internet of things

Manufacturing executives probably don’t think of renowned Irish playwright George Bernard Shaw when planning Industry 4.0 and Industrial Internet of Things (IIoT) deployments. Maybe they should.

Shaw’s famous quip about England and America being "two countries divided by a common language," captures the differences between corporate IT and production OT, or Operational Technology, departments. While both IT and OT teams are acutely aware of the cybersecurity challenges for successful IIoT implementations, how each department addresses those threats is based on different priorities and requirements.

Continue reading

Will cloud data programs become the future of DataOps?

Cloud access

Within enterprises, legacy platforms are becoming marginalized as modern data-driven platforms become the preferred choice for data teams. Artificial intelligence and machine learning are powerful solutions for big data that are encouraging enterprises to accelerate their digital transformation towards the cloud. It should be no surprise then that, according to Cisco, four percent of workloads will be hosted in cloud data centers by 2021. Despite this, there is some reluctance amongst organizations to build on their data programs with these solutions. Regardless, ignoring the cloud is a critical oversight for enterprises looking to meaningfully analyze the vast quantities of structured, semi-structured or unstructured data within their networks. More concerning, however, is the critical insights that will be overlooked or missed entirely by enterprises relying on legacy software.

The cloud is starting to clearly denote itself as the de facto choice for investment in big data. Canalys estimates that cloud investment will surpass $143 billion by 2020. While Fortune 500 companies have historically been reluctant to dip their toe in the digital transformation pool, there has been a radical shift in attitude in recent years. More than a corporate buzzword, the term 'digital transformation' now carries with it the promise of large ROIs and even larger data pipelines. This has lead to a culture where having large-scale, full production workloads is a tangible reality and not merely a distant goal.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.