Get 'Linux All-In-One For Dummies, 6th Edition' ($30 value) FREE for a limited time

Linux All-in-One For Dummies covers topics such as getting up and running with Linux basics, desktops, networking, internet services, administration, security, scripting, Linux certification, and more.

Inside, over 500 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating systems in use today.

Continue reading

Hyper personalization is the key to a seamless customer experience

Artificial intelligence

More than two thirds of companies now compete on the basis of customer experience. Customer service is the competitive differentiator, and it is essential now more than ever to maintain brand loyalty and meet business goals. Companies can face losing customers if they don’t keep up with the ever-increasing standard of service expected of them.

Delivering superior service is particularly challenging during spikes in the volume of customer contact. Human agents on their own cannot manage these peaks, let alone deliver a consistent and personalized customer experience. Long call queues and fragmented customer engagement lead to disappointed customers, reputational damage and ultimately financial losses.

Continue reading

Trojans account for more than 70 percent of opportunistic email attacks

Trojan horse

Analysis by Mimecast of 67 billion attack emails between April and June this year reveals that opportunistic attacks are dominated by Trojans, which make up 71 percent.

Targeted attacks are lower in volume but are specifically designed to get past commodity malware scanners by using newly detected or updated malware not detectable with file signatures.

Continue reading

Half of risky online transactions come from mobile devices

Mobile data spy

New research from fraud prevention and multi-factor authentication specialist iovation reveals that 49 percent of all risky transactions now come from mobile devices, up from 30 percent in 2018, 33 percent in 2017 and 25 percent in 2016.

Looked at geographically, North America with 59 percent of all risky transactions coming from mobile devices, leads the way. In 2018, it was Asia at 53 percent. In 2017, it was North America with 55 percent, and in 2016, it was North America again with 36 percent.

Continue reading

The top 11 security threats to cloud computing

cloud lock

Data breaches and misconfigurations come out top of the Cloud Security Alliance's latest Top Threats report which reveals an 'Egregious Eleven' list of cloud security threats.

This year's list no longer includes issues that fall to cloud service providers (CSPs), such as denial of service, shared technology vulnerabilities, CSP data loss and system vulnerabilities. This suggests these are either being well addressed or are no longer perceived as a significant business risk of cloud adoption.

Continue reading

SMEs forced to meet cybersecurity demands in order to win contracts

Contract signing

Supply chain threats are a major problem for enterprises and they are forcing smaller businesses to take security more seriously in order to win contracts.

A study by cyber security awareness platform CybSafe shows nearly 37 percent of organizations have been required to achieve a recognized cyber security standard by their enterprise customers before successfully securing contracts. This represents a nine percent increase over 2017.

Continue reading

Handling user feedback data and the rise of 'ResearchOps' [Q&A]

tablet feedback

Customer experience has become a massive, sprawling industry that includes the many systems and touchpoints that lie between companies and their users. It's projected to be a $32B market by 2025.

One of the most interesting new sub-categories emerging within customer experience is ResearchOps. It's a new discipline -- with a growing community of practitioners -- focused on better infrastructure around customer research, and operationalizing the user research process so it can be done faster and have a bigger impact.

Continue reading

Kingston unveils A2000 NVMe PCIe SSD

Today, Kingston announces a new NVMe solid state drive, called "A2000," and unfortunately, it isn’t too exciting. Don’t get me wrong, it is plenty fast, but hardly the fastest.

Here’s the thing, folks, PCIe 4.0 drives will soon be flooding the market, and this new model from Kingston still uses the older PCIe 3.0. With that said, most computers do not support PCIe 4.0, so consumers largely can’t take full advantage of an SSD using that new standard anyway.

Continue reading

Reason Antivirus: When privacy is your priority [Review]

When was the last time you shopped around for a new antivirus? If you're a Windows user and using its latest iteration, you might be quite satisfied with how Windows Defender works. Besides, it comes as default with the operating system and runs unobtrusively in the background, no added setup required.

However, cyberattacks are only growing more rampant and hackers are finding new ways to victimize computer users. And for ordinary users, it's our privacy that's under threat. Hackers look to gain access to our devices to steal data. It's not just our personal and financial information they're after. Hackers are also trying to hack into webcams and microphones hoping to capture anything sensitive and incriminating in order to extort victims.

Continue reading

6 design principles for machine learning anomaly detection systems

machine learning AI

Every year, 22 percent of eCommerce customers abandon their shopping carts due to website errors. Every year, insurance companies discharge up to 10 percent of their claims cost on fraudulent claims. Network outages cost up to $5,600 per minute. These and other failures represent anomalies that are detectable by machine learning in ways that human-powered monitoring can’t replicate.

When it comes to deploying a machine learning anomaly detection system, companies have the choice of either purchasing a ready-made system or developing their own. No matter what they choose, however, the resulting system should be based on criteria that account for their company’s size, needs, use cases and available resources. Here are the six principles that companies should pay attention to:

Continue reading

The evolution of Emotet: How to protect your network

Trojan horse

With over 350,000 new malware samples emerging every day, it’s difficult for any one strain of malware to make a name for itself. Any single malware sample whose name you know -- be it Mirai, WannaCry, or NotPetya -- speaks to a trail of devastation.

In 2019, people are also hearing another name: Emotet.

Continue reading

Second quarter sees an 18 percent rise in DDoS attacks

DDoS attack

In the second quarter of 2019, the total number of DDoS attacks grew by 18 percent, compared to the same period in 2018 according to a new report from Kaspersky.

There is, however, a drop compared to the first quarter of this year, with attacks down 44 percent. Kaspersky attributes this to seasonal variation with DDoS attack usually declining in late spring and summer.

Continue reading

A disturbing lack of outrage about the E3 Expo leak

data leak tap

Why don’t I feel bad? I know I should. I know I ought to be alarmed by the news that the organizers of the E3 Expo accidentally leaked the personal or professional contact details for some two thousand registered journalists and members of the media.

But I’m not. In fact, I’m ambivalent about the whole thing. As an early victim of some malicious "doxxing" -- by a fellow tech journalist, no less -- I’ve become a bit jaded about the matter (having satellite images of your house posted online so freaks can target your children will do that to you).

Continue reading

These are the Apple Card restrictions you need to know about

Apple Card

Apple Card is due to launch later this month and there are a few restrictions associated with Apple's predictably-named credit card.

The Apple Card Customer Agreement document drawn up by backing creditor Goldman Sachs shows that it cannot be used to buy cryptocurrencies. Additionally, the iPhone-based digital version of the credit card cannot be used on jailbroken devices.

Continue reading

When did computers get smarter than us?

There are few aspects of our everyday lives that don’t now rely on computers at some level. But does this reliance on technology mean that the machines are getting smarter than we are?

Server and network monitoring specialist CloudRadar has put together an infographic examining our reliance on technology.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.