Attack traffic up 32 percent in 2018
Levels of attack traffic observed by F-Secure's network of decoy honeypots in 2018 increased by 32 percent over the previous year, and increased fourfold in the latter half of 2018 compared with the first half of the year.
The report suggests that many companies may not have the visibility they need to catch attacks that make it past preventative measures like firewalls and endpoint protection.
Intel shares Thunderbolt with USB Promoter Group, and USB4 is on the way
Intel's Thunderbolt 3 uses the USB-C connector, which is sort of confusing. Basically, all TB3 ports can also handle USB, but standard USB Type C ports cannot work with Thunderbolt 3. This can lead to confusion for consumers. Intel's standard is much faster, meaning Thunderbolt 3 accessories are often superior to regular USB-C models. Of course, TB3-related things are usually more expensive too.
In an effort to make Thunderbolt ubiquitous, Intel is sharing its TB protocol with the USB Promoter Group. What does this mean? Well, the future of the Universal Serial Bus, USB4, will not only work with USB 2.0 and 3.x devices, but Thunderbolt 3 too. In other words, by having a USB4 port on your computer, you also have TB3.
Google Project Zero reveals 'high severity' macOS vulnerability that Apple has failed to patch
Google's Project Zero has gone public about a "high severity" flaw in the macOS kernel after Apple failed to patch it 90 days after being told about the problem.
A security researcher discovered a problem in XNU that means it is possible to perform malicious activities. The security bug related to copy-on-write (COW) behavior, enabling an attacker to manipulate filesystem images without the operating system being notified. Apple was informed of the vulnerability back in November, but has failed to release a patch.
Open source breaches up by 71 percent
Open source breaches have increased by 71 percent over the last five years, while 26 percent of companies have reported a confirmed or suspected web application breach in the past year alone according to a new report.
The study from open source governance specialist Sonatype also shows 41 percent of executives admit their company doesn’t follow an open source governance programme.
New specification sets the standard for passwordless logins
The World Wide Web Consortium (W3C) and the FIDO Alliance have today announced that the Web Authentication (WebAuthn) specification is now an official web standard.
W3C's WebAuthn recommendation, a core component of the FIDO Alliance's FIDO2 set of specifications, is a browser/platform standard for simpler and stronger authentication.
Ultimate Ears myBOOM Studio lets you create a custom BOOM 3 Bluetooth speaker
When shopping for a Bluetooth speaker, there are many options nowadays. Quite frankly, trying to pick one can be an overwhelming experience. My advice? If you stick to two brands -- JBL or Ultimate Ears -- you will be absolutely fine. Bluetooth speakers from those companies are consistently excellent. Are there good speakers from other companies? Sure, but they can be hit or miss.
Ultimate Ears in particular has never let me down. Its lower-end offerings and its top models all offer both great build and sound quality. Seriously, folks, not only do they sound really good, but they are extremely durable too. The Ultimate Ears BOOM 3 is probably the best "bang for your buck" speaker, as it gets plenty loud and costs less than $200.
Sources: Huawei is on the verge of suing the US government
The US has made no secret of the fact it does not trust Huawei, and the company's hardware has been shunned by the government over fears about Chinese espionage. There have also been calls for Huawei hardware to be barred from the US power grid.
The smartphone manufacturer has previously indicated that it is not willing to go down without a fight, and this threat could be about to be put into action. Huawei is said to be preparing to sue the US government, challenging last year's addition to the US National Defense Authorization Act (NDAA), according to sources talking to the New York Times.
The three skills software developers need in 2019
Software Developer is one of the most sought-after enterprise roles out there. But it’s also among the most competitive -- especially in a candidate-driven market. No matter what stage they are in their careers, remaining competitive will require developers to refine skill sets that set them apart.
According to a data analysis conducted via PayScale data, full stack developer was determined to be the fastest-growing job of 2018. The analysis found that these developers are hired at a rate more than six times that of the average job in America. And salaries are a big inducement: Entry-level developers in the U.S. can expect to make an average annual salary of over $65,000 -- a mid-career equivalent in many other industries.
Cybersecurity statistics for 2019: The chances your business will be attacked
With every passing year, cybercrime gets worse. It makes sense: it’s lucrative. Cybercrime is estimated to be a $1.5 trillion industry, with some countries now basing their economy around cybercrime. As a result, cybercriminals are now emboldened with new technology that makes data breach attacks easier and more accessible.
With all of that in mind, you may be wondering whether your business, in particular, is likely to suffer an attack. And even though you may have seen some statistics, the answer is a little more complicated than it seems. Here are some important cybersecurity statistics that can shed some light on what you can expect in 2019.
Five steps to mitigating privileged account risks: Getting ahead of a security breach
Privileged accounts are a necessity in all enterprise IT environments. Administrators must have enhanced privileges to manage the environment. Unfortunately, these privileged accounts bring high risk to a company’s network; in fact, recent research shows that almost half (44 percent) of all security breaches that happened in 2017 involved privileged account access.
There are a number of reasons these privileged accounts bring such high risk with them. For example, something so simple as a password reset can mistakenly grant a user full administrative rights that can be misused either intentionally or accidentally. These accounts are also inherently difficult to manage due to the high volume of users and systems that need access to the same credentials, making it difficult to keep the credentials secure. Luckily, there are some concrete, critical steps that an organization can take to ensure risk on its network is minimized and protected from privileged account misuse.
If you've added your phone number to Facebook for 2FA security, it can be used to search for you
Facebook has been encouraging users to enable two-factor authentication to boost the security of their accounts, but it turns out that there's a slightly sinister side to this feature.
You may well have opted to maintain an element of privacy by omitting personal information such as your address and phone number from your profile. But if you've used your mobile number to secure your account with 2FA, even if it is not visible to others, it can still be used to search for you -- and there is no way to opt out of this.
Leak: OnePlus 7 could eliminate the notch with a pop-up camera
At MWC last month, OnePlus did not -- as many people had hoped -- show off the OnePlus 7, opting instead to give visitors a hands-off glimpse at a 5G prototype. But a new leak gives us an idea of what we might expect to see in the upcoming handset.
In a video, the OnePlus 7 is shown to have virtually no bezels, and a 6.5-inch screen is unencumbered by a notch or hole punch cut-out. This is thanks largely to the use of a camera that pops up out of the top of the handset.
Twitter is testing a new option to let you hide replies to tweets
There are many demands made of Twitter, but perhaps the most frequently requested feature is an edit option. There's a chance that this will appear in time, but until then there are other concerns for Twitter users.
Abuse and trolling on Twitter -- like other social networks -- is rife, and anyone posting a tweet has to deal with the replies that it may generate... and the responses to those replies. It is already possible to block or mute respondents, but Twitter is currently testing a new tool -- the ability to hide replies.
Microsoft welcomes new partners as it launches Microsoft Quantum Network
Quantum computing is not necessarily the future of computing, but it's certainly a future and an important part of technological advancement. All of the big players from the world of technology are understandably eager to be at the forefront of what's happening, and Microsoft is no different.
This week, the company formally launched the Microsoft Quantum Network, a coalition of partners with a shared vision. The goal is "sharing knowledge and collaborating with the best quantum innovators" with a view to helping the progression of quantum computing.
Linux Mint reveals upcoming logo and website changes
Linux Mint is one of the most polished and beautiful operating systems. As more and more people reject Windows 10, Mint becomes a very attractive alternative. Looks aside, it is a stable and reliable Linux distribution too -- it provides an overall excellent user experience.
Unfortunately, the great looks of the Linux Mint operating system do not carry over to its website. What I’m trying to say is, the Linux Mint website is ugly and outdated. In the grand scheme of things that doesn’t matter much, but it could be a turnoff to new users.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.