Demand for blockchain and security engineers soars

Blockchain

If you want to secure your future in the IT industry then it seems that blockchain and security are the areas you need to be in.

A report from career marketplace Hired shows that in the past year there has been a 517 percent increase in demand for blockchain engineers year on year, and a 132 percent jump for security engineers.

Continue reading

Windscribe is a great VPN, and this is why you should be using it

Install the latest security software and most people would consider their system safe. Understandable as most modern suites cover almost every possible scenario from prevention against malicious software through to providing a secure way of interacting with your bank account.

There’s one area which is avoided and that’s a lack of a secure tunnel to the outside world and here’s the reason why this is so important.

Continue reading

Home endpoints twice as likely to be infected as businesses

data threat

Despite the fact that in recent months we've seen cybercriminals focusing their efforts on businesses, 68 percent of infections are seen on consumer endpoints, compared to 32 percent on business endpoints.

This is one of the findings of the latest Webroot Threat Report, which also shows that legitimate websites are frequently compromised to host malicious content, with 40 percent of malicious URLs hosted on good domains.

Continue reading

Amazon Day lets Prime subscribers choose a specific delivery day

Amazon logo on laptop

Once you sign up for Amazon Prime, it's hard to imagine how you ever lived without it. Well... that might be a slight exaggeration, but it's easy to fall in love with the service. Now Amazon is giving would-be subscribers another reason to sign up, and an added bonus for those who already have.

Amazon Day is a US-only service -- for now, at least -- that gives subscribers the option of consolidating all of their deliveries for the week on a day of their choice.

Continue reading

40 percent of ticketing site traffic comes from bad bots

robot keyboard

If you've ever tried to book tickets for a concert, festival or event you will know that it can be something of a frustrating experience, and bots could be making it even more so.

New research from Distil Networks finds 39.9 percent of traffic on ticketing sites comes from bots used by brokers, scalpers, hospitality agencies, and sundry criminals to execute a number of attacks, including denial of inventory, spinning and scalping, scraping seat map inventory, fan account takeover, and fraud.

Continue reading

Block malware, ads, clickbait and more with Malwarebytes Browser Extension

Are you plagued by pop-ups, susceptible to online scams or just frustrated by ad-riddled web pages that take forever to load? If so, then Malwarebytes may have the browser extension for you.

Malwarebytes Browser Extension for Chrome 1.0.40 and Malwarebytes Browser Extension for Firefox 1.0.38 both promise to be the first browser add-ons to identify and block yet-to-be-identified fake scams and tactics, plus provide protection against popups, browser lockers and hijackers too.

Continue reading

Isolating privileged access is critical to security

Admin login

A new study reveals that 87 percent of cybersecurity professionals believe separating privileged environments from corporate, internet-exposed environments is highly critical for protecting sensitive information.

But the Privileged Access Workstations (PAW) survey carried out by Cybersecurity Insiders for endpoint security company Hysolate also finds that time-consuming access processes and the inability to install apps, browse the web or plug in external devices, are key implementation roadblocks.

Continue reading

2019 prediction #1 -- Apple under Tim Cook emulates GE under Jack Welch

People -- well, investors and financial analysts -- seem to worry a lot about Apple. They tend to see Apple as either wonderful or terrible, bound for further greatness or doomed. What Apple actually is is huge -- a super tanker of a company. And, like a super tanker, it’s hard to quickly change Apple’s direction or to make it go appreciably faster or slower. Those who see Apple as doomed, especially, should remember they are worrying about the most profitable enterprise in the modern history of business. Those who see Apple as immortal should remember that’s impossible.

The worry about Apple in 2019 seems to be that the smart phone market may have peaked, or maybe that Apple has made the mistake of building its products so well that they last too long. Then there’s the concern that Steve Jobs is gone and why isn’t Apple reinventing itself and the world yet again through another new product category?

Continue reading

97 percent of companies struggle to deploy and manage public clouds

cloud worry

Public cloud adoption is growing fast, but it's not without problems. A new report from network verification company Veriflow uncovers a disconnect between network and other teams involved in the management and oversight of the public-cloud portion of their networks.

IT teams are struggling with network infrastructure challenges caused by the cloud, such as impaired visibility and more frequent security threats.

Continue reading

Android Pie is still coming to the OnePlus 3 and OnePlus 3T

OnePlus logo

Apple gets a lot of praise for the length of time it offers iOS updates to iPhone owners. Manufacturers of Android handsets, on the other hand, tend to be chastised for failing to offer OS updates for anywhere near long enough.

Bucking this trend is OnePlus, one of the few companies that does not just forget about owners of older phones as soon as a new model is released. But having promised some time ago that OnePlus 3 and OnePlus 3T owners would get Android Pie, users were starting to fear that the update had been ditched. Good news. OnePlus has confirmed that Pie is still in the pipeline.

Continue reading

Twitter users can now access paywalled Medium content for free

Medium

It's the bane of any internet user. You stumble across a link to a fascinating-sounding article and click it only to discover that the site hosting the post is paywalled. Gah!

The Medium platform is one that can include paywalled content, and there's good news for Twitter users. If you access a Medium article via a tweet, it does not matter if it is a paid-for article or not -- you will be able to access it for free.

Continue reading

Microsoft releases Windows 10 19H1 Build 18342 with Timeline for Chrome and access to Linux files from File Explorer [Updated]

Windows 10 box

[Update] This build is now available on the Slow ring.

Microsoft has released a new Windows 10 build to insiders -- Windows 10 19H1 Build 18342. This new build sees improvements to gaming that fix problems with State of Decay. There is also the new and much-requested ability to access Linux files from Explorer, a host of bug fixes, and the launch of a Chrome extension for Timeline. But while this is a significant update with a lot to explore, it's not for everyone. Microsoft has disabled the rollout of the build for systems with certain processors.

Continue reading

Micron 1300 96-layer TLC 3D NAND SATA SSD will come in both M.2 and 2.5-inch form factors

If you are looking to upgrade your existing solid state drive or hard disk drive, Micron has a new product that may interest you. The "1300," as it is called, uses the "slower" SATA interface, meaning it isn't as fast as the fancy new NVMe options on the market. If your computer doesn't have an NVMe M.2 slot anyway, that is sort of a moot point.

With the SATA interface, speeds are still respectable -- 530 MB/s read and 520 MB/s write. Those speeds are regardless of capacity. If you go with the 2.5-inch form factor, you can choose among 256GB, 512GB, 1TB, and 2TB. The M.2 variant has the same capacities as the other, minus 2TB.

Continue reading

Serious Amazon Ring vulnerability leaves audio and video feeds open to interception and spoofing

Security researchers from Dojo by Bullguard have discovered a vulnerability in Amazon's Ring doorbell that leaves it prone to man-in-the-middle attacks.

As well as enabling a hacker to access audio and video feeds in a severe violation of both privacy and security, the vulnerability also means that an attacker could replace a feed with footage of their own. Revealing the security flaw at Mobile World Congress, Yossi Atias from Dojo, demonstrated how a feed could be hijacked and injected with counterfeit video.

Continue reading

Optimizing cost is key priority for cloud users

cloud dollars

Optimizing existing cloud use for cost savings is the top initiative for users in 2019 for the third year in a row, increasing to 64 percent from 58 percent in 2018.

This is one of the findings of the RightScale 2019 State of the Cloud Report from Flexera. Among other highlights are that enterprises plan to spend 24 percent more on public cloud in 2019 compared to 2018.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.