UK hits Facebook with maximum possible fine for Cambridge Analytica privacy scandal

Facebook on iPhone

The UK Information Commissioner's Office (ICO) has penalized Facebook for the Cambridge Analytica data scandal by fining it the maximum amount permissible under law.

But the fine is unlikely to make Facebook break a sweat. At just £500,000 ($645,000) the sum represents a miniscule percentage of the social network's income. There will undoubtedly be arguments that this is little more than a rap on the knuckles for failing to protect the private data of at least a million Facebook users in the UK.

Continue reading

Microsoft releases Windows 10 19H1 Build 18267 with expanded search indexing

Microsoft is still busy fixing the many problems that have blighted the Windows 10 October 2018 Update, but that hasn’t stopped development on the follow up, due out next spring.

Build 18267 for Insiders on the Fast ring, introduces -- among other things -- the ability for the OS to index all of your folders and drives, to make finding files on your PC much easier.

Continue reading

Leaked documents show Google now requires OEMs to provide 2 years of Android security updates

Android figure on smartphone

One of the problems with buying an Android phone over an iPhone is the fact that you don't know how long you can expect to receive updates. There has long been criticism of the fact that many Android handsets are quickly abandoned while Apple pushes out iOS updates for a number of years.

We've heard suggestions that Google might start requiring handset manufacturers to provide updates for a minimum period, and now it seems that this has indeed been mandated. A leaked copy of a contract between Google and OEMs shows that there is now a requirement to release security updates -- or face the consequences.

Continue reading

Why endpoint management is critical to your enterprise security strategy

Endpoint protection

Endpoints make the enterprise run, whether they are laptops or desktops running macOS, Windows or Linux; smartphones or tablets running iOS or Android; virtual machines or IoT devices. They’re found driving business on local networks, in remote offices and in the hands of traveling users.

However, endpoints also make the enterprise vulnerable. They are a favorite target of criminals who launch cyberattacks via ransomware, spyware, phishing and other malicious software. Over the past year alone, critical endpoint vulnerabilities have been discovered in popular OSs and applications and then exploited by WannaCry, Meltdown, Spectre, Petya, Fireball, Bad Rabbit and other harmful code. The challenge facing enterprises, then, is how to minimize the vulnerability of their endpoints and simultaneously maximize their value. While endpoint management is already a widely adopted IT practice, now is the time for IT teams to expand their efforts to include endpoint security. As we’ll see below, combining endpoint management and security can solve some of your most pressing issues.

Continue reading

How automation will impact education

teacher and students

There has been a lot of hype around how new technologies like automation will impact our way of life. Some live in fear that their jobs will be lost to humanoid robots, while others excitedly welcome bots like Amazon Alexa into their home. The impact of 'robots' -- itself an ill-defined category -- is widely discussed and hotly contested.

In the business world, most industries have much to gain from automation and robotics, but what this looks like in practice is a far cry from the wider speculation.

Continue reading

IT and the rise of connected cars

Volkswagen recently revealed that it is exploring using an innovative form of distributed-ledger (i.e., blockchain) technology called the IOTA "Tangle" to deliver software updates to its autonomous cars.  The technology may be available to customers as early as Spring 2019. It’s just the latest in a seemingly unending stream of news about connected cars, a broad term that encompasses everything from cars with built-in GPS systems to fully autonomous, AI-driven semi trucks in the emergent IoT space.

While the topics of conversation are spanning everything from legislation to programming ethics, not enough air-time has been devoted to discussing exactly how the arrival of this new technology will change the charter for the IT teams who will be tasked with supporting the future of transportation.

Continue reading

Early adopters delay IoT purchases over security concerns

Internet of things

While people are still excited about Internet of Things technology, many are delaying buying over concerns about privacy and security.

A new survey from cyber security company F-Secure shows that 63 percent of early adopters are looking to purchase new devices, but 50 percent have delayed an IoT purchase because of security concerns.

Continue reading

Consumers will stop spending with businesses after a breach

Locked wallet

New research finds that that 83 percent of consumers will stop spending with a business for several months in the immediate aftermath of a security breach or a hack.

More than a fifth (21 percent) will never return to a brand or a business post-breach, representing a significant loss of revenue, according to the study from secure payments provider PCI Pal.

Continue reading

Advanced SystemCare 12 includes a new privacy shield

Should you keep your system optimized or simply allow Windows to keep your computer in-check? A few years ago, data would build, junk would collate and it was relatively easy to cause a blue screen of death or even stop Windows from booting at all, requiring a system restore.

These days Windows 10 is far better engineered and will do a good job keeping your system maintained. With this in mind, system maintenance suites are turning their hand to security, adding features to enable you to keep yourself safe and secure whilst you browse the internet (although your security software should be more than capable…).

Continue reading

Logitech Capture webcam software enters public beta

With YouTube and social media being so popular these days, it can seem like everyone is sharing photos and videos of themselves online. Heck, there are professional content creators and Instagram models that get paid a lot of money to share media content with followers. It's a weird and wild world, folks.

Webcams are an important tool to vloggers and streamers, but make no mistake -- all cameras are not created equally. In fact, the ones that are integrated into laptops are often terrible. Thankfully, companies like Logitech produce high-end USB webcams for those that don't want to compromise. Apparently, the company was dissatisfied with its webcam software offering, however, as today, it launches a public beta for its successor. Called "Logitech Capture," it aims to step things up for both amateur and professional content creators alike.

Continue reading

Privacy: Google makes it easier to delete your search history

Google eye

It's the butt of many jokes, but your search history -- as well as your browsing history -- can be hugely revealing about you. While it is possible to quickly clear the record of searches that your browser stores, it is not so easy to delete the records stored by Google. At least that used to be true.

Google has just announced a new option that enables you to view and delete your Google search history, making it possible to take control of some of the data stored on the company's servers. Contrary to what you might expect, the option is not being hidden away, but will instead be accessible from a Google search. What's more, the company says that similar options will be coming to Google Maps and other Google services next year.

Continue reading

Kodi 18 'Leia' will come with fewer features installed, and that’s a good thing

The Kodi Foundation is busy finishing off the next major release of its hugely popular home theater software, and has made a fundamental change.

In Kodi 18 'Leia', the binary add-ons will be removed, reducing the size of the installer significantly. When you download the program, you’ll get just the basics and can install additional features as required through the binary repository. There’s another benefit besides avoiding bloat.

Continue reading

TeamViewer 14 Preview is here with new augmented reality Pilot mode

We handle support for novice computer users and you’ll be surprised how many of these customers do not understand the basics of computing. Sell them security software and many can’t install the new suite as they’ve never fully removed the previous one. So frustrating.

The easiest solution is to employ TeamViewer and remotely advise the user via their computer, that than either over the phone or by email. It’s quicker to perform a task yourself than guide someone, which has made the software a godsend for any remote support facility.

Continue reading

Tim Cook calls for 'comprehensive federal privacy law in the United States'

Metallic Apple logo

Speaking at the International Conference of Data Protection and Privacy Commissioners in Brussels, Apple CEO Tim Cook praised Europe's GDPR (General Data Protection Regulation) and said the US needs to fight back against the weaponization of personal data.

In a strongly-worded speech, Cook avoided explicitly naming the likes of Google and Facebook for trading in private information, but it was clear who he was referring to when he said data was being misused. He added: "We shouldn't sugar-coat the consequences. This is surveillance".

Continue reading

Web applications leave companies vulnerable to breaches

web threats

Insecure and outdated web applications are a core source of high-profile data breaches among FT 500 global companies according to new research from web security company High-Tech Bridge.

The study reveals that abandoned, shadow and legacy web applications more or less nullify corporate cybersecurity spending and undermine compliance.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.