Web applications leave companies vulnerable to breaches

web threats

Insecure and outdated web applications are a core source of high-profile data breaches among FT 500 global companies according to new research from web security company High-Tech Bridge.

The study reveals that abandoned, shadow and legacy web applications more or less nullify corporate cybersecurity spending and undermine compliance.

Continue reading

Amazon brings Alexa to more of Europe

Ciao. Hola. There are many ways to say hello around the world, even in dead and nearly dead languages. If you own a smart speaker, there's a good chance you greet it by saying 'Alexa'.

Amazon's Echo products have been a huge success, bringing the retail giant's smart assistant to millions of homes around the world. Amazon isn't resting on its laurels though. As well as rolling out new versions of Echo Dot, Echo Plus, and Echo Show it has expanded the list of countries where you can buy them.

Continue reading

New Kodi 18 'Leia' Beta 4 arrives -- download it now!

Development on the next big version of Kodi, codenamed 'Leia', is well underway, with new pre-release versions arriving on a regular basis. The full version of the software is expected to be ready by the end of this year.

The Kodi Foundation has today released the fourth Beta for Kodi 18, and as you would expect the focus is on squashing bugs and fixing usability issues.

Continue reading

Want to find the biggest cloud security threat? Look in the mirror [Q&A]

mirror image

It seems not a day goes by without a new cloud data breach making headlines. And though the victims change, the attack details remain the same. Why do organizations keep repeating the same cloud security mistakes? And how can we break free from this vicious cycle?

We spoke to Zach Malone, security engineer at security management specialist FireMon, who discusses these issues and tells us why, to identify the biggest threat to cloud security, we need to look in the mirror.

Continue reading

Mozilla partners with ProtonVPN to offer security-conscious Firefox users a VPN

Mozilla and ProtonVPN

Mozilla has announced a partnership with ProtonVPN as it explores new ways to keep people safe online.

Starting today, a select group of Firefox users in the US will see an ad for ProtonVPN encouraging them to take out a monthly subscription with the service. It's an experiment that is part of Mozilla's attempt to explore new revenue streams to help keep Firefox funded.

Continue reading

Facebook Messenger 4 is simpler and far, far less ugly

Facebook Messenger 4

After hitting the headlines for falling victim to a hack attack, and then the privacy issues surround its Portal devices, Facebook will be hoping that the rollout of a sleeker, sexier, simplified version of Messenger will do something to get disgruntled users back on side.

The social networking giant has launched Facebook Messenger 4, a neater and tidier version of its messaging app. As well as clearing out the clutter, there is the promise of a dark mode in the future.

Continue reading

More problems surface with the buggy Windows 10 October 2018 Update

As you know by now, Microsoft was forced to put the Windows 10 October 2018 Update on ice following reports that it was deleting user files. What made the problem even worse was Insiders had reported that issue to Microsoft months ago, but the software giant failed to address it.

While the feature update is back in testing, non-Insiders have been discovering additional problems with it. First up, if you use the built-in zip tool to extract a file to a folder where a version of that file already exists (even if it has different data), nothing will actually happen.

Continue reading

Google Play Movies and TV gets improved 4K video support

While the transition from standard definition TV to HDTV was monumental, the 4K (UHD) movement is much less so. Don't get me wrong, I own both a 4K Samsung TV and an Apple TV 4K, so I am invested in the resolution, but I am rarely blown away by UHD content. In other words, you probably shouldn't run out and buy a 4K television to replace your 1080p TV.

But OK, if you already have a 4K TV, you might as well watch some UHD content, right? Today, Google announces several improvements to its Play Movies and TV service in that regard. Not only will 4K content be more affordable, but the search giant will be automatically upgrading the SD and HD videos consumers already bought to 4K resolution (when available) for free. As long as the consumers are in the USA or Canada, that is.

Continue reading

Mac@IBM code goes open source

IBM logo

During his keynote speech today at the Jamf User Nation Conference in Minneapolis, IBM CIO Fletcher Previn announced that IBM is going to open source its Mac@IBM code.

Designed to streamline the integration of corporate-owned or BYOD Apple Mac devices and applications into the enterprise while delivering a personalized experience, Mac@IBM has seen the number of IBMers using Macs increase from 30,000 in 2015 to 134,000 in 2018.

Continue reading

Your first 5G phone could come from OnePlus

At the moment, there are many people eagerly awaiting the arrival of the OnePlus 6T later this month. But looking further ahead, OnePlus has plans for a 5G handset.

The smartphone manufacturer has already hinted at the release of a 5G handset in 2019, but now this has been confirmed. Joining the president of Qualcomm on stage at the company's 4G/5G summit at Hong Kong, OnePlus' Carl Pei said that a 5G phone is definitely coming next year.

Continue reading

Thycotic launches free security toolkit for the higher education sector

students with laptops

Universities and colleges are uniquely attractive to cyber criminals, because a constantly changing population and the use of large numbers of BYOD machines means lots of potential vulnerabilities.

Privileged access management specialist Thycotic is releasing a free Cyber Security Toolkit for College Students and Families, aimed at providing an essential guide to help schools build an understanding of cyber best practices throughout their entire community.

Continue reading

How to spot a fake Twitter follower

Twitter security logos and fingerprints

Earlier this year we covered some research from Duo Security published into the activities of Twitter bots. The company has now followed this with a look at how fake Twitter followers operate.

Traditional fake followers are challenging to detect on an individual level since they have very little (if any) activity other than following other accounts. However, because fakes operate in groups created by the same bot owner they do tend to share characteristics.

Continue reading

Industrial control systems offer a soft target for attackers

industrial skyline

Security gaps in key areas such as plain-text passwords, direct connections to the internet, and weak anti-virus protections are leaving industrial control systems vulnerable to attack according to a new report.

The study from ICS security company CyberX also shows that although the use of Windows XP has declined over the last year there are still older, unpatchable, Windows systems in slightly more than half of all industrial sites.

Continue reading

Mugger tip: Here's what not to do

The world has a number of less-than-bright criminals, from those who become stuck in their exit route (think vent pipes and the like), to those who get caught through use of a stolen device. Facebook has even led to a few arrests of people who bragged or posted the video evidence online.

Although this story is courtesy of Facebook, one alleged criminal took an interesting approach to outing himself. While the whole situation is sad for the victim, the end is shocking.

Continue reading

Password Check Required Immediately -- and more of 2018's most successful phishing subject lines

Phishing

Which subject lines make a person most likely to click a link in a phishing email? Security awareness training company KnowBe4 has analyzed data from simulated phishing tests and 'in the wild' emails to find out.

The most successful lines play on user's desire to remain secure with subjects relating to password checks the most clicked. On social media, messages about tagging or new profile views are most likely to be clicked.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.