Helping organizations understand the pros and cons of blockchain

Blockchain word cloud

Blockchain is often seen as a game-changer for businesses, governments and criminals alike. But, as organizations rush to deploy applications based on blockchain technology, do the potential benefits outweigh the information risks?

The Information Security Forum (ISF) is releasing a new briefing paper aimed at boosting understanding of the technology.

Continue reading

Add a second layer of security with the new Malware Fighter 7

Can you ever have enough security? We often wonder after being told what our users have installed. It’s not unknown for people to have a full security suite alongside a second on-demand scanner and additional browser plugins warning them of potentially malicious websites.

As individuals tend to stick with a security suite which has worked for them in the past and, as long as their system isn’t compromised, continue to pay for a yearly subscription. With this in mind, developers are adding functionality to enable their security tools to run alongside and not interfere with your daily use. These are on-demand scanners where you’d need to schedule a scan or manually run a scan when required.

Continue reading

Protecting card data and more in the contact center [Q&A]

call center

Although many transactions are now carried out online, contact centers remain an important tool for businesses.

Call and contact center payment security solutions provider Semafone has had its latest Cardprotect (version 4) product validated by the Payment Card Industry Security Standards Council (PCI SSC) against the latest version of the Payment Application Data Security Standard (PA-DSS). This makes it one of the only companies in the industry to provide this level of certification.

Continue reading

Americans are overconfident about cybersecurity

Happy user

A new study from Webroot that examines the cyber hygiene habits of 10,000 Americans, 200 in each state, reveals that 88 percent feel they take the right steps to protect themselves from cyberattacks.

However, just 10 percent scored 90 percent or higher on a cyber hygiene test, with the average respondent getting only 60 percent.

Continue reading

Hackers steal $40 million of Bitcoin from crypto exchange Binance

Binance logo

Cryptocurrency exchange Binance has been struck by hackers who were able to make off with $40 million worth of Bitcoin.

The exchange suffered what it describes as a "large scale security breach" in which attackers were able to obtain "a large number of user API keys, 2FA codes, and potentially other info". CEO Zhao Changpeng says that 7,000 BTC were withdrawn in a single transaction and the attack which was perpetrated using a variety of methods.

Continue reading

PowerToys are back! Microsoft reboots the utilities as an open source project for Windows 10

PowerToys reboot

Microsoft is bringing back PowerToys for Windows 10 -- and this time it is open source. If the name doesn't mean anything to you, you probably weren't a Windows 95 user, but if this was your computing era, you'll remember tinkering with the likes of TweakUI, Send to X, QuickRes and numerous other delightful utilities.

Now the collection of utilities is back, rebooted for Windows 10 and due to be released as an open source project. At the moment, there are two tools being worked on -- Maximize to new desktop widget, and the Windows key shortcut guide -- but ten more are under consideration and due for release this summer.

Continue reading

Google Nest Hub Max both excites and terrifies me

When it comes to the smart home, I consider myself "all in." I have smart lights, a smart sprinkler system, a Nest thermostat, and a few audio-only Amazon Echo devices. The outside of my house is monitored by internet-connected cameras too. Despite all of that, I don't feel comfortable having cameras inside my home as part of a hardware assistant. For example, I would never buy a Facebook Portal or Amazon Echo Show for my home.

Earlier today at its I/O 2019 conference, Google unveiled its all-new Nest Hub Max (under the new Google Nest branding), and I find myself intrigued. With that said, I am also terrified of inviting a camera made by the world's biggest advertiser and data collector into my home. Should I allow my intrigue to overcome my desire for privacy?

Continue reading

.NET Framework is dead -- long live .NET 5

goodbye

Microsoft may not have said it out loud, but it's become increasingly clear over the past couple of years that .NET Framework is on its way out. With the software giant focusing most of its attention of making .NET Core faster and beefier, its longstanding predecessor has been slowly neglected, receiving only smaller changes every now and then.

While some have argued that .NET Framework is not dead, being the only framework in Microsoft's .NET family to support desktop applications, it was only a matter of time before its younger brother would be ready to replace it. And it looks like that's going to (finally) happen this summer, when .NET Core 3.0 launches. So, now, Microsoft is bracing developers for the inevitable -- .NET Framework will indeed be put out to pasture.

Continue reading

Google unveils the mid-range Pixel 3a and Pixel 3a XL -- same powerful camera, much more affordable price

It’s getting increasingly difficult for hardware companies to keep their new smartphones under wraps. Leaks prior to the official announcement mean we often know all about a new device well in advance.

We already knew a lot about the new Pixel phones that Google revealed today at its I/O conference, but it’s good to have everything confirmed. If you've always fancied a Pixel smartphone but couldn't justify the asking price, then the new Pixel 3a and Pixel 3a XL could well provide the perfect solution.

Continue reading

Plugable launches 0.8m Thunderbolt 3 cable with 40Gbps and 100W charging

Thunderbolt 3 is excellent technology -- it is fast and allows laptop users to expand the capabilities of their computers. For instance, you could add a TB3 docking station to gain additional ports, or an external GPU enclosure to add a desktop-class graphics card. So, yeah, Thunderbolt 3 rules.

Unfortunately, to get the full performance of Thunderbolt 3, it usually means using a very short cable, like 0.5m. While longer cables are available, they often provide slower transfer speeds (20Gbps) rather than the faster 40Gbps that TB3 can theoretically achieve. Not to mention, longer cables usually provide lesser charging power. Sure, there are some longer cables that provide top charging and data speeds, such as this 0.8m one from Apple, but as you can see, at $40, it is quite expensive. Today, Plugable launches a new cable (TBT3-40G80CM) that matches the performance of Apple's cable but at much more affordable price!

Continue reading

Shining a light onto the dark web

Dark web hacker

The dark web is, by its very nature something of an object of mystery. It's easy to think of it as a huge, closed community hidden from the world in dusty corners of the internet. But what's the reality?

Threat intelligence specialist Recorded Future has done some research to try to understand the dark web's true nature.

Continue reading

New risk assessment capabilities help secure containers

Red and blue security padlock

Container security company NeuVector is releasing new security risk assessment capabilities for enterprises using Kubernetes in production environments.

The features, added to its existing container security offering, include new dashboard widgets and downloadable reports to provide security risk scores for the most critical run-time attack risks, network-based attacks and vulnerability exploits in containers.

Continue reading

Companies continue to struggle with privileged access management

Admin login

Privileged accounts can be a headache for organizations so you'd expect managing them to be a high priority for security teams. However, a new report from Thycotic reveals that 85 percent fail to achieve even basic privileged security hygiene.

In addition 55 percent have no idea how many privileged accounts they have or where they’re located, while over 50 percent of their privileged accounts never expire or get deprovisioned.

Continue reading

97 percent of companies now use agile development methods

Agile development

Agile is clearly becoming the norm in the development community according to the findings of a new report from CollabNet VersionOne which has been charting the agile landscape for 13 years.

The report shows 97 percent of organizations now practicing agile development methods. That's not to say its use is universal, however, only 22 percent of respondents report that all their teams are agile, 26 percent more than half and 48 percent less than half.

Continue reading

Reported data breaches up more than 56 percent

data breach

According to the latest Data Breach Report from Risk Based Security the number of reported data breaches was up 56.4 percent in the first quarter of 2019 compared to the same period last year.

The increase in reporting could be a result of new legislation like GDPR that obliges businesses to be more open about security issues. The number of exposed records was also up by 28.9 percent. Already in 2019, there have been three breaches exposing 100 million or more records.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.