Communication and data breaches: How to get it right

"Data breaches have become the leading risk to data and privacy in the last ten years, and there’s no sign of an end." States the Avast Business Threat Landscape Report for 2018, and isn’t hard to believe. Over the course of 2017 there were more than 2.6 billion instances of records and data being compromised or stolen online, but in the first half of 2018 alone, data breaches exposed over 4.5 billion records.

Clearly, this is a very real threat. But while many businesses are increasing their preventative measures, the important step of creating an incident response plan is often overlooked. While any business can hope that their cyber security is enough to keep company and client data safe, it’s important not to simply assume that this will be the case.

Continue reading

Das Keyboard launches open source 4Q Smart RGB Cherry MX Mechanical Keyboard

Many companies are producing mechanical keyboards nowadays, but not all of them are great. Companies like HyperX and Logitech make quality such products, but there is another company that is very well respected by in-the-know consumers -- Das Keyboard. Its products are legendary because of their high quality and reliability.

Today, Das Keyboard launches a new mechanical keyboard that looks downright drool-worthy. The 4Q, as it is called, features Cherry MX switches (brown), RGB lighting, and a handy two-port USB hub. Best of all, it leverages open source applets for a truly unique experience.

Continue reading

Organizations find cloud costs higher than anticipated

Cloud money

Cloud adoption is high, with 78 percent using or planning to use cloud in the future, but most organizations lack a formal strategy to realize the full benefits and 62 percent report higher than anticipated costs.

These are among the findings of a new survey by Syncsort that shows only 29 percent report having a centralized strategy and center of excellence in place to proactively plan and manage applications to the cloud, while 42 percent migrate applications on an ad-hoc basis.

Continue reading

Exploit developer discovers security vulnerability in VirtualBox and publishes a full guide to exploiting it

VirtualBox logo

A security researcher has not only discovered a vulnerability in the virtualization tool VirtualBox, but has released details of the exploit and a step-by-step guide to the zero-day vulnerability.

Russian exploit developer Sergey Zelenyuk found a way to break out of VirtualBox's virtual environment and he chose to go public with the vulnerability because of his displeasure at the "contemporary state of infosec, especially of security research and bug bounty". Having told Oracle about the problem, he also tired of the "delusion of grandeur and marketing bullshit" he experienced in the infosec community.

Continue reading

Consumers are more ready to abandon brands following data breaches

data breach

According to a new study, 78 percent of people would stop engaging with a brand online and 36 percent would stop engaging altogether if the brand had experienced a data breach.

The research by Ping Identity looks at consumer attitudes and behavior in the Post-Breach Era and reveals that people are more willing to make changes to the ways they interact with companies and secure their own personal data following a breach.

Continue reading

Continuous authentication helps boost behavioral analytics

web authentication

In a move to better protect accounts, banks, retailers and service providers are increasingly looking to methods of authentication beyond the password.

Behavioral analytics specialist BehavioSec is launching an updated version of its platform, allowing it to detect the suspicious use of attack obfuscation techniques, including the use of VPNs and TOR-routed traffic during login attempts and sessions.

Continue reading

Enterprises face more than 100 critical vulnerabilities per day

vulnerability

Enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 are rated as critical on the common vulnerability scoring system (CVSS) according to a new report.

The Vulnerability Intelligence Report from cyber risk company Tenable is based on analysis of anonymized data from 900,000 vulnerability assessments across 2,100 enterprises.

Continue reading

In the race to win business chat, there's a big boy collision coming

Google will pay Apple $9 billion this year to remain the default search engine in the iPhone’s Safari browser, according to one Goldman Sachs analyst. That’s a hefty expense for Google, but will Apple end up paying the price when it comes to business messaging?

According to Goldman Sachs analyst Rod Hall, Apple charges Google based on the number of searches iPhone users perform using Safari or Siri.

Continue reading

What is the common stumbling block when adopting Agile methodologies?

DevOps

I often speak with IT decision makers who want advice on what tool to buy to make their shop more "DevOps." My advice to them is not to buy anything.

DevOps isn’t something you triumphantly stick a flag in or acquire through tooling purchase or corporate acquisition. DevOps is the active intersection of frequent value delivery, frequent team communication, and frequent gap reduction between paying customers and the dev team.

Continue reading

Look out for the cyber threats hiding in your backups

security skull

Spending on security technology continues to soar. Nevertheless, data breaches and cyberattacks continue to make headlines at an incredible rate, with no relief in sight. The Online Trust Alliance reported that attacks in 2017 came from a myriad of vectors, such as phishing and ransomware, and that the number of attacks doubled to nearly 160,000 incidents per year over 2016. What’s worse, estimates for the number of unreported attacks exceed 350,000 annually.

While enterprises typically dominate the headlines, organizations of all sizes are affected by cyber incidents. A recent Ponemon study showed that two-thirds of small and mid-sized businesses reported that threats evaded their intrusion detection systems, and more than half of the companies said they were attacked by ransomware more than twice during the last year. There is no dispute that the number of vulnerable endpoints and the complexity of threats will continue to increase, and limited IT budgets and overstretched staff will remain an industry-wide problem. It’s clear that companies need to adopt new approaches to stay ahead of cyberattacks.

Continue reading

Dropbox Extensions let you edit your cloud-based files online

Dropbox Extensions

Dropbox has just announced a new feature that makes it possible to edit your files online without the need to download them first. Dropbox Extensions give you the ability to edit a number of file types without the need to ever navigate away from Dropbox.

The company has formed partnerships with a number of third parties including Adobe, Pixlr and Vimeo to give Dropbox users the option of editing images online, signing PDFs, annotating videos, and much more. Dropbox says the aim of the new integrations is to improve users' workflows.

Continue reading

Parallels releases Toolbox 3 for Mac and Windows

Improving your system productivity is essential for getting work done more swiftly. With this in mind, many of us turn to all-in-one maintenance tools so we can optimise our computer, clean junk and fully remove installed applications. It’s just easier to own one tool to perform all your key tasks.

Parallels recently launched Toolbox for Mac which offered a number of system tools from a handy drop-down menu. Frankly, when the first Toolbox was released, it offered little more than what was already available in macOS. You could quickly take a screengrab, record your screen, create an archive and more.

Continue reading

Apricorn Aegis Secure Key 3NX: An ultra-secure 256-bit AES XTS hardware-encrypted USB flash drive [Review]

Storing files in the cloud means they are easily accessible from anywhere, but if you have private data that you can’t afford to fall into the wrong hands, this might not be the best option for you, especially given the number of data breaches we see on a regular basis.

An alternative option is to carry those files with you on a USB flash drive, protecting them with encryption. While software encryption methods are better than nothing, a hardware encrypted solution, like the Aegis Secure Key 3NX, is a much more advisable choice.

Continue reading

Happy 15th Birthday, Fedora Linux!

Fedora is the best desktop Linux distribution for many reasons. Not only is it fast and reliable, but it is constantly kept up to date with fairly bleeding edge packages. Not to mention, it uses the greatest desktop environment, GNOME, by default. Most importantly, it respects and follows open source ideology. It is a pure Linux and FOSS experience that is an absolute joy to use. It's no wonder Linus Torvalds -- the father of Linux -- chooses it.

With all of that said, Fedora didn't get great overnight. It took years of evolution to become the exceptional operating system it is now. In fact, today, we celebrate the Linux distribution's 15th birthday! Yes, it was way back in 2003 when Fedora Core 1 was released to the world, forever changing the course of history for the better.

Continue reading

Consumers still reuse passwords despite knowing the risks

password on tablet

Despite almost half of US consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords and PINs across multiple accounts.

According to a new fraud awareness survey by information destruction company Shred-it, 39 percent of consumers have been a victim of fraud or identity theft, and 27 percent admit that they don't know how to find out if they've become a victim.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.