Enterprises face more than 100 critical vulnerabilities per day


Enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 are rated as critical on the common vulnerability scoring system (CVSS) according to a new report.
The Vulnerability Intelligence Report from cyber risk company Tenable is based on analysis of anonymized data from 900,000 vulnerability assessments across 2,100 enterprises.
In the race to win business chat, there's a big boy collision coming


Google will pay Apple $9 billion this year to remain the default search engine in the iPhone’s Safari browser, according to one Goldman Sachs analyst. That’s a hefty expense for Google, but will Apple end up paying the price when it comes to business messaging?
According to Goldman Sachs analyst Rod Hall, Apple charges Google based on the number of searches iPhone users perform using Safari or Siri.
What is the common stumbling block when adopting Agile methodologies?


I often speak with IT decision makers who want advice on what tool to buy to make their shop more "DevOps." My advice to them is not to buy anything.
DevOps isn’t something you triumphantly stick a flag in or acquire through tooling purchase or corporate acquisition. DevOps is the active intersection of frequent value delivery, frequent team communication, and frequent gap reduction between paying customers and the dev team.
Look out for the cyber threats hiding in your backups


Spending on security technology continues to soar. Nevertheless, data breaches and cyberattacks continue to make headlines at an incredible rate, with no relief in sight. The Online Trust Alliance reported that attacks in 2017 came from a myriad of vectors, such as phishing and ransomware, and that the number of attacks doubled to nearly 160,000 incidents per year over 2016. What’s worse, estimates for the number of unreported attacks exceed 350,000 annually.
While enterprises typically dominate the headlines, organizations of all sizes are affected by cyber incidents. A recent Ponemon study showed that two-thirds of small and mid-sized businesses reported that threats evaded their intrusion detection systems, and more than half of the companies said they were attacked by ransomware more than twice during the last year. There is no dispute that the number of vulnerable endpoints and the complexity of threats will continue to increase, and limited IT budgets and overstretched staff will remain an industry-wide problem. It’s clear that companies need to adopt new approaches to stay ahead of cyberattacks.
Dropbox Extensions let you edit your cloud-based files online


Dropbox has just announced a new feature that makes it possible to edit your files online without the need to download them first. Dropbox Extensions give you the ability to edit a number of file types without the need to ever navigate away from Dropbox.
The company has formed partnerships with a number of third parties including Adobe, Pixlr and Vimeo to give Dropbox users the option of editing images online, signing PDFs, annotating videos, and much more. Dropbox says the aim of the new integrations is to improve users' workflows.
Parallels releases Toolbox 3 for Mac and Windows


Improving your system productivity is essential for getting work done more swiftly. With this in mind, many of us turn to all-in-one maintenance tools so we can optimise our computer, clean junk and fully remove installed applications. It’s just easier to own one tool to perform all your key tasks.
Parallels recently launched Toolbox for Mac which offered a number of system tools from a handy drop-down menu. Frankly, when the first Toolbox was released, it offered little more than what was already available in macOS. You could quickly take a screengrab, record your screen, create an archive and more.
Apricorn Aegis Secure Key 3NX: An ultra-secure 256-bit AES XTS hardware-encrypted USB flash drive [Review]


Storing files in the cloud means they are easily accessible from anywhere, but if you have private data that you can’t afford to fall into the wrong hands, this might not be the best option for you, especially given the number of data breaches we see on a regular basis.
An alternative option is to carry those files with you on a USB flash drive, protecting them with encryption. While software encryption methods are better than nothing, a hardware encrypted solution, like the Aegis Secure Key 3NX, is a much more advisable choice.
Happy 15th Birthday, Fedora Linux!


Fedora is the best desktop Linux distribution for many reasons. Not only is it fast and reliable, but it is constantly kept up to date with fairly bleeding edge packages. Not to mention, it uses the greatest desktop environment, GNOME, by default. Most importantly, it respects and follows open source ideology. It is a pure Linux and FOSS experience that is an absolute joy to use. It's no wonder Linus Torvalds -- the father of Linux -- chooses it.
With all of that said, Fedora didn't get great overnight. It took years of evolution to become the exceptional operating system it is now. In fact, today, we celebrate the Linux distribution's 15th birthday! Yes, it was way back in 2003 when Fedora Core 1 was released to the world, forever changing the course of history for the better.
Consumers still reuse passwords despite knowing the risks


Despite almost half of US consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords and PINs across multiple accounts.
According to a new fraud awareness survey by information destruction company Shred-it, 39 percent of consumers have been a victim of fraud or identity theft, and 27 percent admit that they don't know how to find out if they've become a victim.
Microsoft is porting Sysinternals utilities to Linux, starting with ProcDump


Microsoft has embraced Linux more and more over the years, and the latest demonstration of this is the company's decision to port the free Sysinternals utilities to work on the platform.
The first tool to make its way to Linux is ProcDump, which can be used to create crash dumps. While not as feature-rich as the Windows version, the Linux port is still a valuable tool. And, importantly, there are more Systinternals tools making their way to Linux.
Check to see if Google has given you free Play Store credit


Every so often Google starts to feel a little generous and decides to give things away. It's happening again, and you might just find that you've been given a few dollars in free credit to spend in the Play Store.
Seemingly at random, Google is handing out between $1 and $5 to Android users -- so you should check to see if you're one of the lucky ones.
Barnes and Noble announces a new Android-powered NOOK Tablet for the holidays


If you like to read books, an Amazon Kindle e-reader is a wise purchase. After all, they use e-ink technology which is easy on the eyes while offering very long battery life. Unfortunately, not everyone can afford a device dedicated to reading. For many, a traditional tablet -- such as an iPad -- serves as both an e-reader and a general use slate.
Barnes and Noble sells e-ink readers, but also, it offers NOOK Tablets powered by Android. These are superior to Amazon's Fire tablets, as NOOK has Google Play support. In other words, Barnes and Noble's tablets have access to all the popular apps you will want. Today, timed perfectly for the upcoming holiday shopping season, Barnes and Noble announces its latest tablet. This new NOOK Tablet has a big 10.1-inch screen. In addition to being a consumption device, the company apparently thinks it can be used for productivity -- it will sell an optional keyboard cover for it.
Pssst... Wanna buy a digital identity? Only $50


Ever wondered how much your life might be worth? If we're talking about the digital world then the answer might be, 'not very much.'
Cybercriminals could sell your complete digital life, including social media accounts, banking details, app data, gaming accounts, and even remote access to servers or desktops, for as little as $50.
Verizon is splitting in three: Consumer, Business and Verizon Media Group/Oath


Verizon has announced that it is to split into three as it looks to ensure "first-to-market leadership in the 5G era". Starting January 1, 2019, the telecom company will divide into Consumer, Business and Verizon Media Group/Oath.
The company says that it expects its new structure to be reflected in financial reporting for Q2 2019.
Exploit developers claim 'we just broke Edge'


Security researchers claim to have unearthed a zero-day vulnerability in Microsoft Edge. The remote code execution is due to be revealed with a proof-of concept.
Microsoft has not yet been informed about the details of the security issue, but exploit developers had been looking for a way to break Edge out of its sandbox -- and it would appear that this objective has now been achieved.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.