Latest Technology News

Companies are losing ground against cyber threats

Businesses are struggling to keep pace against the rising level of cyber security threats, according to a new study.

The Threat Monitoring, Detection and Response Report from Crowd Research Partners -- produced in partnership with a number of leading cyber security vendors -- finds that the biggest concern is dealing with advanced threats in three key areas, ransomware (48 percent), phishing attacks (48 percent) and attendant data loss (47 percent).

Continue reading

Why hackers love privileged accounts

Hacker

Accessing privileged accounts is the hacker's number one choice of the easiest and fastest way to get access to critical data according to a new study.

Privileged account solutions specialist Thycotic carried out a survey of more than 250 hackers at 2017's Black Hat conference and found that 32 percent of respondents see privileged accounts as the best way of getting hold of sensitive data, with 27 percent preferring access to user email accounts.

Continue reading

Department of Justice wants to identify 1.3 million visitors to anti-Trump site

The Department of Justice is trying to force a web host to reveal the IP addresses of over 1.3 million visitors to an anti-Trump website. The DoJ is also requesting contact information, email content and photos.

The site -- #DisruptJ20 -- was used to organize protests against Donald Trump on the day of his inauguration. DreamHost says that it is fighting the warrant that has been issued, because the "information could be used to identify any individuals who used this site to exercise and express political speech protected under the Constitution's First Amendment. That should be enough to set alarm bells off in anyone's mind."

Continue reading

Police in India arrest four over Game of Thrones leak

HBO has had something of a rough time of things lately, suffering not only a hack that led to a series of leaks, but also a Game of Thrones leak via a distribution partner. Police in India have now arrested four people in connection with the leak of the episode The Spoils of War.

Shortly after the leak occurred, HBO's distribution partner Star India admitted it was the source of the episode. Now three employees and one former employee of Prime Focus Technology -- a company which processes Game of Thrones ready for streaming on Hotstar -- are being questioned in relation to the leak.

Continue reading

Facebook expands Marketplace across Europe

Looking to compete with the likes of eBay and Craigslist, Facebook's Marketplace serves as a place for people to go to buy and sell locally. Following on from success in the US, UK, Australia and other countries, the social network is expanding the exchange further into Europe.

In total, Facebook's Marketplace is spreading to 17 European countries, meaning that it is now available in a total of 24 countries.

Continue reading

SteelSeries launches 'complete package' APEX M750 Mechanical Gaming Keyboard

If you are a PC gamer and you don't have a mechanical keyboard, you simply aren't doing life right. Look, a truly great video game player can succeed with any properly functioning keyboard and mouse, but if you can get an edge, why not take it? A mechanical keyboard doesn't just provide a more satisfying gaming and typing experience, but they are often built to last, making them a wise investment.

Today, respected manufacturer SteelSeries launches a new such mechanical gaming keyboard that it is referring to as the "complete package" -- bold words! The APEX M750, as it is called, has QX2 switches that the company claims will offer superior gaming performance. Since it is a gaming product in 2017, it of course has customizable RGB lighting.

Continue reading

Read Microsoft CEO Satya Nadella's leaked staff email regarding Charlottesville

The unrest and violence in Charlottesville, VA was absolutely heartbreaking. Never did I think that in 2017 we would have large amounts of White Nationalists and Nazi sympathizers marching in America. It was very scary. To see that on display was bad enough, but when I saw the video of a man driving his car into innocent people -- killing one person and injuring many others -- I was in shock and deeply affected. I have been haunted by the images and videos of that domestic terrorist attack.

I know what you are thinking -- why does this belong on a technology site? Fair point. Today, an email that Microsoft CEO Satya Nadella sent to employees leaked online. Since Nadella is the leader of the company, his words don't just impact the employees internally, they also signal the status of Microsoft's culture and overall leadership. Below are Satya Nadella's words, dated August 14, 2017, as obtained by Mike Murphy of Quartz Media.

Continue reading

Mozilla finally offering 64-bit Firefox to Windows users by default

Consumer 64-bit processors have been around for a long time now -- AMD began selling the Athlon 64, for instance, way back in 2003. Windows XP Professional x64 Edition was released by Microsoft in 2005. I was an early adopter at the time, buying that first-ever Athlon 64 and later running that aforementioned version of Windows.

I say all of that because I am shocked that in 2017 it is considered news if a company starts offering a 64-bit version of its Windows software by default. Well, folks, that is exactly what is happening today. Mozilla will now serve 64-bit Firefox by default to 64-bit Windows users when downloading from the web. In other words, if the user agent reports a 64-bit version of Windows, the webpage will offer 64-bit Firefox first. Users of 32-bit Windows will, of course, still be served the 32-bit Firefox variant.

Continue reading

The benefits of intrusion prevention systems in security

Cloud data security

There’s a penchant by many to measure the quality of IPS (Intrusion Prevention System) solutions by the number of threat signatures supported by the vendor. Checkpoint points to how it delivers "1,000s of signature, behavioral and preemptive protections." Fortinet claims its FortiGuard IPS service inspects "over 8,000 signatures consisting of 15,649 rules." Cisco IOS Inline IPS "supports more than 7000 signatures."

Presumably, the more signatures the more thorough the IPS. But is that really the right measure for today’s defending against today’s threat landscape?

Continue reading

StarTech launches U.2 NVMe SSD to PCIe Drive Adapter Expansion Card

SATA is so out of style. Nowadays, all the cool kids are using much-faster NVMe PCIe-based solid state drives that utilize either U.2 or M.2 connectors; I prefer the latter, but I digress. Of course, to maximize the performance of these ultra-fast drives, you will not only need the appropriate connectors, but PCIe 3.0 too. If you don't have the correct connector, all is not lost. Thanks to PCIe adapter cards, you might able to add compatibility to your system without the need of a new motherboard.

While M.2 adapter cards are very commonplace, U.2 variants are not. Today, StarTech is back with another very useful product -- the U.2 to PCIe Drive Adapter Expansion Card. If you don't have a U.2 connector port, but do have a PCIe 3.0 x4 or higher slot, this card will allow you to connect a compatible drive at top speed. It will work with PCIe 1.0 and 2.0 too, albeit at much slower speeds. You can mount the 2.5-inch U.2 drive (15mm, 12.5mm, 9.5mm, 7mm, and 5mm height) directly on the card, meaning there are no unsightly cables.

Continue reading

The importance of proactive defense in enterprise security

business security

The moment a cybercriminal targets an organization, the victim enters a race against time. Every minute that the attacker is able to operate undetected is more time for them to compromise systems, steal data, and cause more harm to their target. The ability to detect an attack and shut it down quickly can make the difference between a minor security incident and a huge breach that costs millions of pounds, or even brings an end to the company itself.

The good news is that organizations seem to be making great strides in detecting security breaches, according to our 2017 Trustwave Global Security Report, which examines the results of thousands of our investigations into security incidents. Across the incidents we investigated in 2016, the median time from intrusion to detection of a compromise had fallen to 49 days, down from 80.5 days in 2015.

Continue reading

Why you should be moving to the cloud

Whilst not a brand-new phenomenon, the cloud has dominated headlines in the technology sector in recent years, as more businesses migrate and harness the benefits associated with it.

Cloud computing involves businesses hosting data, applications and virtual machines (VMs) on servers in remote data centers, which are connected to devices and users through the internet or private networks.

Continue reading

Don't dismiss insider threats when assessing security

Security

When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents of this very nature -- how many times has North Korea or Russia been blamed for hacking the West?

The funny thing is, the cyberthreat that we should be worrying about actually resides in a place that’s a lot closer home, often found within the company building. What I’m talking about is the insider threat. And it’s about time we paid closer attention to it.

Continue reading

A nanotechnology overnight sensation 30 years in the making!

One of my favorite mad scientists sent me a link recently to a very important IEEE paper from Stanford. Scientists at the Stanford Linear Accelerator Center (SLAC) have managed to observe in real time the growth of nanocrystalline superlattices and report that they can grow impressively in only a few seconds rather than the days or weeks they were formerly thought to take. What this means for you and me is future manufacturing on an atomic scale with whole new types of materials we can’t even imagine today.

What’s strange about this is not that these developments are happening but that they took so long to be discovered because my mad scientist has been telling me for over a decade that it was coming.

Continue reading

Thinkware F770 is an attractive high-end dash cam [Review]

For a dash cam to stand out from the crowd it needs to go beyond the basics of recording video. It has to be easy to use. The quality needs to be very good. It has to be reliable in a wide range of conditions. It must not lose footage in the event of a crash. And, last but not least, it needs a couple of differentiating -- but useful -- features to give it an edge in this highly competitive market.

The F770, one of the most attractive dash cams in Thinkware's high-end lineup, promises all those things and more. Question is, just how well does it perform in real life? I've tested it to find out.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.