New platform protects industrial IoT devices


Internet of Things devices are the latest threat vector that businesses have to deal with, introducing a potential extra weakness into corporate networks and leading experts to warn of increased risk.
To help guard against the threat, Mocana Corporation is introducing a new security platform designed to protect IoT devices and associated device-to-cloud communications.
Cobbler stores secret notes in an encrypted file


Cobbler is a tiny portable utility which stores plain text notes -- passwords, bank details, whatever you need to keep private -- in a secure and encrypted file.
Launch the program and you’re prompted for a master password. Enter something lengthy and secure, or press Ctrl+G to generate a strong passphrase for you, and a basic editor appears.
The role of IT decision makers in purchasing new technology


IT decision makers (ITDM) in the EMEA region serve as their company's "gatekeepers" and primary influencers, when it comes to choosing new technology purchases for the company. This is according to a new report by Spiceworks, which digs deeper into the roles of ITDMs and business decision makers (BDMs) when it comes to purchasing new technologies.
The study, "ITDM vs. BDM: Tech Purchase Superheroes," says BDM’s role is to "give final approval for technology funds and purchases."
71 percent of Android phones on major US carriers have out of date security patches


Slow patching of security flaws is leaving many US mobile users at risk of falling victim to data breaches according to the findings of a new report.
The study from mobile defense specialist Skycure analyzed patch updates among the five leading wireless carriers in the US and finds that 71 percent of mobile devices still run on security patches more than two months old.
5 things to keep in mind when building an Alexa skill


A team of us at Red Badger, which consisted of myself, Marcel, Graham and Roman, had two weeks to play around with Amazon’s Alexa and build a sommelier skill to recommend wine pairings to your food. We’re writing a four-part series to take you through what we learned from our varied perspectives.
There’s been so many blog posts written about the rise of chatbots and Voice User Interface (VUI), some even marking 2017 to be the year of the bots.
GNOME 3.24 Linux desktop environment is here


My absolute favorite desktop environment for Linux is GNOME. Quite frankly, if the DE went away tomorrow, I might have to rethink my use of Linux entirely. Yeah, I am that passionate about it. Environment aside, the GNOME also includes a collection of applications, creating a coherent user experience.
Today, GNOME reaches version 3.24, code-named "Portland." While it looks great, it is hardly a monumental change. Moving from 3.22, we see some new features and applications, but on the UI front, there are improved icons too. In fact, they have doubled from 256×256px to 512×512px! Not only can these icons scale larger, but they are more vibrant and intricate too. Overall, there are many new aspects of GNOME to excite fans.
User-Agent based attacks are a low-key risk that shouldn't be overlooked


Old, unpatched vulnerabilities allow hackers to take over systems using the User-Agent string -- an elementary part of virtually every HTTP request.
It is a known fact that while the majority of vulnerabilities discovered or reported are fixed by the vendor and a patch is issued, many systems end up not being patched in a timely manner or even at all, for that matter. There are many possible reasons for that, the most common being:
DoubleAgent exploit uses Windows' Microsoft Application Verifier to hijack antivirus software


Security researchers at Cybellum have revealed details of a zero-day exploit that makes it possible for an attacker to take full control of antivirus software. The technique can be used to take control of just about any application, but by focusing on antivirus tools, the illusion of safety offered to victims means they are likely to be completely unaware of what is happening.
The attack works by exploiting the Microsoft Application Verifier that's built into Windows. It is possible to replace the tool with a custom verifier which can then be used to inject malicious code into any chosen application. A number of well-known antivirus tools -- including Avast, BitDefender, ESET, Kaspersky, and F-Secure -- are vulnerable, while patches have been released for others.
Three penetration testing tips to out-hack hackers


It should come as no surprise that hackers have been busy lately. According to my go-to resource on hacking stats, the Identify Theft Resource Center, breaches jumped from 780 in 2015 to 1,093 in 2016. Is there a way to take a proactive approach to data security that doesn’t involved investing in more firewalls or virus protection software and ultimately get to the real-source of vulnerabilities?
Yes and yes. The answer is penetration testing, or pen testing for short. It’s a white-hat approach that challenges organizations to expose the vulnerabilities inside their own systems by understanding how a cybercriminal could exploit their internal information.
Three UK suffers new data breach


A couple of bizarre incidents happened to Three users in the UK recently, and the media are suspecting the company might be facing a new data breach.
According to a report by The Guardian, some customers, logging into their accounts, were "presented with the names, addresses, phone numbers and call histories of strangers."
OnePlus 3T gets Midnight Black color option as new limited edition


When OnePlus unveiled an all-black OnePlus 3T, dubbed the "colette edition," I did not believe that this color option would be available again in the future. It was, after all, a limited edition. As it turns out, OnePlus had other plans. This is one of those times I'm glad I was wrong.
OnePlus just took the wraps off the Midnight Black OnePlus 3T, which, like the colette edition, is also a limited edition. However, unlike the previously mentioned model, OnePlus fans will have a better chance of getting one, as there will be more units offered and they will be more easily available.
Businesses make automated security a part of DevOps


Mature development organizations make sure automated security is built into their DevOps practice early, everywhere and at scale, according to a new report by Sonatype.
The report, entitled 2017 DevSecOps Community Survey, is based on a poll of 2,292 IT professionals, and also says IT organisations continue to struggle with data breaches.
Bear 1.1 unveils loads of improvements, including improved tagging, export


Shiny Frog has released Bear 1.1, its Evernote-baiting, notetaking app for Mac and iOS. Mac users gain Touch Bar support and wider drag-and-drop support, while iOS users can now take "smart" web clippings using the app extension.
Although Bear operates a two-tier platform, with free and Pro licenses available, the update treats both equally, providing new features for both groups of users as it aims to stake a claim in the note organizing marketplace.
Now you can broadcast live to Facebook from your desktop or your favorite games


Facebook Live has been with us for a little while now, but it has been limited by the fact that it has only been possible to broadcast from mobile devices. Today this changes as Facebook opens up broadcasting to desktop and laptop users too.
On top of this, Facebook is adding the ability to stream from other software or external hardware. This has many uses, but the social network suggests that gamers might like to use it to broadcast their gaming sessions live online.
New Google report shows Android security is improving


Today Google published its third annual Android Security Year in Review, the day after the launch of the developer preview of Android O. Looking back at 2016, the report details the steps the company has taken to keep Android users and their data safe. Google cites a crackdown on Potentially Harmful Apps as a particular success, and points to the fact that security updates have been issued to 735 million devices.
But it’s not all good news. Many of the security improvements are to be found in Android 7 Nougat which is only available on a limited number of devices. Additionally, a large number of handsets are not eligible for the monthly security updates the company pushes out.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.