Latest Technology News

Losing customer trust is a major concern for DDoS targets

ddos_attack

The loss of trust and confidence of customers is the most damaging consequence of a DDoS (distributed denial of service) attack, a new survey by Corero Network Security says.

In the annual survey, entitled DDoS Impact Survey, losing trust is the most damaging consequence for 50 percent of those surveyed, followed by lost revenue, for 34 percent. The surveyed include IT decision makers (ITDMs), network operators and security experts that were present at the recently held RSA 2016 conference.

Continue reading

Google partners with Microsoft and other email providers to bolster Gmail encryption

Data encryption

If you are an email user, there is a very good chance you use Google's ubiquitous Gmail service. While there are countless other options, such as Outlook, AOL, Yahoo and more, the search giant's offering is quite popular. It is easy to see why -- it is easy to use, secure, and can double as a Google account for things such as Play access on the wildly popular Android.

Today, Google announces that it is making Gmail even more secure. With so much talk about enryption in the news nowadays, the search giant is enhancing its email service with improved TLS encryption. How is it doing this? By working with other email providers, such as Microsoft to make sure encrypted emails remain that way in transmission.

Continue reading

Docker comes to Mac and Windows

Docker

Today is the third birthday of the Docker containerization system and to celebrate the company is launching a beta program for Mac and Windows versions of its software.

It offers an integrated, easy-to-deploy environment for building, assembling, and shipping applications from Mac or Windows as well as having many improvements over Docker Toolbox.

Continue reading

Microsoft releases more details on its Edge Translator extension

Windows-10 key

Last week Microsoft finally revealed extensions for its Edge web browser for Windows 10. It began with just a handful of add-ons, but more are on the way. We previously told you how to install them, including the translator, but now Microsoft is adding a bit more information.

The new Edge extensions are currently considered previews and are only available to Windows 10 Insiders, and you'll need Build 14291 to use them.

Continue reading

The rise of the advanced persistent bots

botnet herder

Overall bad bot activity is decreasing, but the number of advanced persistent bots is up according to a new report.

The 2016 Bad Bot Landscape Report from Distil Networks reveals that 88 percent of all bad bot traffic has one or more characteristics of an advanced persistent bot, one that's able to mimic human activity and evade detection.

Continue reading

Zero day OS X flaw can bypass System Integrity Protection

Bitten apple

Security company SentinelOne has released news of a major flaw in Apple OS X systems that can allow the bypassing of the latest System Integrity Protection security feature.

This zero day vulnerability is present in all versions of Apple's OS X operating system. It has been reported to Apple and patches will be available soon. SentinelOne’s lead OS X security expert, Pedro Vilaça, is presenting the full findings on this vulnerability today at SysCan360 2016 in Singapore.

Continue reading

You might want to hold off on upgrading to iOS 9.3, OS X 10.11.4 El Capitan [Update]

hands up no way stop

Apple earlier this week released new versions of its mobile and Mac operating systems, namely iOS 9.3 and OS X 10.11.4 El Capitan. They come with a significant number of changes, like Night Shift mode, extended Wi-Fi calling support and lots of security fixes, but also introduce bugs which are causing major issues for some early adopters.

It is not unheard of a new iOS or OS X release to break things, as Apple seems to be dealing with these kind of things quite frequently nowadays. Not everyone may be affected, but if you have an iPad 2 or use Apple's messaging services often on your Mac you might want to hold off on performing the upgrade.

Continue reading

Uber announces bug bounty program

Google relaxes Project Zero bug disclosure policy after Microsoft complaints

Uber is calling on independent computer researchers and experts to find weaknesses in its system as the transportation firm is set to release its technical map.

As Uber jumps into the bug bounty bandwagon -- a philosophy that has long been advocated by the open-source software movement -- it details its software infrastructure to the public, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.

Continue reading

Logitech G900 Chaos Spectrum wireless gaming mouse outperforms wired mice

G900_Chaos_Spectrum

Wireless mice are a tricky situation. On the one hand, they eliminate unsightly wires, creating a more aesthetic desktop look. The downside, of course, is the need of batteries. Whether it is rechargeable or not, it can be a total bummer when the juice runs out. Hardcore gamers in particular just don't have time for such things -- depleted batteries can cause lost matches and other frustrations. Not to mention, wired mice can have less lag, offering better performance.

Today, Logitech announces a gaming-focused mouse. Called the G900 Chaos Spectrum, it features a selectable DPI between 200 and 12,000. While wireless gaming mice are nothing new, the company claims this model has advanced wireless technologies, offering better performance than wired mice. That is quite the bold statement -- is it realistic?

Continue reading

Reclaim lost disk space on a USB key with imageUSB

ImageUSB.200.175

There are many tools to help you customize a USB flash drive. You could make it bootable, run one or more LiveCDs, lock it to prevent unauthorized access, create encrypted storage areas, and more.

This will often work just as you expect, but sometimes, when you try to use the flash drive to store files again, you might find that some of its capacity has disappeared.

Continue reading

User error is the leading cause of data loss in SaaS applications

data loss

Accidental deletion of information is the leading cause of data loss from SaaS applications, responsible for 43 percent in the US and 41 percent in the UK, ahead of data loss caused by malicious insiders and hackers.

This is among the findings of a new survey of IT professionals in the US and UK from cloud backup specialist Spanning which also has insights into who is responsible for SaaS data protection, organizational confidence in SaaS data protection, and the top concerns surrounding moving data to the cloud.

Continue reading

Police: if you fall victim to online fraud, it's your own fault

credit card phishing

Victims of online fraud are to blame for their misfortune and should not be rewarded with a refund for money they lose. This is the view of UK Metropolitan police commissioner Sir Bernard Hogan-Howe who says that banks should not pay money lost to online fraud as the victims have not taken their security seriously.

Rather than offering refunds to customers, banks should instead be encouraging them to use stronger password, keep antivirus software up to date, and generally be more careful. It's a view that’s certainly going to prove controversial and raises the question of whether the carrot or the stick is the best approach to tackling online fraud.

Continue reading

90 percent of US federal agencies are vulnerable to data threats

unknown threat

According to new research 90 percent of IT security leaders in US federal agencies say they feel vulnerable to data threats.

In addition 61 percent have experienced a past data breach, with nearly one in five indicating a breach in the last year. This is among the findings of the US Federal Government Edition of the 2016 Vormetric Data Threat Report from enterprise data protection company Vormetric and 451 Research.

Continue reading

GNOME 3.20 'Delhi' Linux desktop environment is here, and it looks amazing

gnomephoto

One of the great things about Linux-based operating systems is the ability to change the user interface by way of desktop environment. If you like Ubuntu, for instance, but don't like Unity, you can choose an alternative such as KDE, Xfce, or GNOME, to name a few.

While GNOME 3x was initially quite controversial for its abrupt design change from 2x, it has evolved into something quite remarkable -- my favorite such DE. Actually, GNOME 3 is much more than a pretty UI -- it is a design philosophy and suite of useful programs. Today, it reaches a major milestone with 3.20. It features many enhancements, such as improved Wayland support.

Continue reading

IT pros: Security budgets are not growing fast enough

Cloud money

As an answer to the ever increasing threats of cyber-attacks, the security budgets across various industries are growing, a new survey by The Institute of Information Security Professionals (IISP) suggests.

However, the rise in budgets is not enough to tackle the problem.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.