Touching VPN logo

VPN demand surges in the face of government social media restrictions

Governments, particularly those with a more authoritarian bent, really aren't keen on social media as it threatens their ability to control the narrative.

They especially don't like X since Elon Musk's takeover and stated commitment to free speech. In Venezuela the government recently banned the platform for 10 days. Even in the UK fingers have been pointed at the influence of social media following recent riots.

By Ian Barker -
Generative-AI

Get 'Generative AI: Navigating the Course to the Artificial General Intelligence Future' FREE for a limited time

In Generative AI: Navigating the Course to the Artificial General Intelligence Future, celebrated author Martin Musiol -- founder and CEO of generativeAI.net and GenAI Lead for Europe at Infosys -- delivers an incisive and one-of-a-kind discussion of the current capabilities, future potential, and inner workings of generative artificial intelligence.

In the book, you'll explore the short but eventful history of generative artificial intelligence, what it's achieved so far, and how it's likely to evolve in the future. You'll also get a peek at how emerging technologies are converging to create exciting new possibilities in the GenAI space.

By Wayne Williams -
Deepfake

Why a 'Swiss cheese' approach is needed to combat deepfakes [Q&A]

Deepfakes are becoming more and more sophisticated, earlier this year a finance worker in Hong Kong was tricked out of millions following a deepfake call.

With the deepfake fast becoming a weapon of choice for cybercriminals, we spoke to Bridget Pruzin, senior manager -- compliance and risk investigations and analysis at Convera, to learn why she believes a 'Swiss cheese' approach, layering controls like unique on-call verification steps and involving in-person verification, is crucial to effectively defend against these scams.

By Ian Barker -
Win-10-2024-Hero

Forget Windows 11, the stunning Windows 10 2024 Edition is the operating system you want

Microsoft is set to pull the plug on Windows 10 in the near future, leaving people with the choice of upgrading to the AI-heavy Windows 11, or continuing to use an unsupported operating system -- and all of the dangers that entails.

Microsoft will offer paid support for anyone who wishes to keep using Windows 10, and 0patch will keep Windows 10 secure for at least five more years after Microsoft abandons it, but what we really need is a more modern version of that OS.

By Wayne Williams -
Machine-Learning-with-Python

Get 'Machine Learning with Python: Unlocking AI Potential with Python and Machine Learning' FREE for a limited time

The course starts by setting the foundation with an introduction to machine learning, Python, and essential libraries, ensuring you grasp the basics before diving deeper.

It then progresses through exploratory data analysis, data scrubbing, and pre-model algorithms, equipping you with the skills to understand and prepare your data for modeling.

By Wayne Williams -
cloud-migration

Mastering tenant-to-tenant cloud migrations: Strategies for success

Tenant-to-tenant cloud migrations have become pivotal for organizations striving to boost operational efficiencies and seamlessly adapt to dynamic changes such as mergers, acquisitions, and organizational restructuring.

These migrations are about more than transferring data and applications between cloud environments. They also represent a strategic move towards greater scalability and improved resource management, enabling businesses to respond more agilely to market demands and growth opportunities.

By Aaron Wadsworth -
Cybersecurity-blocks

Pool your cybersecurity resources to build the perfect security ecosystem

Cybersecurity has never been something to set once and leave running in the background -- it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organisations struggle to secure their networks against rapidly changing cyber threats. Ransomware attackers have understood the value of targeting smaller organisations and tailoring attacks to take advantage of businesses they believe will pay up immediately (and often with the backing of cyber insurance) rather than invest in defences. 

Tight security for data and resources is now the difference between operations running smoothly or being disrupted to the point that businesses are forced to close entirely. But how can SMBs achieve comprehensive security management and threat intelligence on a budget? Partnerships and alliances provide the solution.

By Brian Sibley -
Cybersecurity-For-Dummies-2nd-Edition

Get 'Cybersecurity For Dummies, 2nd Edition' FREE for a limited time

Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure -- and it doesn’t take a degree in computer science to make it happen!

Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company’s, too).

By Wayne Williams -
Microsoft 365 Office 365

Microsoft reveals Office security flaw that has not yet been patched

Various versions of Microsoft Office have a serious security vulnerability which could expose sensitive data to an attacker. Worryingly, while disclosing the flaw, Microsoft has also conceded that there is no patch available.

The issue is being tracked as CVE-2024-38200 and it affects a variety of edition of the office suite -- namely the 32- and 64-bit versions of Microsoft Office 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, and Microsoft 365 Apps for Enterprise. While there is no fix available right now, one is expected in the coming days.

IMG_3046-1

Microsoft exposes vulnerabilities in OpenVPN -- millions of devices at risk

Microsoft researchers have revealed a series of medium-severity vulnerabilities within OpenVPN, an essential open-source VPN solution embedded in myriad routers, PCs, and smart devices worldwide. The vulnerabilities, if exploited, could allow attackers to execute remote code and escalate privileges, gaining unauthorized access to potentially millions of devices.

The research team demonstrated how these vulnerabilities could be chained together to form a potent attack sequence, culminating in attackers taking complete control over affected devices. This complex attack vector requires user authentication and a sophisticated understanding of OpenVPN’s architecture, highlighting the need for robust security measures.

By Brian Fagioli -
Shortcuts

How to remove arrows from Windows shortcuts

Windows shortcuts are a quick and convenient way to access your most-used files and applications, but the small arrow overlay on these icons can be aesthetically unappealing to some users. Fortunately, you can easily remove these arrows from your shortcuts, making your desktop and File Explorer look cleaner.

In this article, we'll walk you through two different methods: using the Windows Registry, and using a free third-party tool.

By Wayne Williams -
Data-Breach-Hand

Recovering from a data breach requires an effective cyber resilience strategy

The exposure of an organization's sensitive data or personal customer records can be detrimental to a company’s reputation. It may also result in severe financial implications due to regulatory fines and associated legal fees. Therefore, organizations must enhance their cybersecurity landscape as cybercrime and ransomware attacks increase exponentially.

This is supported by findings from the recent UK Cyber Security Breach Survey 2024, which states that 50 percent of UK businesses reported to have suffered a cyber-attack or breach in the last 12 months. Equally concerning is the global average cost of a breach which reached up to $4.45 million in 2023 according to Statista.

By Sam Woodcock -
Futuristic robot artificial intelligence concept.

Bridging the gap: innovations in AI safety and public understanding

The rise of artificial intelligence (AI) has brought immense opportunities and significant challenges. While AI promises to revolutionize various sectors, from healthcare to finance, the erosion of public trust in AI safety is becoming a critical concern.

This growing skepticism is fueled by factors such as a lack of transparency, ethical considerations, and high-profile failures. Addressing these issues cannot be overstated, as public trust is essential for the widespread acceptance and successful integration of AI technologies.

By Dev Nag -
onegamelauncher

Best Windows apps this week

Six-hundred-seven in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft is working on separating Updates and the Library in Microsoft Store. Available to Insiders at the time of writing, it should help users check for updates quicker.

By Martin Brinkmann -
Security

The emerging trends that security teams need to address [Q&A]

The world's critical national infrastructure remains on high alert. The National Cyber Security Centre in the UK and agencies in the US, Australia, Canada and New Zealand have all detailed how threat actors have been exploiting native tools and processes built into computer systems to gain persistent access and avoid detection.

We spoke to Chase Richardson, lead principal for cybersecurity and data privacy at Bridewell to discuss the critical trends and emerging dangers that cyber teams need to continue to watch out for?

By Ian Barker -
Load More Articles