Latest Technology News

Malicious DDoS attacks up by 150 percent

DDoS attack

In 2022, the number of DDoS attacks grew 150 percent globally compared to the previous year, while the number of attacks in the Americas rose even faster, increasing 212 percent compared to 2021.

These figures are from the 2022 Global Threat Analysis Report released today by Radware which also shows the frequency of DDoS attacks saw a significant uptick. Globally, organizations mitigated an average of 29.3 attacks per day during the fourth quarter of 2022, 3.5 times more compared to 8.4 attacks per day at the end of 2021.

Continue reading

Java underpins enterprise app modernization plans

A new report from provider of Java web application platforms, Vaadin, looks at how enterprises build, deploy, and modernize Java applications in 2023 and also reveals trends and future plans for the use of Java in enterprise applications.

Java is used heavily for both internal (64 percent) and customer-facing (62 percent) applications, which include both SaaS and internet-based services. However, Almost half of Java applications still need modernization.

Continue reading

Microsoft fixes security issues in Windows 11 22H2 with KB5022845 update

Laptop running Windows 11

With Patch Tuesday having rolled around once again, Microsoft has issued its regular batch of releases. We've already talked about the KB5022836 update for Windows 11 21H2, but if you're running Windows 11 22H2, you will need the KB5022845 update instead.

The KB5022845 update takes Windows 11 up to build 22621.1265, and it also includes the changes and improvements that were part of the KB5022360 update preview released last month.

Continue reading

Microsoft releases KB5022836 update to fix Windows 11 21H2 security issues

Windows 11 monitor

It is the time of the month when Microsoft releases updates for Windows, and as such the company has released a pair of patches for Windows 11. Specifically, we have two cumulative updates in the form of KB5022845 for Windows 11 22H2 and KB5022836 for Windows 11 21H2.

The KB5022836 update takes Windows 11 up to build 22000.1574, and it also includes the changes and improvements that were part of the KB5019274 update preview released last month.

Continue reading

Get 'Launching & Building a Brand For Dummies' (worth $16.00) FREE for a limited time

These days, customers want to have a deeply felt connection to the brands behind the products they're purchasing, which means that if you're starting a business, a strong brand DNA has got to be part of your creative process from day one. And it needs to be more than just an abstract idea: to give your brand life -- and a bigger chance of surviving against the competition -- you need to have a standout launch strategy and a set plan for growing your brand in a noisy marketplace.

In Launching & Building a Brand For Dummies, Amy Will -- who launched her first business at just 24-years-old and has been the brains behind four strong and buzzworthy brands -- covers everything from crafting a powerful brand identity and planning that all-important launch to being prepared to scale up as you begin to take off.

Continue reading

Digital transformations in 2023: How to focus on adoption to drive success

digital transformation

As the world seems to innovate just about every experience in our lives, from online banking to ordering lunch or submitting an expense report, digital transformation continues to enable new possibilities. Research shows the average enterprise invests $48 million annually on digital transformation projects. These projects include improving the experience of enterprise apps for customers, enabling smoother hybrid work experiences for employees, or providing new and improved technology for staff to to increase their productivity, efficiency, and sense of accomplishment.

Taking the broadest possible perspective, the overall spend on IT by enterprises worldwide in 2022 was $4.4 trillion, per Gartner. This spending is forecast to continue increasing in 2023.

Continue reading

Real-time Ubuntu delivers for enterprise workloads

Today Canonical has announced the general availability of real-time Ubuntu 22.04 LTS. This enterprise-grade offering is aimed at the industrial, telecom, automotive, aerospace and defense sectors, as well as public sector and retail.

Real-time Ubuntu allows organizations to run their most demanding workloads and develop a wide range of time-sensitive applications on the open-source operating system.

Continue reading

Getting to grips with cloud-native application protection platform (CNAPP) security -- to protect everything, everywhere, all of the time

Cloud security

As many CISOs are discovering, protecting cloud native environments requires a fundamental shift in thinking when it comes to keeping threats at bay. The huge change in the technology stack, the rapid delivery of software updates, and the unfettered use of open source, all present new challenges that old-style security tools cannot resolve.

Rather than using different point solutions that only solve specific security issues and need to be manually stitched together, Gartner recommends adopting a unified and end-to-end full lifecycle solution that starts in development and extends to deliver comprehensive runtime protection. In other words, a cloud-native application protection platform (CNAPP).

Continue reading

Connected device vendors devote more effort to security and safety

Wireless internet of things

More and more connected systems are being used to deliver the essentials of our everyday lives. From the water and power that comes into our homes to the medical treatment we receive, the 'Extended Internet of Things' (XIoT) is involved.

A new report on the state of XIoT security from Claroty's Team82 researchers shows vulnerabilities in these cyber-physical systems disclosed in the second half of 2022 declined by 14 percent since hitting a peak in 2021. At the same time vulnerabilities found by internal research and product security teams have increased by 80 percent over the same period, indicating that vendors are taking the risk seriously.

Continue reading

Top enterprise concerns raised by so called 'romance' or 'pig butchering scams'

Romance Scam

During "romance week" and Valentine's Day, your heart can be stolen in the blink of an eye, and so can your money. The FBI has warned of "romance" scams, centering the bulletin around the celebration of love, which demonstrates that it’s not just a box of chocolates that’s seducing people, it’s scammers and cyber criminals. Staggering new data from the FTC shows that last year, nearly 70,000 people reported a romance scam, and reported losses hit $1.3 billion. The median reported loss was $4,400.

Romance scams are a variation of what’s called "pig butchering," a type of social engineering attack that alludes to the practice of fattening up a hog before slaughtering it. The approach combines some time-tested elements of fraud -- such as gaining trust. It relies on the effectiveness of relationships nurtured on social media and the ease with which currencies can be moved electronically. In simpler terms, scammers are posing as lovers, gaining the trust of their fake beau, and then asking them for money for gifts, procedures, plane tickets, you name it.

Continue reading

Plugable UD-MSTHDC is a 'Works With Chromebook' docking station

What is a Chromebook? Quite simply, it is a laptop running Google's Linux-based ChromeOS operating system. However, when you connect one of these notebooks to a monitor, keyboard, and mouse, it becomes a very capable makeshift desktop computer.

The most elegant way to transform a laptop into a desktop is with a USB-C docking station. But how can you be sure your Chromebook is compatible with such an accessory? Well, if the dock is officially certified as "Works With Chromebook," then you can be assured that it will work flawlessly.

Continue reading

Complex PAM solutions mean organizations pay for features they don't need

dollar keyboard

Privileged access management (PAM) solutions are too complex, with 68 percent of organizations paying for features they don't need, according to a new report.

The report from Keeper Security finds 91 percent of organizations employ PAM and 84 percent of global IT leaders say they want to simplify their PAM solutions in 2023.

Continue reading

Twitter delays the rollout of paid API access yet again, and confirms researchers will lose free access

Black Twitter logo

Free access to the Twitter API was meant to end yesterday, but the company has announced that there will be a brief stay of execution. Having already extended the cut-off by four days, Twitter now says that "we will be delaying the launch of our new API platform by a few more days".

The delay is blamed on "an immense amount of enthusiasm for the upcoming changes with Twitter API", but the lack of detail and clarity about what is happening is causing confusion and anger. Over the weekend, the company also contacted academic researchers to inform them that they will be losing free access to the API as well; it had previously been expected that such education and research-related usage would remain free.

Continue reading

Real-world analysis finds the severity of many CVEs is overrated

The latest report from JFrog looks at the most prevalent vulnerabilities in 2022 with an in-depth analysis of open source security vulnerabilities that have most impact for DevOps and DevSecOps teams.

The report shows that the severity of six of the top 10 CVEs was overrated, meaning they scored higher in the NVD rating than in JFrog's own analysis. In addition the CVEs appearing within enterprises most frequently are low-severity issues that were simply never fixed.

Continue reading

OSINT -- the security technique you might never have heard of [Q&A]

Traditionally used by intelligence agencies and the military, the OSINT technique is used to gather information about people, organisations or companies from freely accessible sources, then analyse the data obtained and draw useful conclusions and information from it.

But IT security experts can also benefit from the technique to discover potential vulnerabilities and remediate them before they're exploited by attackers.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.