Latest Technology News

Get 'Linux Administration Best Practices' (worth $33.99) for FREE

Linux is a well-known, open source Unix-family operating system that is the most widely used OS today.

Linux looks set for a bright future for decades to come, but system administration is rarely studied beyond learning rote tasks or following vendor guidelines. To truly excel at Linux administration, you need to understand how these systems work and learn to make strategic decisions regarding them. Linux Administration Best Practices helps you to explore best practices for efficiently administering Linux systems and servers.

Continue reading

Reducing risk: Top strategies for businesses

Risk dial

Navigating the business landscape is important for continually delivering the high-quality service your clients expect. Efficiency and resilience are key, especially in the face of change, in which your business’s ability to adapt is vital for its success.

However, it can be difficult to know which changes to embark on to ensure your longevity, but with a high risk of change comes a high reward. Here, we will discuss the top strategies your business can implement to reduce risks while adopting change.

Continue reading

Happy phishing day to you!

Phishing emails usually try to trick the user into opening an attachment or visiting a website. Often this is by instilling a sense of urgency -- telling you your account is about to expire, for example.

Researchers at NordVPN have uncovered a new tactic involving email birthday cards. After all, if it's your birthday and you've opened several eCards already you're not going to think there's anything phishy about another one.

Continue reading

AI, Machine Learning and Deep Learning in the enterprise: Implications to data storage

Artificial Intelligence (AI) has been a hot topic for a long time, but its impact on our society and in the enterprise are just beginning to be realized. AI and other forms of machine learning and deep learning will revolutionize business, automating repetitive tasks and accelerating outcomes -- all based on huge sets of data.

Developing deep learning applications generally follows a three-step process of:

Continue reading

Phishing up 36 percent in the last quarter of 2022 as attack tools get more sophisticated

Phishing volumes increased 36 percent, with 278.3M unique phishing emails in the fourth quarter of 2022, while malware volumes increased 12 percent QoQ, accounting for 58.9M emails, in the same period.

The latest Phishing and Malware Report from Vade shows the company detected 278.3 million unique phishing emails in Q4, surpassing the previous quarter’s total by 74.4 million. December saw the biggest jump in phishing emails, up 260 percent, as threat actors tried to cash in on the holiday period, this echoes a similar pattern at the end of 2021.

Continue reading

Big tech layoffs have a far-reaching impact

The recent big tech layoffs have profoundly impacted industries outside of technology because the sector has long been seen as a driving force for innovation and economic growth. The layoff announcements by companies like Google, Microsoft and Amazon have raised concerns about the tech industry's future and the ripple effects throughout the economy.

Below are several major tech companies that have laid off employees as they navigate the challenges of a rapidly changing industry:

Continue reading

HTML smuggling -- the latest way to to deliver malware

email attachment

Since Microsoft began the default blocking of macros in documents sent over the internet there's been an increase in the use of HTML files to deliver malware.

Research by Trustwave Spiderlabs reveals a rise in so called 'HTML smuggling' using HTML5 attributes that can work offline by storing a binary in an immutable blob of data within JavaScript code. The embedded payload then gets decoded into a file object when opened via a web browser.

Continue reading

Vulnerabilities in industrial control systems are on the increase

Industrial computer system

The number of CVEs reported via ICS advisories has increased each year, with 2020-2021 seeing a 67.3 percent increase in CISA ICS CVEs, while 2021-2022 saw a two percent increase, according to a new report from SynSaber.

The growing volume of vulnerabilities highlights continued efforts to secure the ICS systems critical to a nation's energy, manufacturing, water, and transportation infrastructure. There's also a growing focus on regulation which means operators in critical infrastructure are under more pressure to analyze, mitigate, and report on new and existing vulnerabilities

Continue reading

Netflix expands password sharing crackdown from Latin America to Canada, New Zealand, Portugal and Spain

Netflix logo and remote control

Having already test driven its paid-for account sharing in Latin America, Netflix has expanded its efforts to end password sharing to four other regions.

Now, users in Canada, New Zealand, Portugal and Spain will no longer be able to share their Netflix account with friends or family outside of their household without paying to do so. The company is pushing the move as a way to give "members greater control over who can access their account", but the reality is about money.

Continue reading

Investigation concludes that Microsoft's Activision Blizzard deal 'could harm gamers'

Xbox controller

An investigation by the Competition and Markets Authority (CMA) has concluded that Microsoft's proposed $68.7 billion acquisition of Activision Blizzard could lead to higher prices, fewer choices and less innovation.

The UK regulator has been looking into the planned takeover for a number of months, and has now warned that the merger, "could make Microsoft even stronger in cloud gaming, stifling competition in this growing market". The CMA also says there is a risk of, "weakening the important rivalry between Xbox and PlayStation gaming consoles", ultimately harming gamers who cannot afford expensive consoles.

Continue reading

Twitter reveals scant details of its controversial changes to API access, including 'a new form of free access'

Twitter on mobile with silhouetted person

There has been a lot of backlash against Twitter's plans to stop offering free access to its API, a move that will result in many bots, apps and services no longer working. Free access to the Twitter API was due to end on February 9, but now the company has given this cut-off a very brief extension as it reveals details of paid API access tiers, as well as sketchy information about a new, limited, free tier.

The extension to free access is very brief indeed -- just an extra four days, making the new end date February 13. Twitter has also shared information about pricing for what it describes as "paid basic access" to the API. While on the face of things, the $100 per month price tag is not high, for hobbyist developers with bots and apps, this will be too much.

Continue reading

Canada pioneers standard to improve IT transformation efficiency

digital transformation

Rolling out digital transformation projects involves navigating increasingly strict data protection regulations, while at the same time coping with risk and inefficiency associated with data silos and copy-based data integration.

Today a pioneering national standard approved by the Standards Council of Canada has been published aimed at providing organizations with a framework to accelerate the delivery of digital innovation projects.

Continue reading

Google leaks its own Pixel 7 Super Bowl commercial for some reason

Super Bowl LVII is happening this upcoming Sunday, and men across America are excited to watch the big game. While some women will also watch the Super Bowl, many of them will only be watching for the TV commercials. You see, even if you aren't a fan of football, the advertisements have become a spectacle in their own right.

The cost of running a Super Bowl commercial is very expensive, which makes it quite odd that Google has leaked its Pixel 7 ad early. Yes, over on YouTube, you can view the search giant's Super Bowl commercial now, meaning there will be no excitement surrounding it come Sunday.

Continue reading

2023: Zero Trust authentication is on the horizon

zero trust architecture

Trust in corporate networks has never been more important. The rapid adjustment to more distributed workforces -- and an associated explosion of devices -- has dramatically increased cyber threat levels. As a result, Zero Trust has emerged as the de facto cybersecurity framework for operating in the business.

The NCSC (National Cyber Security Center) defines a Zero Trust architecture as "an approach to system design where inherent trust in the network is removed. Instead, the network is assumed hostile and each access request is verified, based on an access policy."

Continue reading

Windows 7's and 8.1's end of support is a massive chance for underdogs like Mozilla

Last month, Microsoft ended support for its Windows 7 and 8.1 operating systems officially. Windows 7 was kept alive by the company for business and Enterprise customers for the past three years through an Extended Security Updates program, but that ran out on the same day as support for Windows 8.1 ended.

Google and Microsoft announced that their browsers, Chrome and Edge, would not support both operating systems after support end. Chrome 109 and Edge 109, released in January 2023, are the last supported versions. The next stable versions, scheduled for a release in early February 2023, won’t support Windows 7 or 8.1 anymore.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.