Latest Technology News

Mastering tenant-to-tenant cloud migrations: Strategies for success

Tenant-to-tenant cloud migrations have become pivotal for organizations striving to boost operational efficiencies and seamlessly adapt to dynamic changes such as mergers, acquisitions, and organizational restructuring.

These migrations are about more than transferring data and applications between cloud environments. They also represent a strategic move towards greater scalability and improved resource management, enabling businesses to respond more agilely to market demands and growth opportunities.

Continue reading

Pool your cybersecurity resources to build the perfect security ecosystem

Cybersecurity-blocks

Cybersecurity has never been something to set once and leave running in the background -- it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organisations struggle to secure their networks against rapidly changing cyber threats. Ransomware attackers have understood the value of targeting smaller organisations and tailoring attacks to take advantage of businesses they believe will pay up immediately (and often with the backing of cyber insurance) rather than invest in defences. 

Tight security for data and resources is now the difference between operations running smoothly or being disrupted to the point that businesses are forced to close entirely. But how can SMBs achieve comprehensive security management and threat intelligence on a budget? Partnerships and alliances provide the solution.

Continue reading

Get 'Cybersecurity For Dummies, 2nd Edition' FREE for a limited time

Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure -- and it doesn’t take a degree in computer science to make it happen!

Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company’s, too).

Continue reading

Microsoft reveals Office security flaw that has not yet been patched

Microsoft 365 Office 365

Various versions of Microsoft Office have a serious security vulnerability which could expose sensitive data to an attacker. Worryingly, while disclosing the flaw, Microsoft has also conceded that there is no patch available.

The issue is being tracked as CVE-2024-38200 and it affects a variety of edition of the office suite -- namely the 32- and 64-bit versions of Microsoft Office 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, and Microsoft 365 Apps for Enterprise. While there is no fix available right now, one is expected in the coming days.

Continue reading

Microsoft exposes vulnerabilities in OpenVPN -- millions of devices at risk

Microsoft researchers have revealed a series of medium-severity vulnerabilities within OpenVPN, an essential open-source VPN solution embedded in myriad routers, PCs, and smart devices worldwide. The vulnerabilities, if exploited, could allow attackers to execute remote code and escalate privileges, gaining unauthorized access to potentially millions of devices.

The research team demonstrated how these vulnerabilities could be chained together to form a potent attack sequence, culminating in attackers taking complete control over affected devices. This complex attack vector requires user authentication and a sophisticated understanding of OpenVPN’s architecture, highlighting the need for robust security measures.

Continue reading

How to remove arrows from Windows shortcuts

Windows shortcuts are a quick and convenient way to access your most-used files and applications, but the small arrow overlay on these icons can be aesthetically unappealing to some users. Fortunately, you can easily remove these arrows from your shortcuts, making your desktop and File Explorer look cleaner.

In this article, we'll walk you through two different methods: using the Windows Registry, and using a free third-party tool.

Continue reading

Recovering from a data breach requires an effective cyber resilience strategy

The exposure of an organization's sensitive data or personal customer records can be detrimental to a company’s reputation. It may also result in severe financial implications due to regulatory fines and associated legal fees. Therefore, organizations must enhance their cybersecurity landscape as cybercrime and ransomware attacks increase exponentially.

This is supported by findings from the recent UK Cyber Security Breach Survey 2024, which states that 50 percent of UK businesses reported to have suffered a cyber-attack or breach in the last 12 months. Equally concerning is the global average cost of a breach which reached up to $4.45 million in 2023 according to Statista.

Continue reading

Bridging the gap: innovations in AI safety and public understanding

The rise of artificial intelligence (AI) has brought immense opportunities and significant challenges. While AI promises to revolutionize various sectors, from healthcare to finance, the erosion of public trust in AI safety is becoming a critical concern.

This growing skepticism is fueled by factors such as a lack of transparency, ethical considerations, and high-profile failures. Addressing these issues cannot be overstated, as public trust is essential for the widespread acceptance and successful integration of AI technologies.

Continue reading

Best Windows apps this week

Six-hundred-seven in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft is working on separating Updates and the Library in Microsoft Store. Available to Insiders at the time of writing, it should help users check for updates quicker.

Continue reading

The emerging trends that security teams need to address [Q&A]

The world's critical national infrastructure remains on high alert. The National Cyber Security Centre in the UK and agencies in the US, Australia, Canada and New Zealand have all detailed how threat actors have been exploiting native tools and processes built into computer systems to gain persistent access and avoid detection.

We spoke to Chase Richardson, lead principal for cybersecurity and data privacy at Bridewell to discuss the critical trends and emerging dangers that cyber teams need to continue to watch out for?

Continue reading

Microsoft warns that Iran is using cyber operations to influence the US 2024 election, just like China and Russia

Trump Harris 2024

Every country in the world has a vested interest in the outcome of the US election in November. The choice of either Donald Trump or Kamala Harris will have huge impact around the globe, and there are some countries that are actively engaged in trying to sway voters and influence 2024 US election.

That the likes of Russia and China are engaged in targeting the result of the poll is unsurprising, but Microsoft has issued a warning that Iran is also planning to influence this year's US presidential election. A report from the Microsoft Threat Analysis Center highlights evidence of Iranian cyber-influence operations which have already been running for months.

Continue reading

TUXEDO InfinityFlex 14: The Linux answer to Microsoft Windows 11 convertibles

TUXEDO Computers has unveiled the InfinityFlex 14, a 3-in-1 Linux convertible PC that stands as a compelling alternative to Windows 11 convertible laptops. This device is designed to accommodate various user needs by seamlessly transitioning between a laptop, tablet, and touch monitor.

The InfinityFlex 14 integrates a 14-inch matte touchscreen with a resolution of 1920x1200 pixels in a 16:10 aspect ratio, offering 400 nits of brightness and full sRGB color gamut coverage. It's well-suited for both indoor and outdoor use, featuring MPP 2.0 pen support with 4096 pressure levels for detailed and precise touch inputs.

Continue reading

MSP market turns to providing security solutions

New research suggests that managed service providers (MSPs), which have historically expected to manage IT infrastructure for their customers, are increasingly expected to protect this infrastructure too.

The study from CyberSmart of 250 senior leaders at UK-based MSPs, finds that 65 percent of MSP customers now expect their provider to manage either their cybersecurity infrastructure or both their cybersecurity and IT infrastructure.

Continue reading

Lessons unlearned -- the cybersecurity industry is stuck in the past

People can make mistakes, well-intentioned or otherwise, in any walk of life or industry. It happens all the time.

Take the cybersecurity industry, for example. Just over two weeks ago, the well-publicized Microsoft outage caused by CrowdStrike's corrupted software update wreaked havoc across the world.

Continue reading

Thousands of industrial control devices exposed online

Industrial computer system

Recent attacks have highlighted the vulnerability of industrial control systems to attack and a new report has found 18,000 exposed devices that are likely used to control industrial systems.

The report, from internet intelligence platform Censys, focuses on ICS devices in the US and UK and also finds that almost 50 percent of the human-machine interfaces associated with water and wastewater systems (WWS) identified could be manipulated without any authentication required.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.