Google open source project aims to boost supply chain security
Software supply chain security is at the top of a lot of agendas at the moment, more so since the Log4j vulnerability was discovered and since the US Executive Order on cybersecurity.
Google is seeking contributors to a new open source project called GUAC (Graph for Understanding Artifact Composition), which although in its early stages yet is poised to change how the industry understands software supply chains.
Best Windows apps this week
Five-hundred-and-thirteen in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Lots of important updates this week. Microsoft released the Windows 10 2022 Update, without mentioning its changes, and the first Moments update for the Windows 11 2022 Update. The latter introduced tabs in File Explorer and several other improvements.
Blame bad bots for online fraud sweeping the United Kingdom
Online fraud is becoming a scourge across the United Kingdom, and in the past year alone we’ve watched police tackle a record breaking number of scams.
One of the most dangerous attacks used by fraudsters is Account Takeover (ATO), whereby cybercriminals take ownership of online accounts by abusing stolen passwords and usernames, often accessed on the Dark Web. A Freedom of Information (FOI) request earlier this year revealed that ATO is the most common form of online fraud in the UK and new data from the 2022 Imperva Bad Bot Report shows ATO attacks rose a staggering 148 percent in 2021 alone.
CNAPP -- what is it and why should you care about it? [Q&A]
The IT world is littered with acronyms and one of the latest is CNAPP, standing for Cloud Native Application Protection Platform. If you haven't heard about it already you almost certainly will do soon.
We spoke to Stanimir Markov, CEO at Runecast, about CNAPP, what it is and how it can benefit modern enterprises and their cloud environments.
Google warns YouTube Premium Family subscribers of massive price rise
Google has started the process of informing YouTube Premium subscribers about an impending price rise for its Family plan. The hike is a significant one, with subscribers in the US looking at a $5 jump from $17.99 per month to $22.99.
The new pricing takes immediate effect for new subscribers, but existing users have at least 30 days from the date of receiving the email from Google. For those who signed up for YouTube Red when it existed, there is a brief stay of execution.
Cloud and hybrid working: The investment priorities for enterprises
Over the last two years, IT teams have come under immense pressure, having to quickly rethink their architecture to support home working, and best prepare for a hybrid-working model in the future. As a result, IT spending has never been higher with a total projected spend of $4.4 trillion USD in 2022, an increase of 4 percent on spend in 2021.
Widely accepted hybrid working practices and a reduced intensity of digital transformation projects have been reflected in IT investment decisions. According to A10 Networks’ recent Enterprise Perspectives research, investment in the cloud is a standout priority. This comes in addition to a growing focus on strengthening cybersecurity strategies with the policies and practices that must accompany the shift to an expanded office network/hybrid working environment.
Get 'Learning DevOps -- Second Edition' ($37.99 value) FREE for a limited time
In the implementation of DevOps processes, the choice of tools is crucial to the sustainability of projects and collaboration between developers and ops.
Learning DevOps -- Second Edition presents the different patterns and tools for provisioning and configuring an infrastructure in the cloud, covering mostly open source tools with a large community contribution, such as Terraform, Ansible, and Packer, which are assets for automation.
Attackers aren't as clever as you think when it comes to finding passwords
Although we've been told for years that their days are numbered, passwords are still a major part of our security defenses.
New research from Rapid7 looks at two of the most popular protocols used for remote administration, SSH and RDP, to get a sense of how attackers are taking advantage of weaker password management to gain access to systems.
Canonical releases Ubuntu Linux 22.10 'Kinetic Kudu'
Today, Canonical releases Ubuntu 22.10. Are you excited? Well, you probably shouldn't be. Don't get me wrong, the newest version of the operating system -- which is codenamed "Kinetic Kudu" -- seems fine, but there is nothing truly exciting to be found in it. Yeah, it is just another cookie-cutter Ubuntu release.
With all of that said, there are some notable improvements, such as the new GNOME 43 desktop environment and inclusion of the latest Mesa in the Steam snap. For the most part, however, desktop users will likely find this version very underwhelming.
Ransomware attacks are down in the third quarter
The period from July to September this year has seen 27 ransomware variants used to conduct 455 attacks according to cybercrime intelligence company Intel 471's Spot Reports and Breach Alerts.
This represents a decrease of 38 attacks from the second quarter of 2022 and 134 from the first quarter of 2022.
If your name is Michael Smith and you're from Houston you could be a fake
New research from identity verification company Socure looks at patterns surrounding how fraudsters construct synthetic identities to identify factors that may assist in identifying and thwarting this kind of crime.
The study shows that criminals employing synthetic identities do their best to blend them with the overall population. So in the majority of cases, synthetic identities fell into the most common demographics and consumer traits.
Microsoft is annoyed with security firm that discovered misconfigured server exposing sensitive customer data
Microsoft has admitted that the sensitive data of thousands of customers was exposed last month because of a "misconfigured Microsoft endpoint". The data includes names, email addresses, the content of emails and attachments related to business between a customer and Microsoft or an authorized Microsoft partner.
Security researchers from SOCRadar notified Microsoft about the server misconfiguration back on September 24. The data exposure is part of a series of leaks from public data buckets which the security firm has dubbed BlueBleed. It is described as "one of the largest B2B leaks in recent years" and affects thousands of individuals and companies across over 100 countries. Microsoft has addressed the misconfiguration, but the company is not happy with SOCRadar.
Microsoft releases Windows 11 Build 25227, makes update restarts less annoying
Yesterday was a huge day for Microsoft as it not only released the first 'moment' for Windows 11 which introduced extra features to the operating system (including a tabbed version of File Explorer) but it also released the Windows 10 2022 (22H2) Update for its older OS.
Today it’s business as usual for Insiders in the Dev Channel who receive a fresh new Windows 11 test build to play around with.
The pitfalls of tunnel vision in the tech industry
The tech industry job market is more volatile than ever before. IT skills shortages and the pandemic have increased demands on the sector’s workers, leaving many employees on the brink of burnout.
In fact, recent research states that just 24 percent of tech workers plan to stay in their current role. Some will move laterally, but others will pursue jobs that are entirely new, and may be deemed one-dimensional by prospective employers if their only experience is in an area such as programming. Similarly, decision-makers in the higher echelons of the business are doomed to fail if they focus on too narrow an area of the organization.
Diversifying our spaces for stronger communities
Innovation cannot exist without diversity. As cities and urban areas look to build stronger, more sustainable communities, appropriate preparation must be undertaken to ensure that plans are suitable for every citizen. This means dedicating time into the planning stage, where local authorities and partners consider what citizens need from their environment. In other words, to build smart cities and communities, they must be designed and executed with inclusivity in mind, thinking of the potential barriers that could be faced by individuals.
For smart cities, there is an element of informed prediction. Looking back at buildings made at the start of the last century, it’s clear they were built with the intention to last. When we look at transforming our cities now, we must adopt the same long-term view. However, the choices we make today must be clear in what they want to achieve in the decades to come and must be ready and capable of adapting and evolving, as humans do.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.