Latest Technology News

SMBs turn to MSPs to improve cybersecurity

SMB laptop

A new survey of over 500 IT decision makers at small and medium businesses, from threat detection and response specialist Vade, shows 69 percent say a serious breach had bypassed their current email security solution.

It's perhaps not surprising then that SMBs are increasingly likely to turn to managed service providers, with 96 percent of organizations either currently outsourcing at least some of their needs to MSPs or planning to do so in the future.

Continue reading

Website performance issues cost eCommerce businesses 10 percent of revenue

eCommerce

A new survey of 200 UK ecommerce leaders at enterprise organizations with more than £10m ($11.5m) revenue reveals that, on average, businesses lost 10 percent in revenue due to downtime and website performance issues in the last two years.

This is despite increased investment, with 48 percent of respondents saying their spending on eCommerce solutions has increased in the last two years, according to the study by enterprise software company Box UK.

Continue reading

HP Support Assistant DLL hijacking vulnerability could grant attackers privilege escalation

HP laptop

HP has issued a warning about a security issue with its HP Support Assistant software. Pre-installed on numerous HP systems, and included with the installation of various products from the company, HP Support Assistant has been found to have a privilege escalation vulnerability.

Tracked as CVE-2022-38395 and assigned a score of 8.2, the vulnerability is of high severity. The good news is that a fix is available.

Continue reading

Cisco releases a batch of patches for security vulnerabilities in numerous products including Cisco Small Business routers

Cisco logo on laptop screen

While for many people September 7 meant finding out about the latest iPhone and Apple Watch, for Cisco it was the day on which it pushed out security patches for various medium- and high-severity vulnerabilities.

The company posted a series of advisory notices in its security center and released four patches for a variety of flaws. The patches address the high-severity CVE-2022-20696, a vulnerability in the binding configuration of Cisco SD-WAN vManage Software, as well as CVE-2022-28199, a flaw in the NVIDIA Data Plane Development Kit. There are also patches for two medium-severity flaws -- CVE-2022-20863, a vulnerability in the messaging interface of Cisco Webex App, and CVE-2022-2092, a vulnerability in the IPSec VPN Server authentication functionality of several Cisco Small Business routers.

Continue reading

The second generation Apple AirPods Pro are named 'AirPods Pro'

Earlier today, Apple announced some cool new products, such as the iPhone 14 and Apple Watch 8. As expected, the company also unveiled the second generation AirPods Pro, and you'll never guess what they are called! Apple's marketing team worked really hard on a name for the product and came up with... AirPods Pro. Yup, to make things more confusing for shoppers, the new variant has the exact same name as its predecessor.

Sadly, this new 2022 version of AirPods Pro are lacking a huge feature many have been hoping for -- USB-C charging. Sigh. Once again, Apple has included a Lightning port, although an Apple Watch charger can now charge the wireless earbuds too. The earbuds do get some cool new features, however, such as an integrated location speaker on the charging case (which also gets a lanyard loop), touch controls, improved low-distortion audio driver, custom amp, longer battery life, and more.

Continue reading

Apple Watch 8 can tell if you've been in a bad car crash

Today at its 'Far Out' event, Apple took the wraps off the Apple Watch Ultra, a rugged version of its smartwatch. While this looks great, and comes packed with features that will appeal to anyone who spends a lot of time exercising or exploring outdoors, most people will be more interested in the updated standard model.

Series 8 of the smartwatch comes with a lot of new features, including Crash Detection which can tell if you’ve been in a bad car crash and will automatically contact emergency services if it detects you're unresponsive.

Continue reading

Apple's new iPhone 14 will make you want the iPhone 14 Pro

While the iPhone 14 Pro (and Pro Max) were the undoubted stars of Apple’s 'Far Out' event hosted today, the company also unveiled the more affordable iPhone 14.

While this device doesn’t offer the advanced camera capabilities or always-on display of its more powerful (and more expensive) sibling, it does offer a new dual-camera system, Crash Detection, Emergency SOS via satellite, and improved battery life.

Continue reading

Apple iPhone 14 Pro and Pro Max swap the notch for a 'Dynamic Island'

We knew that it was going to be the iPhone 14 Pro that delivered the lion’s share of new features when it was announced today at Apple’s 'Far Out' event, and the Cupertino-based company certainly didn’t disappoint.

The iPhone 13 Pro didn’t make any massive advances on the iPhone 12 Pro, so Apple needed to up the ante this year, which it did with a raft of new features including Dynamic Island, a cool new way of displaying notifications and activities, an Always-On display, a 48MP camera, and much more.

Continue reading

Apple Watch Ultra is a rugged smartwatch with significantly better battery life

Alongside an update to the Apple Watch, which introduced crash detection, which can tell when you've been in a bad car crash, and advanced cycle tracking, Apple today announced a brand new model of its popular smartwatch -- Apple Watch Ultra.

This model is designed for "endurance, exploration, and adventure" and comes with a 49mm titanium case and flat sapphire front crystal over the brightest Apple Watch display yet -- up to 2000 nits, which is 2x brighter than the standard Apple Watch display.

Continue reading

7 reasons to start using deception technology

Deception man woman

Hacker attacks are often based on social engineering. Attackers send phishing emails, create fake websites and apps. Their goal is to force the victim to click a malicious link, open a virus file, or provide sensitive data. Simply put, cybercriminals try to deceive their victims. Deception technology adopts the same principle. It is intended to deceive the hackers. And it does it very successfully. Gartner analysts placed the deception approach on their radar of the most promising security technologies. Deception technology is easy to deploy, and it is effective in detecting and avoiding various threats aimed at organizations of all sizes. If you doubt whether your company needs to employ deception technology, here are seven reasons to try this defense practice.

0-day vulnerability protection

Continue reading

Process orchestration: The unsung automation hero

process automation

When you think about process automation, you might naturally think of a company like Amazon. From ordering, to warehouse automation, to delivery, to returns -- end-to-end business processes flow seamlessly, like magic. When you’re building from scratch as a startup, this level of process automation is easier to achieve than if you’re contending with legacy systems.

But today, 70 percent of global companies list legacy modernization as a top strategic business priority. That means automating all of their processes from scratch isn’t always an option. Ripping and replacing legacy systems is disruptive and costly. That’s where process orchestration comes in.

Continue reading

Agile Pentesting offers developers more control and flexibility

Software testing

Pentest as a Service (PtaaS) company Cobalt is today launching Agile Pentesting, a new offering that provides more control and flexibility to better meet the needs of businesses through versatile, ad hoc testing.

Agile Pentesting allows organizations to identify and address vulnerabilities at a faster, more frequent rate to minimize risk. This contrasts with what Cobalt calls 'comprehensive pentesting', which is often done in support of business drivers like compliance or M&A activity, the new offering helps accelerate customers' DevOps journeys while aligning with their CI/CD pipelines.

Continue reading

Talent shortages are shaping tech investment

talent

Almost three quarters (73 percent) of senior IT leaders agree that acquiring IT talent has never been harder and 98 percent say attracting IT talent influences their organization's technology investment choices.

The research from MuleSoft also shows that 86 percent of senior IT leaders now say the experience an organization provides its employees and customers is as important as its products and services.

Continue reading

Watch Apple reveal the new iPhone 14 at today's 'Far Out' event, here live

It’s that time of year again, when Apple is set to unveil the next generation of iPhones, as well as other hardware, like the Apple Watch Series 8.

It is expected that Apple's Pro and Max models will see a processor boost, improved cameras (with the main camera jumping up to a 48-megapixel sensor), and lose the notch at the top. The new phones may also gain an always-on feature.

Continue reading

Understanding threat detection methods [Q&A]

Threat

Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.

In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.