Latest Technology News

WinZip 27 offers two new tools for sending files securely and cleaning duplicates

Corel has unveiled WinZip 27, a major new version of its flagship compression tool for Windows. Its headline changes are the addition of two new standalone tools in the form of a duplicate file cleaner and tool to facilitate the quick and secure sharing of zip files online.

The first new addition to all three editions of WinZip -- including the entry-level Standard version -- is WinZip SafeShare. This standalone tool is designed to make it easy to zip up, encrypt and share files securely with others via a three-step wizard.

Continue reading

Enterprises are storing more data than ever

folder stack

According to a new study more than 50 percent of enterprises are managing 5PB or more of data, compared with less than 40 percent that were doing so in the same survey last year.

The 2022 Unstructured Data Management Report from Komprise also shows most are now spending more than 30 percent of their IT budget on storage and backups.

Continue reading

IBM and VMware help businesses modernize hybrid cloud workloads

cloud button

IBM and VMware are using this week's VMware Explore event to announce an expanded partnership to help clients and partners modernize mission-critical workloads and speed up time to value in hybrid cloud environments.

The two companies are also planning to help clients in regulated industries such as financial services, healthcare and the public sector address the cost, complexity and risk of migrating and modernizing mission-critical workloads in the cloud.

Continue reading

Google launches new Open Source Software Vulnerability Rewards Program (OSS VRP)

Google sign

Google is not alone in offering so-called bug bounty programs which give financial incentives to contributors to track down vulnerabilities and security issues in its software. Now the company has launched a new initiative called the Open Source Software Vulnerability Rewards Program (OSS VRP).

As the name suggests, this new program focuses on Google's open source projects. The company is offering rewards of between $100 and $31,337, depending on the severity of the vulnerability.

Continue reading

Ransomware: Recovering after an attack

ransomware laptop

Ransomware attacks have existed for decades and their perpetrators keep advancing in their abilities. By evading detection, encrypting user files, and coercing unsuspecting victims into paying ransoms, ransomware attackers have threatened the survival of many businesses. The first half of 2022 recorded a total of 236.1 million ransomware attacks across the globe.

The most popular types of ransomware attacks are crypto and locker ransomware. The crypto ransomware encrypts a user's data making it inaccessible until the individual pays the ransom, usually in bitcoin. On the other hand, locker ransomware works by blocking the user's access to the computer system and will not give access until an amount is paid. Despite the security measures businesses put in place, ransomware threats are still on the increase which is why businesses must have a ransomware recovery plan to minimize catastrophic effects.

Continue reading

Different ways of building corporate systems based on the zero trust architecture

The corporate infrastructure of US government agencies will soon be transferred to a new network security model called Zero Trust Architecture (ZTA). Last year, U.S. President Joe Biden released an Executive Order on Improving the Nation's Cybersecurity. Later, on January 26, 2022, the Federal Government released a Federal Zero Trust Architecture (ZTA) strategy memorandum that sets the rules for the construction of a new IT infrastructure for government agencies and organizations in accordance with the ZTA strategy.

In this article, I want to look at the fundamental changes that the new paradigm brings, replacing the secure perimeter model, which has so far been the base for the construction of corporate IT systems.

Continue reading

Facial recognition -- the good, the bad and the getting older

Your friends may not be willing to tell you that you're looking older, but facial recognition systems have no such reservations.

Face-recognition algorithms might struggle to identify you as the same person after just five years, according to the New Scientist.

Continue reading

Twilio hack led to compromise of 2FA app Authy

Twilio

Earlier this month, messaging service Twilio suffered a serious data breach following a "sophisticated social engineering attack". After using phishing attacks on company employees, hackers were able to access user data, but it seems that the impact of the hack was more widespread.

Twilio has now revealed that the attackers also compromised the accounts of some users of Authy, its two-factor authentication (2FA) app. Although the number of users affected by the breach is relatively small, the implications are very serious and will dent confidence in the company.

Continue reading

Taking a holistic approach to application security [Q&A]

DevSecOps

Application security is becoming mainstream, and that's a good thing as it means that security testing is becoming an embedded aspect of the software development life cycle (SDLC). It also means that automated security testing tools are becoming faster, more sophisticated, and better integrated, so they're less likely to slow down developers or burden them with too many trivial findings or false positives.

But as good and necessary as AppSec testing tools are, it's not nearly enough simply to buy them and run them -- you need to buy the right ones and configure them correctly so that they help build security into your SDLC without bogging it down. It's important to implement a security strategy and a plan. It’s also important to employ developers with the skills to build trust into your software -- a concept known as 'holistic AppSec'.

Continue reading

Microsoft explains the SMB compression changes introduced by Windows Server 2022 KB5016693 and Windows 11 KB5016691 updates

Windows 11 logo on laptop screen

Last week, Microsoft released previews of updates for various versions of Windows before it unleashes the final versions next Patch Tuesday. Included among these was the KB5016691 update for Windows 11 which --although billed primarily as a bug-fixing update -- added new Server Message Block (SMB) compression options.

The same changes were introduced to Windows Server 2022 with the KB5016693 update, and Microsoft has published details of just what the changes mean, as well as explaining how to take advantage of the new options and settings.

Continue reading

Lexar launches Professional NM800 PRO NVMe SSD for PC and Sony PlayStation 5

M.2 solid state drives are great options for both laptops and desktop PCS. Hell, if you add such a drive to a compatible enclosure (such as this one), you can transform it into a portable SSD too. But did you know you can upgrade the storage of your PlayStation 5 video game console by adding an M.2 drive?

And now, Lexar has a new M.2 SSD that is designed for both PC and Sony PlayStation 5. Called "Professional NM800 PRO," this PCIe Gen4x4 M.2 2280 SSD offers impressive speeds and is being offered either with or without a heatsink.

Continue reading

Belkin launches CONNECT USB-C 6-in-1 Multiport Hub with Mount for Apple iMac

USB-C docking stations and hubs are a dime a dozen these days. There are so many such products that can transform a single USB-C port into several others. Quite frankly, it is almost impossible to get noticed with such an adapter these days.

With all of that said, a new USB-C adapter from Belkin has managed to grab my attention. Called "CONNECT USB-C 6-in-1 Multiport Hub with Mount," it has a unique feature that I find quite neat. You see, the "mount" in the product's name indicates that it can be attached to the back of a computer, such as Apple iMac.

Continue reading

How cloud computing turned security on its head

When an organization migrates its IT systems to the cloud -- and builds new applications in the cloud -- it relieves its security team of the responsibility of building and maintaining physical IT infrastructure. The shared security model of cloud dictates that cloud service providers (CSPs) such as Amazon Web Services (AWS), Google Cloud, and Microsoft Azure are responsible for the security of the physical infrastructure. Their customers are responsible for the secure use of cloud resources.

But embracing the cloud for building and managing new applications means security teams cannot deploy the traditional security technologies and processes they’ve long relied on to thwart cyberattacks. Cloud computing represents a paradigm shift in their roles and responsibilities and their approach to protecting sensitive data against falling into the wrong hands.

Continue reading

Microsoft releases KB5016688 update to fix a slew of Windows 10 problems

Microsoft's focus may well be Windows 11 and the upcoming Windows 12, but that does not mean that people who have opted to stick with Windows 10 have been forgotten. Having released a preview of the KB5016691 update for Windows 11, the company has also released KB5016688 update for Windows 10.

Available for Windows 10 versions 20H2, 21H1 and 21H2, the KB5016688 update is a preview of the cumulative update that will be released next Patch Tuesday. Although this is a non-security update, it fixes a large number of issues with Windows 10

Continue reading

YouTube TV let me watch New York Mets games from the middle of the Atlantic Ocean while on a Royal Caribbean cruise

With COVID-19 pretty much over now, I decided to take my first vacation since the pandemic started (I am vaccinated and double-boosted). And so, I booked a Royal Caribbean cruise to Bermuda (Enchantment of the Seas) that left from Baltimore. I returned from that vacation this week -- the trip was quite lovely, as is typical with Royal Caribbean.

Believe it or not, this was my 10th Royal Caribbean cruise! Normally, I would use it as an opportunity to unplug from the internet and relax offline. This time, however, things were a bit different. You see, I adopted a chihuahua from a shelter a few years back, and I wanted to keep an eye on her by way of Wi-Fi cameras. She's a great dog, but very scared and skittish -- I needed to know she was OK at all times.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.