New study reveals serious disconnect in executive planning for cyberattacks
A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.
The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.
Microsoft reveals workaround for Office zero-day vulnerability that can be used to launch malicious PowerShell commands
While Microsoft may be quick to point out security vulnerabilities in other companies' products, its own software is far from infallible. A good example of this is the recently discovered 'Follina' security hole that affects Microsoft Office.
The vulnerability can be exploited to launch PowerShell and execute a variety of malicious commands; all that a victim needs to do is open a specially crafted Word file. Tracked as CVE-2022-30190, Microsoft has released details of a workaround that helps to mitigate the issue.
Three steps to turn data into an indispensable strategic tool
While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.
However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.
MINISFORUM Venus Series UM560 is a tiny Windows 11 PC powered by AMD Ryzen
MINISFORUM is a computer-maker that has been releasing many models of mini PCs lately. Its machines are often looked upon favorably by consumers that prefer diminutive desktops. Not only are its computers small and well-made, but often quite powerful too. These tiny machines can be good servers, retro-gaming machines, office workstations, home theater PCs, and more.
Many MINISFORUM computers are powered by capable Intel processors, but the company has been embracing AMD chips a lot lately as well. In fact, the company now has several AMD-powered options. Today, MINISFORUM announces an upcoming AMD desktop that is very cute. Called "Venus Series UM560," it is powered by a Ryzen 5 5625U CPU. The little computer can be purchased as either a barebones or with both RAM and storage pre-installed.
Microsoft researchers discover serious security vulnerabilities in big-name Android apps
The Microsoft 365 Defender Research Team has shared details of several high-severity vulnerabilities found in a mobile framework used in popular apps associated with a number of big names.
The framework is owned by mce Systems, and is used in apps from numerous mobile providers. The apps -- from the likes of AT&T, Rogers Communications and Bell Canada -- are often pre-installed on Android handsets, but they have also been downloaded millions of times. If exploited, the vulnerabilities allow for local or remote attacks, including command injection and privilege escalation attacks.
The role of encrypted traffic analysis for threat detection [Q&A]
Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.
But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.
Surfshark VPN for Linux gets proper GUI
What makes Surfshark one of the best paid VPN services on the market? Well, besides being extremely affordable, it has no device limit and is very easy to use on many platforms, including Windows, macOS, Android, iOS, and iPadOS. Not to mention, the developers are constantly adding new features -- they don't rest on their laurels. I highly recommend the service.
A desktop Linux version of Surfshark has been available for a while now, but sadly, it did not have a graphical user interface (GUI) -- you had to configure and run it from the terminal. While this technically worked, it was clunky and annoying, making Surfshark on Linux inferior to versions for other operating systems.
Fighting the rising tide of rogue apps
We're battling a swell of rogue apps, and companies and consumers alike are struggling to keep their heads above water as these applications quickly become the tool of choice for fraudsters. According to our recent fraud data, rogue apps now make up 39 percent of global fraud attacks, growing at a rate of 50 percent per quarter.
Rogue apps attempt to impersonate a brand's application with the intent of committing financial fraud. They have the ability to wreak havoc on consumers and organizations alike, with financial institutions being a particular target.
Best Windows apps this week
Four-hundred-ninety-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
The next feature update for Windows 11, Windows 11 version 22H2, has reached RTM status this week. Work on the update will continue in the coming months before it is released to all users.
What is needed to make digital transformation work? [Q&A]
Digital transformation is a topic that's been in the air for more than just a few years now, but the impact of the pandemic and the need for businesses to adapt has rapidly brought it back to the forefront.
It's also no longer just about IT. Digital transformation is an enterprise-wide endeavor, connecting and affecting all business units and requires a shift in mindset to take full advantage of the opportunities it offers.
Microsoft brings WSL 2 distro support to Windows Server 2022
In a move that will please -- and surprise -- many, Microsoft has added WSL 2 distro support to Windows Server.
The new Windows Subsystem for Linux functionality is not available by default, as it requires the installation of a special update. This will be officially released on Patch Tuesday, but it is also available as a preview right now for anyone who does not want to wait.
Microsoft's KB5014019 update for Windows 11 is breaking antivirus tools
Trend Micro has issued a warning about the preview of the KB5014019 update for Windows 11, released by Microsoft a few days ago.
The security firm says that it is aware of a compatibility issue between the update and "the User Mode Hooking (UMH) component of several Trend Micro endpoint solutions". The problems affect both Windows 11 and Windows Server 2022.
Plex Desktop for Linux comes to Snap Store with flatpak version on the way
If you are a fan of pirating TV shows and movies, you have undoubtedly used Plex over the years. If you aren't familiar, the service uses a server/client concept, where you store your media on one machine and then stream it to another device. While Plex technically can be used for legally-obtained media, I predict that many (if not most) of its users are watching pirated content. Look, I'm not judging... I'm just trying to be honest.
And now, the Plex Desktop app and new Plex HTPC client app are both available for Linux -- but only from the Snap Store. Don't like Canonical's snaps? Don't worry, according to a blog post, the Plex developers are planning to roll out flatpak versions eventually too. Before anyone starts arguing about snap vs flatpak, let's just celebrate another big win for the Linux community overall. Okay?
Researchers uncover cybercriminal stronghold targeting Facebook users
The Facebook Messenger 'Is That You?' video phishing scam has been around since 2017, but a recent investigation into it by researchers at Cybernews has led to the discovery of what they're calling a 'cybercriminal stronghold'.
Threat actors are using this to infect the social network with thousands of malicious links each day. The research has also identified at least five suspects, thought to be residing in the Dominican Republic.
A human-centric approach is key to unlocking digital transformation success
The information age has gone through many phases, but one thing has always remained true -- the constant acceleration of evolution. This acceleration hasn’t always been consistent, but we’ve seen another leap in the already high urgency for businesses to adopt new tools, services, and technologies boom again with the growth of hybrid working.
Enterprises have become laser-focused on what will help hybrid workers be as productive as they were in the traditional office space -- wherever they choose to work. But knowing what technology and software are best to invest in to maintain -- or even boost -- productivity is not always a simple task.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.