How fraudsters attack blockchain technology and how it can be prevented


The global financial crisis of 2008-09 resulted in the development of the Bitcoin whitepaper which introduced the world to the idea of blockchain technology and cryptocurrency. Within blockchain, information is stored in several databases (blocks) that are linked together chronologically through cryptographic hashes to form a distributed network (chain). Since its inception the global blockchain market is expected to hit $67.5 billion by 2026.
Within the realm of banking, financial services, and insurance (BFSI) the evolution of cryptocurrencies as an asset class for investors has furthered the commercialization of blockchain technology through decentralized finance (DeFi) services. As of 2021, there are over 6,000 cryptocurrencies being traded freely with global cryptocurrency market capitalize reaching $990 billion. Serving investors' needs are exchanges, lenders, asset managers, custodians, cross-border payment applications, and clearing & settlement houses that all benefit from the surge in blockchain use-cases.
The opportunities and risks of the metaverse


We know that not many consumers actually care about the metaverse, but that hasn't stopped tech giants investing heavily in preparing for it.
A new report from Tenable, based on a study of 1,500 professionals representing roles in cybersecurity, DevOps and IT engineering, shows 68 percent of respondents plan to do business in the metaverse within the next three years, with 23 percent having already begun initiatives in the past six months.
Budget and momentum are key to cybersecurity automation maturity -- and CISOs are feeling left behind


As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
The intelligent automation of key cybersecurity processes can significantly improve an organization's posture and at the same time support under-pressure employees by reducing reliance on manual processes. But in what is a relatively new approach, how far have organizations progressed along the cybersecurity automation maturity curve and is everyone on the same journey?
Why your security strategy needs to be pre-emptive [Q&A]


As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems.
What's needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to Todd Carroll, CISO at CybelAngel and with over 20 years previous experience in the FBI's cyber, counter intelligence, and counter terrorism branches, to discuss the need for a pre-emptive attitude to cybersecurity and how such an approach can work.
Open Source video editor OpenShot 3.0 now available for Windows, Mac, and Linux


One of the big reasons some people don't switch to Linux is a lack of video editors. While it's true there are more video editing programs on macOS and Windows, there are some great options on Linux too, such as Kdenlive and DaVinci Resolve.
Another popular video editing application that runs on Linux is the open source OpenShot. This cross-platform video editor can run on Windows and macOS too, meaning you can try it on one of those platforms to see if it meets your needs before switching to Linux. And now, OpenShot has reached a new major milestone -- version 3.0. The developers brag that it includes over a thousand changes.
IT infrastructure challenges echo a rapidly changing digital landscape


Against a background of major macroeconomic shocks, political uncertainty, and continuing social change, businesses must adapt fast as they aim to deliver trusted value and exceptional experiences for customers, partners, and employees. In a digital world, the responsibility for driving this evolution lies largely with IT leaders as they seek to provide a technology infrastructure with the flexibility, performance, and reliability required in a fast-paced, volatile environment.
To gauge how IT decision-makers are approaching this challenge and understand the issues they are facing, WSO2 recently surveyed 200 IT decision-makers from the UK and Ireland. We found a sector that needs to overcome some significant short-term challenges, but is also aware of longer-term issues that will persist if they are not addressed. At the same time, as digital transformation continues, some of the key technologies powering it are proving harder to integrate into infrastructure than others.
To get verified on Twitter, you just need a phone number -- and between $8 and $11


Starting Monday 12 December, Twitter is relaunching Twitter Blue and giving users the opportunity to pay for the blue checkmark of verification.
Since Elon Musk took over at Twitter, the decision to open up verification to anyone willing to pay was one of the more controversial decisions. The scheme was paused last month, but now the paid-for blue tick is opening up once again. This time around, however, things are a little different, with iOS users getting a worse deal.
Transcend announces MTE250H PCIe 4.0 M.2 SSD with aluminum heatsink


Back in October, we told you about the MTE250S -- a PCIe 4.0 M.2 solid state drive from Transcend. While that SSD is fast, it is missing something that many computer users insist upon -- a heatsink. You see, heat can negatively impact both the performance and longevity of an M.2 SSD, and a heatsink can help cool it down. However, some laptops and desktops can't fit an M.2 SSD with a heatsink, so it makes sense not to include such a cooling accessory with every model.
With all of that said, Transcend has now unveiled the MTE250H, which is an all-new SSD. While it is technically a new product, the reality is, it is merely the previously announced MTE250S with a heatsink bolted on. Other than the heatsink, the MTE250S and MTE250H seem to be identical.
The evolution of business email compromise to business communication compromise


Business Email Compromise (BEC) attacks are no longer limited to traditional email accounts. Attackers are finding new ways to conduct their schemes -- and organizations need to be prepared to defend themselves.
Attackers are leveraging a new scheme called Business Communication Compromise to take advantage of large global corporations, government agencies and individuals. They are leveraging collaboration tools beyond email that include: chat and mobile messaging -- including popular cloud-based applications such as Slack, WhatsApp, LinkedIn, Facebook, Twitter and many more -- to carry out attacks.
The forces driving the new code-agnostic developer generation


Code-agnostic development is the future of cloud-native applications. Sure, there are plenty of benefits to knowing a coding language inside and out, but the field is evolving beyond the requirements for deep language expertise. As low-code and no-code platforms abstract complexity, developers can focus on higher-level concepts. The ability to jump from language to language will make them more efficient and adaptable.
Software industries evolve by abstracting complexity of lower-level tasks. If done correctly, this leads to better user productivity and outcomes. This movement in development is fueling the new approach to languages, allowing development teams to operate successfully with coding knowledge a mile wide and an inch deep. The trend of multi-lingual developers will propel the industry into the future. Let's take a look at how these experts developed.
Google brings passkey support to Chrome so you can ditch passwords


Passwords are a problem. They are difficult to remember, often easily guessed or cracked, and generally just a pain. Google is looking to help by adding secure, password-free login to Chrome 108 thanks to newly added passkey support.
The security feature is available to users of Windows 11, macOS and Android, and it follows a short period of beta testing. Backed by the likes of the FIDO Alliance, Microsoft, Apple, and -- of course -- Google, passkeys are a step away from the password managers so many of us have become reliant on.
You could soon be able to grab the Twitter handle of your dreams


One of the problems with signing up for just about any online service, particularly social platforms, is trying to bag yourself the username you want. On Twitter, this could be about to get a bit easier.
It is no secret that since Elon Musk took over the company, Twitter users have been leaving the site in droves, mainly to Mastodon. Add to this the number of accounts that were set up years ago and never used, accounts that have fallen inactive and there are a lot of Twitter handles that could be opened up to new owners -- and this is precisely what is on the cards.
Windows 11 Build 25262 does away with the sign-in requirement for the widgets board


The December 2022 Bug Bash is well underway for Windows Insiders in both the Dev and Beta Channels.
For insiders in the Dev channel, today also sees the arrival of a new Windows 11 build in time for the weekend. Build 25262 comes with a number of fixes and Microsoft has also dropped the sign-in requirement for the widgets board and made it available for all users.
If the office is for off-sites, how does onboarding work?


The way we live and work has changed forever -- and our workspaces are changing alongside. According to the Office of National Statistics, 84 percent of workers who worked from home planned to carry out a mix of working at home and in offices in the future, while research from Poly shows 77 percent of businesses are redesigning their office spaces to better suit new ways of working.
What constitutes an "office" is a very broad definition -- it could be a home, a local café or pub, or an actual physical office. And the role of the company office has changed. More than everyday tasks, it’s now a space for special events and meetings that would once have happened at an off-site.
The evolution of business connectivity waits for no one -- start your journey now!


When the COVID-19 pandemic emerged in early 2020, businesses around the world pivoted quickly to respond to an event that had the potential to disrupt or ruin their markets and business models. In a matter of weeks and months, they sent their employees home to work. Some business functions shifted to mobile apps, other business applications to the cloud. Enterprises embraced new communication tools and technologies to stay connected to their suppliers, partners, customers and workers, no matter where they were located around the world.
Every key shift in business operations relied on dependable, secure and often global connectivity. Today, as the post-pandemic picture comes into focus, a key question arises: Are businesses ready for what’s next?
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.