3 major risks enterprises face in the era of digital interconnectivity


Today, enterprise-scale companies are more interconnected than ever. People, applications, servers, networks, and devices in different departments and even in different parts of the world are constantly exchanging information in both the public and private cloud. That’s not a bad thing. In fact, most organizations strive for this kind of silo-less interconnectivity. Desirable as it may be, however, it’s not risk-free.
There are cybercriminals ready to exploit any vulnerability in an organization’s digital defences. That much should be obvious from the 60 000-plus reports of fraud and cybercrime that came from UK businesses in 2021. It’s critical, therefore, that organizations do everything possible to understand and mitigate those risks.
Amazon's robot workforce could doom the American worker


The year is 2030. Most humans have been replaced by machines in U.S. warehouses and factories. Millions of Americans are out of work and struggling to find jobs as robots pack, sort, ship, and carry out the myriad duties that just ten years ago were the purview of living, breathing workers. There are little job prospects in sight for these workers as automation has completely taken over numerous industries.
As fictitious as this sounds, it is not a scene out of a science-fiction novel, but instead a scenario that could occur in the very near future. Take, for example, Amazon’s recent launch of Proteus -- the company’s first fully autonomous mobile robot. This should signal that much of the company’s workforce faces extinction by automation in the coming years.
Data maturity drives increased revenues


Data-mature enterprises see a three times improvement in revenue along with shorter time to market, greater profit, improved operational efficiency and great customer loyalty, according to a new report.
The study from IDC and sponsored by analytics specialist Heap shows that how well a company uses data and employs it in its decision making can provide up to a 2.5 times average increase in business outcomes across the board.
How to enable the amazing animation effects Microsoft has hidden in Windows 11


Every -- well, almost every -- new build of Windows 11 has new features, options or settings to explore. Some are obvious, some less so. With the latest release of Windows 11, Microsoft has hidden some seriously impressive new animations.
These animations appear in the Settings app; when you roll your mouse cursor over the icons to the left of the app, they now come to life. But the animations do not appear by default, Even if you have Windows 11 build 25188 installed, there are still steps you need to take to unlock the special animation effects.
Log4Shell still being exploited six months on


Six months after the Log4Shell vulnerability was made known, vulnerable instances remain accessible on the internet and people attempting to exploit them according to the latest Trustwave SpiderLabs Telemetry report.
Using data gathered from the Shodan device search engine, the report shows that as of June 9, 2022, 1,467 instances were vulnerable to Log4Shell. These vulnerable instances are from the Russian Federation, United States, and Germany with 266 (18 percent), 215 (15 percent), and 205 (15 percent) hosts, respectively.
DuckDuckGo's free email protection beta is now open to all


DuckDuckGo is best known as a privacy-first search engine, but the company also offers other privacy tools, and for the past year it has been testing out an email forwarding servicing.
If you wanted to try this feature out previously, you will have had to join a waitlist, but today the company announces that the beta is open for everyone. I’ve been using the service since day one, and I can definitely recommend it.
A third of cybersecurity professionals are kept awake by stress


A new survey of over 300 UK security professionals shows 32 percent of respondents say they are kept awake by job stress, 25 percent by lack of opportunity, but only 22 percent by their organization suffering a cyberattack.
The study from The Chartered Institute of Information Security (CIISec) says organizations have been slow to adopt industry standards. Almost half (49 percent) don't follow the UK Government's Cyber Essentials practices, which provide basic best practice; and just 20 percent have formally adopted the NCSC's 'Ten steps to cyber security' guidance.
Apple's Self Service Repair program criticized for making 'MacBooks seem less repairable'


Some months after launching a self-repair program that gave iPhone owners the opportunity to fix their own devices, Apple expanded it to include MacBook air and MacBook Pro notebooks. On the face of things this is a great move, but the program has been criticized for not only managing to make MacBooks seem less repairable, but also for "presenting DIY repairers with an excruciating gauntlet of hurdles".
The criticism comes from none other than iFixit, a site well known for its device teardowns and the repairability ratings it assigns them. Singled out for particular attention is the process of replacing a MacBook Pro battery, the instructions for which stretch to an incredible 162 pages.
Microsoft releases Windows 11 beta builds 22621.586 and 22622.586 25182


Wednesdays are a big deal for Windows 11 Insiders in the Dev Channel as that’s when Microsoft typically releases new flights. Beta Insiders also now get to enjoy the mid-week release schedule, and today sees the arrival of twin builds 22621.586 and 22622.586.
In theory, Windows 11 Build 22621.586 is the flight without new features, while 22622.586 is the one with new features, except the main difference between today's two builds is the fixes included in them.
Microsoft releases Windows 11 Build 25188, makes Windows Terminal the default


The first big update for Microsoft’s new operating system, now set to be called the Windows 11 2022 Update, is due for release shortly. Microsoft is still hard at work developing new features and fixing problems for future updates.
Last week’s Windows 11 build for Insiders on the Dev Channel wasn’t particularly existing, with the focus on fixing problems, but Build 25188, released today, do introduce some more notable changes.
The risk-based approach to vulnerability patching: How to do it right


As businesses continue to produce and switch over to digital products, we see more cyberattacks and software flaws exploited for nefarious purposes. The number of small flaws in software that cause major issues can quickly get out of hand. Machine learning has produced a process known as risk-based vulnerability patching to help avoid this issue.
This article will discuss what a risk-based approach is, the patching processes, solutions to negate the risk of each issue, and a management plan for every part of the process. Sections will be broken down by the type of software and each part of the risk management process.
Phishing attacks bounce back after pandemic slowdown


After a tailing off during the pandemic, phishing is back, with more attacks spotted in the second quarter of this year than for the whole of 2021.
The latest phishing and malware report from Vade also shows that malware emails decreased 48 percent month-on-month -- down from 32.9 million in March to 17 million in April -- but rebounded 31 percent May, with 22.4 million malware-weaponized emails detected. June saw even higher malware volumes (28.9 million), a 29 percent increase from the previous month.
Two thirds of companies think they may have been targets of a nation-state cyberattack


New research from Venafi into the rise of nation-state cyberattacks and their links to geopolitics has revealed that two-thirds (64 percent) of security decision-makers suspect that their organization has been directly targeted or impacted by a nation state attack.
In addition, 77 percent believe we're in a perpetual state of cyberwar, while 66 percent of companies say they have changed their security strategy as a direct response to the war in Ukraine.
Was your Facebook feed flooded with celebrity spam today? Mine too


When I checked Facebook this morning, I was greeted by loads of posts to WandaVision star Elizabeth Olsen. I don’t follow Elizabeth Olsen on Facebook and, for the most part, I have no interest in what other people are saying to her on the social network (I expect she is similarly disinterested in the messages she gets via the platform, if the sample I saw is anything to go by).
I knew I hadn’t been hacked, but it was still a very weird sight. I wasn’t alone here, as my colleague Sofia reported the same issue. It turns out, this was a problem affecting a huge number of users which saw celebrity fan pages and groups being boosted to the top of Home feeds around the world.
Healthcare attackers switch to smaller targets


While large healthcare providers have lots of juicy data to tempt cybercriminals, they are also likely to have strong defenses.
It's not too surprising then that a new report from managed detection and response provider Critical Insight shows that in the first half of this year attackers have shifted their attentions to smaller hospital systems and specialty clinics that lack the same level of security preparedness, staff size, or budget.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.