Latest Technology News

International Computer Security Day seeks to raise awareness

cybersecurity

It seems like a while since we've had a day dedicated to some aspect of the tech world, so if you're looking for something to celebrate in the lull between Thanksgiving and Christmas you'll be pleased to hear that today is International Computer Security Day.

This is designed to create greater awareness of computer security issues and encourage people to secure the personal information stored on their computers.

Continue reading

Vulnerabilities found in HP multi-function printers

Researchers at F-Secure have discovered vulnerabilities in more than 150 HP multifunction printer (MFP) products. These could allow attackers to seize control of vulnerable devices, steal information, and further infiltrate networks to inflict other types of damage.

HP has issued patches to address the vulnerabilities which include exposed physical access port vulnerabilities (CVE-2021-39237) and font parsing vulnerabilities (CVE-2021-39238).

Continue reading

Zoom boosts security with automatic updates for Windows and macOS -- but Linux users miss out

Angled Zoom logo

Many things have come as a result of the COVID-19 pandemic, and the increased usage of video messaging and video conferencing tools is one interesting phenomenon. At the start of coronavirus-related lockdowns and periods of working from home, Zoom rocketed in popularity -- but the service soon found its security practices under close scrutiny and in receipt of strong criticism.

In the intervening month, Zoom did a lot of work to improve not only its images, but also the security of its platform and safety of its users. Continuing this trend, the company has launched a new automatic update feature for the Windows and macOS versions of the Zoom client.

Continue reading

Telehealth takes off but security concerns persist

While 91 percent of medical organizations have already implemented telehealth capabilities, 52 percent of respondents have experienced cases where patients refused to use the services due to security concerns.

This is the key finding of a new research study by Kaspersky which also shows the pandemic has had a major effect with 44 percent of organizations implementing telehealth after COVID-19 hit.

Continue reading

0patch beats Microsoft to fix serious local privilege escalation vulnerability in Windows

Laptop plaster

Once again, micro-patching firm 0patch has beaten Microsoft to the punch, releasing an unofficial patch for a zero-day vulnerability in Windows.

This time around we're talking about CVE-2021-24084, a local privilege escalation (LPE) zero-day vulnerability in Windows' Mobile Device Management service. The flaw affects Windows 10 version 1809 and later, and Microsoft is yet to release an official patch of its own. Not wanting to leave systems at risk of attack, 0patch stepped in to help out users by offering up a free fix.

Continue reading

How next-generation remote desktops are giving power users more flexibility [Q&A]

Driven by the pandemic, remote work has been normalized in many offices. But while it works for many tasks it's not so useful for power users.

Think architects, 3D developers, game developers and designers who rely on high-powered computing to get their jobs done. They can't easily take a $50,000 workstation home to do their work.

Continue reading

How to prepare for and prevent a ransomware attack

There has been a lot of media attention lately in certain industries around a type of ransomware called DopplePaymer.

Using this ransomware, an adversary will gain access to an organization. From there, they will start infecting systems and will demand a payment and/or threaten to release the victim’s data if the ransom is not paid. This trend of additional extortion become increasingly common with ransomware operators in the past two years.

Continue reading

Microsoft fixes problems that took GitHub offline

Microsoft building logo

It may be a holiday weekend for many, but few people would be expecting websites and online services to take time off. Unfortunately, that's precisely what happened with GitHub after an outage left developers unable to access the site.

On Saturday evening going into Sunday, Microsoft started to investigate a series of issues affecting GitHub Actions, API Requests, Codespaces, Git Operations, Issues, GitHub Packages, GitHub Pages, Pull Requests, and Webhooks.

Continue reading

It's time for rail companies to get smarter with data

The rail network is awash with data.  There are systems measuring everything you could possibly compute -- from ticket sales and toilet cleaning to punctuality and passenger satisfaction. Use this data smartly, and you have the power to transform your train operating company (TOC).

But here’s the catch; to use the data, you’ve first got to get your hands on it, and with the way many TOCs are organized, that’s not always as simple as it sounds.

Continue reading

KB5007205 update for Windows is breaking Microsoft Defender for Endpoint

Microsoft building logo

Microsoft has revealed that a recent update for Windows has been causing problems that could have left systems unprotected and open to attack.

After installing the KB5007205 update, some system administrators have found that Microsoft Defender for Endpoint fails. This makes something of a change from the printer problems that so many updates for Windows have caused in recent times, but there is currently no fix available.

Continue reading

Best Windows apps this week

Four-hundred-sixty-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released preview updates for Windows 10 this week that address MSI and printing issues, among other things. Also released this week is KB5007262 for Windows 11, which fixes installer-related application issues.

Continue reading

Why real-time analysis is key to making better use of data [Q&A]

Data analytics

Businesses of all types generate ever larger quantities of data, but while this should be an invaluable resource to drive decision making the sheer volume can create difficulties.

Analyzing data in real time is the ideal but it can be surprisingly hard to achieve. We talked to Ariel Assaraf, CEO of data streaming specialist Coralogix, to find out how enterprises can face the challenges posed by real-time analysis.

Continue reading

CronRAT is a new Linux malware set to strike on February 31st

CronRAT

Yes, you did read the headline correctly; security researchers have discovered a stealthy new remote access trojan (RAT) designed to attack Linux systems. Named CronRAT, the malware hides as a scheduled task and is configured to run on a non-existent date – February 31st.

Researchers from Sansec warn that CronRAT "enables server-side Magecart data theft which bypasses browser-based security solutions". This is something that is particularly concerning this Black Friday.

Continue reading

6 techy ways to entice new talent during The Great Resignation

If you've been paying attention to the news lately, you know that many people are choosing to leave their jobs for various reasons. This period is being coined as "The Great Resignation."

Employers across all sectors are looking for new ways to gain the attention of potential employees -- but it'll take more than just posting a couple of positions on online job boards. Some recruiters are even turning to artificial intelligence (AI) to improve their recruiting processes and make them more efficient.

Continue reading

Ransomware remains a threat 30 years on

ransomware laptop

As our lives have become increasingly dependent on technology, virtually all personal and business data is kept on internet-connected platforms and in today’s digitized world this has become a gold mine for cyber criminals. In fact, we have seen cyberattacks grow exponentially in the last 12 months and in particular ransomware attacks increased by more than 485 percent in 2020.

Yet ransomware is nothing new. It is astounding to think that this attack technique has been around since 1989, when the first version was created by the "Father of Ransomware" Dr Joseph L. Popp. Disseminated via mailed floppy disks, the program demanded a hefty ransom of $189 to free victims’ data. Fast forward 30 years and still today whenever an organization thinks it has ransomware under control, another attack more sophisticated and effective than the last emerges.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.