Latest Technology News

API attacks on the rise but organizations are not prepared

A new report shows that while 14 percent of organizations experienced an API attack in the last 12 months, only 38 percent say they have an API security solution in place.

The research from Traceable AI, based on a security of cybersecurity delegates at the RSA conference, finds that although 43 percent of organizations say they do not struggle with API sprawl, 33 percent are unsure if they are managing it effectively, and 24 percent acknowledge they are struggling.

Continue reading

Organizations suffer multiple ransomware infections

ransomware laptop

A new report reveals that organizations are suffering multiple ransomware infections, 18 percent have suffered a ransomware infection 10 or more times in a 24-month period, a further 18 percent were infected five to nine times, and 30 percent were infected between two and four times.

The study from anti-ransomware platform Halcyon also shows that data exfiltration occurs in nearly every major ransomware attack today, and nearly 60 percent of respondents say that sensitive or regulated data was exfiltrated from their organization, with 55 percent reporting the attackers issued an additional ransom demand to protect the exfiltrated data.

Continue reading

Ultimate Ears launches EVERBOOM speaker alongside updated models

Ultimate Ears, a Logitech brand, has released its new EVERBOOM Bluetooth speaker, designed for a premium 360° sound experience. The launch is accompanied by updates to its existing line, including the WONDERBOOM 4, BOOM 4, and MEGABOOM 4, featuring upgraded acoustics, fresh color options, and materials made from sustainable sources.

Jonah Staw, General Manager of Ultimate Ears, emphasized the focus on combining durability with high-quality sound. "EVERBOOM is designed to meet the needs of our users who want dependable sound quality from their portable speakers," said Staw.

Continue reading

Most consumers ready to switch banks over fraud protection measures

A new study reveals growing anxiety among consumers that weaknesses in their banks' fraud-protection measures could leave them exposed to scammers, this would result in the vast majority (75 percent) switching providers.

For the report from Jumio sampled the views of more than 8,000 adult consumers, split evenly across the UK, US, Singapore, and Mexico, with research carried out by Censuswide.

Continue reading

Shadow SaaS -- a persistent problem and how to confront it [Q&A]

Shadow IT

There's an abundance of apps and SaaS solutions readily available these days to make the lives of employees easier and perform many work-related tasks. And the list keeps growing, with the likes of ChatGPT and Gemini paving the way for more AI-driven virtual assistants.

This is all well and good, unless your organization doesn't sanction the use of the software in question, turning something seemingly innocuous into shadow SaaS -- and a security risk. We spoke to John Stringer, head of product at data loss prevention specialist Next DLP, to learn more.

Continue reading

From application to zero trust: Identity security fundamentals to stay ahead of the threat landscape

Cybercriminals are not new, and often neither are their tactics. Despite this, phishing attacks, which incorporate social engineering in emails and messages to persuade people to perform an action that puts organizations at risk, continue to be highly successful. New technologies, such as GenAI, are improving these tactics further and companies must implement a strategic approach built on a solid foundation of identity security to minimize risks.

The most glaring vulnerability within an organization stems from human error. Mistakes such as using weak passwords, reusing credentials across multiple platforms, or falling victim to phishing attacks, can provide malicious actors with an easy gateway into secure systems. Social engineering exploits the natural human inclination to trust, deceive employees into divulging sensitive information or unwittingly granting access. Despite widespread awareness campaigns, these tactics continue to succeed, highlighting the gap between knowledge and practice, which presents a major risk to organizations.

Continue reading

Get 'The Self-Taught Computer Scientist' (worth $19.99) for FREE

Fresh out of college and with just a year of self-study behind him, Cory Althoff was offered a dream first job as a software engineer for a well-known tech company, but he quickly found himself overwhelmed by the amount of things he needed to know, but hadn’t learned yet. This experience combined with his personal journey learning to program inspired his widely praised guide, The Self-Taught Programmer.

Now Cory's back with another guide for the self-taught community of learners focusing on the foundations of computer science.

Continue reading

Apple relaunches Beats Pill with new design and enhanced audio for $149.99

Apple has reintroduced the iconic Beats Pill, a portable Bluetooth speaker that merges classic design with modern upgrades, available for $149.99 here. Offered in Matte Black, Statement Red, and Champagne Gold, the speaker comes fully equipped with improved sound quality, enhanced durability, and increased portability.

Oliver Schusser, Vice President of Apple Music and Beats, expressed his enthusiasm about the reintroduction, stating, "The Beats Pill is back and better than ever -- now packed with outstanding sound, all-day battery life, and convenient features."

Continue reading

Businesses regularly face AI-driven fraud

AI-Fraud-hacker

A new report finds that 76 percent of fraud and risk professionals believe their business has been targeted by AI-driven fraud, with over half reporting this type of fraud happening daily or weekly.

The study, from anti-fraud platform Sift, finds the emergence and increased adoption of AI tools, including publicly available chatbots, enables cybercriminals to conduct scalable fraud attacks against both individuals and businesses.

Continue reading

Forget Microsoft Windows 11 Copilot+ PCs: This TUXEDO InfinityBook Pro 15 is the Linux laptop you really need

As the tech world buzzes about Windows 11 and its Copilot+ PCs, those in the know might want to turn their attention to something running open-source software instead. Enter the TUXEDO InfinityBook Pro 15 -- a Linux laptop that combines sleek design with powerful performance, making it the smart choice for anyone looking to step beyond mainstream closed-source offerings. With its robust features and superior portability, this is the laptop you may want.

The newly refreshed TUXEDO InfinityBook Pro 15 has been designed to combine the functionality of a large, bright 15.3-inch screen and high-performance CPU options with the portability of an ultra-thin, lightweight aluminum body. Despite being less than 20 mm thick and weighing just 1.6 kg, the device doesn't compromise on functionality, making it ideal for both business and personal use.

Continue reading

WatchGuard makes enterprise-grade threat detection available for all organizations

Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts.

WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of visibility into east/west and north/south network traffic previously only available to large enterprises with the resources to manage their own security operations center.

Continue reading

DORA: A blueprint for cyber resilience in the U.S.

In today’s post-pandemic world, businesses are looking to shift back into the office while leveraging the learnings from the pandemic. Digital operations are going to be the new normal. With business innovations increasingly helping enterprises provide faster and easier-to-consume services to customers, the digital way of business is continuously creating a much larger digital footprint than ever before.

However, continuously increasing digital footprint also means possible targets of cyberattacks are also increasing equally rapidly. What is interesting to note is while investments in cybersecurity are increasing, so have the cyberattacks. According to CrowdStrike, attackers are moving faster within enterprises after an initial breach, with the average time it takes to hit patient 1 after patient 0 (the typical indicator of lateral movement) falling from 84 minutes to 62 minutes in the last year. Unfortunately, while many enterprises are continuing to invest in cyber security, far few invest in cyber defense, yet everyone wants the assurance of cyber resilience.

Continue reading

Office workers not worried about losing out to AI

Although many people fear that artificial intelligence could put their jobs at risk, a new study from Jitterbit shows that many see AI as offering new skills and personal growth opportunities.

Based on a survey by Censuswide of 1,022 full-time office workers in the UK and US, the study looks at how workers really feel about AI and the findings reveal a positive views of working with AI technology in professional settings.

Continue reading

Land of hope, glory and e-waste: Brits are set to become the biggest contributors to electronic waste this year, but why?  

As technology evolves and becomes more accessible, providing new and exciting ways to make our lives easier, it’s easy to ignore the elephant in the room -- the huge amount of e-waste our appetite for consumption is causing. Ignorance has been bliss, but with research suggesting this year the UK could become the world’s biggest contributor to e-waste per head, transformative action is long overdue. 

While our drive to have the latest technology is natural, we need to consider what happens to old devices when we upgrade. 

Continue reading

A technical overview of Cisco IoT part 2: Hardware

Cisco logo on laptop screen

The following article continues the Cisco IoT series, shifting focus to the essential networking hardware that powers IoT solutions. Part one of the series explored the foundational elements of IoT routing and switching, emphasizing the critical role these components play in ensuring seamless connectivity and robust data flow. Building on that discussion, this piece will outline the significant opportunities in IoT networking and security that Cisco supports through its innovative hardware offerings.

IoT is a rapidly expanding area of networking with increasing use cases. It impacts various sectors, including healthcare and retail, by providing valuable security or cost-saving benefits through new forms of sensors. These sensors enable new capabilities such as better inventory management and improved products.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.