Latest Technology News

Managing identities between clouds is the top challenge for businesses

More than three-quarters (78 percent) of respondents to a new survey say managing user identities between multiple clouds is their number one challenge.

The study carried out by Forrester for Strata Identity finds 70 percent want to migrate to the cloud increase security and protect data. But at the same time 28 percent of companies are using four or more public/private clouds today and that's expected to more than double in two years to 65 percent.

Continue reading

'Kyiv Calling': Ukrainian punk band turns to The Clash and YouTube to help its country

For the past month, I have been updating a story on the Russia-Ukraine war from a tech perspective, covering the many online entities being blocked by Russia and the ways groups like Anonymous have been feverishly working to cause Putin, his government, and the Russian military as many headaches as it can. I've even looked at the ways that have sprung up to track things like weapons and Oligarch private jets. Those updates are officially over now, as the number passed twenty, and the page became too much to reasonably expect a person to scroll. 

The end of the daily updates does not, unfortunately, mean an end to war and the deaths and displacements it is causing. So, we'll continue to bring you the important news as it happens. 

Continue reading

Ransomware can encrypt 100,000 files in under 45 minutes

Dissolving clock

New research from Splunk's SURGe team looks at how quickly ten major ransomware strains, including Lockbit, Revil and Blackmatter, can encrypt 100,000 files.

The research shows that the median ransomware variant can encrypt nearly 100,000 files totaling 53.93GB in 42 minutes and 52 seconds. Encryption speeds vary between ransomware variants though with individual ransomware samples ranging from four minutes to three and a half hours to encrypt the same data.

Continue reading

Poor security practices still a challenge for hybrid work

home working security

Almost a third (29 percent) of workers still use the same passwords for both personal and work accounts, potentially compromising their organisation if a personal account gets hacked.

A new study of 2,000 UK adults carried out by OnePoll for professional services company Gemserv also shows 39 percent of respondents access corporate accounts and content from their personal devices often or always, with another 24 percent doing so sometimes.

Continue reading

Microsoft confirms it was hacked as Lapsus$ leaks 37GB of source code

Microsoft headquarters

Microsoft has confirmed reports that it was hacked by the Lapsus$ extortion group, also known as DEV-0537. While admitting that the hackers managed to steal source code, the company is simultaneously trying to downplay the incident.

Lapsus$ shared a 37GB archive online containing partial source code for Cortana and Bing, but Microsoft insists that no customer data was compromised. The company says that "our investigation has found a single account had been compromised, granting limited access."

Continue reading

Microsoft releases KB5011543 update preview to bring new Search Highlight feature to Windows 10

Colorful Microsoft logo

With Windows 11 now very much Microsoft's focus, it might come as something of a surprise to find that the company is still adding things to Windows 10 -- but with the release of the KB5011543 update, this is precisely what is happening.

This is a preview of the update that will be officially released on April's Patch Tuesday, and it is designed for Windows 10 20H2, Windows 10 21H1 and Windows 10 21H2. What can you expect in this update? In addition to the arrival of search highlights -- with slightly different looks for enterprise users and ordinary consumers -- there are numerous bug fixes, and changes to the Action Center.

Continue reading

Microsoft's furry Sonic the Hedgehog 2 Xbox controllers are magnets for stains, foul odors, and other grossness

Microsoft unveiled the newest Xbox controller today and it is both disgusting and disturbing. As part of a promotion for the upcoming Sonic the Hedgehog movie sequel, a furry/hairy controller was created in two colors -- red and blue. The colors represent Sonic (blue, duh) and Knuckles (red).

While the controllers look... interesting, they are sure to be very gross. Many gamers eat food while gaming, so you can only imagine all the Doritos and Cheetos dust that will get stuck in the fur. Not to mention, during long gaming sessions, your hands will sweat and cause the controller to get wet and smelly. Hell, this new controller could end up being ground zero for a future pandemic. Gross!

Continue reading

Dynabook's Tecra A40-K And A50-K laptops come with AI features for the modern hybrid worker

Dynabook (formerly Toshiba PC Company) has announced two new laptops in its Tecra range -- the 14" Tecra A40-K and the 15" Tecra A50-K.

Both new laptops are powered by the latest 12th generation Intel Core P-Series 28W processors (up to i7) and come with Windows 11 Pro. They also have AI tools to increase productivity and collaboration within the workplace, including Cortana-enabled dual mics with AI noise reduction, and a face authentication camera with AI-enhanced functionality.

Continue reading

81 percent of organizations have outages caused by expired certificates

Magnified certificare

A new report shows that 81 percent of organizations have experienced at least two or more disruptive outages caused by expired certificates in the past two years, up from 77 percent last year.

The report from machine identity platform Keyfactor, based on research by the Ponemon Institute, finds the cut in SSL/TLS certificate lifespans to one year in September 2020 has made it much more difficult to keep the pace with certificate issuance and management.

Continue reading

How to best serve your SRE and DevOps teams

DevOps

Technology is critical to driving business growth and increasing revenue in our fast-growing digital economy. But the effectiveness of a technology is often determined by its performance and reliability.

DevOps and site reliability engineering (SRE) teams are behind this continuous availability. These teams ensure the top performance of an organization’s apps and vital services, especially as IT environments grow in complexity. Avoiding incidents and outages is only one aspect of the job though.

Continue reading

Most enterprise network assets are cloud-based but policies aren't keeping pace

Nearly 90 percent of device assets in the modern organization are cloud-based, meaning physical devices such as laptops, tablets, smartphones, routers, and IoT hardware represent less than 10 percent of total devices.

However, the latest State of Cyber Assets report from JupiterOne analyzed nearly 10 million security policies and finds that cloud-specific ones represent less than 30 percent of the total.

Continue reading

Pen testing tools increasingly used by threat actors

Attack route

Legitimate penetration testing tools like Cobalt Strike, Impacket and RMM, are being used by threat actors because it's more efficient to use existing tools that are proven to be successful than to create new software.

The latest Threat Detection Report from managed detection and response firm Red Canary shows Cobalt Strike in particular has never been more popular, impacting eight percent of its customers in 2021.

Continue reading

F-Secure creates new corporate security brand

Cybersecurity company F-Secure is rebranding its corporate security business under the new name WithSecure and with a snazzy new logo, above.

Previously known as F-Secure Business, WithSecure will focus on corporate security products and solutions, while consumer security products and services remain available under the existing F-Secure name.

Continue reading

Android Messages and Dialer apps sent data to Google without consent

Google building logo

In a paper published by Douglas J Leith of Trinity College Dublin, it is claimed that the Messages and Dialer apps found in Android have been sending data back to Google. The paper, entitled "What Data Do The Google Dialer and Messages Apps On Android Send to Google?" says that data is sent without user knowledge or consent.

In what could be a breach of GDPR legislation, it is claimed that there is also no way to opt out of the data sharing. Among the data said to be shared with Google are phone numbers, call duration, hashes of messages and more.

Continue reading

Screenshots leaked by Lapsus$ strongly suggest Microsoft has been hacked

Angled Microsoft logo

Microsoft is conducting an investigation after data extortion group Lapsus$ claimed to have hacked the company and stolen data.

In a leaked screenshot, the hackers brag about gaining access to an Azure DevOps repository which is home to source code for all manner of Microsoft projects including Bing and Cortana. Having already hacked the likes of Samsung, NVIDIA and Vodafone, the claims made by Lapsus$ are entirely feasible, but for now Microsoft is saying nothing about what -- if anything -- has been stolen.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.