Emotet bounces back at the end of last year following earlier take down


One of the more significant good news security stories of last year was the culmination of an international effort in January to take down the Emotet botnet.
Sadly it seems that you can't keep a bad botnet down for long. The latest Q4 and Year in Review Threat Report from Nuspire shows Emotet bouncing back, with steadily increasing levels of activity throughout December.
Consumers value APIs for convenience but worry about risks


APIs power many of today's digital experiences, connecting consumers to businesses and businesses to one another while enabling cross-platform services.
But as APIs spread so do the risks, they have quickly become the attack vector of choice for threat actors who exploit insecure APIs for malicious purposes. A new report from ThreatX takes a detailed look at how API use impacts on consumers.
Enterprise tech leaders want a one-stop solution to manage all their platforms and clouds


The old days of having systems in-house where they were easy to control are long gone. Businesses today are increasingly reliant on a range of cloud, SaaS and other solutions that can be a challenge to manage.
A new report from CloudBolt Software shows that 88 percent of over 500 senior tech people surveyed say they want a 'manager of managers' -- an overarching solution to bridge the siloes, unify the overall multi-cloud/multi-tool strategy, and actively govern everything from a single location.
Ubuntu and other Linux distros at risk from Oh Snap! More Lemmings security exploit


Security researchers from Qualys have issued a warning about a Local Privilege Escalation Vulnerability Discovered in the snap-confine function of Canonical's Snap package manager.
Known as Oh Snap! More Lemmings and tracked as CVE-2021-44731, the collection of security flaws can be exploited to gain root privileges.
Microsoft is testing an annoying desktop watermark if you install Windows 11 on unsupported hardware


One of the obstacles standing in the way of some people upgrading from Windows 10 to Window 11 is system requirements. Even some relatively new systems are unsupported due to lacking features such as TPM 2.0, but where there's a will there's a way, and there are various workarounds that make it possible to install Windows 11 on pretty much any system.
If you have opted to go down this route, Microsoft is preparing to irritate you. The company is testing a desktop watermark that will serve as a constant reminder that you're using unsupported hardware. The message reads "System requirements not met" and is sure to lead to a surge in watermark removal tools. [UPDATE: it is now possible to hide the message!]
Is the Netflix price hike too much for you?


Streaming video has been a big deal for a while and for many it’s replaced cable and satellite services, with some choices offering live TV over the internet. You might think you'll save money by cutting the cord but really, voice of experience here, you'll end up paying just as much in the long run, depending on the services you choose to have.
Yesterday, Netflix announced a price hike going into effect in the month of March. The price will be jumping from $13.99 per month for the standard plan to $15.49. The company today sent out an email to its considerable user base stating:
Microsoft has updated the data wiping tool in Windows 10 and Windows 11... and now it leaves behind data


Using Windows' built in option to reset your computer and erase data may not be as secure as you thought. If you are passing on a computer to a friend or family member, or perhaps selling a machine you no longer need, you may well have used the option to reset the PC and wipe out your personal data. While this seems like a sensible move, an update to the data wiping tools in Windows 10 and Windows 11 means that potentially revealing and sensitive data can be left behind.
Tests conducted by Microsoft MVP Rudy Ooms showed that in Windows 10 version 21H2 and Windows 11 version 21H2 the data wiping function left behind user data in the Windows.old folder. Versions of the operating system prior to 21H2 did not suffer from this issue.
Manufacturers should now turn the pandemic response into a post-pandemic strategy


Covid-19 has, of course, had an immense impact on health, society, industry, and economies. Just three months before the first wave started to rapidly sweep the globe in 2020, it had practically never been heard of. Yet as soon as it emerged, entire industries were shut down while others were severely disrupted. Workers on mass were directed by governments not to travel or to work from home wherever possible, and those that had underlying health conditions were forced to self-isolate. It felt like the world as we knew it was turned upside down overnight. Businesses had no experience of such calamity, nor had they any contingency plans that came anywhere close to being adequate. The rule books were simply torn up overnight.
Most businesses had to adapt on the fly, and rapidly. Every day felt like another firefighting day, and as soon as the fires were out, along came the next wave or variant. As a result, manufacturers had to rapidly change their operations in response to supply and demand chain volatility or workforce availability. Changes to technology platforms to support remote workers had to be implemented in weeks, if not days. There was no time for proper planning, feasibility studies, risk assessments, or preparing a detailed business case with return on investment projections. Change simply had to just happen quickly.
How long does it take to become a CTO?


Chief Technology Officer. Sounds good doesn't it? But it must take years slogging away at the IT coal face to reach such an exalted position, right?
Wrong actually. New research from European software development company STX Next shows that 20 percent of CTOs reached their position in fewer than five years.
40 percent of incoming emails are potential threats


New research from Hornetsecurity finds that 40 percent of all inbound emails pose a potential threat, including spam, phishing and advanced threats such as CEO fraud and any type of malware.
Phishing, malicious links, and ransomware are among the most popular attack tactics used by hackers with brand impersonation being especially popular.
Researchers use Hive ransomware's own encryption algorithm to find master decryption key


Security researchers have managed to use the encryption algorithm used by the Hive ransomware to determine the master key needed to decrypt files for free.
Ordinarily, victims of a Hive ransomware attack would have to pay up to receive their individual decryption key. But a team of researchers from the Department of Financial Information Security, at Korea's Kookmin University, have been able to calculate the master key. This has then been used in what is believed to be the "first successful attempt at decrypting Hive ransomware"
Utilizing objective data to provide equitable student support


We’ve all heard the term leveling up, but what does it really mean for higher education? To me, it simply means getting everyone up to the same level, right?
But when it comes to government policy, the idea that through effort and application we can rise to the top is the very antithesis of fair equity -- a lofty ambition of jobs, boosting productivity in places of previous decline and limit any degeneration.
How to address the security risks of cloud migration [Q&A]


Cloud is an enabler of productivity and provides the infrastructure which supports modern distributed workforces. But it also poses a serious security risk to businesses that are unprepared to cope with modern threats. Figures from 451 Research show that 40 percent of organizations have experienced a cloud-based data breach in the past 12 months.
Organizations are spending millions on firewalls, endpoint protection and other security measures. What these organizations are missing, however, is visibility and control of security policies that govern 'what can talk to what' and 'who can talk to who' across the entire organizational infrastructure, including on-premise, cloud-native, and hybrid cloud. This creates security blind spots and misconfigurations.
The most expensive data breaches of the 2020s


Data breaches not only lead to a loss of reputation and drive customers elsewhere, they also have a significant financial cost.
A new study from Surfshark applies IBM's 'Cost of a Data Breach' calculations to the largest data breaches of the last two years in order to find the estimated cost of some of the biggest data breaches.
You may have just installed Windows 11, but Microsoft could be readying Windows 12


SwiftOnSecurity has stirred up a huge level of interest and excitement after suggesting that Microsoft is already busily working on Windows 12.
The rollout of Windows 11 may have gone well, but the cyber security expert and Microsoft MVP tweeted saying that the successor is already in the pipeline. A tweet reading "according to a source at Microsoft, Windows 12 is already under development and it's going to require two TPMs" appeared over the weekend. What is going on?
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.