Latest Technology News

Non-human identities pose security risks for enterprises

Non-human identities (NHIs) refer to things like API keys, service accounts, system accounts, OAuth tokens. You may not give them too much thought, but a new report from Silverfort looks at the impact they have on an organization's cybersecurity.

Active Directory service accounts -- used for machine-to-machine communication within Microsoft’s Active Directory's (AD) environments -- are the most common and regularly compromised NHIs.

Continue reading

Hell freezes over as Microsoft announces it is pulling ads from Skype

Delighted crowd

Skype is one of those apps that has found numerous ways to irritate users over the years. But in something of a surprise move, Microsoft has announced a change that will instead delight.

Considering that this is a company that has faced complaints and criticism for stuffing ads into its Windows and Office products, the announcement feels very out of character. But the killing off of ads is not the only change in Skype.

Continue reading

Google Maps makes it easier to report cops on the road

Waze Google Maps updates

Google has announced a series of updates for both Maps and Waze which will help to keep drivers better informed on their journeys. One of the most pleasing updates for Google Maps is an easier way to report when you've seen cops in the area so other drivers can be alerted -- and you can benefit from other drivers' reports.

Another helpful addition to Maps means that when you navigate to an address, the building you are looking for and, importantly, the entrance, will be highlighted for you. New features and options are not limited to Google Maps; Waze also has a number of handy additions.

Continue reading

Companies lack policies to deal with GenAI use

digital pioneer

While 27 percent of security experts perceive AI and deepfakes to be the biggest cybersecurity threats to their organisations not all have a responsible use policy in place.

The third part of a survey of over 200 information security professionals carried out at Infosecurity Europe 2024 has been released today by KnowBe4 and it finds 31 percent of security professionals admit to not having a 'responsible use' policy on using generative AI within the company currently in place.

Continue reading

'Yo quiero' Voice AI: Taco Bell enhances U.S. drive-thrus with new technology

Yum! Brands, owner of Taco Bell, has announced the expansion of its Voice AI technology to additional drive-thru locations across the U.S., aiming to equip hundreds of stores by the end of 2024. This development is part of a larger plan to eventually deploy Voice AI technology in Taco Bell drive-thrus worldwide.

The Voice AI technology, already operational in more than 100 Taco Bell drive-thrus across 13 states, seeks to streamline operations for team members and improve the ordering process for customers. The reported benefits include reducing the workload for team members, enhancing order accuracy, providing a consistent and amiable customer interaction, and decreasing wait times, which collectively contribute to Taco Bell's and Yum! Brands' growth objectives.

Continue reading

Get 'Deep Learning Approaches to Cloud Security' (worth $190) for FREE

Covering one of the most important subjects to our society today, Deep Learning Approaches to Cloud Security delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.

Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. However, applying deep learning techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to visualization.

Continue reading

Samsung launches 1TB PRO Plus and EVO Select microSD cards

Samsung has launched 1TB variants of its PRO Plus and EVO Select microSD cards which are enhanced by the company's eighth-generation V-NAND technology. These new offerings aim to meet the growing demands for high-performance and high-capacity storage solutions, particularly among content creators and tech enthusiasts.

Hangu Sohn, Vice President of Memory Brand Product Biz Team at Samsung Electronics, noted the importance of these advanced storage solutions in today’s tech landscape. "The new high-capacity microSD cards, PRO Plus and EVO Plus, are our response to the demand for storing large amounts of high-quality data in a reliable and secure way," Sohn explained.

Continue reading

Nation-state actors exploit political tension to launch phishing campaigns

A new report from phishing protection specialist Bolster identifies 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to interfere with the 2024 presidential elections.

Attackers are leveraging AI to automate mass spam campaigns, and also to reply in real-time. This targeting and interactivity at scale increases their chances of gaining access to more sensitive data. The influx of election-themed spam is a significant cyber threat, causing widespread confusion among citizens and undermining trust in legitimate election communications.

Continue reading

Enterprise AI adoption soars almost 90 percent

For some time now AI has been the go-to technology to enable informed decision making, accelerate innovation, and enhance experiences for both employees and customers.

A new report from Cloudera shows that 88 percent of enterprises are adopting AI in some capacity, but many are still lacking the necessary data infrastructure and employee skills to truly benefit from it.

Continue reading

Report highlights cyber risks to the aviation industry

aircraft

It's fair to say that no industry is truly safe from cyber attacks these days, the aviation sector is at particular risk due to the volume of customer data it handles and the potential to cause widespread disruption.

A new report from SecurityScorecard focuses on cybersecurity vulnerabilities across the airline industry and its various supply chains.

Continue reading

40 percent of BEC attacks are AI generated

Almost half (49 percent) of all detected spam emails are attributed to business email compromise (BEC) scams, with the CEO, followed by HR and IT, being the most common targets according to a new report.

The research from VIPRE Security Group puts a more sinister complexion on this trend, revealing that a full 40 percent of the BEC emails uncovered were AI-generated, and in some instances, AI likely created the entire message.

Continue reading

Google issues apology for Chrome flaw that broke its password manager

Chrome logo

Google has apologized for a Chrome problem that resulted in millions of users being unable to use the browser's password manger.

The issue meant that affected users were not able to access saved passwords for the majority of a day. In issuing its apology, Google explains that a faulty update for the M127 version of Chrome for Windows was to blame, noting that the problem hit users globally.

Continue reading

Why we need to change how we understand cyber risk [Q&A]

Cybersecurity is a high priority for organizations, yet often they're unsure if they're focusing their effort in the right places, and spending too much or too little on protecting themselves.

Robin Oldham, CEO of Cydea, believes current methods of understanding cyber risk are outdated and misrepresent risk and lead to misunderstandings that only promote fear, uncertainty and doubt. We spoke to him to find out what can be done to change this mindset and approach.

Continue reading

AI's impact on emerging risk management trends

AI is exploding, particularly as large language models (LLMs) have infiltrated everyday life. Almost every new mainstream product seems to promote some usage of AI, and industry after industry is being transformed by its capabilities. But despite AI’s potential, some sectors have been slow to adopt it. Risk management is one of them. Fortunately, that is starting to change.

According to a 2023 Deloitte study, only 1.33 percent of insurance companies had invested in AI. Data from this year indicates a shift is underway. In Conning’s 2024 survey, 77 percent of respondents indicated that they are in some stage of adopting AI somewhere within their value chain. This may sound a bit nebulous -- some stage, somewhere -- but it represents a sizable jump from the 61 percent of respondents the prior year. Additionally, 67 percent of insurance companies disclosed they are currently piloting LLMs.

Continue reading

The CISO's guide to effective OT security: Overcoming challenges and fostering collaboration

CISO

Operational technology (OT) systems have long been common in industries such as manufacturing, utilities, and healthcare. However, as these systems now increasingly integrate with IT networks, they are becoming the responsibility of the Chief Information Security Officer (CISO). As a result, CISOs in these sectors need to secure OT systems alongside traditional IT systems. This added responsibility has significantly increased the demands on security leaders.

Now, to safeguard both IT and OT systems, CISOs must possess the right knowledge and resources. Understanding the complexities of OT systems is necessary for the protection of vital operations and infrastructures, however it can be difficult to separate genuine expertise from sales hype. 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.