Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

microsoft-365-security

Does your Microsoft 365 need to be protected?

As organizations move to fully embrace cloud, the significant benefits of running IT infrastructure via cloud services are becoming even more evident. Not only do cloud-based services come at a far lower cost than physical platforms and deployments, IT leaders are also able to side-step much of the risk and 'heavy lifting' around tech investment and maintenance by moving this out of local data centers. They can also enjoy expert third-party systems management and reliable service delivery, without having to give up much of the control for end users.

Microsoft 365 is a great case in point. The procurement model for this ever-expanding suite of high-qual­ity IT services is based around a price per user. It is easily scalable as teams and organizations grow and can therefore help to optimise budgets, avoiding payment for infrastructure that may go unused. It’s also growing, with new features and functionality added every day that will keep IT departments at the cutting edge of optimal business processes.

By Sam Woodcock -
Shadow IT

Shadow IT is top security concern around SaaS adoption

A new study shows that 69 percent of tech executives believe shadow IT is a top security concern related to SaaS adoption.

The report from automated SaaS management platform Torii reveals 41 percent of executives say challenges with SaaS spend visibility and optimization have impacted the way their organization operates.

By Ian Barker -
call center

Fraudsters better than customers at answering security questions

We're all used to those irritating questions you have to answer when you contact a company: the make of your first car, the town where you were born, the dog's maiden name, etc. But it seems that criminals may actually be better at answering them than we are.

Fraudsters are able to pass knowledge based authentication (KBA) questions 92 percent of the time, based on a national contact center case study, while genuine customers only pass KBA's 46 percent of the time.

By Ian Barker -
Cloud

Evolving attack techniques target cloud-native systems

Attackers are finding new ways to target cloud-native environments according to a new report from Aqua Security's Nautilus threat research team.

While cryptominers are the most common malware observed, with increasing frequency researchers have discovered an increased usage of backdoors, rootkits and credential stealers.

By Ian Barker -
wind-solar-energy

The essential ingredient to manage the complexity of energy models: AI

In just a few years, energy management has become a real headache. Not only must the growth in electricity consumption be taken into account, but also the reduction in fossil fuels, and the increase in the production of renewable energies, knowing that they operate intermittently -- a complexity that cannot be resolved without massive data collection, high computing capacity and AI algorithms.

While global warming should force us to reduce our energy consumption, on July 15, 2021, the International Energy Agency (IEA) announced an increase in global electricity demand of five percent in 2021 and four percent in 2022. This is a trend that is not ready to be reversed, driven by the increasingly abundant and electricity-intensive technology era, by a global population that should reach 10 billion in 2050 or even by the development of metropolises and megacities that are still energy intensive.

By Pierre Goutorbe -
Piggy bank theft

Cybercriminals are increasingly targeting the financial industry

Cybercrime tends to follow the money when it comes to selecting targets, so it’s perhaps not too surprising to learn that 63 percent of financial institutions admit experiencing an increase in destructive attacks.

The latest Modern Bank Heists report from VMWare surveyed the financial industry's top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive shift in the sector.

By Ian Barker -
Binary skull

Kaspersky releases free decryptor for Yanluowang ransomware

While the Russian security firm has fallen out of favor in recent months, Kaspersky has announced that it has managed to crack the Yanluowang ransomware.

Yanluowang was discovered by Symantec last year, and now Kaspersky has identified a vulnerability in the encryption algorithm it uses. This has enabled the company to develop a free decryption tool which can be used by ransomware victims to get their data back without having to pay a cent.

By Sofia Elizabella Wyciślik-Wilson -
Windows 11 monitor

Microsoft is disabling SMB1 for Windows 11 Home users

Microsoft has announced that it is beginning the final phase of disabling the SMB1 file-sharing protocol in Windows. Having already disabled SMB1 by default in Windows 10 and Windows Server, the company is now doing the same for Windows 11 Home.

While conceding that the ditching of SMB1 may "cause a consumer pain among folks who are still running very old equipment" and acknowledging that this is a "group that's the least likely to understand why their new Windows 11 laptop can't connect to their old networked hard drive", Microsoft says that the time has come for the aging technology to be dropped.

By Sofia Elizabella Wyciślik-Wilson -
Lenovo laptop

Security researchers discover serious UEFI firmware vulnerabilities affecting millions of Lenovo laptops

A team of security researchers at ESET have unearthed a trio of vulnerabilities with Lenovo laptops. More than one hundred different models of laptop are affected, meaning that millions of owners are at risk.

Two of the vulnerabilities (CVE-2021-3971 and CVE-2021-3972) affect UEFI firmware drivers and are extremely worrying because of the potential implications of exploitation. CVE-2021-3970 is a slightly less serious memory corruption problem, but it remains concerning.

By Sofia Elizabella Wyciślik-Wilson -
Netflix logo with remote

Netflix shares tumble as company reveals drop in subscribers, plans for ads, and price increases for account sharers

Shares in Netflix plummeted by more than a fifth after the streaming company reported a drop in subscriber numbers for the first time in more than a decade. In the first quarter of 2022, Netflix lost 200,000 subscribers and the prediction is for things to get much worse over the rest of the year.

For those subscribers who are sticking around, there is a double whammy of bad news. Not only is there the threat that Netflix will introduce advertisements, but also that it will charge higher subscription fees to anyone who shares their account with others.

By Sofia Elizabella Wyciślik-Wilson -
LOGI-Lift

Logitech Lift Vertical Ergonomic Mouse is good for your wrist and planet Earth

Would you rather have a computer mouse that is ergonomically correct or one that is good for the Earth? If you are like me, that is a very hard question to answer. Thankfully a new mouse from Logitech addresses both issues -- it is designed for both a healthy wrist and planet!

Called "Lift Vertical Ergonomic Mouse," it is available in two models -- one for right-handed users and one for lefties. The right-handed version of the wireless optical mouse can be had in your choice of three colors -- graphite (black), rose (pink), and off-white, while the lefty variant is limited to graphite. The mouse is partially made of post-consumer recycled plastic, the percentage of which varies by color.

By Brian Fagioli -

Game developers shouldn't overlook Python's potential

Python is an object-oriented, general-purpose, and high-level programming language that was developed in 1991 by Guido van Rossum. Since its development, Python is one of the most popular programming languages worldwide. It often ranks high in surveys -- for instance, it claimed the first spot in the Popularity of Programming Language index and came second in the TIOBE index.

Python has gained its acclaim as a widely used tool with multiple purposes for various projects, from data analytics and visualization to artificial intelligence, language development, design, and web development. Python isn’t renowned for its use in video game development. But should this mean game developers should just disregard Python completely?

By Hubert Kozacz -
Hand of God

How to activate all of Windows 11's secret God Modes

Windows 7 introduced a useful hidden God Mode that displays all of the admin tools and control options on a single screen. Because Microsoft has yet to phase out Control Panel entirely, this feature works just fine in Windows 11.

It’s very easy to action God Mode -- you just need to create a folder and give it a special name -- and there are actually quite a few alternative God Modes available. Here’s what you need to do.

By Wayne Williams -
Ransomware,Cyber,Attack,Showing,Personal,Files,Encrypted,Screen

Critical steps to ransomware protection in the cloud

The ransomware threat is very real with attacks growing in size and frequency, in part, because of the acceleration of digital transformation initiatives and the move to embrace digital services as well as the rapid implementation of hybrid ways of working.

As new digital systems required multiple access points for customers, partners, and employees, this has created a vastly expanded attack surface. This has hastened the rise in ransomware attacks, as attackers quickly took advantage of the increased number of possible attack vectors. 

By Brian Knudtson -
Broken umbrella in storm

More than half of DevOps professionals see their cloud provider as a threat

Over 50 percent of DevOps professionals and leaders say their cloud service provider is already a competitive threat to their B2B or B2C business or is expected to become one according to new research.

The study, carried out for cloud provider Linode, by Techstrong Research surveyed over 500 development professionals, managers and senior managers across 20 industries, and finds 75 percent say that their IT infrastructure will be cloud-based by the end of this year.

By Ian Barker -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.