Latest Technology News

Vulnerability management is complex, so how can we work smarter to reduce risk?

Risk dial

The saying "too many cooks spoils the broth" could well be true in the case of how we currently approach vulnerability management (VM). The process around vulnerabilities has become increasingly complex, with high levels of pressure to ensure that it is done right.

Vulnerabilities have long been one of the most prominent attack vectors, yet so many are left unpatched by organizations of every size and across every vertical -- the root of catastrophic issues. The Ponemon Institute conducted a recent study that found almost half of respondents (48 percent) reported that their organizations had one or more data breaches in the past two years. In addition, the discovery of high-risk vulns in 2020 alone, has drastically increased by 65 percent -- ultimately alluding to the fact that breaches could potentially become increasingly impactful. The longer a vulnerability remains present, the higher the chance that it will be exploited by bad actors.

Continue reading

Protecting your business' legacy systems from ransomware attacks

Ransomware eye

Despite the significant shift and adoption of new technologies over the past few years, many businesses still rely on legacy infrastructure. Legacy servers are often still in operation because they are far too critical, complex, and expensive to replace. Famous examples include Oracle databases running on Solaris servers, applications using Linux RHEL4, or other industry-specific legacy technology. 

Although critical to the business, these legacy systems can increase a company's risk -- gaining access to just one unpatched legacy device can be relatively simple for cybercriminals. Once inside, said criminals will move laterally to gain a deeper foothold inside the network and deploy more significant attacks.

Continue reading

Google Fi gets end-to-end encryption for phone calls, but there's a big catch

Google Fi is the search giant's affordable MVNO cellular service, where it piggybacks off of the T-Mobile and U.S. Cellular networks. Despite being a Google service, it is actually compatible with Apple iPhone devices too. In other words, it is not an Android-only affair. While Google Fi is not wildly popular, many of its users speak favorably of the service -- it is apparently quite good.

And now, Google Fi is getting even better. You see, the search giant has introduced end-to-end encryption for phone calls -- a huge benefit for privacy. Unfortunately, there are some caveats here. For the calls to be encrypted, the speakers on the call must both be using Google Fi service -- that should be fairly obvious. However, there is one very big catch that might surprise you -- this feature is only compatible with Android devices. In other words, iPhone users with Google Fi are being left out of the encryption party.

Continue reading

Microsoft Edge stable now available on Linux

Edge

Linux users have been able to use Microsoft’s Chromium-based Edge browser for a while now, but in Dev Build and beta versions.

Today though the software giant has updated its Edge repository to add a new stable version of the browser, so if you’re running a Linux OS and want to try out Edge alongside your existing browser you can.

Continue reading

Get 'Tribe of Hackers Security Leaders' ($15 value) FREE for a limited time

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations.

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.

Continue reading

More than half of employees have higher workloads when working remotely

A new survey of over 4,000 global IT workers, carried out by Kaspersky shows that 54 percent of employees have reported an increased workload since switching to remote working.

While 37 percent of respondents didn't notice a change in volume, a lucky nine percent note a decrease in work due to new working conditions.

Continue reading

How to keep your hybrid workforce engaged

remote work

The way businesses operate has changed significantly since the first national lockdown in March 2020. But arguably one of the biggest changes has been the way businesses use technology. Data from McKinsey shows that businesses accelerated their digitization by three to four years in the first four months of the pandemic.

This adoption of new technology has not come without its teething problems, however, and this is especially true for businesses with large office contingents. These workers promptly switched to remote working in March 2020 and had to adapt to these technologies while working from home. Google data shows that searches for terms on how to use tools like Zoom rose exponentially during the first few months of the pandemic, with "how to use Zoom" increasing by 7,016.74 percent.

Continue reading

Best Windows apps this week

Four-hundred-sixty-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft started the rollout of the new Microsoft Store on Windows 10. It is being made available to Release Preview insider builds at first, but it will be pushed to stable versions of Windows 10 soon as well.

Continue reading

Who wants to be a cyborg? Quite a lot of people it seems

Would you be willing to have technology implanted in your body? A survey by marketing and communication tool Tidio reveals the extend to which people are open to 'biohacking'.

More than 75 percent of respondents say they are willing to implant a microchip for health monitoring, and 57 percent are eager to go further and transfer their consciousness to a machine or a different body and live forever as cyborgs.

Continue reading

Why it's vital to address cybersecurity in the wider context of the business [Q&A]

It's easy to pigeonhole cybersecurity as something for the IT or security team to look after. But a major cyberattack can have a devastating impact on the business as a whole.

It's important, therefore, that security be looked at in the context of the entire enterprise. This also means considering approaches like 'assumed breach' where you accept that sooner or later attackers will succeed in getting into your network.

Continue reading

Microsoft releases PowerToys v0.49 with new mouse utility and UI updates

Microsoft PowerToys

A new release cycle has started for the PowerToys collection of utilities. Kicking off with PowerToys v0.49, Microsoft promises that this and the upcoming batch of releases include "exciting new updates".

And things get off to a great start with the arrival of not only the Video Conference Mute tool in the stable build, but also a brand-new utility -- Find My Mouse. There are also numerous fixes and improvements as a well as a UI update for PowerRename.

Continue reading

Meta leak shows Facebook smartwatch could be an Apple Watch killer

Meta / Facebook smartwatch

Meta, TCFKAF (the company formerly known as Facebook) appears to be working on a range of smartwatches that bear more than a passing resemblance to the Apple Watch.

At least two wearables are thought to be in development, one of which is codenamed Milan. But what is causing the greatest interest is an image of a smartwatch featuring a notch that is home to a camera.

Continue reading

Facebook's new name is just the start -- Zuckerberg says a billion people will be in the metaverse within ten years

We knew that Facebook was going to announce a name change today, but what we didn’t know for certain was what that name would be. The smart money was on something to do with the metaverse, which many firms -- Facebook especially -- believe could be the future of the internet.

Much as Google rebranded its parent company Alphabet back in 2015, so Facebook’s parent company is now called Meta, and gains a new blue infinity symbol for a logo. This change only affects the parent company -- the names of the apps everyone knows and uses -- Facebook, Instagram and WhatsApp will stay the same, although the Oculus VR brand will be phased out.

Continue reading

How safe is your email?

Despite the rising popularity of other communication and collaboration methods like Zoom and Teams, email remains at the core of business correspondence. However, it also remains a popular vehicle for delivering cyberattacks and other unwelcome material.

Secure email company Avanan has produced an infographic looking at email safety.

Continue reading

IT outages can cause severe business damage in hours

A new survey finds that 83 percent of companies would suffer business damage during the first 24 hours of an outage and its aftermath.

The study from Dimensional Research on behalf of Netenrich also uncovers a number of contradictions in enterprises' attitude to scaling their security operations.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.