Microsoft is making big changes to Settings in Windows 10

Windows key on keyboard

Microsoft has made some very dramatic changes to the look and feel of Windows 10 over the years, and this is not a trend that's set to change any time soon. Continuing its plan to kill off the legacy Control Panel, the company is introducing big changes to Windows 10's Settings app.

The changes will be important to anyone who is keen on customizing or taking control of Windows, giving them two important new options that are sure to be welcomed by power users -- especially those who want to kill off the Task View button.

Continue reading

Software industry turns to crowdsourced security during the pandemic

Online security

Among the many things that have changed in 2020 it's proved to be a record year for crowdsourced cybersecurity adoption, according to Bugcrowd.

Enterprises across all industries have been implementing crowdsourced cybersecurity programs to keep up with the evolving threat landscape. Bugcrowd has seen a 50 percent increase in submissions on its platform in the last 12 months, including a 65 percent increase in Priority One (P1) submissions, which refer to the most critical security vulnerabilities.

Continue reading

DDoS attacks up 287 percent as online gaming and gambling become prime targets

DDoS attack

A lockdown increase in online gaming activity has inevitably attracted attention from attackers, resulting in nearly 77 percent of cyberattacks targeting the online gaming and gambling industries in Q3 of 2020.

The latest DDoS Threat Report from Nexusguard also reveals a huge 287 percent increase in total DDoS attacks in the third quarter compared to the same period last year.

Continue reading

Plugable releases TBT3-UDC3 Thunderbolt 3 and USB-C docking station with 100W PD

TBT3-UDC3-1

There are so many docks and docking stations nowadays, that it can be hard to get excited about them. Look, I get it, they all pretty much do the same thing -- turn your laptop into a desktop while also charging it. The thing is, not all of them are created equally. In fact, some are much better than others.

With all of that said, Plugable has a new docking station that is worth your attention. Called "TBT3-UDC3," it is compatible with both Thunderbolt 3 and USB-C computers thanks to its use of Intel's Titan Ridge chipset. What makes this port so intriguing (beyond its 11 ports) is its 100 watts of power delivery and affordable price -- especially with a limited time coupon.

Continue reading

COVID-19 highlights barriers to zero trust adoption

Login key

With many large enterprises using Active Directory (AD) and Azure Active Directory (AAD) to control user permissions and access, this has become one of first places attackers look for weakness.

Add to this an acceleration of digital transformation projects due to the pandemic and more and more companies are looking to implement zero trust to stay secure. But a new report from One Identity suggests this transition may prove challenging.

Continue reading

Millions of medical images openly available online

Medical data risk

The analyst team at digital risk protection firm CybelAngel has discovered that more than 45 million medical imaging files, including X-rays and CT scans, are freely accessible on unprotected servers.

The findings are the result of a six-month investigation into Network Attached Storage (NAS) and Digital Imaging and Communications in Medicine (DICOM), the de facto standard used by healthcare professionals to send and receive medical data.

Continue reading

Microsoft releases Windows 10 Build 20279

Last week, Microsoft released two different Windows 10 builds to the Dev Channel, giving Insiders a chance to choose if they wanted to stay on the FE_RELEASE branch or switch to the more experimental RS_PRERELEASE branch.

For those who stuck with the FE_RELEASE branch, Microsoft now has another new build to try out (those on RS_PRERELEASE won’t get this).

Continue reading

E-merchants: Secure your online sales from cybersecurity threats during Christmas and beyond

security

The Christmas shopping season is in full swing. This year, online retailers pushed the boundaries with "Black November" in the hopes of improving their online sales, thanks to the uncertainty around in-store shopping due to COVID-19, leading many customers to make their purchases from the safety of their own homes.

As a result, e-commerce merchants have witnessed a significant uptick in users and devices connecting to websites than in recent years.

Continue reading

What cloud transformation means for your legacy systems

Storage

With Salesforce purchasing Slack for $27.7 billion and Microsoft Teams reporting over 115 million daily users, the market for collaboration tools is proving that they are here to stay. With the ubiquity of remote work, companies are reliant on sharing data outside of the traditional, on-premises network to reach employees in their homes. Accordingly, for organizations to optimize their communication platforms’ utility, data policies should allow remote access to files. Consequently, lots of organizations have been forced into accelerating their cloud adoption to meet the needs of their remote workforce, leaving the question: what is to become of legacy systems?

While there is a lot of thought being given to new cloud initiatives, this narrow focus can sometimes let legacy data and systems fall by the wayside. Data regulations do not only pertain to the storage of new information, but they also mandate the proper storage of data from recent years past. Consequently, while it is critical during cloud transition to consider how to defensibly govern data remotely, consideration must also be given to how to scrub, remove, change, delete, and recall data in legacy systems as well. If you cannot access user records, personal data, corporate regulatory data, and legal requirements, then simply storing it is pointless as it fails to meet the demands of regulators. As we have recently seen from the EU’s General Data Protection Regulation and the California Consumer Privacy Act, any customer may request that an organization produce their stored personal data, and not meeting these requests can cost millions.

Continue reading

What does the future of shopping hold in the fashion industry?

digital shopping

Over the course of 2020, the way we shop has changed forever. Although many new shopping trends are a direct result of COVID-19 and brands adapting to life in lockdown, countless changes in the fashion industry were already underway. An overwhelming switch to e-commerce, for example, has only been accelerated by the pandemic. Today, over 25 percent of the world's population shops online. The numbers of consumers flocking to landing pages is only set to increase.

With this dynamic shift to online shopping and exciting technological innovations becoming available to brands all the time, the world of fashion and e-commerce is evolving and adapting at an impressive rate. Gone are the days of mass shopping in the traditional way. Instead, brands are utilizing tech to create personal, immersive, and remote shopping experiences. 80 percent of online consumers stating that new tech is improving their shopping experience. So, it appears that the fashion world is certainly heading in the right direction.

Continue reading

Overcoming COVID-19: What finance leaders at recently-funded tech startups have learned so far

Picture1

There’s no doubt that 2020 has been a testing year for everyone. According to data from PwC, 53 percent of CFOs expect a decrease in revenue and/or profits of up to 25 percent as a direct result of COVID-19. For many tech startups, that’s the difference between staying alive and closing for good.

With such uncertainty in the air, leadership teams have had to act fast and rethink their entire strategy.

Continue reading

Sophos launches open AI developments to fight cyberattacks

AI security

Cybersecurity company Sophos is announcing four new open artificial intelligence developments with the aim of improving defenses and making the use of AI in cybersecurity more transparent.

Although in other industries it's become common to share AI methodologies and findings, cybersecurity has lagged which doesn't help understanding of how AI can protect against cyberthreats.

Continue reading

Google down! Gmail, YouTube and other services suffer massive global outage

Google building logo

Google users around the world struggled to connect to many of the company's services as a huge outage struck the search giant.

Problems started in the early hours of the morning in the US, and around lunchtime in Europe, with thousands of users experiencing error messages when attempting to use the likes of Gmail, YouTube, Google Drive and Google Maps.  The company issued a series of statements saying it was aware of problems "affecting a majority of users".

Continue reading

Linux 5.10 LTS is here as a significant kernel update

Linux

Linus Torvalds has officially announced the availability of version 5.10 of the Linux kernel. This release is significant not only because of the number of new features and fixes it includes, but also because it is a Long-Term Support (LTS) release that will enjoy five years of maintenance.

In his release notes for Linux 5.10, Torvalds also calls upon developers working on version 5.11 to submit changes in plenty of time for Christmas.

Continue reading

Mageia 8 Beta 2 Linux distro now available with KDE Plasma, GNOME, and Xfce

nerd_man_laptop_glasses_blue_bg

Development of Mageia 8 seems to be moving along nicely, which is great news for users of that Linux-based operating system. Back in August, we shared that the first Beta of the distribution was available for testing, and now today, the second Beta arrives. As with the first Beta, the second is available with your choice of three desktop environments --  KDE Plasma, GNOME, and Xfce.

"We are happy to announce the release of Mageia 8 Beta 2. After a long time since the beta 1, we look forward to hearing your feedback and thoughts so that we can continue to get Mageia 8 ready for release. As we said in a previous post, a lot of work had to be done for the base system upgrade, java, kernel, and the graphical stack. These upgrades are now in a state that allows for the Beta 2 ISOs to be built and tested," explains The Mageia Development Team.

Continue reading

Load More Articles