Latest Technology News

Get 'Learn Penetration Testing' ($31.99 value) FREE for a limited time

Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.

You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats.

Continue reading

Fractal Design launches 'Define 7 Compact' ATX case with sleek and classy design

When you build a gaming PC (or any type of computer, really), there are often two ways you can go -- flashy or classy. Neither is wrong, but your decision probably says a lot about your personality and/or your age. For instance, if you choose a case that looks like an alien spaceship, and you fill it with RGB lighting, you are probably a teen or someone in their early 20s. Age aside, maybe you just like being ostentatious. If you prefer a more sophisticated-looking PC, you may be in your late 20s or older, or just prefer subtlety.

For those of you that prefer a more subdued and classy style, Fractal Design's cases are probably for you. Why? They are wonderfully boring -- and yes, I mean that in a good way. The company's no-nonsense cases are beautiful while also looking mature. In other words, a Fractal Design chassis tells the world you are sophisticated and not a clown. The company's latest case -- the Define 7 Compact -- is a diminutive version of the existing 7 Series chassis, but believe it or not, it can still accommodate up to a full-sized ATX motherboard! The Define 7 Compact has a very purposeful design -- no space is wasted.

Continue reading

Get 'Performance Management For Dummies' ($19.99 value) FREE for a limited time

Performance Management For Dummies is the definitive guide to infuse performance management with your organization's strategic goals and priorities. It provides the nuts and bolts of how to define and measure performance in terms of what employees do (i.e., behaviors) and the outcome of what they do (i.e., results) -- both for individual employees as well as teams.

Inside, you’ll find a new multi-step, cyclical process to help you keep track of your employees' work, identify where they need to improve and how, and ensure they're growing with the organization -- and helping the organization succeed.

Continue reading

Cyber ransom demands up 200 percent in 2019

Ransomware sign

Requested amounts in ransomware attacks rose nearly 200 percent from 2018 to 2019, averaging $115,123 per attack last year.

A report from incident response, risk management and digital forensics firm Crypsis Group reveals that threat actors across a range of cyberattack types have significantly escalated their tactical approaches, becoming more targeted, conducting victim research and employing techniques that enable them to be more successful and extract higher payouts for their efforts.

Continue reading

Fake job applications used to steal banking credentials

job resume

During May, researchers at Check Point have seen a doubling in the number of malicious files sent by email claiming to be resumes or CVs from individuals, as hackers exploit the unemployment and remuneration schemes resulting from the COVID-19 pandemic.

In addition they have noted that seven percent of domains registered containing the word 'employment' are malicious. There has also been a 16 percent increase in malware attacks overall, compared to March and April.

Continue reading

Tor Browser 9.5 arrives with the option to automatically switch to more secure Onion versions of sites

Increasing numbers of internet users are becoming aware of the privacy and security implications of being online, and it is for this reason that secure browsers such as Tor are growing in popularity. Now, with the release of Tor Browser 9.5, the browser features an option that can automatically switch to the secure .onion version of a site if one is available.

In short this means that sites are able to actively promote the fact that they have a secure .onion site available. Publishers now can advertise their onion service to Tor users by adding an HTTP header, so if someone visits the regular version of a website, a notification will appear informing them of the more secure option.

Continue reading

Securing SaaS applications for a remote workforce [Q&A]

Cloud data security

The current shift to remote working looks likely to have a long-term impact on the way businesses operate in future. But this raises issues over security and ensuring that misconfigurations don't lead to data being exposed.

How big is the risk and what are the key issues enterprises face? We spoke to Brendan O'Connor, CEO of cloud security specialist AppOmni to find out.

Continue reading

Lenovo ThinkPad and ThinkStation computers get certified for Linux

Lenovo makes some great Enterprise computers — both its desktops and notebooks can be found in use by many businesses. With that said, the company’s Windows laptops and Chromebooks are used in many homes too. Unfortunately, Lenovo’s consumer PCs have varying degrees of quality — some models are good, while others are downright bad.

Today, Lenovo announces amazing news regarding some of its higher quality computers. You see, all of the company’s ThinkStation and ThinkPad P Series workstations are now certified for Linux, including Ubuntu LTS and RHEL. This is in addition to Lenovo’s previously announced plan to pre-install Fedora on some machines.

Continue reading

Microsoft releases Windows 10 Build 19640

The Windows 10 May 2020 Update is currently rolling out to users of compatible systems, although Microsoft is blocking it for some with a 'your device isn’t quite ready' message.

That’s not a problem for Insiders on the Fast ring though who today get another new build to play around with.

Continue reading

How to boost your privacy and remove unwanted features from Windows 10

Windows 10 comes with lots of features that you might not need, or want. These include Cortana, Bing in Windows Search, and the Game Bar. In addition, Microsoft’s operating system spies on you in a number of ways.

Thankfully, disabling unwanted features and locking down your privacy just got way easier.

Continue reading

Data breaches cost US organizations $1.8 trillion over the last two years

Data breach

Cybercriminals exposed more than five billion records in 2019, costing over $1.2 trillion to US organizations. Added to the 2.8 billion records that were exposed in 2018, this means breaches over the last two years have cost US organizations over $1.8 trillion.

This is one of the findings of the latest Consumer Identity Breach Report from ForgeRock, which shows a dramatic increase in the number of breaches.

Continue reading

IBM fairness toolkit aims to eliminate bias in data sets

IBM logo

IBM is announcing changes to its AI Fairness 360 toolkit to increase its functionality and make it available to a wide range of developers.

AIF360 is an open source toolkit that contains over 70 fairness metrics and 11 state-of-the-art bias mitigation algorithms developed by the research community to help examine, report, and mitigate discrimination and bias in machine learning models throughout the AI application lifecycle.

Continue reading

Almost 80 percent of companies have had a cloud data breach in the past 18 months

Cloud fail

A new survey finds that 79 percent of companies experienced at least one cloud data breach in the past 18 months, and close to half (43 percent) reported 10 or more breaches.

The study for cloud access risk security company Ermetic conducted by IDC  covered 300 CISOs and finds that security misconfiguration (67 percent), lack of adequate visibility into access settings and activities (64 percent) and identity and access management (IAM) permission errors (61 percent) are the top concerns associated with cloud production environments.

Continue reading

How to disable Cortana in Windows 10 May 2020 Update -- or even uninstall it

Windows key on keyboard

With the release of Windows 10 May 2020 Update, Microsoft not only introduced a range of new features and options, but also took some away. One thing that has changed with Windows 10 version 2004 is that Cortana is now a standalone app rather than an integral part of the operating system.

Not that you would necessarily notice, that is. Although the digital assistant is now separate from Windows itself, it still automatically runs at startup – it is possible, however, to disable Cortana and stop it from running in this way, or remove it completely.

Continue reading

Achieving success during 'transparent moments'

Mergers and acquisitions message displayed on a tablet, with a coffee cup and pen nearby

There are certain moments throughout a businesses’ lifecycle where security leaders need to have a clear view into their cloud infrastructure. One example is during mergers and acquisitions processes, when it’s crucial teams not only understand their own organization’s security posture but also that of the company being acquired. Still, a recent Forescout survey of IT and business decision-makers found that 65 percent of respondents regretted an acquisition their company made because of an overlooked cybersecurity issue.

Marriott International’s 2016 acquisition of Starwood Hotels set the company up to become the world’s largest hotel chain. However, it later emerged that Starwood’s reservation system had allowed unauthorized access to cybercriminals since 2014, leading to a large-scale (and very expensive) data breach in 2018 -- a clear example of why transparency is key during M&A. If Marriott had known that Starwood’s IT infrastructure had been compromised, they could have sought ways to remediate or otherwise address the issue and revised the proposed transaction accordingly. Instead, they were penalized heavily by regulators and were hit with lawsuits from customers.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.