Biggest ransomware threat is encryption of shared cloud files
The cybercriminal's most effective weapon in a ransomware attack is the network itself, which enables the malicious encryption of shared files on network servers, especially files stored in infrastructure-as-a-service (IaaS) cloud providers.
This is according to a new report from threat detection specialist Vectra which finds that by encrypting files that are accessed by many business applications across the network, attackers achieve an economy of scale faster and far more damaging than encrypting files on individual devices.
Enterprise security pros spend too long researching suspicious URLs
Phishing threats tend to be fast moving, so the ability to block them quickly is essential for protection.
But a new survey finds that even large companies with multi-layer security controls and multiple threat feeds lack adequate safeguards to protect their employees from phishing attacks that employ links to malicious sites.
O&O BrowserPrivacy will securely wipe your browsing history
Browse the internet and you’ll build up an offline database of all the sites you’ve visited, the type of products that interest you and your hobbies and interests. Ads targeting these interests will track you across various websites.
Most modern web browsers can block trackers and enable you to delve into your browsing history and quickly delete the information from your devices. But, has it really been deleted? Any computer expert would be able to retrieve some of this data if necessary.
Hearing voices? Your smoke detector may be spying on you!
Ever since I installed one of those wireless "home automation kits," my house has been acting like it’s possessed. My lights dim randomly. My thermostat changes temperature settings on its own. And my digital door lock keeps "forgetting" I live here, prompting me to fumble for my keys (it always seems to be raining when this happens).
Just yesterday I came home to find my so-called "Smart TV" had somehow turned itself on and was streaming some weird foreign language content (the source it chose was "RT" -- or something like that). I changed the channel to "CNN" and went to the kitchen to make a snack. However, just as I began slicing open a fresh baguette, I heard that same foreign language stream playing. I then rushed back to the living room only to find the TV still tuned to "CNN."
You're replacing me with a robot? That's fine
While people prefer to see jobs go to other humans rather than robots, it seems the opposite is true when it comes to their own jobs.
This is a finding of new research from Stefano Puntoni, professor of marketing at Rotterdam School of Management, Erasmus University, released today in a co-authored article in Nature Human Behaviour.
The Geocities Archive Project will make you want to gouge your eyes out [Update]
The internet has changed significantly over the years. These days if you want a public presence on the web you can create pages on various social networks, or build websites and host them on your own domain, or on a service like Weebly or Wix.
In the nineties though, many of the web’s home brew sites were to be found on GeoCities, and they were usually created with enthusiasm, rather than ability or design sense. The service hosted tens of millions of the ugliest pages ever created, often filled with garish colors, flashing images, tiled backgrounds, and guest books.
Microsoft quietly fixes SWAPGS processor vulnerability to protect Windows users
It has been revealed that Microsoft silently pushed out a patch to Windows users to fix a vulnerability that affected Intel CPUs produced since 2012 -- which means everything post Ivy Bridge chips.
The SWAPGS vulnerability is similar to the now-famous Spectre and Meltdown chip flaws, and was discovered by security firm Bitdefender a year ago; the fact that it has now been patched was only revealed at the BlackHat security conference. Red Hat says that an update to the Linux kernel is needed to protect against the flaw which it says affects both Intel and AMD chips, although Bitdefender has not been able to find any issues with AMD's processors.
Acer launches Nitro XF2 Series FreeSync gaming monitors with 240Hz refresh
While 4K is often preferred for content creators and media consumers, 1080p is still ideal for gamers. Taking things a step further, in 2019, 240Hz refresh monitors are becoming much more common.
Today, Acer launches its latest such FHD monitors. Called "Nitro XF2 Series," there are two models -- one is 25-inch and the other is 27-inch. While gamers will appreciate the high refresh rate, there is even more to be excited about -- a 1ms response and AMD FreeSync technology.
Get 'Linux All-In-One For Dummies, 6th Edition' ($30 value) FREE for a limited time
Linux All-in-One For Dummies covers topics such as getting up and running with Linux basics, desktops, networking, internet services, administration, security, scripting, Linux certification, and more.
Inside, over 500 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating systems in use today.
Hyper personalization is the key to a seamless customer experience
More than two thirds of companies now compete on the basis of customer experience. Customer service is the competitive differentiator, and it is essential now more than ever to maintain brand loyalty and meet business goals. Companies can face losing customers if they don’t keep up with the ever-increasing standard of service expected of them.
Delivering superior service is particularly challenging during spikes in the volume of customer contact. Human agents on their own cannot manage these peaks, let alone deliver a consistent and personalized customer experience. Long call queues and fragmented customer engagement lead to disappointed customers, reputational damage and ultimately financial losses.
Trojans account for more than 70 percent of opportunistic email attacks
Analysis by Mimecast of 67 billion attack emails between April and June this year reveals that opportunistic attacks are dominated by Trojans, which make up 71 percent.
Targeted attacks are lower in volume but are specifically designed to get past commodity malware scanners by using newly detected or updated malware not detectable with file signatures.
Half of risky online transactions come from mobile devices
New research from fraud prevention and multi-factor authentication specialist iovation reveals that 49 percent of all risky transactions now come from mobile devices, up from 30 percent in 2018, 33 percent in 2017 and 25 percent in 2016.
Looked at geographically, North America with 59 percent of all risky transactions coming from mobile devices, leads the way. In 2018, it was Asia at 53 percent. In 2017, it was North America with 55 percent, and in 2016, it was North America again with 36 percent.
The top 11 security threats to cloud computing
Data breaches and misconfigurations come out top of the Cloud Security Alliance's latest Top Threats report which reveals an 'Egregious Eleven' list of cloud security threats.
This year's list no longer includes issues that fall to cloud service providers (CSPs), such as denial of service, shared technology vulnerabilities, CSP data loss and system vulnerabilities. This suggests these are either being well addressed or are no longer perceived as a significant business risk of cloud adoption.
SMEs forced to meet cybersecurity demands in order to win contracts
Supply chain threats are a major problem for enterprises and they are forcing smaller businesses to take security more seriously in order to win contracts.
A study by cyber security awareness platform CybSafe shows nearly 37 percent of organizations have been required to achieve a recognized cyber security standard by their enterprise customers before successfully securing contracts. This represents a nine percent increase over 2017.
Handling user feedback data and the rise of 'ResearchOps' [Q&A]
Customer experience has become a massive, sprawling industry that includes the many systems and touchpoints that lie between companies and their users. It's projected to be a $32B market by 2025.
One of the most interesting new sub-categories emerging within customer experience is ResearchOps. It's a new discipline -- with a growing community of practitioners -- focused on better infrastructure around customer research, and operationalizing the user research process so it can be done faster and have a bigger impact.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.