Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

PowerToys reboot

Microsoft issues another bug-fixing update for PowerToys for Windows 10

It's only a couple of weeks since Microsoft released PowerToys v0.19.0, and the company has now pushed out its second bug-fixing update to the collection of utilities.

Just last week, v0.19.1 addressed a range of issues with the Windows 10 tool collection, and now v0.19.2 has landed. Among the changes are fixes for PowerToys Run and FancyZone, and it also addresses an issue that caused high CPU usage.

Firewall

80 percent of companies see more cyberattacks during the pandemic

Since the onset of the COVID-19 crisis earlier this year 80 percent of companies have seen 'slightly to considerably more' cyberattack attempts, breaking down to 88 percent in the US and 74 percent in the UK.

SIEM specialist Exabeam surveyed more that 1,000 IT security professionals at small- to medium-sized enterprises and finds that a third of respondents experienced a successful cyberattack during COVID-19, leading to network downtime for 40 percent of UK companies and 38 percent of US companies.

By Ian Barker -
Microservices

Microservices take off as businesses taste their success

The use of microservices is succeeding for 92 percent of organizations according to new research from learning resources company O'Reilly.

It surveyed over 1,500 software engineers, systems and technical architects, engineers, and decision-makers from around the globe and finds that 77 percent of respondents have adopted microservices.

By Ian Barker -
Thunderbird_Logo,_2018 - Edited (1)

Thunderbird 78 unveils major UI changes, restricts add-ons to MailExtension API only

Mozilla has released Thunderbird 78.0 for Windows, Mac and Linux. It’s the first major update of the popular open-source email client since August 2019, and is only available as a direct download -- existing users of the Thunderbird 68.x series are advised to wait for a future release that will provide an upgrade path.

A host of new and changed features have been implemented, although the long-heralded built-in support for OpenPGP encryption has been disabled by default for now due to some outstanding issues.

By Nick Peers -
Zoom dark web

Check Point works with Zoom to fix 'Vanity URL' vulnerability

Researchers at Check Point have been working with Zoom to to fix a security issue that would have allowed hackers to manipulate organizations’ customizable Zoom 'Vanity URLs'.

The vulnerability would allow attackers to send legitimate-looking meeting invitations, with the aim of inserting malware and stealing data or credentials from unsuspecting victims.

By Ian Barker -
Microsoft building in California

Microsoft releases a fix for Outlook crashes after a problematic update causes issues for many users

Microsoft's track record with updates for Windows has been a little wobbly of late, with many updates introducing problems, or creating more issues than they fix. But it seems that it is not just the famous operating system that is jinxed -- Outlook is too.

Following reports from users that the Outlook desktop app was crashing with a 0xc0000005 error, Microsoft launched an investigation. While the company is now in the processing of pushing out a fix, a workaround has been shared online for those affected.

Twitter logo over cryptocurrency coins

Twitter staff targeted by 'coordinated social engineering' attack as hackers hijack verified accounts in Bitcoin scam

Overnight, Twitter suffered a massive attack by hackers who tried to use the verified accounts of celebrities and high-profile users to execute a Bitcoin scam. The likes of Barack Obama, Joe Biden, Elon Musk, Bill Gates and Kanye West had their accounts hijacked and message were posted promising that if people sent money to a Bitcoin wallet, they would get double the amount back.

Needless to say, it was a crypto scam, and Twitter took the extraordinary steps of preventing all users with a blue tick from tweeting. Twitter now has control of the situation and says that the attack came after staff fell victim to social engineering, enabling hackers to gain access to internal tools which were then used to take over key accounts.

sp2tb

Silicon Power unveils UD70 M.2 2280 PCIe Gen3x4 NVMe SSD

Another day, another solid state drive. Yes, folks, we are once again telling you about a new SSD. There sure are a lot of new models hitting the market lately, right? This time, the drive is from Silicon Power. We recently reviewed one of that company's external SSDs, but I digress.

Called "UD70," it is a PCIe 3.0 SSD that uses 3D QLC NAND. Unfortunately, it is not a PCIe 4.0 drive like the company's similarly named US70. While a PCIe Gen 3x4 SSD is nothing out of the ordinary, Silicon Power boasts about it having superior cooling capabilities. No, it doesn't have a huge heatsink. In fact, it has no heatsink at all. Actually, SP says the cooling capabilities are baked into the UD70's firmware.

By Brian Fagioli -

Microsoft releases Windows 10 Build 20170 to the Dev Channel with sound and search improvements

Yesterday, Microsoft rolled out a new Windows 10 Build to the Beta Channel (what used to be the Slow ring) and today the software giant follows that up with a new flight on the Dev Channel (previously the Fast ring).

Build 20170 introduces a couple of new features, but won’t be offered to Insiders running PCs with AMD processors due to a bug affecting overall usability.

By Wayne Williams -
covid cybercrime

Phishing attacks for the COVID-19 era: What to look out for

Despite the devastating recent outbreak of the novel coronavirus, phishing attacks continue to drag us and our businesses down. So how exactly do COVID-19 related phishing attacks work?

Cybercriminals have taken it upon themselves to wreak havoc and feed off the fears people have about the virus. Emails are being sent that ask their targets to open attachments containing information about the latest coronavirus statistics or news. Or, they claim to be from legitimate companies offering information about COVID-19.

By Georgie Peru -
Quantum_Computing

All about quantum-safe certificates

The advent of quantum computers will render ECC and RSA encryption algorithms obsolete, requiring companies to migrate their computing systems and PKI infrastructure to new, quantum-safe cryptographic algorithms.

This migration of PKI solutions to quantum-safe crypto algorithms will pose many major challenges for many enterprises. All existing applications and systems will need to be updated to support the new quantum-safe algorithms now being developed in response to the threats posed by quantum computers. The process of updating to new algorithms requires significant engineering work and many systems will require extensive updates.

By Alan Grau -
robot call center

Can AI replace white collar jobs?

Let’s start with the definition of "REPLACE," from Merriam-Webster: To restore to a former place or position (e.g. replace cards in a file); To take the place of especially as a substitute or successor; To put something new in the place of (e.g. replace a worn carpet).

Now, let’s check the definition of "ENHANCE": To increase or improve in value, quality, desirability, or attractiveness (e.g. enhanced the room with crown molding); To increase or improve (something); To make greater or better (e.g. the products claim to enhance beauty).

By Todd Chusid -
CCPA

How to securely comply with rising CCPA rights requests amid COVID-19

As California Consumer Privacy Act (CCPA) enforcement officially started July 1, affected enterprises (based on size, California customer base and business type) can no longer delay complying with the new law. CCPA grants California residents an array of new rights, starting with the right to be informed about what kinds of personal data companies have collected and why it was collected.

A June 2020 survey found that more than 20 percent of organizations were either somewhat unlikely to be, very unlikely to be, or didn't know if they would be fully compliant with CCPA by July 1. With only 14 percent of respondents CCPA compliant and nearly one-third of organizations just starting to plan for CCPA, enterprises need to be prepared for enforcement sooner than later to uphold the rights of California consumers and avoid non-compliance penalties, which can reach up to $7,500 per violation.

By Robert Prigge -
rocket boost laptop

Digital communications strategies given a six year boost by COVID-19

The coronavirus crisis has led to many changes in working patterns. But what's its effect on the longer term strategies of businesses?

Cloud communications platform Twilio surveyed over 2,500 enterprise decision makers globally to gauge the effect of the pandemic on their companies' digital transformation and communication roadmaps.

By Ian Barker -
Password tweezers

VPN with 'strict no-logs policy' exposed millions of user log files including account passwords

An unprotected database belonging to the VPN service UFO VPN was exposed online for more than two weeks. Contained within the database were more than 20 million logs including user passwords stored in plain text.

User of both UFO VPN free and paid services are affected by the data breach which was discovered by the security research team at Comparitech. Despite the Hong Kong-based VPN provider claiming to have a "strict no-logs policy" and that any data collected is anonymized, Comparitech says that "based on the contents of the database, users' information does not appear to be anonymous at all".

betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

Categories

AI Technology Software Hardware Security

Quick Links

About Us Privacy Policy Cookie Policy Sitemap

© 1998-2025 BetaNews, Inc. All Rights Reserved.