Popular document management apps expose sensitive files


Today's employees have access to a vast range of apps on their personal devices, but this can serve to undermine enterprise security because it's hard for IT teams to understand or control where sensitive corporate IP is going and how it's getting there.
The threat research team at Wandera has discovered a number of document management apps from Cometdocs that fail to use encryption when transferring files between the user and the backend service.
Hackers leak personal data of 10.6 million MGM Resorts guests


The personal details of 10.6 million people have been posted in a hacking forum after MGM Resorts hotels suffered a data breach. The data includes dates of birth, email addresses, names, phone numbers and physical addresses, and celebrities such as Justin Bieber and Twitter's Jack Dorsey are among those affected.
While the data has only just been leaked, it stems from a security breach that took place last year. Data dating back to 2017 was found accessible on an unsecured cloud server.
Organizations are detecting and containing attacks faster since GDPR


For organizations in the EMEA region, the 'dwell time' between the start of a cyber intrusion and it being identified, has fallen from 177 days to 54 days since the introduction of GDPR.
A new report from FireEye Mandiant also shows a decrease in dwell time globally, down 28 percent since the previous report. Median dwell time for organizations that self-detected their incident is 30 days, a 40 percent decrease year on year.
Twitter makes it easier to post tweet threads -- here's what you need to know


One of the issues some people have with Twitter is the character limit imposed on individual tweets. While the restriction is very much the point of the site, there are times when 280 characters is just not enough... hence threading.
There's nothing to stop you from manually creating a tweet thread, but it's not something that everyone is familiar with. So to help out, Twitter has added a new button to make things easier. It's not the tweet editing option people are still begging for, but a way to link tweets together.
AOC AGON AG353UCG is a 35-inch curved gaming monitor with 200Hz refresh and NVIDIA G-Sync Ultimate


AOC monitors are some of my favorite, because they provide great quality at an affordable price. If you are a gamer or just need a display for productivity, and you are on a budget, you need to give the company's products a look. Hell, even if you aren't limited by money, you should check these monitors out.
Today, AOC unveils its latest gaming monitor, and holy crap, it looks like a beauty. Called "AGON AG353UCG," this 35-inch gaming display is chock full of features. For instance, it supports VESA DisplayHDR 1000 and NVIDIA G-Sync Ultimate, plus has a refresh rate of 200Hz! The monitor has a very respectable resolution of 3440 x 1440 UWQHD and 2 ms GtG response time. And yes, it has a built-in USB hub and integrated RGB lighting on the back. There is a even a handy hook on the side to hold your gaming headset.
5G has the biggest potential to create safe cities


The latest communications industry insight report from IWCE (International Wireless Communications Expo) shows that industry insiders believe 5G has more potential than other technologies to create safe cities.
Key elements of a 'safe city' are a shared infrastructure with common sensors, multi-agency collaboration, situational awareness using real-time data, video and data analytics, and automated processes.
The risks of outdated systems in IoT and industrial environments [Q&A]


With Windows 7 now at its end-of-life, the need to update outdated systems is of the utmost importance. This is especially true for Internet of Things (IoT) and Industrial Control System (ICS) environments, as vulnerabilities in these older systems can lead to attacks that result in costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property.
We spoke to Phil Neray, vice president of industrial cybersecurity at CyberX, to find out more about why updating these systems is so imperative and to hear some recommendations about how organizations can go about doing so.
Microsoft rolls out important changes to Windows Update for Windows 10


Microsoft has started the roll out of changes to Windows Update that give Windows 10 users more control over the process of updating. There has been a spate of problematic updates from Microsoft recently, and the change that is rolling out now introduces a new "Optional updates" section to Windows Update.
An important aspect of the new Windows Update user experience is that driver updating has been dramatically improved. Microsoft says that the changes will help users to get hold of the "highest quality, and most reliable drivers faster and with less friction".
Brexit pushes Google to move UK user data away from Europe to the US


Google has confirmed that it plans to move data pertaining to its UK users out of Europe, and will instead store user accounts in the US.
The move comes as a result of the UK's departure from the European Union, and it is a side effect of Brexit that few would have predicted. Reuters reports that Google will be placing UK user accounts under US jurisdiction, adding that it "will leave the sensitive personal information of tens of millions with less protection and within easier reach of British law enforcement".
Enable lazy loading in the new Edge to speed up your browsing


The new Chromium-based Microsoft Edge web browser shares many features with other Chromium-based browsers such as Google Chrome, Vivaldi and Opera.
Google started to integrate native lazy loading support in Google Chrome recently (in Chrome 76 to be precise), and it appears that Microsoft added these capabilities to Microsoft Edge as well.
Windows as a Service: A method of life cycle management


A moment five years in the making is here. Support for Windows 7 officially ended on January 14. While not every enterprise has completed the migration to Windows 10, it is the operating system IT teams must focus on moving forward -- and it means big changes in how they operate. "Set it and forget it" is done. At the same time, the pain of migrating thousands of endpoints over to an entirely different OS is too, replaced instead by a new method of ongoing life cycle management.
We’ve entered the era of Windows as a Service. This is not just clever marketing but rather a genuine shift in how new Windows features are introduced and updates are conducted. Essentially, this model requires delivery of new features twice a year and security updates every month. Feature updates also receive ongoing quality updates over the course of either 18 or 30 months, replacing what previously occurred over the course of several years. The new model translates to a continuous rollout of Windows through internal testing. As with any major change, Windows as a Service has its pros and cons. Let’s dive in.
Google unleashes Android 11 for developers to play with


Turning it all the way up to 11, Google today launched the Developer Preview of Android 11 -- or Android R, if you prefer. For now, the preview build is only compatible with Pixel devices (no surprises there), but what can you expect to see?
Google has chosen to put privacy and security front and center in Android 11, giving users more control and transparency. The company also says that it has added things such as enhancements for foldables and 5G, call-screening APIs, new media and camera capabilities, and machine learning.
Get 'Becoming the Hacker' ($31.99 value) FREE for a limited time


Protect the web by learning the tools and the tricks of the web application attacker.
Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses.
Over 27 million affected by healthcare data breaches last year


Healthcare data breaches affected over 27 million people in the US last year, with the number of records breached having more than doubled compared to 2018. Indeed the total number of records breached has more than doubled each year, from 4.7M in 2017 to 11.5M in 2018, and to 27.5M in 2019.
Cloud security company Bitglass has released its latest healthcare breach report analyzing data from the US Department of Health and Human Services.
Coinbase becomes a Visa principal member -- cryptocurrency debit cards and services to spread to more markets


Cryptocurrency exchange Coinbase has been made a Visa principal member, making it "the first pure-play cryptocurrency company" to receive such accreditation. The membership was awarded back in December, but the news has only just been made public.
This is not the first time Coinbase has had dealings with Visa. The two companies worked together last year to launch the Coinbase Card ("a Visa debit card, funded by your Coinbase balance") in the UK, but now it will be possible to bring the debit card and additional services to more markets around the world.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.