Emotet botnet down for maintenance
June's Global Threat Index from Check Point reveals that the botnet behind the Emotet banking Trojan has been inactive for most of the month.
Check Point's researchers believe that Emotet's infrastructure could be offline for maintenance and upgrade operations, and that as soon as its servers are up and running again, it will be reactivated with new, enhanced threat capabilities.
SoftMaker FreeOffice 2018 gains Anniversary Edition update with dozens of new features and improved Office 2019 compatibility
German software developer SoftMaker has unveiled SoftMaker FreeOffice 2018: Anniversary Update, extending major new features and compatibility improvements to its free office suite for Windows, Mac and Linux.
The update, officially dubbed Revision 966, comes with dozens of new features across the suite’s three main applications: TextMaker, PlanMaker and Presentations. It also updates its compatibility settings to work seamlessly with Microsoft Office 2019 documents.
Managing third-party risk costs the healthcare industry over $23 billion a year
The ability to adequately assess and understand the risks that vendors pose is a problem for healthcare providers, and a costly one at that, according to a new report.
The study by risk management platform Censinet and the Ponemon Institute shows the yearly hidden cost of managing vendor risk is $3.8 million per healthcare provider, higher than the $2.9 million that each data breach costs providers. This adds up to a total cost across the industry of $23.7 billion.
Don't buy the faulty Raspberry Pi 4 -- get a different Linux-compatible single-board computer instead
Raspberry Pi computers are pretty damn great. Not only are they small and inexpensive, but they are ideal for tinkering and learning. And yes, they can serve as excellent media boxes thanks to the Linux-based LibreELEC. With the Raspberry Pi 4, however, it is finally powerful enough to serve as a true desktop computer -- prior models were capable, but offered woefully slow desktop experiences.
With all of that said, surely the Raspberry Pi 4 is highly recommended, right? Actually no. Sadly, we must warn you not to buy this seemingly solid piece of hardware. Unfortunately, it has one massive faulty aspect, meaning you should probably pass on it.
Is your online cloud storage secure enough?
Having cloud storage is a reality of living and working in an ever more connected world, where we expect to have access to our data anywhere with an internet connection at the drop of a hat. Cloud storage makes it easier for us to travel, to share and most importantly keep our data safe. However, not all cloud storage solutions are created equal. While many commercial services are more quick and convenient, they sacrifice security in order to be more accessible. If you deal with sensitive data such as financial documents for clients, are you using a cloud solution that’s secure enough?
When using cloud services for storing and sharing critical documents it’s important to know if you’re using a solution that employs the highest levels of protection. To know if a cloud solution is secure enough, you need to determine if it has any of the following features:
YouTube app returns to Amazon Fire TV, while Prime Video comes to Chromecast
A few months back, we shared with you some very, very good news -- Amazon and Google were burying the hatchet. You see, the two giant companies were at odds, keeping their respective video apps from each other's hardware platforms. Then in April, the two companies announced that the feud was over -- YouTube was coming back to Amazon Fire TV, while Prime Video would come to Chromecast.
Wow! Great news, right? Well, yes and no. While it was undoubtedly positive, it was not immediate -- consumers would have to wait months for this to happen, sadly. Well, folks, today it finally becomes a reality!
IBM officially acquires Red Hat for $34 billion -- Linux distros are unaffected
IBM has closed its acquisition of Red Hat following the statement of intent back in October. Following the $34 billion deal, Red Hat will operate as a distinct unit within IBM -- and will be reported as part of IBM's Cloud and Cognitive Software segment.
For IBM, the deal means fully embracing open source as it looks to accelerate its business model within the enterprise. For Red Hat, it means expanding its client base and working with a big player in the enterprise cloud business.
US Court of Appeals says Trump can't block people on Twitter
Donald Trump's love of Twitter is legendary and often ridiculed; it is also the source of frequent controversy.
The US president is huge fan of ranting, raving and venting steam in tweet storms, but his famed love of sycophants also comes to the fore. Many people who have responded to his tweets critically have found themselves blocked. Now the US Court of Appeal says this is a violation of their First Amendment rights.
It's 2029, you're paying more to read this page at peak time (and we're paying your ISP to stop you visiting other tech sites)
What would a world be like where ISPs and businesses are in control of everything you see and do online? A world, in other words, without net neutrality.
VPN comparison site TheBestVPN.com has been considering this and has created an interactive simulator looking at what the web without net neutrality could look like in 2029.
Apple updates MacBook Pro and MacBook Air -- hardware bumped, prices dropped
Timed to coincide with the back to school season, Apple has announced the latest updates to its MacBook Pro and MacBook Air. There's a special promotion which includes a free pair of Beats Studio 3 Wireless headphones with a qualifying purchase too.
A price drop for the MacBook Air means that students can pick one up for as little as $999 ($1,099 for everyone else) and benefit from the addition of True Tone to the Retina Display. The entry-level 13-inch MacBook Pro now features an 8th-generation quad-core processor which Apple says makes it twice as powerful as it used to be.
Logitech G PRO X gaming headset uses Blue Microphones technology
Nearly a year ago, Logitech acquired famed company Blue Microphones. This was a match made in heaven, as the companies' products were very much aligned. Logitech makes some of the best headsets, while Blue produces microphones that are very much respected by vloggers, podcasters, musicians, and more. The Blue Yeti mic, for instance, is fairly ubiquitous thanks to its excellence.
Today, Logitech G announces a gaming headset that uses newly acquired Blue Microphones technology. Called "PRO X," it features premium build quality thanks to steel and aluminum materials. The ear pads are made of a faux-leather, but if you prefer, you can replace them with the included velour ear pads. The headset is analog, featuring a 3.5mm connection, but a USB DAC/sound card is included in the box as well. In other words, you can use them over USB or with a headphone jack -- your choice.
Financial services businesses at high risk of mobile attacks
Financial services are at greater risk of phishing and man-in-the-middle attacks on mobile devices than businesses in other industries according to a new report.
The study from mobile security specialist Wandera analyzed mobile device data from 225 financial services customers and reveals financial services organizations are experiencing a higher volume of phishing attacks than their peers in other sectors (57 percent compared to 42 percent cross-industry).
Zoom for Mac has a security hole that means your webcam could be turned on without permission
Time to dig out the tape and cover up your webcam. The Mac version of the video conferencing tool Zoom has been found to have a flaw that enables a website to switch on your webcam without permission, and without notification.
Despite having been discovered and reported to Zoom by a security researcher three months ago, the vulnerability is yet to be patched. In fact, Zoom disagrees that there is a security issue, although it does say that users will be granted greater control over videos in an update due for release later this month.
Creative celebrates 30 years of Sound Blaster by launching AE-9 and AE-7 PCIe sound cards for audiophiles and gamers
Can you believe that Creative has been making Sound Blaster cards for 30 years? It's true! The year 2019 marks a 30th year for the company's revolutionary sound card brand. Way back in 1989 -- before some of you were born -- the Sound Blaster 1.0 card was released, and it changed everything. Quite frankly, in all these years, no company has come close to matching Creative's dominance in this market. True, sound cards have become less of a necessity and more of a luxury these days, but still, Creative remains king of the hill.
Wanting to celebrate this amazing milestone, Creative is launching two new cards -- The Sound Blaster AE-9 and AE-7. While both look very impressive, the former is the obvious flagship. All things considered, the Sound Blaster AE-9 is likely the best card the company has ever produced. Creative brags that AE-9 uses "CleanLine Technology," which will provide superior microphone clarity thanks to special noise-blocking circuitry -- great for podcasters, steamers, and musicians. The drool-worthy AE-9 even has upgradeable/removable OpAmps!
Can you hack my network? Why ethical hacking is essential for improving your security
Congratulations! You’ve selected and deployed a new cybersecurity solution. But, once you’re up and running you might not feel completely secure. Do you need to test your incident response process as much as testing the software? Does the new solution have vulnerabilities you -- or its creators -- don’t know about? Are there emerging attacks that it will miss?
If you want to know that a cybersecurity solution will do what you need it to do, and that you’re ready to respond to whatever it detects, you need to test it. Penetration testing ("pentesting") is a common part of deploying any new tool for cybersecurity, and it may help you identify and fix weaknesses in your defense. Pentesting can be automated through software, but that can lack the ingenuity of a live human trying to breach your system. The surefire way to simulate a real human attack is to enlist the service of a real human attacker -- subjecting your network and its cybersecurity defenses to "ethical hacking."
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.