Wipe entire drives quickly, safely and easily with O&O DiskErase

oo-diskerase-200x175

Berlin developer O&O Software has launched O&O DiskErase, a brand new tool for securely wiping entire partitions and drives on Windows PCs.

The program, spun off from the company’s SafeErase, focuses on providing users with a reliable, safe and simple way of erasing hard disks and even entire PCs before passing them on or disposing of them.

Continue reading

How Malicious Azure apps can be used to target Office 365

Network security

Infected mail attachments and malicious links are common ways for hackers to try to infiltrate organizations.

Researchers at cybersecurity company Varonis have uncovered at new attack route in the form of malicious Azure apps. Azure apps don't require approval from Microsoft and, more importantly, they don't require code execution on the user's machine, making it easy to evade endpoint detection and antivirus systems.

Continue reading

Ubuntu Linux publisher Canonical launches Managed Apps for enterprise DevOps teams

DevOps

Ubuntu creator Canonical is launching a new Managed Apps platform, allowing enterprises to have their apps deployed and operated by Canonical as a fully managed service.

At launch the service will cover ten widely used cloud-native database and LMA (logging, monitoring and alerting) apps on multi-cloud Kubernetes but also on virtual machines across bare-metal, public and private cloud.

Continue reading

Zoom claims to offer end-to-end encryption -- even though that's not strictly true

Zoom logo

Security is a serious concern for anyone using the internet, but it most certainly is for businesses. In seeking a video conferencing tool to see them through the home-working coronavirus has forced many people into, Zoom has proved to be an incredibly popular choice, and its proclamation of offering end-to-end encryption very probably swayed a few decisions.

An investigation carried out by the Intercept found that, despite Zoom's claims, the service does not really support end-to-end encryption for video and audio content. In reality, all it offers is TLS, but Zoom has chosen to refer to this as being end-to-end encryption.

Continue reading

Zoom security vulnerability can be used to steal Windows login credentials

Zoom icon

Zoom's popularity has accelerated in recent weeks thanks to the number of people now forced to work from home and conduct meetings online. Now security researchers have discovered a worrying vulnerability in the software that could be used to steal Windows login credentials.

The vulnerability steams from the fact that Zoom converts URLs that are sent in messages into clickable links. The same is true for UNC paths, and if such a link is clicked, it is possible to grab a user's login name and their NTLM password hash and decrypt it.

Continue reading

Keep a remote eye on your Windows PCs for free with O&O Syspectr

syspectr-200x175

Great news for both sysadmins or anyone looking to keep a remote eye on multiple Windows PCs -- O&O Syspectr is now completely free for both commercial and personal use.

The software, a mere 6MB download, installs as an invisible service on each client PC and sits unobtrusively in the background. Users can then log onto their Syspectr accounts online to access a wide range of monitoring, maintenance and management tools.

Continue reading

Microsoft releases PowerToys v0.16.0, adding four new tools including Image Resizer and Window Walker

PowerToys reboot

Since Microsoft first announced PowerToys for Windows 10, there was great excitement about the return of the collection of utilities. The company has been drip-feeding us new features over the last few months, and now PowerToys v0.16.0 has landed, bringing with it no fewer than four new tools.

The most interesting new arrivals are the Image Resizer Window Shell extension which provides easy access to image resizing options from the context menu, and Window Walker which is a text-based Alt-Tab alternative.

Continue reading

Apple buys Dark Sky, and that’s terrible news for Android users

Sad-window

When a huge tech corporation like Apple or Microsoft buys a company, it can either go very well or terribly wrong for consumers. Microsoft’s purchase of Wunderlist in 2015 was bad, as the Windows-maker ended up killing it. Apple’s purchase of SoundJam MP in 2000, however, turned into iTunes and revolutionized the music industry. As you can see, it can go either way.

Today, Apple buys popular weather app Dark Sky and it seems to be terrible news. No, the iPhone-maker isn’t killing it entirely — it will still be available on iOS for the time being. Unfortunately, Apple is shuttering both the Android and Wear OS versions, leaving users of Googles’s mobile operating systems without access to the popular app.

Continue reading

Linux Mint 20 is 64-bit only, based on Ubuntu 20.04, and named 'Ulyana'

woman_green_plus

Linux Mint is great operating system. It is based on the excellent Ubuntu and features three great desktop environment options -- Cinnamon, MATE and Xfce. While it is a smart choice for Linux beginners, it is also good for experts too.

Today, we learn some new details about the upcoming Linux Mint 20. While most of the newly revealed information is positive, there is one thing that is sure to upset many Linux Mint users.

Continue reading

CIOs in the next ten years: Politics and personality assessments become must-have CIO tools

CIO

Over the next decade, the CIO's job will dissolve into the business and take on many of the tasks typically performed by CEOs, CFOs, and even sales departments. This will not be so much of a  technology sprawl, as more of a responsibility sprawl that can be attributed to the pervasive spread of digital transformations into every aspect of a company.

No longer will the CIO be only concerned with data backups or IP phone systems -- more and more these will become expected utilities in the same manner as the lights are expected to click on or water is expected to flow in the restroom. This new omnipresent nature of the CIO is absolutely necessary to ensure all business elements run efficiently. In essence, the CIO will become an evangelist for transformations that empower the entire process from supply chains to Salesforce and ERP integrations.

Continue reading

So, what are Microservices?

Microservices

Part 1: You may have heard the term Microservices before, but every time you do, you ask yourself -- What exactly is a microservice?

Let’s break down exactly what this technology is, why it’s so great for organizations to leverage and challenges they should prepare for.

Continue reading

SiriusXM is free through May 15 to help with Coronavirus isolation boredom

Howard_Stern

We are weeks into people self-isolating in their homes due to the Coronavirus (COVID 19), and apparently, many are getting bored. As someone who is staying indoors to help "flatten the curve" and prevent the spread of the virus, I have to wonder if these bored people are nuts. I mean, look, we live in a world where the internet exists, and you can stream thousands upon thousands of films right in your living room. Not to mention video games, books, television, radio, board games, puzzles, and more. In 2020, I don't know how anyone can be bored, but OK, I guess some people live more exciting lives than me.

If you feel the need to have even more entertainment in your life, I have some great news. SiriusXM is free through May 15! No, this does not include satellite access for your car -- it is limited to streaming. But still, it is the same content, including the highly coveted Howard Stern Show! The company is even launching a special channel called "#StayHome Radio," which will only play feel-good tunes. Best of all, you don't even need to enter a credit card to get the access, so there is no worry about being charged when the offering ends -- there is nothing to cancel.

Continue reading

Marriott International reveals details of another data breach

Marriott sign

Towards the end of 2018, Marriott International suffered a data breach of its Starwood Hotel reservation database. Now the hotel chain has revealed that it suffered a second data breach earlier this year.

The company says that at the end of February it noticed that an "unexpected amount of guest information" could have been accessed using the login credentials of two employees. It is thought that this access started in the middle of January, and up to 5.2 million customers have been affected.

Continue reading

2019's top cyberattack techniques

Cyber attack

Recorded Future has been logging sandbox submissions from its platform as mapped to the MITRE ATT&CK framework over 2019 and has released a list of the most frequently referenced tactics and techniques.

The most common tactic in the results is Defense Evasion and the most common technique Security Software Discovery. Defense Evasion involves avoiding detection by, among other things, hiding in trusted processes, obfuscating malicious scripts, and disabling security software.

Continue reading

Shutterstock makes over 17 million videos available on Android and iOS

ShockedUpsetNerdSmartphone

If you need access to video footage while on the go, then you’ll be interested in today’s announcement from Shutterstock which sees the company make over 17 million videos available to license on both Android and iOS.

The footage is offered in SD, HD, and 4K quality and you can search, save and license whatever footage you require.

Continue reading

Load More Articles