Latest Technology News

New platform brings together technologies to improve enterprise cybersecurity

business security

Cybersecurity tools are often designed to work in isolation from each other and that can leave enterprise security operations fragmented as well as difficult and expensive to manage.

A new integrated platform called GreyMatter from ReliaQuest, launched today, aims to bring together technologies, processes and teams to provide greater visibility and control over enterprise security operations.

Continue reading

Preparing for the rise of AI in the workforce

robot call center

Primary schools, universities, companies and even all the rest of us have a role to play in preparing for the rise of AI in the workforce. So what can we do to make sure people are still employable as AI starts becoming more common in business settings?

Let's take a look at the work ahead of us.

Continue reading

The impact of data privacy on the healthcare industry

Healthcare data

Healthcare companies are constantly consuming and sharing information to build better patient profiles and improve outcomes. Yet a new report reveals that only 70 percent are very or extremely confident in knowing exactly where their sensitive data is.

The study from data privacy specialist Integris shows that of these 50 percent update their inventory of personal data once a year or less, and a mere 17 percent of respondents are able to access sensitive data across five common data source types.

Continue reading

Google is bringing RCS messaging to users directly instead of waiting for carriers

Android figure on smartphone

There has been much talk about SMS successor RCS (Rich Communication Service) over the last year or so, but there has been little in the way of action. But this is about to change.

Seemingly tired of carriers and handset makers dawdling, Google is bringing RCS messaging to Android users in the UK and France. With Google taking control of RCS, the service could become the company's version of iMessage before long, and it means users will be able to experience it sooner than they might have expected.

Continue reading

BitDefender releases free decryption tool for GandCrab ransomware

Crab

Security firm BitDefender has teamed up with the FBI, Europol and other agencies and created decryption software that enables ransomware victims to get their data back for free.

The tool can be used to retrieve files encrypted by the GandCrab family of ransomware which is thought to have originated in Russia. GandCrab has been active for around a year and a half, and hundreds of thousands of people have fallen victim to it.

Continue reading

Netflix discovers SACK Panic and other Linux security flaws

Linux penguin

A number of Linux and FreeBSD servers and systems are vulnerable to a denial of service vulnerability dubbed SACK Panic, as well as other forms of attack.

A total of three security flaws were discovered by Jonathan Looney of Netflix Information Security. A series of malicious packets sent to vulnerable system is all it takes to crash or slow them down -- a remotely-triggered kernel panic. Patches and workaround have been released to help plug the holes.

Continue reading

Win a Roku Streaming Stick

Smart televisions are kind of... stupid. While TV makers love to advertise all of the integrated streaming services, the truth is, the interfaces are often slow and clunky. Ultimately, it is a much better experience to use a streaming device, such as Amazon Fire TV, Roku, or Apple TV. Hell, connecting your smart TV to the internet could even put your home network at risk!

The best thing about streaming media boxes and sticks, however, is they are typically very affordable. Well, with the exception of the pricey Apple TV. For instance, you can buy a quality Roku Streaming Stick for less than $40. You know what’s better than spending a little money? Spending no money. You see, Roku is giving away five devices (one per winner) to celebrate the summer.

Continue reading

How to center Windows 10 taskbar icons

Windows left-aligns all of the icons on your taskbar. This looks tidy enough, but if you fancy a change -- or perhaps you wish the taskbar looked more like the Dock in macOS -- you can center the buttons, or make other changes to their positioning.

You can add some cool animations too.

Continue reading

Microsoft To-Do comes to Mac

Apple makes great hardware and operating systems, but when it comes to applications, the company has plenty of room for improvement. For productivity, Microsoft still reigns supreme. Apple's iWork, for instance, is passable, but it is largely garbage compared to Microsoft Office. Pages, Numbers, and Keynote may look great, but smart professionals will invest in Word, Excel, and PowerPoint -- they are far more powerful. Even the totally free LibreOffice bests Apple's iWork.

With all of that said, macOS users should be very happy that Microsoft supports Apple's operating system. Quite frankly, without Microsoft's excellent productivity software -- such as Office and OneNote -- Mac computers would be far less attractive to power users and professionals. Today, Microsoft brings another fine app to the macOS platform -- To-Do. It is chock-full of useful features, including the ability to add tags/hashtags by simply typing a #.

Continue reading

Feast your eyes on how Apple's iPhone 11 should look

We’ve still got a few months to wait before Apple unveils the follow-up to the iPhone XS, although there have already been a number of leaks and a lot of speculation regarding the next iteration of the iPhone.

It’s believed that Apple will add under-display cameras, allowing for notch-less full screen, introduce reverse-wireless charging -- so users can charge AirPods directly from the handset -- and swap the Lightning connector for USB-C.

Continue reading

The biggest data breaches of the last 15 years

hosting tribunal breaches header

We've become pretty well accustomed to large scale data breaches over recent years. But that doesn’t mean that the numbers involved aren't still significant.

Web hosting comparison site HostingTribunal has put together an infographic looking at the 15 biggest breaches of the last 15 years.

Continue reading

Microsoft advises Azure customers to update Exim to avoid a Linux worm

Microsoft Azure

Microsoft has issued a warning to Azure customers using Linux Exim email servers running Exim version 4.87 to 4.91.

The company explains that these versions of Exim are vulnerable to a critical Remote Code Execution (RCE) security flaw and need to be updated to prevent the spread of a worm.

Continue reading

Genius.com uses clever entrapment technique and accuses Google of stealing song lyrics from its site

Genius.com logo

Ask Google what the lyrics to a particular song are and the chances are that the search results will display them in an info pane as well as links to lyrics sites. But where does Google get these lyrics from? Have Googlers sat and manually transcribed the words to songs ready or when people search for them?

No. Actually, there's a high chance that Google has simply scraped the lyrics from other sites, and one lyrics website says it caught the company red-handed. Genius.com used "Morse code" to catch the company lifting content directly from its lyric database.

Continue reading

3 attacks you'd miss without AI

AI

There has been a lot of hype around AI to the point where some people are simply tuning it out. I think this is a mistake. While there are limits to what AI can do, there also are sophisticated attacks that we’d miss without it.

The need for AI is driven by three fundamental yet significant changes in the enterprise computing environment.

Continue reading

Humans are still the weakest link in information security

web threats

According to a new report, more than half of all C-suite executives (53 percent) and 28 percent of small business owners who suffered a data breach say that human error or accidental loss by an external vendor/source was the cause.

The annual data protection report from information security service Shred-It also finds 21 percent of executives and 28 percent of small business owners admit deliberate theft or sabotage by an employee/insider was the cause of the data breach.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.