Half of risky online transactions come from mobile devices


New research from fraud prevention and multi-factor authentication specialist iovation reveals that 49 percent of all risky transactions now come from mobile devices, up from 30 percent in 2018, 33 percent in 2017 and 25 percent in 2016.
Looked at geographically, North America with 59 percent of all risky transactions coming from mobile devices, leads the way. In 2018, it was Asia at 53 percent. In 2017, it was North America with 55 percent, and in 2016, it was North America again with 36 percent.
The top 11 security threats to cloud computing


Data breaches and misconfigurations come out top of the Cloud Security Alliance's latest Top Threats report which reveals an 'Egregious Eleven' list of cloud security threats.
This year's list no longer includes issues that fall to cloud service providers (CSPs), such as denial of service, shared technology vulnerabilities, CSP data loss and system vulnerabilities. This suggests these are either being well addressed or are no longer perceived as a significant business risk of cloud adoption.
SMEs forced to meet cybersecurity demands in order to win contracts


Supply chain threats are a major problem for enterprises and they are forcing smaller businesses to take security more seriously in order to win contracts.
A study by cyber security awareness platform CybSafe shows nearly 37 percent of organizations have been required to achieve a recognized cyber security standard by their enterprise customers before successfully securing contracts. This represents a nine percent increase over 2017.
Handling user feedback data and the rise of 'ResearchOps' [Q&A]


Customer experience has become a massive, sprawling industry that includes the many systems and touchpoints that lie between companies and their users. It's projected to be a $32B market by 2025.
One of the most interesting new sub-categories emerging within customer experience is ResearchOps. It's a new discipline -- with a growing community of practitioners -- focused on better infrastructure around customer research, and operationalizing the user research process so it can be done faster and have a bigger impact.
Kingston unveils A2000 NVMe PCIe SSD


Today, Kingston announces a new NVMe solid state drive, called "A2000," and unfortunately, it isn’t too exciting. Don’t get me wrong, it is plenty fast, but hardly the fastest.
Here’s the thing, folks, PCIe 4.0 drives will soon be flooding the market, and this new model from Kingston still uses the older PCIe 3.0. With that said, most computers do not support PCIe 4.0, so consumers largely can’t take full advantage of an SSD using that new standard anyway.
Reason Antivirus: When privacy is your priority [Review]


When was the last time you shopped around for a new antivirus? If you're a Windows user and using its latest iteration, you might be quite satisfied with how Windows Defender works. Besides, it comes as default with the operating system and runs unobtrusively in the background, no added setup required.
However, cyberattacks are only growing more rampant and hackers are finding new ways to victimize computer users. And for ordinary users, it's our privacy that's under threat. Hackers look to gain access to our devices to steal data. It's not just our personal and financial information they're after. Hackers are also trying to hack into webcams and microphones hoping to capture anything sensitive and incriminating in order to extort victims.
6 design principles for machine learning anomaly detection systems


Every year, 22 percent of eCommerce customers abandon their shopping carts due to website errors. Every year, insurance companies discharge up to 10 percent of their claims cost on fraudulent claims. Network outages cost up to $5,600 per minute. These and other failures represent anomalies that are detectable by machine learning in ways that human-powered monitoring can’t replicate.
When it comes to deploying a machine learning anomaly detection system, companies have the choice of either purchasing a ready-made system or developing their own. No matter what they choose, however, the resulting system should be based on criteria that account for their company’s size, needs, use cases and available resources. Here are the six principles that companies should pay attention to:
The evolution of Emotet: How to protect your network


With over 350,000 new malware samples emerging every day, it’s difficult for any one strain of malware to make a name for itself. Any single malware sample whose name you know -- be it Mirai, WannaCry, or NotPetya -- speaks to a trail of devastation.
In 2019, people are also hearing another name: Emotet.
Second quarter sees an 18 percent rise in DDoS attacks


In the second quarter of 2019, the total number of DDoS attacks grew by 18 percent, compared to the same period in 2018 according to a new report from Kaspersky.
There is, however, a drop compared to the first quarter of this year, with attacks down 44 percent. Kaspersky attributes this to seasonal variation with DDoS attack usually declining in late spring and summer.
A disturbing lack of outrage about the E3 Expo leak


Why don’t I feel bad? I know I should. I know I ought to be alarmed by the news that the organizers of the E3 Expo accidentally leaked the personal or professional contact details for some two thousand registered journalists and members of the media.
But I’m not. In fact, I’m ambivalent about the whole thing. As an early victim of some malicious "doxxing" -- by a fellow tech journalist, no less -- I’ve become a bit jaded about the matter (having satellite images of your house posted online so freaks can target your children will do that to you).
These are the Apple Card restrictions you need to know about


Apple Card is due to launch later this month and there are a few restrictions associated with Apple's predictably-named credit card.
The Apple Card Customer Agreement document drawn up by backing creditor Goldman Sachs shows that it cannot be used to buy cryptocurrencies. Additionally, the iPhone-based digital version of the credit card cannot be used on jailbroken devices.
When did computers get smarter than us?


There are few aspects of our everyday lives that don’t now rely on computers at some level. But does this reliance on technology mean that the machines are getting smarter than we are?
Server and network monitoring specialist CloudRadar has put together an infographic examining our reliance on technology.
Cloudflare terminates 8chan over links to mass shootings


Cloudflare has announced that it is terminating its services with controversial site 8chan. The move comes after the mass shootings in El Paso, Texas and Dayton, Ohio.
There have been numerous calls for 8chan to be taken offline in the past, and Cloudflare has previously considered removing its protective services from the site. What has now tipped the company's decision is the fact that the shooter at El Paso "appears to have been inspired" by 8chan, and even posted a racist manifesto on the site.
Facebook is renaming WhatsApp and Instagram


Being such globally recognized names, you would think that a rebranding of WhatsApp and Instagram would be a crazy exercise... but that's precisely what Facebook is doing.
In a move that is more than a little surprising -- and, many would argue, somewhat pointless -- the social networking giant is to rename the two products Instagram from Facebook and WhatsApp from Facebook. The renaming will make it clear that the company people love to hate is behind the chat and social networking tools.
How to opt out of Amazon listening to what you say to Alexa


There have been privacy concerns about digital assistants for just about as long as there have been digital assistants, and the recent confirmation that Google and Apple were listening to Assistant and Siri conversations has done nothing to allay fears.
The 'were' in that last sentence is important, as both companies have agreed -- at least temporarily -- to cease the practice. Not wanting to miss out on an opportunity for good PR, Amazon is getting in on the action, giving Alexa users the chance to opt out of having their conversations with its digital assistant listened to -- or "manually reviewed", as Amazon would prefer. Here's how to do just that.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.