Get AOMEI Backupper Professional and other tools free to celebrate World Backup Day


With this year's World Backup Day on March 31st approaching fast, AOMEI is giving BetaNews readers the chance to get their hands on $109.89 worth of software free of charge.
AOMEI Backupper Professional allows Windows PC users to backup and clone their drives. It's a handy tool if you’ve been putting off upgrading to Windows 11 because it allows you to roll back to an earlier OS if the update fails.
Flaws found in over 80 percent of public sector applications


The public sector has the highest proportion of security flaws in its applications along with some of the lowest and slowest fix rates compared to other industry sectors.
A new report from application security testing company Veracode finds 82 percent of public sector applications have security flaws and that 60 percent of flaws in third-party libraries in the public sector remain unfixed after two years.
One in four employees lose job after making cybersecurity mistakes


We all make mistakes from time to time, but a cybersecurity error could cost you your job according to a new report.
The study from email security company Tessian finds almost one in four respondents (21 percent) lost their job as a result of a security mistake that compromised their company’s security -- up from 12 percent in 2020.
Faster exploitation of vulnerabilities poses a major risk for businesses


The average time to known exploitation of vulnerabilities is 12 days, down from 42 days last year, according to the latest Rapid7 Annual Vulnerability Intelligence report.
Of 50 2021 vulnerabilities looked at in the report, 43 were exploited in the wild and 52 percent of the known exploited vulnerabilities in this report came under attack within one week of public disclosure.
The problem with AI model failure and how to avoid it [Q&A]


It's tempting to look at the hype surrounding AI and see it as a solution to all problems. But AI isn't perfect, there have been some notable failures, often due to poorly defined models.
What are the consequences of getting it wrong, and how can businesses ensure their AI projects stay on track? We spoke to Alessya Visnjic, CEO of AI observability specialist WhyLabs to find out.
DDoS attacks grow in size and complexity


Though the overall number fell slightly, DDoS attacks became both bigger and more complicated in 2021 according to a new report from cloud-based managed security services platform F5 Silverline.
By the final quarter of last year the mean attack size recorded was above 21 Gbps, more than four times the level at the beginning of 2020. Last year also saw the record for the largest-ever attack broken on several occasions.
The challenge of hiring cyber talent in the Great Resignation [Q&A]


Whether it's been triggered by the pandemic or other factors, the Great Resignation has led to new problems for businesses when it comes to finding and retaining staff.
This has been a particular problem in the tech sector where employees tend to be quite mobile anyway. We spoke to Amar Kanagaraj, founder and CEO of Protecto, to find out how businesses can meet the challenges of hiring tech talent.
5G tops the list of tech that businesses want to invest in


Technology is an essential part of any modern business, but what particular tech do companies most want to invest in?
New research from WalkMe surveyed over 1,300 business owners to discover where money is being invested and by whom. 5G tops the list with as 32.9 percent of respondents choosing it as their primary area for investment.
Hackers spoof fintech apps as tax season approaches


The annual tax season is inevitably the cue for a spate of attacks impersonating official sites or popular accounting software.
In a new twist for this year researchers at email security firm Avanan have uncovered attacks spoofing fintech apps such as Stash and Public to steal credentials and give users a false sense of security that they've compiled the right tax documents.
Managing identities between clouds is the top challenge for businesses


More than three-quarters (78 percent) of respondents to a new survey say managing user identities between multiple clouds is their number one challenge.
The study carried out by Forrester for Strata Identity finds 70 percent want to migrate to the cloud increase security and protect data. But at the same time 28 percent of companies are using four or more public/private clouds today and that's expected to more than double in two years to 65 percent.
Ransomware can encrypt 100,000 files in under 45 minutes


New research from Splunk's SURGe team looks at how quickly ten major ransomware strains, including Lockbit, Revil and Blackmatter, can encrypt 100,000 files.
The research shows that the median ransomware variant can encrypt nearly 100,000 files totaling 53.93GB in 42 minutes and 52 seconds. Encryption speeds vary between ransomware variants though with individual ransomware samples ranging from four minutes to three and a half hours to encrypt the same data.
Poor security practices still a challenge for hybrid work


Almost a third (29 percent) of workers still use the same passwords for both personal and work accounts, potentially compromising their organisation if a personal account gets hacked.
A new study of 2,000 UK adults carried out by OnePoll for professional services company Gemserv also shows 39 percent of respondents access corporate accounts and content from their personal devices often or always, with another 24 percent doing so sometimes.
81 percent of organizations have outages caused by expired certificates


A new report shows that 81 percent of organizations have experienced at least two or more disruptive outages caused by expired certificates in the past two years, up from 77 percent last year.
The report from machine identity platform Keyfactor, based on research by the Ponemon Institute, finds the cut in SSL/TLS certificate lifespans to one year in September 2020 has made it much more difficult to keep the pace with certificate issuance and management.
Most enterprise network assets are cloud-based but policies aren't keeping pace


Nearly 90 percent of device assets in the modern organization are cloud-based, meaning physical devices such as laptops, tablets, smartphones, routers, and IoT hardware represent less than 10 percent of total devices.
However, the latest State of Cyber Assets report from JupiterOne analyzed nearly 10 million security policies and finds that cloud-specific ones represent less than 30 percent of the total.
Pen testing tools increasingly used by threat actors


Legitimate penetration testing tools like Cobalt Strike, Impacket and RMM, are being used by threat actors because it's more efficient to use existing tools that are proven to be successful than to create new software.
The latest Threat Detection Report from managed detection and response firm Red Canary shows Cobalt Strike in particular has never been more popular, impacting eight percent of its customers in 2021.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.