Ian Barker

Enterprises turn to software solutions to manage endpoint devices

endpoint data

As businesses embrace digital transformation, things like the growth of distributed workforces and remote work are impacting both the day-to-day responsibilities and long-term plans of IT managers.

Software and cloud managed services company Unify Square has commissioned a survey from Osterman Research to sample the views of IT managers who oversee unified communications (UC) and workstream collaboration (WSC) environments.

Continue reading

Christmas tech gadgets increase household cyber risks

Christmas smartphone worker

Many people will be receiving new tech gadgets over the Christmas period, including smartphones, gaming consoles, tablets, connected toys, and a whole range of apps to go with them.

But new research from from cybersecurity training organization the SANS Institute finds that while people are aware of the risks these devices can pose, they may not have the skills to properly protect them.

Continue reading

Windows 10 sends activity history to Microsoft even when told not to

Windows 10

We all know that Windows 10 logs data about what you do on your PC. What you may not be aware of is that it still sends that information to Microsoft even if you have told it not to. Sneaky, huh?

People on Reddit have been discussing the issue and finding that even if the option to send data to the cloud is turned off it still shows in the online Privacy Dashboard.

Continue reading

The benefits of a cloud-based testing regime [Q&A]

Cloud

DevOps teams are under constant pressure to release faster, improve quality and keep costs under control. This means testing increasingly becomes a priority to ensure accelerated releases and many companies are turning to cloud-based testing tools.

However, as with any move to the cloud, there are some challenges that need to be overcome. We spoke to Uzi Eilon, chief technology officer at cloud-based testing platform Perfecto to find out more.

Continue reading

How deception can provide an edge in fighting cyberattacks [Q&A]

Deception man woman

Businesses are starting to recognize that it may be impossible to keep attackers completely out of their networks, so they are starting to look for ways of fighting them more efficiently.

One of the ways of doing this is to use decoys to lure attackers and allow the threat to be dealt with before it affects live systems. We spoke to Carolyn Crandall, chief deception officer at Attivo Networks to find out more about how this deception technology works and what it can do.

Continue reading

96 percent of employees struggle to locate files

File not found

According to a new report, 96 percent of all employees face some sort of difficulty when looking for the most recent version of a document or file.

The study from information management company M-Files also reveals that 83 percent of staff worldwide are forced to recreate documents that already exist but can't be found.

Continue reading

Oaxis Timepiece -- smart style meets smart tech

Oaxis Timepiece

For many people wearing a watch is as much about how it looks as how it works. In these days of smart devices that often requires a trade off between style and function.

Do you leave your good-looking watch at home while you wear your smart watch, or do you look a bit needy by putting a wearable fitness tracker or similar on your other wrist? With the Oaxis Timepiece you no longer have to make the choice.

Continue reading

69 percent of employees use work devices for personal tasks

Facebook in work meeting

New research released by security awareness and email protection company Mimecast finds that more than two-thirds of employees admit to personal use of work devices during office hours.

Mimecast surveyed more than 1,000 people who use company-issued devices (such as mobile phones, desktop computers or laptops) in the workplace, in order to understand their behavior, but also their awareness of basic threats plaguing organizations.

Continue reading

Symantec launches neural network device to protect critical infrastructure

Symantec ICSP Neural

Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportation, but it's often be based on legacy systems which can be difficult to keep secure, with updates often needing to be carried out using USB devices.

The threat of attacks is very real though and the consequences especially disastrous, yet many control systems are running outdated software, leaving them vulnerable to attack.

Continue reading

Latest malware tries to avoid detection and maintain persistence

Malware magnifier

Malware is constantly evolving in an attempt to steal data or make money for the people behind it. A new report by Malwarebytes Labs reveals the latest shift towards attacks that can avoid detection but also stay on a system to be reactivated later.

Using fileless malware is just one example among many attack methodologies currently evading traditional security defenses and maintaining persistence.

Continue reading

Popular VTech children's tablet can be easily controlled by hackers

controlling hacker

Risk management and cybersecurity specialist SureCloud has discovered that the popular VTech Storio Max children's tablet can easily be hacked, enabling criminals to take control of the devices and snoop on unsuspecting victims.

This can be done by simply adding an image or link to a website. When accessed by a child via the tablet's web browser, the exploit would attack the tablet and enable the attacker to take full control of the device.

Continue reading

Fake ransomware 'cures' actually just pay the scammer

money envelope bung

In an interesting new trend some companies are claiming to be able to unlock encrypted files following a ransomware attack, but are in fact simply acting as brokers between victims and attackers.

Researchers at Check Point have discovered a Russian IT consultancy named Dr. Shifro that claims to unlock and recover consumers' and businesses' encrypted files.

Continue reading

100 million Quora users data exposed in major breach

Quora

Question and answer site Quora has revealed that its user data has been compromised as a result of unauthorized access to its systems by a 'malicious third party'.

The breach occurred on Friday and Quora is still investigating the causes. It has taken the step of logging out all users who may have been affected and forcing them to reset their passwords. It also says it will continue to make security improvements.

Continue reading

Enterprises struggle to fill the cloud skills gap

According to a new study 94 percent of respondents find it at least 'somewhat difficult' to recruit candidates with the right technology and business skills for driving digital innovation.

The report from AIOps platform company OpsRamp shows that over 60 percent of IT professionals say that a majority of their applications are either built or run using hybrid cloud architectures.

Continue reading

DDoS attacks on eCommerce reach their highest levels over the Black Friday weekend

DDoS attack start

Cybercriminals are just as keen to exploit the holiday shopping boom as anyone else, with DDoS attacks on eCommerce providers increasing by over 70 percent on Black Friday compared with other days in November. On Cyber Monday, attacks increased by 109 percent compared with the November average.

Cloud anti-DDoS company Link11 has released data showing several attacks observed during Black Friday and Cyber Monday were of up to 100 Gbps bandwidth, and the average attack volume on both days was just under 6Gbps.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.