BetaNews Staff

Nokia launches Internet of Things management platform

Nokia could boomerang back into the mobile market with Alcatel-Lucent purchase

Nokia has decided to unite all of its connected-device technologies and products to form a new Internet of Things (IoT) management platform called Impact.

Impact, which stands for the Intelligent Management Platform for All Connected Things, is the company’s new tool for managing all of the devices powered by IoT technology. During its unveiling this week, Nokia pointed out the platform already supports 80,000 different device types.

Continue reading

Most of us rely on social media for news

In the lives of many consumers, social networks have begun to replace traditional news outlets as their primary source of news, making it much more difficult for publishers who still rely on a more traditional business model to earn revenue from their stories.

In its annual report on digital news, the Reuters Institute for the Study of Journalism (RISJ) highlights the rise of Facebook, YouTube and Twitter and how they transformed the way news media is consumed today. The institute conducted a study across 26 countries that found that over 50 percent of all the Internet users turned to social media to get their news.

Continue reading

App collusion is not a myth anymore

Up until today, app collusion for malicious purposes has been in the domain of myths and urban legends, but according to a new report by Intel Security, no more.

The security firm released its latest security report, entitled McAfee Labs Threats Report: June 2016, in which it says that it had found some apps capable of app collusion.

Continue reading

AT&T fends off 200,000 malware attacks every day

Google stops developers and Mac users installing unofficial Chrome extensions

AT&T has revealed that its network is constantly under the threat of attack by cybercriminals looking for ways to breach its security.

Each day the company detects over 30 billion malicious scans being deployed to find weaknesses in its network. Cybercriminals often use such scans to detect security vulnerabilities that could be exploited in future attacks. Researchers at AT&T also noted how the number of ransomware attacks increased significantly, with as many as 1.5 million new attacks occurring between 2013 and 2015.

Continue reading

4 web designing factors that weigh your website's trustworthiness

Trustworthiness is one of the factors that play a huge role in converting your leads. Would you like to make a transaction with a shabby looking website? Would you trust any random xyz website over World Wide Web? Definitely not! And you should not too, in order to stay safe and secure.

So what exactly determines a website’s trustworthiness? How do customers get that feeling of authenticity and reliability for a website? Well, we do have the answers to these questions.

Continue reading

Major websites are vulnerable to advanced bots

Google finds security questions are crap because your answers are fake

Pretty much every top website, in retail, financial services, consumer services, OTA members (Online Trust Alliance), news and media, and top US government agencies, is vulnerable to advanced bots, new research says.

Bot detection and mitigation company Distil Networks, analyzed 1,000 top websites in these verticals, and how they behave against crude, simple, evasive and advanced bots. All of the verticals performed quite well against crude bots, (75 percent in consumer services, 70 percent in government, 65 percent in financial services, 64 percent in news and media, 78 percent in retail and 67 percent in OTA members), but when it comes to advanced bots, one percent is the best result found.

Continue reading

IT vs security pros: Handling appsec

pixel padlock

A new report into corporate app security, conducted by runtime application security visibility and protection company Prevoty, shows significant discrepancies between IT and security professionals, when it comes to app security.

The report, entitled "The Real Root Cause of Breaches -- Security and IT Pros at Odds Over AppSec", is based on a poll of more than 1,000 IT and security professionals and says there are major divides in how these two groups handle app updates, app security tuning and backlogging.

Continue reading

EMEA businesses too slow to detect a data breach

It takes businesses in the EMEA region (Europe, Middle East, Africa) three times longer than businesses elsewhere in the world to detect a breach, mostly because they’re forced to detect such hits themselves instead of relying on outside help.

Those are the general conclusions of the first Mandiant M-Trends EMEA Report. The report, released by security experts FireEye, is based upon the statistics collected during investigations in the region, done by Mandiant’s leading consultants in 2015.

Continue reading

UK businesses lose over £1 billion thanks to cybercrime

New figures released by Get Safe Online and Action Fraud, the UK’s national fraud and cyber crime reporting center, reveal the cybercrime cost for British businesses over in the last year.

In total, businesses reported £1,079,447,765 in loses as a result of cybercrime, which is a 22 percent increase from the previous year. Each police force in the UK recorded around £19.5 million in losses but this number may in fact be slightly higher as some businesses may not have reported or disclosed the full extent of the losses they incurred to the authorities.

Continue reading

Symantec buys Blue Coat Systems

Symantec has decided to purchase Blue Coat Systems for $4.65 billion in a move that will allow it to more thoroughly protect its users from a variety of threats online.

The deal will also see Blue Coat’s CEO, Greg Clark, become Symantec’s new CEO. This will help the company fill the role which has been vacant since its previous chief executive, Michael brown stepped down in April due to poor financial results.

Continue reading

Internet of Things devices are NSA's latest target

The Internet of Things (IoT) may be the US National Security Agency’s next potential target for spying and collecting data according to a comment made by its deputy director at a recent military technology conference.

During the conference, which was held in Washington DC on June 10, deputy director of the NSA Richard Ledgett said that the agency is considering potential ways it could collect data from internet-connected devices such as smart appliances and pacemakers.

Continue reading

Microsoft sells 1.1 million Surface units in Q1 2016

Two-in-one and pro slate devices have earned their vendors higher revenue, managing to stabilize average selling prices, a new report by Strategy Analytics says.

The report, entitled "Global Tablet Vendor & OS, Unit & Value Market Share by Region: Q1 2016", says Microsoft and Apple sold more than a million of their pro slates last quarter.

Continue reading

IT pros: Cloud apps are as secure as their on-premise counterparts

Security

For the first time ever, the majority of cybersecurity professionals believe cloud-based apps are as secure as on-premise apps. Those are the results of a new survey conducted by Bitglass, among 2,200 cybersecurity experts.

According to the report, entitled The Rise of Purpose-Built Cloud Security, 52 percent of those surveyed said they found cloud-based apps as secure as their on-premise counterparts. The most interesting thing is that this percentage has jumped from 40 percent same time last year.

Continue reading

Dell launches new PowerEdge servers

Dell has announced that it has upgraded its 13th generation PowerEdge four-socket server portfolio. The new servers, designed with big-data and real-time analytics in mind, offer more flexibility, scalability and manageability.

This includes four new offerings: the PowerEdge R830 and PowerEdge R930 servers, PowerEdge FC830 -- a full-width, four-socket compute node for the Dell PowerEdge FX architecture -- and PowerEdge M830 blade server.

Continue reading

Two in three commercial apps with open source code have security vulnerabilities

open source

"If you’re using open source, chances are you are likely including vulnerabilities known to the world at large". This is a quote taken from the latest open source security report released by software company Black Duck.

The company analyzed more than 200 applications that are based on, or partially use, open source material, over a six-month period. The results are that 67 percent of them have vulnerabilities, and every application has at least five vulnerable components.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.