Accidental DDoS takes down Google's European cloud
Security is a major concern for cloud migrations
When it comes to migrating to the cloud, 65 percent of companies are concerned with security, a new survey by Netwrix has unveiled.
Moreover, 40 percent worry about the loss of physical control over data in the cloud. In particular, 69 percent of companies fear migration will increase the risk of unauthorized access, while 43 percent worry about account hijacking.
Sage Microelectronics announces world's first 10TB 2.5-inch SSD
A little-known Chinese manufacturer, Sage Microelectronics, has managed to out-gun its much bigger rivals (Kingston, Sandisk and Samsung to name a few) by bringing to market the world’s first 10TB 2.5-inch (9.5mm) SSD.
The drive was first demonstrated last month at the China Data Summit 2015 in Beijing and comes months ahead of its previous launch target. Samsung is the only big SSD vendor that has announced an SSD larger than 10TB.
Microsoft's enterprise security software now offers PUA protection
Microsoft has started to offer potentially unwanted application (PUA) protection in its anti-malware products for enterprise firms.
The news means that businesses will finally have an easy way of removing adware, browser hijackers and any other piece of software that deploys programs without the user’s knowledge or consent.
Technology terror: How ad-blocking technology steals ad dollars and video views
Freddy Krueger. Jason Voorhees. Michael Myers. Ad Blocking Technology. If you’ve watched a horror movie in the past 20 years, you’ve no doubt heard of those first three gruesome monsters. The last term may not be as familiar to you, but it is becoming a boogeyman of sorts for streaming video -- both for those who create and provide it as well as those who consume it.
Ad-blocking software and technology has become a very serious concern for programers, video creators, and publishers in 2015. Before the year is over, an estimated $3 billion dollars in video ad payload will be lost by publishers because of ad-blocking technology. Some premium video authors estimate that as much as one third of their video content isn’t reaching their streaming audiences at all. It may not be an epidemic yet, but there clearly is a trend, as ad-supported video businesses are being challenged as consumers install ad blockers at an increasing rate, especially on their mobile devices where they engage with video the most.
Some VPN services might expose your IP address
Just because you’re hiding behind a VPN (virtual private network), it doesn’t mean your real IP address cannot be traced. Those are the results summarised in a report by security firm Perfect Privacy, which says that it has found a vulnerability "in a number of providers".
The flaw, described as "port fail", affects virtual private network providers which offer port forwarding and do not have appropriate protection against the vulnerability.
How to securely manage the Windows 10 devices in your network
Microsoft’s decision to make Windows 10 a free upgrade means that, according to industry analysts, more than 350 million Windows machines are expected to be on Windows 10 within the next 12 months. This can create a huge gap between enterprise IT teams and employee devices.
While "free" has accelerated the adoption of Windows 10, what truly sets this release apart from others is that Microsoft plans to expand Windows 10 to an unlimited number of devices via the Internet of Things (IoT). IoT is becoming an increasing topic of conversation both in and outside of the workplace, in particular in discussions around how to secure these connected devices.
Raspberry Pi generates predictable SSH keys
The ultra-cheap Raspberry Pi computers have a security flaw which results in the devices generating a weak and predictable SSH key, new research suggests. The researchers say the computer’s operating system, Raspbian, should be patched to avoid the flaw.
"As soon as the systems start up systemd-random-seed tries to seed /dev/urandom, but /var/lib/systemd/random-seed is missing, because it hasn’t been created yet", explains the developer oittaa.
The security risks of IoT devices
The Internet of Things (IoT) isn’t a new concept, but it has gained momentum especially within the last year, as more and more connected devices have come to market. While connecting everything brings added convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective, and importantly, which devices could pose a threat either now or in the future.
With so many connected devices we decided to take a look at those that have made the headlines so far this year. Cars, for instance, have only recently become connected, although they have long been computerized. However, with poor Internet security expertise some manufacturers are being caught out.
Is your network ready for IoT devices?
The stats are here: investment bank Goldman Sachs cites the Internet of Things as a $7 trillion opportunity by 2020 -- with IoT set to have an impact at every stage in the production and distribution of products.
Wikibon predicts the value of efficiency savings from machine data alone could reach close to $1.3 trillion and will drive $514 billion in IT spend by 2020. Manish Sablok, head of Field Marketing, North West and East Europe at ALE, looks at the four fundamental network requirements to enable businesses to take full advantage of the transformations that IoT will drive.
How to keep your mobile data safe
Every month we see another story hit the headlines of how a household name has lost customer data. These type of incidents can cost millions to put right, not just in updating the IT systems, but in terms of lost revenue due to loss of good reputation, and potentially punitive fines.
When the new EU General Data Protection Regulation (GDPR) comes into force, expected during 2017, fines for non-compliance could be five percent of global turnover. This is a significant sum for any size of organization and deserves serious consideration.
Taking enterprise security to the next level with two-factor authentication
Two-factor authentication (2FA) has been about for much longer than you think. For a decade or more we have been used to being issued with a card reader (in essence a hardware token device) to use with our bank card and Personal Identification Number (PIN) when looking to complete our internet banking transactions.
2FA technology has also, over the past years, been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice.
Security breaches don't lead to a change in IT policy
A survey conducted by training company QA, reveals that eight out of ten (81 percent) UK IT decision makers experienced some sort of data or cyber security breach in their organization in 2015. Sixty-six percent said that the breach had led to a loss of data, 45 percent said that it had resulted in a loss of revenue, and 42 percent said that it had resulted in a PR nightmare for the business.
Despite this, however, less than a third (27 percent) plan to invest in cyber security technologies next year. It would also appear that not all organizations have learnt from their experience, with less than half (43 percent) of IT decision makers saying that the breach had not resulted in a change of policy and procedure.
Samsung's first 128 GB DDR4 RAM modules for servers go into production
Samsung has announced that it is starting mass production of the industry’s first "through silicon via" (TSV) 128GB DDR4 memory modules for high-end enterprise and data centre servers.
This news follows on from its successful introduction of the 64GB 3D TSV DDR4 DRAM last year, which was an industry first.
Lenovo fixes two security vulnerabilities in its preloaded Windows tools
Lenovo has issued a patch which fixes vulnerabilities located in the software which comes preloaded with some of the laptops it sells.
The company recently released version 5.07.0019 of Lenovo System Update. This tool is made to keep the BIOS and drivers updated, previously called ThinkVantage System Update.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.
