BetaNews Staff

Inside threats enable vast majority of cybercrimes

ID theft

No less an authority than colorful cybersecurity pioneer John McAfee firmly believes that the now infamous hack of the US-based Ashley Madison sex-cheating website was an inside job.

Statistically, this is extremely likely to be the case for most cyber security breaches. KCS’ own research shows that 80 percent of corporate cybercrimes can be traced to staff, and this figure is increasing. This can be the result of deliberate cybercrime or it could be that the staff member has been careless with their personal log-in details.

Continue reading

Why hackers are after your private information

cyber criminal

Cybercriminals are a motivated bunch that continually change up their approaches to evade traditional detection-based security. Rather than continuing the insane circle of identify and respond security, it’s time to flip your cyber script and focus on gaining situational awareness of the real risks your organization actually faces.

Once you know what hackers are after and how they are getting in, you can shift your defenses accordingly. To that end, let’s take a look back on the first half of 2015.

Continue reading

Ten reasons threat intelligence is here to stay

Over the past couple of years, the volume and frequency of new malware and its variants has exploded. But it takes considerable time, effort and expertise to sift through data and transform it into pertinent information. So out with old and in with the new. To alter traditional approaches, threat intelligence emerged as a way to gather data about vulnerabilities and alter approaches based off that intel.

Threat intelligence has drastically transformed the industry. In fact, it's hard to go to a security conference without hearing about threat intelligence. However, recent articles have turned threat intelligence into quite the controversial debate and many touting that threat intelligence will do very little to improve cybersecurity. Well no offense to those individuals, but the fact of the matter is threat intelligence is not going away anytime soon.

Continue reading

Apple Watch selling well in China

Following an initial strong performance out of the gate, Apple Watch sales have been widely regarded as on the slump according to several pieces of analysis we’ve seen -- although the latest snippet concerning the Chinese market is more optimistic.

As you may be aware, the iPhone 6 models have been doing very well over in China, and Apple’s smartwatch has also shifted a considerable amount of units.

Continue reading

5 ways API management impacts daily life

API

Whether it’s news feeds, online shopping, or navigation systems, the variety of new cloud, mobile and internet of things (IoT) solutions are changing how we work, play and shop. Businesses also benefit from increased visibility and productivity, as well as from new opportunities to lower costs and streamline operations. It’s no wonder companies in every industry are rushing to participate by "opening" their applications (news feeds, laboratory results, manufacturing lines, etc.) to allow other systems to interact with them.

There’s just one problem. If organizations don’t adequately manage how they open their systems, the interactions will eventually fail, wreaking havoc on the hybrid solutions they create. The technology enabling this interaction is the application programming interface (API). One use of an API is to help developers build larger applications, including the inputs, outputs and basic operations. Very simply, if a health management system (HMS) wants to be able to pull the results from a laboratory application, the HMS needs to understand how to connect to the laboratory application, input a medical record number, request a test result, and receive the output. The API tells the HMS how to do these things.

Continue reading

IFA 2015: Huawei announces new Mate S flagship smartphone

Focusing on touch technologies, the now-third largest smartphone supplier Huawei has unveiled its new 5.5-inch handset at IFA in Berlin.

The Huawei Mate S, the maker’s new flagship smartphone, features some impressive touch-based innovations.

Continue reading

Baby monitors are not secure enough for the IoT era

Many popular baby monitors with online access lack even the most basic security features, according to a report by IT security firm Rapid7.

Researchers revealed that it would extremely simple for hackers to use the devices as spy cameras or to launch attacks on other Internet-connected devices in the home.

Continue reading

How to disable OK Google voice search on Android

Google voice search is a powerful feature of the Android-powered smartphone. By simply talking to your phone, you can do internet searches, call contacts, take photos, set an alarm, create a calendar event, make a note, the list goes on.

However, not everyone wants to use the voice-controlled feature for various reasons. Some don’t like the idea of their smartphone listening to them, while others don’t speak English that well and don’t see the benefits of keeping the feature turned on.

Continue reading

Amazon Prime customers can watch videos offline

The battle for online streaming supremacy is heating up, after Amazon announced that Prime subscribers can now download videos for offline viewing.

The move stands in stark contrast to the position taken by rival content provider Netflix, which has consistently stated that offline content is not on its agenda.

Continue reading

Apply Magic Sauce uses Facebook likes to determine your personality

We all know that Facebook has a lot of information about us, but what exactly can it learn from all that data?

Aside from the most obvious -- the things you give it, such as gender, date of birth, place of living, education, work, your favorite sports clubs, music and movies -- it can also conclude a lot of things on its own.

Continue reading

Google will relegate mobile sites that serve large ads

Google has announced that it will downgrade websites that use interstitial advertisements in its mobile search results.

Although desktop searches will not be affected, Google’s new initiative is a response to claims that mobile users are often being subjected to an unsatisfying search experience.

Continue reading

GRIP platform lets you sue Google more easily

You know things are getting out of hand when people start making platforms to sue you more easily. That’s what’s currently going on with Google in Europe, as a new platform called GRIP is launched.

GRIP, standing for Google Redress & Integrity Platform is created for those who believe to be affected by Google’s alleged anti-competitive behavior in Europe. According to a Reuters report, it was created by U.S. law firm and class action specialist Hausfeld.

Continue reading

Women largely prefer Pinterest, while men are most likely to use Twitter

There is no connection between levels of education and whether or not someone uses social media because, as it turns out, everyone uses social media.

However, there is a correlation between a person’s education, income and gender and which social media it uses. According to a fairly extensive research paper by the Business Insider, women are more likely to use Pinterest, while men are more likely to use Twitter.

Continue reading

Apple's iPhones and iPads will work better with Cisco enterprise networks

Apple and Cisco have, through a joint statement, announced a partnership which will see Apple’s apps and devices become more productive in enterprise networks.

The goal of the partnership is to optimize Cisco’s networks for iOS devices and apps and integrate the iPhone with Cisco enterprise environments. That will create a "fast lane" for iOS business users, Apple has said in a press release.

Continue reading

The most-used passwords are still terrible choices

weak password

There’s no excuse for having a ridiculously weak account password, and yet many folks continue to make no effort at all on the security front in this respect, according to a new piece of research.

BT.com highlighted a government survey, which was part of the Cyber Streetwise campaign, and found that three quarters of UK citizens used passwords which weren’t secure.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.