PassMark Software has unveiled OSForensics 4, a major update for its powerful PC forensics tool. There’s bad news: the "free for personal use" edition has been replaced by a 30-day trial. The trial has more than enough power to run one or two quick investigations, though, and the latest additions deliver even more information about your target PC. Password recovery is a major highlight, with OSForensics 4 now finding and decrypting stored logons for Windows accounts, wireless networks, Outlook and Windows Live Mail accounts. There are new options to choose a dictionary for brute force attacks on account passwords, and… [Continue Reading]
Automation means many different things, in the context of business it usually involves streamlining processes in order to reduce costs. Applied across the whole organization it means restructuring resources and integrating the applications used across the enterprise to save time and money. Business process automation (BPA) automation is aimed at those tasks that involve a series of processes which follow a predictable pattern with a series of repeated operations. As research specialist Gartner puts it, "It focuses on 'run the business' as opposed to 'count the business' types of automation efforts and often deals with event-driven, mission-critical, core processes. BPA… [Continue Reading]
Employees are often a company’s largest expense, but they can also be their most important asset. After all, without talented and dedicated staff at every level of the business, organizations will fall behind in terms of productivity, leadership and creativity. Although human resources has traditionally been tasked with handling all matters people-related, as this facet of business management has become increasingly complex and dynamic it has largely gone by another name. Human capital management (HCM) is often broken down into three categories (workforce acquisition, workforce management and workforce optimisation) and incorporates a vast array of business processes, ranging from the… [Continue Reading]
While many people covet powerful current-generation consoles like Xbox One and PlayStation 4, others are more excited for something far less modern. Tomorrow, nostalgia takes front stage as Nintendo Entertainment System: NES Classic will hit store shelves. Planning to buy one? Ha! Good luck. This refreshed 1980's console is expected to be both extremely popular and limited. Quite frankly, it will be virtually impossible to get. After all, it comes pre-loaded with 30 classic games. There will be many sad nerds this year when they find out there is no NES Classic under the Christmas Tree. Don't panic, however, as BetaNews… [Continue Reading]
While many people covet powerful current-generation consoles like Xbox One and PlayStation 4, others are more excited for something far less modern. Tomorrow, nostalgia takes front stage as Nintendo Entertainment System: NES Classic will hit store shelves. Planning to buy one? Ha! Good luck. This refreshed 1980's console is expected to be both extremely popular and limited. Quite frankly, it will be virtually impossible to get. After all, it comes pre-loaded with 30 classic games. There will be many sad nerds this year when they find out there is no NES Classic under the Christmas Tree. Don't panic, however, as BetaNews… [Continue Reading]
Microsoft has a long tradition of publishing Security Bulletins to share information about patches and security fixes that it releases. But starting next year this is going to change. As of February 2017, Microsoft will make use of the newly launched Security Updates Guide database. This, on the face of it, sounds like a great idea -- a searchable database of information -- but it changes the way information is presented and is unlikely to be well-received by users. The announcement was hardly shouted from the hilltops -- it was a little afterthought tacked on the end of a short… [Continue Reading]
Google's battle with the European Commission has raged on for many years, and the company has faced frequent accusations of anti-competitive behavior for one reason or another. Today the Android producer has hit back at the European claims, saying that the existence of iOS is proof that its own mobile operating system is not anti-competitive. Senior vice president of Google, Kent Walker, writes on the company blog that "Android is not a 'one way street'; it's a multi-lane highway of choice". He also points to the fact that the cost of smartphones running Android has dropped dramatically over the years,… [Continue Reading]
If you spend a lot of time on social networks like Facebook and Twitter, you probably thought Hillary Clinton was a shoo-in for president, and that Donald Trump had next to no chance of beating her. As my colleague Ian Barker explains, social networks can create something of a bubble, that pops when the real world intrudes, as it did in both Brexit and the US election. SEE ALSO: How social media bubbles are driving political anger Inevitably, the news that Donald Trump had won and was now president-elect really did surprise and shock a lot of people on Twitter… [Continue Reading]
As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe. But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know. BN: Why has encryption become such an important tool? RB: Encryption technology is a fundamental, underlying part of protecting sensitive data. It ensures that the wrong people don't have access to your information and can't leverage it for… [Continue Reading]
Information technology infrastructure is made up of many components, servers, storage, networking hardware, systems management software, and more. This can lead to a complex system being built up of components from several different suppliers. What converged infrastructure does is to bring together all of these things into a single, integrated package. For businesses this means that they can centralize the management of all their IT resources with a view to increasing use and cutting costs. Converged infrastructure is often associated with the cloud and outsourcing, but it can work just as well applied internally within large organizations too. Origins and… [Continue Reading]
It’s fair to say, yesterday’s US election result sent shockwaves around the world. Donald Trump was seen as an outside bet by many people, but now he’s won the race for the White House, the big question, is what will his victory mean for the people, both at home and abroad? Former NSA contractor turned whistleblower Edward Snowden has a lot to say on government matters, and today in a live Q&A he’ll be opining on how the US election results could affect your privacy, as well as any potential pardon for himself, and answering questions submitted via social media.… [Continue Reading]
A new report from Kaspersky Lab reveals that its products blocked 73,066,751 attempts to attack users with malicious attachments during the third quarter of this year. This represents the largest amount of malicious spam since the beginning of 2014 and is a 37 percent increase compared to the previous quarter. The majority of the blocked attachments were ransomware trojan downloaders. "Spam is often just unwanted advertising, but it has a darker side too," says Daria Gudkova, acting head of content analysis and research at Kaspersky Lab. "Criminals use spam to distribute malware and exploit users' vulnerability, convincing them to hand… [Continue Reading]
Microsoft has kept its promise and delivered a vulnerability patch for its Windows operating system, for a flaw, revealed by Google, which allowed attackers to gain full control of a targeted system. Releasing the details in a security bulletin, Microsoft says the flaw in the Windows kernel "could allow elevation of privilege if an attack logs onto an affected system and runs a specially crafted application that could exploit the vulnerabilities". Once an attacker gains control of the system, they can install other malicious applications which would allow even easier access, eliminating the need for the original flaw. "To exploit… [Continue Reading]
The world is still reeling from the outcome of the US elections, where Donald Trump came out on top against Hillary Clinton to become the 45th President of America. Financial markets around the world have been affected by the shocking and unexpected news and the notoriously unpredictable digital currency Bitcoin is no exception, with prices close to hitting a 35-month high against the pound amidst investor uncertainty. Against the dollar, the price of Bitcoin rose by up to 4.6 percent to reach a high of $738 on Wednesday, before settling at the $726 mark. This is approximately a three percent rise… [Continue Reading]
Many people use Google Chrome, and rightfully so. The cross-platform web browser works brilliantly, and is super-fast. Plus, the search-giant's browser is very secure too, right? Not so fast... Today, Sophos drops a bombshell by revealing that scammers are actively targeting Chrome users by leveraging a bug. These bad guys pose as Microsoft tech support and display an in-browser message that says the user's computer is infected with "Virus Trojan.worm! 055BCCAC9FEC". To make matters worse, Google has apparently known about the exploit for more than two years and simply failed to patch it. "Tech support scammers have started exploiting a two-year-old bug… [Continue Reading]