• WWW.FOXNEWS.COM
    Alarming rise of fake legal requests: What it means for your privacy
    Published November 12, 2024 10:00am EST close Tips to protect yourself against bank scams Scammers often ask for answers to secret questions for crucial information needed to access accounts. Phishing emails are one of the most common tricks scammers use, but theyre usually easy to catch if you pay attention. Awkward grammar, random details and, most importantly, an unofficial email address are dead giveaways. For example, you might get an email saying your Apple IDs been disabled, but the senders email wont actually be from Apple. Now, though, scammers are finding ways to get around this.According to the FBI, theres been a recent rise in cybercriminal services using hacked police and government email accounts to send fake subpoenas and data requests to U.S.-based tech companies.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)What you need to knowTheFBI has seen a spike in criminal forum posts about emergency data requests and stolen email credentials from police departments and government agencies. Cybercriminals are getting into compromised U.S. and foreign government email accounts and using them to send fake emergency data requests to U.S.-based companies, which exposes customer data for further misuse in other crimes.In August 2024, a popular cybercriminal on an online forum advertised "high-quality .gov emails" for sale, meant for espionage, social engineering, data extortion, emergency data requests and more. The listing even included U.S. credentials, and the seller claimed they could guide buyers on making emergency data requests and even sell real stolen subpoena documents to help them pose as law enforcement.Another cybercriminal boasted about owning government emails from over 25 countries. They claimed anyone can use these emails to send a subpoena to a tech company and get access to usernames, emails, phone numbers and other personal client info. Some con artists are even hosting a "masterclass" on how to create and submit their own emergency data requests to pull data on any social media account, charging $100 for the full rundown. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)How this phishing scam worksWhen law enforcement, whether federal, state or local, wants information about someones account at a tech company, like their email address or other account details, they typically need a warrant, subpoena or court order. When a tech company receives one of these requests from an official email address, theyre required to comply. So, if a scammer gets access to a government email, they can fake a subpoena and get information on just about anyone.To bypass verification, scammers often send emergency data requests, claiming that someones life is at risk and that the data is needed urgently. Because companies dont want to delay in case of an actual emergency, they may hand over the information, even if the request turns out to be fake. By portraying it as a life-or-death situation, scammers make it harder for companies to take time to verify the request.For example, the FBI reported that earlier this year, a known cybercriminal posted pictures on an online forum of a fake emergency data request theyd sent to PayPal. The scammer tried to make it look legitimate by using a fraudulent mutual legal assistance treaty, claiming it was part of a local investigation into child trafficking, complete with a case number and legal code for verification. However, PayPal recognized that it wasnt a real law enforcement request and denied it. Illustration of a person receiving a phishing email (Kurt "CyberGuy" Knutsson)What can companies do to avoid falling for these phishing scams?1) Verify all data requests: Before sharing sensitive information, companies should verify every data request, even those that look legitimate. Establish a protocol for confirming requests directly with the agency or organization that supposedly sent them.2) Strengthen email security:Use email authentication protocols like DMARC, SPF and DKIM to block emails from unauthorized sources. Implement anti-phishing filters to detect suspicious content in messages.3) Train employees on phishing awareness: Regular training sessions on phishing scams can help employees recognize red flags, such as urgent language, unusual requests or emails from unknown addresses. Employees should be encouraged to report suspicious emails.4) Limit access to sensitive data: Restrict who can view or share sensitive customer data. Fewer people with access means fewer chances for accidental or intentional data leaks.5) Implement emergency verification procedures: Have a clear verification process in place for "emergency" data requests, including steps for double-checking with higher management or legal teams before responding to any urgent request for customer information. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Is there something you need to do?This particular phishing scam mostly targets big tech companies, so theres not much you can do directly. However, its a reminder that you shouldnt automatically trust an email, even if it comes from a .gov address. Here are some steps you can take to stay safe.1) Double-check email addresses and links: Even if an email looks official, take a moment to check the senders email address and hover over any links to see where they actually lead. Be cautious if anything looks off. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA):Use2FA for all sensitive accounts. This extra layer of security helps protect you even if your login credentials are compromised.3) Stay updated on phishing scams:Keep an eye on the latest phishing tactics, so you know what to look out for. Regular updates help you spot new types of scams before they affect you.4) Verify suspicious requests:If you get an unexpected email asking for sensitive info, contact the sender directly through an official channel to confirm the request. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Kurts key takeawayScammers are taking phishing emails to a whole new level. I often recommend checking the email carefully when you receive anything suspicious to see if its legit. But now, since scammers can even access government emails, you need to be extra cautious. This phishing scam seems to target mostly big tech companies, so its on them to strengthen their security and verify every request thoroughly before sharing any user information. It's also up to governments worldwide to protect their digital assets from being compromised.Whats your stance on how governments are handling cybersecurity? Are they doing enough to protect sensitive data? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 162 Views
  • WWW.FOXNEWS.COM
    Prada's out-of-this-world spacesuit for NASA
    Published November 12, 2024 6:00am EST close 'CyberGuy': Prada's out-of-this-world spacesuit for NASA Kurt Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design. In an unexpected yet fascinating collaboration, Axiom Space has joined forces with the prestigious luxury Italian fashion house Prada to design the next-generation spacesuit for NASA's Artemis program. This partnership marks a significant shift in how spacesuits are conceived, merging high fashion with advanced engineering.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletterhere! AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)The need for new spacesuitsNASA has been using the same extravehicular activity suits since 1982, and there have been no new designs for lunar missions since the Apollo program ended in 1972. To address this gap, NASA awarded Axiom Space a contract worth $228 million in 2022 to develop a modern version of the Apollo suit, leading to the creation of theAxiom Extravehicular Mobility Unit (AxEMU) suit. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Blending fashion with functionAt first glance, involving a fashion designer in an engineering project may seem unusual. However, Axiom and Prada's collaboration highlights an innovative approach to spacesuit design. The AxEMU suit incorporates aesthetic considerations alongside functionality, reflecting a trend seen inprevious designs, such as those for SpaceX's Dragon astronauts. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Key features of the AxEMU SuitAdaptive fit: Unlike previous suits tailored for individual astronauts, the AxEMU is designed to fit 99% of both males and females, enhancing comfort and usability.Advanced materials: The suit features high-performance materials developed through Prada's expertise, ensuring durability against lunar conditions.Enhanced mobility: Innovative joint designs allow for a greater range of motion, enabling astronauts to perform tasks more effectively.Safety innovations: The AxEMU includes redundant systems and self-diagnostic capabilities to ensure astronaut safety during missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Unveiling at the International Astronautical CongressThe AxEMU was formally unveiled at the International Astronautical Congress in Milan. During this event, both Axiom Space and Prada emphasized their commitment to pushing boundaries in space exploration through collaborative efforts.Russell Ralston, executive vice president of extravehicular activity at Axiom Space, said,"We are pioneering a new era in space exploration where partnerships are imperative to the commercialization of space."Lorenzo Bertelli, Prada Group chief marketing officer, added,"Going beyond our limits is one of the companys values that perfectly reflects the spirit of the Prada brand." AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Testing and future prospectsThe AxEMU is currently undergoing extensive testing, including simulations designed to mimic lunar conditions. It is expected to enter its critical design review phase in 2025. This rigorous testing process aims to ensure that astronauts are equipped with reliable and advanced capabilities for future lunar missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWho would have thought that high fashion and space exploration could find common ground? Yet here we are, witnessing a luxury brand contribute its expertise to one of humanity's most ambitious endeavors. By combining Prada's knowledge of materials and craftsmanship with Axiom's engineering prowess, we're seeing a suit that promises to be more comfortable, more adaptable and more efficient than anything that's come before.Could we see more fashion houses getting involved in space tech? One thing's for sure: The AxEMU suit is a perfect example of what can happen when we think outside the box and bring diverse expertise together. As we continue to reach for the stars, it seems that the sky is no longer the limit, not even for fashion.How do you feel about the role of aesthetics in spacesuit design? Do you think looking good in space is just as important as functionality?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 153 Views
  • WWW.COMPUTERWEEKLY.COM
    Microsoft fixes 89 CVEs on penultimate Patch Tuesday of 2024
    Microsoft has issued fixes addressing a total of 89 new Common Vulnerabilities and Exposures (CVEs) 92 including third-party disclosures to mark the penultimate Patch Tuesday of 2024, including four critical issues and a number of flaws that could be considered zero-days.Of these issues, one meets the full traditional definition of a full zero-day, a vulnerability that is both public and known to be exploited. This is CVE-2024-43451, a spoofing vulnerability in New Technology LAN Manager (NTLM) Hash.NTLM is a set of security protocols used to authenticate users identities. It dates back years and has been largely supplanted by vastly more secure protocols Microsoft has not recommended its use in over a decade, but since it was used in Internet Explorer, it remains supported to some extent and continues to cause problems, not least because at this stage, it is incredibly insecure.In this instance, successful exploitation of this issue could lead to total loss of confidentiality, according to Microsoft, as it discloses a users NTLMv2 hash to an attacker who could then use it to authenticate as the user if the victim can be tricked into minimal interaction with a malicious file, which could include merely selecting or clicking it, not even opening it. This may make it considerably more dangerous than its comparatively low severity score may indicate.Mike Walters, president and co-founder of Action1, explained: This issue arises from the mechanism where NTLM authentication credentials, specifically NTLMv2 hashes, are improperly exposed via a maliciously crafted file.The root cause of this vulnerability lies in improperly handling file interactions within systems, potentially allowing attackers to extract NTLMv2 hashes without requiring complete file execution, he told Computer Weekly in emailed commentary.All supported versions of Microsoft Windows are vulnerable to this issue, said Walters, especially if they use applications reliant on MSHTML and EdgeHTML platforms, while risk is further increased across different system environments thanks to the involvement of other scripting engines.Walters said the main concern with CVE-2024-43451 is the disclosure of NTLMv2 hashes that can be used to authenticate as the user and leveraged in pass-the-hash attacks, enabling further lateral movement for a canny threat actor.This vulnerability is particularly effective in phishing scenarios, where users might be deceived into interacting with malicious files. Once NTLM hashes are obtained, attackers can combine them with other network vulnerabilities to extend their access and compromise additional systems, he said.Organisations that heavily use Windows in environments with substantial network file sharing or legacy applications dependent on Internet Explorer and related platforms face heightened risk. Those lacking robust user training and monitoring systems to detect unusual file interactions may be more susceptible to exploitation.Also on the list is CVE-2024-49309, which is exploited but not yet public. This is an elevation of privilege (EoP) vulnerability in Windows Task Scheduler.This stems from an issue where authentication tokens or credentials are improperly managed and could allow a low-privileged attacker to gain deeper access if they can execute a malicious application designed for the purpose. It impacts multiple versions of Windows that incorporate Task Scheduler as part of their routine task automation processes, and it is thought that environments with shared or multiple-user setups may be particularly vulnerable to it.This vulnerability serves as a potential entry point for attackers who have already accessed a system with low privilege. Once privileges are escalated, these attackers can utilise this foothold for further lateral movement within a network or to exploit other vulnerabilities that necessitate higher access levels, said Walters.The nature of this vulnerability is especially concerning in corporate settings where individual users possess specific task automation privileges that could be exploited to gain unauthorised access.Four further vulnerabilities have been made public but as of yet have seen no exploitation, according to Microsoft, and one of these, CVE-2024-5535, a remote code execution issue in OpenSSL, is among the three third-party disclosures incorporated into this months drop.The other three are CVE-2024-43498, a remote code execution (RCE) vulnerability in .NET and Visual Studio, CVE-2024-49019, an EoP vulnerability in Active Directory Certificate Services, and CVE-2024-49040, a spoofing vulnerability in Microsoft Exchange Server.Chris Goettl, vice president of security products at Ivanti, shared further thoughts on both the Active Directory and Microsoft Exchange Server issues, and urged defenders to treat them as higher priorities than the official guidance might imply.[CVE-2024-49019] is rated Important and has a CVSS v3.1 score of 7.8. If exploited, the attacker could gain domain administrator privileges. The vulnerability does provide additional mitigations including removing overly broad enrol or auto-enrol permissions, removing unused templates from certificate authorities, and securing templates that allow you to specify the subject in the request, said Goettl.The vulnerability affects Windows Server 2008 and later Server OS editions. From a risk-based perspective, a public disclosure puts this vulnerability at a higher risk of being exploited and may warrant treating the vulnerability as a higher severity.Goettl continued: [CVE-2024-49040] is rated Important and has a CVSS v3.1 score of 7.5. The vulnerability exists in the P2 From header verification. Microsoft Exchange Server is often targeted by threat actors who specialise in Exchange exploits. From a risk-based prioritisation perspective, the public disclosure and availably of PoC level exploit code warrants treating this vulnerability as Critical.Finally, three other Critical issues are listed as, CVE-2024-43625, an EoP vulnerability in Microsoft Windows VMSwitch; CVE-2024-43639, an RCE vulnerability in Windows Kerberos; and CVE-2024-49056, an EoP vulnerability in Airlift.microsoft.com. In each of these instances, no proof of concept has yet been made public and no exploitation in the wild has been observed.Read more about Patch TuesdayOctober 2024: Stand-out vulnerabilities in Microsofts latest Patch Tuesday drop include problems in Microsoft Management Console and the Windows MSHTML Platform.September 2024: Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilitieswill keep admins busy.August 2024: Microsoft patches six actively exploited zero-days among over 100 issuesduring its regular monthly update.July 2024: Microsoft has fixed almost 140 vulnerabilities in its latest monthly update, with a Hyper-V zero-daysingled out for urgent attention.June 2024: An RCE vulnerability in a Microsoft messaging feature and a third-party flaw in a DNS authentication protocol are the most pressing issues to address inMicrosofts latest Patch Tuesday update.May 2024: A critical SharePoint vulnerability warrants attention this month, but it is another flaw that seems to be linked to the infamous Qakbot malwarethat is drawing attention.April 2024: Support for the Windows Server 2008 OS ended in 2020, but four years on and there's a live exploit of a security flawthat impacts all Windows users.March 2024: Two critical vulnerabilities in Windows Hyper-V stand out onan otherwise unremarkable Patch Tuesday.February 2024: Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket,among more than 70 issues.January 2024: Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulnerabilities to be alert to, including a number ofman-in-the-middle attack vectors.
    0 Yorumlar 0 hisse senetleri 140 Views
  • WWW.COMPUTERWEEKLY.COM
    Zero-day exploits increasingly sought out by attackers
    Andreas Prott - stock.adobe.comNewsZero-day exploits increasingly sought out by attackersThreat actors increasingly favour zero-day exploits to attack their victims before patches become available according to the NCSC and CISA, which have just published a list of the most widely-used vulnerabilities of 2023ByAlex Scroxton,Security EditorPublished: 12 Nov 2024 16:49 Threat actors both state-backed and financially-motivated are increasingly taking advantage of previously unknown vulnerabilities, or zero-days, to compromise their victims before fixes or patches are made available by the tech industry, according to a new advisory published by the Five Eyes cyber agencies, including the UKs National Cyber Security Centre (NCSC) and the United States Cybersecurity and Infrastructure Security Agency (CISA).The agencies have collectively drawn up a list of the 15 most exploited vulnerabilities of 2023 and found that the majority of exploited vulnerabilities were zero-days compared to less than half in 2022. The trend has continued through 2024, said the NCSC.The NCSC said that defenders needed to up their game when it comes to vulnerability management, paying particular attention to applying updates as quickly as possible when they do arrive, and to making sure they have identified all the potentially affected IT assets in their estates.The organisation also urged suppliers and developers to do more to implement secure-by-design principles into their products, something that the Five Eyes governments Australia, Canada, New Zealand, the UK and the United States have become particularly vocal about in the past 18 months. Doing so helps reduce the risk of vulnerabilities being accidentally introduced during development, only to be taken advantage off further down the line.More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organisations and vendors alike as malicious actors seek to infiltrate networks, said NCSC chief technology officer (CTO) Ollie Whitehouse.To reduce the risk of compromise, it is vital all organisations stay on the front foot by applying patches promptly and insisting upon secure-by-design products in the technology marketplace, said Whitehouse.We urge network defenders to be vigilant with vulnerability management, have situational awareness in operations and call on product developers to make security a core component of product design and life-cycle to help stamp out this insidious game of whack-a-mole at source, he added.The full list of the vulnerabilities most frequently exploited during 2023 is as follows:CVE-2023-3519, a code injection flaw in Citrix NetScaler ADC and NetScaler Gateway;CVE-2023-4966, a buffer overflow vulnerability in Citrix NetScaler ADC and NetScaler Gateway, aka Citrix Bleed;CVE-2023-20198, an elevation of privilege (EoP) issue in Cisco IOS XE Web UI;CVE-2023-20273, a web UI command injection bug in Cisco IOS XE;CVE-2023-27997, a heap-based buffer overflow flaw in Fortinet FortiOS and FortiProxy SSL-VPN;CVE-2023-34362, a SQL injection vulnerability in Progress MOVEit Transfer, infamously exploited by the Cl0p ransomware gang, the fall-out from which is still being felt;CVE-2023-22515, a broken access control vuln it Atlassian Confluence Data Center and Server;CVE-2021-44228, a remote code execution (RCE) issue in Apache Log4j2, aka Log4Shell, the source of a major incident at the end of 2021 and still being widely-abused years later;CVE-2023-2868, an improper input validation flaw in Barracuda Networks ESG Appliance;CVE-2022-47966, an RCE issue in Zoho ManageEngine;CVE-2023-27350, an improper access control vulnerability in PaperCut MF/NG;CVE-2020-1472, an EoP vuln in Microsoft Netlogon, the source of another high-profile historic incident that there is now no excuse for not having addressed;CVE-2023-427983, an authentication bypass flaw in JetBrains TeamCity;CVE-2023-23397, an EoP issue in Microsoft Office Outlook, widely-used by Russian spooks;And last but not least, CVE-2023-49103, an information disclosure vuln in ownCloud graphapi.The full list, which can be downloaded from CISA, also contains details of a number of other issues that were observed being routinely exploited during 2023, prominent among them two vulnerabilities in Ivanti products disclosed in August 2023, and the infamous Fortra GoAnywhere flaw exploited, yet again, by the Cl0p gang.Read more about recent zero-daysQualcomm urges customers to patch the memory corruption vulnerability as Google researchers have observed targeted exploitation in the wild against the flaw.According to Fortinet, the FortiManager vulnerability 'may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.More than two weeks after threat actors exploited a zero-day vulnerability in a third-party utility to breach Rackspace, the details about the flaw and the utility remain unknown.In The Current Issue:Interview: Niall Robinson, head of product innovation, Met OfficeIAM: Enterprises face a long, hard road to improveDownload Current IssueHow enterprises can improve ROI on AI investments Data MattersHow To "Vawlt" Superclouds Networks GenerationView All Blogs
    0 Yorumlar 0 hisse senetleri 159 Views
  • WWW.ZDNET.COM
    Get 3 months of Xbox Game Pass Ultimate for 28% off right now
    Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.
    0 Yorumlar 0 hisse senetleri 131 Views
  • WWW.ZDNET.COM
    Grab a Microsoft Office 2019 license for Mac or Windows for $27
    This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 88% off.
    0 Yorumlar 0 hisse senetleri 128 Views
  • WWW.FORBES.COM
    Mainframes: The Backbone Of The Worldwide Economy
    Mainframes continue to be the backbone of the global economygettyMainframe computers are often perceived as relics of the past but in reality, they continue to be the backbone of the global economy. Critical data related to finance, government, and other sensitive transactions pass through these systems daily. Over 70 percent of Fortune 500 companies still rely on mainframes despite the rise of cloud computing. The key to their continued relevance is modernizationadapting these powerful systems to meet the needs and opportunities of todays technological landscape without losing the stability and security they provide.Why Mainframes Still MatterPeter Rutten is Research Vice President at International Data CorporationIDCMainframes have been around for over 60 years and remain the most reliable platform for handling massive amounts of data and transactions. As Peter Rutten, Research Vice President at IDC, explained, Mainframes were built for the highest possible performance and uptime, with the greatest security. In fact, theyre still used by industries like banking, airlines, and healthcare, where data integrity and continuous uptime are mission critical.These industries process billions of transactions daily, for which downtime is not an option.CEO of Rocket Software Milan Shetti echoes this sentiment, emphasizing that mainframes are "the backbone of the world economy because of their three major capabilities: security, governance, and very high performance." They are trusted for sensitive transactions such as wire transfers and insurance claims due to the degree of security and reliability that few other systems can match. The lack of headlines about mainframe failures or security breaches is a testament to their robustness, something Shetti proudly notes: Mainframe has done a really good job of staying out of the headlines for the wrong reasons.Yet, while mainframes are still trusted for mission-critical tasks, there is no denying the growing pressure to adapt to emerging technologies, such as cloud computing and artificial intelligence. This is where mainframe modernization comes into play.MORE FOR YOUThe Need for ModernizationMax de Groen, Partner at Bain CapitalJennifer Cimino PhotographyModernization is not about replacing mainframes but enhancing them to work seamlessly with modern technologies like cloud and AI. Max de Groen, Partner at Bain Capital, says, mainframe modernization is increasingly seen not as a necessary evil, but as an opportunity to leverage existing investments and integrate emerging technologies. Indeed, many enterprises are recognizing that modernization is essential to stay competitive, meet consumer demands, and manage costs effectively.The process, however, is not simple. A basic mainframe modernization project can take two years, while more complex ones can take five or more, explains Rutten. This timeline highlights the difficulty of integrating decades-old systems with newer, more flexible cloud environments.Shetti emphasizes that the goal is "modernization without disruption." Rocket Software, for instance, focuses on helping organizations modernize in placeupgrading their existing mainframe systems to work with new technologies without the need for a complete overhaul. He cites the example of a banks mobile application, which might be cloud-based but will still rely on the mainframe to access secure customer data.CEO of Rocket Software Milan ShettiRocket SoftwareThis hybrid approachconnecting the cloud to the mainframeis becoming the preferred method for many enterprises. "Youll never see end-to-end banking in the cloud," Shetti insists, explaining that cloud computing may be better for scaling applications and attracting developers, but the mainframe is preferred when handling sensitive data with the highest levels of security.The Role of AI in ModernizationAI is playing an increasingly important role in mainframe modernization. Rocket Software and other companies are using AI for "code explainability, which helps current engineers understand and modernize the vast amounts of legacy code that power mainframes today. This is crucial because many original developers who wrote this code have retired, leaving a knowledge gap that AI can help bridge.Shetti also envisions AI simplifying mainframe operations to the point where managing a mainframe could be as intuitive as operating an iPhone. This use of AI improves operational efficiency and helps attract new talent to an industry that has long been associated with complex, outdated technology.The Economic and Security ImpactsMainframe modernization has broader implications for the economy and security. Rutten points out that "70% of enterprise data still runs on mainframes," meaning that any failure or breach would have far-reaching consequences. This is why modernization is so criticalit allows enterprises to take advantage of cloud scalability and AI innovation while maintaining the security and reliability of their core systems.Moreover, de Groen highlights that modernization is about more than just keeping the lights on. Its about leveraging the power of datadata that resides on the mainframeto drive new business models, improve customer experiences, and stay competitive in a rapidly changing digital landscape.Mainframes may not be flashy, but they are indispensable. As Rutten wisely states, You dont move off the mainframe; you integrate with it. The future of enterprise IT lies in this integrationblending the unmatched security and reliability of mainframes with the flexibility and innovation of cloud computing and AI. For organizations that rely on these systems, modernization is not just an option; its necessary to remain competitive and secure in the digital age.Follow me on LinkedIn or check out my other columns here.
    0 Yorumlar 0 hisse senetleri 125 Views
  • TECHREPORT.COM
    Dawgz AI Bot Revolutionizes Automated Trading Presale Kicks Off Soon!
    KEY TAKEAWAYSThe new meme coin Dawgz AI ($DAGZ) introduces an AI trading bot with personalized recommendations.With strong utility, strategic token allocation, and a clear roadmap, $DAGZ has the potential for long-term success.Early birds can buy $DAGZ on presale at just $0.00177 starting November 16, 10:00 UTC.$DAGZ is a new ERC-20 token that merges the cultural appeal of memes with the technological potential of AI. Dawgz AIs algorithm analyzes market trends and executes trades 24/7, so your investment can generate returns even if youre not actively monitoring the market.We explore the fundamentals of Dawgz AI and explain how you can become one of the first adopters.How to Buy $DAGZ in 4 Easy StepsVisit the Dawgz AI official presale website.Use the widget to connect your wallet.Select your preferred crypto and enter the number of $DAGZ tokens you want to buy.Confirm the transaction. Visit Dawgz AI TodayThe Future of Meme Coins is AISoon launching a token presale, Dawgz AI is busy developing an AI-powered trading bot that will maximize profits and minimize risk. The algorithm would also provide insights and recommendations for informed trading decisions.$DAGZ will serve as the ecosystems governance token, allowing its holders to vote on development proposals and shape the projects future.To ensure transparency and security, SolidProof has rigorously audited the $DAGZ smart contract. This audit assures investors that the project is built on a solid foundation and adheres to industry best practices. But the real key to any meme coins success is investor sentiment. Dawgz AI aims to build an engaged, loyal online community where members can share memes, discuss market trends, and participate in various community-driven initiatives.$DAGZ Tokenomics and Roadmap$DAGZs tokenomics focuses on supporting early adopters and long-term holders. A significant portion of the total token supply (20%) is allocated to staking rewards, allowing holders to earn passive income. Another 24% is reserved for marketing efforts to drive $DAGZ adoption.Given a whopping 8,317% staking APY and discounted presale price ($0.00177), $DAGZ can potentially attract a massive investor base before its launch on exchanges.The projects long-term vision is ambitious yet achievable. After the presale, $DAGZ will expand to other blockchain networks and forge strategic partnerships to expand its reach.Continuous AI bot improvements and the launch of NFT collectibles should further enhance the projects appeal to potential investors and help $DAGZ become the leading doge-themed token.How to Buy $DAGZ on PresaleWith its strong fundamentals, $DAGZ could be the next 10x coin. This means early adopters may be up for the highest returns.If you want to be one of the alphas leading the Dawgz AI pack, heres how to buy $DAGZ on presale.Step 1: Visit the Dawgz AI WebsiteDont get caught off guard! Scammers sometimes create fake websites that mimic popular presales. Only use the official link to protect your funds.Step 2: Connect Your WalletClick on Connect Wallet and follow the on-screen instructions. You can use any crypto wallet that supports Ethereum, Solana, or BNB Chain networks.Step 3: Select Your Purchase MethodYou can buy $DAGZ with $ETH, $SOL, $BNB, $USDT, or $USDC. Select your preferred cryptocurrency and enter the number of tokens you want to exchange for $DAGZ.Once you confirm the transaction in your crypto wallet, youll need to wait until the presale concludes. After that, your $DAGZ tokens will be distributed to your wallet. Visit Dawgz AI TodayStep 4: Confirm the TransactionOnce you confirm the transaction in your crypto wallet, youll need to wait until the presale concludes. After that, your $DAGZ tokens will be distributed to your wallet. Visit Dawgz AI TodayIs $DAGZ the Next Alpha Dogecoin?$DAGZ offers a unique blend of meme culture and cutting-edge technology. Transparent tokenomics, high staking rewards, solid utility, and low price make it one of the best crypto presales in 2024.The $DAGZ presale kicks off on November 16 at 10:00 UTC. Dont miss this opportunity to secure $DAGZ tokens at a discounted price before they skyrocket!Add Techreport to Your Google News Feed Get the latest updates, trends, and insights delivered straight to your fingertips. Subscribe now! Subscribe now Lora is a writer based in Ireland. Her background in finance and interest in technology helps her present complex concepts in an intelligible and fun way, which is especially useful when it comes to the world of cryptocurrency and blockchain technology.Starting as an agency writer, she soon branched out to freelance and later launched a family-run digital marketing agency.In her spare time, Lora attends dance classes or immerses in reading, preferring technology news or postmodern literature. View all articles by Lora Pance Our editorial processThe Tech Reporteditorial policyis centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written byreal authors.
    0 Yorumlar 0 hisse senetleri 112 Views
  • TECHREPORT.COM
    Crypto Renaissance: How Trumps Policies Could Boost Bitcoin and Ethereum in the US
    QUICK TAKESThe Trump administration may ease crypto regulations on digital assets. The crypto ecosystem will likely thrive in this new environment.Record inflows into spot Ethereum exchange-traded funds ($ETH ETFs), totaling $295M, highlight strong investor interest in Ethereum.Appointing pro-crypto figures to key regulatory positions could bring clearer regulations. These, in turn, would foster innovation, reduce scams, and support decentralized projects.The US may be moving towards a more crypto-friendly approach under the Trump administration. The result? Potentially easing crypto regulations that have held back digital asset adoption in the US.Big players like venture capital firm Andreessen Horowitz (a16z) predict a bright future for crypto in the US under this lighter regulatory climate.This shift could be a game-changer for cryptocurrencies, with $ETH and Bitcoin ($BTC) experiencing huge gains after the November elections.At the same time, Ether ETFs are seeing record inflows and rising interest from investors.Lets have a closer look at how this policy change could impact the US crypto marketTrump Administration Signals a Softer Stance on CryptoNow that the campaigning is done and dusted, Trump can start on his pledge to make the US the crypto capital of the planet.This bold plan would likely mean appointing pro-crypto figures to key regulatory positions, including the SEC (Securities and Exchange Commission), which has been heavily criticized by the crypto community.Trumps advisors are said to be considering a mix of current and former regulators and financial experts with positive crypto stances.Names being floated for critical roles include Hester Peirce, an SEC commissioner known for advocating a more crypto-supportive approach. He could become interim SEC chair if Trump follows through on his promise to fire the current chair, Gary Gensler, on day one.Additionally, Mark Uyeda, an SEC commissioner critical of current enforcement practices, is seen as another strong candidate for the top spot.Paul Atkins, a former SEC commissioner, and Chris Giancarlo, former CFTC chair, are also under consideration.A16z Sees Bright Horizon for Crypto BuildersAccording to major Silicon investor a16z, the new environment might finally allow crypto developers to build solutions that empower individuals. Use cases include decentralized digital identity, low-cost international transactions, and new revenue channels for creators.In a16zs recent memo, A Positive Path Forward, the companys policy team shares its opinions on cryptos future. The team suggests that as the industry moves toward clearer regulations, developers will have more confidence and freedom to use tokens and blockchain tools responsibly.This clearer framework could potentially help weed out fraudulent projects, as rules would make it easier to identify them while also fostering community-driven projectsEthereum ETFs: a Sign of Growing DemandIn related news, spot $ETH ETFs, which launched in July, recorded their biggest day of inflows in history. On November 11, they saw nearly $295M in inflows a massive leap from the previous record of $106.6M set on launch day.CK Zheng, founder at ZX Squared Capital, sees this as a sign of Ethereums potential under a government that supports blockchain innovation.$ETH and $SOL will perform well in the next few months if the new Trump administration actively promotes blockchain technology and speed up the digitalization in the financial industry. CK ZhengThis demand also reflects the growing interest in Ethereum-based applications. This is especially true in areas like decentralized finance and non-fungible tokens, which continue to bring in more users.A16z echoes Zhengs view, suggesting that decentralization is the way forward. The team goes so far as to encourage stakeholders to do away with centralized aspects and dependencies on trust.A New Era for US Crypto?A more relaxed government stance and the resultant crypto bull run could bring exciting times for the US crypto sector.With more regulatory clarity, innovation and user adoption may flourish in the years ahead, bringing mainstream crypto use closer than ever.Trumps promise to become the first crypto president could mean new users, more innovation, and a more stable environment for the industry to thrive.ReferencesA positive path forward by a16z (a16z website)The Washington Post on Trumps pro-crypto candidates for key federal financial agencies (The Washington Post website)Daily Ethereum Spot ETF Net Inflow by Coinglass (Coinglass website)Ethereum is starting to catch a bid by Cointelegraph (Cointelegraph news)Add Techreport to Your Google News Feed Get the latest updates, trends, and insights delivered straight to your fingertips. Subscribe now! Subscribe now Anya Zhukova is a tech and crypto writer with 8+ years of experience creating practical, easy-to-understand content for top publications like MakeUseOf, Online Tech Tips, Help Desk Geek, Switching to Mac, and Make Tech Easier.An advocate for financial freedom, Anya covers the latest in cryptocurrency, tech trends, and product reviews to keep readers informed and empowered.Through her work with brands like Framework, Insta360, Redmagic, Inmotion, Secretlab, Kodak, and Anker, she brings a hands-on perspective to her reviews, helping people get the most out of new tech. View all articles by Anya Zhukova Our editorial processThe Tech Reporteditorial policyis centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written byreal authors.
    0 Yorumlar 0 hisse senetleri 134 Views
  • WWW.TECHSPOT.COM
    23andMe to lay off 40% of staff in desperate restructuring effort
    In a nutshell: Genetics company 23andMe has had a brutal 2024. The tech economy has not generally been good, but the firm also suffered a data leak. It then blamed its customers for the breach, followed swiftly by accusations to the FTC of running an auto-renewal scam. To avoid bankruptcy, the company is restructuring, laying off half its employees. Home genetics company 23andMe continues to struggle as demand for casual gene tracing declines. On Monday, the company announced that it has decided on a restructuring plan to help reduce expenses. A significant part of the downsizing is eliminating around 200 positions, about 40 percent of 23andMe's workforce. The company estimates that the employment reduction will save more than $35 million per year while only costing it a one-time operating expense of $12 million for severance packages and related costs."We are taking these difficult but necessary actions as we restructure 23andMe and focus on the long-term success of our core consumer business..." said 23andMe CEO Anne Wojcicki. "We are fully committed to supporting the employees impacted by this transition."Layoffs will begin with employees working in departments that 23andMe plans to phase out. The company's restructuring plan includes discontinuing its therapeutics division. This department was conducting research into cancer treatments and monoclonal therapies. While it is closing in-house therapeutics testing and research, Wojcicki said 23andMe intends to continue its work in these areas using "strategic partnerships.""We continue to believe in the promise shown by our clinical and preclinical stage pipeline and will continue to pursue strategic opportunities to continue their development," Wojcicki said.Impacted employees in these divisions still have a little time, as 23andMe indicated that it is not immediately shuttering the labs. However, it is winding down clinical testing "as quickly as practical." The company did not mention details on its potential research partners. // Related StoriesThe struggles that 23andMe is facing are not all that surprising. Home genetic testing is a one-and-done affair. Once you have your genetic profile, it is unnecessary to pay for it again. It's not a very sustainable business model out of the gate, and it's surprising to learn that this is the part of the business the company chose to keep.Contributing to its troubles, 23andMe suffered a data breach earlier this year that exposed a small percentage of its customer base. The leak was relatively minor, resulting in only about 14,000 impacted accounts. However, instead of taking responsibility, the company blamed its customers, saying that the breach occurred because of "recycled credentials" that hackers obtained in an unrelated incident. It also admitted later that it had neglected to notice that the intruders were siphoning data for over five months.More recently, 23andMe had trouble with the FTC after customers complained that its subscription service was a scam. In March, at least 133 customers said the company auto-renewed their subscriptions without consent and would not issue refunds. Gizmodo noted that in some instances, users said they had physically canceled their membership before the end of their subscription, but 23andMe charged them as if the cancellation hadn't happened.
    0 Yorumlar 0 hisse senetleri 154 Views