ESET named as the only Challenger in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms for a second year running!

We believe this positioning further validates our ability to provide an easy-to-use, comprehensive and consistent endpoint protection product and is reflective of our increasing market share in all crucial segments – from Enterprise, SMB to Consumer.

We’ve prided ourselves on our high detection and small footprint, quality of customer service offering and believe this placement in the Gartner Magic Quadrant highlights our dedication to the highest possible service for all ESET clients.

Is Angola Africa’s next tech superstar?

Recent tech activity in Angola could be a sign of more to come, but the jury is out on whether ‘rising giant’ status applies.
Angola’s ICT sector and telecommunications industry have made headlines of late, inspired by João Lourenço-led government talk of licensing a new telco to bolster domestic competition. This is in addition to the country’s prominence as a landing site for fibre-optic cable networks and launch-pad for relevant projects. But is it premature to describe the market as a ‘rising giant’?

Read more Source: http://www.brainstormmag.co.za/verticals/14387-is-angola-africa-s-next-tech-superstar

New Android Malware for Banking Apps steal passwords by recording screens

With people’s security consciousness skewed towards the personal computer, cybercriminals are now turning to Android malware for financial fraud. Last year, Anubis banking trojan made headlines after getting onto Android devices through infected downloads from the Google Play Store. The banking apps malware would request for permission to use the accessibility service of the victim’s Android device, from which it would steal banking apps login credentials, payment cards, and e-wallets. Anubis was enabled by a “dropper,” BianLian that can sneak into the Play Store and plant malicious apps.

Read more Source: https://www.technowize.com/new-android-malware-for-banking-apps-steal-passwords-by-recording-screens/

Lenovo warns of price hikes to absorb U.S. tariffs, shares slide

(Reuters) – China’s Lenovo Group, the world’s largest PC maker, warned it will have to raise product prices if U.S. tariffs increase, sending its shares tumbling 6.5% to two-month lows.

Lenovo’s warning amid mounting business uncertainty due to the U.S.-China trade war cast doubt on its sales outlook and took the shine off forecast-beating quarterly results where robust PC sales helped the company more than double its profit.

Read more Source: https://www.reuters.com/article/us-lenovo-results/lenovo-warns-of-price-hikes-to-absorb-u-s-tariffs-shares-slide-idUSKCN1V42E6

Method to automatically estimate rooftop solar potential

The progress of rooftop solar installations is often slowed by a shortage of trained professionals who must use expensive tools to conduct labor-intensive structure assessments one by one, say scientists. Now researchers are proposing a new, data-driven approach that uses machine learning techniques and widely available satellite images to identify roofs that have the most potential to produce cost-effective solar power.

Read more Source: https://www.sciencedaily.com/releases/2019/08/190807190815.htm

Data Analytics and Big Data – What does it mean for me?

Few people can dispute that the amount of data that is generated and disseminated on any given day is increasing daily, with no slowing down in sight. According to business intelligence company, Bernard Marr & Co, every two days the population creates as much data as was recorded from the beginning of time until the year 2000.

With this continuing increase in data creation, the question remains – where does this data come from? Could this be what is referred to as Big Data? Where does all this data end up going and what purpose does it serve?

Read more Source: https://www.itnewsafrica.com/2018/06/data-analytics-and-big-data-what-does-it-mean-for-me/

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.

Read more Source: https://www.itworld.com/article/3431665/more-critical-remote-desktop-flaws-expose-windows-systems-to-hacking.html

What the heck is blockchain?

What is blockchain? Blockchain is a network of computers that polices itself, so people or businesses can cooperate without fear that somebody is tampering with the data. Today most data is sealed up at a central organization, like a bank or the Department of Motor Vehicles.

Source: https://www.cnet.com/videos/what-the-heck-is-blockchain/

When Technology Makes Life Harder

The latest Windows 10 update from Microsoft hasn’t gone smoothly for many users due to a conflict with an outdated driver for Intel’s Rapid Storage Technology. This is somewhat ironic in that RST was designed to improve the performance of storage hardware. Certain versions have slowed the install process, and in some cases the program actually has made installation of the Version 1903 Windows 10 update impossible.

Some users have been able to download a later version of RST and get the update to work, but for many others even that won’t solve the problem. For now the best course of action may be simply to wait and hope the two companies can resolve the conflict.

Read more Source: https://www.technewsworld.com/story/When-Technology-Makes-Life-Harder-86175.html

The top five security threats in cloud computing

Data breaches are at the top of the list of security threats in the cloud, according to a new report released by Cloud Security Alliance.
For the “Top Threats to Cloud Computing: Egregious Eleven” report, 241 industry experts were interviewed and rated 11 salient threats, risks and vulnerabilities in their cloud environments in order of significance.
This is the fourth instalment of the report, which states that data breaches; misconfiguration and inadequate change control; lack of cloud security architecture and strategy; insufficient identity, credential, access and key management; and account hijacking are the top five threats in cloud computing.
Many cloud security issues that featured in the previous “Treacherous 12” report dropped off the list. These include denial-of-service, shared technology vulnerabilities and data loss.

Rad more Source: https://itweb.co.za/content/PmxVEMKX9glqQY85