Fri.Feb 21, 2025

article thumbnail

If COBOL is so problematic, why does the US government still use it?

Collaboration 2.0

If you've gotten cash from an ATM, you've interacted with a COBOL-based system. Here's why this old programming language will probably outlive us all.

article thumbnail

DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online

WIRED Threat Level

The cybersecurity lead for VA.gov was fired last week. He tells WIRED that the Veterans Affairs digital hub will be more vulnerable without someone in his role.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Pixel phone tricks every user should know - including my favorite

Collaboration 2.0

Pixel Call Assist doesn't just help block spam anymore. Google's added calling features to please everyone - even if you hate talking on the phone.

329
329
article thumbnail

The US Is Considering a TP-Link Router Ban—Should You Worry?

WIRED Threat Level

Several government departments are investigating TP-Link routers over Chinese cyberattack fears, but the company denies links.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Download your Kindle books right now - Amazon is killing this option in a few days

Collaboration 2.0

The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Will this change how you buy and store digital books? Read on to find out.

317
317

More Trending

article thumbnail

Tech pioneer who accelerated internet speeds receives prestigious IEEE Medal

Collaboration 2.0

Henry Samueli, co-founder of chip giant Broadcom, describes the current pace of disruption as unprecedented, a period that is 'exciting, but also scary.

274
274
article thumbnail

Google Integrates Quantum-Safe Digital Signatures

Data Breach Today

Computing Giant Warns Against Future Decryption of Secure Communications Google adopted quantum-safe digital signatures for its cloud environment designed to help users combat the next phase of adversarial attacks. The announcement from the company comes days after Microsoft unveiled its latest quantum chip. NIST formalized the algorithms in August 2024.

article thumbnail

Car owners are bullish on AI agents repairing the US auto industry - here's why

Collaboration 2.0

New research reveals that US car owners see agentic AI as a potential game-changer in the car buying and ownership experience.

253
253
article thumbnail

Leaked Black Basta Chat Logs Show Banality of Ransomware

Data Breach Today

'He Is an Idiot,' Dissatisfied Hacker Writes of Boss Two hundred thousand internal chat messages from the Russian ransomware group Black Basta have been leaked online, supposedly in reprisal for the operation targeting Russian banks. The partial logs, spanning 13 months, detail negotiations with victims, ransoms paid, internal disagreements and more.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Grok 3 AI is now free to all X users – here's how it works

Collaboration 2.0

But X Premium+ and SuperGrok users get increased access to Grok 3 as well as early access to advanced features like Voice Mode.

IT 250
article thumbnail

MDR, EDR Markets See Wave of M&A as Competition Intensifies

Data Breach Today

Vendors Consolidate Endpoint, Managed Offerings to Combat Major Industry Players Rising competition from CrowdStrike and Microsoft is driving MDR and EDR providers to consolidate. Companies such as Sophos and Arctic Wolf are acquiring endpoint or managing security technology to enhance detection and response capabilities, signaling a shift toward full-stack security solutions.

Marketing 130
article thumbnail

The most critical job skill you need to thrive in the AI revolution

Collaboration 2.0

I have 78 million reasons why your career depends on what you do today. Here is everything you need to know.

249
249
article thumbnail

Change Healthcare's Mega Attack: 1 Year Later

Data Breach Today

Ransomware Attack Taught Lessons on Health Sector Resiliency, Vendor Redundancy It's been one year since hackers attacked IT services provider Change Healthcare, quickly shutting down critical processes for thousands healthcare entities, triggering a data breach affecting 190 million people. So what top lessons are emerging from that massive disruption and data compromise?

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Searching for your dream job? Google's new career AI tool can help - and it's free

Collaboration 2.0

The 'Career Dreamer' AI experiment is easy, free, and, dare I say, fun to use. Here's how to get started.

IT 246
article thumbnail

Apple Withdraws Strong Encryption Feature for All UK Users

Data Breach Today

US Technology Giant Reportedly Received UK Government Demand for Global Backdoor Amidst the ever-rising tide of cyberattacks and data breaches, Apple is deactivating a key data security feature for all U.K. users, rather than accede to a reported demand from the British government that the technology giant give it on-demand backdoor access to any user's data in the world.

article thumbnail

I tested Huawei's $3,600 tri-foldable, and it made me question why tablets still exist

Collaboration 2.0

The Huawei Mate XT Ultimate challenges the notion that tri-fold phones are just a novelty - showcasing their potential as the next evolution in mobile computing.

IT 242
article thumbnail

Phishing Attacks Increased by Nearly 200% in H2 2024

KnowBe4

Phishing and malicious emails remained the primary vectors of infection during the second half of 2024, according to a new report from Acronis.

Phishing 109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Finally, a Windows 11 tablet I'd recommend to both business and professional users

Collaboration 2.0

From brutal drops to icy cold and muddy messes, this rugged tablet shrugs off the elements and keeps going strong.

228
228
article thumbnail

Phishing Kit Abuses Open Graph to Target Social Media Users

KnowBe4

Researchers at Cyble warn that a phishing kit is abusing the Open Graph (OG) protocol to target social media users.

article thumbnail

Windows Notepad and Paint are still free - but the AI will cost you. Here's how much

Collaboration 2.0

Each use of AI in Notepad and Paint in Windows 11 chews up a credit from a Microsoft 365 subscription.

223
223
article thumbnail

Highlights from NRF 2025

Jamf

Discover how Jamf and its partners are transforming retail with innovative solutions for customer experience, employee efficiency, and security from NRF 2025

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

This is the cheapest Android tablet I've ever tested - and it's surprisingly capable

Collaboration 2.0

Blackview's Tab 90 is on sale for just $110, but the 11-inch display looks like a much more expensive device.

Sales 221
article thumbnail

Friday Squid Blogging: New Squid Fossil

Schneier on Security

A 450-million-year-old squid fossil was dug up in upstate New York. Blog moderation policy.

73
article thumbnail

Want to fight misinformation on Facebook? Join the Meta Community Notes editor waitlist

Collaboration 2.0

Want to help curb misinformation on social media? Here's your chance.

214
214
article thumbnail

Atlassian fixed critical flaws in Confluence and Crowd

Security Affairs

Australian software firm Atlassian patched 12 critical and high-severity flaws in Bamboo, Bitbucket, Confluence, Crowd, and Jira. Software firm Atlassian released security patches to address 12 critical- and high-severity vulnerabilities in Bamboo, Bitbucket, Confluence, Crowd, and Jira products. The most severe vulnerabilities addressed by the company are: CVE-2024-50379 – (CVSS score of 9.8) – RCE (Remote Code Execution) org.apache.tomcat:tomcat-catalina Dependency in Confluence Da

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft's quantum chip Majarona 1 is a few qubits short

Collaboration 2.0

There isn't yet a roadmap to show Microsoft can scale its chip to the million topological qubits required to make a working quantum computer.

IT 211
article thumbnail

U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Craft CMS and Palo Alto Networks PAN-OS vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SonicWall SonicOS and Palo Alto PAN-OS vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The two vulnerabilities are: CVE-2025-23209 Craft CMS Code Injection Vulnerability CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerability Cra

CMS 193
article thumbnail

5 products Apple silently scrapped while unveiling the iPhone 16e this week

Collaboration 2.0

The latest iPhone seems like a solid entry-level option for consumers, but its launch also marked the end of these products and services.

IT 209