Latest Technology News

Ubuntu Linux 24.04 now optimized for Milk-V Mars RISC-V single board computer

Canonical has officially released the optimized Ubuntu 24.04 image (available here) for the Milk-V Mars, a credit-card-sized RISC-V single board computer (SBC) developed by Shenzhen MilkV Technology Co., Ltd.

The Milk-V Mars is the world’s first high-performance RISC-V SBC of its size. Powered by the StarFive JH7110 quad-core processor, the board is equipped with up to 8GB of LPDDR4 memory and supports various modern interfaces, including USB 3.0, HDMI 2.0 for 4K output, and Ethernet with PoE capabilities. It also offers comprehensive expansion options with M.2 E-Key and extensive MIPI CSI channels, making it an ideal choice for developers and tech enthusiasts.

Continue reading

Sabrent USB-C Enclosure for M.2 2230 PCIe NVMe SSDs simplifies upgrading Steam Deck, ASUS ROG Ally, Surface Pro 9, and more

Sabrent’s USB-C Enclosure for M.2 2230 PCIe NVMe SSDs (EC-NE30) offers a straightforward solution for handling your compact drives. Whether you need to prep an M.2 2230 SSD for your Steam Deck, ASUS ROG Ally, Surface Pro 9, or other portable gadgets, this enclosure has you covered.

How does it work? Simply insert the SSD, secure it with the latch, and connect via USB-C. This versatile enclosure is compatible with all major operating systems, including Windows, macOS, and Linux-based options, ensuring hassle-free setup with its integrated cable and plug-and-play functionality—no drivers needed.

Continue reading

Montech HyperFlow ARGB AIO water cooler offers affordable CPU cooling

Montech has launched its first all-in-one (AIO) CPU water cooler, the HyperFlow ARGB. This AIO features a gemstones-inspired pump block and is equipped with a 3100 RPM pump, an aluminum radiator, and 120mm Metal Pro 12 fans, providing cooling performance for both Intel and AMD CPUs. The HyperFlow ARGB includes pre-installed fans, thermal paste, and a pre-connected 7-pin short cable for simplified installation and cable management.

The HyperFlow water pump is designed to keep systems cool under heavy loads, operating at a maximum speed of 3100 RPM. Its exterior is inspired by gemstones, adding a touch of elegance to setups. The pump is 53mm in height and operates at a noise level of 28 dB(A). The aluminum radiator, at 27mm thick, features a single-row fin design with 20 fins per inch (FPI), optimizing cooling power and reducing airflow resistance. This slim profile makes it suitable for compact setups.

Continue reading

Detectify launches new features for control over attack surfaces

Attack surfaces keep expanding, making it increasingly challenging for organizations to obtain and make sense of the most relevant insights from their attack surface data.

Attack surface management platform Detectify says its users see an average of 300 breaches per set policy, with over 70 percent of active policies focusing on spotting risky open ports.

Continue reading

Why software support AI chatbots should supplement, not supplant, human experts [Q&A]

Many enterprises have begun to rely more heavily on chatbots to provide software support, and this often means customers find it hard to get in contact with an experienced, human engineer when they encounter an issue that they need help resolving.

While this might save costs in the short term, it can seriously damage the company’s brand in the long term. We talked to Craig Mackereth, EVP, global service delivery at Rimini Street to find out about the overuse of AI chatbots for enterprise software support and ways that vendors could use generative AI to actually improve the customer experience.

Continue reading

Microsoft releases Windows 11 IoT Enterprise LTSC 2024 with lower system requirements and optional TPM

Windows 11 keyboard

The hardware requirements for Windows 11 have been controversial from day one, and the release of Windows 11 IoT Enterprise LTSC 2024 sees Microsoft easing up on things slightly.

The latest version of the Long-Term Servicing Channel edition of Windows 11 is notable for various reasons, not least of which is the lowering of system requirements. Interestingly, the includes making both Secure Boot and TPM optional; the minimum system requirements also indicate that the operating system can be installed on devices with as little as 2GB of RAM.

Continue reading

Six steps to safeguarding your digital identity

We lose a bit of our digital privacy with every data breach that occurs. A breach like the one at AT&T -- which exposed Social Security numbers and other personal information needed for identity theft -- is particularly serious in the landscape of data breaches. The percentage of users with Social Security numbers exposed in our data bases following the AT&T breach increased from less than 1 percent to almost 15 percent. Sensitive personal information getting out -- especially when it's easily accessible on the public internet, not just the dark web, which requires special software to be accessed -- opens you up to a huge risk of abuse.

The most notable threat users face is the potential for identity theft, where malicious actors access email, bank, and credit card accounts to impersonate victims. This can also include gaining unauthorized access to accounts by resetting passwords and even taking control of your phone number to bypass text message confirmations. What’s more, if a thief has access to your personal details, they might go as far as taking out loans or credit cards in your name -- a tactic that remains one of the most common types of identity theft.

Continue reading

Microsoft is cleaving vestiges of the past from Windows 11 24H2

Waving goodbye

A new version of Windows, or a new update, means fixes, changes and new additions. But it can also be a time to say goodbye to features, apps and settings that are no longer needed.

With the widespread release of Windows 11 24H2 now imminent, users should prepare themselves to bid adieu to some components of the operating system that have been around for years.

Continue reading

Why a zero trust approach is essential to mitigate the threat of unsecured APIs 

With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, combined with the ongoing drive to modernize and transform IT operations, the attack surface of every organization has -- and continues to -- expand.  

Traditional boundaries have been blurred between businesses, suppliers, partners, customers, workers, and even home-life, with this ecosystem continuing to grow. Here, APIs are providing the connective tissue for modern applications and legacy infrastructure to co-exist.  

Continue reading

Artificial Intelligence: What are 4 major cyber threats for 2024?


AI is one of the most powerful innovations of the decade, if not the most powerful. Yet with that power also comes the risk of abuse.

Whenever any new, disruptive technology is introduced to society, if there is a way for it to be abused for the nefarious gain of others, wrongdoers will find it. Thus, the threat of AI is not inherent to the technology itself, but rather an unintended consequence of bad actors using it for purposes that wreak havoc and cause harm. If we do not do something about these cyber threats posed by the misuse of AI, the legitimate, beneficial uses of the technology will be undermined.

Continue reading


In a brief but surprising announcement on, it was revealed that ICQ, one of the pioneers of instant messaging, will be shutting down next month. This news comes as a shock to the many users who have relied on the service for decades. The announcement on ICQ's official website was concise, stating simply that the service would stop working on June 26, 2024.

ICQ, which stands for "I Seek You," was launched in 1996 and quickly became a staple of online communication. It introduced millions to the concept of instant messaging, long before the advent of social media and modern messaging apps. Over the years, ICQ evolved to keep up with technological advancements, but its core functionality remained the same: connecting people in real-time.

Continue reading

Switch from Windows 11 to Linux this Memorial Day with Ultramarine 40

As Memorial Day weekend approaches, many people might be considering a fresh start with their tech. For those looking to switch to Linux, Ultramarine 40 (available here) offers a compelling option. With its new features and improvements, this release could be the perfect way to dive into the world of Linux during the long weekend.

Ultramarine 40 introduces a new codename scheme, aiming to bring a fresh and engaging approach to its releases. The core team will rotate the responsibility of choosing codenames. This release, named after "Lost Umbrella" by inabakumori, marks the first under this new system.

Continue reading

Seven crucial dos and don'ts for cyber-attack survival

endpoint protection

Think you’ve been hit by a cyber-attack? You need to move fast, but what immediate actions should you take, or should you not take?  Here’s a Cyber Incident Responder’s guide to steer you through the turmoil. The actions your team takes -- or doesn’t take -- can greatly impact the overall duration of recovery, cost, and the potential to uncover vital evidence left by threat actors within your infrastructure.

Identifying a cyber security incident can be challenging. Many threat actors have mastered the art of quietly infiltrating IT systems and hiding their digital footprints. Not all cyber-attacks are as overt as encryption-based ransomware or mandate fraud. The rise of encryption-less ransomware and corporate and state-level espionage is concerning. These silent intruders can lead to data and intellectual property (IP) loss, diminished competitive edge or market share, potential regulatory fines, and reputational damage.  All of which can be just as devastating, if not more so, to an organization, its employees, and investors, than a single ransomware incident.

Continue reading

Move over Google, LLMs are taking over!

When Google was founded in 1998, it ushered in a new era of access to information. The groundbreaking search engine wasn’t the first to debut (that was World Wide Web Wanderer in 1993), but it was the one that caught on. By 2004, Google was fielding over 200 million searches per day; by 2011, that number had exploded to about three billion daily searches. By that time, the word “Google” had morphed from just the name of the search engine to a verb that meant “to use an internet search engine.” Twenty years later, Google still dominates the market with an almost 84 percent share as of late 2023.

Though Google is still the most popular search engine, new technology has emerged that could threaten its supremacy -- LLMs. The use of this technology is growing at an astonishing rate. In fact, in February 2024, ChatGPT generated over 1.6 billion visits.

Continue reading

Top priorities for digital transformation strategy implementation

digital transformation

A digital transformation strategy requires a focus on its business value and ability to support key company initiatives. These initiatives are often tied to transformative changes in the business that are connected to customer experience, operational efficiency, and productivity gains. Too often, digital transformation projects are technology driven and lack understanding of business objectives, and do not engage the right stakeholders or clearly detail the needed business / technology roadmap for strategy implementation over a multi-year period. 

There are several key actions that should take priority when implementing a digital transformation strategy. These are: 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.