Latest Technology News

Six steps to safeguarding your digital identity

We lose a bit of our digital privacy with every data breach that occurs. A breach like the one at AT&T -- which exposed Social Security numbers and other personal information needed for identity theft -- is particularly serious in the landscape of data breaches. The percentage of users with Social Security numbers exposed in our data bases following the AT&T breach increased from less than 1 percent to almost 15 percent. Sensitive personal information getting out -- especially when it's easily accessible on the public internet, not just the dark web, which requires special software to be accessed -- opens you up to a huge risk of abuse.

The most notable threat users face is the potential for identity theft, where malicious actors access email, bank, and credit card accounts to impersonate victims. This can also include gaining unauthorized access to accounts by resetting passwords and even taking control of your phone number to bypass text message confirmations. What’s more, if a thief has access to your personal details, they might go as far as taking out loans or credit cards in your name -- a tactic that remains one of the most common types of identity theft.

Continue reading

Microsoft is cleaving vestiges of the past from Windows 11 24H2

Waving goodbye

A new version of Windows, or a new update, means fixes, changes and new additions. But it can also be a time to say goodbye to features, apps and settings that are no longer needed.

With the widespread release of Windows 11 24H2 now imminent, users should prepare themselves to bid adieu to some components of the operating system that have been around for years.

Continue reading

Why a zero trust approach is essential to mitigate the threat of unsecured APIs 

With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, combined with the ongoing drive to modernize and transform IT operations, the attack surface of every organization has -- and continues to -- expand.  

Traditional boundaries have been blurred between businesses, suppliers, partners, customers, workers, and even home-life, with this ecosystem continuing to grow. Here, APIs are providing the connective tissue for modern applications and legacy infrastructure to co-exist.  

Continue reading

Artificial Intelligence: What are 4 major cyber threats for 2024?

Artificial-Intelligence-threat

AI is one of the most powerful innovations of the decade, if not the most powerful. Yet with that power also comes the risk of abuse.

Whenever any new, disruptive technology is introduced to society, if there is a way for it to be abused for the nefarious gain of others, wrongdoers will find it. Thus, the threat of AI is not inherent to the technology itself, but rather an unintended consequence of bad actors using it for purposes that wreak havoc and cause harm. If we do not do something about these cyber threats posed by the misuse of AI, the legitimate, beneficial uses of the technology will be undermined.

Continue reading

RIP ICQ

In a brief but surprising announcement on icq.com, it was revealed that ICQ, one of the pioneers of instant messaging, will be shutting down next month. This news comes as a shock to the many users who have relied on the service for decades. The announcement on ICQ's official website was concise, stating simply that the service would stop working on June 26, 2024.

ICQ, which stands for "I Seek You," was launched in 1996 and quickly became a staple of online communication. It introduced millions to the concept of instant messaging, long before the advent of social media and modern messaging apps. Over the years, ICQ evolved to keep up with technological advancements, but its core functionality remained the same: connecting people in real-time.

Continue reading

Switch from Windows 11 to Linux this Memorial Day with Ultramarine 40

As Memorial Day weekend approaches, many people might be considering a fresh start with their tech. For those looking to switch to Linux, Ultramarine 40 (available here) offers a compelling option. With its new features and improvements, this release could be the perfect way to dive into the world of Linux during the long weekend.

Ultramarine 40 introduces a new codename scheme, aiming to bring a fresh and engaging approach to its releases. The core team will rotate the responsibility of choosing codenames. This release, named after "Lost Umbrella" by inabakumori, marks the first under this new system.

Continue reading

Seven crucial dos and don'ts for cyber-attack survival

endpoint protection

Think you’ve been hit by a cyber-attack? You need to move fast, but what immediate actions should you take, or should you not take?  Here’s a Cyber Incident Responder’s guide to steer you through the turmoil. The actions your team takes -- or doesn’t take -- can greatly impact the overall duration of recovery, cost, and the potential to uncover vital evidence left by threat actors within your infrastructure.

Identifying a cyber security incident can be challenging. Many threat actors have mastered the art of quietly infiltrating IT systems and hiding their digital footprints. Not all cyber-attacks are as overt as encryption-based ransomware or mandate fraud. The rise of encryption-less ransomware and corporate and state-level espionage is concerning. These silent intruders can lead to data and intellectual property (IP) loss, diminished competitive edge or market share, potential regulatory fines, and reputational damage.  All of which can be just as devastating, if not more so, to an organization, its employees, and investors, than a single ransomware incident.

Continue reading

Move over Google, LLMs are taking over!

When Google was founded in 1998, it ushered in a new era of access to information. The groundbreaking search engine wasn’t the first to debut (that was World Wide Web Wanderer in 1993), but it was the one that caught on. By 2004, Google was fielding over 200 million searches per day; by 2011, that number had exploded to about three billion daily searches. By that time, the word “Google” had morphed from just the name of the search engine to a verb that meant “to use an internet search engine.” Twenty years later, Google still dominates the market with an almost 84 percent share as of late 2023.

Though Google is still the most popular search engine, new technology has emerged that could threaten its supremacy -- LLMs. The use of this technology is growing at an astonishing rate. In fact, in February 2024, ChatGPT generated over 1.6 billion visits.

Continue reading

Top priorities for digital transformation strategy implementation

digital transformation

A digital transformation strategy requires a focus on its business value and ability to support key company initiatives. These initiatives are often tied to transformative changes in the business that are connected to customer experience, operational efficiency, and productivity gains. Too often, digital transformation projects are technology driven and lack understanding of business objectives, and do not engage the right stakeholders or clearly detail the needed business / technology roadmap for strategy implementation over a multi-year period. 

There are several key actions that should take priority when implementing a digital transformation strategy. These are: 

Continue reading

G.SKILL's glitzy Trident Z5 Royal DDR5 memory would make even Donald Trump blush

G.SKILL has unveiled the Trident Z5 Royal series DDR5 memory—a line so opulent it could adorn Trump Tower. With its gold or silver mirrored-finish heatspreaders and dazzling crystalline light bar, this gaudy yet powerful RAM is designed for those who want their PCs to sparkle with luxury.

Trident Z5 Royal marks the return of the popular luxury-class design to the new generation of DDR5 memory under the Trident Z5 design, inheriting from its DDR4 predecessor the lustrous mirrored-finish heatspreader in gold or silver color and a crystalline light bar design for a magnificent display of RGB lighting. Each heatspreader is CNC-cut from aluminum and electroplated for a stunning design befitting its Royal name.

Continue reading

Boost your productivity with a FREE copy of 'Microsoft Outlook For Dummies' worth $18

Learn all about the best application for emailing, scheduling, collaborating, and just plain getting stuff done.

Did you know that Microsoft Outlook can do everything, including cook your dinner? Okay, it can’t cook your dinner. But it can deliver your email, filter out the junk, help you organize your life, sync data to the cloud, integrate with iOS and Android, and about a zillion other things. Microsoft Outlook For Dummies shows you how to work all the basic and advanced features of the Office 2021 version. 

Continue reading

Best Windows apps this week

Five-hundred-and-ninety-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released the upcoming feature update Windows 11 24H2 to the Release Preview channel. This marks the last step before its final release later this year. Recall, an AI feature that Microsoft unveiled earlier this week, is not yet part of the preview.

Continue reading

AI crawlers -- what are they and why are they a problem? [Q&A]

Organizations have grappled with business threats posed by various automated bots and crawlers over the years. The latest flavor to take the spotlight is AI crawlers which source proprietary content to feed the AIs they serve.

We spoke to Eyal Benishti, CEO of IRONSCALES, to discuss AI crawlers and why it's important for security teams to establish boundaries for their use.

Continue reading

Spotify is discontinuing Car Thing, purposely bricking devices and telling users to throw them away

Spotify Car Thing

Spotify's venture into the world of hardware with Car Thing has proved an unmitigated failure. Having ended production of the device just a few short months after launch, the product is set to be completely discontinued before the end of the year.

But the discontinuation of Car Thing means more than just the end of support and updates -- much more. Spotify says that the devices will be rendered non-functional, and the advice to users is to reset and recycle them.

Continue reading

Unlike Netflix, Disney et al, Google thinks password sharing is a good idea

Remembering passwords

Streaming video services have clamped down on password sharing and have -- as Netflix has shown -- reaped the financial benefits. But while many companies are keen to stamp out the practice of sharing passwords, Google is actively embracing it.

A policy change that was talked about back in February is now rolling out, bringing a new password sharing option to Google Password Manager. The feature makes it possible to share a password in a secure way, without having to write it down.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.