Latest Technology News

Linux Mint 20.3 Cinnamon (Edge) Edition now available for download

When using a Linux-based operating system, you should always use the most recent kernel, right? Actually, no. While new kernels do add fixes and support for new hardware, they can also be less stable and cause bugs.

Unfortunately, if you have extremely new hardware, sometimes you must use a newer kernel in order to boot, as older kernels do not yet support some of your devices. For instance, Linux Mint 20.3 "Una" was released recently and it comes with Linux kernel 5.4. If that older kernel does not support your computer, it may not boot.

Continue reading

Rambox 2.0 allows you to consolidate all your major apps and services within a single workspace

Rambox LLC has started the New Year by relaunching its workspace consolidation tool with the release of Rambox 2.0. Available on Windows, macOS and Linux, the new app combines paid-for and free tiers within a single program for the first time.

Rambox originally launched in 2016 as an open-source beta under a 'Community Edition' banner. In 2018, a paid-for Pro version with additional functionality was added, and now Rambox has combined the two in a single program with both free and paid-for tiers.

Continue reading

Third-party widgets are coming to Windows 11 (probably)

Windows 11 Widgets

The Widgets component of Windows 11 was something that seemed like a great idea on paper, but has thus far failed to generate too much excitement. This is at least in part down to the fact that only official Microsoft widgets exist -- but this is going to change.

It is looking very much like Windows 11 is going to be gaining support for third-party widgets, opening up the possibility of a wider range of genuinely useful tools coming to users. There are also hints that a widget store, called the Widget Board, is on the way.

Continue reading

Amazon backs down on not accepting UK Visa credit cards

Back in November last year we reported on Amazon's decision to stop accepting UK issued Visa credit cards due to high processing charges.

The change was due to take place this Wednesday (January 19) but it seems that an 11th hour deal may have been reached to allow customers to continue using their Visa cards.

Continue reading

Why identity management needs to be brought up to date for the cloud [Q&A]

Cloud data security

Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn't working.

To find out more about why the cloud needs a new approach to IAM we spoke to Britive CEO, Art Poghosyan, about the challenges it raises and how to address them.

Continue reading

Silicon Power XPOWER XS70 PCIe 4.0 SSD is inspired by sharks

Do you need a PCIe 4.0 NVMe solid state drive? Probably not. I mean, nobody really needs the insane speed these drives offer. However, the drool-worthy performance is certainly nice to have. Look, if you can afford such an SSD and your computer supports it at full speed, you might as well get one. I mean, why not?

Today, Silicon Power announces its latest such PCIe 4.0 SSD. Called "XPOWER XS70," it features blazing fast speeds and capacities up to 4TB. It even has a nice-looking heat sink that the company says is inspired by sharks.

Continue reading

Power in people: How human capital will determine tech success

Artificial intelligence

According to the Economist, one of the most significant outcomes of the pandemic will be "the infusion of data-enabled services into ever more aspects of life." We were already expecting a transition to digital transformation thanks to technological advancement, dubbed the "fourth industrial revolution".

However, following on from the pandemic which forced countless businesses to switch to remote working virtually overnight, we expect digital transformation to continue to be adopted on a larger and more rapid scale -- becoming an even more prominent objective for organizations in the future.

Continue reading

Implementing Zero Trust? Prioritize people as much as tech

The trust model of cybersecurity is broken. Since the shift to cloud and the move away from siloed on premise infrastructure, IT environments have grown ever more complex, expanding in both size and variety of components.

Trust is permissible when a small team of engineers is accessing on premise infrastructure. However, in the modern hybrid systems employed by many businesses, trusting the multitude of end points and variables to manually adhere to all authentication measures and preventative procedures is risky. We all know that just one phishing email is enough to potentially lead to a critical data breach. Such incidents can be incredibly damaging for a business: IBM estimated that this year data breaches cost businesses an average of $4.24 million -- a 17 year high.

Continue reading

Microsoft re-releases KB5009624, KB5009557 and KB5009555 updates

Microsoft building logo

The first Patch Tuesday of 2022 ended up being rather more dramatic that many would have expected -- and not for the right reasons. The company released the KB5009566 update which, along with another update, was later found to cause problems with VPN connections. But it was issue with Window Server updates that concerns system administrators.

No fewer than three updates were found to be problematic for different versions of Windows Server, ultimately leading to Microsoft halting the rollout of KB5009624, KB5009557 and KB5009555. And while the Hyper-V issues introduced by the patches are still to be fixed, Microsoft has nonetheless recommenced the rollout of the update, saying that it is investigating the problems.

Continue reading

Best Windows apps this week

Four-hundred-seventy-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released a new Windows 11 build this week. It includes a redesigned flyout and other improvements.

Continue reading

How AI can offer businesses greater control over their payments [Q&A]

We none of us particularly like handing over money, and that applies equally to businesses and individuals.

Payments are essential to the commercial world, up to now though they've always been a quite labor intensive to process. But what if it could be automated? Would you feel comfortable handing over control of payments to AI?

Continue reading

Microsoft pulls problematic Windows updates that break Hyper-V and more

Microsoft headquarters

Problems with updates are hardly a new phenomenon for Microsoft, but 2022 has not got off to a good start. Not only were the KB5009543 and KB5009566 updates found to break VPN connections, another trio of updates has now been pulled because it contains critical bugs.

The KB5009624, KB5009557 and KB5009555 updates have been withdrawn because they are causing Hyper-V to stop working. The problematic updates have also be found to cause domain controller reboots and to render ReFS volume systems inaccessible.

Continue reading

How to transform the role of a CISO for the digital-first economy

With any business venture, all organizations aim to minimize downside risks and maximize upside opportunities at some basic level. With the rapid transition to digital-first technologies, organizations are offering new products to improve customer experiences by delivering the value proposition of any time, any place. But with convenience often comes risk.

For instance, restaurants and retailers are enabling GPS data using third-party applications through API integrations to power location-based services. These applications elevate the user experience and maximize business profits through customized sales offers and personalized customer service experiences. But at what cost?

Continue reading

Attackers use Adobe Cloud to host phishing documents

Adobe Creative Cloud hosts popular apps including Photoshop and Acrobat, it also aids collaboration by allowing users to share documents.

Cybersecurity researchers at Avanan have discovered that hackers are now exploiting these file-sharing services as a phishing attack vector by sending legitimate emails through a trusted sender, bypassing ATP protection via Adobe’s SaaS offering.

Continue reading

iStorage diskAshur M2: An ultra-secure hardware encrypted portable SSD [Review]

Storing files in the cloud has a lot of benefits, not least making them easily accessible from anywhere. It isn’t necessarily the most secure option, however.

If you have private data that you can’t afford to fall into the wrong hands, you should definitely consider a PIN authenticated hardware encrypted portable USB SSD like iStorage’s excellent diskAshur M2.

Continue reading

Advertisement
Advertisement

© 1998-2022 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.