Google may lock AI search results behind a paywall
Aa a company synonymous with search and a love of AI, it is little surprise that Google is combining the two. But people familiar with the company’s plans suggest that AI-powered search features could have a price tag attached to them.
The move would be a first for Google as the company has never charged for any search product, and it could be a sign that ads are simply not bringing in enough money. It is something that has been described as a big change to its business model, but it is not clear if this is a sign of further search-related charges to come.
Google finally starts rolling out Find My Device for Android to rival Find My from Apple
Almost a year after it was first announced, Google is finally rolling out its offline Find My Device service for Android devices.
All but identical to Apple's Find My network, Google's offering not only makes it possible to track the location of Android handsets, but also includes support for third-party AirTag-style trackers. While the rollout appears to have started, for now it is only a beta; a full launch is imminent, however.
Opera One web browser enhances AI capabilities: Adds local Large Language Models (LLMs) in developer stream
Opera has announced a huge AI update to its Opera One web browser in the developer stream. The company is introducing experimental support for 150 local Large Language Models (LLMs) across approximately 50 different model families. This innovative feature allows users to easily access and manage local AI models directly from the browser, a first in the industry.
The supported local LLMs include notable names such as Llama from Meta, Vicuna, Gemma from Google, Mixtral from Mistral AI, among others. The inclusion of local LLMs means that users can now leverage generative AI capabilities without the need to send data to external servers. This ensures that user data remains on the device, enhancing privacy and security.
Outrageous: Microsoft to charge $61 for Windows 10 updates -- consider switching to Linux!
Hold on to your hats, folks, because Microsoft is at it again. In a move that’s sure to ruffle some feathers, the tech giant has announced* that starting October 2024, just one year before Windows 10 reaches its end of support, the company will charge a whopping $61 per device for the first year of Extended Security Updates (ESU). And get this – the price will double every consecutive year for a maximum of three years! If you’re late to the party and join in Year Two, you’ll have to cough up the cash for Year One as well since these updates are cumulative. Talk about a slap in the face!
Now, let’s be clear: these Extended Security Updates are meant to be a temporary bridge for organizations that need more time to transition to Windows 11. They’re not intended to be a long-term solution. But let’s face it, for many businesses and individuals, upgrading to Windows 11 isn’t as simple as flipping a switch. There are compatibility issues, hardware requirements, and not to mention the hassle of migrating entire systems. So, this move by Microsoft feels like it's holding users hostage -- pay up or risk being left vulnerable to security threats.
Security vendor consolidation or best of breed? Why you must do both
Trends in cybersecurity (like many areas of technology and life) tend to make pendulum-like swings over time. One such shifting debate is around security tool philosophy: is it best to use an array of best-in-class tools or consolidate to a single, “do it all” security platform?
I argue that it is essential to planfully and strategically implement a hybrid approach. By combining some best-of-class tools with integrated platforms, you can eliminate the chaos of countless single tools and embrace the advanced benefits of today’s platforms, while still having some high-value, niche solutions to provide the necessary layers of protection for the security armor. It’s important to avoid dependence on a single vendor to also avoid implementing that vendor’s weaknesses/blind spots across the enterprise; yet these solutions offer many advantages.
Shielding the lifelines: Protecting energy and infrastructure from cyber threats
The energy and infrastructure sectors serve as the backbone of global stability and economic health, underpinning nearly all facets of modern society. As such, the integrity and reliability of these systems are paramount, and failure to maintain their uptime could lead to unprecedented disruptions in daily life. This reality underscores the pressing need to safeguard these sectors from evolving cybersecurity threats.
However, the very importance of energy and infrastructure makes them prime targets for cybercriminals. The surge in sophisticated email-based attacks, such as business email compromise (BEC) and vendor email compromise (VEC), poses a significant risk. These cyber tactics, often characterized by deceptive social engineering and the absence of traditional threat indicators, allow attackers to bypass conventional security measures easily. Understanding these attacks is the first step towards developing robust defenses against them.
fwupd abandons xz compression for zstd amid security concerns
Following the discovery of malicious code, fwupd, the popular firmware update utility, has decided to transition from xz to zstd compression for its metadata. Richard Hughes, the lead developer behind fwupd, outlined the rationale behind this decision in a recent blog post.
For years, fwupd has relied on compressed metadata to facilitate firmware updates for a wide array of hardware. This metadata, essentially a large XML file, was initially compressed using gzip, resulting in a 1.6MB download for end-users. However, in 2021, the fwupd team switched to xz compression, further reducing the file size to 1.1MB and saving significant bandwidth.
Microsoft is great, but not enough for email security
Microsoft 365 is the default software in SMEs, and understandably. The software offers a comprehensive set of productivity tools; flexible, scalable, and affordable licensing options, and compliance and security capabilities. However, given the ever-growing and persistent threat of cyberattacks, for email security, the standard security safeguards offered are insufficient.
Analysis of over 1 billion emails worldwide shows that emails are the preferred vehicle of cybercriminals. Email-delivered malware remains a favorite, increasing by 276 percent between January and December of last year. Additionally, attachments are growing as a threat. In Q4 of 2023, EML attachments increased 10-fold. Criminals are sending malicious payloads via EML files because they get overlooked when attached to the actual phishing email, which comes out clean.
TEAMGROUP unveils 2TB T-CREATE EXPERT S.M.A.R.T. microSDXC card
TEAMGROUP has unveiled its latest offering for the creative community -- the T-CREATE EXPERT S.M.A.R.T. microSDXC memory card, now available in a substantial 2TB capacity. It is compliant with the UHS speed class U3, video speed class V30, and application performance class A2.
When used with a compatible professional card reader, the memory card boasts impressive read and write speeds of up to 170 MB/s and 160 MB/s, respectively. These speeds are essential for seamless 4K Ultra HD and 1080p Full HD video recording, as well as continuous photo shooting.
21 percent of S&P 500 companies reported breaches in 2023
According to the latest threat research from SecurityScorecard, 21 percent of S&P 500 companies experienced breaches in 2023.
The report shows that 25 percent of these breaches impacted financial services and insurance companies. Financial institutions have some of the most robust security programs because they have substantial money and assets. But the interconnected nature of the financial sector means that compromising one institution or commonly used product can lead to broader impacts across the entire industry.
Get 'Microsoft Office 365 All-in-One For Dummies, 2nd Edition' (worth $24) for FREE
Multiply your productivity with the world's most straightforward guide to the world's most popular office software.
Microsoft Office 365 contains straightforward tools for virtually every office task you could possibly think of. And learning how to use this powerful software is much easier than you might expect. With the latest edition of Office 365 All-in-One For Dummies, you'll get a grip on some of the most popular and effective office software on the planet, including Word, Excel, PowerPoint, Outlook, Access, Publisher, and Teams.
79 percent of security pros don't think their company has adequate protection
Half of security professionals say it's almost impossible to find the right balance between security and employee productivity, and 79 percent don't think their security protections are adequate.
A new study from 1Password, based on a survey of 1,500 North American workers, including 500 IT security professionals, finds 69 percent of security pros admit they're at least partly reactive when it comes to security. While 61 percent believe they're being pulled in too many conflicting directions.
Nearly half don't use mobile security solutions
A new report from Bitdefender shows that 45 percent of consumers don't use mobile security solutions, despite the fact that 78 percent conduct sensitive transactions on their devices.
Based on an independent global survey of over 7,000 consumers, the report looks at top security behaviors, practices and concerns across their digital footprint and lifestyle.
Accepting generative AI into enterprise software development [Q&A]
The development community has been quick to embrace generative AI for its productivity potential. But at the same time it raises concerns for enterprises around IP/ownership, security, compliance and more.
We talked to Steve Martinelli, director of developer advocacy and community at Equinix, to discuss the similarities between GenAI and open-source software's acceptance journey, and how we might tackle the unique challenges it presents.
HYPER launches HyperJuice 240W Silicone USB-C to USB-C Cable
HYPER has launched its new HyperJuice 240W Silicone USB-C to USB-C Cable. The cable distinguishes itself with its remarkable 240W charging capacity, enabled by PD 3.1’s Extended Power Range (EPR). Designed to meet the charging needs of today’s demanding devices and future innovations, this cable provides efficient and rapid charging without sacrificing safety or durability.
Key features of the cable include a 240W charging power that ensures quick and efficient charging for all devices, a durable silicone jacket that withstands over 25,000 bends, and a portable, tangle-free silicone design for easy management. The cable also features Over-Temperature Protection (OTP) up to 90°C / 194°F, with each port connector containing E-marker chips for safe power and data delivery. Additionally, the cable is future-proofed with universal compatibility, designed to support all USB-C devices of today and tomorrow.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.