TUXEDO Stellaris 16 (Gen6) laptop brings high performance to Linux users

The TUXEDO Stellaris 16 (Gen6) is a high-performance Linux laptop designed for users seeking powerful hardware. With a thickness of 2.6 cm and a weight of 2.5 kg, it balances portability with the cooling capacity needed for high-performance components. It’s built with an all-aluminum chassis that aims to combine rigidity with an understated design, making it suitable for gaming and professional environments.

The Stellaris 16 features Intel’s Core i9-14900HX processor, offering 24 cores and 32 threads. Buyers can choose between several NVIDIA graphics options, ranging from the RTX 4060 to the high-end RTX 4090. The laptop’s design supports these GPUs at their maximum power limits, thanks to its efficient cooling system, which includes six heat pipes and dual 12 mm fans, allowing it to handle up to 225 watts of thermal load. For users looking for additional cooling, TUXEDO offers the Aquaris liquid cooling docking station.

Continue reading

Severity of ransomware attacks increases by 68 percent

A new report from insurance provider Coalition finds that that ransomware claims severity spiked by 68 percent in the first half of 2024 to an average loss of $353,000.

While high ransomware demands have come back into vogue, funds transfer fraud (FTF) has also seen a notable decrease in both frequency (two percent) and severity (15 percent).

Continue reading

Qualys launches cloud-based risk operations center

Organizations are facing an ever-growing volume of risk alerts spread across multiple, disconnected top-10 dashboards. This fragmented view can result in conflicting analyses, duplicate work, missed threats, and strategies that fail to fully protect the organization.

Cloud-based security firm Qualys is addressing this with the launch of a new Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM) that enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that align cyber risk operations with business priorities.

Continue reading

Is Opera's new AI-powered tab management feature really necessary or just more AI fluff?

Opera’s latest addition, Tab Commands, promises to revolutionize tab management using its AI assistant, Aria. With commands like “group work tabs” or “close social media tabs,” users can interact with their browser in a way that’s meant to simplify multitasking. But is this new feature really essential, or is it just another example of adding AI for the sake of it?

The concept of managing browser tabs with AI might sound innovative, but it raises the question: do users actually need this level of automation? While the feature offers convenience by grouping, pinning, or saving tabs with a simple command, most browsers already have built-in ways to manage tabs with minimal effort. Shortcuts and extensions that help manage tab overload already exist, and many people have developed their own methods for keeping tabs organized without AI assistance.

Continue reading

Is the IT enterprise helpdesk an endangered species?

The IT helpdesk could be extinct by 2027 according to a new survey of 1,000 global IT workers which finds that 79 percent believe the current service desk model will be unrecognizable within three years, with 77 percent saying new technologies will render it 'redundant' by 2027.

The study by digital employee experience company Nexthink shows 87 percent of IT workers also report that, with digital transformation having greatly expanded the size and complexity of enterprise IT environments, incident response is 'economically unsustainable' unless helpdesks have significant proactive capabilities.

Continue reading

Google launches new initiative for sharing scam details

Google logo on phone in front of laptop

Google has announced a new partnership with the Global Anti-Scam Alliance (GASA) and the DNS Research Federation (DNS RF) to launch Global Signal Exchange (GSE), a new project with the ambition to be a global clearinghouse for online scams and fraud bad actor signals.

This collaboration combines the strengths of each partner: GASA's extensive network of stakeholders, the DNS Research Federation's robust data platform with already over 40 million signals, and Google's experience in combating scams and fraud.

Continue reading

The Internet Archive suffers massive data breach affecting tens of millions of users

Internet-Archive-Wayback-Machine

The Wayback Machine has suffered a colossal security incident after the Internet Archive fell victim to a huge data breach.

Data breach notification service Have I Been Pwned (HIBP) says that a 6.4GB SQL file containing registered users’ authentication information has been shared. In all, 31 million email addresses have been found to be part of the database, and tests have shown the the data is genuine.

Continue reading

HexGaming launches PHANTOM Gaming Pro controller for PS5

HexGaming has launched the PHANTOM Gaming Pro Controller for PS5, aimed at serious eSports gamers who prioritize precision and customization. Designed for intense competitive play, this controller combines advanced technology with ergonomic features, providing players with an edge in high-pressure gaming scenarios.

The PHANTOM Controller delivers professional-grade features, including 4 remappable buttons, 6 customizable profiles, interchangeable thumbsticks, and adjustable triggers. It accommodates a wide range of playstyles and is available in the United States, Canada, Mexico, and Japan.

Continue reading

Google Store Ratings expands to Australia, Canada, India, and UK

Google is expanding its Store Ratings feature beyond the United States, making it available for English-language shopping searches in Australia, Canada, India, and the United Kingdom. This feature allows merchants to display customer feedback about their services, including product quality, shipping, and return policies, directly in search results. The aim is to provide shoppers with information that may help them make more informed purchasing decisions.

Store ratings appear in shopping search results. Clicking on a store rating allows users to access detailed information about the business, including customer reviews, shipping information, and return policies. This offers shoppers insight into the store’s services and product quality, potentially influencing their buying choices.

Continue reading

Save $88! Get 'Deep Learning: A Practical Introduction' for FREE

In Deep Learning: A Practical Introduction, a team of distinguished researchers delivers a book complete with coverage of the theoretical and practical elements of deep learning. The book includes extensive examples, end-of-chapter exercises, homework, exam material, and a GitHub repository containing code and data for all provided examples.

Combining contemporary deep learning theory with state-of-the-art tools, the chapters are structured to maximize accessibility for both beginning and intermediate students. The authors have included coverage of TensorFlow, Keras, and Pytorch.

Continue reading

Attacks on GenAI see sensitive data leaked

New research reveals that 90 percent of successful attacks against GenAI have resulted in the leakage of sensitive data.

The report from Pillar Security, based on real-world analysis of more than 2,000 AI applications, shows 20 percent of jailbreak attack attempts successfully bypassed GenAI application guardrails and adversaries needed an average of just 42 seconds to execute an attack.

Continue reading

AI boosts rise in phishing and spoofing attacks on banks

The US banking industry has seen a significant uptick in cyberattacks, particularly in phishing and spoofing, and tactics are becoming increasingly advanced due to AI.

New research from BforeAI analyzed 62,074 domains registered between January and June 2024 with finance-related keywords. Of those registered domains, 62 percent were found to be involved in phishing attacks targeting legitimate entities via spoofing websites.

Continue reading

Security awareness training is not enough to stop breaches

New research shows companies are pouring an increasing number of resources into their security awareness and training programs, with 96 percent of respondents allocating it between five percent to 20 percent of their security budgets.

But the research from CultureAI, based on a survey by Opinion Matters of 200 UK-based cyber security teams at organizations with over 1000 employees, finds that while 78 percent train employees at least monthly human-related breaches are still happening at an alarming rate.

Continue reading

Why CISOs need to keep on top of their cybersecurity investments [Q&A]

With the current climate of new and more sophisticated cybersecurity products, greater risk and pressure on budgets, it's more important than ever to ensure that they get the best return on their investments.

We spoke to Karthik Swarnam, chief security and trust officer at ArmorCode, to discuss the best practices to ensure ROI from security investments.

Continue reading

Still running Windows 11 22H2? No more security fixes from Microsoft for you!

Windows 11 screen with reflection

Following the launch of Windows 11 24H2, this week marks the release of the final updates for various other versions of Windows. This means that anyone who has yet to upgrade from Windows 11 22H2 will not receive any more security updates.

There are numerous editions of Windows 11 affected by the end-of-service, specifically Windows 11 Home, Pro, Pro Education, Pro for Workstations and SE. The same is true for Windows 11 21H2 Enterprise, Education and IoT Enterprise, none of which will receive further updates. So, what does this mean for users?

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.