Microsoft completely ends support for Windows 7 and Windows 8 in under a month; now really is the time to move on


It is no secret that the uptake of Windows 11 is rather slow. Microsoft may be unlikely to publicly say as much, but the company will no doubt be extremely disappointed at the number of people who have made the leap to the latest version of its operating system.
All this could change in 2023, however. There are many people and businesses who have hung on to Windows 7 or Windows 8, despite the fact that mainstream supported ended back in 2020. But when January 10, 2023 rolls around, Microsoft will no longer even offer paid-for Extended Security Updates. And with the likes of Edge and Chrome no longer supporting the aged OSes, the time really has come to switch to Windows 11.
When disaster strikes, having the proper business continuity and emergency preparedness technology can ensure enterprise resiliency within healthcare organizations


Even when a disaster or critical incident occurs, hospitals and healthcare organizations must be able to continue to provide assistance to existing patients, while also preparing for a surge of new ones. With many hospitals operating at nearly full capacity, even during periods of relative calm, business downtime of any duration will significantly impact both profitability and patient health outcomes; ensuring business continuity during any situation is critical, particularly in a times of limited resources.
While readiness for crises and critical incidents is essential for conducting resilient business operations in any industry, for healthcare providers, the stakes are higher. Threats like communicable disease outbreaks, weather disasters, and cyberattacks not only disrupt business-as-usual -- they also put individual lives and community well-being in jeopardy.
How fraudsters attack blockchain technology and how it can be prevented


The global financial crisis of 2008-09 resulted in the development of the Bitcoin whitepaper which introduced the world to the idea of blockchain technology and cryptocurrency. Within blockchain, information is stored in several databases (blocks) that are linked together chronologically through cryptographic hashes to form a distributed network (chain). Since its inception the global blockchain market is expected to hit $67.5 billion by 2026.
Within the realm of banking, financial services, and insurance (BFSI) the evolution of cryptocurrencies as an asset class for investors has furthered the commercialization of blockchain technology through decentralized finance (DeFi) services. As of 2021, there are over 6,000 cryptocurrencies being traded freely with global cryptocurrency market capitalize reaching $990 billion. Serving investors' needs are exchanges, lenders, asset managers, custodians, cross-border payment applications, and clearing & settlement houses that all benefit from the surge in blockchain use-cases.
The opportunities and risks of the metaverse


We know that not many consumers actually care about the metaverse, but that hasn't stopped tech giants investing heavily in preparing for it.
A new report from Tenable, based on a study of 1,500 professionals representing roles in cybersecurity, DevOps and IT engineering, shows 68 percent of respondents plan to do business in the metaverse within the next three years, with 23 percent having already begun initiatives in the past six months.
Budget and momentum are key to cybersecurity automation maturity -- and CISOs are feeling left behind


As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
The intelligent automation of key cybersecurity processes can significantly improve an organization's posture and at the same time support under-pressure employees by reducing reliance on manual processes. But in what is a relatively new approach, how far have organizations progressed along the cybersecurity automation maturity curve and is everyone on the same journey?
Why your security strategy needs to be pre-emptive [Q&A]


As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems.
What's needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to Todd Carroll, CISO at CybelAngel and with over 20 years previous experience in the FBI's cyber, counter intelligence, and counter terrorism branches, to discuss the need for a pre-emptive attitude to cybersecurity and how such an approach can work.
Open Source video editor OpenShot 3.0 now available for Windows, Mac, and Linux


One of the big reasons some people don't switch to Linux is a lack of video editors. While it's true there are more video editing programs on macOS and Windows, there are some great options on Linux too, such as Kdenlive and DaVinci Resolve.
Another popular video editing application that runs on Linux is the open source OpenShot. This cross-platform video editor can run on Windows and macOS too, meaning you can try it on one of those platforms to see if it meets your needs before switching to Linux. And now, OpenShot has reached a new major milestone -- version 3.0. The developers brag that it includes over a thousand changes.
IT infrastructure challenges echo a rapidly changing digital landscape


Against a background of major macroeconomic shocks, political uncertainty, and continuing social change, businesses must adapt fast as they aim to deliver trusted value and exceptional experiences for customers, partners, and employees. In a digital world, the responsibility for driving this evolution lies largely with IT leaders as they seek to provide a technology infrastructure with the flexibility, performance, and reliability required in a fast-paced, volatile environment.
To gauge how IT decision-makers are approaching this challenge and understand the issues they are facing, WSO2 recently surveyed 200 IT decision-makers from the UK and Ireland. We found a sector that needs to overcome some significant short-term challenges, but is also aware of longer-term issues that will persist if they are not addressed. At the same time, as digital transformation continues, some of the key technologies powering it are proving harder to integrate into infrastructure than others.
To get verified on Twitter, you just need a phone number -- and between $8 and $11


Starting Monday 12 December, Twitter is relaunching Twitter Blue and giving users the opportunity to pay for the blue checkmark of verification.
Since Elon Musk took over at Twitter, the decision to open up verification to anyone willing to pay was one of the more controversial decisions. The scheme was paused last month, but now the paid-for blue tick is opening up once again. This time around, however, things are a little different, with iOS users getting a worse deal.
Transcend announces MTE250H PCIe 4.0 M.2 SSD with aluminum heatsink


Back in October, we told you about the MTE250S -- a PCIe 4.0 M.2 solid state drive from Transcend. While that SSD is fast, it is missing something that many computer users insist upon -- a heatsink. You see, heat can negatively impact both the performance and longevity of an M.2 SSD, and a heatsink can help cool it down. However, some laptops and desktops can't fit an M.2 SSD with a heatsink, so it makes sense not to include such a cooling accessory with every model.
With all of that said, Transcend has now unveiled the MTE250H, which is an all-new SSD. While it is technically a new product, the reality is, it is merely the previously announced MTE250S with a heatsink bolted on. Other than the heatsink, the MTE250S and MTE250H seem to be identical.
The evolution of business email compromise to business communication compromise


Business Email Compromise (BEC) attacks are no longer limited to traditional email accounts. Attackers are finding new ways to conduct their schemes -- and organizations need to be prepared to defend themselves.
Attackers are leveraging a new scheme called Business Communication Compromise to take advantage of large global corporations, government agencies and individuals. They are leveraging collaboration tools beyond email that include: chat and mobile messaging -- including popular cloud-based applications such as Slack, WhatsApp, LinkedIn, Facebook, Twitter and many more -- to carry out attacks.
The forces driving the new code-agnostic developer generation


Code-agnostic development is the future of cloud-native applications. Sure, there are plenty of benefits to knowing a coding language inside and out, but the field is evolving beyond the requirements for deep language expertise. As low-code and no-code platforms abstract complexity, developers can focus on higher-level concepts. The ability to jump from language to language will make them more efficient and adaptable.
Software industries evolve by abstracting complexity of lower-level tasks. If done correctly, this leads to better user productivity and outcomes. This movement in development is fueling the new approach to languages, allowing development teams to operate successfully with coding knowledge a mile wide and an inch deep. The trend of multi-lingual developers will propel the industry into the future. Let's take a look at how these experts developed.
Google brings passkey support to Chrome so you can ditch passwords


Passwords are a problem. They are difficult to remember, often easily guessed or cracked, and generally just a pain. Google is looking to help by adding secure, password-free login to Chrome 108 thanks to newly added passkey support.
The security feature is available to users of Windows 11, macOS and Android, and it follows a short period of beta testing. Backed by the likes of the FIDO Alliance, Microsoft, Apple, and -- of course -- Google, passkeys are a step away from the password managers so many of us have become reliant on.
You could soon be able to grab the Twitter handle of your dreams


One of the problems with signing up for just about any online service, particularly social platforms, is trying to bag yourself the username you want. On Twitter, this could be about to get a bit easier.
It is no secret that since Elon Musk took over the company, Twitter users have been leaving the site in droves, mainly to Mastodon. Add to this the number of accounts that were set up years ago and never used, accounts that have fallen inactive and there are a lot of Twitter handles that could be opened up to new owners -- and this is precisely what is on the cards.
Windows 11 Build 25262 does away with the sign-in requirement for the widgets board


The December 2022 Bug Bash is well underway for Windows Insiders in both the Dev and Beta Channels.
For insiders in the Dev channel, today also sees the arrival of a new Windows 11 build in time for the weekend. Build 25262 comes with a number of fixes and Microsoft has also dropped the sign-in requirement for the widgets board and made it available for all users.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.