Microsoft releases PowerToys v0.49 with new mouse utility and UI updates

Microsoft PowerToys

A new release cycle has started for the PowerToys collection of utilities. Kicking off with PowerToys v0.49, Microsoft promises that this and the upcoming batch of releases include "exciting new updates".

And things get off to a great start with the arrival of not only the Video Conference Mute tool in the stable build, but also a brand-new utility -- Find My Mouse. There are also numerous fixes and improvements as a well as a UI update for PowerRename.

Continue reading

Meta leak shows Facebook smartwatch could be an Apple Watch killer

Meta / Facebook smartwatch

Meta, TCFKAF (the company formerly known as Facebook) appears to be working on a range of smartwatches that bear more than a passing resemblance to the Apple Watch.

At least two wearables are thought to be in development, one of which is codenamed Milan. But what is causing the greatest interest is an image of a smartwatch featuring a notch that is home to a camera.

Continue reading

Facebook's new name is just the start -- Zuckerberg says a billion people will be in the metaverse within ten years

We knew that Facebook was going to announce a name change today, but what we didn’t know for certain was what that name would be. The smart money was on something to do with the metaverse, which many firms -- Facebook especially -- believe could be the future of the internet.

Much as Google rebranded its parent company Alphabet back in 2015, so Facebook’s parent company is now called Meta, and gains a new blue infinity symbol for a logo. This change only affects the parent company -- the names of the apps everyone knows and uses -- Facebook, Instagram and WhatsApp will stay the same, although the Oculus VR brand will be phased out.

Continue reading

How safe is your email?

Despite the rising popularity of other communication and collaboration methods like Zoom and Teams, email remains at the core of business correspondence. However, it also remains a popular vehicle for delivering cyberattacks and other unwelcome material.

Secure email company Avanan has produced an infographic looking at email safety.

Continue reading

IT outages can cause severe business damage in hours

A new survey finds that 83 percent of companies would suffer business damage during the first 24 hours of an outage and its aftermath.

The study from Dimensional Research on behalf of Netenrich also uncovers a number of contradictions in enterprises' attitude to scaling their security operations.

Continue reading

Apple reveals how to scale apps to avoid the MacBook Pro notch

macBook Pro with notch

Earlier today we shared details of a handy free app called TopNotch that makes it possible to hide (or at least disguise) the notch that Apple has added to the latest version of the MacBook Pro.

But it seems that even Apple is aware that the position of the notch is not going to be to everyone's liking. The company has published a new support document that explains how apps can be scaled so they do not make use of the notched area of the screen. Here's what you need to know.

Continue reading

Cybersecurity storm threatens the hybrid workplace

Broken umbrella in storm

A new report from HP Wolf Security looks at how hybrid work is changing user behavior and creating a 'perfect storm' of cybersecurity challenges for IT departments.

The research shows that a growing number of users are buying and connecting unsanctioned devices without the IT team's approval. It also highlights that threat levels are rising, with attackers increasingly successful at bypassing defenses and tricking users into initiating attacks through phishing.

Continue reading

WSATools makes it ridiculously easy to sideload Android apps in Windows 11

WSATools

Microsoft's decision to bring Android app support to Windows 11 has caused responses ranging from hatred, through ambivalence to love. Partnering with Amazon, however, means that the Windows Subsystem for Android has access to a slightly limited range of apps, resulting in people seeking ways to sideload APKs.

A few days ago, we looked at one of the techniques that can be used to sideload apps, but it was a bit fiddly and complicated -- certainly not something everyone would be happy undertaking. But by turning to the free app WSATools, sideloading Android apps in Windows 11 is made so much simpler.

Continue reading

Why is API security failing? In part, because we're over-rotating on 'shift left'

api

The benefits of shift-left approaches in security are well-documented, to the point where they have become common practice. This practice helps ensure that more coding quality and security issues are found before the code is released into production, saving time and money and reducing risk. However, not all security risks can be identified and eliminated in pre-prod.  This reality is particularly true with APIs, where the security risks associated with their widespread use and abuse is a significant concern. Experts from Gartner predict that by 2022, API abuse will become the most common attack vector.

Recent API incidents have already validated this prediction many times over. Starting in 2021, 90 percent of web-enabled applications will be exposed via APIs rather than the user interfaces. Without a balanced approach to protecting APIs, one that goes beyond just pipeline scanning and other shift-left practices, organizations will continue to suffer API security gaps that leave them exposed.

Continue reading

Hide the MacBook Pro notch for free with TopNotch

Apple is famous for its attention to detail and quality designs, but even such a well-respected company is not immune to making design decisions that divide opinion.

One of the controversial choices made by Apple was to add a notch to the iPhone, using it to house the selfie camera; it was a decision that was loved and hated in just about equal measure. With the recent launch of the latest MacBook Pro, the same notch has landed on Apple's top-end laptops, once again polarizing users. If you fall on the side of hating the notch, there are steps you can take to hide it.

Continue reading

The new Raspberry Pi Zero 2 W arrives priced at $15

The Raspberry Pi Foundation released the first Raspberry Pi Zero nearly six years ago, and it proved so popular it was sold out for months. The fact it was priced at just $5 helped. It was followed up by the wireless-enabled Zero W for $10, and today the company launches a successor to that model.

Priced at $15, the new Raspberry Pi Zero 2 W uses the same Broadcom BCM2710A1 SoC die as the original Raspberry Pi 3. The quad-core 64-bit Arm Cortex-A53 CPU is clocked at 1GHz, delivering a 40 percent increase in single-threaded performance and 5x times more multi-threaded performance than the Zero W.

Continue reading

Samsung unveils trio of Galaxy Book Windows 11 laptops including 5G convertible model

Samsung hasn't just announced one new Windows 11 laptop, but three of them. A trio of notebooks running Microsoft's latest desktop operating system? How exciting!

Two of these computers are traditional 15.6-inch LED 1080p laptops; one of that pair (Galaxy Book) has a touch-screen display, while the other (Galaxy Book Odyssey) does not. The third model (Galaxy Book Pro 360 5G), is a convertible with a 13.3-inch FHD AMOLED touch-screen that features 5G wireless connectivity.

Continue reading

Microsoft releases Windows 11 Build 22489 with a new Microsoft account settings page

It’s Wednesday, so that (usually) means Microsoft has a new Windows 11 build for Insiders in the Dev Channel.

Build 22489 comes with the standard long list of changes, improvements, fixes, and known issues, but it also introduces with a new settings page for your Microsoft account that displays all of the information related to it that you are likely to need.

Continue reading

Kingston unveils FURY Beast DDR5 RAM

When you are a computer-builder, there are peaks and valleys when it comes to excitement about PC components. What do I mean by this? Well, sometimes you are building machines with cutting edge parts as an early adopter, while other times you are using ho-hum components that have been around a while. For instance, we have been using DDR4 memory for about seven years now... yawn!

Thankfully, the age of DDR5 is finally here. After dealing with DDR4 for so many years now, we will soon see PCs with DDR5 memory inside. One of the companies leading this industry shift is Kingston, and today that company unveils its FURY Beast DDR5 RAM. This memory is designed for use in computers powered by Intel's cutting-edge 12th generation Core processors and Z690 chipset. They should be easy to configure or overclock thanks to Intel XMP 3.0 support.

Continue reading

APIs leave businesses open to attack

Intelligent APIs

APIs are designed to be fast and easy pipelines between different platforms. They offer convenience and user experience which makes APIs essential to many businesses, but it also makes them attractive targets for cybercriminals.

A new report from Akamai, produced in collaboration with Veracode, highlights the frustrating pattern of API vulnerabilities, despite improvements that have been made in software development life cycles (SDLCs) and testing tools.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.