OWC launches Thunderbolt 5 Hub to supercharge Mac and PC connectivity


Other World Computing (OWC) has launched the Thunderbolt 5 Hub, which promises to elevate device connectivity for Macs, PCs, and even tablets like the iPad Pro. This new hub delivers an impressive 80Gb/s of bi-directional data speed -- double that of Thunderbolt 4 and USB4 -- and supports up to 120Gb/s for users needing higher display bandwidth. With just a single cable, users can expand their device’s ports to include three Thunderbolt 5 ports and a USB-A port, making this hub a productivity game changer.
For tablet users, the OWC Thunderbolt 5 Hub is especially transformative, turning an iPad Pro or similar device into a full-fledged workstation capable of connecting to external drives, displays, and a variety of peripherals. This means users can push the limits of their tablets without the need for a laptop or desktop nearby.
Failed security controls cost businesses billions


A new report finds 61 percent of organizations have suffered a security breach in the past year because their policies, governance, and controls failed or were not working effectively. This is costing US businesses $30bn and UK businesses £10bn per year.
The study from security posture management firm Panaseer surveyed 400 security decision makers across the US and UK and found 72 percent have taken out indemnity insurance in response to growing personal liability, whilst 15 percent have considered leaving the industry.
New defense suite is designed to secure AI workloads


As organizations increasingly adopt AI capabilities, the most common and dangerous attacks often go undetected by static code scanning or traditional security methods.
The only effective way to stop common AI attacks, such as prompt injection and zero-day vulnerabilities, is through active runtime detection and defense. Operant AI is launching a new 3D Runtime Defense Suite aimed at protecting live cloud applications, including AI models and APIs in their native environments.
Microsoft’s answer to Apple Intelligence may be Windows Intelligence


Branding is important, and this is something we’ve already seen with digital assistants like Siri. Moving into the artificial intelligence era, companies have been falling over themselves to get their own stamp on their version of AI.
Apple has opted for the reasonably predictable “Apple Intelligence”, while Microsoft’s approach has been a little more haphazard. But now there are clues that suggest the company has finally come to understand the importance of giving people an overarching term to cover all of its AI-related offerings. Say hello to Windows Intelligence.
New tool helps prepare workforces for cyber threats


Humans are generally the weakest link in the cybersecurity chain, so training and awareness are essential alongside technology to keep organizations safe.
With the launch of its AI Scenario Generator, Immersive Labs enables organizations to seamlessly generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats.
Apple Find My can now share AirTag locations with airlines and third parties


Apple has launched a beta feature called Share Item Location in iOS 18.2, allowing users to share the location of an AirTag or Find My network accessory with third parties. This update is designed to simplify the process of locating misplaced items, particularly when traveling. Users can generate a secure link in the Find My app on their iPhone, iPad, or Mac, which can then be shared. The recipient can access an interactive map that shows the item’s location and updates automatically. The shared link expires after seven days or when the item is recovered, maintaining privacy and security.
“Find My is an essential tool for users around the world to keep track of and find their belongings,” said Eddy Cue, Apple’s senior vice president of Services. “The Find My network and AirTag have proven to be a powerful combination for users while traveling, providing invaluable location information when bags have been misplaced or mishandled. With Share Item Location, we’re excited to give users a new way to easily share this information directly with third parties like airlines, all while protecting their privacy.”
Logitech expands availability of refurbished products in North America and Europe


Logitech is making it easier for consumers to access refurbished devices with the expansion of its Certified Refurbished program. Now, customers in North America and Europe can purchase a wide range of products, including mice, keyboards, tablet accessories, gaming gear from Logitech G, and Bluetooth speakers through Logitech’s eBay Refurbished brand store and its own websites.
The company is tapping into a growing trend as more consumers seek out high-quality refurbished products. The appeal of these devices lies in their cost-effectiveness and environmental benefits, offering users a way to own premium technology while contributing to waste reduction.
NordVPN launches ID theft protection tool


Although it may not make the headlines as often as other forms of cybercrime, identity theft remains an issue.
Now NordVPN has launched an identity theft protection service called NordProtect. Currently available to NordVPN Prime plan users in the US, it merges years of cybersecurity expertise with cutting-edge technology to offer a solution users can trust.
Navigating the world of disinformation, deepfakes and AI-generated deception [Book Review]


Online scams aren't anything new, but thanks to artificial intelligence they're becoming more sophisticated and harder to detect. We've also seen a rise in disinformation and deepfakes many of them made possible, or at least more plausible, by AI.
This means that venturing onto the internet is increasingly like negotiating a digital minefield. With FAIK, risk management specialist at KnowBe4 Perry Carpenter sets out to dissect what makes these threats work and the motivations behind them as well as offering some strategies to protect yourself.
Mitigating third-party risk in today's cyber ecosystem [Q&A]


As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
Debian Linux 12 bookworm receives eighth update with crucial security fixes


The Debian project has announced its latest point release for Debian Linux 12, codenamed “bookworm,” marking the eighth update to this stable distribution. This 12.8 update primarily addresses security issues and fixes various critical bugs, enhancing the reliability and security of the system. Importantly, this release is not a new version but an update to existing packages within Debian 12. Users who routinely update via security.debian.org will notice only minimal changes, as most updates are rolled into this point release.
There is no need to replace existing installation media for bookworm; a simple upgrade through an up-to-date Debian mirror suffices to bring systems to the latest versions. The new installation images reflecting these updates will soon be available at Debian’s standard download sites.
Why my Apple iPhone 16 Pro Max cost more than my M4 Mac mini


Back in the day, when personal computers were first making their way into homes, buying a desktop was often a massive investment. The price tags on those early machines were no joke, especially in the ’80s and ’90s. Dropping a couple of thousand dollars on a beige box humming with potential was considered normal. Fast forward to today, and times have certainly changed -- computers, including the powerful M-series Mac minis, have become more affordable, while flagship smartphones have skyrocketed in price.
I recently bought Apple’s new base-model M4 Mac mini, which set me back $500 with the education discount ($600 regularly). For those keeping tabs, that’s for a fully functional, highly efficient desktop computer. Not too long ago, such a price would have barely covered the cost of an average, bare-bones PC tower. This particular Mac mini runs circles around most mainstream computers from just a few years ago, delivering top-notch performance at a budget-friendly price.
SHARGE launches ICEMAG 2 power bank with upgraded wireless charging and active cooling design


SHARGE has introduced the ICEMAG 2 MagSafe power bank (soon available here). It includes a new active cooling system (a fan) and an aluminum backplate to support effective heat management and maintain charging performance. It supports 15W Qi2 wireless charging, aimed at delivering faster speeds compared to traditional MagSafe batteries and improving on the previous ICEMAG model.
Visually, the ICEMAG 2 features a transparent design with RGB lighting for added aesthetic appeal. The power bank also includes a foldable kickstand, allowing for hands-free use and adjustable viewing angles.
Get 'Practical Cyber Intelligence' for FREE and save $79!


Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device.
Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text.
The first release candidate for GIMP 3.0 is here!


Rightly or wrongly, GIMP is perhaps best known for being the app that is first mentioned when people ask for a free alternative to Photoshop. The open-source image editing tool has a large and devoted following, but it is a very long time since it received a significant update.
Now GIMP 3.0 is on the horizon, and ahead of the launch of this massive, long-awaited update, the first release candidate has landed. GIMP 3.0 RC1 is the first major update in around 6 years and it includes a range of new features such as non-destructive filters, numerous updates to the interface, and much more.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.