Yubico YubiKey Bio authentication dongle uses biometrics for added security on Windows, Mac, and Linux

YKBIOC-BIO

Portable hardware authentication dongles are pretty darn cool -- they can be a great way to secure access to various devices, applications, and services using hardware. Google offers its own Titan security keys, for instance, but the search giant likely isn't the first company that comes to mind for these products. Actually, Yubico is probably the name most associated with authentication dongles.

Believe it or not, Yubico's popular YubiKey devices have not yet been offered with biometric support. Thankfully, this changes today. You see, the all-new YubiKey Bio features a fingerprint reader for an added level of security. Not only must you physically have possession of the YubiKey Bio to use it, but you must prove you are its owner by scanning your finger.

Continue reading

Why dev teams need observability to make sense of Kubernetes clusters

Woman looking through magnifying glass

As cloud-native applications and microservices become more complex, developer teams struggle to make the most out of their infrastructure. Observability can cut through cluttered architectures to connect key engineering decisions to business metrics.

Driven by a constant mission for faster performance, improved efficiency, and enhanced business outcomes, developer tools change rapidly to meet the increased pressures on engineering teams. While these tools move in the direction of progress, the pace of change means that dev teams sometimes miss the forest for the trees, and today, one of the industry’s most widely-deployed tools is also its most misunderstood.

Continue reading

Threat hunting on a budget -- it's not as hard as you think…

Threat concept

Global losses from cybercrime now total more than $1 trillion, recent figures indicate, meaning that every business now must implement an effective threat hunting program has to protect its data security -- and long-term future. Establishing a threat hunting program from scratch may seem daunting, but it doesn’t have to be. Like so many things in life, the hardest part is taking the first step.

Even on a tight budget, numerous tools -- with SIEM, logs, and analytics -- can help security professionals start a robust threat hunting program. Below are the three main steps involved:

Continue reading

ExtraHop unveils new threat detection capabilities

data threat

High volumes of threats and shortages of skilled staff can lead to security teams becoming overwhelmed and this has led many companies to turn to professional and managed services.

Network detection and response (NDR) specialist ExtraHop is launching an expansion of its expanded Reveal(x) Advisor service that provides threat detection and hunting capabilities alongside network assurance analysis.

Continue reading

Qualys offers free ransomware risk assessment

Ransomware sign

Ransomware continues to be a major issue, with the FBI recently reporting a 62 percent year-on-year increase for the period ending July 31.

Unpatched vulnerabilities, device misconfigurations, internet-facing assets and unauthorized software rank consistently among the top attack vectors, but how can businesses track them down?

Continue reading

New storage solution cuts data costs and keeps organizations in control

data retention

As the quantity of unstructured data generated globally continues to grow exponentially, the storage needed to cope with it needs to grow too and that adds to cost.

What's more much of this data will be 'cold' -- inactive data that must be stored, protected, and kept accessible for years or decades because of compliance requirements or the value it contains.

Continue reading

Here are all of the known issues with Windows 11

Windows 11 magnifying glass

After months of waiting, Windows 11 is finally here. Microsoft has started the roll-out of the latest version of its operating system to people whose computers make the grade, but if you were hoping for perfection you are going to be disappointed.

Despite all of the testing with beta and developer builds, Windows 11 is still shipping with a number of known issues. Microsoft has shared details of these so you can weigh up whether they will affect you and whether you would like to upgrade to Windows 11 now or wait until things improve.

Continue reading

Over half of enterprise workstations can't run Windows 11

Angry PC user

The latest research by IT Asset Management software company, Lansweeper, has revealed that 55 percent of workstations are not capable of being upgraded to Windows 11.

This will be an issue for enterprise IT teams looking at strategies to install the new operating system which begins its rollout from today.

Continue reading

Windows 11 is generally available starting today -- will you install it?

Windows-11

When Microsoft announced that Windows 11 would start to become available from October 5 it didn’t specify a time zone. That’s because its new operating system will be released in each country as the day begins.

That means, for some lucky users, Windows 11 is already available to install and users can start to buy new PCs with Windows 11 preinstalled on them from today.

Continue reading

Ahead of tomorrow's big launch, Microsoft releases Windows 11 Build 22471

Windows 11 laptop

Tomorrow is a huge day for Microsoft as it’s when Windows 11 starts to roll out to the first batch of compatible systems.

Work continues apace on the new operating system though, and Microsoft today releases a new build to Insiders in the Dev Channel. Build 22471 is the lone build this week and comes with a large number of fixes.

Continue reading

HyperX Pulsefire Mat RGB is a mouse pad that lights up because gamers like flashy things

pr-pulsefire-mat-rgb-2

Remember mouse pads? If you are an older computer user you surely do, but younger folks may have never seen one before. You see, back in the day, mice had a little rubber ball in the bottom that made it work. A mouse pad was a piece of material that went on your desk (and then under your mouse) to make the ball roll better and possibly help keep it clean.

With the invent of optical and laser mice -- and the ultimate death of the aforementioned rubber ball -- mouse pads largely became unnecessary. After all, the new mice often worked perfectly fine on the surface of a desk without such a pad (except, maybe, for glass).

Continue reading

Apricorn Aegis Padlock SSD: An ultra-secure hardware-encrypted solid-state drive that fits in your pocket [Review]

Apricorn-Aegis-Padlock-SSD

If you have personal files that you want to be able to access when on the go, but don’t trust cloud providers to keep them safe, and are worried about the dangers of storing them on a USB memory stick which could be easily lost or stolen, the best solution is to use a 100 percent hardware encrypted USB drive like the Aegis Padlock SSD.

This is a much more secure solution than using software encryption and is designed to meet NIST FIPS (Federal Information Processing Standard) 140-2 Level 2 requirements. The SSD drive protects data as it’s being written with military grade 256-bit AES XTS encryption, and is small enough to fit comfortably in any pocket.

Continue reading

Highlighting the cybersecurity generation gap

Generation gap

Millennials and members of Generation Z suffer more from cyberthreats than baby boomers do, according to a new report from the National Cyber Security Alliance and data analytics company CybSafe.

Kicking off Cybersecurity Awareness Month, the report, based on polling of 2,000 people across the US and UK, shows that 44 percent of millennials and 51 percent of Gen Zers have experienced a cyber threat while only 21 percent of baby boomers have.

Continue reading

How location technology and zero factor authentication could change the security landscape [Q&A]

pin map location

The death of the password has been predicted for a long time, but although it's been augmented by things like multi-factor authentication and biometrics, it still clings to life.

However, businesses are looking for ways to eliminate fraud without impacting the customer experience. One way to do this is to use location technology to provide ‘zero factor’ authentication, allowing businesses to protect themselves and their customers without disrupting the customer experience.

Continue reading

Donald Trump files lawsuit in attempt to force Twitter to reinstate his account

Trump sketch

Things have been a little quiet from Donald Trump since his presidency came to an end. The cessation of online rants was helped by Twitter slapping him with a permanent ban over concerns that his tweets were an incitement to violence.

Having attempted to launch his own social media platform as a replacement, Trump is now trying a new tactic. The former president has asked a federal judge in Florida to get Twitter to restore his @RealDonaldTrump account, claiming that he has been censored.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.