Yubico YubiKey Bio authentication dongle uses biometrics for added security on Windows, Mac, and Linux


Portable hardware authentication dongles are pretty darn cool -- they can be a great way to secure access to various devices, applications, and services using hardware. Google offers its own Titan security keys, for instance, but the search giant likely isn't the first company that comes to mind for these products. Actually, Yubico is probably the name most associated with authentication dongles.
Believe it or not, Yubico's popular YubiKey devices have not yet been offered with biometric support. Thankfully, this changes today. You see, the all-new YubiKey Bio features a fingerprint reader for an added level of security. Not only must you physically have possession of the YubiKey Bio to use it, but you must prove you are its owner by scanning your finger.
Why dev teams need observability to make sense of Kubernetes clusters


As cloud-native applications and microservices become more complex, developer teams struggle to make the most out of their infrastructure. Observability can cut through cluttered architectures to connect key engineering decisions to business metrics.
Driven by a constant mission for faster performance, improved efficiency, and enhanced business outcomes, developer tools change rapidly to meet the increased pressures on engineering teams. While these tools move in the direction of progress, the pace of change means that dev teams sometimes miss the forest for the trees, and today, one of the industry’s most widely-deployed tools is also its most misunderstood.
Threat hunting on a budget -- it's not as hard as you think…


Global losses from cybercrime now total more than $1 trillion, recent figures indicate, meaning that every business now must implement an effective threat hunting program has to protect its data security -- and long-term future. Establishing a threat hunting program from scratch may seem daunting, but it doesn’t have to be. Like so many things in life, the hardest part is taking the first step.
Even on a tight budget, numerous tools -- with SIEM, logs, and analytics -- can help security professionals start a robust threat hunting program. Below are the three main steps involved:
ExtraHop unveils new threat detection capabilities


High volumes of threats and shortages of skilled staff can lead to security teams becoming overwhelmed and this has led many companies to turn to professional and managed services.
Network detection and response (NDR) specialist ExtraHop is launching an expansion of its expanded Reveal(x) Advisor service that provides threat detection and hunting capabilities alongside network assurance analysis.
Qualys offers free ransomware risk assessment


Ransomware continues to be a major issue, with the FBI recently reporting a 62 percent year-on-year increase for the period ending July 31.
Unpatched vulnerabilities, device misconfigurations, internet-facing assets and unauthorized software rank consistently among the top attack vectors, but how can businesses track them down?
New storage solution cuts data costs and keeps organizations in control


As the quantity of unstructured data generated globally continues to grow exponentially, the storage needed to cope with it needs to grow too and that adds to cost.
What's more much of this data will be 'cold' -- inactive data that must be stored, protected, and kept accessible for years or decades because of compliance requirements or the value it contains.
Here are all of the known issues with Windows 11


After months of waiting, Windows 11 is finally here. Microsoft has started the roll-out of the latest version of its operating system to people whose computers make the grade, but if you were hoping for perfection you are going to be disappointed.
Despite all of the testing with beta and developer builds, Windows 11 is still shipping with a number of known issues. Microsoft has shared details of these so you can weigh up whether they will affect you and whether you would like to upgrade to Windows 11 now or wait until things improve.
Over half of enterprise workstations can't run Windows 11


The latest research by IT Asset Management software company, Lansweeper, has revealed that 55 percent of workstations are not capable of being upgraded to Windows 11.
This will be an issue for enterprise IT teams looking at strategies to install the new operating system which begins its rollout from today.
Windows 11 is generally available starting today -- will you install it?


When Microsoft announced that Windows 11 would start to become available from October 5 it didn’t specify a time zone. That’s because its new operating system will be released in each country as the day begins.
That means, for some lucky users, Windows 11 is already available to install and users can start to buy new PCs with Windows 11 preinstalled on them from today.
Ahead of tomorrow's big launch, Microsoft releases Windows 11 Build 22471


Tomorrow is a huge day for Microsoft as it’s when Windows 11 starts to roll out to the first batch of compatible systems.
Work continues apace on the new operating system though, and Microsoft today releases a new build to Insiders in the Dev Channel. Build 22471 is the lone build this week and comes with a large number of fixes.
HyperX Pulsefire Mat RGB is a mouse pad that lights up because gamers like flashy things


Remember mouse pads? If you are an older computer user you surely do, but younger folks may have never seen one before. You see, back in the day, mice had a little rubber ball in the bottom that made it work. A mouse pad was a piece of material that went on your desk (and then under your mouse) to make the ball roll better and possibly help keep it clean.
With the invent of optical and laser mice -- and the ultimate death of the aforementioned rubber ball -- mouse pads largely became unnecessary. After all, the new mice often worked perfectly fine on the surface of a desk without such a pad (except, maybe, for glass).
Apricorn Aegis Padlock SSD: An ultra-secure hardware-encrypted solid-state drive that fits in your pocket [Review]


If you have personal files that you want to be able to access when on the go, but don’t trust cloud providers to keep them safe, and are worried about the dangers of storing them on a USB memory stick which could be easily lost or stolen, the best solution is to use a 100 percent hardware encrypted USB drive like the Aegis Padlock SSD.
This is a much more secure solution than using software encryption and is designed to meet NIST FIPS (Federal Information Processing Standard) 140-2 Level 2 requirements. The SSD drive protects data as it’s being written with military grade 256-bit AES XTS encryption, and is small enough to fit comfortably in any pocket.
Highlighting the cybersecurity generation gap


Millennials and members of Generation Z suffer more from cyberthreats than baby boomers do, according to a new report from the National Cyber Security Alliance and data analytics company CybSafe.
Kicking off Cybersecurity Awareness Month, the report, based on polling of 2,000 people across the US and UK, shows that 44 percent of millennials and 51 percent of Gen Zers have experienced a cyber threat while only 21 percent of baby boomers have.
How location technology and zero factor authentication could change the security landscape [Q&A]


The death of the password has been predicted for a long time, but although it's been augmented by things like multi-factor authentication and biometrics, it still clings to life.
However, businesses are looking for ways to eliminate fraud without impacting the customer experience. One way to do this is to use location technology to provide ‘zero factor’ authentication, allowing businesses to protect themselves and their customers without disrupting the customer experience.
Donald Trump files lawsuit in attempt to force Twitter to reinstate his account


Things have been a little quiet from Donald Trump since his presidency came to an end. The cessation of online rants was helped by Twitter slapping him with a permanent ban over concerns that his tweets were an incitement to violence.
Having attempted to launch his own social media platform as a replacement, Trump is now trying a new tactic. The former president has asked a federal judge in Florida to get Twitter to restore his @RealDonaldTrump account, claiming that he has been censored.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.