Ubuntu-based elementary OS 6 'Odin' Linux distribution is now available for download

odin-linux

Why don’t more desktop computer users run Linux-based operating systems? Well, software compatibility aside, there is fear of change and the unknown. For a user to switch from Windows, it need to be a fairly simple affair. For years, just installing a Linux distribution was a daunting task. These days, however, it can be faster and easier than installing Windows -- depending on the distro, of course.

For Linux beginners, once installed, their chosen distro should be easy to use with an intuitive desktop environment. I'm a big fan of GNOME, but understandably, not all folks like it -- especially Linux novices. One particular Linux-based desktop operating system has been focusing on accessibility to all -- elementary OS. This distribution is polished and focuses on being easy to use. It is a good choice for both experts and beginners alike. Today, elementary OS 6, code-named "Odin," becomes available for download, and it is loaded with exciting changes.

Continue reading

Parallels Desktop 17 for Mac is here with support for Windows 11 and macOS Monterey

Parallels

Virtualization software Parallels Desktop 17 for Mac is now available, and the latest update brings with it a host of important changes and additions. Among the highlights of the latest version is full support for not only Windows 11, but also macOS Monterey. Both of these operating systems have yet to be released, but Parallels is ready for them, meaning eager testers can get on and try them out.

Parallels Desktop 17 for Mac also boasts support for Apple's M1 chip as well as more traditional Intel-based platforms. The update also sees huge performance improvements with an improved gaming experience and better USB support.

Continue reading

Businesses need to focus on the basics to defend against ransomware

Ransomware skull

A new whitepaper released today by O'Reilly and based on a survey of tech professionals experiences of ransomware concludes that basic security practices like backups are key to surviving an attack.

Of 950 respondents to the study only six percent had experienced a ransomware attack directly in the organization they work for and, by and large, these organizations have strong security measures in place.

Continue reading

YHE's BP Doctor Smart Watch measures your blood pressure with an inflatable wrist band [Review]

BP-Doctor

Although my Apple Watch is capable of doing a lot of things, such as delivering messages and letting me reply to them, reporting on the weather, and controlling my music, it’s the many health functions I get the most from.

BP Doctor Smart Watch is much more affordable alternative to the Apple Watch that offers a wealth of similar health monitoring tricks, including recording your heart rate and blood oxygen levels, sleep time and HRV (Sleeping Heart Rate Variability), activity (outdoor walking, and indoor or outdoor running) and calories burned. It also has another impressive ability, and one that gives the device its name -- it can record your blood pressure.

Continue reading

Banks speed up their AI adoption to combat money laundering

AI money

A third of financial institutions are accelerating their AI and machine learning adoption for anti-money laundering (AML) technology in response to COVID-19.

Meanwhile, another 39 percent of compliance professionals say their AI/ML adoption plans will continue, despite the pandemic's disruption, this is according to a new study by analytics company SAS, consultancy KPMG and the Association of Certified Anti-Money Laundering Specialists (ACAMS).

Continue reading

Firefox 91 improves its Total Cookie Protection to block more third-party trackers

firefox-logo-blue-background

Another month, another major Firefox update. This time, Firefox 91 brings with it two major changes of note: improvements to its Total Cookie Protection feature, and support for logging into Microsoft, work and school accounts through Windows single sign-on.

Total Cookie Protection, introduced back in February when Firefox was a mere 86 iterations old, aims to confine cookies to the site where they were created as part of an attempt to put the brakes on invasive tracking cookies from third-party companies.

Continue reading

Enterprise network access for sale on underground forums

businessman money key

We know that cyber criminals are increasingly operating in a businesslike way and using underground marketplaces to sell services and information.

A new report from threat intelligence specialist IntSights looks at one particular aspect of this trend which is the sale of access to already compromised networks.

Continue reading

Salesforce misconfiguration can expose sensitive data

security flaw

Researchers at Varonis are warning about a Salesforce misconfiguration that can expose sensitive data to anyone on the internet.

The issue is in the Salesforce Community, which lets Salesforce customers create their own websites to connect with users outside their organization and collaborate.

Continue reading

Microsoft launches Xbox Cloud Gaming beta in the Xbox App on Windows 10 and Windows 11

Xbox Cloud Gaming

Microsoft has launched a beta version of its cloud gaming service for Windows. The Xbox Cloud Gaming beta is available in the Xbox app in Windows 10 and Windows 11, greatly expanding the gaming options available to PC users.

Using Xbox Cloud Gaming with the Xbox App provides access to scores of Xbox games for Windows users, but there are a few caveats to bear in mind.

Continue reading

Google Titan Security Keys ditch Bluetooth

Google_Titan_Security_Keys

Google's Titan Security Key dongles are a great way to secure accounts using hardware rather than only relying on software. The search giant has offered these little devices for years now with USB-A, USB-C, and Bluetooth connectivity.

Back in 2019, Google discovered a vulnerability in its Bluetooth-capable Titan Security Key that lead to a recall. With that said, it is not surprising that in 2021, the search giant is dropping that wireless connection option entirely. You see, starting tomorrow, the Google Titan Security Keys are ditching Bluetooth to instead rely on NFC -- in addition to USB, of course.

Continue reading

Launching a new product in an existing market: What you need to know

software development

No matter the timeline, no matter the market, launching a new product is never easy. Even the most innovative companies look for ways around the challenges that they face when developing and introducing new products. If you’re launching a new product in an existing market, it’s tempting to rely on your existing code and infrastructure. Building on existing projects, though, might have unforeseen drawbacks.

There are two significant factors that can hamstring innovation and creation. First, building toward an audience of existing customers can mire new thinking and possibilities. Second, using a code base from an existing product can close doors that designers didn’t know existed in the first place. If you rely on existing products, development of your new project could be slowed to a crawl, as the old or existing code can stifle the flexibility needed for the new product and limit creativity.

Continue reading

The underground marketplaces behind cybercrime [Q&A]

hacker laptop

In the last few decades, we've seen cybercrime transform from an activity perpetrated by independent lone actors into an increasingly professional business endeavor in pursuit of profit.

Cybercriminals communicate and collaborate, working together and exchanging information on the deep and dark web. But what exactly is up for sale on these underground markets and what does this tell us about threat actor behavior and motivation?

Continue reading

Six months on from Brexit, how has it affected the IT industry?

Brexit flags

It's now been five years since the United Kingdom voted in a referendum to leave the European Union, and six months since it actually left.

With the promise of freedom to 'take back control' of the UK's borders, potential new opportunities for Britons and a plan to make the UK a global leader in innovation, there's still a lot up in the air. What has been apparent, however, is that almost all aspects of businesses have been impacted by Brexit in some way or other, from supply chain complications, to staff shortages, to confusion around GDPR and data protection rules.

Continue reading

Thousands sign letter asking Apple to scrap plans to scan users' photos for child abuse images

Apple spying

An open letter signed by privacy advocates, security experts, technology companies and legal specialists has been sent to Apple, decrying the company's plans to scan the photos of Mac, iPad and iPhone users for evidence of child abuse.

While on the face of it, Apple's "Expanded Protections for Children" plans are a good thing, it has also come in for heavy criticism. With the release of macOS Monterey, iOS 15 and iPad OS 15, the company is implementing CSAM (Child Sexual Abuse Material) detection which will check image hashes to see if they feature in databases of known abuse images. It has been likened to creating a backdoor to users' files and has horrified privacy experts.

Continue reading

ASUS BIOS update gives motherboards TPM 2.0 support ready for Windows 11

ASUS Windows 11 support

ASUS is one of the first motherboard manufacturers taking steps to ensure that its customers will be able to enjoy Windows 11. The company has released BIOS updates for a number of its boards which automatically enable TPM 2.0 support.

The hardware requirements for Windows 11 have proved confusing and controversial in just about equal measure, but it is the need for TPM 2.0 that has caught many people off guard. Even for people with systems that have TPM 2.0 and therefore support Windows 11, there is the potentially difficult process of enabling the feature. With its latest BIOS updates for both AMD and Intel mobos, ASUS has eliminated this step so there is no need to manually enable it.

Continue reading

Load More Articles