Europe's move toward cybersecurity sovereignty [Q&A]

Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this should be achieved.

We spoke to Christian Have, CTO of Logpoint, to get insight into how US surveillance laws could serve as a catalyst for Europe to take greater control over its data, pushing forward the concept of digital sovereignty.

Continue reading

AI in life sciences and healthcare

The life sciences and healthcare industries have critical challenges to overcome in 2025. Costs in both are on the rise, forcing business leaders to seek out more efficient methods for developing and delivering new products and services. Additionally, consumer expectations are higher than ever, with patients and other clients looking for features that maximize convenience and accessibility.

To help with these challenges, industry leaders should consider the potential of artificial intelligence. AI has been transforming the business world by providing the power to automate, analyze, and increase efficiency in unprecedented ways. For life sciences and healthcare, AI provides the capability to gather and analyze data in a way that drives better outcomes and delivers better consumer experiences.

Continue reading

Coding in the age of AI: Redefining software development

As AI marks its stamp on every industry, the software development landscape is experiencing a rapid transformation driven by the integration of automation into coding practices. With approximately $1 billion invested in AI-driven code solutions since early 2022, we’re seeing a shift that goes far beyond just automation. This transformation is redefining the entire software development lifecycle and testing assumptions about what it means to be a developer.  

It is clear, as we embark at the beginning of a new era, that the future of coding does not reside in opposing change, but in adapting our approaches to education and practice in software development. 

Continue reading

The AI arms race: How machine learning is disrupting financial crime

The financial services industry is in the midst of an unprecedented AI arms race. Criminal organizations are getting smarter, using cutting-edge tech to launch elaborate attacks on financial systems. In response, financial institutions (FIs) are turning to AI and machine learning (ML) to level the playing field. That’s right -- FIs are keeping pace with their criminal counterparts, thwarting malicious activity much more reliably and efficiently.

Having spent my career at the intersection of finance and technology, I've seen the constant race to stay ahead of evolving criminal operations. Rules-based systems, while foundational, simply can't match the speed and adaptability of modern financial crime. But now, through advanced pattern detection, adaptive defense mechanisms, and dramatically improved accuracy in identifying suspicious activity, AI is fundamentally reshaping how we fight financial crime -- and winning.

Continue reading

Gotta go fast! Samsung unveils Sonic the Hedgehog microSD cards

Samsung has partnered with SEGA to introduce a new lineup of Sonic the Hedgehog-themed microSD cards. The Sonic the Hedgehog PRO Plus microSD cards combine Samsung’s storage technology with designs featuring iconic characters, offering fans a functional way to expand their device storage.

The lineup includes designs for Knuckles (128GB), Tails (256GB), Sonic (512GB), and Shadow (1TB), with each card showcasing the character’s face and signature color. Samsung promises “Sonic-speed” performance with read speeds of up to 180 MB/s and write speeds up to 130 MB/s. These cards also feature A2 Application Performance for faster app launches and smoother transitions in gaming.

Continue reading

New investment, state legislation and more penalties -- privacy predictions for 2025

As both businesses and individuals become more reliant on connectivity and data so concerns around privacy are increasingly to the fore.

Here are the views of some industry experts on what the privacy landscape may look like in 2025.

Continue reading

Get 'Resilient Cybersecurity' for FREE and save $39.99!

Building a comprehensive cybersecurity program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively.

With Resilient Cybersecurity readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed today. This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry.

Continue reading

Decentralized solutions, knowing your developer and AI apprentices -- development predictions for 2025

In the past year economic and business pressures, the rise of AI technologies talent shortages and more have put a strain on code pipelines and increased demands on developer teams. This in turn leads to fears around developer strain, product launch timescales and cybersecurity risks.

So what might 2025 have in store for developers? Here's what some industry experts think.

Continue reading

INTERPOL says we should rename pig butchering to romance baiting to avoid victim shaming

Piglet

There are always lots of financial scams running online, and pig butchering is currently one of the most commonly used techniques for parting victims from their money.

But INTERPOL doesn’t like the term, saying it is shaming and puts people off reporting crime. The international crime-fighting agency believes that a shift to the rather fluffier sounding “romance baiting” is important.

Continue reading

Intel has released one fix for poor Arrow Lake performance, and has another in the pipeline

Intel logo on wood

Intel’s recently released Arrow Lake processors were notable for the wrong reasons. Performance was found to be more than a little disappointing, particularly for gamers. A fix was promised, and one has been delivered.

The fix takes the form of a not only an update to Windows, but also a BIOS update. But it does not end there. Intel says that it will be releasing a further update in January which will introduce additional performance optimizations.

Continue reading

At long last, Microsoft makes it possible to use your webcam with multiple apps simultaneously in Windows 11

Advanced camera options Windows 11

Webcam users rejoice: the end of the “Another App Is Using the Camera Already” error message could be nigh.

People have been asking for the ability to use a single webcam in two or more apps at the same time for what feels likes forever. Built ostensibly as an accessibility feature, Microsoft is finally bringing what it is calling “Multi-app camera” to Windows 11.

Continue reading

StarTech.com launches 140W USB-C GaN wall charger with premium 6-foot cable

StarTech.com has announced its latest product, the 140W USB-C GaN Wall Charger, aimed at providing consistent power for high-performance devices, including Apple’s M4 Pro and Max MacBooks, M3 MacBooks, premium laptops, and other USB-C electronics. This charger is designed to deliver reliable power while minimizing heat during extended use.

The 140W USB-C GaN Wall Charger features a design intended to remain cool even under full load, addressing common issues with overheating in similar products. Product Manager Tony Parackal explains, “This charger is designed to provide an optimal continuous peak power delivery while ensuring user and device safety.”

Continue reading

Threat actors spoof email security providers

A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.

The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.

Continue reading

Get 'The Data Science Handbook, 2nd Edition' for FREE and save $60!

Becoming a data scientist is hard. The job focuses on mathematical tools, but also demands fluency with software engineering, understanding of a business situation, and deep understanding of the data itself. This book provides a crash course in data science, combining all the necessary skills into a unified discipline.

The focus of The Data Science Handbook is on practical applications and the ability to solve real problems, rather than theoretical formalisms that are rarely needed in practice.

Continue reading

Credential phishing attacks up over 700 percent

Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.

The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.