AGON by AOC Q27G4XY 27-inch QHD gaming monitor features Google TV

The AGON by AOC Q27G4XY 27-inch QHD gaming monitor combines gaming performance with built-in Google TV functionality. Featuring a 2560x1440 resolution, 180Hz refresh rate, and 1ms GtG response time, this monitor offers competitive specifications for gaming enthusiasts. Compatibility with AMD FreeSync and NVIDIA G-SYNC ensures smoother gameplay, while HDR10 support enhances color and contrast for a better viewing experience.

With Google TV built into the monitor, users can easily access streaming apps, live TV, and more without switching devices. Google TV’s interface simplifies browsing and searching for content across multiple platforms, while Google Assistant enables hands-free voice control for added convenience.

Continue reading

The top five most-phished industries

New research reveals the top five industries most frequently targeted by specifically tailored phishing attacks using either the recipient's name, email address, phone number, or company name.

The study from Cofense using data drawn from the Cofense Intelligence product between Q3 2023 to Q3 2024 shows, unsurprisingly, that finance tops the list, accounting for 15.5 percent of all credential phishing emails where the product redacted information from the subject in order to safeguard the recipient.

Continue reading

Over 30 percent of organizations need daily specialist support on virtual desktop issues

A new survey of 1,000 front line IT workers from Nexthink finds that 31 percent of organizations have daily virtual desktop infrastructure (VDI) problems requiring specialist intervention.

A further 40 percent are having issues on a weekly basis, as level one and two support staff are often unable to manage the complexity of VDI.

Continue reading

Save $180! Get 'How Machine Learning is Innovating Today's World' for FREE

How Machine Learning is Innovating Today's World provides a comprehensive understanding of the latest advancements and practical applications of machine learning techniques.

Machine learning (ML), a branch of artificial intelligence, has gained tremendous momentum in recent years, revolutionizing the way we analyze data, make predictions, and solve complex problems. As researchers and practitioners in the field, the editors of this book recognize the importance of disseminating knowledge and fostering collaboration to further advance this dynamic discipline. 

Continue reading

Microsoft refuses to ease Windows 11’s strict hardware requirements, despite the ditching of Windows 10

Thumbs down for Windows 11 and thumbs up for Windows 10

With official support for Windows 10 coming to an end next year, those who are still using the operating system are faced with a difficult choice. They can stick with using Windows 10 as an unsupported OS, perhaps turning to a third-party patching service to plug security holes.

Or they can look to upgrade to Windows 11. But this presents a problem. A lot of computers that run Windows 10 are not able to run Windows 11 because of the TPM 2.0 requirement of the newer OS. For anyone hoping Microsoft might finally relent and ease up on this requirement, Microsoft has restated its position, making it clear that it will not be backing down.

Continue reading

Holiday deal hunting mirrored by dark web behavior

Robot hacker

Just as shoppers heading online for Black Friday and Cyber Monday deals a new report from Bitdefender uncovers interesting parallels with behavior on dark web marketplaces.

Cybercriminals too, it seems, browse for the best deals on an assortment of unconventional goods and services. In a digital underground that mirrors traditional e-commerce in many ways, these markets cater to buyers with specific -- and often illegal needs.

Continue reading

New study highlights the ongoing importance of open source

Free and Open Source Software (FOSS) has become a critical part of the modern economy and it's estimated that up to 96 percent of codebases now include it.

In order to understand the impact of open source The Linux Foundation, in collaboration with the Laboratory for Innovation Science at Harvard, commissioned its latest study into the space and today announces the release of the Census III of Free and Open Source Software -- Application Libraries report.

Continue reading

SMEs put at risk by poor mobile security practices

A new report finds that 35 percent of small business employees or owners report clicking on a phishing link via mobile.

The research, carried out by OnePoll for CyberSmart, among 250 small-medium enterprise business owners or leaders in the UK also finds 30 percent of respondents report losing or having had stolen a mobile phone containing sensitive corporate information, leaving their business more vulnerable to potential cybercriminal activity.

Continue reading

Big spend on enterprise AI doesn't always deliver big returns

New research from Digitate reveals that while 92 percent of European organisations have implemented AI and automation, many lack a strategic approach to maximise the impact.

The study, based on a survey of 900 IT decision-makers in enterprises across Europe, finds that organisations have invested on average, €103.4M ($108M) in AI and automation over the last two years, with over half (59 percent) spending up to €295M ($309M). These investments have yielded significant returns, with 86 percent of organizations reporting a ROI averaging €154.7M ($162.4M).

Continue reading

Identity threat detection and response use grows despite challenges

Organizations are facing increasingly sophisticated threats to their identity infrastructure so it's not surprising that a new survey of over 370 IT professionals shows use of identity threat detection and response (ITDR) technology is growing, though many are running into roadblocks to unlocking its full potential.

The study from Quest Software shows 84 percent of organizations are reaping benefits from their ITDR efforts, even if it hasn’t been fully implemented. Over one in three (36 percent) say their expectations have been fully met or exceeded.

Continue reading

How useful is GenAI in software development? [Q&A]

Generative AI (GenAI) holds a lot of promise for software developers: an ability to help them ship code faster, improve productivity, and reduce time spent on menial and repetitive tasks. But how much of that promise are GenAI coding tools actually delivering -- and how much is hype?

We spoke with Matt Hoffman, product manager and data analyst at Uplevel, an engineering intelligence platform that uses data from across developer tools and collaboration platforms to help engineering leaders drive organizational improvements. Uplevel's data science team, Uplevel Data Labs, recently studied the impact of Copilot usage on developer productivity.

Continue reading

Meta wants to harness nuclear power for AI but can Facebook-founder Mark Zuckerberg be trusted?

Meta has announced an ambitious plan to integrate nuclear energy into its sustainability strategy, aiming to secure up to 4GW of new nuclear generation capacity in the United States by the early 2030s. The goal is to power its growing network of data centers and support artificial intelligence innovation while contributing to grid decarbonization. This initiative, while bold, raises critical questions: can Mark Zuckerberg, the man behind Facebook’s data scandals, be trusted to influence the nuclear energy landscape?

Meta’s Request for Proposals (RFP) seeks nuclear energy developers to deliver scalable and cost-effective projects. Unlike the company’s prior ventures into renewable energy sources like solar and wind, nuclear projects come with higher costs, stricter regulatory oversight, and longer development cycles. Meta claims this step is necessary to meet the energy needs of its sprawling infrastructure and AI growth while advancing clean energy technologies. However, critics argue that giving Zuckerberg’s empire a foothold in nuclear energy raises serious concerns about oversight and safety.

Continue reading

Holiday season cybersecurity alert: QR code phishing scams

Thanks to the proliferation of smartphones, QR code usage globally has surged by 57 percent, and by 2025, it is forecast to increase by another 22 percent. And up to eight new QR codes are generated per minute globally.

It is no surprise then why QR codes are everywhere -- on billboards, shopping malls, event brochures, restaurant menus, charity websites, parking spaces, you name it! Of course, the genius of QR codes is their ease of use and convenience. For users, one scan and the job is done, be that registering for an event or purchasing an item.  

Continue reading

Is EasyOS Scarthgap 6.5 the perfect alternative to Windows 11 and mainstream Linux?

EasyOS Scarthgap 6.5 might just be the operating system you didn’t know you needed. As an experimental Linux distribution built with a lightweight and optimized architecture, it offers a fresh approach to desktop computing. With its innovative container technology, streamlined package management, and unique origins in Puppy Linux, EasyOS could serve as a viable alternative to both Windows 11 and traditional Linux distributions, such as Nitrux.

For those frustrated with the resource-heavy nature of Windows 11, EasyOS Scarthgap delivers a more efficient experience. Its foundation in OpenEmbedded ensures minimal bloat, while still providing access to modern applications through AppImage and Flatpak integration. And unlike mainstream Linux distributions that often mirror Windows’ complexity with package management systems like apt or yum, EasyOS simplifies things without compromising functionality.

Continue reading

Cyberwarfare 2025: The rise of AI weapons, zero-days, and state-sponsored chaos

As we approach 2025, the notion of warfare is increasingly shifting from the physical to the digital domain. Cyberwarfare, once considered a supplementary tool for traditional military operations, has now emerged as a primary weapon for nations seeking to assert dominance or inflict damage on their adversaries without the need for physical conflict. Simply put, it is easier, requires fewer resources, and can often cause maximum damage without sustained efforts. The rise of AI-driven cyber weapons, zero-day vulnerabilities, and state-sponsored cyberattacks is creating an unprecedented era of digital warfare.

Nation-states and rogue factions are rapidly integrating cyberattacks into their military arsenals, with cyber operations becoming a first-strike option in geopolitical conflicts. By targeting critical infrastructure -- such as energy grids, communication networks, transportation systems, and supply chains -- these attacks can cripple an entire national infrastructure and create mass chaos without a single physical shot being fired. This shift toward cyber warfare reduces the immediate risk of physical casualties, and in turn allows state actors to engage in asymmetric warfare, where a smaller, technologically advanced nation can punch well above its weight.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.