Move up to Windows 10 Professional for just $39.99 and tap into the benefits of Hyper-V virtualization

Hyper-V

Hyper-V is Windows’ built-in virtualization technology, hard-wired into Windows 10 Professional to allow you to easily run multiple operating systems on a single PC. You can use it to resurrect old programs and hardware no longer compatible with Windows 10, explore alternative operating systems such as Ubuntu or use it as a test environment.

"But I can do all this for free with VirtualBox!" you’ll say. And you’d be correct -- to a degree. There’s one critical reason why Hyper-V is a better option than VirtualBox, and that’s raw performance. VirtualBox is a software emulator, which means that it sits on top of Windows and can never match native performance, whatever tweaks you perform.

Continue reading

Cybersecurity best practices to help protect businesses

identity login

Cybercrime can hit any business and the costs of an attack can prove crippling. In order to protect themselves companies need to adopt best practices, but where to start?

Cloud-based customer identity access management (CIAM) platform LoginRadius has created an infographic looking at the risk and what organizations can do to protect themselves.

Continue reading

Sabrent unveils record-breaking 8TB Rocket Q NVMe PCIe M.2 2280 SSD

32932FFA-6635-451D-892C-EF4738EAA3EB

We recently told you about an exciting new drive by OWC -- the 4TB Aura P12 M.2 NVMe solid state drive. What made that SSD so interesting was its massive 4TB capacity, which was pushing the boundaries of what is possible with an M.2 drive.

Well, folks, a 4TB PCIe M.2 SSD is now "old hat." You see, Sabrent has a new drive that doubles that capacity! Yes, the company's Rocket Q NVMe PCIe M.2 2280 SSD will soon be available in a mind-blowing 8TB -- the first ever such consumer PCIe M.2 SSD to achieve that capacity.

Continue reading

Microsoft releases Windows 10 Build 19631 and ARM64 VHDX

Windows-10 key

Microsoft has had a busy week at Build. Among the many announcements were new versions of Terminal and PowerToys, a Windows Package Manager, and support for graphical apps in the Windows Subsystem for Linux.

Today the software giant rolls out a new Windows 10 build for Insiders on the Fast ring.

Continue reading

How COVID-19 has accelerated the move from a 'cloud first' to a 'cloud now' approach

Cloud visibilty

Recent market data from Synergy Research Group via CRN suggests 2019 was a milestone for IT and that for the first time ever, enterprises are spending more money annually on cloud infrastructure services than on data center hardware and software. For example, total spend on cloud infrastructure services reached $97 billion, up 38 percent year over year, whereas total spend on data center hardware and software hit $93 billion in 2019, an increase of only 1 percent compared to 2018.

This means that many companies that have historically owned, maintained, and managed their own IT operations in their own data center are now evolving how they support their business operations by transforming their IT to cloud.

Continue reading

Securing the cloud for healthcare

The Cloud is a $200 billion business that analyst firm IDC expects to nearly double in valuation by 2022. It enables collaborative productivity apps, on-demand entertainment, and promises much needed advances in telemedicine. But all this potential will come crashing to a halt unless we take seriously the corresponding rise of cloud-based cybersecurity threats. The increase we have seen in cyber-attacks seeking cloud-based data is worrisome and the potential for crippling the healthcare industry is high especially given the current global climate and their dependency on cloud-based services.

Recent warnings and actual attacks are a prominent example of the active and persistent threats to our global healthcare networks, economy, and connected infrastructure. Organizations involved in national and international COVID-19 responses are being actively targeted by hacking teams and threat groups. This is according to a recent alert from DHS ‘s Cybersecurity and Infrastructure Agency (CISA) Europe’s largest hospital.  In addition, the Czech Republic warned of expected cyberattacks targeting healthcare systems designed to damage or destroy computers in critical healthcare infrastructure.  And last month, Interpol announced that its Cybercrime Threat Response team had detected a significant increase in ransomware extortion schemes against healthcare organizations and infrastructures.  The list goes on…

Continue reading

Awareness of the digital accessibility divide: A silver lining of The COVID-19 crisis?

Braille

Most of us have adapted quickly -- perhaps seamlessly -- to increased reliance on digital devices for the day-to-day processes of life and business. For many people with disabilities however, it’s a very different picture.

Today is Global Accessibility Awareness Day, so for a few minutes let’s put ourselves in the place of a person with a visual, hearing, motor or cognitive disability. With many physical places of business now closed, essential activities like banking, shopping and working must be solely conducted online or at great personal peril.

Continue reading

Brand new Kodi update available -- download it NOW!

Kodi 18

It’s been three months since the Kodi Foundation last released a new version of its hugely popular home theater software.

After spending some time in the pre-release section, Kodi 18.7 is now finally ready for all.

Continue reading

0Patch releases micropatch for Windows 7 and Server 2008 R2 to address PrintDemon vulnerability

Windows 7 0patch

Last week, security researchers Alex Ionescu and Yarden Shafir published an analysis of a new Windows vulnerability that they named PrintDemon. The analysis included a proof-of-concept demonstration that worked on Windows 7 and newer versions of Windows.

PrintDemon, in a nutshell, is an elevation of privilege vulnerability that "allows arbitrary writing to the file system" upon successful exploitation.

Continue reading

Free service measures Dark Web information exposure

Dark web hacker

Suffering a data breach is bad enough, but arguably worse is not knowing how much of your organization's data has been exposed as a result.

Now you can find out thanks to ImmuniWeb launching a free online service to check how bad a company/organisation's exposure is on the Dark Web and hacking resources.

Continue reading

Less development please, we're British and we have coronavirus

decline graph

New research from DevOps automation specialist Sonatype has discovered that software development activity in the UK decreased by 28 percent since February.

However, the UK position contrasts with some other countries where development activity has continued to grow in the midst of the pandemic. Notably, this includes the United States with a six percent increase and Germany with a 12 percent increase since January 2020.

Continue reading

Transcend launches DrivePro 10 dashcam

7DAA62F5-E7E6-4880-9713-1F8F7ED0BDCE

Have you ever seen someone with a dashcam in their vehicle and wondered why they have such a thing? No, they are not just obsessed with recording every aspect of their life -- a dashcam has actual benefits. For instance, if you are in a car accident, or someone with road-rage attacks you (it happens), the recording could provide evidence to show to the police or an insurance company. It's one of those things that you don't think you need -- until you do.

Today, Transcend launches a new dashcam that is chock-full of features and nice specifications. Called "DrivePro 10," it features a small and attractive body that should look quite stylish in your car, truck, or SUV. It comes with an adhesive mount for your windshield and is powered by micro USB -- a "lighter" adapter is included in the box. If you prefer, an optional accessory allows you to hardwire it directly to your vehicle's fuse box for power.

Continue reading

Check Point fixes a 20-year-old Linux security issue

business security

For around two decades now, hackers have exploited the design of the memory management system used by Linux programs in order to take control of a target's computer.

Now though researchers at Check Point have introduced a new security mechanism for Linux users called 'safe-linking' which means attackers will need more than one vulnerability in order to take over the program.

Continue reading

How to use DNS over HTTPS in Chrome

Cartoon Chrome logo

With more and more people expressing concern about privacy and security online, companies have had to start to take notice and deliver tools to help. This is particularly noticeable in the browser market, and with the latest version of Chrome, Google has doubled down on security.

Having tested DNS over HTTPS (DoH) for some time, Google has added enhanced support for DNS lookups over an encrypted HTTPS connection to Chrome 83.  In the Windows, macOS and Linux versions of the browser, Google's implementation of the security feature is called Secure DNS; here's how to use it.

Continue reading

Lexar unveils Professional NM700 M.2 2280 PCIe Gen3x4 NVMe SSD

C5211900-574C-476D-B4F9-E79E4276543F

There is no shortage of news about solid state drives these days, with many new models being announced from popular manufacturers like ADATA, Samsung, and Kingston, to name a few. This includes both SATA and PCIe-based internal SSDs, plus external models that interface by USB and Thunderbolt 3.

Today, Lexar unveils an all-new solid state drive for professionals, although home consumers can obviously use it as well. Called “NM700,” it is an M.2 2280 PCIe Gen3x4 NVMe SSD with impressive performance.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.