ZAGG unveils new USB-C hubs and docks to supercharge productivity


Today, ZAGG rolls out a fresh lineup of USB-C accessories that can transform your portable device into a makeshift desktop. The company’s latest offerings include the 4-Port Hub with Wireless Charging, 6-Port Media Hub, 9-Port Hub, and the Pro Dock -- all aimed at elegantly expanding connectivity for both laptops and tablets.
Brad Bell, ZAGG’s senior vice president of global marketing, highlighted the purpose behind these new hubs, saying, “In a fast-paced world, our new line of productivity solutions helps people stay ahead by transforming their laptop or tablet into a powerful workstation.”
Google Pixel 9a crushes Apple iPhone 16e with smarter AI and a better price


After many leaks, Google’s Pixel 9a is finally here! For anyone not locked into Apple’s ecosystem, it’s looking like the smarter choice over the iPhone 16e. At just $499, it packs AI-powered features, a pro-level camera system, and the powerful Google Tensor G4 chip -- all at a lower price than Apple’s so-called budget offering.
The Pixel 9a isn’t just another mid-range phone -- it’s got some legit flagship-level perks. Its 6.3-inch Actua display is the brightest ever on an A-series phone, hitting 2700 nits, while the 120Hz refresh rate makes for smoother scrolling than the iPhone 16e’s 60Hz screen. Google’s color choices -- Peony, Iris, Porcelain, and Obsidian -- also bring more fun and variety compared to Apple’s standard options.
Vanta launches new features to boost compliance and trust


Trust management platform Vanta has announced a series of new features and capabilities to help security and GRC teams seamlessly collaborate across their organization and extended network.
With 65 percent of businesses reporting that customers, investors and suppliers increasingly require proof of compliance, maintaining a strong security posture is essential for growth and unlocking new market entry. Vanta's new features simplify delegation, improve contextual communication and ensure accountability, allowing businesses to use their network of employees, vendors, auditors and customers to maintain continuous compliance.
Increase in stolen identity records fuels cybercrime


A new report from SpyCloud highlights a 22 percent increase in stolen identity records since 2023.
These identity records, consisting of harvested employee, consumer, and supply chain data, are the fuel that power cyberattacks like ransomware, account takeover, and fraud with nearly 80 percent of breaches last year involving the use of stolen credentials.
Browser-based phishing attacks up 140 percent


New research from Menlo Security, based on analysis of more than 750,000 browser-based phishing attacks, shows a startling 140 percent increase compared to 2023, and a 130 percent increase specifically in zero-hour phishing attacks.
Microsoft, Facebook, and Netflix are the brands most commonly impersonated in browser-based phishing attempts. However, generative AI services are also increasingly impersonated with nearly 600 incidents of GenAI fraud identified, in which imposter sites used GenAI platform names to manipulate and exploit unsuspecting victims.
84 percent of enterprises are struggling to manage cloud spending


With cloud spending expected to increase by 28 percent in the coming year, a new poll of over 750 technical professionals and executive leaders worldwide finds that 84 percent see managing cloud spend as their top challenge.
The study from Flexera shows 33 percent of organizations are spending more than $12 million annually on the public cloud alone partly driven by AI adoption. With cloud budgets already exceeding limits by 17 percent, organizations are increasingly turning to managed service providers (60 percent) and expanding use of their FinOps teams to regain control over spending (59 percent).
How the role of CISO is evolving [Q&A]


The overall threat landscape facing organizations is expanding, yet many of the threats such as phishing remain the old favorites. What's more, AI is making them more effective by eliminating many of the old tell-tale signs.
With the evolving challenges and risks facing them, how can CISOs effectively network internally and externally to gather support of the broader team and build an appropriate security posture? We spoke to Robin Bell, CISO at Egress, to find out.
Microsoft’s slow, piecemeal killing of the Control Panel in Windows 11 continues


The death of the Control Panel has been anything but quick and painless. The gradual migration to the Settings app has seen the Control Panel lingering on in a software hospice as Microsoft slowly chips away at it.
This legacy component of Windows remains home to various system settings that cannot be changed elsewhere, but hints have been spotted in builds of Windows Server that the end is drawing closer.
Google announces new healthcare tools and features, including advice from people with the same symptoms as you


When illness strikes, many people turn to 'Doctor Google' for health advice. While this can be helpful in many cases, searching for symptoms can also throw up some terrifying potential 'diagnoses', but AI has been used to try to avoid providing either fearmongering suggestions or unhelpful advice.
Google is aware that it is often a first port of call for people trying to work out what condition they may have and how to best approach treatment, and the company has announced numerous improvements and new feature to make its offerings more helpful and trustworthy -- as well as starting to provide suggestions from non-medical experts.
Microsoft celebrates half a century with ugly, low effort wallpapers -- and we love it


2025 is a massive year for Microsoft as the company celebrates its 50th birthday. It's been (nearly) half a century since the tech behemoth, founded by Bill Gates and Paul Allen, first came into existence on April 4, 1975, and to celebrate its golden jubilee, Microsoft has decided to mark the occasion with four new wallpapers for your phone, which it's shared on X.
The post reads: “50 years of innovation, memories, and moments that shaped us. To celebrate, we’re sharing some nostalgic wallpapers. Download yours and relive the magic.”
Fedora Linux 42 Beta is here with KDE edition, COSMIC spin, Asahi Remix, and major updates


Fedora Linux 42 Beta has officially landed, and it’s packed with a ton of awesome changes. This release gives KDE Plasma Desktop full edition status, introduces the COSMIC spin, and rolls out Fedora Asahi Remix 42 Beta for Apple Silicon Macs. There’s also a big refresh to the Anaconda installer, improvements to DNF5, and a slew of updated packages.
For KDE fans, Fedora Linux 42 finally makes Plasma an official edition, putting it on the same level as Workstation, Server, IoT, and Cloud. It’s also now officially supported on Power Systems (ppc64le), including OpenPOWER machines like the Talos Workstation. That means users on those platforms get the full KDE stack, including KDE PIM.
Gotcha CAPTCHAs being used to spread malware


We've all become used to completing tests to prove we're not robots, but a new report from HP Wolf Security highlights the rising use of fake CAPTCHA verification tests which allow threat actors to trick users into infecting themselves.
The technique shows attackers are capitalizing on people's increasing familiarity with completing multiple authentication steps online -- a trend HP describes as 'click tolerance'.
Infostealers account for surge in identity-enabled attacks


Analysis of almost 93,000 threats detected within more than 308 petabytes of security telemetry by Red Canary shows infostealer malware infections on the rise across both Windows and macOS platforms.
Used to gather identity information and other data at scale, in 2024 LummaC2 was the most prevalent stealer detected in 2024, operating under a malware-as-a-service model, and selling for anywhere from $250 per month to a one-time payment of $20,000.
Number of compromised credentials up by 33 percent


The latest Global Threat Intelligence Report (GTIR) from Flashpoint finds that threat actors compromised over 3.2 billion credentials in 2024, a 33 percent increase from the year before.
Of these 75 percent or 2.1 billion, were sourced from information stealing malware, a dangerous new twist on an older threat that has infected over 23 million devices worldwide.
The cost conundrum of cloud computing


For most businesses, change is driven by the need to reduce risk and innovate, while optimizing cost and return on investment. In the case of cloud adoption, the powerful functionality offered by these platforms enable businesses to streamline, optimise, and make their workflows more efficient which, in turn, helps reduce costs. Organizations are always looking for the best solutions for optimizing efficiency and reducing costs, particularly in uncertain economic times.
Yet, in reality, migrating to the cloud does not always bring the cost optimization and savings that an organization is looking to benefit from. Depending on which cloud solution is being evaluated, along with how the solution is designed, built, and deployed, the result may not deliver on the project’s original goals.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.