Winhance transforms Windows 11 (and Windows 10) into the bloat-free, faster operating system you always wanted


You can tell that people aren’t overjoyed with Windows 11 by the number of great third-party tools that have been developed to fix the OS. The most recent of these is Talon, which can debloat Windows 11 in just two mouse clicks, removing all the bundled junk that Microsoft has shoehorned into its OS, including Microsoft Edge, OneDrive, Copilot, and Clipchamp.
Winhance is another such tool, but it works differently and can be used to debloat and optimize Windows 11 -- and, perhaps just as importantly, keep it that way. Although it’s been designed for Windows 11, it will work just as well on a fully updated version of Windows 10 22H2.
Opening up AI access to unlock decision making [Q&A]


More and more businesses are turning to generative AI in the hope of gaining greater value from their data. But there are issues around governance, access to data and lack of appropriate skills that mean projects can either stall or not deliver as expected.
We spoke to Srujan Akula, CEO of The Modern Data Company, about why he believes that giving 'power to the people' and democratizing AI by putting it in the hands of non-technical users can deliver real business value.
Is a lack of supply chain visibility undermining board-level confidence in cyber security programs?


As we head further into 2025, organizations must focus on bolstering operational resilience and addressing third-party risks, driven not only by commercial imperatives but also by new regulatory mandates. With the enactment of regulations such as NIS2 in late 2024 and DORA early this year, supply chain risk management is now a strategic necessity.
This means that third-party cyber risk management must become a strategic priority. However, according to BlueVoyant’s fifth annual Supply Chain Defence report, which examines fast-evolving supply ecosystems, many organizations don’t appear to be prioritizing supply chain cyber risk management, or are unaware of cyber security gaps in their supply chains.
Help test Fedora on Microsoft Windows Subsystem for Linux (WSL) before official release


The integration of Fedora into Microsoft’s Windows Subsystem for Linux (WSL) is on the brink of completion, and the Fedora crew is rallying the community for assistance. A testing event is pegged for Monday, February 17, 2025, offering enthusiasts an opportunity to experiment with Fedora under WSL prior to its formal release. If you’re equipped with either Windows 10 or 11 and have some free time, here’s your moment to make a contribution.
This Fedora testing event is essentially a community-organized quest for bugs. It welcomes all -- whether you’re a die-hard Fedora supporter or simply intrigued by the idea of Linux within Windows. Requirements include an x86 or AArch64 setup with virtualization capabilities, a readiness to adhere to guidelines, and the capacity to handle downloading large test images.
A new age of fraud: building resilience against adversary-in-the-middle attacks


From phishing scams to business email compromise, fraud is continually evolving and cybercriminals are using increasingly refined tactics to exploit vulnerabilities. Adversary-in-the-middle (AiTM) attacks are also rapidly emerging as an advanced technique that poses pervasive physical and digital risk across industries. In fact, recent research shows a 46 percent increase in AiTM attacks compared to 2023.
Staying ahead of these tactics is increasingly important as fraud becomes more complex. Before we delve into how to actively prevent fraud, we need to firstly explore the nature of AiTM attacks and then look at what’s fueling this increase in fraudulent activity.
Why it's time to guarantee resilience in our critical software


Software has become central to our daily lives, with nearly every major company relying on it to operate. We are all increasingly dependent on fault free software for almost everything we do -- whether it’s ensuring trains run on time, accessing websites or using online banking.
Software has evolved into a form of digital public infrastructure, just as vital as physical infrastructure like roads and utilities. Yet, despite its critical role, software largely goes unmonitored and unregulated.
ACEMAGIC F3A AI 370 MINI PC with AMD Ryzen AI 9 HX 370 now up for pre-order


If you have been waiting for a powerful, AI-driven mini PC, ACEMAGIC has some big news -- its F3A AI 370 MINI PC is now available for pre-order! This thing isn’t just another underpowered compact PC -- actually, it Is built for serious computing such as AI workloads and content creation.
At the core of the F3A is AMD’s brand-new Ryzen AI 9 HX 370 processor, based on Zen 5 and Zen 5c architecture. It has got 12 cores and 24 threads, with a turbo boost up to 5.1GHz, so multitasking and heavy workloads won’t slow it down. But what really makes this machine stand out is its AI-focused hardware. The third-gen Ryzen AI NPU, built on XDNA2 architecture, delivers up to 50 TOPS of AI power. When combined with the CPU and GPU, that number jumps to 80 TOPS, making this mini PC a beast for machine learning, AI inference, and other cutting-edge tasks.
Chimera Linux 20250214 update launches with new apk-tools, Kernel 6.13, and official PowerPC support


Just in time for Valentine’s Day, the much-anticipated 20250214 update for Chimera Linux is here! This version introduces an improved package manager, a more modern kernel, and broadened hardware compatibility.
A key highlight is the upgrade to apk-tools, now boasting variable expansion and a system-wide /usr file structure. This change simplifies mirror switching by eliminating the need for manual edits to repository configurations. Additionally, the update adopts a new v3-style index naming, ensuring backwards compatibility.
Get 'Microsoft 365 Word for Dummies, Second Edition' for FREE and save $18!


Word, Microsoft's powerful and popular word processor, is capable of extraordinary things. From template building to fancy formatting and even AI-powered editing and proofing, your copy of Word stands ready to help you supercharge your productivity and save you time and energy. You just need to learn how it's done. And, thanks to this easy-to-understand book, learning is the easy part!
This latest edition of Word For Dummies is packed with the essentials you need to turn any old copy of the famous word processor into a document-creating, table-formatting, graphics-editing super app. You'll even learn how to customize your version of Microsoft Word so it's absolutely perfect for you, at home and at work.
Enterprise tech buyers reveal their 2025 spending priorities


A new report from Crane Venture Partners looks at the priorities of senior executives who collectively influence $3–$4 billion in annual technology spending.
Respondents include leaders from major companies such as Microsoft, Bloomberg, Procter & Gamble, Kohl's, Arm, Comerica Bank, and NBC Universal. The report finds that while 100 percent of surveyed executives believe AI will shape enterprise operations, only 10 percent have so far fully integrated AI into their workflows.
The security threats organizations are most concerned about [Q&A]


The cybersecurity landscape is constantly evolving and organizations need to stay up to date if they're to adequately protect themselves.
At the end of last year, O'Reilly released its 2024 State of Security survey, which analyzes the threats that concern frontline practitioners most, the projects they're implementing to safeguard systems and infrastructure, the skills companies are hiring for, and more.
WhatsApp is rolling out chat themes to help make every chat unique


WhatsApp has started the rollout of a feature it says that users have been asking for -- chat themes. Using a combination of wallpapers and colored chat bubbles, every conversation can be given its own look.
This is a change that is about more than aesthetics, though. In providing the option to make every chat look different, WhatsApp is making it much easier to identify chats and avoid the tricky issue of sending a message to the wrong person or group.
Ransomware up fourfold as threats get more complex


Analysis of data logged by the Barracuda Managed XDR Security Operations Center shows ransomware threats have increased by four times over the last year.
In 2024, Barracuda Managed XDR logged 11 trillion IT events -- 350,000 per second. Just over a million were flagged as a potential risk and of these, 16,812 were identified as high-severity threats that required immediate defensive action. That’s a small percentage but highlights the need for powerful engines, analysis tools and human expertise to detect them.
Nearly half of organizations suffer third-party security incidents


New research finds that 47 percent of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network.
The study, carried out by the Ponemon Institute for Imprivata, also shows 64 percent of respondents believe these types of third-party data breaches will either increase or remain at alarmingly high levels over the next 12-24 months.
Fraud-as-a-Service allows cybercriminals to launch complex attacks with minimal skills


User-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes are widely available on the dark web according to the latest 2024 Report on Global Identity Fraud from AU10TIX.
FaaS platforms provide all the tools, templates and automation that fraudsters need, including deepfake generators to create synthetic selfies and videos, botnets to automate mass-scale account creation and takeover, and phishing kits for email and web-based scams.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.