Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

MintHands

Ubuntu-based Linux Mint 19.1 'Tessa' Beta now available with Cinnamon, MATE, or Xfce

Windows 10 is getting worse every day. I used to call it a dumpster fire, but now I think it has devolved into an overturned "Porta-Potty" following all-day tailgating at an NFL stadium. Just recently, we learned that Microsoft is causing blue screens of death on its own Surface Book 2 hardware due to a bad update. Problematic updates are just par for the course for Windows 10 these days -- a crap (pun intended) shoot.

If you are tired of living in constant fear that your computer will break due to a faulty Windows update, it is time to finally evolve and switch to a Linux-based operating system. There are countless great choices from which to choose, but for many, Linux Mint is computing nirvana. It is stable, fast, and looks great. Regardless of which desktop environment you choose -- Cinnamon, MATE, or Xfce -- you will be treated to a great user experience. Today, the upcoming Linux Mint 19.1 (named "Tessa") achieves Beta status.

By Brian Fagioli -
Oaxis Timepiece

Oaxis Timepiece -- smart style meets smart tech

For many people wearing a watch is as much about how it looks as how it works. In these days of smart devices that often requires a trade off between style and function.

Do you leave your good-looking watch at home while you wear your smart watch, or do you look a bit needy by putting a wearable fitness tracker or similar on your other wrist? With the Oaxis Timepiece you no longer have to make the choice.

By Ian Barker -
Facebook in work meeting

69 percent of employees use work devices for personal tasks

New research released by security awareness and email protection company Mimecast finds that more than two-thirds of employees admit to personal use of work devices during office hours.

Mimecast surveyed more than 1,000 people who use company-issued devices (such as mobile phones, desktop computers or laptops) in the workplace, in order to understand their behavior, but also their awareness of basic threats plaguing organizations.

By Ian Barker -
Microsoft mission

Windows Lite, anyone? Microsoft said to be working on yet another cut-down version of Windows

Microsoft has already had a stab at a cut-down version of its famous operating system in the form of Windows RT and Windows 10 S... and it seems that the company is looking to have a third try. References have been spotted in the code of Windows 10 to "PRODUCT_LITE" -- apparently a reference to a new version of its OS called either Windows Lite, or just Lite.

While Microsoft has not confirmed anything or made any official announcements, there are numerous references to Lite in recent Insider builds of Windows, as well as in the SDK for the OS. With help from well-placed insiders, it has been possible to piece together some information about Windows Lite.

By Sofia Elizabella Wyciślik-Wilson -
Symantec ICSP Neural

Symantec launches neural network device to protect critical infrastructure

Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportation, but it's often be based on legacy systems which can be difficult to keep secure, with updates often needing to be carried out using USB devices.

The threat of attacks is very real though and the consequences especially disastrous, yet many control systems are running outdated software, leaving them vulnerable to attack.

By Ian Barker -
Malware magnifier

Latest malware tries to avoid detection and maintain persistence

Malware is constantly evolving in an attempt to steal data or make money for the people behind it. A new report by Malwarebytes Labs reveals the latest shift towards attacks that can avoid detection but also stay on a system to be reactivated later.

Using fileless malware is just one example among many attack methodologies currently evading traditional security defenses and maintaining persistence.

By Ian Barker -
Helix_01

X-Doria unveils Defense Helix Car Mount with Qi wireless charging for Android and iPhone

As far as I'm concerned, wireless charging is one of the greatest inventions of the last decade. OK, true, there is still a wire involved since the charger plugs into the AC outlet, but it is just so elegant to not need to plug a cable into your phone. Convenience aside, this will also reduce wear and tear on the port, potentially causing your device to last longer.

Case-maker X-Doria has a new wireless charger, but it is not designed for your home -- unless you live in your car, that is. Yes, the "Defense Helix Car Mount," as it is called, is designed for your vehicle. Not only does it charge your phone (both 7.5W and 10W), but it props it up on your dashboard too.

By Brian Fagioli -
controlling hacker

Popular VTech children's tablet can be easily controlled by hackers

Risk management and cybersecurity specialist SureCloud has discovered that the popular VTech Storio Max children's tablet can easily be hacked, enabling criminals to take control of the devices and snoop on unsuspecting victims.

This can be done by simply adding an image or link to a website. When accessed by a child via the tablet's web browser, the exploit would attack the tablet and enable the attacker to take full control of the device.

By Ian Barker -
Blade-Stealth

Razer Blade Stealth gets improved graphics, 4K display, thinner bezels, and better battery life

Razer is a company that is known for its gaming accessories, but also, its gaming-focused notebooks. Its Blade Stealth laptop isn't a gaming machine, but it is quite svelte and beautiful. Seriously, folks, the Blade Stealth is an impressive Windows 10 notebook.

Today, the Razer Blade Stealth gets a massive refresh. It now has a 4K screen option, thinner bezels, a Windows Hello camera, and significantly improved battery life (up to 13 hours). Best of all, you can opt for NVIDIA GeForce MX150 graphics for modest gaming capability. Thanks to Thunderbolt 3, you can also add an eGPU for when even more power is needed.

By Brian Fagioli -
Google HQ logo

Privacy-focused DuckDuckGo finds Google personalizes search results even for logged out and incognito users

You might well expect that if you perform a Google search while signed into your Google account that the results will be tailored according to what that company has learned about you over the years. But what about when you're not signed into your account?

A study carried out by the privacy-centric search engine DuckDuckGo yielded some slightly surprising results. In tests earlier in the year, it was found that even when people searched without logging into a Google account -- or when they used private browsing mode --  "most participants saw results unique to them", suggesting there was still personalization of results.

By Sofia Elizabella Wyciślik-Wilson -
Apple's best of 2018

These are the best apps, games, music, movies and more of 2018... according to Apple

The end of the year approaches and so the "best of" lists start to emerge. Jumping on the bandwagon is Apple, providing us with a lengthy list of the best apps, games, music, podcasts, TV shows, and just about everything else digital you can think of.

The charts have not been compiled by simply calculating which apps have proved most popular with user. Apple describes it as "an invariable list of the who's who and what's what from the past year" which is a combination of both "top charts and selects from our editors". Are your favorites featured?

By Sofia Elizabella Wyciślik-Wilson -
Microsoft Edge

Hate Edge? Microsoft may be ready to move on to a Chromium-based browser

If Microsoft isn't careful, it is going to start getting through web browsers faster than Google gets through messaging tools. Having moved on from Internet Explorer to Edge, the company is now said to be looking to transition to a Chromium-based browser for Windows 10.

It's fair to say that Edge hasn't won itself too many fans since it first appeared three years ago, so the suggestion that Microsoft may ditch EdgeHTML in favour of a browser based on Chromium is likely to be widely welcomed. Said to be codenamed Anaheim, the news Microsoft has a new rendering engine on the horizon will go down well with those who have been disappointed by Edge.

By Sofia Elizabella Wyciślik-Wilson -
money envelope bung

Fake ransomware 'cures' actually just pay the scammer

In an interesting new trend some companies are claiming to be able to unlock encrypted files following a ransomware attack, but are in fact simply acting as brokers between victims and attackers.

Researchers at Check Point have discovered a Russian IT consultancy named Dr. Shifro that claims to unlock and recover consumers' and businesses' encrypted files.

By Ian Barker -
Santa_Claus_Laptop

Google Santa Tracker gets even better for Christmas 2018

Santa Claus is real. While it is popular to think the jolly fat man is merely fiction, that simply isn't true. Don't believe me? Back in the early 90s, when I was a kid, I asked Santa for a Super Nintendo and I got it! How else can that be explained? Exactly.

If you want further proof that Mr. Claus exists, every year, Google launches a Santa Tracker that allows you to track his gift-delivering journey around the world. The search giant's offering is more than just monitoring Santa's route, however. Actually, Google also shares a fun interactive online "village" with cool games and activities. This year, the Santa Tracker village is better than ever, with such things as an "Elf Maker" which allows you (or your child) design a custom elf. Beginning December 23, users of Google Assistant can ask it "Google, where’s Santa?” to get live location updates.

By Brian Fagioli -
truekey-200x175

True Key by McAfee uses facial recognition to securely store your passwords

After listening to years of security advice, many of us now use different passwords to access various websites. Problem is, how do you store and synchronize this data across your devices? You can’t remember every unique password.

The secret is a password manager which enables you to store a central 'master password' (which you can remember) and then gain access to this securely stored data on any supported device. Problem is, can you trust a centralized password manager after previous security issues?

By Chris Wiles -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

Categories

AI Technology Software Hardware Security

Quick Links

About Us Privacy Policy Cookie Policy Sitemap

© 1998-2025 BetaNews, Inc. All Rights Reserved.