Latest Technology News

The evolving roles of the CIO and CISO [Q&A]

The relationship between an organization's chief information officer (CIO) and chief information security officer (CISO) has traditionally been somewhat at odds, since CIO's job is built around sharing information and the CISO's job is to secure it. Plus, the CIO was normally higher in the organizational hierarchy, which could also cause some tension.

But the relationship has evolved in recent years, to the point where the two positions are often more on par with each other. And with security's growing importance to the business (and the boardroom), the two jobs often share the same goals and responsibilities.

Continue reading

Xbox Insider Program: A decade of unpaid beta testing for Microsoft?

The Xbox Insider Program, initially known as the "Xbox Preview Program," marked its 10th anniversary in a blog post today. Over the past decade, the program has served as a platform for Xbox enthusiasts to provide feedback and participate in previews, ostensibly contributing to the development of Xbox products and services.

While the program has been touted as a way for fans to directly influence the future of Xbox, it raises questions about the ethics of relying on unpaid labor for product testing. Participants, often referred to as Xbox Insiders, essentially act as beta testers, identifying bugs and suggesting improvements without any form of monetary compensation.

Continue reading

Micron unveils Crucial T705 PCIe 5.0 SSD

Micron has unveiled the Crucial T705 solid state drive. This PCIe 5.0 SSD is built using the company's advanced 232-layer TLC NAND technology, aiming to maximize the potential of Gen5 performance levels. It offers sequential read and write speeds up to 14,500MB/s and 12,700MB/s respectively. These speeds are promise quicker gaming experiences, faster video editing, and more efficient 3D rendering and AI application processing.

In terms of design, the T705 SSD features a premium black aluminum heatsink. This design choice is not just for aesthetics; it serves the practical purpose of dissipating heat efficiently. The SSD is engineered to operate without the need for noisy fans or liquid cooling systems, which could be an advantage for users seeking a quieter computing environment. Additionally, the T705 SSD is backwards compatible with Gen3 and Gen4 motherboards.

Continue reading

Acer unveils new Swift Edge 16 and Swift Go 14 Windows 11 laptops with advanced AI capabilities

Acer has announced the latest additions to its Swift series, the Swift Edge 16 and Swift Go 14. These laptops are designed to offer a blend of AI power and innovative features in a stylish, thin, and light package. Seriously, folks, they are both quite stunning.

These new models are equipped with AMD Ryzen 8040 Series processors, up to AMD Radeon 780M Graphics, and Ryzen AI technology, providing versatile performance and support for Acer’s AI-powered capabilities such as Acer PurifiedVoice, Acer PurifiedView, and the new Acer LiveArt photo-editing feature.

Continue reading

CORSAIR launches K65 PLUS WIRELESS gaming keyboard with compact design and customizable features

CORSAIR has released the K65 PLUS WIRELESS. This keyboard features a compact 75% profile, which saves desk space while including essential arrow and utility keys for convenient game controls. It comes equipped with pre-lubricated CORSAIR MLX Red linear switches, known for their smooth operation and crisp responsiveness. These switches are hot-swappable, allowing users to customize the keyboard with their preferred switches.

In addition to its performance capabilities, the K65 PLUS WIRELESS is designed for a satisfying typing experience. It incorporates two layers of integrated sound dampening to reduce internal noise, resulting in quieter keystrokes. The keyboard is adorned with PBT dye-sublimated keycaps in midnight gray and silver accents, making it a stylish choice for daily use.

Continue reading

Plugable USBC-6950M is a compact dual 4K HDMI adapter for Apple Silicon Macs

Plugable has launched its latest offering, the USBC-6950M. This is a USB-C dual 4K HDMI adapter specifically designed for Apple Silicon Mac users seeking to expand their screen real estate beyond the laptop’s native capabilities. While it is designed for Apple Silicon Mac computers, it is not limited to them -- it is compatible with Chromebooks and Windows laptops too.

The USBC-6950M enables users to connect dual 4K 60Hz displays to their Macs effortlessly. It should be a great option for business travelers, hybrid office users, or anyone aiming to boost the productivity, really. It provides a seamless dual-display experience without the need for a full docking station, making it a convenient solution for those on the move.

Continue reading

Sophisticated phishing campaigns bypass enterprise secure email gateways

Attack route

A new report from Cofense based on data from its Phishing Detection Center identifies over 1.5 million malicious emails bypassing customers' secure email gateways (SEGs), a 37 percent increase in threats compared to 2022.

The report shows that SEGs struggle to keep pace with sophisticated phishing campaigns and that relying on 'good enough' email security is no longer an option for most enterprises.

Continue reading

New solution secures any browser for the enterprise

Computer security

With more and more businesses relying on SaaS solutions, securing the endpoint browser is vital. Often this involves enterprises imposing a particular browser on their users rather than allowing a choice.

In a new approach, Menlo Security is launching a complete enterprise browser solution that can turn any browser into a secure enterprise browser.

Continue reading

Windows 12 Mobile is everything a phone operating system should be

Microsoft made a significant investment in Windows 10 Mobile, including acquiring Nokia to produce its own handsets. Despite the strengths of the tiled mobile operating system, it was unable to compete with the dominant iOS and Android platforms. While Windows 10 went on to become a hugely successful operating system for PCs and tablets, Microsoft was eventually to abandon its mobile ambitions.

Although the tech giant has yet to announce Windows 12, if you’re wondering how that OS would look and perform in the mobile space, we have an answer.

Continue reading

The phishing bait you're most likely to take

Phishing is the most common form of cyberattack as criminals seek to obtain credentials to access bank accounts or corporate networks.

Abnormal Security has analyzed which phishing attacks generate the highest click rate and categorized them based on the words included in the subject line.

Continue reading

TikTok under investigation for failing to protect minors and using algorithms that promote addiction

TikTok on phone

The latest online service to find itself facing scrutiny from the European Commission is TikTok. The Chinese-owned, video-based social media platform faces a probe from the Commission after an initial investigation into whether the company had breached the Digital Services Act (DSA).

Particular areas interest are TikTok's use of algorithms to surface content, with investigators worried about whether they create a "rabbit hole effect" and encourage addictive behavior. TikTok also faces criticisms for various failures to protect younger users, but there are concerns about the overall transparency of the platform, but especially in relation to advertising.

Continue reading

rSIM: A new technology to improve mobile connectivity for IoT devices

A new intelligent SIM card technology, known as rSIM (Resilient SIM), has been introduced in partnership with global operators Deutsche Telekom IoT and Tele2 IoT. The rSIM technology is designed to enhance network connectivity for IoT devices by offering an “always on” solution that aims to improve network resilience.

The rSIM is the world's first resilient SIM card that checks its own network connectivity and automatically switches between mobile operator profiles when disruptions occur. This technology allows two independent mobile operator profiles to be stored on a single SIM card, effectively upgrading a Single SIM device to a Dual SIM. By switching to a backup mobile operator profile in the event of an outage, rSIM aims to reduce the risk of disconnection, providing a potential solution for uninterrupted internet access for IoT devices.

Continue reading

Can Wyze be trusted after recent security incident?

Wyze customers experienced a service disruption last Friday morning due to an outage originating from their partner, Amazon Web Services (AWS). This incident temporarily disabled Wyze devices, preventing users from accessing live camera feeds and event recordings. The company has since apologized for the inconvenience this caused.

During efforts to restore camera functionality, a security issue emerged. Approximately 13,000 Wyze users inadvertently received thumbnails from cameras that were not their own, and 1,504 users interacted with these thumbnails. In some instances, users were able to view event videos from other accounts. Wyze has confirmed that all affected users have been notified and reassured that the majority of accounts remained unaffected.

Continue reading

90-day certificates to drive spike in outages unless businesses act now

Last year, the Chromium Project -- a Google-backed open source browser project -- released its roadmap for building a safer, faster, and more stable Internet, containing recommendations to reduce the lifespan of Transport Layer Security (TLS) certificates from 398 days to 90. This was a starting gun to the industry. As the operator of Chrome, Google has the power to enforce shorter validity periods by making them a requirement -- which will likely become the de facto standard across all browsers soon after.  

When these changes come into force, every business that uses TLS certificates -- i.e. every business that connects services with the internet -- will be impacted. TLS certificates are machine identities, they enable systems to talk to each other securely over the internet. If they are not reissued or replaced before they expire, the service they are connecting stops working. This results in hugely costly outages, disruption, and increased security risks -- and it’s something that everyone has experienced with their browser through a 'can’t connect to untrusted site- error.  

Continue reading

Cybersecurity success -- elevate your defense against cyber threats

As cybercrime continues to increase, organizations must consider actions to improve their cyber security and cyber resilience. There are constantly new ransomware and data breach headlines hitting the news, and, according to research, a company falls victim to a cyberattack every 39 seconds.

To bolster cybersecurity, organizations must maintain constant awareness, and they should regularly update systems, encrypt and backup data. Cyber security is an ongoing action, it requires constant vigilance as cybercriminals are always looking for new ways to exploit systems and steal data. In addition, 85 percent of all organizations consider their data as one of their most valuable assets, and hackers also share this view. Ransomware is not a problem that is going to go away on its own, especially as it continues to be very profitable for criminal cyber gangs. Having said that, there are many things that you and your organization can do to mitigate against becoming another victim of cyber crime.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.