Latest Technology News

As-a-Service tools dominate the cyber threat landscape

malware alert

Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools now make up the majority of malicious tools in use by attackers, according to a new study.

The report from Darktrace shows malware loaders (77 percent of investigated threats) are the most common tool, followed by cryptominers (52 percent), and botnets (39 percent).

Continue reading

Plugable launches USBC-HDMI8K USB-C to HDMI 8K adapter

Plugable has launched its new USB-C to HDMI 8K Adapter. Dubbed "USBC-HDMI8K," this latest model is an advancement from its predecessor, featuring HDMI 2.1 compatibility, which allows for improved video and audio performance.

The USBC-HDMI8K adapter is targeted at a diverse user base, including gamers, video editors, and 3D enthusiasts, promising to deliver high-definition visuals with its support for 8K 60Hz, 4K 144Hz, HDR, Dolby Vision, and Dolby Atmos. The adapter's capabilities are aimed at providing a premium viewing and gaming experience, with its support for HDMI 2.1's 48Gbps throughput.

Continue reading

Cisco adds new AI and security innovations

Security and networking specialist Cisco is announcing changes to its Cisco Security Cloud as part of its mission to simplify security.

Cisco Identity Intelligence -- available from July this year -- will run on top of customers' existing identity stores and provides unified visibility, as well as AI-driven analytics.

Continue reading

TEAMGROUP unveils PD20M Magnetic External SSD with Apple MagSafe compatibility for iPhone

TEAMGROUP has announced the PD20M Magnetic External SSD, which is compatible with Apple’s MagSafe technology. In other words, the SSD can magnetically attach to the rear of any iPhone that features MagSafe (iPhone 12 and newer).

The PD20M is equipped with a USB Type-C interface, supporting a wide range of devices, including the latest Apple iPhone 15 Pro and Pro Max smartphones. The drive features a weight of just 40 grams and a thinness of 0.82 cm. The PD20M boasts a magnetic strength of over 0.8 kg, ensuring a secure and instant attachment.

Continue reading

Enterprises hang onto mainframes as migration strategies shift

Black and white mainframe

A new report suggests that faced with mounting competition and economic uncertainty, 92 percent of global enterprises are changing course to retain mainframes as part of pragmatic hybrid strategies, rather than pursuing wholesale cloud shifts.

The latest Mainframe Modernization Business Barometer Report from Advanced, based on a survey of 400 IT leaders worldwide, reveals hybrid infrastructure strategies taking hold to balance workloads across cloud and mainframe. In fact, only six percent expect outright mainframe replacement anytime soon.

Continue reading

IBM makes hybrid cloud easier for smaller businesses with a new version of LinuxONE

IBM logo

IBM is launching a new version of its LinuxONE system, engineered to deliver cybersecurity, resiliency, scalability and AI inferencing for hybrid cloud environments, and making the technology more accessible for smaller and medium businesses.

IBM LinuxONE 4 Express is a pre-configured rack mount system designed to extend IBM LinuxONE to startups and small and medium sized businesses and within new data center environments.

Continue reading

Four reasons your agency's security infrastructure isn't agile enough

Part 1. In an ever-changing world, today’s organizations must have the technology in place to evolve along with it. In the government, agencies need to remain adaptive to achieve their missions in the face of policy changes, geopolitical conflict, and private sector advancements.

For years, enterprise teams have implemented agile software development methodologies to improve their ability to service their users rapidly and reliably; government agencies must follow suit. However, for organizations using or considering agile software development methodologies -- private or public sector -- the security architecture that protects their assets must be equally adaptable. 

Continue reading

The ERP challenges that are keeping security teams up at night [Q&A]

Data is the lifeblood of modern business and enterprise resource planning (ERP) systems are where it's likely to live. ERP software integrates data and business functions across departments like finance, manufacturing, marketing, sales and more, and of course this makes it an attractive target for cyber criminals.

So what threats do ERP systems face and what can enterprises do to defend against them? We spoke to Kellie Synder, CCO of Onapsis, to find out.

Continue reading

Transform Windows 10 or 11 into Windows 7 or Vista with a single command

If you’re currently using Windows 10 or Windows 11, but hanker after the days of Windows 7, then there is a very clever, but simple way to transform your newer OS into the older one. This method can be used to turn Windows 8 or above into Windows 7, or Vista.

This process takes a while to complete, but all you have to do is type a command into the Run box and most things will be handled automatically for you, although you can add extra features (such as Windows Media Player 11) if you wish.

Continue reading

The EU Cyber-Resilience Act's approach to open source must be reconsidered

The draft EU Cyber-Resilience Act (CRA), backed by MEPs in July, is intended to reduce the risk of European citizens experiencing data breaches and malicious attacks on their devices. The CRA aims to achieve this by mandating security best practices across Europe’s tech industry. As part of this, it will enforce minimum security standards for end-user tech products sold across the EU, such as IoT devices, desktop computers, and smartphones. 

To realise its goals, the CRA also needs to apply these standards to the software and hardware that make up the supply chains behind end-user products. However, along with commercial solutions within the software supply chain, the CRA is looking to apply these strict security standards to non-commercial open source projects and communities. This could place tens of thousands of volunteers at risk of legal action and do significant harm to the continent’s tech sector. The legislators behind the CRA need to urgently revisit how they treat open source software.

Continue reading

Qualcomm says the 'next version of Windows' will launch in mid-2024... but is it Windows 12?

Purple Windows 12 logo

Confusion surrounds Microsoft's plans for Windows 12, with conflicting rumors suggesting different launch dates. Development is clearly well underway at Microsoft, and Qualcomm has just added strength to idea that Windows 12 could launch later this year.

While we've heard that Microsoft only plans to release the Windows 11 24H2 update this year, holding off releasing Windows 12 until 2025, Qualcomm's suggestion of a mid-2024 launch for Windows 12 is not the first time this release window has been suggested.

Continue reading

Who will protect us from AI-generated disinformation?

Fake/genuine

Generative AI has gone from zero to a hundred in under a year. While early, it’s shown its potential to transform business. That we can all agree on. Where we diverge is on how to contain the dangers it poses. To be clear, I am pro innovation, and far from a fearmonger. But the recent uptick in misinformation -- largely aimed at polarization around controversial issues of the moment -- has made it clear that, if left unchecked, gen AI could wreak havoc on societies.

We’ve seen this movie before with social media, but it took years and hard lessons for us to wake up to its flaws. We’ve (presumably) learned something. The question today is who will help stem the tide of reality distortion from gen AI, and how? 

Continue reading

Enterprise search through terabytes: Why your findings will surprise you

data search

You know that game where kids dive to the bottom of a pool to pick up toys? It is hard to see what the toys are when they are sitting there on the floor of the pool. It’s only when the kids fish them out of the water that it becomes clear what each toy really is.

It’s the same thing with data. It’s not humanly possible to read through terabytes of text in a few sittings. But let’s say you try. You can retrieve email after email in an email reader, "Office" file after "Office" file in each’s native application, and still miss something that enterprise search can reveal.

Continue reading

Transcend unveils CFexpress 860 Type B card for photography and videography

Transcend has unveiled its new CFexpress 860 Type B memory card, targeting professional photographers, videographers, and filmmakers. The card is tailored for high-end cinema cameras, DSLRs, and mirrorless cameras, offering impressive read/write speeds of up to 1,750/1,500 MB/s. This performance makes it ideal for capturing continuous burst shots and 8K videos, promoting a seamless creative process.

The CFexpress 860 Type B memory card adheres to the CFexpress 2.0 standard, ensuring high-speed data transfer and backward compatibility with selected XQD devices. Its capability to handle 8K RAW video and high-resolution, continuous burst shots without quality compromise is a significant advantage for multimedia professionals.

Continue reading

Tails 6.0 RC1 now available: you can start testing the privacy-focused Linux distribution

The Tails project has launched a release candidate for the upcoming Tails 6.0 Linux-based operating system, inviting the community to participate in testing before the official launch slated for February 27.

Tails 6.0 RC1 is based on Debian 12 (Bookworm) and uses GNOME 43 as the desktop environment. This pre-releases version of the operating system promises a ton of new features, alongside significant security and usability enhancements.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.