Latest Technology News

Windows 11 users can now create their own custom voice commands

Voice shortcuts in Windows 11

For some people, controlling a computer with their voice is a necessity, for others it is simply another means of input to supplement the mouse and keyboard. Microsoft has supported voice control of Windows for quite some time, and the company is working on some major updates to the "voice access" feature that will be available to everyone soon.

In the most recent beta build of Windows 11, voice access has a huge number of new and improved features including support for multiple displays. But perhaps the most exciting addition is the new voice shortcuts features which makes it possible to create custom commands to trigger actions.

Continue reading

Microsoft releases Printer Metadata Troubleshooter Tool (KB5034510) to fix HP printer weirdness

HP logo

Last month, users of Windows 10 and Windows 11 started complaining about an odd problem that saw printers being renamed and the HP Smart app being forcibly installed. It took Microsoft a little while to acknowledge the issue, but ultimately the company conceded that the fault did not lie with HP.

But what those affected by the weird bug have been waiting for is a fix; this is now available in the form of KB5034510: Microsoft Printer Metadata Troubleshooter Tool - December 2023. Microsoft says that the tool will restore any previously downloaded model information and icons and will "remove HP LaserJet M101-M106 model information, icons, and application associations" as well as uninstalling the HP Smart app for anyone without an HP printer.

Continue reading

KLEVV unveils CRAS V RGB Brilliant White Edition DDR5 gaming memory

KLEVV has announced its all-new CRAS V RGB Brilliant White Edition memory kit, which joins the existing Obsidian Black variant. This latest offering offers clock frequencies of 8200MT/s with timings of 38-49-49-131, and 8400MT/s with timings of 40-52-52-134.

This RAM operates efficiently at a voltage of 1.45V, as demonstrated in tests using the AIDA64 Cache and Memory Benchmark tool. However, it's important to note that memory bandwidth test results can vary depending on factors like hardware configurations and system settings.

Continue reading

Cybersecurity for SMEs: Seven steps to a Zero Trust approach

Never trust, verify everything! This is the premise on which the "Zero Trust" approach was founded. This model of cybersecurity involves implementing controls designed to ensure that only verified users can access company resources, and from similarly approved devices.

This strategy is increasingly being adopted in response to the challenges faced by small and medium-sized enterprises (SMEs), such as the continued evolution of hybrid working, the use of Bring Your Own Device (BYOD) and the increase and sophistication in cyber-attacks. Whereas previously SMEs thought they weren’t a target, now they are seen as the weaker link from a hackers’ perspective and increasingly they are falling victims to cyber attacks.

Continue reading

Big prey, big payouts: Big game cyber hunting will return in 2024

2023 has been another wild year for cybercrime. In October, Boeing’s systems were breached through a zero-day vulnerability, with hacking group LockBit threatening to publicly release sensitive files if the ransom wasn’t paid in a week. One month prior, MGM Resorts was hit by a ALPHV/BlackCat social engineering attack estimated to impact the company’s third-quarter financial results by about $100 million. That same month, two major hospitals serving thousands of New York patients struggled to recover from a LockBit cyberattack that forced them to reschedule appointments and divert ambulances to other hospitals.

But what is in store for 2024? Let's look at some of these trends from 2023 in more detail to better understand what will be facing us next year.

Continue reading

AI governance: Five essential design principles to keep businesses ahead of the curve 

In 2023, we witnessed the beginnings of a global AI-driven revolution. With recent studies revealing that one in six UK organizations have already embraced artificial intelligence (AI), these technologies have solidified their position in driving the next wave of digital innovation.

However, until now, organizations have been largely focused on AI experimentation, which has limited the benefits they’ve unlocked. They are now seeking to mature their strategies and embrace AI in a more transformational manner, by embedding these technologies into their core business processes. The launch of solutions like the Open AI GPT Store towards the end of 2023 is set to accelerate this drive for AI maturity, making it easier for organizations to embed ready-built use cases into their operations.

Continue reading

Manjaro Linux 23.1.0 'Vulcan' now available to download -- choose from GNOME, Plasma, and XFCE editions

After months of diligent development, the Manjaro team has finally launched version 23.1.0. Code-named “Vulcan,” this version of the Linux-based operating system is chock full of enhancements and security improvements. Most notably, this release addresses critical security vulnerabilities in the xorg-stack and refines the overall package offerings.

Key highlights of the update include extensive kernel updates. A notable wifi regression issue in kernel 18 has been resolved. The ASUS ROG ALLY 13 now boasts robust support across linux65, linux66, and linux67 kernels. The linux-firmware has been upgraded to its latest December iteration, ensuring up-to-date hardware compatibility.

Continue reading

Patriot Memory and ASUS unveil joint venture -- Viper Elite 5 TUF Gaming Alliance RGB DDR5 RAM

Patriot Memory has announced a collaboration with ASUS' gaming division, TUF Gaming. This partnership marks the debut of the Viper Elite 5 TUF Gaming Alliance RGB DDR5 series, a new addition to Patriot's Viper Gaming portfolio.

The new Viper Elite 5 TUF Gaming Alliance RGB DDR5 series is an advanced version of the previously released Viper Elite 5 performance memory series. It is officially certified by ASUS' TUF Gaming Alliance, ensuring compatibility and reliability for users.

Continue reading

Web application security -- five ways to improve your approach

Business security

Web applications remain one of the most targeted areas for threat actors. According to Verizon’s Data Breach Investigations Report, web application attacks were behind 26 percent of all successful attacks during the twelve months covered. Yet while the methods for attacking web applications are well known and understood, as evidenced by the work that the Open Web Application Security Project (OWASP) has done on their Top Ten list over the years, many companies still find hardening their applications challenging.

Authorization and access control describe the biggest set of challenges identified by OWASP in their most recent Top 10 list (2021) -- three out of the top five issues were around broken authorization, while broken authentication and improper access to resources were also common problems. The OWASP Top 10 for 2021 also includes attacks that work on unrestricted access to sensitive business flows, which covers areas like creating fake accounts, and server side request forgery where APIs can send resources to the wrong locations.

Continue reading

Open to attack: The risks of open-source software attacks

Open-source software (OSS) is now so widely used that it is incredibly difficult to find an organization that doesn’t incorporate OSS in some form or another -- whether that be in a standalone open-source product, or more commonly, in the form of OSS packages. Though its usefulness cannot be doubted, the prevalence of this software is exactly what makes it a major target for cyber-attacks.

A prime example of this is Log4j, a popular logging utility used by scores of organizations for recording events such as status reports and errors. In a situation which came to be known as 'Log4shell', a zero-day vulnerability allowed threat actors to compromise systems using malicious code and take control all while remaining undetected. At the time, its impact was described as "enormous" and the implications of its implementation into countless commercial products underlined the inherent vulnerabilities of some open-source technologies when weak points are exposed.

Continue reading

Get 'Marketing 5.0: Technology for Humanity' (worth $17) for FREE

In Marketing 5.0, the celebrated promoter of the "Four P’s of Marketing," Philip Kotler, explains how marketers can use technology to address customers’ needs and make a difference in the world. 

In a new age when marketers are struggling with the digital transformation of business and the changing behavior of customers, this book provides marketers with a way to integrate technological and business model evolution with the dramatic shifts in consumer behavior that have happened in the last decade.

Continue reading

Pink Corvette crashes into Max as Barbie arrives 

In 1959, a doll came onto the market that was saturated with them. It shouldn’t have been a big deal; a ho-hum moment. Something about it caught on, though, and it became bigger perhaps any toy and things went forward from there. Barbie had every occupation from doctor to architect and even met a boyfriend, Ken. 

Dolls had been around forever, but Barbie caught on for some reason. Inventor Rauth Hadler had noticed something with her daughter, who played with paper dolls -- she gave them adult personas. It’s amazing where ideas can come from. Hadler ran with it and went to Mattel with the idea. The rest we all know. 

Continue reading

Majority of cyberattacks delivered over encrypted channels

In total, 86 percent of all cyber threats, including malware, ransomware, and phishing attacks, are delivered over encrypted channels, according to a new report.

The study from Zscaler also shows threats over HTTPS grew by 24 percent from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels.

Continue reading

Best Windows apps this week

Five-hundred-and-seventy-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Windows Copilot is now also available for Windows 10. Microsoft released cumulative update KB5033372 this week that introduces the AI-powered tool on Windows 10 systems.

Continue reading

Mobile app developers turn to AI for testing

The use of AI tools for mobile app development and testing is growing, and developers and testers are keen to further expand the use of these tools, according to a new report.

The study from Kobiton finds 60 of respondents say they are currently using generative AI tools in their QA cycles to update scripts or code, 55 percent are using these tools to analyze test results, and 47 percent are using them to generate test scripts.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.