Latest Technology News

How many times are you going to think about ransomware in 2024?

ransomware laptop

In 2023, we saw the popular trend of asking "how many times a week do you think about the Roman Empire?", and as an avid Roman Empire fan, my answer was a lot. In fact, the fall of the Roman Empire can be easily compared to ransomware breaches.

In 410 AD, the impenetrable walls of Rome were breached by the Visigoths, signaling an end to the once-mighty empire. The reason for the defeat of the Romans was complacency -- the walls and other defenses were in a state of disrepair, and Rome lacked a substantial military presence.

Continue reading

What to look out for when it comes to cybersecurity regulations in 2024

cybersecurity

It’s been another busy year for cybersecurity regulations. We saw a new National Cybersecurity Strategy by the White House in March, and throughout the year, we’ve seen the National Cybersecurity Center (NCSC) launch several new initiatives to increase cyber resilience.

As mentioned by Joseph Carson, Chief Security Scientist & Advisory CISO at Delinea, the landscape of cybersecurity compliance is expected to "evolve significantly, driven by emerging technologies, evolving threat landscapes, and changing regulatory frameworks."

Continue reading

Enlightenment 0.26.0 Linux desktop environment released -- enhanced stability and new features

The latest version of Enlightenment, 0.26.0, has arrived, bringing a slew of improvements and new features to this popular Linux desktop environment. This release emphasizes on squashing numerous minor bugs, enhancing user experience, and introducing some experimental features.

A key highlight of this update is the extensive list of minor bug fixes, which can be viewed in the detailed git log. Developers have focused on ensuring a more stable and reliable experience for users, addressing various glitches and issues reported in previous versions.

Continue reading

You can now access X alternative Bluesky without an account

Bluesky butterfly logo

Elon Musk's impact at X -- or Twitter as it was when he bought the company -- has broadly been seen as negative. While some have welcomed his maverick approach to managing the social platform, it left many others seeking a new home. Bluesky and Mastodon quickly emerged as viable alternatives, although Meta has attempted to muscle in on the action with Threads.

Each platform has its own set of pros and cons, but a major obstacle for Bluesky is that it remains invite-only. On top of this, it has not been possible for anyone without an account to view posts made by others -- but this is now changing, as is the platform's logo.

Continue reading

WOLFBOX launches Level 2 Electric Vehicle (EV) Charger with Wi-Fi

WOLFBOX has launched its new Level 2 Electric Vehicle (EV) Charger. This new charger looks to be an excellent solution to the fragmented charging landscape in the US, characterized by varied plugs and connectors across different manufacturers and networks. WOLFBOX even provides dedicated customer support for Tesla owners, assisting them in acquiring the required adapter to ensure smooth compatibility.

This charger stands out with its sophisticated features, such as the ability to schedule charging sessions, remotely monitor charging status, and support for RFID cards. With both Wi-Fi and Bluetooth support, it is clearly a very comprehensive package.

Continue reading

The CISO's next priority isn't technology, it's building a great employee experience

CISO

In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in terms of both people and equipment costs, we tend to be equally abstract -- for years, 'mean time to detection' and 'mean time to resolution' have probably been the two most widely-used metrics for cybersecurity progress, and measuring the number of security incidents handled is still probably how the CISO tracks his team’s contribution to the organization.

But no longer. Today we need to start thinking about measuring cyber’s impact in completely new ways -- or to be more accurate, concepts new to us in IT security but already very familiar to our colleagues in HR; with terms that seem very far from threat intelligence, such as wellbeing, inclusion and creating psychologically safe spaces.

Continue reading

ASRock beta firmware makes its motherboards the first to support Windows 11 Dynamic Lighting RGB controls

ASRock RGB lighting support

For anyone who is a fan of the bright and shiny, they can kit out their PC with a range of RGB lighting. Controlling RGB mice, keyboard and other device has long meant battling with a bewildering selection of third-party software, and this is something Microsoft aimed to simplify with the introduction of Dynamic Lighting in Windows 11.

The feature has been available since the release of Windows 11 23H2, and now ASRock has launched new beta firmware that adds Dynamic Lighting support to its motherboards.

Continue reading

AI-powered attacks, AI potential and tailored cloud -- healthcare tech predictions for 2024

telemedicine

Technologies like AI are set to impact on many industries but perhaps more than most on healthcare. This is also an industry that's uniquely attractive to hackers thanks to the mix of personal and scientific information that it holds.

So how will healthcare benefit -- or suffer -- from technology in 2024? here's what some experts with their fingers on the pulse think.

Continue reading

Authenticated content, improved technology and secretless access -- identity predictions for 2024

Despite moves towards other means of authentication passwords are still widely used, making protecting digital identities a problem.

But identity affects other areas too, such as being able to verify content and devices, things which are likely to come more more into focus as we approach significant elections in the US and UK. Here are some expert views on the identity landscape for 2024.

Continue reading

The future of legal roles in an AI-driven world

The advent of artificial intelligence (AI) and large language models (LLMs) marks a significant turning point for the legal sector. Recent studies suggest a dramatic change is on the horizon, with up to 44 percent of tasks in law firms potentially being automated by AI. This impending transformation necessitates a re-evaluation of legal roles, requiring professionals to adapt and collaborate with AI while also preparing for the emergence of new positions.

AI promises to greatly enhance the efficiency and effectiveness of legal services, from streamlining the creation of legal documents, contracts, and agreements to automating repetitive tasks, to ensure accuracy and uniformity. AI's capability extends beyond mere data extraction; it can rapidly summarize complex documents like depositions and complaints and transform text into actionable insights. This will empower legal professionals to better understand and manage legal obligations, which will significantly enhance client services.

Continue reading

Facing a riskier world: Get ahead of cyberattacks, rather than responding after the fact

Risk dial

Today’s complicated threat landscape leaves security teams grappling with new challenges on a scale never seen. Threat actors are more organized and efficient, leveraging a vast ecosystem of tools and services that cater to experts and beginners alike. In early March, the Cybersecurity and Infrastructure Security Agency (CISA) released an advisory warning of the resurgence of Royal ransomware with new compromise and encryption tactics used to target specific industries, including critical infrastructure, healthcare and education.

Cyberattacks are only increasing and growing more destructive, targeting supply chains, third-party software, and operational technology (OT). Gartner predicts that by 2025, threat actors will weaponize OT environments successfully to cause human casualties. This is happening at a time of increased technology adoption led by accelerated digital transformation efforts, hybrid work and the Industrial Internet of Things (IoT) boom, leaving security teams to manage an evolving and growing attack surface and multiplying vulnerabilities.

Continue reading

Best Windows apps this week

Five-hundred-and-seventy-four in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released a troubleshooting tool to fix a printing issue that identified non-HP printers as HP printers. The tool corrects the issue when run.

Continue reading

Sophisticated attacks, changing authentication and quantum threats -- cybersecurity predictions for 2024

Cybersecurity-blocks

Whether it's due to high-profile attacks or new defensive technologies, the world of cybersecurity is never far from the news.

Here is what some industry experts think the cybersecurity trends will be in the coming year.

Continue reading

Google gives Chrome security, performance and functionality updates, with the promise of AI-feature in 2024

Chrome tab groups

Google is in the process of rolling out a trio of important updates to Chrome, kicking off with an improvement to Safety Check. This security feature will now run automatically in the background, allowing for proactive alerts about security issues that need attention.

Other updates include improvements to tab groups that makes it possible to access them on other computers, and enhancements to Memory Saver. But the company also hints at big plans for 2024, with the promise of "smarter and more helpful features" powered its Gemini AI model.

Continue reading

External attack surface management [Q&A]

Firewall

The external attack surface -- those assets which face the internet -- is attracting a lot of attention at the moment, with Gartner naming it as a top security risk.

To find out more about external attack surface management (EASM) and why organizations need to take it seriously, we spoke to Rickard Carlsson, CEO of Detectify.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.