Latest Technology News

NordVPN comes to Apple TV

NordVPN has officially launched a dedicated application for Apple TV's tvOS 17. The new NordVPN app, designed specifically for the latest version of tvOS, aims to enhance the streaming experience while bolstering online privacy.

Previously, Apple TV users looking to secure their device with NordVPN had to install the VPN service on their Wi-Fi router. This extra step is now obsolete with the direct availability of the NordVPN app on Apple TV. Users can enjoy enhanced privacy and security with just a click, directly from their TV interface.

Continue reading

A new era of work: How AIOps and Unified Observability can take DEX to new heights

Businesses are in the early stages of a new era of employee relations as both the workplace and the workforce undergo significant changes. The pandemic accelerated the shift to hybrid work environments, which has, in turn, accelerated the ongoing digital transformations that made hybrid work possible in the first place. Meanwhile, baby boomers are retiring, Millennials are moving into management, and the Gen Z cohorts are just starting their careers.

The digital natives now populating companies have discriminating expectations for how technology works for them. For example, Riverbed’s Global Digital Employee Experience (DEX) Survey found that 68 percent of employees would leave the company if they were unhappy with the DEX. Companies that fail to provide seamless DEX -- which covers the full range of how employees engage with technology at work, from an intranet to email and collaboration platforms to HR systems -- risk frustrating employees when things do not work as expected. This not only increases the chances employees may look for another employer, but a faulty DEX brings losses in productivity and potential damage to a company’s reputation.

Continue reading

PSD3, Banking-as-a-Service and fewer passwords -- fintech predictions for 2024

In recent years, the financial sector has seen some of the biggest changes in the way technology is used. New regulations and disruptive technologies like blockchain, along with the rise of open banking, have seen traditional players scrambling to keep up with more agile newcomers.

So what does the fintech sector have in store in 2024? Here are the views of some industry experts.

Continue reading

Use of distributed cloud expected to rise over the next year

developer

Both developers and decision makers are seeing a shift in the market towards a more decentralized cloud, according to new research.

The study from Akamai, in partnership with ClearPath Strategies and SlashData shows 55 percent of developers already actively work on distributed cloud architectures, 87 percent of ITDMs expect their use of the distributed cloud to increase over the next 12 months.

Continue reading

What is open source silicon root of trust? [Q&A]

You may have come across the term 'root of trust', it’s a source, such as a hardware module, that can always be trusted within a cryptographic system. The system trusts the keys and other cryptographic information it receives from the root of trust module as always authentic and authorized.

Mostly this involves being tied into a specific vendor, but OpenTitan has developed an open source silicon root of trust for use in for use in data center servers, storage, peripherals, and more.

Continue reading

Windows 11 users can now create their own custom voice commands

Voice shortcuts in Windows 11

For some people, controlling a computer with their voice is a necessity, for others it is simply another means of input to supplement the mouse and keyboard. Microsoft has supported voice control of Windows for quite some time, and the company is working on some major updates to the "voice access" feature that will be available to everyone soon.

In the most recent beta build of Windows 11, voice access has a huge number of new and improved features including support for multiple displays. But perhaps the most exciting addition is the new voice shortcuts features which makes it possible to create custom commands to trigger actions.

Continue reading

Microsoft releases Printer Metadata Troubleshooter Tool (KB5034510) to fix HP printer weirdness

HP logo

Last month, users of Windows 10 and Windows 11 started complaining about an odd problem that saw printers being renamed and the HP Smart app being forcibly installed. It took Microsoft a little while to acknowledge the issue, but ultimately the company conceded that the fault did not lie with HP.

But what those affected by the weird bug have been waiting for is a fix; this is now available in the form of KB5034510: Microsoft Printer Metadata Troubleshooter Tool - December 2023. Microsoft says that the tool will restore any previously downloaded model information and icons and will "remove HP LaserJet M101-M106 model information, icons, and application associations" as well as uninstalling the HP Smart app for anyone without an HP printer.

Continue reading

KLEVV unveils CRAS V RGB Brilliant White Edition DDR5 gaming memory

KLEVV has announced its all-new CRAS V RGB Brilliant White Edition memory kit, which joins the existing Obsidian Black variant. This latest offering offers clock frequencies of 8200MT/s with timings of 38-49-49-131, and 8400MT/s with timings of 40-52-52-134.

This RAM operates efficiently at a voltage of 1.45V, as demonstrated in tests using the AIDA64 Cache and Memory Benchmark tool. However, it's important to note that memory bandwidth test results can vary depending on factors like hardware configurations and system settings.

Continue reading

Cybersecurity for SMEs: Seven steps to a Zero Trust approach

Never trust, verify everything! This is the premise on which the "Zero Trust" approach was founded. This model of cybersecurity involves implementing controls designed to ensure that only verified users can access company resources, and from similarly approved devices.

This strategy is increasingly being adopted in response to the challenges faced by small and medium-sized enterprises (SMEs), such as the continued evolution of hybrid working, the use of Bring Your Own Device (BYOD) and the increase and sophistication in cyber-attacks. Whereas previously SMEs thought they weren’t a target, now they are seen as the weaker link from a hackers’ perspective and increasingly they are falling victims to cyber attacks.

Continue reading

Big prey, big payouts: Big game cyber hunting will return in 2024

2023 has been another wild year for cybercrime. In October, Boeing’s systems were breached through a zero-day vulnerability, with hacking group LockBit threatening to publicly release sensitive files if the ransom wasn’t paid in a week. One month prior, MGM Resorts was hit by a ALPHV/BlackCat social engineering attack estimated to impact the company’s third-quarter financial results by about $100 million. That same month, two major hospitals serving thousands of New York patients struggled to recover from a LockBit cyberattack that forced them to reschedule appointments and divert ambulances to other hospitals.

But what is in store for 2024? Let's look at some of these trends from 2023 in more detail to better understand what will be facing us next year.

Continue reading

AI governance: Five essential design principles to keep businesses ahead of the curve 

In 2023, we witnessed the beginnings of a global AI-driven revolution. With recent studies revealing that one in six UK organizations have already embraced artificial intelligence (AI), these technologies have solidified their position in driving the next wave of digital innovation.

However, until now, organizations have been largely focused on AI experimentation, which has limited the benefits they’ve unlocked. They are now seeking to mature their strategies and embrace AI in a more transformational manner, by embedding these technologies into their core business processes. The launch of solutions like the Open AI GPT Store towards the end of 2023 is set to accelerate this drive for AI maturity, making it easier for organizations to embed ready-built use cases into their operations.

Continue reading

Manjaro Linux 23.1.0 'Vulcan' now available to download -- choose from GNOME, Plasma, and XFCE editions

After months of diligent development, the Manjaro team has finally launched version 23.1.0. Code-named “Vulcan,” this version of the Linux-based operating system is chock full of enhancements and security improvements. Most notably, this release addresses critical security vulnerabilities in the xorg-stack and refines the overall package offerings.

Key highlights of the update include extensive kernel updates. A notable wifi regression issue in kernel 18 has been resolved. The ASUS ROG ALLY 13 now boasts robust support across linux65, linux66, and linux67 kernels. The linux-firmware has been upgraded to its latest December iteration, ensuring up-to-date hardware compatibility.

Continue reading

Patriot Memory and ASUS unveil joint venture -- Viper Elite 5 TUF Gaming Alliance RGB DDR5 RAM

Patriot Memory has announced a collaboration with ASUS' gaming division, TUF Gaming. This partnership marks the debut of the Viper Elite 5 TUF Gaming Alliance RGB DDR5 series, a new addition to Patriot's Viper Gaming portfolio.

The new Viper Elite 5 TUF Gaming Alliance RGB DDR5 series is an advanced version of the previously released Viper Elite 5 performance memory series. It is officially certified by ASUS' TUF Gaming Alliance, ensuring compatibility and reliability for users.

Continue reading

Web application security -- five ways to improve your approach

Business security

Web applications remain one of the most targeted areas for threat actors. According to Verizon’s Data Breach Investigations Report, web application attacks were behind 26 percent of all successful attacks during the twelve months covered. Yet while the methods for attacking web applications are well known and understood, as evidenced by the work that the Open Web Application Security Project (OWASP) has done on their Top Ten list over the years, many companies still find hardening their applications challenging.

Authorization and access control describe the biggest set of challenges identified by OWASP in their most recent Top 10 list (2021) -- three out of the top five issues were around broken authorization, while broken authentication and improper access to resources were also common problems. The OWASP Top 10 for 2021 also includes attacks that work on unrestricted access to sensitive business flows, which covers areas like creating fake accounts, and server side request forgery where APIs can send resources to the wrong locations.

Continue reading

Open to attack: The risks of open-source software attacks

Open-source software (OSS) is now so widely used that it is incredibly difficult to find an organization that doesn’t incorporate OSS in some form or another -- whether that be in a standalone open-source product, or more commonly, in the form of OSS packages. Though its usefulness cannot be doubted, the prevalence of this software is exactly what makes it a major target for cyber-attacks.

A prime example of this is Log4j, a popular logging utility used by scores of organizations for recording events such as status reports and errors. In a situation which came to be known as 'Log4shell', a zero-day vulnerability allowed threat actors to compromise systems using malicious code and take control all while remaining undetected. At the time, its impact was described as "enormous" and the implications of its implementation into countless commercial products underlined the inherent vulnerabilities of some open-source technologies when weak points are exposed.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.