Latest Technology News

Open to attack: The risks of open-source software attacks

Open-source software (OSS) is now so widely used that it is incredibly difficult to find an organization that doesn’t incorporate OSS in some form or another -- whether that be in a standalone open-source product, or more commonly, in the form of OSS packages. Though its usefulness cannot be doubted, the prevalence of this software is exactly what makes it a major target for cyber-attacks.

A prime example of this is Log4j, a popular logging utility used by scores of organizations for recording events such as status reports and errors. In a situation which came to be known as 'Log4shell', a zero-day vulnerability allowed threat actors to compromise systems using malicious code and take control all while remaining undetected. At the time, its impact was described as "enormous" and the implications of its implementation into countless commercial products underlined the inherent vulnerabilities of some open-source technologies when weak points are exposed.

Continue reading

Get 'Marketing 5.0: Technology for Humanity' (worth $17) for FREE

In Marketing 5.0, the celebrated promoter of the "Four P’s of Marketing," Philip Kotler, explains how marketers can use technology to address customers’ needs and make a difference in the world. 

In a new age when marketers are struggling with the digital transformation of business and the changing behavior of customers, this book provides marketers with a way to integrate technological and business model evolution with the dramatic shifts in consumer behavior that have happened in the last decade.

Continue reading

Pink Corvette crashes into Max as Barbie arrives 

In 1959, a doll came onto the market that was saturated with them. It shouldn’t have been a big deal; a ho-hum moment. Something about it caught on, though, and it became bigger perhaps any toy and things went forward from there. Barbie had every occupation from doctor to architect and even met a boyfriend, Ken. 

Dolls had been around forever, but Barbie caught on for some reason. Inventor Rauth Hadler had noticed something with her daughter, who played with paper dolls -- she gave them adult personas. It’s amazing where ideas can come from. Hadler ran with it and went to Mattel with the idea. The rest we all know. 

Continue reading

Majority of cyberattacks delivered over encrypted channels

In total, 86 percent of all cyber threats, including malware, ransomware, and phishing attacks, are delivered over encrypted channels, according to a new report.

The study from Zscaler also shows threats over HTTPS grew by 24 percent from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels.

Continue reading

Best Windows apps this week

Five-hundred-and-seventy-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Windows Copilot is now also available for Windows 10. Microsoft released cumulative update KB5033372 this week that introduces the AI-powered tool on Windows 10 systems.

Continue reading

Mobile app developers turn to AI for testing

The use of AI tools for mobile app development and testing is growing, and developers and testers are keen to further expand the use of these tools, according to a new report.

The study from Kobiton finds 60 of respondents say they are currently using generative AI tools in their QA cycles to update scripts or code, 55 percent are using these tools to analyze test results, and 47 percent are using them to generate test scripts.

Continue reading

How to build a successful data lakehouse strategy [Q&A]

The data lakehouse has captured the imagination of modern enterprises looking to streamline their architectures, reduce cost and assist in the governance of self-service analytics.

From data mesh support to providing a unified access layer for analytics and data modernisation for the hybrid cloud, it offers plenty of business cases, but many organizations are unsure where to start building one.

Continue reading

Privacy-focused Proton launches macOS and Windows Proton Mail desktop app in beta

Proton Mail desktop app

For users concerned about privacy, Proton Mail represents a tantalizing alternative to the likes of Gmail. Previously accessible through a web browser, both Proton Mail and Proton Calendar can now be accessed through a new desktop app.

Available in beta for Windows and macOS, and with a Linux version in the pipeline, Proton Mail's desktop app sees the Swiss company beating Google to the punch. To start with, the app is only available to people with a Proton Visionary plan, but will open up to everyone in early 2024.

Continue reading

Apple expands Self Service Repair to iPhone 15 and M2 Mac models

In a notable update to its repair services, Apple has expanded its Self Service Repair program to include the latest iPhone 15 series and several Mac models with M2 chips. This expansion includes the 14- and 16-inch MacBook Pro, the 15-inch MacBook Air, Mac mini, Mac Pro, and Mac Studio.

Additionally, the program is now accessible in 24 more European countries, including Croatia, Denmark, Greece, Netherlands, Portugal, and Switzerland. With these new additions, Self Service Repair now covers 35 Apple products across 33 countries and is available in 24 languages.

Continue reading

The Deep Tech revolution -- Part 1: White papers

Typing white paper

Artificial Intelligence, Internet of Things, Cybersecurity, Blockchain: these words have become common terms we hear everyday, dominating the news and business landscapes worldwide under what we have come to know as Deep Tech. According to recent research, in 2021 the deep tech market registered a total revenue of US$431.1 Million, and is expected to grow by 21 percent between 2022 and 2032 for a value of US$ 3,733.8.

Start-ups and companies within the Deep Tech space are all about innovation and advancing technologies, often diving into niche parts of already narrow fields. They run the business side differently, they bring revolutionary approaches to traditional dynamics in the work environment, and even create new roles and job titles not seen in other companies. Staying true to their nature where science and innovation plays an important role, these companies engage in specific activities that best compliment their primary immediate goal of research and development, whether this is about technology, sharing knowledge or growing their community.

Continue reading

Achieving cybersecurity excellence: The art of balancing automation and human expertise

Knowledge Management KM

In an era marked by continuously evolving cyberthreats, the significance of automation in the realm of cybersecurity cannot be overstated. Automation has emerged as a potent tool that enables security leaders to effectively address the challenges presented by today's digital environment. It offers numerous advantages, including swift and consistent responses to threats, the mitigation of potential human errors and a reduction in incident response times. 

However, while automation is a vital asset, striking the right balance between automation and human involvement is essential to ensure optimal cybersecurity outcomes. In this article, we will explore how organizations can achieve a harmonious partnership between humans and automation to enhance threat detection, response and decision-making.

Continue reading

Banking apps targeted by multiple malware families

bank access

New research from mobile security platform Zimperium has uncovered 29 malware families targeting 1,800 banking applications across 61 countries in the last year.

US banking institutions remain by far the most targeted by financially motivated threat actors. There were 109 US banks targeted by banking malware in 2023, compared to the next most targeted countries which were the UK (48) and Italy (44). The report also noted that trojans are evolving beyond simple banking apps to target cryptocurrency, social media, and messaging apps.

Continue reading

Bitdefender launches free AI-powered scam detector

We know that fraud is on the increase and by their very nature scams can be hard to spot because… Well because they're scams.

Step forward Bitdefender with the launch of a new, free scam detection service designed to help users verify fraudulent online schemes delivered by email, embedded links, text, and instant messaging through collaboration with a chatbot powered by artificial intelligence.

Continue reading

Get '50 Algorithms Every Programmer Should Know -- Second Edition' (worth $39.99) for FREE

The ability to use algorithms to solve real-world problems is a must-have skill for any developer or programmer.

This book will help you not only to develop the skills to select and use an algorithm to tackle problems in the real world but also to understand how it works. You'll start with an introduction to algorithms and discover various algorithm design techniques, before exploring how to implement different types of algorithms, with the help of practical examples.

Continue reading

Vivaldi 6.5 adds new Sessions Panel, adds full browsing history to device sync

Vivaldi Technologies has unveiled Vivaldi 6.5 for Windows, Mac, Linux, iOS and Android, a pre-holiday release stuffed with useful new features for both desktop and mobile platforms.

Chief highlights include a new Sessions Panel for organizing saved groups of tabs, plus the added ability to sync the user’s full browsing history across all devices.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.