Latest Technology News

UK faces record cybersecurity skills gap

Vacant chair

The UK cybersecurity workforce gap has reached a record high, with 73,439 professionals needed to adequately safeguard digital assets, representing a 29.3 percent increase over 2022.

Research by security professionals organization ISC2 shows the UK cybersecurity workforce has reached 367,300 people, an 8.3 percent increase from 2022, representing more than 28,000 new jobs.

Continue reading

Malware 'meal kits' give attackers the ingredients to bypass detection

A new report from HP Wolf Security reveals cybercriminal marketplaces offering low-level attackers the tools needed to bypass detection and infect users in the form of so-called 'meal kits'.

These are pre-packaged malware kits which give low-level attackers all the ingredients to evade detection tools, making it easier for them to breach organizations and steal sensitive data.

Continue reading

Microsoft releases PowerToys v0.75.0 with new Environment Variables module, Settings Dashboard and more

Tiled PowerToys icons

It is always an exciting time when a PowerToys release cycle is described as being "focused on new features, stability and improvements". And the release of PowerToys v0.75.0 does not disappoint.

To start with, there is a new arrival in the form of the Environment Variables module, and there's also a completely new Dashboard home page for Settings. Additionally, there is the usual raft of tweaks and bug fixes as well as a new previewer for the Peek module.

Continue reading

Apple's M3 processors power the new MacBook Pro and iMac

Apple has rolled out its new chip models: M3, M3 Pro, and M3 Max, which power refreshed iMac and MacBook Pro computers. These chips are built using a more compact 3-nanometer process technology, potentially boosting performance and enabling new features for Mac computers. This new lineup represents a notable progression from Apple’s previous M1 and M2 chip series.

The M3 chip family comes with an upgraded GPU (Graphics Processing Unit), which Apple claims is a big step forward in graphics technology for their products. New features include Dynamic Caching and debut rendering technologies like hardware-accelerated ray tracing and mesh shading for Macs. These improvements are said to make rendering speeds up to 2.5 times faster than the previous M1 chips

Continue reading

Belkin unveils BoostCharge Pro 2-in-1 Wireless Charging Dock with MagSafe

Today, Belkin announced the BoostCharge Pro 2-in-1 Dock with MagSafe, aiming to provide a simple and efficient charging solution for iPhone and Apple Watch users. The dock is designed using official MagSafe technology, which ensures fast charging for both devices.

The design of the BoostCharge Pro 2-in-1 Dock is modern and sleek, with a choice of two neutral colors -- sand and charcoal. These colors, along with the color-matched chrome finishes, give the dock a clean and contemporary look. The design is intended to blend well with any setting, be it a nightstand, kitchen counter, or desk. Its compact size doesn’t take up much space, making it a convenient accessory for different environments.

Continue reading

Samsung Odyssey Ark 2nd Gen (G97NC) 4K curved gaming monitor now available

Samsung has launched its second generation Ark monitor, now available to purchase from Amazon. This is not just any display; it’s a 55-inch monster that boasts 4K UHD resolution and a rotating feature for an optimized viewing experience, whether in landscape or portrait orientation.

The Ark 2nd Gen also comes with an improved Multi-View connectivity that can seamlessly handle up to four source inputs. This includes three HDMI sources and one DisplayPort source, meaning you can now have your PCs, laptops, and gaming consoles connected and controlled all at once.

Continue reading

Unmasking data security monsters this Halloween

Monster-laptop

It is very nearly Halloween and we are preparing ourselves to encounter a host of terrifying creatures and monsters, all who are patiently waiting to make their appearances this year. However, while those beings are terrifying in their own right, it's the monsters lurking in the  shadows of the digital world that seem to strike more fear.

Malicious actors and menacing threats feel ever present in the news. As the adoption of cloud and on-demand computing services increases, malicious actors are waiting to make their move when enterprises lose control of their data security. Enterprises and their leaders are kept awake wondering where their data is, who has access to it, how it is being used and whether it’s safe. This piece will explore how to mitigate some of the most scary monsters that are haunting organizations the holiday season and beyond.

Continue reading

Mozilla launches Firefox Nightly .deb package for Debian-based Linux distros

Mozilla has today launched a Firefox Nightly .deb package, making life much easier for folks using Debian-based Linux distributions like Debian, Ubuntu, and Linux Mint.

The big deal about this update is the new APT repository, which allows users to install Firefox Nightly as a .deb package. This is a significant change for those who were using the traditional binaries distributed as .tar.bz2 archives. With Mozilla’s APT repository, now you can install and update Firefox just like any other application on your system.

Continue reading

'Are we adversary aligned?' is the new 'Are we secure?'

Secure vault

"Are we secure?" For most security leaders, this is one of the most daunting questions they can be asked. While it may seem like a basic inquiry for those in leadership positions, for those on the ‘cybersecurity front line’, thinking in these terms is far too vague and oversimplifies a complex and ever-evolving threat landscape.

Instead, management and IT teams need to shift their thinking to a far more appropriate measure of security:  "Are we adversary aligned?" But what does adversary alignment really mean?

Continue reading

Phishing emails increase over 1,200 percent since ChatGPT launch

A new survey of over 300 cybersecurity professionals from SlashNext looks at cybercriminal behavior and activity on the Dark Web particularly as it relates to leveraging Generative AI tools and chatbots and finds a startling 1,265 percent increase in malicious phishing emails since the launch of ChatGPT in November 2022.

It also shows a 967 percent increase in credential phishing in particular and that 68 percent of all phishing emails are text-based Business Email Compromise (BEC) attacks.

Continue reading

Organizations can only stop 57 percent of cyberattacks

Attack route

Over the last two years, the average organization's cybersecurity program was prepared to preventively defend against, or block, just 57 percent of the cyberattacks it encountered. This means 43 percent of attacks launched are successful and need to be remediated after the fact.

This is among the findings of a new report from Tenable, based on a survey of over 800 IT and cybersecurity leaders carried out by Forrester Consulting.

Continue reading

The biggest security challenges of hybrid work [Q&A]

Secure messaging

The shift to remote and hybrid working has led to many problems for IT teams, not least that it offers an expanded attack surface. Add in the threat from cybercriminals looking to capitalize on advanced AI capabilities to create malware and you have some major challenges.

We spoke to Doug Kersten, CISO of enterprise collaboration specialist Appfire, to discuss the key security challenges product and DevOps teams face today and how to overcome them.

Continue reading

Microsoft is making Skype marginally less ugly

Skype redesign

In a world saturated with messaging apps, there are few companies without something to offer; many, like Microsoft, have more than one app to choose from. Microsoft Teams is a popular choice in work environments, but stalwart Skype endures.

There are many words that are associated with Skype. Beautiful is not one of them. But this is changing. With its latest beta version released to Insiders, Microsoft is introducing a number of important aesthetic improvements -- as well as bug fixes -- which will eventually filter down to all users.

Continue reading

Greedy apps collect more information than they should

Nearly 87 percent of Android and 60 percent of iOS apps request access to device functions unrelated to their performance, according to new research by NordVPN.

Researchers analyzed the most popular mobile apps globally in 18 categories. They found that up to 14 percent of apps collect more unnecessary than necessary data for the apps' performance and only eight percent collect no unnecessary data. On average, every fifth requested permission was not actually needed for the app’s functionality.

Continue reading

Get 'Python Machine Learning' (worth $24) for FREE

With computing power increasing exponentially and costs decreasing at the same time, there is no better time to learn machine learning using Python. Machine learning tasks that once required enormous processing power are now possible on desktop machines. However, machine learning is not for the faint of heart -- it requires a good foundation in statistics, as well as programming knowledge.

Python Machine Learning will help coders of all levels master one of the most in-demand programming skillsets in use today.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.