Latest Technology News

Windows 11 23H2 ISO spotted online as Microsoft prepares to launch major Windows 11 update

Windows 11 logo on a laptop

Microsoft is preparing to launch the final significant update to Windows 11 before the release of Windows 12. We already know a fair amount about the upcoming Windows 11 23H2, but the release date has not really pinned down to anything more specific than Q4 of 2023.

But ISO images for Windows 11 23H2 have now been spotted online, strongly suggesting that testing is now over and Microsoft is ready to unleash this hugely important update to Windows 11 users.

Continue reading

Google Chrome will soon offer to hide your IP address for added privacy and security

Woman at laptop hiding eyes

Google is preparing to launch a new Chrome feature which will give users the ability to hide their IP address. Previously known as Gnatcatcher, the feature is now called IP Protection and makes use of proxies to help prevent online tracking.

IP Protection is described as "a privacy proxy that anonymizes IP addresses for qualifying traffic". One of its primary aims is to limit the possibility for fingerprinting as a means of tracking users online, which is something that has become increasingly common as steps are taken to block, and even kill off, third-party cookies.

Continue reading

1Password thwarts hacking attempt linked to Okta security breach

Today, 1Password shared some news about a hacking attempt that happened in late September 2023. The company saw some suspicious activity on a software tool they use called Okta, which helps manage apps for their employees. This strange activity was later found to be connected to a known security issue with Okta’s support system.

On September 29, someone from 1Password’s tech team got a surprising email that helped them find this weird activity in their Okta software. They traced this activity back to a suspicious computer address. Someone unauthorized had got into the Okta software with high-level access. This situation looked a lot like known hacking attempts where bad actors get into high-level accounts to mess with security settings and pretend to be users within the company being targeted.

Continue reading

QNAP unveils TVS-hx74T Thunderbolt 4 NAS devices

QNAP has unveiled the TVS-h674T and TVS-h874T Thunderbolt 4 NAS devices, focusing on digital content creation and video production. These Network Attached Storage (NAS) devices are tailored to meet the needs of creators, to enhance productivity and provide a secure space for valuable creative projects.

The series includes three models. The TVS-h674T-i5-32G model is a 6-bay 3.5-inch SATA HDD Thunderbolt NAS, powered by a 12th Gen Intel Core i5 6-core/12-thread Processor, paired with Intel UHD Graphics 730 and 32GB DDR4 RAM. The TVS-h874T-i7-32G, an 8-bay 3.5-inch SATA HDD Thunderbolt NAS, houses a 12th Gen Intel Core i7 12-core (8P+4E) /20-thread Processor, Intel UHD Graphics 770, and 32GB DDR4 RAM. Lastly, the TVS-h874T-i9-64G, another 8-bay model, comes with a 12th Gen Intel Core i9 16-core (8P+8E) /24-thread Processor, Intel UHD Graphics 770, and 64GB DDR4 RAM.

Continue reading

Predictive analytics and AI drive new anti-fraud technology

Fraud

A new anti-fraud tool from Jumio uses predictive analytics and AI to look at billions of data points across the company's cross-industry network to identify patterns based on behavioral similarities and other indicators.

Jumio's analysis shows that 25 percent of fraud is interconnected, either being perpetrated by fraud rings or by individuals using the same information or credentials to open new accounts on banking sites, eCommerce platforms, sharing economy sites, etc.

Continue reading

Why a new architecture is needed for open banking API platforms [Q&A]

While much literature has been written on best practices for systems architecture, the desired outcomes have been as elusive as they have been sought after. The de-facto standard for enterprise systems that exists in reality is often closer to A Big Ball of Mud.

Very rarely is an organization’s technology (the infrastructure, the software or the set of systems powering the organization) planned as the state in which we see it today. All early systems need to scale, and most companies in the growth phase don't have the bandwidth to deal with this graciously.

Continue reading

Proactively preventing your company from becoming the next cyberattack headline

The news last month of yet another cyberattack on MGM Resorts, initiating a system shutdown and disrupting its operations, is yet another in a very long list of attacks that we have witnessed in the past couple of years.  Having the right preventive and defensive cybersecurity measures in place for such attacks is a given, and it is what most organizations focus on. But it is also about understanding how the organization will recover from an incident and how they can limit the extent of an attack. 

Today, being impacted by a cyberattack is almost inevitable. The global average cost of a data breach in 2023 was $4.45 million, a 15 percent increase over 3 years, according to IBM. Therefore, companies also need to think about how they can proactively recover, how quickly they can recover, and the cost of recovery to the business.

Continue reading

Microsoft Edge may be using your browsing history to inform Bing Chat AI -- here's how to stop it

Blurry Microsoft Edge logo with mobile in foreground

AI is just about everywhere now. Its ubiquity makes it nearly impossible to avoid, and Microsoft is just one of the big tech firms to have thrown everything at artificial intelligence.

As well as adding AI to Windows 11 with Copilot, Microsoft has also brought a generous dose of it to its Edge browser courtesy of Bing Chat. What users of this feature may not be aware of is that their browsing data is being used to personalize Copilot, meaning that a huge amount of potentially revealing information is being shared with the artificial intelligence tool.

Continue reading

GPU revolution: Harnessing the power of advanced technology through cloud delivery

Recent advancements in GPU (Graphics Processing Unit) technology, accompanied by new innovative use cases and increased user expectations have produced a profound impact on the industry. Together, they have driven the proliferation of new application architectures, fueling growth in artificial intelligence (AI), machine learning, and visual computing.

In this era of relentless innovation, the key to staying competitive lies in quickly meeting user expectations through cloud delivery. Its multiple advantages -- on-demand consumption, scalability, global availability, a safeguard against supply chain disruptions, and financial perks -- shape a compelling strategy for deploying GPU technology via the cloud.

Continue reading

What's in a name? How to navigate the crowded SASE marketplace

SASE, Secure Access Service Edge

According to Dell’Oro Group, there are more than 30 SASE vendors. That number is likely to go up consistently for the foreseeable future. Despite this growth, not all these providers are delivering the same basic foundational elements to customers. At best, these providers don’t realize that they’re not offering a true SASE solution, and at worst, they’re falsely advertising SASE capabilities to expand their customer bases.

For example, would a company that strictly sells bread say that they offer cakes? While bread and cakes do share some of the same ingredients and both end products require a baking process, it would be disingenuous for the bread company to say that it sells cakes. This is the issue we’re currently battling against in the quickly evolving SASE space.

Continue reading

Providing the legal sector with the deep visibility, security, and data monitoring they need to thrive

Cybercriminals frequently target the legal sector due to its extensive holdings of highly confidential, commercially sensitive, and often personal information. As a sector built on trust and reputation, this growing threat continues to disrupt and create havoc in business operations, underscoring the necessity for a deeper understanding of cyber threats and stronger cyber security measures within the legal industry.

A recent report from the National Cyber Security Centre (NCSC), published in early 2023, revealed that the UK has over 32,900 legal enterprises, encompassing barristers, solicitors, and other legal service providers. With an estimated total revenue of £43.9 billion and more than 320,000 people employed in the legal sector, it represents a large and lucrative target for cybercriminals.

Continue reading

Global Encryption Day: Protecting our first line of defense  

Data encryption

Today, Global Encryption Day 2023, marks the perfect opportunity to reflect on what has been a highly challenging year for the technology.

Encryption acts as a fundamental safeguard of data privacy, securing data both during transmission and while at rest. It often serves as a primary defense against hackers and is indispensable in preventing unauthorized access to sensitive information. With the risk of reputational damage and massive fines for those who are breached, it is essential for any organizations looking to ensure regulatory compliance.  

Continue reading

Why open banking holds the key to customer centricity

The proliferation of fintech platforms has prompted consumers to demand more from their banks. Historically, legacy industry resistance to securely sharing customer data with third parties has deprived banks of opportunities to engage customers and foster longer-term retention more deeply. Many incumbent banks felt an open banking structure threatened their business models. However, as banks shift their mindset and embrace open banking, it’s evident that the 'mainstreaming' of an open banking infrastructure benefits both banks and consumers through a larger marketplace of product options.

Consumers can use open banking by consenting to share their data with other providers securely and receive a more comprehensive range of product offerings and more personalized and efficient services -- all in one place.

Continue reading

Sleuthing for the threat of a Business Email Compromise

Malicious email

In this new era of generative artificial intelligence, one of the biggest security risks involves business email compromise attacks. Countless malicious phishing emails are already being cloned, refined, and delivered by smart AI bots around the world.

A business email compromise (BEC) is a sophisticated cybercrime that uses emails to trick the receiver into giving up funds, credentials, or proprietary information through social engineering and computer intrusion techniques. Many BEC attacks combine multi-channel elements to make the frauds seem more convincing, such as incorporating fake text messages, web links, or call center numbers into the mix with email payloads. For example, the attackers might spoof a legitimate business phone number to confirm fraudulent banking details with a victim.

Continue reading

Unmasking cybersecurity's hidden threats

security skull

The cybersecurity landscape is experiencing an unprecedented surge in vulnerabilities. In 2022 alone, a staggering 25,096 new vulnerabilities were added to the National Vulnerability Database (NVD). This number represents the highest count of vulnerabilities ever recorded within a single year and reflects a 25 percent increase compared to the 20,196 new vulnerabilities reported in 2021.

This escalating trend indicates that cybersecurity threats are not only on the rise but are also accelerating at an alarming pace. The reasons behind this surge in vulnerabilities are multifaceted, stemming from factors such as the increasing complexity of software and technology systems, the rapid pace of digital transformation, and the growing sophistication of cyber attackers.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.