Latest Technology News

Google Gemini unveils custom AI experts and advanced Imagen 3 image generation features

Google has introduced several new features for its Gemini platform, aimed at enhancing the user experience with customizable AI experts, known as Gems, and an advanced image generation model, Imagen 3. These features are now available to Gemini Advanced, Business, and Enterprise users and are designed to improve both productivity and creativity across various applications.

Gemini Advanced, Business, and Enterprise subscribers can now create and interact with Gems, which are customizable AI experts tailored to specific tasks or topics. Users can generate Gems by providing instructions, naming them, and then utilizing them for various tasks, including brainstorming ideas or assisting with writing. Gems are designed to offer support in areas such as simplifying complex topics, providing creative inspiration, offering career guidance, giving feedback on writing, and assisting with coding projects. These AI experts are accessible on both desktop and mobile devices in over 150 countries and support a wide range of languages.

Continue reading

Rectify11 update arrives to fix Windows 11 -- download it now

Rectify11 fixes Windows 11 flaws

Despite Microsoft's ongoing efforts to improve Windows 11 by fixing bugs and introducing new features -- most notably AI integration with Copilot -- many users continue to experience issues and design inconsistencies that detract from the overall experience. No wonder so many people are choosing to stick with Windows 10.

However, there's good news: Rectify11, a third-party solution designed to address Windows 11's many problems, has just been updated to version 3.2, offering a more polished and consistent user experience.

Continue reading

LLMs vulnerable to prompt injection attacks

As we've already seen today AI systems are becoming increasingly popular targets for attack.

New research from Snyk and Lakera looks at the risks to AI agents and LLMs from prompt injection attacks.

Continue reading

Save $31.99! Get 'Microsoft 365 and SharePoint Online Cookbook' for FREE

Microsoft 365 offers tools for content management, communication, process automation, and report creation. Microsoft 365 and SharePoint Online Cookbook maximizes workplace collaboration and productivity using SharePoint Online, Teams, OneDrive, Delve, M365 Search, Copilot, Power Platform, Viva, Planner, and Microsoft Forms.

You will find thoroughly updated recipes for SharePoint Online, covering sites, lists, libraries, pages, web parts, and learn SharePoint Framework (SPFx) basics for building solutions.

Continue reading

Resilience blueprint: Strategic steps to build operational resiliency

Globally cybersecurity is soaring to critical levels of concern for organizations. The Veeam 2023 Data Protection Report highlights that 85 percent of organizations have been hit by at least one cyber attack, illustrating the difficult journey towards recovery. The average recovery from an attack can drag on for a staggering three weeks, not only impacting operations but also carrying with it significant financial implications. Therefore, cyber resilience must adopt comprehensive strategies to ensure operational and cyber resilience. This means companies must not only take proactive cybersecurity measures to prevent disruptions but must also implement reactive measures to ensure a quick response and complete recovery in the event of a successful cyber attack.

To improve their cyber resilience and smoothly adapt to regulatory shifts, organizations must embark on a strategic journey, weaving together crucial strategies and best practices to ensure they not only survive a threat but thrive in the ever-evolving digital landscape.

Continue reading

Get Windows working the way YOU want with Super God Mode

You are probably familiar with God Mode in Windows. This feature displays all of the admin tools and control options on a single screen, but it’s tucked away, so you need to create a folder and give it a special name to activate it.

There are actually multiple God Modes, and we’ve covered them all, along with how to activate each one, here. However, if you're looking for something even more powerful, you should definitely try Super God Mode.

Continue reading

UK government wants the AI to eat your homework

The UK government has announced the launch of a new scheme that will encourage the building of new generative AI tools to help teachers when they’re planning lessons or marking homework.

This will involve the creation of a 'data store' for education data including the national curriculum, guidance for teachers, lesson plans and more. The £3m ($3.96m) data store will help tech companies build AI tools that teachers can trust to help in their work by making this data machine readable.

Continue reading

Publicly available GenAI development apps open to exploitation

New research from Legit Security shows that widely available GenAI development services risk sensitive information exposure, or leakage of secrets.

Legit's analysis of unprotected vector databases finds that 30 servers investigated contained corporate or private data, including company email conversations, customer PII, product serial numbers, financial records, resumes, and contact information.

Continue reading

The path of least resistance to Privileged Access Management

Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into who has access, and when an account has been accessed.

Privileged accounts have traditionally been given to administrators to access critical data and applications. However, changing business practices, agile software development, and digital transformation have meant that privileged accounts have become more numerous and widespread. To reduce the risk of privileged accounts being hijacked or fraudulently used, and to uphold stringent regulatory compliance within an organization, an adequate PAM solution is essential.

Continue reading

The critical gap in zero trust [Q&A]

Zero-Trust

As network boundaries can no longer be relied on to define the limits of cybersecurity, zero trust has become the overarching framework that now guides enterprise security strategies.

However, Zero Trust Network Access (ZTNA) has its limitations, especially in application security, and this can open up risk for organizations heavily reliant on SaaS systems.

Continue reading

Microsoft releases KB5041587 update for Windows 11, improving Windows Share, Narrator and Voice Access, but failing to address Linux dual boot issues

Windows 11 on laptop and mobile

Microsoft has a released a preview of next month's update for Windows 11. The release of the KB5041587 update introduces the ability to share content to an Android device from the Windows Share window assuming the handset has been paired with Windows 11.

For some users there are security improvements to the Widgets Board, while everyone is getting updated and improved Voice Access and Narrator features. What the release fails to do, however, is fix the problems users started to face with dual-booting Linux after installing the August security updates.

Continue reading

CrowdStrike integrates Falcon cybersecurity with NVIDIA NIM Agent Blueprints to support secure generative AI development

CrowdStrike has announced its integration of the Falcon cybersecurity platform with NVIDIA NIM Agent Blueprints, aimed at helping developers securely utilize open-source foundational models and accelerate generative AI innovation.

Developing enterprise-grade generative AI applications involves a complex process that requires blueprints for standard workflows—such as customer service chatbots, retrieval-augmented generation, and drug discovery—to streamline development. Ensuring the security of these models and the underlying data is essential for maintaining the performance and integrity of generative AI applications.

Continue reading

Microsoft transitions Mono project stewardship to WineHQ organization

The Mono Project, a key component of the .NET ecosystem since its start in 2001, is undergoing a transition. Originally created to allow developers to easily build cross-platform applications, Mono has been instrumental in extending .NET to various operating systems, including Android, iOS, and Linux.

After Microsoft acquired Xamarin in 2016, it became the steward of the Mono Project, continuing its development. The last major release of the original Mono Project occurred in July 2019, with only minor patch releases since, the most recent in February 2024.

Continue reading

Dump Microsoft Windows 11 now and supercharge your PC with 4MLinux 46.0

If you're still using Microsoft Windows 11, it might be time to consider a switch. The newly released 4MLinux 46.0 (download here) offers a lightweight and powerful alternative that can make your computing experience smoother and more efficient.

Switching from Windows 11 to 4MLinux can be a great idea for several reasons. First, 4MLinux is known for being much lighter on system resources compared to Windows 11. This means you can get more performance out of older hardware, and even on newer machines, the system feels snappy and responsive without the usual bloat. This efficiency leads to faster boot times, quicker application launches, and an overall more responsive computing experience.

Continue reading

What does cybersecurity tool sprawl look like today?

DevSecOps

Cybersecurity has become an increasingly important concern in the business world. After all, reports have found that 41 percent of businesses fell victim to a cyberattack in 2023. As the technology cyber attackers use to conduct their nefarious activities becomes more complex, so is the technology that IT professionals use to protect organizations and their data. However, with this also comes a unique new challenge: tool sprawl.

Tool sprawl occurs when a company utilizes an unnecessary number of IT tools, usually because it implements separate solutions for each use case. Although it may seem most efficient to address needs as they arise or present themselves, adopting a comprehensive approach is often more efficient -- particularly in a case where proactivity is vital, such as cybersecurity.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.