Latest Technology News

The elements of cybersecurity hygiene and secure networks

The two fundamental building blocks in ensuring that your data is secure are physical infrastructure and network security. Understanding and protecting your information from threats and human error requires meticulously layered security protocols.

Last year, British Airways canceled over 400 flights and stranded 75,000 passengers because of an IT outage caused by an engineer who disconnected a power supply at a data center near London’s Heathrow airport. When it comes to data centers and networks, even minor human errors can have a major impact on businesses and their customers. With the exorbitant costs and human resources required to maintain an on-premise system, organizations should look to public cloud companies. These companies bring capital and expertise to the table to properly manage their data centers, which are better protected than those that most companies could put in place themselves.

Continue reading

Edge computing changes everything, including your mobile strategy

Edge computing

It’s tempting to think of edge computing or the Internet of Things (IoT) strictly as something new that you’ll be adding to your enterprise architecture in the coming years. Your company has an enterprise architecture, and now thanks to the IoT revolution you’ll be adding lots of new internet-connected devices, which, depending on your line of business, might be actuators on a factory floor, sensors in a power station cooling tower, or GPS units on a fleet of tractor trailers.

But in reality, IoT and edge computing are not capabilities that are added separately to a company’s existing IT architecture and landscape. Rather, they need to be integrated into existing architectures to deliver on the company’s desired business outcomes.

Continue reading

Robocalls on the rise: What you should know

Smartphone owners are increasingly accustomed to picking up their phones and hearing recorded voices on the other end, meaning they've received robocalls.

Often, the recordings are threatening and mention taking action to avoid arrests or financial penalties. A human representative never comes into the equation unless the person receiving the call wants further information, usually by pressing a button on the phone's touchscreen.

Continue reading

Email security systems leave organizations vulnerable

email icon

Email and data security company Mimecast has released the results of its latest Email Security Risk Assessment (ESRA) which finds that mail security systems inaccurately deemed nearly 17,000 dangerous files 'safe' this quarter.

That represents a 25 percent increase over the previous quarter. Dangerous file types like jsp, .exe, .dll and .src are rarely emailed for legitimate purposes and can be used launch a cyberattack.

Continue reading

ADATA announces svelte and speedy UE700 Pro USB 3.1 flash drive

Even though cloud storage is ubiquitous these days, I still love a good ol' USB flash drive. They are great for installing various Linux distributions -- it is handy to have, say, Fedora and Ubuntu install media ready to go. But also, sometimes -- for various reasons -- you may just need to share files offline.

Today, ADATA launches a beautiful new USB Type-A flash drive. Called "UE700 Pro," it is very fast and slim. It features a retractable design, which I prefer -- there is no cap to lose. Best of all, it is offered in capacities up to 256GB.

Continue reading

60 percent of organizations have suffered disruptive cyber events in the last two years

Cyber disruption

A new study reveals that 60 percent of organizations globally have suffered two or more business-disrupting cyber events -- defined as cyberattacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment -- in the last 24 months.

What's more the research, carried out by the Ponemon Institute for cyber risk specialist Tenable, shows 91 percent have suffered at least one such cyber event in the same time period.

Continue reading

2018's worst password fails revealed

password note

Despite newer technologies, most of us still rely on passwords to secure our accounts. We are not, however, very good at choosing them or looking after them.

Password management company Dashlane has produced a list of the 10 worst password fails of 2018.

Continue reading

Phishing improves in quality as major brands are targeted

Phishing lock

It used to be easy to spot a phishing email, you just looked out for bad grammar and URLs that clearly didn't correspond to the organization being impersonated.

Recently though they've become harder to detect. According to the latest Global Threat Report from Comodo Cybersecurity, phishing really is getting better and it now represents one in every 100 emails received by enterprises.

Continue reading

Google unveils 2018 top global search trends

2018 has been quite the wild ride, and it isn't even over yet! Sure, there has been a lot of negativity in the news, but let us not forget -- there are many positive things happening too that simply don't get reported. The world isn't all bad.

With Google being the most popular search engine on Earth, it has the ability to offer great insight into the interests of people all over the world. Today, the search giant reveals its 2018 top global search trends.

Continue reading

Thermaltake launches Pacific R1 Plus DDR4 Memory RGB Lighting Kit

RGB lighting makes everything better. Yeah, there are some "haters" out there that decry these lights being added to so many products, but you know what? Those folks are just devoid of joy. As far as I'm concerned, every PC component and accessory should contain them! I mean, look, you can always just turn them off.

Nowadays, even sticks of RAM have RGB lighting. If your existing memory doesn’t have this lighting, it would be foolish to replace them to get it -- that just wouldn’t make financial sense. Thanks to a new product from Thermaltake, however, you can add RGB to your existing sticks of RAM. Called "Pacific R1 Plus," it fits over your existing RAM. How cool is that?

Continue reading

Forget buggy Windows 10, Windows 11 is the operating system we want

Windows 10 is a very good operating system, but the October 2018 Update has left a bad taste in many users' mouths. It caused a multitude of problems, got pulled, and even after it was made available again, new issues surfaced. The April 2018 Update rolled out to users at lightning speed, but the October 2018 Update has only been installed on about 3 percent of systems to date. Ouch.

Microsoft has said previously that Windows 10 will be the "last version of Windows", but is it time to rethink that idea and give users an operating system that goes up to 11? Take a look and make up your own mind.

Continue reading

The OnePlus 6T McLaren Edition is just getting silly with 10GB RAM

OnePlus 6T McLaren Edition

Over the last few years, OnePlus has jumped from being a weird indie outsider to being something of a household name. Its twice-yearly smartphone releases are always eagerly awaited, and there have been a handful of special editions thrown in for good measure.

The latest of these is the OnePlus 6T McLaren Edition, and it is the epitome of going over the top. Packing a rather excessive-seeming 10GB of RAM, the latest addition to the OnePlus stable rocks not only a headline-grabbing amount of memory (which is probably the point), but also the incredibly fast Warp Charge 30 charging system… and a $699 price tag.

Continue reading

Amplification bots used to raise the popularity and legitimacy of Twitter posts

Twitter bird megaphone

Earlier this year we looked at Duo Security's research into Twitter bots which focused on fake followers. The company has now published some further research looking at amplification bots.

So what is an amplification bot? They exist to boost content through likes and retweets. Duo has produced an algorithm to identify these bots and was able to find more than 7,000 over a 24 hour period.

Continue reading

Enterprises turn to software solutions to manage endpoint devices

endpoint data

As businesses embrace digital transformation, things like the growth of distributed workforces and remote work are impacting both the day-to-day responsibilities and long-term plans of IT managers.

Software and cloud managed services company Unify Square has commissioned a survey from Osterman Research to sample the views of IT managers who oversee unified communications (UC) and workstream collaboration (WSC) environments.

Continue reading

MSI announces Oculux NXG251R 24.5-inch FHD gaming monitor with NVIDIA G-Sync

When shopping for a gaming monitor, it is easy to get attracted to high-resolution models, such as 2K or 4K. And yeah, the higher the resolution the better is true for normal computing use, but for gaming, that means you need a more powerful gaming card to push that resolution. If you are on a budget and your video card isn’t top of the line, a 1080p model is still a great choice.

Today, MSI unveils a new model that is beautiful in design. The Oculux NXG251R, as it is called, is a FHD display that supports NVIDIA G-Sync technology. It is 24.5-inches, which is what I consider the "sweet spot" for 1080p. Best of all, it offers an insane 240Hz refresh rate!

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.