Latest Technology News

Defender bypass allows threats to be removed from protection database

Microsoft Defender on a laptop

A lot of people rely on Windows Defender to protect their systems, it's free and installed by default so why not?

Defender uses a blacklisting approach to stop threats. Before allowing a file to execute, it will compare it against its database of known threats and stop it from executing if it's on there. However, researchers at SafeBreach have uncovered an exploit that can allow threats to be removed from the database.

Continue reading

addlink launches AddGame A93 PCIe Gen4x4 M.2 SSD for PC and PS5

Today, addlink Technology Co., Ltd. launches its latest solid state drive. Dubbed “AddGame A93,” this SSD doesn’t have DRAM (in an effort to reduce costs), but it still offers very impressive performance. The drive sports read speeds of up to 7,400MB/s and write speeds up to 6,500MB/s, thanks to its PCIe Gen 4 NVMe interface.

For the Sony PlayStation 5 gamers out there, this SSD could be a dream come true. Not only does it meet the PS5's demanding requirements, but it also fits like a glove in the console's internal expansion bay.

Continue reading

Why "AI" can't succeed without APIs

AI-Security-model

Mega tech trends like the cloud, the mobile phone era, metaverse and now AI all depend on enabling technologies sitting right beneath the surface hidden from nearly everyone’s view. Their structural integrity depends on the flawless operation of those enabling technologies, which in many cases are Application Programming Interfaces (APIs). As such, their success depends on API adoption. Nowhere is this truer than in the rapid proliferation of AI technologies, like generative AI, which require a simple and very easy-to-use interface that gives everyone access to the technology. The secret here is that these AI tools are just thin UIs on top of APIs that connect into the highly complex and intensive work of a large language model (LLM).

It’s important to remember that AI models don’t think for themselves, they only appear to be so that we can interact with them in a familiar way. APIs are essentially acting as translators for AI platforms as they’re relatively straightforward, highly structured and standardized on a technological level. What most people think of as "AI" should be viewed through the lens of an API product; and with that mindset, organizations can best prepare for what potential use cases are possible and how to ensure their workforces have the skills to put them into action.

Continue reading

Half of European enterprises have no formal BYOD policy

BYOD key

The shift to remote and hybrid working has led to many more people using their personal devices for work purposes.

Yet a new survey, from Apple device management specialist Jamf, reveals that 49 percent of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources.

Continue reading

Learning from the recent TOMRA cyberattack: How can manufacturers increase resilience?

The recent cyberattack on TOMRA, a leading recycling entity and crucial cog in the wider manufacturing supply chain, underscores the escalating threat of cybercrime in the manufacturing sector. On July 16, TOMRA's data systems were extensively compromised, leading to significant operational disruptions. The attack's impact varied across the company's infrastructure, with systems taken offline and machines of different generations affected differently.

Manufacturers are at the heart of our global economy. If they are unable to build, ship, or invoice their goods due to a cyberattack, the potential losses can be catastrophic. At the same time, manufacturers are grappling with two distinct cybersecurity issues: updating security for legacy equipment that is vulnerable to lateral movement and securing the migration to Industrial IoT or Industry 4.0.

Continue reading

Microsoft is unbundling Teams from Microsoft 365 and Office 365 to address European antitrust concerns

Microsoft Teams on laptop screen

Microsoft has announced that it will unbundle Teams from Microsoft 365 and Office 365 in the EEA and Switzerland starting in October -- and this will mean a price reduction.  

The move comes after the European Commission expressed concerns about the bundling of the software. Microsoft describes the decision as being part of "proactive changes", and the company will no doubt be hoping that it is enough to stop further probing and legislation. For now, the unbundling is limited to Europe.

Continue reading

Chrome password sharing feature makes it easier to share login credentials... with limitations

Passwords written a notebook on top of a laptop

There are many reasons for wanting to share passwords, and it is surprising -- and also a source of irritation -- that doing so is not easier. But Google is looking to change this by introducing a dedicated password sharing option to Chrome.

Users of the browser will soon be able to use the Password Manager function of the browser to quickly share login details with others. To start with, it appears that Google will limit sharing to people you have added to your Google Family Group, but it is possible that this will be opened up further in future.

Continue reading

JBL Authentics Series: Retro speaker design meets modern technology

Ah, JBL. The name itself resonates with a powerful, legacy-rich reputation in the world of audio. And now, my audio-loving amigos, brace yourselves as the brand is once again set to revolutionize your listening experience. Say hello to the JBL Authentics series. There are three speaker options in this new product line.

Let’s kick things off with the JBL Authentics 300. This portable Wi-Fi and Bluetooth enabled beauty offers a built-in 8-hour battery and delivers sound so full-bodied, it’s like being front-row at a concert. Whether you’re out gardening or dancing in the kitchen, you’re enveloped in 360-degree immersive audio. Move over, live gigs; we’ve got a new star in town.

Continue reading

Businesses must learn to live with ransomware

Last year, 85 percent of organizations were hit by at least one ransomware attack, according to the  Veeam Data Protection Trends Report 2023. With almost all organizations suffering these attacks, it’s clear that the problem is not only widespread but almost inevitable these days. Though this might sound daunting, it’s by acknowledging this fact that we can manage this ever-present threat. So, let’s look at what solutions organizations can utilize to be able to live alongside ransomware.

It’s clear that ransomware attacks are a very real and present threat -- we see this every day, whether we’re watching the national news or sitting in the boardroom. Considering the ubiquity of these attacks, organizations need to be aware that a ransomware attack is no longer a case of ‘if’ you’ll be the target of an attack but ‘how often.’ While a vast number of organizations experienced at least one attack last year, the Veeam Data Protection Trends Report also showed that just under half (48 percent) suffered two or three attacks. This can feel like an overwhelming prospect for an organization of any size, and the natural consequence is that many turn to cyber insurance in search of some peace of mind.

Continue reading

Debian-based antiX-23 (Arditi del Popolo) is the Systemd-free Linux experience of your dreams

If you're one to favor choice, versatility, and independence from the systemd behemoth, then you're in for a treat. Say hello to antiX-23 (Arditi del Popolo), a new release based on Debian Bookworm that stands as a powerful testament to the open-source community's flexibility.

With its myriad flavors and options, this Linux distro invites you to experience computing on your own terms. The new release adds some in-house spices like zzzFM/IceWM as the default desktop and the IceWM Control Centre. Plus, the Onboard virtual keyboard and magnus screen magnifier are now standard.

Continue reading

60 percent of healthcare industry cyber incidents impact patient care

A new survey from Claroty of 1,100 cybersecurity, engineering, IT, and networking professionals from healthcare organizations finds 78 percent of respondents experienced a minimum of one cybersecurity incident over the last year.

Perhaps more concerning is that 60 percent of those incidents had a moderate or substantial impact on patient care and 15 percent had a serious impact that compromised patient health and/or safety.

Continue reading

Get 'Mastering Windows Server 2022 -- Fourth Edition' (worth $39.99) for FREE

Written by a 10-time Microsoft MVP award winner with over 20 years of IT experience, Mastering Windows Server 2022 is a hands-on guide to administer any Windows Server environment.

Whether new to the server world or working to keep your existing skills sharp, this book aims to be referenced on a regular basis instead of gathering dust on your shelf. Updated with Server 2022 content, it covers a wide variety of information pertaining to your role as a server administrator.

Continue reading

Over half of data breaches are down to digital certificates

Magnified certificare

Among organizations that have suffered data breaches, 58 percent were caused by avoidable issues related to digital certificates.

New research conducted by Forrester for AppViewX also shows that as a result of service outages 57 percent say their organizations have incurred costs upwards of $100,000 per outage.

Continue reading

From The White House to your business: The countdown is on to zero trust

The countdown is on. Following orders by The White House, civilian government agencies have a little over a year to establish and implement zero trust cybersecurity. The threat environment is evolving too quickly, the government notes, to rely on outdated defenses.

And the public sector is already heeding the cybersecurity call. Roughly two-thirds of American government agencies are confident of meeting the zero trust requirement by the deadline of September 2024.

Continue reading

Why UK-based companies are at a crossroads with GDPR [Q&A]

GDPR graphic

Data privacy regulation, GDPR, has been in force for five years but it will soon be superseded by UK GDPR. The Data Protection and Digital Information Bill, now wending its way through parliament, will see organisations move to a UK equivalent following the country's withdrawal from the EU. But what will the change mean in practice?

We spoke to Jon Fielding, managing director of EMEA at Apricorn, to find out how UK GDPR will affect businesses and how they handle and protect data.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.