Acer launches Chromebook Plus 516 with Intel Core i3 and 16-inch display


Acer has officially launched the Chromebook Plus 516 (CB516-1H), a brand-new ChromeOS laptop that delivers a large display and Intel Core performance. To clarify, this is not the Chromebook Plus 516 GE model built for cloud gaming -- this is an entirely new machine.
The CB516-1H-31UE configuration currently available comes equipped with a 13th-generation Intel Core i3 1315U processor, featuring six cores with a boost clock up to 4.5GHz. The laptop pairs that CPU with 8GB of LPDDR5 RAM and 128GB of UFS storage. This combination should be fine for typical Chromebook workloads like web browsing, document editing, and video streaming.
Email still the main channel for cyberattacks and disinformation


Malicious actors are increasingly exploiting email to impersonate brands, launch phishing campaigns, and spread false information -- often using sophisticated methods made simpler by emerging technologies.
A new report from Valimail shows that email continues to be the most exploited attack vector for cybercriminals and disinformation campaigns, with artificial intelligence dramatically increasing the sophistication of these threats.
SaaS security needs a more unified approach


New research commissioned by Valence Security from the Cloud Security Alliance looks at the current state of SaaS security to uncover key challenges and explore how organizations are securing and managing their SaaS environments.
It finds SaaS security is a top priority for 86 percent of organizations, with 76 percent of respondents saying they are increasing their budgets this year.
1Password adds protection for agentic AI in the enterprise


Current AI models can perform many tasks such as generating text, but these are 'prompted' -- that is the AI isn't acting by itself. But this is about to change with the arrival of agentic AI.
Gartner estimates that by 2028, 33 percent of enterprise software applications will include agentic AI, up from less than one percent in 2024, enabling 15 percent of day-to-day work decisions to be made autonomously.
Not if, but when -- Why every organization needs a cyber resilience strategy


Because of AI, data has become the most valuable competitive asset for organizations regardless of industry. However, cyber-attacks are continuing to escalate, so the need for robust security measures is more important than ever. It is no longer enough to focus solely on prevention, so organizations must shift their mindset and resources toward rapid recovery and resilience.
For years, IT leaders have funneled time and investments into hardening their networks, building firewalls, and implementing the latest access controls to prevent breaches from malicious threat actors. Yet, despite these efforts, the unfortunate reality remains: cyberattacks, particularly ransomware attacks, are no longer a question of "if," but "when."
addlink launches P30 USB 4.0 magnetic SSD with blazing speeds and MagSafe support


When it comes to portable storage, it is easy to get overwhelmed by all the choices nowadays. Thankfully, a new addlink solid state drive is something that stands out from the pack. You see, the company’s new P30 USB 4.0 Super-Speed Magnetic SSD is here, and it offers a mix of speed, portability, and a clever design.
Thanks to USB 4.0 technology, the P30 is capable of impressive transfer speeds up to 4000MB/s. To put that into perspective, you can move a 10GB file in about 2.5 seconds. That kind of speed can be a godsend, especially for those working with large 4K video files, raw photo collections, or massive game libraries.
What is an AI agent and why should you build one?


AI agents are having a moment. From automating customer service to optimizing supply chains, AI agents are constantly promising to transform how organizations operate -- faster, smarter and more efficiently. In fact, recent research from Salesforce shows that 93 percent of IT leaders plan to implement AI agents in the next two years. But what exactly is an AI agent?
An AI agent is a software system that can autonomously perform tasks like answering customer inquiries and translating documents in multiple languages, improving overall efficiency and customer experience. Unlike traditional automation tools that follow static rules, AI agents continuously learn from data and adapt to changing conditions to make decisions on their own, in real time. That’s what makes AI agents powerful and risky.
Midsize businesses rethink their desktop solutions


Midsize companies are actively rethinking their virtual desktop infrastructure (VDI) and Desktop-as-a-Service (DaaS) strategies, with cost, complexity, and IT resource demands driving urgent change.
A new report from Parallels shows 63 percent of midsize companies are actively seeking new VDI or DaaS solutions to reduce costs and streamline IT management.
Surge in AI fraud leads to revenue losses


A new report reveals that 73 percent of UK fraud professionals report that online fraud has negatively affected their company's revenue in the past year.
The UK Fraud Industry Pulse Survey from Veriff shows 72.5 percent of businesses have seen an increase in online fraud over the past 12 months.
Bluesky’s newly unveiled verification system is a unique and interesting approach


Social media has managed to make everyone more connected and informed than ever before, but it has also created a confusing mix of fact and misinformation. Part of the problem is knowing whether to trust that an individual on a particular platform is who they say they are.
Becoming verified on Twitter used to be a goal -- a dream, even -- for many people, but this changed when Twitter morphed into X and verification became a paid-for label available to anyone. Now rival platform Bluesky has unveiled a new component to its existing system of verification. It is an approach that others may learn from.
Install Linux on your old PC to save it from the landfill this Earth Day


Earth Day is tomorrow, and it is a time to reflect on how we treat the planet we all share (until Elon Musk colonizes Mars, at least). While some people mark the day by picking up trash or planting a tree, there’s another simple yet powerful way to help the environment that you might not have considered -- install Linux on your aging computer instead of tossing it in the trash!
Old computers don’t have to die. In fact, most of them still have plenty of life left in them -- if you’re willing to ditch bloated operating systems that no longer support them. That’s where Linux comes in. Unlike Windows 11, which demands modern processors and fairly high-end specs just to boot, many Linux distributions run smoothly on older hardware. Whether it’s a decade-old laptop collecting dust or a desktop with a failed Windows installation, Linux can breathe new life into machines that would otherwise end up in landfills.
Enterprises change how they manage cyber risk


A new report from Zafran Security shows that enterprise risk management is shifting from volume to value, and from patching everything to fixing what matters most.
The study, carried out by Foundry MarketPulse, reveals that only one in 50,000 vulnerabilities actually pose a critical risk -- and the ones getting exploited the most are often old, quiet, and ignored.
What does the future of AI-powered software development look like -- and how secure is it?


AI and machine learning tools have had an important role in software development for many years, helping to drive efficiency and automation. The new generation of AI tools has the potential to supercharge this transformation, bringing even greater improvements to efficiency, cost-effectiveness, and innovation cycles.
However, these tools also come with new risks, including security vulnerabilities, governance challenges, and regulatory uncertainty. As with any new technological approach, organizations bringing new AI tools and specifically AI-generated code into their development lifecycles must balance benefits with the potential risks.
Four common AI pitfalls -- and how to avoid them


Artificial intelligence (AI) is transitioning from an emerging technology to a business mainstay. While many businesses are already reaping the benefits of strategic AI implementation, others are adopting AI solutions without first considering how to integrate the tools strategically. While some AI tools offer tangible gains in automation and efficiency, others overpromise and underdeliver, leading to costly investments with little return.
Distinguishing marketing buzz from real-world impact is critical for businesses looking to make AI a true driver of operational success. Despite AI’s potential, many businesses fall into common pitfalls that prevent them from realizing the full value of innovative technology. From unclear objectives to poor integration and security risks, these challenges can turn AI from a competitive advantage into an expensive mistake.
Identity verification shifts in 2025 and what they mean for business and consumers [Q&A]


Generative AI is already defeating traditional identity verification (IDV) methods like knowledge-based authentication, 2FA, and more.
This shift is likely to see the acceleration of new forms of IDV in 2025 that place a greater emphasis on ensuring they're both more secure and easy for people to use. This will result in a convergence of customer identity and access management (CIAM) which essentially gives customers more control over their identity and verification.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.