Native Spectre v2 exploit puts Intel systems running Linux at risk
It's been some time since we discussed the initial Spectre security flaw that impacted numerous CPUs, and which was subsequently followed by the Spectre v2 vulnerability. Now there are new concerns following the discovery of the first native Spectre v2 exploit against the Linux kernel.
Researchers from the Systems and Network Security Group at Vrije Universiteit Amsterdam (VUSec) have demonstrated that Intel CPUs running Linux are vulnerable to Native Branch History Injection (BHI). VUSec says its InSpectre Gadget tool can be used to "not only uncover new (unconventionally) exploitable gadgets in the Linux kernel, but that those gadgets are sufficient to bypass all deployed Intel mitigations".
Here are the best new features of Windows 11 Moment 5 -- and why you should install it now right!
While Microsoft releases updates for Windows 11 every month, some are more significant with others. The company has taken to releasing 'moment' updates from time to time, and these are where more interesting changes and additions are to be found.
Earlier this week, Microsoft released the eagerly awaited Moment 5 update for Windows 11 when it unleashed the KB5036893 update on April's Patch Tuesday. But just what is included in Moment 5, and is it worth installing? In short, there's a lot to be found in the update and, yes, it is definitely worth installing now. Let's take a look.
Google Photos gets FREE editing tools: Magic Eraser, Photo Unblur, and more
Google Photos is set to enhance your photo editing experience with an exciting update. The search giant is bringing a suite of AI-powered editing tools, including the much-loved Magic Eraser, Photo Unblur, and Portrait Light, to all users for free, starting May 15.
Previously exclusive to subscribers, these features will now be accessible to anyone using Google Photos, with no subscription required!
Get 'Cybersecurity and Decision Makers: Data Security and Digital Trust' (worth $142) for FREE
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience.
As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities.
Peace of mind: Cloud is key in scaling systems to your business needs
Meeting the demands of the modern-day SMB is one of the challenges facing many business leaders and IT operators today. Traditional, office-based infrastructure was fine up until the point where greater capacity was needed than those servers could deliver, vendor support became an issue, or the needs of a hybrid workforce weren’t being met. In the highly competitive SMB space, maintaining and investing in a robust and efficient IT infrastructure can be one of the ways to stay ahead of competitors.
Thankfully, with the advent of cloud offerings, a new scalable model has entered the landscape; whether it be 20 or 20,000 users, the cloud will fit all and with it comes a much simpler, per user cost model. This facility to integrate modern computing environments in the day-to-day workplace, means businesses can now stop rushing to catch up and with this comes the invaluable peace of mind that these operations will scale up or down as required. Added to which, the potential cost savings and added value will better serve each business and help to future-proof the organization, even when on a tight budget. Cloud service solutions are almost infinitely flexible, rather than traditional on-premises options and won’t require in-house maintenance.
Biometrics trust is in crisis -- is there a path forward for the technology's adoption?
Biometrics’ promise of security and convenience has unfortunately given way to widespread distrust and legitimate security concerns. If you’re unfamiliar with biometrics, think of the last time a customer service call offered you voice authentication or when you used Face ID to unlock your phone -- these are examples of collecting and storing your biometric data.
The rise of AI has undoubtedly made an impact on consumer trust in consumer biometrics, as it’s able to piece together all your biometric data for more nefarious purposes such as identity theft. This should come as no surprise as social feeds are littered with convincing deep fake videos of politicians during this election season.
Transforming pain into profit -- modern end-user computing
In the era of end-user computing, the terms ‘next gen’ and ‘revolutionary’ are commonly used to refer to the shift away from outdated legacy Virtual Desktop Infrastructure (VDI) systems to a modern, cloud-first approach that combines on-premises and cloud environments. End-user computing (EUC) has historically been a costly IT expense, but this hybrid multi-cloud approach is a cost-effective performance booster. Contemporary solutions and strategies, including cloud-first VDI implementation, enable these systems to vastly simplify the construction, operation, and management of EUC environments, and revolutionize end-user computing.
IT leaders often face significant challenges when adopting a hybrid multi-cloud strategy, primarily due to the intricate nature of managing different private and public clouds. These complexities are further exacerbated by ongoing issues stemming from legacy VDI systems. In order to turn this source of frustration into a source of proficiency and profit, CIOs and IT leaders must look to modernize their approach.
How will Apple's sideloaded apps impact corporate IT? Analyzing the critical risks
Apple is known for maintaining high standards when it comes to the App Store. It has put strict developer guidelines in place, runs a thorough review process on new apps that are submitted to the marketplace, and monitors apps to ensure they deliver what developers promise.
This tightly controlled environment has been established to maintain a great user experience, preserve end-user privacy, and protect the platform from bad actors, all while allowing third-party developers to create compelling experiences on Apple’s mobile platforms. Apple’s operating system design, coupled with these protective policies, has helped to keep the iPhone and the applications that run on it generally immune from widespread threats for almost two decades now.
Gentoo Linux partners with Software in the Public Interest (SPI)
Gentoo Linux has become an Associated Project of Software in the Public Interest (SPI), following a formal invitation by SPI’s Board of Directors. SPI is a non-profit corporation dedicated to supporting open source software and hardware projects by providing fiscal sponsorship services such as accepting donations, holding funds and assets, and more. Importantly, SPI holds a 501(c)(3) status in the U.S., meaning donations made to SPI and its supported projects are tax-deductible for U.S. donors.
Gentoo Linux excels as a Linux distribution but has faced challenges in maintaining its non-profit status in the U.S. The Gentoo Foundation, while a non-profit in New Mexico, is considered a for-profit entity at the federal level. Transitioning directly to a federally recognized non-profit would be complex and costly.
Women face exclusion from cybersecurity roles
A new report uncovers widespread gender disparities in the cybersecurity workplace, with women encountering exclusion at twice the rate of men.
The study -- from Women in CyberSecurity (WiCyS), a non-profit organization dedicated to the recruitment, retention and advancement of women in cybersecurity, in conjunction with with DEI firm Aleria -- finds the top four categories of exclusion faced by women are: respect, career and growth, access and participation, and recognition.
Auto industry is prime target for email attacks
The automotive industry has become a popular target for business email compromise and vendor email compromise attacks, according to new research from Abnormal Security.
Between September 2023 and February 2024, BEC attacks against businesses in the automotive industry increased by 70.5 percent. Over the same period 63 percent of Abnormal Security customers in the automotive industry experienced at least one VEC attack.
Meta adds HD photo support, 100MB files and collaborative shared photo albums to Messenger
Meta has announced a quartet of new features for Messenger all aimed at improving the file sharing experience. Kicking things off is the ability to send high-definition photos to ensure that quality is retained.
This is a change that will please many users, but the other additions are arguably more interesting. There is not only support for the sending of significantly larger files than has been possible thus far, but also a new shared album feature that enables chat participants to collaborate on a photo album. There is also the new option to add people to your Messenger contacts using QR codes.
Microsoft releases Windows 11 Moment 5 and fixes scores of vulnerabilities with KB5036893 update
Windows 11 Moment 5 is now available to everyone. Microsoft has released the KB5036893 update as part of its monthly update schedule, bringing the new Moment 5 features to all users, not just Windows Insiders.
As well as updating Snap Layouts and Copilot, KB5036893 also includes changes to widgets and injects AI features into Photos and Clipchamp. There are also fixes for a huge number of security issues.
Why you should worry more about SaaS than generative AI [Q&A]
There's a lot of talk at the moment about how the use of AI opens up businesses to additional risk. But is AI itself the issue or is it the way in which it's integrated with other applications?
We talked to Ran Senderovitz, chief operating officer of Wing Security, to discuss how enterprises need to re-prioritize their security to address the real attack surface, the SaaS apps that leverage AI.
Microsoft brings Blizzard Entertainment games back to China
Blizzard Entertainment, Microsoft Gaming, and NetEase have announced a renewed publishing deal that will see beloved video game titles return to the Chinese market, starting this summer. The agreement marks the continuation of discussions over the past year and signifies a commitment to once again support players in mainland China.
The renewed publishing agreement includes popular games that Chinese players had access to under the previous agreement, such as World of Warcraft, Hearthstone, and other titles in the Warcraft, Overwatch, Diablo, and StarCraft universes.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.


