Latest Technology News

Software is now driving the Electric Vehicle charging market

Electric Vehicle (EV) adoption is outperforming all expectations, and is now expected to represent over half of US vehicle sales by 2030, as shown in this graph.

The 'key link' to mass adoption is now software, not hardware or vehicles. Fortunately, software innovations are already providing solutions to many of the scaling challenges and will play a crucial role in EV adoption. From $1bn in 2021, EV charging software is forecast to grow to $25bn by 2030, making it one of the fastest growing software sector in the market today and a huge opportunity for value creation for founders and VC’s.

Continue reading

The skills gap to become the skills chasm in 2023

2022 has been a landmark year for cybersecurity, but mostly for the wrong reasons. Although technological advancements in the security industry have been dynamic throughout the year, cyberattacks across industries have reached record highs. According to the latest reports, 76 percent of organizations across North America, Europe, and Australia experienced at least one cyberattack in 2022 -- a staggering 20 percent increase from 2020.

Most of these attacks originated from malicious emails and credential leaks. In fact, phishing attacks increased by 61 percent in 2022, with businesses reporting over 255 million phishing attacks last year. Unfortunately, things are not looking good for 2023. The ongoing cyber skills shortage, coupled with the crushing economic crisis across industries, mean that cyberattacks will continue to soar this year. Inevitably, the security teams will be tasked with the monumental challenge of keeping such soaring threats at bay. So, what major challenges should industry leads expect in 2023? And what advanced practices can businesses leverage to address these issues?

Continue reading

Phishing Campaigns Abusing Web3 Platforms Increased by 482% in 2022

Web3 platforms have surged in popularity over the years and continue to catch headlines with billion-dollar investments as well as significant downturns. According to McKinsey, despite early funding issues, adoption of Web3 applications has occurred at an exponential pace, which has led to many industry professionals questioning how safe and stable these platforms are.

Web3 platforms are designed to make content hosting more available to individuals, evade censorship, guarantee access to the published content and avoid technical problems like server management, making these platforms attractive for threat actors seeking to host malicious content.

Continue reading

Are autonomous vehicles the answer to making cities more livable?

Autonomous vehicles have the potential to revolutionize the way we live and move around in cities. From reducing traffic congestion and improving safety to increasing accessibility and efficiency, there are many positive aspects to consider.

However, there are also negative considerations, such as job loss and privacy concerns, that must be addressed. In this article, we will delve into the various ways in which autonomous vehicles could make cities more livable, as well as address some of the potential challenges.

Continue reading

5 cloud space trends to watch in 2023

The past few decades have seen the cloud evolve from a nebulous concept to an essential component of our increasingly data-anchored lives. Recently, the adoption of cloud-based offerings has skyrocketed thanks to hybrid work models emerging, AI technologies gaining traction and the rapid deployment of automation tools, all of which play an ever-more important role in business strategies.

Here are five ways the cloud space will evolve in 2023 and beyond.

Continue reading

Why your organization's biggest risk might come from your browsers [Q&A]

Internet security with browser logos

Last year saw zero day vulnerabilities being actively exploited in the wild across many of the major web browsers.

For businesses that allow their users to choose which browser they use this is a problem due to the frequency of vulnerabilities. We spoke to Ofer Ben-Noon, co-founder and CEO at Talon Cyber Security and former member of the Israeli intelligence community, to find out more about the current threat landscape and how firms can secure their browsers.

Continue reading

Kodi 20.0 'Nexus' is available to download now -- here's what's new and improved

Kodi

The second and final Release Candidate for Kodi 20 'Nexus' was rolled out to testers a month ago and today the full, finished version arrives. This is the first release in a while that clears all known blockers, meaning it becomes available for all platforms.

Kodi 20.0 'Nexus' brings a wealth of changes, fixes and new features to the popular home theater software, including support for multiple instances of binary add-ons, AV1 Video support, and a massive rework of the subtitle system.

Continue reading

Major security breach exposes usernames and passwords of Norton Password Manager customers

Hacker typing username and password

The company behind NortonLifeLock, Gen Digital, has issued a warning to customers about a security breach that took place in December. Hackers used a credential-stuff attack to gain access to hundreds of thousands of Norton Password Manager accounts.

Gen Digital says that its own systems were not compromised, but warns affected customers that "we strongly believe that an unauthorized third party knows and has utilized your username and password for your account".

Continue reading

Microsoft releases a script to restore a 'subset' of shortcuts deleted by rogue Defender ASR rule

Microsoft Defender on a laptop

Towards the end of last week, Microsoft confirmed an issue that stemmed from a flawed Microsoft Defender for Endpoint ASR rule that results in the deletion of app shortcuts from the Start menu, desktop and taskbar.

The company issued an update to prevent the problem from arising again, but said that there was no alternative but to manually recreate any shortcuts that had been lost. Now though Microsoft has released a PowerShell script that will automatically recreate some -- but not all -- deleted shortcuts. The company has also released a trio of advanced hunting queries (AHQs) to help with the issue.

Continue reading

MX Linux 21.3 'Wildflower' is ready for download

Today, the Linux community is treated to yet another new distribution version. An ISO of MX Linux 21.3, the third point release in the "Wildflower" series, can be downloaded here immediately with your choice of Xfce, KDE Plasma, or Fluxbox.

Most notably, the operating system (which is based on Debian 11.6 "Bullseye") has Linux kernel 6.0 available (in addition to 5.10). The Xfce variant of MX 21.3 now uses version 4.18 of the desktop environment, which is the latest and greatest. Obviously, many packages and applications have been updated too.

Continue reading

Enterprises need to step up metadata management now

Data Stream

It’s no exaggeration to say that data drives business today. Organizations are literally flooded with data on all fronts, particularly as they accelerate their digital transformation and cloud migration. As data proliferates, it’s increasingly difficult to manage. That’s where metadata comes in. Though metadata is often described as "data about data," it’s actually much more than that.

Metadata is generated whenever data is ingested, accessed by users, moved around an organization, integrated or augmented with data from other sources, profiled or cleaned and analyzed. All this information creates the context for other data elements, providing a complete picture of the data. This holistic view makes it possible to organize and locate data, to understand what it means and to maximize its value.

Continue reading

Tweetbot and other third-party clients stop working as Twitter 'intentionally' blocks API access

Black Twitter logo

If you are a Tweetbot user who found yourself unable to access Twitter, you're not alone. Tweetbot, along with various other third-party Twitter clients stopped working on Thursday, it seems as though this is the result of an intentional block by Twitter.

Although the company has yet to say anything to either confirm or deny that third-party access to the Twitter API has been blocked, it is something that has been confirmed in leaked internal communication from Twitter engineers. One says: "third-party app suspensions are intentional".

Continue reading

Future versions of Chrome will allow browser extensions to be disabled on a site-by-site basis

Disable Chrome extensions for a site

In a future update to Chrome, Google will give users the option of having extensions enabled or disabled on a site-by site basis.

This is an option that some browser extensions -- notably ad-blockers -- feature as standard, but the update will expand this so it applies to all add-ons. With a few clicks it will be possible to quickly disable all extensions for a particular site for the purposes of compatibility, privacy or performance.

Continue reading

Microsoft Defender for Endpoint ASR rule blamed for deleting desktop, taskbar and Start menu shortcuts

Microsoft logo

Users of Microsoft Defender for Endpoint have been experiencing what has been described as a "weird issue" that not only caused shortcuts to be deleted from the Start menu, desktop and taskbar, but also led to issues with Office apps.

The problem was traced to a flawed Microsoft Defender for Endpoint ASR (attack surface reduction) rule, and while Microsoft has now released a fix, this is not without problems of its own. Users are being warned that any shortcuts that have disappeared will need to be manually recreated.

Continue reading

Microsoft brings the Windows 11 Media Player to Windows 10

The writing has been on the wall for Groove Music for quite some time now, with Microsoft having resurrected Media Player as a replacement in Windows 11.

Now, as expected, the company is doing the same for Windows 10 users. Microsoft is bringing the same Media Player app found in Windows 11 to the older operating system, migrating users away from the Groove Music app.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.