Latest Technology News

All Windows 11 users should install the KB5029263 update as soon as possible

Windows 11 logo on a laptop

Microsoft has released a large new cumulative update for Windows 11 in the form of the KB5029263 update.

As this release fixes a series of security issues in the operating system, everyone running Windows 11 22H2 should install it as soon as possible. KB5029263 is a mandatory update so it will be installed automatically -- eventually -- but it is important enough to justify taking manual action to ensure you have it immediately.

Continue reading

Real-time feedback is the key to improving the digital experience

remote work

Companies are always looking for ways to optimize their business performance and customer success. Realizing that employee satisfaction is critical to advancing business goals, many companies are taking a stronger look at their employees' digital experience.

Team members who are unhappy with technology that is supposed to help them do their jobs are less productive and more likely to leave an organization than employees who are happy with the technology stack. But, as hybrid work has become the norm, IT departments have had a harder task monitoring their employees’ digital experience.

Continue reading

Forget Windows 12, Windows Utopia is the ideal Microsoft operating system

Laptop-Windows Utopia

Microsoft is steadily working to improve Windows 11 and, if the rumors are true, it's already developing the successor to that operating system, Windows 12.

Although we don't know too much about that forthcoming OS yet -- Microsoft hasn't even officially announced it -- it's widely expected to be built around the AI-powered Windows Copilot.

Continue reading

Organizations only prevent six out of 10 cyberattacks

open digital lock

A new report shows that, on average, organizations’ security controls (such as next-gen firewalls and intrusion prevention solutions) only prevent six out of every 10 attacks.

The Blue Report 2023 study from Picus Security is based on an analysis of more than 14 million simulated cyberattacks.

Continue reading

Listen, do you want to know a password?

Researchers at British universities have demonstrated a technique that allows an AI model to work out what you’re typing simply by listening to the keystrokes.

Known as an acoustic side channel attack (ASCA) it involves recording the sound of a keyboard, either by using a nearby smartphone or via a remote conferencing session such as Zoom. Researchers used a standard iPhone 13 to record the sound of the Apple MacBook Pro 16-inch laptop keyboard at standard 44.1kHz quality.

Continue reading

The state of SMB security

SMB laptop

Headlines around the globe are typically focused on the big names and, more importantly, the big numbers when it comes to cyberattacks. From manufacturing to banking, education or healthcare, cyber incidents involving the loss of millions of records, or which have resulted in hefty fines are, inevitably, more likely to capture our attention.

Incidents involving a small firm of accountants whose data has been held to ransom, or a dentist’s practice that has been forced offline because of malware, may not reach the mainstream media but attacks on smaller businesses are happening with alarming regularity.

Continue reading

Improving the end user experience on the new network

The rapid shift to a remote workforce has transformed how IT manages business networks. Today, attention is shifting beyond the monitoring of traditional infrastructure made up of physical network devices such as switches, access points, and firewalls. The newly expanded network includes everything that connects end users to the applications they need to do their jobs, including cloud hosting services, collaboration platforms, smartphones, and all the underlying networks end users are connecting through.

The remote and mobile workforce requires IT to manage the end user experience no matter where employees work, whether from the office, home, or some other location. This distributed workforce creates challenges to ensure that all employees can maintain strong online connectivity. As IT teams strive to manage the extended network, they find a clear correlation between employee connectivity and performance. That is why it is so crucial to measure the end user experience and understand how individuals engage with all the digital tools that enable them to be effective in their job roles.

Continue reading

Open source framework aims to standardize security data

Cybersecurity benefits from being able to share information about threats in order to speed detection. In pursuit of this the Open Cybersecurity Schema Framework (OCSF) was launched last year by Splunk, Amazon Web Services (AWS), IBM and 15 other cybersecurity firms.

Today OCSF becomes generally available, delivering an open and extensible framework that organizations can integrate into any environment, application or solution to complement existing security standards and processes.

Continue reading

The latest beta version of Intel graphics drivers collect telemetry by default, including web visits

Intel GPU driver

There is always an element of risk involved in using beta software, particularly beta versions of drivers. But the latest pre-release GPU driver from Intel comes with a very unpleasant payload.

Run through the Intel Graphics Driver install without paying sufficient attention, and it will install in "typical" mode. This automatically signs you up for the Intel Computing Improvement Program (CIP), a telemetry feature which collects a huge amount of data including information about the websites a user visits.

Continue reading

Microsoft announces indefinite postponement of multi-account search in Outlook

Delayed flights sign

With few people having just one email address nowadays, the problem of searching for email across two or more accounts is one that affects many users. Just last month, Microsoft announced an upcoming feature for its Outlook email client -- the ability to search across multiple email accounts simultaneously.

Now the company has had a change of heart, updating its plans to indicate that the handy option is now "postponed indefinitely".

Continue reading

Ubuntu-based Rhino Linux 2023.1 now available for download

Great news, fellow Linux enthusiasts! Rhino Linux has officially shed its Beta label, unleashing the new Rhino Linux 2023.1. This release is available for x86_64, ARM, Pine64, and Raspberry Pi devices.

AJ, the primary developer behind Rhino Linux, evolved the project from a simple hobby into an entirely new desktop operating system. Inspired by the initial success of Rolling Rhino Remix, the idea of Rhino Linux was born in October 2022, aiming for a maintainable and practical solution.

Continue reading

PayPal USD (PYUSD) stablecoin is designed to maintain a $1 value

Today, PayPal launched PayPal USD (PYUSD), a U.S. dollar-denominated stablecoin. As web3 gains momentum, PayPal’s newest offering aims to capitalize on the advantages stablecoins present in digital transactions.

PayPal USD is pegged 1:1 with the U.S. dollar, and its underlying assets include U.S. dollar deposits, short-term U.S Treasuries, and equivalent cash reserves. Issued by Paxos Trust Company, PayPal USD aims to provide the stability needed in the fast-evolving digital currency space.

Continue reading

Watch Microsoft Windows 1.0 running on an Apple MacBook Air

It's always fun to try and run old games and apps on modern versions of Windows, if only to see if you can, and how they'll look.

If that's not challenging enough, you could consider trying to run a really old version of Windows on hardware it was never intended for, such as a MacBook Air.

Continue reading

Cybercriminals step up their targeting of macOS

Attack button

Historically Windows has been the favorite target of cybercriminals, but new research from Accenture suggests macOS is becoming a lucrative priority on the dark web and information on exploits is being traded for millions of dollars.

The Accenture Cyber Threat Intelligence (ACTI) team has noted a significant upward trend in dark-web threat actors targeting macOS from 2019 to 2022 and the volume from 2023 has overtaken 2022 in just the first six months.

Continue reading

The future of identity and cybersecurity [Q&A]

Back in May, when World Password Day was once again in the news, we asked whether the days of the password were numbered.

Rishi Bhargava, co-founder of Descope, agrees that passwords belong to the past. We spoke to him to discover more and find out how new technologies like passkeys are driving the change.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.