Latest Technology News

Belkin BoostCharge Pro 2-in-1 Wireless Charging Pad with MagSafe is compact, sustainable, and powerful

Today, popular accessory-maker Belkin revealed its latest product: the BoostCharge Pro 2-in-1 Wireless Charging Pad with MagSafe. This compact, travel-friendly gadget offers the convenience of charging your iPhone and AirPods simultaneously.

The BoostCharge Pro 2-in-1 pad is the most recent offering in Belkin’s Made for MagSafe collection. Currently available in black and white colors, the pad features 15W fast wireless charging for iPhone 12 and later models, and 5W charging for AirPods with wireless charging case and AirPods Pro. Its sleek, slim design, packaged with a USB-C power supply, is complemented by an LED light to indicate charging status.

Continue reading

HyperX launches Cloud Stinger 2 gaming headsets for PlayStation and Xbox

HyperX has just launched its latest entries to the gaming headset market -- the Cloud Stinger 2 for PlayStation and CloudX Stinger 2 for Xbox. Both headsets feature plush memory foam and a luxurious leatherette finish, ensuring users get the best of both worlds: unrivaled sound quality and lasting comfort.

The Cloud Stinger 2 for PlayStation and CloudX Stinger 2 for Xbox come equipped with robust 50mm drivers that ensure crystal clear audio. The rotating earcups provide a snug fit, while the easily accessible audio controls and swivel-to-mute microphone contribute to their user-friendly design.

Continue reading

A clean bill of health: Harnessing data for precision healthcare

Healthcare data

Unlike other industries, UK healthcare isn’t defined by how much revenue can be generated. Instead, success is measured in terms of achieving positive health outcomes for patients.

With new healthcare data available from a variety of sources -- such as wearables, clinical trials and biometric sensors -- healthcare is now driven as much by the promise of data processing and advanced analytics as it is by developing new and specialized drugs. So, how can healthcare professionals move faster, and gain actionable insights from the huge volumes of data they collect?

Continue reading

Over a third of ICS vulnerabilities have no patch available

Industrial internet of things

New research from SynSaber, along with the ICS Advisory Project, into industrial control operational technology system vulnerabilities finds that 34 percent of the CVEs reported in the first half of 2023 currently have no patch or remediation available from the vendor.

This compares to the 35 percent that had no fixes in the second half of 2022 but is a significant increase from the 13 percent in the first half of last year.

Continue reading

Get 'Cloud Auditing Best Practices' (worth $35.99) for FREE

As more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important.

But in this fast-moving domain, getting the most up-to-date information is a challenge -- so where do you turn? Cloud Auditing Best Practices has all the information you’ll need. With an explanation of the fundamental concepts and hands-on walk-throughs of the three big cloud players, this book will get you up to speed with cloud auditing before you know it.

Continue reading

Adapting to a changing cybersecurity landscape [Q&A]

Laptop security

The past few years have seen some major changes in the IT world. Accelerated by the pandemic we've seen a significant shift to the cloud and hybrid working models.

But this brings with it additional risks. We spoke to Matt Spitz, head of engineering at Vanta, to discuss the security challenges posed and how enterprises can adapt to cope with them.

Continue reading

SSH is the service most targeted by cloud attackers

A new cloud threat findings report from Cado Security looks at the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.

The report shows SSH is the most commonly targeted service accounting for 68.2 percent of the samples seen, followed by Redis at 27.6 percent, and Log4Shell traffic at a mere 4.3 percent, indicating a shift in threat actor strategy no longer prioritizing the vulnerability as a means of initial access.

Continue reading

Organizations are responding faster to cyber threats

On average, organizations' response time to cyber attacks improved by around a third -- from 29 to 19 days -- from 2021 to 2022.

The report from Immersive Labs suggests this improvement can be attributed to the urgency and need for fast response times amid the fallout of the Log4j crisis and other high-profile vulnerabilities over the past year.

Continue reading

Microsoft releases PowerToys v0.72.0 with new plugins and a massively reduced footprint

Microsoft PowerToys

A PowerToys release cycle focused on stability and improvements may not sound terribly exciting, but with the newly hatched PowerToys v0.72.0 Microsoft has delivered significant updates that you won't want to miss out on.

Although there are no brand-new modules to explore, PowerToys Run has new plugins to work with. There are also a huge number of bug fixes and improvements across pretty much all areas of the utility, and a great new feature for Mouse Highlighter. On top of this, Microsoft has managed to dramatically slash the installation footprint of the PowerToys collections.

Continue reading

Lexar launches high-performance NM790 M.2 NVMe SSD and ARES RGB desktop memory

Today, Lexar launches a trio of game-changing additions to its gaming portfolio. The new arrivals, namely Lexar NM790 M.2 2280 PCIe Gen 4x4 NVMe SSD, Lexar ARES RGB DDR5 Desktop Memory in 6400MT/s, and Lexar ARES RGB DDR4 Desktop Memory in 3600MT/s, are available to PC gamers.

Starting off with the Lexar NM790 M.2 NVMe SSD, this storage solution is a gaming and content creation powerhouse, delivering read speeds up to an astounding 7400MB/s and write speeds up to 6500MB/s. Built on PCIe Gen4 technology and coupled with HMB 3.0 and Dynamic SLC Cache, the NM790 SSD is your trusty sidekick for annihilating adversaries in gaming or tackling demanding creative tasks.

Continue reading

Borderless data: Acting locally, thinking globally

Global data

Around the world, data borders and regulations are being strengthened in a drive to protect customer privacy and fight cybercrime. As a result, multinational businesses are contending with a complex regulatory landscape. For business, data, and technology leaders, today’s challenge is to comply with local regulations while respecting customer expectations and managing complex global supply chains. To meet these macro and micro-economic challenges, organizations are looking for borderless data systems that enable global business operations but meet local demands.

The European Union’s General Data Protection Regulation (GDPR) has given rise to similar laws across the world, and the United Nations Conference on Trade and Development (UNCTAD) reports that 71 percent of countries have data protection regulations in place and 9 percent have legislation in development. Data governance professionals have increased their focus on data and cloud sovereignty in response, as some of these regulations restrict how data can be shared across physical national borders. In many cases, these regulations are positive and protect organizations and nations from criminals and aggressive states. However, today’s supply chains require data to be shared. A further complication is that cloud computing enables data sharing and business efficiency, yet the major cloud computing providers are firms from the USA. These businesses must comply with the US Cloud Act, which gives the US government access to data stored by these firms, even when hosting takes place outside of the USA.

Continue reading

Europe stays on top for broadband speeds

Mobile internet connection speed

Comparison site Cable.co.uk has released its annual analysis of broadband speed tests around the globe.

As in last year's report Western Europe tops the regional charts with an average download speed of 118.69Mbps, with North America second on an average of 94.02Mbps.

Continue reading

Over half of Azure and Google Cloud deployments fail CIS benchmarks

Cloud misconfiguration is a critical issue as it amplifies the risk of data breaches and unauthorized access. But new research from Qualys shows that many cloud deployments on major platforms are failing Center for Internet Security (CIS) benchmarks.

The report finds that on average, 50 percent of CIS Benchmarks are failing across the major providers. The average fail rate for each provider is 34 percent for AWS, 57 percent for Azure, and 60 percent for Google Cloud Platform (GCP).

Continue reading

80 percent of digital certificates vulnerable to man-in-the-middle attacks

Magnified certificare

A new survey finds that nearly 80 percent of TLS certificates on the internet are vulnerable to man-in-the-middle (MiM) attacks, while as many as 25 percent of all certificates are expired at any given time.

The study, sponsored by automated machine identity management firm AppViewX and carried out by EEnterprise Management Associates (EMA), focuses on servers with SSL/TLS certificates on port 443.

Continue reading

Plugable USBC-4IN1 is the company's first single-chip hub

Today, Plugable launches its first-ever single-chip hub. Called "USBC-4IN1," this adapter combines power and data transfer capabilities in a compact package. The hub, which utilizes the PS188 chip, offers dual-function USB-C port capabilities, including 100W power pass-through charging and high-speed 10Gbps data transfer.

The hub is compatible with laptops that have a full-featured USB-C or Thunderbolt port. As far as operating system support, it will work with macOS 11+, Windows 10+, or ChromeOS.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.