Latest Technology News

Get 'Hacking For Dummies, 7th Edition' (worth $18) for FREE

Hacking-for-Dummies

Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.

Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.

Continue reading

Demonstrating application security is becoming key to closing business deals

business security

According to a new report, 84 percent of CISOs say that they are called into sales engagements related to closing sales of their company's products and services, highlighting the connection between AppSec and business growth.

The study from Checkmarx also reveals that 96 percent of CISOs say their prospects consider the level of application security of their organizations when making purchase decisions.

Continue reading

TEAMGROUP launches T-CREATE EXPERT CFexpress memory cards

TEAMGROUP has introduced not one but two new memory cards under its creator-centric sub-brand, T-CREATE: the T-CREATE EXPERT CFexpress Plus Type B and T-CREATE EXPERT CFexpress Type B Memory Cards.

Designed for the sophisticated requirements of DSLR, cinema, and high-end SLR cameras, these cards will absolutely meet the needs of creators needing continuous high-speed shots. Whether shooting 4K or 8K RAW high-bitrate videos for extensive periods, these cards should have no trouble keeping up.

Continue reading

UK Electoral Commission systems breached for over a year

Systems at the Electoral Commission, the body which oversees elections in the UK, have suffered a breach exposing electoral registers which hold the data of anyone registered to vote between 2014 and 2022. The Commission’s email system was also exposed in the breach.

In a statement on its website the Commission says it identified the incident in October last year but that systems were accessed as long ago as August 2021.

Continue reading

Will CISOs become obsolete in the future?

CISO

Navigating the complexities of today’s digital landscape, it's clear that cyber security can no longer be the sole accountability and responsibility of one person -- the CISO. As cyber threats evolve, becoming more frequent and sophisticated, a single individual can't feasibly manage it all. As a result, and at some point in the future, we may dare to consider that the traditional CISO role might eventually become obsolete as business units become secure-by-design.

We need to pivot. Rather than placing the weight of managing an organization's entire security on the shoulders of one person, we need to integrate cyber security throughout every layer of our operations. This means moving towards a world where every business unit and every employee in an organization understands and owns their role in maintaining cyber security.

Continue reading

How AI is going to shape the developer experience [Q&A]

Artificial intelligence

Recent developments in generative AI have led to a good deal of debate around whether jobs are at risk. Since new AI applications like OpenAI Codex and Copilot can write code, developers could be among those under threat.

We spoke to Trisha Gee, lead developer evangelist at Gradle, to find out more about how AI is likely to change the way developers work.

Continue reading

All Windows 11 users should install the KB5029263 update as soon as possible

Windows 11 logo on a laptop

Microsoft has released a large new cumulative update for Windows 11 in the form of the KB5029263 update.

As this release fixes a series of security issues in the operating system, everyone running Windows 11 22H2 should install it as soon as possible. KB5029263 is a mandatory update so it will be installed automatically -- eventually -- but it is important enough to justify taking manual action to ensure you have it immediately.

Continue reading

Real-time feedback is the key to improving the digital experience

remote work

Companies are always looking for ways to optimize their business performance and customer success. Realizing that employee satisfaction is critical to advancing business goals, many companies are taking a stronger look at their employees' digital experience.

Team members who are unhappy with technology that is supposed to help them do their jobs are less productive and more likely to leave an organization than employees who are happy with the technology stack. But, as hybrid work has become the norm, IT departments have had a harder task monitoring their employees’ digital experience.

Continue reading

Forget Windows 12, Windows Utopia is the ideal Microsoft operating system

Laptop-Windows Utopia

Microsoft is steadily working to improve Windows 11 and, if the rumors are true, it's already developing the successor to that operating system, Windows 12.

Although we don't know too much about that forthcoming OS yet -- Microsoft hasn't even officially announced it -- it's widely expected to be built around the AI-powered Windows Copilot.

Continue reading

Organizations only prevent six out of 10 cyberattacks

open digital lock

A new report shows that, on average, organizations’ security controls (such as next-gen firewalls and intrusion prevention solutions) only prevent six out of every 10 attacks.

The Blue Report 2023 study from Picus Security is based on an analysis of more than 14 million simulated cyberattacks.

Continue reading

Listen, do you want to know a password?

Researchers at British universities have demonstrated a technique that allows an AI model to work out what you’re typing simply by listening to the keystrokes.

Known as an acoustic side channel attack (ASCA) it involves recording the sound of a keyboard, either by using a nearby smartphone or via a remote conferencing session such as Zoom. Researchers used a standard iPhone 13 to record the sound of the Apple MacBook Pro 16-inch laptop keyboard at standard 44.1kHz quality.

Continue reading

The state of SMB security

SMB laptop

Headlines around the globe are typically focused on the big names and, more importantly, the big numbers when it comes to cyberattacks. From manufacturing to banking, education or healthcare, cyber incidents involving the loss of millions of records, or which have resulted in hefty fines are, inevitably, more likely to capture our attention.

Incidents involving a small firm of accountants whose data has been held to ransom, or a dentist’s practice that has been forced offline because of malware, may not reach the mainstream media but attacks on smaller businesses are happening with alarming regularity.

Continue reading

Improving the end user experience on the new network

The rapid shift to a remote workforce has transformed how IT manages business networks. Today, attention is shifting beyond the monitoring of traditional infrastructure made up of physical network devices such as switches, access points, and firewalls. The newly expanded network includes everything that connects end users to the applications they need to do their jobs, including cloud hosting services, collaboration platforms, smartphones, and all the underlying networks end users are connecting through.

The remote and mobile workforce requires IT to manage the end user experience no matter where employees work, whether from the office, home, or some other location. This distributed workforce creates challenges to ensure that all employees can maintain strong online connectivity. As IT teams strive to manage the extended network, they find a clear correlation between employee connectivity and performance. That is why it is so crucial to measure the end user experience and understand how individuals engage with all the digital tools that enable them to be effective in their job roles.

Continue reading

Open source framework aims to standardize security data

Cybersecurity benefits from being able to share information about threats in order to speed detection. In pursuit of this the Open Cybersecurity Schema Framework (OCSF) was launched last year by Splunk, Amazon Web Services (AWS), IBM and 15 other cybersecurity firms.

Today OCSF becomes generally available, delivering an open and extensible framework that organizations can integrate into any environment, application or solution to complement existing security standards and processes.

Continue reading

The latest beta version of Intel graphics drivers collect telemetry by default, including web visits

Intel GPU driver

There is always an element of risk involved in using beta software, particularly beta versions of drivers. But the latest pre-release GPU driver from Intel comes with a very unpleasant payload.

Run through the Intel Graphics Driver install without paying sufficient attention, and it will install in "typical" mode. This automatically signs you up for the Intel Computing Improvement Program (CIP), a telemetry feature which collects a huge amount of data including information about the websites a user visits.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.