Linksys launches Velop Pro 6E Tri-Band mesh Wi-Fi system


Today, Linksys unveils its latest network offering. Called “Velop Pro 6E,” it's the inaugural product of the company’s new Designer Series. It features a "nature inspired" droplet design and is equipped with a host of advanced features aimed at providing an unbeatable Wi-Fi 6E experience at a cost-effective price.
The Velop Pro 6E, available in colors such as Carbon Black, Pebble Gray, and Pure White, is a clear response to market demand for home network devices that not only provide superior connectivity but also blend seamlessly with home decor. "Today a Connected Home with ubiquitous Wi-Fi is the new normal, but people want the network devices to blend into their decor,” said Vice President of Experience, Jeevan Patil.
Blender 3.6 LTS adds real-time simulation to Geometry Nodes, numerous performance and UI improvements


The Blender Foundation has released Blender 3.6 LTS, the latest -- and final -- point release in the 3.x series. As is customary with all Blender point releases, version 3.6 of the popular and powerful open-source, cross-platform 3D creation suite contains several eye-catching new features along with "significant" performance improvements.
These include initial support for simulations in Geometry Nodes, which allows users to define simulations through the "Simulation Zone". This connects both Simulation Input and Output together through nodes. After the inputs are initially evaluated on the first frame, subsequent outputs simply outputs the results of the previous frame.
Dropbox introduces new AI-powered productivity features


Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.
Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.
How small business owners can reassess their cybersecurity strategies during economic downturns


The economic headwinds are blowing, and that has a lot of people nervous, not the least of whom are small business (SMB) owners across the country. With talk of recession in the air, SMB owners and their investors are paying extra attention to their bottom lines to maintain efficiency and innovation while managing costs. In many cases budgets are being squeezed, body counts are being leveled or reduced, and programs thought to be outside the core function of the enterprise are being slashed. It is unfortunate, however, that cybersecurity is often among the programs on the chopping block as it is perceived to be a less-than-essential expense.
As a former (and current) small business owner whose previous business was decimated by a malicious cyber-attack, I can attest to the short-sightedness of the belief that cybersecurity is an add-on, not a must-have.
TUXEDO InfinityBook Pro 16 is a thin and powerful Linux laptop


Today, TUXEDO launches the new 8th generation InfinityBook Pro 16. This Linux laptop brings impressive CPU performance, NVIDIA GeForce graphics, and a svelte design to the table. Housed within an incredibly thin, 17mm, 1.6 kg magnesium-enhanced chassis, this machine is not just about style; it's about serious performance as well.
This new notebook from TUXEDO is designed for content creators, software developers, and business users who value not only an aesthetically pleasing slim design but also impressive performance under the hood, thanks to the Intel Core i7-13700H and optional NVIDIA GeForce RTX 4060 or RTX 4070 graphics.
Attackers exploit the growing use of mobile devices


The growth in mobile device and app usage has created a growing attack surface, with 60 percent of global web traffic now coming from mobile devices. So it's not surprising that increasing numbers of cybercriminals and nation state actors want to exploit these areas of vulnerability.
The latest Global Mobile Threat Report from Zimperium finds that 80 percent of phishing sites now either specifically target mobile devices or are built to function on both mobile devices and desktops.
Data clean rooms: The power of second-party data


A staggering 81 percent of advertisers depend on third-party data to reach customers and understand prospects’ buying habits. Their reliance on this data, however, comes with a problem. Exponential cookie decay, government legislation, and increasing consumer demand for data privacy make accessing this data more difficult.
Many brands are turning to data clean rooms (DCR) as a solution. DCRs help companies leverage second-party data to hone their marketing and advertising. In fact, 80 percent of advertisers with media buying budgets over $1 billion will use DCRs by the end of 2023. So, what makes DCRs so popular? This article will show how DCRs can be an incredibly powerful MarTech tool that fosters collaboration among brands, enabling them to gain insights, form ‘lookalike’ audiences, and advertise directly to their user base.
Text messaging's potential could lead to huge growth for the mobile industry


If you are under 30, you’ve never known a world without texting. Even if you’re much older, messaging has been ubiquitous for so long, it’s easy to forget you never knew the power of your thumbs when you were a child. Text messaging can mean different things to different people. Some equate text messaging with SMS. For others -- and I fall into this camp -- text messaging is a wider catch-all for SMS and chat apps such as WhatsApp, Viber etc. That’s the definition we’ll be going with.
Trillions of texts are sent every day. It is a technology we are very comfortable with. And it’s not just personal messages we are happy to receive. Many research companies in the sector report that when consumers are asked how many A2P (Application-to-Person) SMS they receive from organizations each month, the figures the people quote are actually lower than the actual number of messages they receive. This is down to so many not regarding messages from organizations such as dentists and hospitals as being business-to-consumer (B2C) type messages when they actually are.
Adapt or get left behind: Why 'shift everywhere' is the new imperative for application security


Digital transformation is now an integral part of the success story of every modern organization. However, there is ever greater pressure on developers to speed up release cycles as the software on which organizations rely. This is the foundation for revenue growth, competitive advantage and long terms business success so the impetus to reduce lifecycles is built on commercial necessity.
Organizations want to be the first to market with the latest and greatest software which can mean that risks are introduced as the pressure to meet a deadline surpasses the need to ensure that all code is free from any vulnerabilities.
Proton Pass free password manager emerges from beta


Although alternative technologies continue to make inroads, most of us are still heavily reliant on passwords to secure our digital identities.
Proton, the company behind Proton Mail, Proton VPN and other products, launched a new, free password manager called -- you'll have guessed already -- Proton Pass in beta a couple of months ago.
Why CSOs are prioritizing PKI infrastructure as they adapt to post-quantum cryptography [Q&A]


A growing number of machine identities leaves organizations with the task of managing increasingly complex PKI infrastructure.
We spoke to Chris Hickman, CSO of Keyfactor, about how organizations can go about reducing PKI complexity as well as other trends to keep in mind as they adapt to an era of post-quantum cryptography.
Majority are worried about the safety and accuracy of ChatGPT


As generative AI tools continue to make the news there are growing concerns over safety and security as well as the accuracy of information produced.
Most people don't trust ChatGPT and have worries about its security and safety according to a new survey from Malwarebytes. The research shows that 81 percent are concerned about security and safety risks.
DDoS attacks more than doubled in 2022


New research from Nexusguard shows that last year DDoS attacks worldwide increased by 115.1 percent over the 2021 level.
Attackers have also continued to alter their threat vectors by targeting the application platforms, online databases, and cloud-based storage systems within Internet Service Providers (ISPs). This has resulted in a significantly greater impact globally as organizations continue to move more of their workloads to the cloud.
Enterprise SIEMs miss 76 percent of attack techniques


Security information and event management systems (SIEMs) are missing detections for 76 percent of MITRE ATT&CK techniques that adversaries use to breach their environments, according to a new report.
Produced by CardinalOps, the study analyzes real-world data from production SIEMs -- including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic -- covering more than 4,000 detection rules, nearly one million log sources, and hundreds of unique log source types.
Why Google's new AI search may be a bad deal for users


Google says its new generative AI feature will start a "new era of search" by "unlocking new types of questions" and "transforming the way information is organized." But a closer look at Google’s own promotional materials reveals a downside: you may have to face a barrage of ads every time you use it. But how many ads is too many? For Google, it seems, there is no limit.
Google offered a sneak peek at ad placements in its brand new Search Generative Experience (SGE) at an event for advertisers on May 23. There, Google revealed that ads would not only appear before and after the AI-powered snapshot, as originally announced, but would also infiltrate the AI-generated responses. And if the example Google gave is anything to go by, it's not a pretty sight.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.