Latest Technology News

Apple launches midnight HomePod mini

Apple has announced a new color, midnight, for its HomePod mini smart speaker. This replaces the very similar (almost identical) Space Gray variant. This color is the only one made from 100 percent recycled mesh fabric. The midnight color option joins the existing palette which includes yellow, orange, blue, and white. It features an acoustically transparent mesh exterior and a backlit touch surface.

The HomePod mini is designed to deliver a comprehensive audio experience, allowing users to access a catalog of over 100 million songs through Apple Music. It can be used as a single speaker, in a stereo pair, or as part of a multiroom audio setup. Additionally, it can enhance audio for home theater setups when used with Apple TV 4K.

Continue reading

Linux 6.10 released

Linus Torvalds has announced the release of Linux kernel 6.10, highlighting that the last week of development was somewhat more active than previous weeks, but not enough to necessitate an additional release candidate. The final week’s activities were largely centered around the bcachefs and netfs filesystems, which accounted for about a third of the patches. Another third of the updates involved various drivers, while the remaining patches were categorized as miscellaneous.

This release paves the way for the merge window of Linux 6.11, which is set to open tomorrow. This timing coincides with the start of summer vacations in much of Europe, which may influence the pace of subsequent contributions. Nonetheless, the new release incorporates a wide range of fixes and updates across different subsystems and architectures, underscoring the collaborative efforts of the global developer community.

Continue reading

URL protection services used to mask phishing attacks

Cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight from Barracuda Networks.

Researchers have observed phishing attacks taking advantage of three different URL protection services to mask their phishing URLs. The services are provided by trusted, legitimate brands. To date, these attacks have targeted hundreds of companies.

Continue reading

Olympics face serious risk of malicious cyber activity

The Olympic Games begin next week in Paris and cybersecurity company WithSecure is warning that they face a greater risk of cyberattack than ever due to the current state of geopolitical uncertainty.

As the world's biggest sporting event, the Olympics draws potential attacks from both criminal and nation-state threat actors, with various objectives and capabilities.

Continue reading

Why mobile connectivity is essential for the enterprise [Q&A]

While enterprise computing was once tied to the desktop, theses days mobile connectivity is essential to the smooth running of any business.

This is partly as a result of changed working patterns -- accelerated by the COVID pandemic -- and partly down to rapidly evolving technology. We spoke to Allwyn Sequeira, CEO of mobile cloud service Highway 9 Networks, to learn more about the enterprise mobile space.

Continue reading

A technical overview of Cisco IoT part 3: Security essentials & industrial applications

Following the second installment of this Cisco IoT series regarding IoT networking and security supported by Cisco's innovative hardware offerings, this next discussion explores related key topics that are essential for understanding and implementing IoT solutions effectively.

This comprehensive overview will cover critical aspects such as IoT security, operational technology visibility, and industry-specific use cases. By examining these elements, readers will gain a clearer picture of how Cisco's advanced IoT solutions can enhance security, improve operational efficiency, and drive business innovation across various sectors.

Continue reading

The top challenge when implementing AI for business: Lack of high-quality data

AI growth and adoption in the UK are surging, with the market valued at more than £16.8 billion and expected to reach £801.6 billion in the next decade. Approximately 15 percent of UK businesses are already using AI technologies such as data management and analysis, natural language processing, machine learning, and computer vision. And across the pond in the US, AI is expected to contribute a significant 21 percent net increase to US GDP by 2030, showcasing its substantial impact on the economy.

Growth in any new technology is never without its challenges. For AI, these include ensuring data privacy, addressing ethical concerns, and navigating the complexity of integrating with existing IT infrastructure. Data quality is central to resolving these challenges. To be useful, the data used for AI must be high-quality, well-structured, and from trusted sources. These properties are the foundation for all AI models and determine their effectiveness and reliability.

Continue reading

WhatsApp is gaining a handy transcription option for voice messages

WhatsApp voice message transcription

How many times have you received a voice message on WhatsApp that you have not been in a position to listen to? Maybe you're in a quiet location where listening to a message would be inappropriate or, conversely, in a loud place that makes it impossible to heart a message. Thanks to a new feature that is rolling out, this will no longer be an issue.

Beta testers for the Android version of WhatsApp are beginning to see a new voice message transcription option. The feature works with both incoming and outgoing messages, and it serves several functions. As well as making it possible to learn the contents of a message you are not able to listen to immediately, it is also extremely useful from an accessibility point of view.

Continue reading

Google makes Linux more secure

Google has taken a proactive step to bolster Linux security with the introduction of the counted_by attribute for flexible array members. This enhancement addresses a critical vulnerability in C programming related to buffer overflows, particularly those involving flexible array members whose sizes are determined at runtime.

Buffer overflows have long been a notorious source of security issues in software development. While sanitizers have mitigated some of these vulnerabilities by automatically inserting bounds checking, flexible array members have remained a challenging exception. The size of these arrays is typically opaque to the compiler, making it difficult to perform bounds checking outside the allocation function.

Continue reading

GNOME 47 Linux desktop environment achieves Alpha status

Great news, fellow Linux fans -- version 47 Alpha of GNOME (the desktop environment) is released today. The DE introduces a host of updates and new features across various modules. It's essential to remember that this is an alpha release, meaning it's still in the early stages of development and not yet ready for production use. However, the enhancements are worth exploring for those eager to stay ahead of the curve.

One of the most notable additions in this release is the introduction of two new modules: localsearch and tinysparql. Localsearch aims to enhance local search capabilities within the GNOME environment, while tinysparql provides streamlined SPARQL query functionalities, focusing on efficiency and speed.

Continue reading

The role of migration tools in IT integration

In the fast-paced world of corporate mergers and acquisitions (M&A) and divestitures, integrating tech infrastructures offers significant challenges and opportunities for growth. As companies seek to unify, separate, and streamline their operations, the role of reliable migration tools becomes crucial in ensuring seamless transitions and maintaining data integrity.

According to Deal Barometer, M&A activity is expected to rise by 20 percent this year, emphasizing the need for effective IT strategies during these transformations. Given the complexities of migrating data during a merger, acquisition, or divestiture, IT leaders should seek solutions to ensure a smooth, secure transition.

Continue reading

Source code: The source of truth for securing the API attack surface 

Most organizations find themselves in the midst of their API security journey, racing to keep pace with expanding API ecosystems in a colossal threat landscape. As a core enabler of modern applications, facilitating seamless connectivity and powering mobile and web applications, APIs are everywhere. The DevOps revolution has completely transformed the pace at which developers can design and build APIs faster than a security team can match. 

Large enterprises are operating with tens of thousands of APIs, and even small organizations have a surprising number, both internal and external. With applications and API portfolios becoming increasingly complex, maintaining a comprehensive understanding of all existing APIs has emerged as a significant hurdle. As APIs can quickly become obscured or forgotten, many organizations lack accurate context into the sheer scale and volume of APIs that persist across their infrastructure -- subsequently resulting in the absence of a full picture of their attack surface. As one cannot secure what they cannot see, the absence of discovery mechanisms opens organizations to a host of security risks.  That is why API discovery is now a crucial process for security teams, designed to identify, catalog, and assess APIs. 

Continue reading

Kodi 22 gets a surprising (but fitting) name -- development for first alpha release well underway

It’s been three months since the Kodi Foundation released Kodi 21 ‘Omega’, the long-awaited latest version of its hugely popular home theater software.

As you would expect, the team took a well-deserved break following the program's release, but work is once more underway on the next incarnation, Kodi 22. Each version of the software has traditionally been given an alphabetical codename with a sci-fi theme -- "Leia," "Matrix," "Nexus," and "Omega." While Kodi 22’s name will begin with P, it breaks from tradition, but for a beautiful reason.

Continue reading

Ampace Andes 1500 redefines portable power with ultra-fast charging

Ampace has officially launched the Andes 1500, a portable power station that offers extraordinary charging capabilities and longevity. The Andes 1500, powered by Ampace's exclusive A-Boost technology, can fully charge in just 55 minutes, significantly reducing downtime and enhancing user convenience.

The Andes 1500 introduces a new era of fast charging, boasting an 1800W AC input that enables a full charge from zero in under an hour. It also supports solar and car socket inputs, making it ideal for on-the-go charging needs. The unit offers an insane 1462Wh capacity and features 13 different ports, ensuring that users can charge multiple devices simultaneously.

Continue reading

Leadership changes at GNOME Foundation: Should DEI influence the selection of a new director?

The GNOME Foundation has announced Holly Million is stepping down as Executive Director, with Richard Littauer stepping in as Interim Executive Director. This transition should hopefully prompt a broader discussion within the open source community about the role of diversity, equity, and inclusion (DEI) in the selection of new leadership. Shouldn’t we all want to see diversity and equality considered for the hire?

Million's contributions included the development of strategic plans and securing important fiscal sponsorships, setting a solid foundation for her successor. As the search for a new Executive Director begins, there is an opportunity to consider how DEI could influence the leadership direction at the Foundation. This includes evaluating the potential impact of diverse leadership styles and the benefits of varied perspectives in guiding the Foundation's future.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.