Latest Technology News

ADATA unveils SC750 external SSD: High-Speed USB 3.2 Gen2 support for iPhone 15 and Android

ADATA has introduced its newest external solid-state drive, the SC750, which leverages the USB 3.2 Gen2 interface to offer impressive read/write speeds of up to 1,050/1,000 MB/s. Designed for mobility and efficiency, the SC750 supports a direct plug-and-play connection via its Type-C connector to both iPhone 15 series and Android Type-C devices. And yes, it will work with Windows, Linux, and macOS computers too.

The compact SC750 eliminates the need for an external data cable and is small enough to fit into a pocket, making it an ideal companion for travel or field work. Users can easily transfer large files, edit directly from the drive, or back up important project files without delay, enhancing productivity across various tasks.

Continue reading

ADATA launches LEGEND 970 PRO PCIe Gen5 SSD

ADATA has launched the LEGEND 970 PRO PCIe Gen5 solid state drive. The SSD features an active cooled heatsink that efficiently reduces temperatures by up to 20 percent, enhancing long-term performance stability and reliability. This drive is the first in the market to power its micro-fan directly from the M.2 slot, a design that ensures a tidy setup without the need for additional power cables.

The LEGEND 970 PRO's cooling system features a double-layered aluminum heatsink integrated with air ducts to effectively manage airflow. This setup not only maintains the SSD at optimal temperatures but also fits neatly into compact spaces, making it ideal for systems with limited room.

Continue reading

Using DMARC with Office 365 and G Suite [Q&A]

New email rules from major providers mean that businesses need to adopt the DMARC standard in order to ensure that their emails get delivered.

But while the new rules have received a good deal of publicity there hasn't been much attention paid to those not running their own mail server and relying on a third-party mail services.

Continue reading

Hulu + Live TV to drop NASA channel this August

Hulu subscribers will need to say goodbye to live space explorations and documentaries on their screens, as the streaming service announced it will be dropping the NASA channel from its Hulu + Live TV lineup effective August 28, 2024.

The NASA channel has been a unique offering on Hulu, providing viewers with live broadcasts of space missions, insightful science coverage, and educational content about the universe and beyond. Its removal may disappoint space enthusiasts who have enjoyed unparalleled access to NASA's operations and educational content.

Continue reading

Four ways relentless hybrid attackers are targeting their prey

One way to understand the mind of hybrid attackers is to compare their behavior to the animal kingdom. They are predators using a relentless arsenal of tactics to hunt their prey across a large domain. Threat actors are the honey badger. A snake bite or a few bee stings might delay their attack for a moment, but they’ll find a way to take down the entire hive and satisfy their appetite.

But what is a hybrid attack? Today, all cyberattacks are hybrid. Every enterprise uses a mix of on-premises and cloud services, and the number of services used is rising. In fact, employees now use an average of 20 cloud and SaaS apps every month. Despite enterprises having every preventative measure in place, attackers are using this widening attack surface to their advantage. They can start with anyone or anything they can access, no matter how small, before moving at speed to extend their access and disrupt business operations at scale. Some of the most common traits that make stopping hybrid attacks difficult are how they bypass prevention, compromise identities, elevate and hide in privileges to move laterally across domains -- often at high speed.

Continue reading

Tweak your settings in X if you don't want Elon Musk using your data to train Grok AI

Grok AI

Artificial intelligence is underpinned by the data used to train it, and even in this early stage of the game this has already proved controversial. In addition to complaints about the use of copyrighted content to train AIs, concern has also been voiced about the use of personal data.

Elon Musk, unsurprisingly, wants a slice of the AI pie, and is looking to train up the Grok AI model. The social platform formerly known as Twitter, X, is being used as a source of training data, meaning that your tweets (sorry, posts) are, by default, being sucked up for this very purpose.

Continue reading

Securing the unknown: Future-proof cyber security

A recent article from Harvard Business Review explores the mindset of today’s cyber hackers and explains why effective cybersecurity has become so challenging by outlining the three traits shared by every successful hacker: creativity, speed, and resourcefulness. Hackers who can successfully leverage these traits are able to assault a company’s defenses with an ever-evolving barrage of novel and impactful attacks.

Thus, to remain secure, companies must be prepared for the unknown. Today’s threat landscape includes tried-and-true attacks -- phishing, social engineering, and DoS attacks -- as well as innovative strategies driven by creativity, speed, and resourcefulness. The latter are designed to exploit weaknesses before companies discover they exist. The following approaches to cybersecurity can help companies develop a future-proof framework that anticipates and addresses hidden threats.

Continue reading

Encrypted privacy for the public's safety

One of the many challenges government and local authorities constantly face is that of keeping up with changes and innovations coming from the outside: conflicts and emergencies, environmental factors, inputs from industries and productions and, of course, evolving technologies. Whether these are developed in the private or public sector, or the academic community, it is unquestionable that tech innovations are tightly woven into everyday life.

These innovations frequently move forward at a speedy pace, spreading across different fields and inevitably reaching a level of integration that can no longer be left to the sole responsibility of the individuals. Thankfully, governments and organizations are increasingly wisening up when it comes to new and emerging technologies, whether this means creating ad hoc policies and regulations (the UK AI bill, the European AI act, the American Privacy Rights Act, or Chat Control) or taking targeted actions towards specific platforms or providers compromising users’ privacy like the TikTok ban for federal and state employees in the USA.

Continue reading

How to optimize AI at the edge and retain data sovereignty

Artificial intelligence (AI) is fundamentally transforming the way businesses operate and the value they can deliver to customers. Industry body techUK cites estimates that the UK’s GDP could be up to 10 percent higher by 2030 thanks to AI adoption. But first there are major cost, efficiency and data governance challenges to solve. This is where edge computing comes into its own -- offering a fast, resilient and cost-effective way to run transformative AI applications. Even better, it can help organizations to meet requirements around sustainability and data sovereignty.

The key will be finding a database platform that can seamlessly support both traditional cloud and edge computing environments in this context.

Continue reading

Get 'Kali Linux Penetration Testing Bible' (worth $25) for FREE

Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.

You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide.

Continue reading

Microsoft's latest SNAFU sees July security update throwing Windows users into BitLocker recovery mode

Microsoft has managed to do it yet again. With the security update released earlier this month for Windows, the company has delivered a buggy patch which is causing problems for a lot of users.

The problem has hit users of not only Windows 10 and Windows 11, but also various editions of Windows Server. As the update in question is a security update, it was automatically installed on a large number of systems; the unwanted payload is being dumped into a BitLocker recovery screen. Microsoft says that it is aware of the issue but does not currently have a fix.

Continue reading

Cracked screens, damaged sockets and delinquent dogs -- how Brits damage their tech

As we've become more reliant on tech devices we use them in more places that ever before, which in turn means more opportunities for them to suffer mishaps.

A new report from Secure Data Recovery UK looks at the common ways that people damage or lose their tech and at some of the weirder ones too.

Continue reading

Windows 11 users are finally getting back more control over mouse settings

Mouse controls in Windows 11

For some strange reason, Microsoft made Windows 11 less useful in various ways. One such backwards step was removing some of the settings relating to mouse controls, specifically the option to reverse scroll wheel direction, and enhance pointer precision.

Quite why it was deemed sensible to remove the options from Settings is anyone's guess, particularly as it remained possible to tweak the registry to implement them. Now Microsoft has seen the error of its ways and is placing control back in the hands of Windows 11 users.

Continue reading

Best Windows apps this week

Six-hundred-five in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft confirmed a new issue this week that affects Windows 10 and 11 PCs that have the July security updates installed. These may boot into BitLocker Recovery where the BitLocker Recovery Key needs to be provided to proceed.

Continue reading

TEAMGROUP launches T-FORCE GC PRO PCIe 5.0 SSD

TEAMGROUP has officially launched the T-FORCE GC PRO PCIe 5.0 solid state drive. The new SSD features a PCIe Gen5x4 interface and DRAM Cache architecture.

Equipped with an ultra-thin graphene heat spreader, the SSD offers superior temperature control, compatible with any motherboard's native M.2 SSD heatsink. This ensures that the SSD operates at optimal efficiency, enhancing performance by maintaining a cool environment even under intense operations. The T-FORCE GC PRO achieves impressive read speeds of up to 12,500 MB/s, making it one of the fastest SSDs currently available on the market.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.