Latest Technology News

We're all techies now say enterprises

Three years on from the pandemic forcing businesses to digitize in a hurry, more and more enterprises now identify as 'tech companies.'

Research from product experience platform Pendo finds nearly 49 percent of 'traditional' enterprises in the UK now consider themselves as technology companies, and are adopting more 'tech-like' strategies, roles and tools to drive innovation and growth.

Continue reading

'Shadow AI' could lead to a wave of insider threats

Insider threat

Poor data controls and the advent of new generative AI tools based on Large Language Models (LLMs) will lead to a spike in insider data breaches over the coming year, says cybersecurity company Imperva.

As LLM-powered chatbots have become more powerful, many organizations have implemented complete bans or restricted what data can be shared with them. However, since an overwhelming majority (82 percent) have no insider risk management strategy in place, they remain blind to instances of employees using generative AI to help them with tasks.

Continue reading

Construction and transport are most targeted by cybercriminals

The construction sector (with an average of 226 incidents annually) is the most targeted by cyber criminals closely followed by transport (167), wholesale trade (138), manufacturing (116) and retailers (105).

A new report from ReliaQuest, based on data from 35,000 incidents affecting its clients, shows the most detected attack technique is the attempted exploitation of exposed remote services, such as virtual private networks (VPNs) and remote desktop protocol (RDP).

Continue reading

Cybercriminals use AI to make malware less detectable

Malware shield

Cybercriminals are using AI-created malware that is adept at avoiding detection by traditional antivirus models, according to the latest report from Acronis.

The report also finds email attacks and ransomware cases have exploded relative to last year. Acronis-monitored endpoints are picking up valuable data about how cybercriminals operate and how some attacks have become more intelligent, sophisticated, and difficult to detect.

Continue reading

Consumer trust in biometrics: Are we there yet?

Advancements in technology have led the digital world and the physical world to collide. Digital authentication and biometrics are a prime example; in many cases they improve the customer experience, enabling features like self-check-in to hotels and streamlined payment processes at retail establishments. But these innovations raise questions about privacy and security, even as conversations around a "passwordless world" heat up.  

Incode conducted a global survey of 1,000 consumers, aged 25+, in English speaking countries across North America, the UK, and Asia Pacific regions to gauge their sentiment toward biometrics and digital authentication. Here’s what Incode’s "Consumer Pulse on Trust in Biometrics"survey revealed.

Continue reading

Three of the world's most expensive phishing attacks... and how they could have been prevented

Phishing

A number of high-profile cyber-attacks in recent years have thrust cybersecurity back into the spotlight. In light of the HAFNIUM hack, cybersecurity has become a major focus for many businesses. Although the hack itself was not the result of human error, it was a wake-up call for organizations to make sure they were fully protected.

The UK's Department for DCMS’ Cyber Security Breaches Survey 2021 revealed that phishing is still the most common cause of cybersecurity breaches, accounting for 83 percent of all successful attacks.

Continue reading

Take a sneaky break from work by running a fake Windows or macOS update

Taking a nap at work

Working hard is a good thing, but sometimes you want to have a rest and recharge, and there's only so many trips to the toilet or the break room you can get away with in a day.

Luckily, there's a sneaky trick you can use to take a break at your desk without anyone minding, and that's to make it look as if your PC is running a particularly slow operating system update. We've all been there, right? The good news is you can use this with any OS version and not only that, but if you're feeling particularly evil, you can make it appear as if you've been hit by ransomware.

Continue reading

Linksys launches Velop Pro 6E Tri-Band mesh Wi-Fi system

Today, Linksys unveils its latest network offering. Called “Velop Pro 6E,” it's the inaugural product of the company’s new Designer Series. It features a "nature inspired" droplet design and is equipped with a host of advanced features aimed at providing an unbeatable Wi-Fi 6E experience at a cost-effective price.

The Velop Pro 6E, available in colors such as Carbon Black, Pebble Gray, and Pure White, is a clear response to market demand for home network devices that not only provide superior connectivity but also blend seamlessly with home decor. "Today a Connected Home with ubiquitous Wi-Fi is the new normal, but people want the network devices to blend into their decor,” said Vice President of Experience, Jeevan Patil.

Continue reading

Blender 3.6 LTS adds real-time simulation to Geometry Nodes, numerous performance and UI improvements

The Blender Foundation has released Blender 3.6 LTS, the latest -- and final -- point release in the 3.x series. As is customary with all Blender point releases, version 3.6 of the popular and powerful open-source, cross-platform 3D creation suite contains several eye-catching new features along with "significant" performance improvements.

These include initial support for simulations in Geometry Nodes, which allows users to define simulations through the "Simulation Zone". This connects both Simulation Input and Output together through nodes. After the inputs are initially evaluated on the first frame, subsequent outputs simply outputs the results of the previous frame.

Continue reading

Dropbox introduces new AI-powered productivity features

Cloud storage provider Dropbox is launching two new AI-powered productivity tools -- though they're not available to everyone just yet.

Dropbox Dash is a universal search that connects all of your tools, content, and apps in a single search bar to help you easily find what you need. There's also Dropbox AI, a new feature that lets customers quickly summarize and get information from their Dropbox files.

Continue reading

How small business owners can reassess their cybersecurity strategies during economic downturns

The economic headwinds are blowing, and that has a lot of people nervous, not the least of whom are small business (SMB) owners across the country. With talk of recession in the air, SMB owners and their investors are paying extra attention to their bottom lines to maintain efficiency and innovation while managing costs. In many cases budgets are being squeezed, body counts are being leveled or reduced, and programs thought to be outside the core function of the enterprise are being slashed. It is unfortunate, however, that cybersecurity is often among the programs on the chopping block as it is perceived to be a less-than-essential expense.

As a former (and current) small business owner whose previous business was decimated by a malicious cyber-attack, I can attest to the short-sightedness of the belief that cybersecurity is an add-on, not a must-have.

Continue reading

TUXEDO InfinityBook Pro 16 is a thin and powerful Linux laptop

Today, TUXEDO launches the new 8th generation InfinityBook Pro 16. This Linux laptop brings impressive CPU performance, NVIDIA GeForce graphics, and a svelte design to the table. Housed within an incredibly thin, 17mm, 1.6 kg magnesium-enhanced chassis, this machine is not just about style; it's about serious performance as well.

This new notebook from TUXEDO is designed for content creators, software developers, and business users who value not only an aesthetically pleasing slim design but also impressive performance under the hood, thanks to the Intel Core i7-13700H and optional NVIDIA GeForce RTX 4060 or RTX 4070 graphics.

Continue reading

Attackers exploit the growing use of mobile devices

The growth in mobile device and app usage has created a growing attack surface, with 60 percent of global web traffic now coming from mobile devices. So it's not surprising that increasing numbers of cybercriminals and nation state actors want to exploit these areas of vulnerability.

The latest Global Mobile Threat Report from Zimperium finds that 80 percent of phishing sites now either specifically target mobile devices or are built to function on both mobile devices and desktops.

Continue reading

Data clean rooms: The power of second-party data

Data-Clean-Room

A staggering 81 percent of advertisers depend on third-party data to reach customers and understand prospects’ buying habits. Their reliance on this data, however, comes with a problem. Exponential cookie decay, government legislation, and increasing consumer demand for data privacy make accessing this data more difficult.

Many brands are turning to data clean rooms (DCR) as a solution. DCRs help companies leverage second-party data to hone their marketing and advertising. In fact, 80 percent of advertisers with media buying budgets over $1 billion will use DCRs by the end of 2023. So, what makes DCRs so popular? This article will show how DCRs can be an incredibly powerful MarTech tool that fosters collaboration among brands, enabling them to gain insights, form ‘lookalike’ audiences, and advertise directly to their user base.

Continue reading

Text messaging's potential could lead to huge growth for the mobile industry

If you are under 30, you’ve never known a world without texting. Even if you’re much older, messaging has been ubiquitous for so long, it’s easy to forget you never knew the power of your thumbs when you were a child. Text messaging can mean different things to different people. Some equate text messaging with SMS. For others -- and I fall into this camp -- text messaging is a wider catch-all for SMS and chat apps such as WhatsApp, Viber etc. That’s the definition we’ll be going with.

Trillions of texts are sent every day. It is a technology we are very comfortable with. And it’s not just personal messages we are happy to receive. Many research companies in the sector report that when consumers are asked how many A2P (Application-to-Person) SMS they receive from organizations each month, the figures the people quote are actually lower than the actual number of messages they receive. This is down to so many not regarding messages from organizations such as dentists and hospitals as being business-to-consumer (B2C) type messages when they actually are. 

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.