Latest Technology News

Organizations are responding faster to cyber threats

Threat concept

On average, organizations' response time to cyber attacks improved by around a third -- from 29 to 19 days -- from 2021 to 2022.

The report from Immersive Labs suggests this improvement can be attributed to the urgency and need for fast response times amid the fallout of the Log4j crisis and other high-profile vulnerabilities over the past year.

Continue reading

Microsoft releases PowerToys v0.72.0 with new plugins and a massively reduced footprint

Microsoft PowerToys

A PowerToys release cycle focused on stability and improvements may not sound terribly exciting, but with the newly hatched PowerToys v0.72.0 Microsoft has delivered significant updates that you won't want to miss out on.

Although there are no brand-new modules to explore, PowerToys Run has new plugins to work with. There are also a huge number of bug fixes and improvements across pretty much all areas of the utility, and a great new feature for Mouse Highlighter. On top of this, Microsoft has managed to dramatically slash the installation footprint of the PowerToys collections.

Continue reading

Lexar launches high-performance NM790 M.2 NVMe SSD and ARES RGB desktop memory

IMG_2758

Today, Lexar launches a trio of game-changing additions to its gaming portfolio. The new arrivals, namely Lexar NM790 M.2 2280 PCIe Gen 4x4 NVMe SSD, Lexar ARES RGB DDR5 Desktop Memory in 6400MT/s, and Lexar ARES RGB DDR4 Desktop Memory in 3600MT/s, are available to PC gamers.

Starting off with the Lexar NM790 M.2 NVMe SSD, this storage solution is a gaming and content creation powerhouse, delivering read speeds up to an astounding 7400MB/s and write speeds up to 6500MB/s. Built on PCIe Gen4 technology and coupled with HMB 3.0 and Dynamic SLC Cache, the NM790 SSD is your trusty sidekick for annihilating adversaries in gaming or tackling demanding creative tasks.

Continue reading

Borderless data: Acting locally, thinking globally

Global data

Around the world, data borders and regulations are being strengthened in a drive to protect customer privacy and fight cybercrime. As a result, multinational businesses are contending with a complex regulatory landscape. For business, data, and technology leaders, today’s challenge is to comply with local regulations while respecting customer expectations and managing complex global supply chains. To meet these macro and micro-economic challenges, organizations are looking for borderless data systems that enable global business operations but meet local demands.

The European Union’s General Data Protection Regulation (GDPR) has given rise to similar laws across the world, and the United Nations Conference on Trade and Development (UNCTAD) reports that 71 percent of countries have data protection regulations in place and 9 percent have legislation in development. Data governance professionals have increased their focus on data and cloud sovereignty in response, as some of these regulations restrict how data can be shared across physical national borders. In many cases, these regulations are positive and protect organizations and nations from criminals and aggressive states. However, today’s supply chains require data to be shared. A further complication is that cloud computing enables data sharing and business efficiency, yet the major cloud computing providers are firms from the USA. These businesses must comply with the US Cloud Act, which gives the US government access to data stored by these firms, even when hosting takes place outside of the USA.

Continue reading

Europe stays on top for broadband speeds

Mobile internet connection speed

Comparison site Cable.co.uk has released its annual analysis of broadband speed tests around the globe.

As in last year's report Western Europe tops the regional charts with an average download speed of 118.69Mbps, with North America second on an average of 94.02Mbps.

Continue reading

Over half of Azure and Google Cloud deployments fail CIS benchmarks

Cloud crime lock

Cloud misconfiguration is a critical issue as it amplifies the risk of data breaches and unauthorized access. But new research from Qualys shows that many cloud deployments on major platforms are failing Center for Internet Security (CIS) benchmarks.

The report finds that on average, 50 percent of CIS Benchmarks are failing across the major providers. The average fail rate for each provider is 34 percent for AWS, 57 percent for Azure, and 60 percent for Google Cloud Platform (GCP).

Continue reading

80 percent of digital certificates vulnerable to man-in-the-middle attacks

Magnified certificare

A new survey finds that nearly 80 percent of TLS certificates on the internet are vulnerable to man-in-the-middle (MiM) attacks, while as many as 25 percent of all certificates are expired at any given time.

The study, sponsored by automated machine identity management firm AppViewX and carried out by EEnterprise Management Associates (EMA), focuses on servers with SSL/TLS certificates on port 443.

Continue reading

Plugable USBC-4IN1 is the company's first single-chip hub

USBC-4IN1

Today, Plugable launches its first-ever single-chip hub. Called "USBC-4IN1," this adapter combines power and data transfer capabilities in a compact package. The hub, which utilizes the PS188 chip, offers dual-function USB-C port capabilities, including 100W power pass-through charging and high-speed 10Gbps data transfer.

The hub is compatible with laptops that have a full-featured USB-C or Thunderbolt port. As far as operating system support, it will work with macOS 11+, Windows 10+, or ChromeOS.

Continue reading

Guarding your digital realm: Navigating the era of encrypted messaging and secure communication tools

Secure messaging

In our modern hyperconnected world, we are constantly sending emails, instant messages, SMS messages, chats on social media, and much more to send information professional and personal. As each aspect of our lives continues to become digitized -- and as cybercrime gets ready to reach more than $10 trillion by 2025 -- it's becoming more important than ever to use encrypted messaging and secure communication tools to preserve our privacy.

Guarding your digital realm is thankfully more than viable with encrypted messaging and secure communication, in particular technologies such as end-to-end encryption, decentralized messaging platforms, and advanced privacy-enhancing features. To that end, let's talk about how these pioneering tools are playing a crucial role in protecting individuals, businesses, and journalists from cybercrimes.

Continue reading

Elon Musk makes history as Apple permits single-letter X app into App Store following Twitter rebrand

X app in App Store

Having previously rejected the X app from its App Store for having too short a name, Apple has had a change of heart, changing the rules for the renamed Twitter.

It used to be the case that app names had to be at least two characters in length, and this led to delay in getting the X app listed. But with Apple having relaxed for rules after Musk's latest example of spontaneity, X is the first -- and currently only -- app to be listed with a name comprising a single character.

Continue reading

Microsoft has some important changes for Windows 11 users with multiple monitors

Windows 11 logo on a laptop

When you've spent any amount of time using Windows 11 with two or more monitors, it's hard to go back to a single display setup.

But while working with multiple screens is a great productivity boost, it is far from being a perfect experience. Thankfully, Microsoft feels the pain of Windows 11 users and is bringing some helpful changes to settings that will make the experience far more pleasant.

Continue reading

MX Linux 23 is here: Your favorite Debian-based OS gets even better!

excitedwindowsnerd

MX Linux 23, the latest stable version of the popular operating system, is now available for download. This release is built on the sturdy foundation of Debian 12 “Bookworm” and MX repositories. Just as with previous versions, MX Linux 23 defaults to sysVinit while keeping systemd as an optional choice for installed systems.

One of the most noticeable changes in this release is the revamped live boot menus, featuring a more prominent “check media” function. This new feature offers an automatic media check before proceeding to boot, thus providing a smoother user experience.

Continue reading

Understanding large language models: What are they and how do they work?

intelligence

In recent years, large language models (LLMs) have revolutionized the field of natural language processing (NLP) and artificial intelligence (AI). These sophisticated models are used widely in AI solutions, such as OpenAI's ChatGPT, and have been designed to understand and generate human-like text, enabling them to perform various language-based tasks. People are incredibly excited by the potential of this technology which is poised to revolutionize how we live and work. However, to understand the true potential of LLMs, it is crucial that people know how they function.

LLMs, at their core, are neural networks trained on vast amounts of text data. They learn to predict the next word in a sentence by analyzing patterns and relationships within the training data. Through this process, they develop an understanding of grammar, syntax, and even semantic nuances. By leveraging this knowledge, these models can generate coherent and contextually relevant responses when given a prompt or query.

Continue reading

Getting on top of spiraling cloud costs

Cloud dollars

Cloud computing has revolutionized the way organizations operate, enabling scalability and helping businesses remain agile in ever-changing landscapes. However, what may have originally been touted as a cost-saving solution has become increasingly difficult to manage. 

Hyperscaler cloud services have the potential to offer huge cost savings due to their economies of scale. However, these savings may not always be passed down to customers. Moreover, the opaque pricing models of the larger service providers make the accurate estimation of costs difficult. The ease of provisioning resources in the cloud can also lead to significant overspending if not properly managed. Yet there are a variety of methods that can help cloud users better manage their increasing costs. Through the correct management, users can both reduce their cloud spend and better anticipate their monthly bill. 

Continue reading

Securing business communication: Three must-haves for securely supporting employees in the digital workplace 

remote work

No one would dispute that communication is vital, if not the most critical factor, to the success of any organization. But in the now not-so-new remote and hybrid work environment, it is harder than ever before to maintain the same level of communication, collaboration, speed -- and therefore productivity -- that was once available in the office environment.  

As enterprises look to technology to navigate the challenges of remote and hybrid working, providing tools that help employees work in a safe and secure manner is now, more than ever, an enabler of business success. Equipping employees with full-featured mobile messaging and collaboration tools with built-in security, control, and compliance is essential for helping them safely succeed in the digital world of work. 

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.