Latest Technology News

IObit Driver Booster 12 promises faster scanning and installation, more hardware support

IObit has unveiled a major update to its driver updating tool for Windows with the release of IObit Driver Booster 12.0.

Highlights of the new release include an expanded database now spanning over 15 million drivers, support for newer hardware, faster and more stable performance, and the obligatory UI refresh.

Continue reading

Best Windows apps this week

Best-Windows-apps-laptop

Six-hundred-twelve in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft has built on past Windows 11 taskbar improvements by adding enhanced app pinning to its operating system.

Continue reading

Want a 75 percent chance of breaking your app? Install a security patch

System patching

New research released from Endor Labs finds that security patches have a 75 percent chance of breaking an application.

It also shows that 69 percent of vulnerability advisories are published after a patch has been released, with a median delay of 25 days between public patch availability and advisory publication, increasing the window of opportunity for attackers to exploit vulnerable systems.

Continue reading

Navigating AI challenges in the enterprise [Q&A]

As more businesses turn to AI, they face a number of challenges around integrating it effectively and obtaining the best value while still ensuring that their data remains secure. It's also important that they select the right AI provider for their needs.

We spoke to Naren Narendran, chief scientist at database specialist Aerospike, to discuss the strategic considerations and concerns enterprises face as they incorporate AI into their operations.

Continue reading

Google partners with the Internet Archive’s Wayback Machine to enhance search results

Internet Archive Wayback Machine

You may remember that earlier this year Google took the decision to retire cache links from its search results. At the time this caused annoyance and frustration, but these feelings were tempered by the possibility of some form of future resurrection of the feature.

And now that time has come. Teaming up with the Internet Archive, Google search results now link back to cached Wayback Machine versions of pages in addition to the one that is currently live. The Internet Archive sees it as a continuation of its “commitment to preservation”.

Continue reading

TP-Link introduces VIGI video surveillance brand for small and medium businesses

TP-Link has launched VIGI, a new business video surveillance brand targeting small and medium businesses (SMBs). VIGI offers a range of hardware and software products designed to provide reliable and easy-to-manage security solutions. The new brand focuses on efficiency, security, and ease of use.

VIGI follows a “4E” design principle -- Easy Planning, Easy Installation, Easy Setup, and Easy Maintenance -- aimed at streamlining security management across various monitoring scenarios, including single and multi-site operations.

Continue reading

Silicon Power unveils high-performance StudioPro CFexpress 4.0 Type-B memory card for 4K and 8K workflows

Silicon Power has launched its latest high-performance storage product, the StudioPro CFexpress 4.0 Type-B memory card, designed to meet the rigorous demands of professional photographers, filmmakers, and content creators. This new offering combines extreme speeds with generous storage capacities, making it an excellent choice for 4K and 8K video recording.

With the advanced PCIe Gen 4x2 interface, this memory card delivers top-tier performance, boasting impressive read speeds up to 3,500 MB/s and write speeds up to 3,100 MB/s. These speeds enable seamless data transfer, allowing users to handle intensive workflows without interruption.

Continue reading

The $13 billion problem: Tackling the growing sophistication of account takeovers

Fraudsters have used account takeovers (ATOs) to victimize 29 percent of internet users, resulting in $13 billion in losses in 2023. Over three-quarters of security leaders listed ATOs as one of the most concerning cyber threats, and the danger grows as bad actors leverage AI to launch more potent attacks.

The Snowflake breach demonstrates the devastating consequences of ATOs. Attackers gained access to 165 of the data platform’s customers’ systems, including AT&T and Ticketmaster, and exfiltrated hundreds of millions of records containing sensitive data. The attack wasn’t some brilliant hacking scheme -- the bad actors simply used legitimate credentials to log into the platform.

Continue reading

OWC launches Envoy Ultra Thunderbolt 5 SSD with blazing 6000MB/s speeds

OWC has announced the release of its Envoy Ultra Thunderbolt 5 SSD, which is now available for pre-order and will start shipping in October. This cutting-edge SSD is designed to work seamlessly with Mac and PC devices equipped with Thunderbolt 5, Thunderbolt 4, Thunderbolt 3, and USB4.

The Envoy Ultra Thunderbolt 5 SSD is engineered for both professionals and enthusiasts. It offers speeds surpassing 6000MB/s, doubling the performance of Thunderbolt 4 and USB4. The device optimizes performance across Thunderbolt 5, Thunderbolt 4, Thunderbolt 3, and USB4 machines, making it capable of handling both daily tasks and pro-level creative projects.

Continue reading

Say goodbye to TeamViewer: Get AnyViewer Professional for free -- save $42.96

TeamViewer and AnyViewer are both popular remote desktop software solutions, but they cater to slightly different needs and user bases. TeamViewer is a well-established player in the remote desktop space, offering a wide range of features such as cross-platform compatibility, remote printing, file sharing, and even support for IoT devices. It’s widely used by businesses for IT support and remote collaboration, as well as by individual users who need to access their devices from anywhere.

TeamViewer provides strong security with end-to-end encryption and supports remote sessions with minimal latency. Although there’s a version that’s free for private use, the software's pricing can be a drawback for business users, as it operates on a subscription model which can prove to be rather expensive over time.

Continue reading

Druva launches natural language tool to help cybersecurity investigations

When investigating an incident to contain and remediate a threat, security teams need to understand complex attack patterns, such as malware gestation, score, and sprawl -- the answers to which all lie in the data and systems.

To help with this process Druva is releasing Dru Investigate, a GenAI-powered tool that guides data security investigations using a natural language interface.

Continue reading

Linux desktop environment Cinnamon 6.4 aims to fix its outdated look with a fresh default theme

Linux Mint has long been praised for its user-friendly design, with the Cinnamon desktop being a core feature. However, Cinnamon's look outside the Mint distro often leaves users unimpressed. In many distributions, Cinnamon’s default visual style feels outdated and unrefined, giving the impression that its aesthetics have been neglected.

Part of the reason for this is Mint’s focus on the Mint-Y theme, which brings a more polished and modern appearance to the desktop. The default Cinnamon theme, however, is largely left untouched, serving as a fallback option for troubleshooting. With little attention from theme developers, this results in a less-than-appealing experience for users of other distributions that don’t implement Mint-Y.

Continue reading

Attacks related to non-human identities increase

New data shows that one in five organizations has experienced a security incident related to non-human identities; and only 15 percent remain confident in their ability to secure them.

A report from the Cloud Security Alliance (CSA), and Astrix Security reveals that there is a growing recognition of the importance of investing in NHI security with a quarter of organizations already investing in these capabilities and an additional 60 percent planning to within the next twelve months.

Continue reading

Save $34.99! Get 'Python and SQL Bible' for FREE

Embark on a transformative journey with this course designed to equip you with robust Python and SQL skills. Starting with an introduction to Python, you'll delve into fundamental building blocks, control flow, functions, and object-oriented programming.

As you progress, you'll master data structures, file I/O, exception handling, and the Python Standard Library, ensuring a solid foundation in Python. The course then transitions to SQL, beginning with an introduction and covering basics, and proceeding to advanced querying techniques.

Continue reading

Why third-party email filters may be ineffective in Microsoft 365 environments

Because email is the primary source of initial entry in many breaches, many organizations pay for sophisticated, third-party email filtering solutions on top of the protections afforded by Microsoft 365. This is a wise investment; having layers of protection by different vendors helps eliminate blind spots found in any one vendor solution and provides complexity that can foil attack attempts.

Yet, few know that threat actors can easily bypass these third-party filtering products by directing emails to onmicrosoft.com domains that are an inherent part of the Microsoft 365 configuration.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.