Latest Technology News

Microsoft is working on a new File Locksmith PowerToys utility to reveal which processes are using a file

File Locksmith PowerToys utility

Brace yourself for a new PowerToys utility. Microsoft's developers are busy working away on a new tool called File Locksmith which will be welcomed by anyone who has ever been greeted by a message informing them that a file cannot be deleted because it is being used.

File Locksmith will add a new entry to the context menu in Windows 11 -- "What's using this file?". The tool will then reveal which processes are using the file in question.

Continue reading

Microsoft confirms two actively exploited zero-day vulnerabilities in Exchange Server

Microsoft logo on glass building

Microsoft has issued a security notice about two zero-day vulnerabilities with its own Microsoft Exchange Server. Versions 2013, 2016 and 2019 of the software are affected.

One vulnerability (CVE-2022-41082) allows for remote code execution when an attacker has access to PowerShell; the second (CVE-2022-41040) is a Side Request Forgery (SSRF) vulnerability. Both vulnerabilities are being exploited in the wild.

Continue reading

Microsoft acknowledges printer issues blocking Window 11 2022 Update

Windows 11 logo on laptop screen

It may only be a little over a week since Microsoft released Windows 11 2022 Update, but the problems it is causing are coming thick and fast.

The most recent issue involves printer drivers, and it has caused the company to place a compatibility block on some people upgrading to the latest version of Windows 11. The good news is that there is a relatively simple workaround in the meantime.

Continue reading

Best Windows apps this week

Five-hundred-and-ten in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

The Windows 11 2022 Update has been out of a while and Microsoft confirmed several issues plaguing some users already. One of the issues affected gaming performance on Nvidia-powered systems. Nvidia released an updated driver that addresses these performance issues.

Continue reading

How clean code can help developers prevent vulnerabilities [Q&A]

Every year, thousands of code vulnerabilities are discovered, patched and publicly disclosed to improve security for current and potential users.

But many of these vulnerabilities share common features, so what can developers do to write better code that prevents vulnerabilities from entering their apps and services in the first place? We talked to Johannes Dahse, head of R&D at clean code specialist SonarSource, to find out. 

Continue reading

Editable tweets arrive on Twitter

Twitter on mobile with silhouetted person

The ability to edit tweets is something that Twitter users have been asking for since the service first emerged. There have long been rumors that the feature is in the works, and now Twitter has taken the wraps off this much-requested option.

News of the tweet edit button was shared via the Twitter Blue account, indicating that -- as thought for some time -- that tweet editing will be limited to paying subscribers, at least to start with.

Continue reading

Google flushes Stadia down the toilet

Today, Google finally flushed Stadia down the proverbial toilet. And yes, the company's streaming game service was, in fact, a massive turd. Consumers never really embraced Stadia, and after a few short years, Google is admitting defeat and shutting it down.

On paper, Stadia looked great -- you could play high-end games without spending money on a console. The games simply streamed over the internet, with Google's servers doing the heavy lifting. Unfortunately, the execution and overall game library was lacking. Stadia was not fun to use or play. And now it is dead, or at least it soon will be.

Continue reading

Microsoft releases Windows 11 Build 25211 with Widget improvements

Windows 11 laptop

Slipping a day from its usual weekly release schedule, Microsoft has today released a new Insider build for those testers in the Dev Channel.

Build 25211 introduces some changes and improvements based on Insider feedback, as well as a new settings experience for Widgets.

Continue reading

Ubuntu desktop comes to AWS

Stacked Ubuntu logo

Until today Amazon WorkSpaces cloud desktop solution simply offered the option of either Windows or Amazon Linux machines. Now though Canonical has announced the availability of Ubuntu WorkSpaces on AWS.

This is a fully managed virtual desktop infrastructure (VDI) on the public cloud and the first third-party Linux OS to be available on the platform. It gives developers access to a wide choice of open source tools and libraries in cutting-edge fields like data science, artificial intelligence/machine learning, cloud and internet-of-things.

Continue reading

Get '8 Steps to Better Security: A Simple Cyber Resilience Guide for Business' ($18 value) FREE for a limited time

Harden your business against internal and external cybersecurity threats with a single accessible resource.

In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.

Continue reading

Is data a silver bullet for the slowing economy?

silver bullet

During the pandemic, companies with a strong understanding of their business as a whole, including employees, partners, customers and even suppliers, fared better than those without the ability to review and use data to drive growth.

History has shown that the greatest weapon against uncertainty is information. Understanding your business at a microscopic and holistic level is now more important than ever, as the threat of a recession looms. This means that information must be treated as a central tool in leading all businesses through any potential storm.

Continue reading

Less than five percent of Fortune 500 companies are using the latest email standards

Holding email icon

Phishing is one of the most common methods of launching a cyberattack, yet new research from Red Sift shows that only a small percentage of publicly traded companies have fully adopted the latest email standards that could protect them and their customers.

DMARC (Domain-based Message Authentication, Reporting and Conformance) and BIMI (Brand Indicators for Message Identification) help prevent spoofing and allow businesses to display their logo on authenticated emails.

Continue reading

Businesses losing revenue to bot-driven account fraud

Revenue loss from bot-driven account fraud and web scraping continues to increase according to a new report, with 69 percent of companies that have a bot management solution report losing more than six percent of their revenue due to account fraud this year.

Account fraud includes account takeovers and new account fraud, where fraudsters create fake accounts to gain access to loyalty programs and take advantage of promotional discounts.

Continue reading

How software innovation will power future energy platforms

In the face of supply uncertainty, increasingly urgent environmental goals and surging price rises, the energy industry finds itself under immense pressure to innovate. At the same time, the competition to attract and retain customers is intensifying, with consumers also looking for an effective digital experience, alongside transparent consumption data and control.

Given these opportunities and challenges, how can the energy industry find fresh and innovative approaches to deliver what each stakeholder wants?

Continue reading

A third of people fall victim to cyberattacks despite training

A new study of 3,000 individuals across the US, UK and Canada finds that although 58 percent of tech users that had access to cybersecurity training or education say they are better at recognizing phishing messages and related attacks, 34 percent still fell victim to at least one type of cybercrime.

The research from The National Cybersecurity Alliance and CybSafe shows that of more than 1,700 incidents of cybercrime that were disclosed by participants, 36 percent were phishing attacks that led to a loss of money or data, while 24 percent report falling victim to identity theft.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.