Latest Technology News

About f@cking time! Microsoft Team caters for non-prudish users by making the profanity filter optional

Censored swearing

Users of Microsoft Teams have a series of updates to explore. Microsoft has launched a selection of new features to enhance the online meeting experience.

The new options and settings relate to Live Caption and Live Transcription, with users being given far greater control over the look and positioning of captions. But what Microsoft talks about first are the new controls for the profanity filter which censors what the company has deemed to be bad language. Enabled by default, there have been complaints that the filter is far too sensitive -- so Microsoft has come up with a solution.

Continue reading

TP-Link launches a trio of Matter-certified Tapo smart switches

tpmatter3

Tapo, a TP-Link brand, launches three new Matter-certified devices today. The Tapo Mini Smart Wi-Fi Plug, Tapo Smart Wi-Fi Light Switch, and Tapo Smart Wi-Fi Dimmer Light Switch offer compatibility with all-certified smart home platforms, convenient LAN control, and multi-admin capability.

Matter brings a new level of convenience with smooth LAN control, enabling seamless communication between Matter-certified devices within a local area network, even if the home internet is offline. This direct device-to-device communication eliminates the reliance on specific forwarding devices or cloud services, ensuring a robust and reliable smart home ecosystem.

Continue reading

Wary of a recession? Increase your investment in cybersecurity technologies

Business man with suitcase full of money

Leading organizations in all industries have accelerated their digital transformation and change management over the past three years, and for a good reason. According to Deloitte, meaningful digital transformation initiatives can unlock up to $1.25 trillion in market capital across Fortune 500 companies, with similarly positive results demonstrated for mid-range and small enterprises.

The key word here is "meaningful." But what constitutes beneficial change management processes versus directionless spending?

Continue reading

Three-quarters of consumers are ready to ditch a company after a ransomware attack

Displeased suspicious young woman

A new study shows that 75 percent of consumers would switch their business to another company following a ransomware attack.

The survey, from backup appliance company Object First, also reveals that consumers are requesting increased protection from vendors that hold their data, with 55 percent favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies.

Continue reading

Stolen identities remain top cybersecurity threat

identity theft hacker

Stolen identities continue to cause massive breaches, exposing 1.5 billion user records and costing businesses an average of $9.4 million per breach in 2022, according to a new report.

The ForgeRock 2023 Identity Breach Report shows that attackers continue to target credentials and use them as a stepping stone to infiltrate an organization across industries and geographies. What’s more and AI is making it more difficult for the average human to identify threats.

Continue reading

Physical meets digital -- the changing world of augmented reality [Q&A]

Augmented Reality Glasses

The physical and digital worlds continue to intertwine in new and exciting ways, and more precise mapping of the real world opens up unique opportunities for brands to drive more traffic and engagement to physical locations.

We spoke to Rypplzz CEO Josh Pendrick about why he believes augmented reality is a sector that's ripe for disruption.

Continue reading

Many users are locked out of LastPass after authenticator app reset

LastPass logo on laptop

The support forums of password management tool LastPass are filling up with complaints from confused and disgruntled users who found themselves locked out of their accounts. The problems stem from a forced authenticator app reset implanted by the company following a series of security incidents last year.

Starting last month, LastPass forcibly logged out users and required them to reset their multifactor authentication (MFA) apps such as Google Authenticator and Microsoft Authenticator. But having followed the instructions given by the company, large numbers of users report that they are unable to access their LastPass vaults after being locked out their accounts.

Continue reading

Sabrent launches SB-TB4K Thunderbolt 4 KVM Switch for Windows and macOS

kvm

In today's work-from-home world, we can constantly find ourselves juggling multiple devices, trying to maximize our efficiency. Thankfully, Sabrent understands our WFH needs and has come up with an incredible solution -- the Thunderbolt 4 KVM Switch (SB-TB4K). This sleek and powerful switchable hub is designed to seamlessly switch between two computers with the push of a button, making it an essential tool for both professionals and tech enthusiasts alike.

The Sabrent Thunderbolt 4 KVM Switch is able to output at a resolution of up to 8K/60Hz.. With DisplayPort Alternate Mode (DP Alt Mode) compatibility, this switch enables you to connect and share a wide range of devices, including keyboards, mice, printers, external storage, memory card readers, smartphones, and much more. The switch boasts three Thunderbolt 4 ports and four USB Type-A ports, ensuring that you have more than enough connectivity options at your disposal.

Continue reading

Driving digital transformation at scale: Key factors for success

Digital transformation

Digital transformation has become a crucial endeavor for organizations seeking to remain competitive in today's rapidly evolving business landscape. However, achieving successful digital transformation at scale requires careful planning, commitment, and a strategic approach.

Let’s explore the six game-changing factors that contribute to the success of digital transformation initiatives. From company-wide involvement to defining clear goals, selecting the right technologies, managing change, and setting benchmarks for success, these factors play a vital role in ensuring a smooth and impactful transformation journey.

Continue reading

Google Chrome's PDF viewer is gaining the ability to convert images to text

Chrome drawing

PDFs are astonishingly useful documents, but some are lazily created. You've almost certainly encountered a PDF file that comprises images of text rather than selected text. This is a serious annoyance if you were hoping to copy text into another document, but it's also a major problem for anyone who is reliant on text-to-speech tools to have document read aloud to them.

Google has some good news for users of Chrome; the browser is gaining the ability to convert images to text in PDFs, OCR-style. There is some bad news, however. This incredibly useful feature is -- at least initially -- not going to be made available to everyone.

Continue reading

Tor Browser 12.5 released with updated circuit display and promise of better connection experience

Laptop

The Tor Project has announced the release of Tor Browser 12.5 for Windows (both 32-bit and 64-bit), macOS, Linux, and Android. The Firefox variant provides privacy conscious users with a means of accessing the internet through the open Tor network, designed to reduce the visibility of users online.

Tor Browser 12.5 introduces some major changes to the program, including an updated circuit display, new onion site icons and the promise of both better accessibility and a more user-friendly connection experience.

Continue reading

Five ways your business can bridge the cybersecurity skills gaps to find and keep top talent 

plugging a gap

We hear a lot about the cybersecurity skills gap, which the latest research puts at 3.4 million globally. There are lots of reasons why organizations find themselves dealing with a skills deficit -- from an actual dearth of qualified talent to internal factors including turnover, lack of budget/competitive wages, limited opportunities for growth and promotion, and lack of training. 

One aspect that is within a company’s control, but is often unremarked, is unrealistic hiring practices. While this can be a problem across all sectors -- after all, every business wants to be sure they get highly experienced people on board -- there seems to be a particular issue around cybersecurity hiring. 

Continue reading

New index allows companies to measure their cybersecurity capabilities

Software testing

Cyberattacks are increasingly a feature of everyday life, yet many companies remain unaware of their teams' true readiness to defend against them.

Cyber defense specialist RangeForce is launching a new Defense Readiness Index (DRI), a pioneering scoring system which gauges an organization's readiness to effectively respond to the cyberattacks it is likely to face.

Continue reading

Best Windows apps this week

opera-one

Five-hundred-and-forty-eight in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft plans to retire the Mail and Calendar apps in late 2024. They will be replaced by the new Outlook for Windows app, which is currently available as a preview.

Continue reading

When is an IT risk a cyber risk? And why the difference matters [Q&A]

risk jigsaw piece

There tends to be some confusion about where cyber risk ends and where IT risk starts and the terms are often used interchangeably.

We spoke to Gary Lynam, head of ERM advisory at risk management specialist Protecht, to find out more about understanding and managing the different types of risk that enterprises face.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.