System76 Thelio Linux desktop chassis gets a sexy redesign that may not give you wood
System76's Thelio desktop computers have been notable for three things -- being assembled in the USA, running Linux-based operating systems, and having a largely wooden chassis. Moving forward, the PC will still be assembled in America and ship with a Linux distribution (Ubuntu or Pop!_OS), but it won't necessarily contain any wood.
You see, the computer manufacturer has decided to redesign the chassis to be mostly aluminum, save for a thin accent strip. Actually, while the strip can be made of wood, not all of them are. In other words, it is not a given that a Thelio desktop will contain any wood -- only if you specifically choose a wooden access strip. Some of the strips are instead made of powder-coated aluminum. And yes, you can replace the strip by easily pinching and sliding it off.
Reducing the noise in your cybersecurity operation
What is the true cost of creating a robust cybersecurity defense for your organization? As cyberattacks accelerate around the world, organizations will continue to spend more money on security tools and services to shore up defenses. According to Cybersecurity Ventures, global cybersecurity spending overall will exceed $1.75 trillion from 2021-2025, anticipating a 15 percent year-over-year growth.
With the steady increase of budgets and IT spend, there is no denying the importance of investing in the people who run security operations. Enterprises often have an eclectic group of different vendor solutions added over time, sometimes with overlapping functionality and often with time-consuming onboarding and training requirements. Each cybersecurity product brings its own console, segmenting visibility, and threat correlation. The result is dangerous blind spots that leave enterprises vulnerable to damaging exploits. With the interminable shortage of qualified cybersecurity professionals, we need to investigate ways to more efficiently leverage the talent that we already have. The vast workload is burning them out. At best, this leads to a loss of productivity. At worst, they leave for greener pastures, which translates into turnover costs.
Half of IT pros believe quantum computing could put their data at risk
A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.
In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.
Think your business is ready for ransomware? Think again
Although business leaders think they're fully prepared to deal with ransomware, actual outcomes suggest otherwise, according to a new report.
Druva has commissioned IDC to conduct independent research into ransomware preparedness, challenges, and threats to find out how approaches to ransomware are changing and whether common recovery efforts are effective.
Data center sector unprepared for expanding sustainability requirements
The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.
The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.
Ransomware affects 90 percent of companies in the past year
Despite increased spending on cybersecurity, a new report reveals that 90 percent of organizations were affected by ransomware in some way over the past 12 months, up from last year's 72.5 percent.
The study from SpyCloud shows that security efforts are being stepped up, the number of organizations that have implemented or plan to implement multi-factor authentication jumped 71 percent, from 56 percent the previous year to 96 percent. Monitoring for compromised employee credentials also increased from 44 percent to 73 percent.
Revolut customer data exposed in cyberattack
Fintech firm Revolut has been hit by a cyberattack that resulted in personal data of tens of thousands of users being exposed.
Described as a "highly targeted" attack -- although it is not clear who was targeted or why -- the security incident took place on the night of September 11. The attack gave an unauthorized third-party access to a range of data including postal and email addresses, account information, and phone numbers.
How AI and computer vision can help retailers to compete [Q&A]
The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.
But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?
Massive GTA VI video leak reveals the secrets of Rockstar Games' upcoming release
Over the weekend, a user from the GTAForums leaked 90 videos showing gameplay footage from the yet-to-be-release Grand Theft Auto VI. Someone by the name of teapotuberhacker -- who also claims to be responsible for the recent Uber hack -- shared 3GB of data and said that more could be leaked soon.
GTA developer Rockstar Games has confirmed that the leak is genuine, and the videos are surprisingly revealing. The footage is from a test build of GTA VI comprising "GTA 5 and 6 source code and assets" and shows that there will be multiple playable characters, including a female player.
Chrome and Microsoft Edge's enhanced spellcheckers can leak your passwords and personal data
Privacy and security are something that all browser manufacturers like to brag about in relation to their products, with Google and Microsoft being no different to others in this regard. But if you are making use of the Enhanced Spellcheck in Chrome or Microsoft Editor in Edge, some highly sensitive information can be sent to the two software giants.
In addition to passwords, we are talking about personal information entered into online forms such as your social security number, date of birth, username and so on. The worrying discovery was made by security researchers from JavaScript security firm otto-js who warn that this is something that will be of particular concern to enterprise users.
This is what's new in the latest Kodi 20 Nexus release
A few days ago we announced that the latest version of Kodi 20 'Nexus' was available to download, but there was no word at the time from the Kodi Foundation on exactly what the changes were.
Now the team has released a full changelog, and as you’d expect from a big milestone, there’s a lot of changes and fixes.
LastPass reveals details of August hack that gave threat actor access to its development environment for four days
Last month, LastPass suffered a cyberattack and the company shared some details about what had happened shortly afterwards. Now, having conducted further investigations, more information has been revealed including the fact that the attacker had access to the LastPass development environment for four days.
The company concedes that it is not clear how the attacker was able to gain access but says: "the threat actor utilized their persistent access to impersonate the developer once the developer had successfully authenticated using multi-factor authentication". LastPass has also revealed the impact of the four-day security incident in the name of providing "transparency and peace-of-mind to [its] consumer and business communities".
CDP: A priority in the evolution of ransomware recovery
The first ransomware appeared in 1989. It was distributed via floppy disks; its encryption could be easily reversed, and the ransom of $189 was to be paid to a PO box in Panama. Since those humble beginnings, ransomware has evolved into the massive international cybercrime it is today, that causes billions in damage to organizations big or small.
As new successful attacks are reported daily, it seems that the defenses against the ever more sophisticated attack vectors are lagging the attackers. As many organizations continue to struggle to defend themselves against ransomware, it is worth looking at the currently available technologies and how effective they are in combating it.
Get 'Microsoft 365 Fundamentals Guide' ($24.99 value) FREE for a limited time
With its extensive set of tools and features for improving productivity and collaboration, Microsoft 365 is being widely adopted by organizations worldwide.
This book will help not only developers but also business people and those working with information to discover tips and tricks for making the most of the apps in the Microsoft 365 suite.
Best Windows apps this week
Five-hundred-and-eight in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft 365 apps can now be updated without user interruption, thanks to the new "update under lock" feature.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.