Latest Technology News

Firefox 113 unveils search and picture-in-picture improvements alongside tighter security

Firefox-on-laptop-screen

The Mozilla Foundation has unveiled Firefox 113.0 alongside Firefox ESR 102.11.0, the latest version of its open-source, cross-platform browser.

It’s a relatively big release, with numerous security enhancements and UI improvements, particularly when searching the web through the URL bar and making use of Firefox’s picture-in-picture video player.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Windows 10 is going to be the most stable version of Windows until October 2025

Microsoft announced last week that it won’t release new feature updates for its Windows 10 operating system anymore. Windows 10 version 22H2, released in late 2022, is therefor the last major version of Windows 10.

The operating system won’t receive new (major) features anymore and Microsoft will focus its engineering energy on Windows 11 and potential successors. It is unclear whether smaller changes will still find their way into the operating system. Many of these, if they happens, may introduce changes that most users may not want.

Continue reading

Business leaders don't understand cybersecurity

A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.

In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.

Continue reading

Technology sector suffers most from poor cyber hygiene

security flaw

Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.

In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.

Continue reading

Cybersecurity awareness education: The beginnings of change

Cybersecurity-awareness

More than eight in 10 data breaches globally can be attributed to human error.

People are the weakest link in cybersecurity. And this weakness comes from a lack of awareness about our cyber risk and the behaviors that influence it. Many people see cybersecurity as an IT concern. In truth, cybersecurity concerns everyone. When our hospitals get infected with ransomware, we can’t receive care. When our organizations experience a cyberattack, we lose our jobs. Still, we tend to underestimate the importance of cybersecurity to our society and economy.

Continue reading

Kingston launches DC600M Enterprise SSD

Today, we have some exciting news from Kingston Digital, Inc. The company just announced its latest offering in the world of data storage — the DC600M Enterprise SSD.

This new product has been optimized for mixed-use workloads, with excellent Quality of Service (QoS) to ensure latency and IOPS consistency. With 6Gbps SATA 3.0 storage and 3D TLC NAND, the DC600M is perfectly suited for high-volume rack-mount servers. Plus, it includes hardware-based on-board power loss protection via power loss capacitors, reducing the risk of data loss in the event of an unexpected power failure.

Continue reading

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

Continue reading

Twitter admits a 'security incident' allowed private Circles messages to be seen by anyone

Twitter logo and Elon Musk account

Following numerous complaints from users concerned that the Circles feature of Twitter was broken, the company has conceded that tweets that were supposed to be visible to only a select number of people were in fact accessible by anyone.

The idea of Twitter Circles is that messages can be seen only by people who have been added to a Circle. But Twitter has now revealed "a security incident that occurred earlier this year" that ignored privacy settings.

Continue reading

Automation: How law firms can reach new heights in recruitment and profitability

The legal profession is filled with a number of repeatable tasks that are rife for automation, such as estate planning, bankruptcy filing, IP filings, real estate transactions, and M&A filings. In fact, it’s estimated that nearly a quarter (23 percent) of a lawyer’s daily work could be automated.

The amount of time involved in doing manual tasks can put an immense amount of pressure on legal professionals. In a Gartner survey, 68 percent of corporate lawyers said they struggled to manage their workloads. And over half reported some degree of exhaustion.

Continue reading

From details to big picture: Five approaches to improve security

Security padlock

Improving your organization’s cyber security posture is essential to maintain brand trust. The challenge for the C-suite is to look at both the big picture and the finite details, translating your overall strategy for managing risk into actionable processes and priorities that will, over time, lower your risk exposure.

Qualys’ Threat Research Unit (TRU) looked at trillions of anonymized data points gathered from across our customer base to analyze where the biggest risk areas were for businesses. Based on this data, we can see specific areas where you can help your team increase their performance effectiveness, as well as how these changes add up to a significant improvement in security results overall. Building on these details will  improve how you manage risk, reduce your attack surface and maintain trust with your customers.

Continue reading

If you're a Discord user, you're probably going to be forced to change your username very soon

Discord

It's a decision that could have been taken years ago, but Discord has finally decided to change its odd policy on usernames.

The gaming-focused social chat platform has long forced users to put up with name that end in a four-digit "discriminator", but this is coming to an end. Discord has announced that the four digits at the end of usernames are to be removed, and this means that many users will be forced to choose new handles.

Continue reading

Google is getting cheeky and annoying with ads in the Gmail inbox

Google logo on sticks

Google and advertising go hand-in-hand, but now the company is treading on dangerous ground with a strategy that has quickly angered Gmail users.

Of course, ads in Gmail are far from new -- they have appeared in various places over the years including in the Promotions inbox. Recently, however, users have noticed that advertising emails and promotional messages are being nestled in between other emails in their inboxes.

Continue reading

Cyberattacks seek to exploit trust in Microsoft and Adobe tech brands

The first quarter of 2023 has seen a significant increase in cyberattacks looking to exploit trust in established tech brands like Microsoft and Adobe.

A new report from Avast also finds a 40 percent rise in the share of phishing and smishing attacks over the previous year. Overall, two out of three threats people encounter online now seek to use social engineering techniques, taking advantage of human weaknesses.

Continue reading

Zoho launches Ulaa, a free privacy-focused web browser for Windows, iOS and Android

Built to specifically address the growing concerns over online privacy, Zoho has launched Ulaa, a privacy-focused browser that comes equipped with pre-installed tools capable of blocking tracking and website surveillance.

Ulaa (a word derived from the Tamil language that means journey or voyage) offers customization options, built-in browser modes, and integrated productivity tools, while ensuring that user data remains confidential. Additionally, users can synchronize their browsing sessions between devices -- whether an entire browser window or a single tab -- enabling seamless use of multiple devices within the same browsing session.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.