Latest Technology News

Flying high: Could drones help address the delivery crisis?

The UK has been experiencing a shortage of delivery drivers in recent years. So much so, Amazon enticed part-time workers with up to £3,000 in incentives to ensure this didn’t affect profits during the festive period.

As well as this, according to the Road Haulage Association, the industry was short of more than 100,000 HGV drivers in June 2021. This was due to a number of factors, from barriers to obtaining a license to the introduction of Brexit.

Continue reading

What you need to know about prototype pollution and how it affects JavaScript

No, this is not about solid waste generated with the production of prototypes or models for different products. Prototype pollution here refers to a critical cyber threat rated 10/10 on the CVSS scale of severity.

In a paper published in July this year, entitled "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js," security researchers revealed a serious vulnerability that affects prototype-based languages like JavaScript and the Node.js platform. This threat involves injecting properties into an object's root prototype at runtime and causes the execution of legit code gadgets.

Continue reading

Attacks on healthcare organizations increase 90 percent

There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.

The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.

Continue reading

Microsoft is launching a new PowerToys utility -- Screen Ruler

PowerToys Screen Ruler

The last few PowerToys updates have been slightly disappointing (but only slightly) in as much as they have been largely bug-fixing releases, and have not included any new toys to play with. This is about to change.

Microsoft has a new utility in the pipeline, and its name gives you a very good idea of what it does: Screen Ruler. Perfect for all sorts of design work, the tool will let you measure the distance between two points on your screen in a number of ways.

Continue reading

Best Windows apps this week

Five-hundred-and-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft published a warning this week that a recent update has broken XPS viewing. Microsoft also released a new Windows 11 build; this one enabled File Explorer tabs for all users.

Continue reading

Why run your database in Kubernetes? [Q&A]

Business database

Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.

Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.

Continue reading

Following bug-related delay, Ubuntu Linux 22.04.1 LTS (Jammy Jellyfish) is finally here

Earlier this month, we shared the news that Ubuntu 22.04.1 LTS (code-named "Jammy Jellyfish") was being delayed. Sadly, the first point release of this wildly popular operating system version was being pushed back an entire week -- an absolute eternity in the world of Linux.

Well, folks, a week has passed, and thankfully, Canonical stayed true to its word (this time) and sorted the show-stopping Ubuntu Linux 22.04.1 issue. Yes, the major bug that caused snaps not to open on computers that used the OEM install option is now resolved. Even better, starting today, Canonical will being prompting Ubuntu 20.04 users to upgrade to Jammy Jellyfish.

Continue reading

Get 'Diversity Intelligence' ($15 value) FREE for a limited time

In Diversity Intelligence: How to Create a Culture of Inclusion for your Business, keynote speaker and diversity and inclusion expert Heidi R. Andersen delivers a step-by-step walkthrough of how to create an inclusive culture,  and break down the barriers to achieving diversity. 

You’ll find practical advice for creating the necessary cultural transformation that results in diversity intelligence, reaching well beneath the surface until it’s embedded in the foundation of your organization. The author describes the tools, methods, concepts, and goals that are essential to this transformation. 

Continue reading

Twice as nice? Who needs a digital twin?

The internet is always abuzz with new technology trends, and anyone who follows them will be familiar with the terms "digital twin" or "digital twin of an organization". Although digital twins have been around for several decades, the rapid rise of Internet of Things (IoT) technology has made the concept more widely considered a tool of the future. So, as digital twins increasingly model systems of interconnected things, what potential does the technology hold to orchestrate processes, people, and things in a sophisticated way that’s beneficial for everyone?

This article defines what a digital twin is, and suggests where the technology is headed in our increasingly interconnected world.

Continue reading

Digital transformation with four underutilized cloud-based capabilities

digital transformation

Making the most productive use of an organization’s digital resources is a vital ingredient for success in today’s ultra-competitive business landscape. Companies are challenged to extract the maximum value from their data assets when using exclusively in-house computing solutions.

This article will discuss cloud-based solutions and methods businesses can adopt to enhance their organization’s digital transformation. Failure to recognize and act on the potential benefits of these cloud technologies can leave a company struggling to keep up with more proactive market rivals.

Continue reading

New cloud-based platform helps protect operational security

business security

As more and more devices that we might not conventionally think of as 'IT' become connected, the risks to enterprises increase.

To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational resilience for modern industrial businesses.

Continue reading

What is the future of cryptocurrency regulation?

Cryptocurrency coins

The cryptocurrency industry rose to prominence in the United States in 2014. Since then, people have debated whether the U.S. government should get involved in regulating the new form of commerce and to what extent.

On one hand, Congress doesn’t want to stifle the innovation resulting from the burgeoning crypto industry. On the other, regulation would increase safety and encourage investors to feel more confident in cryptocurrency. The future of crypto is up in the air, but professionals agree that any regulation would have to be done delicately.

Continue reading

Stolen data used to launch more effective BEC attacks

Email attack

New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks.

Underground forums have sets of credentials for sale for as little as $10 that provide access to genuine corporate email accounts, making malicious emails seem genuine.

Continue reading

Business intelligence to support a post-pandemic mindset

The 'management versus employee' battle on WFH continues -- but have managers recognized why hybrid working has become such a problem?  Without face-to-face interaction, remote workers have far less trust in the information provided by distant colleagues -- or distant business partners/ suppliers/ customers. And that is leading to a breakdown in relationships across the board.

Furthermore, the pandemic has exacerbated differences in working attitudes: for every ambitious individual wanting to make a fast impact on the business before moving on to the next challenge, there is another taking the quiet quitting approach, coasting along doing just enough to get by.  How do the former engage the latter or monitor their progress to ensure key tasks are done -- especially when they have zero trust in the business information currently available? The stand-off will be both inevitable and painful -- especially given the continued challenge to recruit talent.

Continue reading

Cybercriminals take shortcuts to attack business PCs

Shortcut

Office macros have long been a favorite attack method for cybercriminals but now that Microsoft has started blocking them by default the bad guys have started to turn to other methods.

A new report from HP Wolf Security shows a shift to shortcut (LNK) files being used to deliver malware. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.