Latest Technology News

TEAMGROUP N74V-M80 NVMe M.2 SSD features vapor chamber liquid cooling

Does the average home user need any form of cooling on their M.2 solid state drives? No, it is not necessary. With that said, active and passive cooling options can extend the life of your drive while possibly making it perform faster too. You see, when an M.2 SSD gets hot, its speeds can sometimes decrease. Whether or not the user will actually notice the speed reduction outside of benchmarks is debatable, however.

Of course, not all solid state drives are limited to homes and offices. Some computers are used for rough industrial applications, such as in a factory with high temperatures or some other location with harsh conditions. In these environments, cooling your storage drive can be even more important -- potentially necessary.

Continue reading

How can digitization and data make the generation of electricity more efficient and sustainable?

The UK’s energy industry is in uncharted waters, and it is being impacted by conflicting forces which are above and below the waterline. Firstly, prices are rising at levels unseen in a generation, and are only predicted to increase further -- this is having a knock-on impact on the economy and the consumer wallet. Secondly, from a sustainable perspective, it is clear that more must be done, and more quickly, to both protect the planet and achieve the UK’s Net Zero targets.

Other industries have had their digital moments, but the digitization of the UK energy industry is only at the start of its journey. Can digitization and data in particular be used to reduce electricity prices and also increase sustainability? I really think so. Let’s consider just one part of the problem and examine how digitization and data could be applied to drive efficiencies in the balancing of the National Grid.

Continue reading

New solution makes it easier to manage machine learning models

machine learning AI

More than 80 percent of organizations do not have the necessary visibility and control over their machine learning models or how they're deployed throughout the ML model development lifecycle.

To deal with this problem, Iterative has built an open-source model registry solution that allows teams to easily manage models with full context around model lineage, version, production status, data used to train the model, and more.

Continue reading

Cybercriminals go phishing for data in the social media pool

Phishing

The latest quarterly report from NortonLifeLock's global research team, Norton Labs, looks at how cybercriminals are using social media phishing attacks to steal private information.

Based on analysis of a full year of phishing attacks on the top social media platforms, it finds plenty of fake login pages designed to trick victims into inputting their login credentials, but also a diversity and complexity of lures going far beyond that one technique.

Continue reading

Bullzip PDF Printer 14 makes it even easier to create PDFs from just about any application

While Microsoft has made it so much easier to create PDF files in Windows than it ever used to be, the built-in option is still rather limited. You can use Microsoft's virtual PDF printer to quickly convert images, Office documents and other files into the ever-useful PDF format, but there are not a huge number of options that you are able to configure.

Things are rather different with Bullzip PDF Printer which has just been updated to version 14. It is a while since this versatile tool received an update, so it's great to see that it has not been forgotten and that development is on-going. Whether you're a new or existing user, there is a lot to look forward to in Bullzip PDF Printer 14.

Continue reading

60 percent of security pros say their strategy doesn't keep up with the threat landscape

A new survey reveals that 60 percent of respondents believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20 percent), treading water (13 percent), or merely running to keep up (27 percent).

The study from privileged access management specialist Delinea also shows that 84 percent of organizations experienced an identity-related security breach in the last 18 months, despite 40 percent of respondents believing they have the right strategy in place.

Continue reading

Good news: NFL launches a live streaming service! Bad news: The details

It’s no secret that the NFL’s contract for Sunday Ticket with DirecTV expires after the upcoming NFL season, the 2022-23 one. That’s good news for pretty much anyone who doesn’t or who can't get the satellite service. 

While rumors abound of who will get the new Sunday Ticket deal -- Apple TV+ has long been rumored to be the front runner -- the real preferred favorite of the people out there has been to make it available through all services, like any channel -- sign a contract with the normal restrictions (blackouts, etc.) 

Continue reading

Cybercriminals use messaging apps to steal data and spread malware

Mobile phone malware

The shift to remote working has boosted the popularity of messaging apps, in particular those like Discord and Telegram which have underlying elements that allow users to create and share programs or other types of content that's used inside the platform.

But research from Intel471 shows cybercriminals are finding ways to use these platforms to host, distribute, and execute functions that ultimately allow them to steal credentials or other information from unsuspecting users.

Continue reading

A third of employees don't understand the importance of cybersecurity

Man shrugging shoulders

One in three employees doesn't understand the importance of cybersecurity at work according to new research from email security company Tessian.

In addition only 39 percent of employees say they're very likely to report a security incident, making investigation and remediation even more challenging and time-consuming for security teams. When asked why, 42 percent of employees say they wouldn't know if they had caused an incident in the first place, and 25 percent say they don't care enough about cybersecurity to mention it.

Continue reading

Microsoft confirms that KB5014666 update is causing printing problems in Windows

Microsoft building logo

Several months ago, Microsoft released a series of updates for Windows 10 and Windows 11 that caused endless problems with printing. Subsequent updates that were supposed to fix the initial problems either failed to do so, or introduced new issues. Now printer problems have popped up again

The issues stem from the recently released KB5014666 update, and it is specifically causing problems printing to USB connected devices. This time around, it is only users of Windows 10 that are affected, but this is a huge number of people. Microsoft has provided details of potential workarounds.

Continue reading

Anker launches GaNPrime charging products

Do you need a USB charging adapter for your many devices? If so, you should probably invest in a GaN charger these days. If you aren't familiar, these chargers use a special technology that allows then to efficiently output high wattages of power while retaining a pretty small footprint. Depending on the model, you may be able to charge both your laptop and smartphone using the same diminutive charger.

Today, Anker launches a whole family of new GaN charging products under its "GaNPrime" branding. The product line consists of a diverse group of products that offer varying wattages and connection types (USB-A, USB-C, and AC). In other words, there should be at least one product to meet your needs.

Continue reading

Google Play gets redesigned logo to commemorate its 10th birthday

Do you want to feel old? Google Play launched in 2012! In other words, Google's digital store has now existed for a decade. Google Play has become a centralized digital store for both software and media, including mobile apps, games, books, television shows, and movies.

Is Google Play a good store, though? That is debatable. While it is has plenty of quality offerings, it is polluted with low-quality apps and games too. Even worse, some of the software downloads are designed by nefarious developers looking to trick and defraud unsuspecting users. Yes, Google Play actually contains some malware. Sadly, Google's digital store just isn't as safe as Apple's superior App Store.

Continue reading

The evolution of botnets and DDoS attacks

Distributed Denial of Service (DDoS) attacks have become an ongoing threat for organizations. Using a variety of techniques, a wide range of threat actors from lone hackers, criminal gangs and hacktivists to nation-states are using DDoS attacks to disrupt or disable the performance of target systems. These targets can be small or large businesses, internet service providers, manufacturers, retailers, healthcare providers, schools and universities, or other nation-states. Essentially, any entity with an online presence can become a DDoS target.

Now, here is the why. There are three main reasons why people create botnets: For financial gain by extortion -- 'pay up or we keep attacking’; to make a point -- 'stop (or start) doing something or we continue’; or, in the case of nation-state actors, as an espionage or cyber warfare tactic.

Continue reading

Implementing international regulations from a tech perspective: Lessons from the Union Customs Code and Brexit

Brexit flags

The issue of border management is a hot topic that has gathered urgency due to the combined impact of the pandemic, trade and travel sanctions related to Russia, with regards to the Ukraine conflict and global supply chain disruption. Borders play a critical role in managing security, public health and safety, and commerce between nations. 

The issue is highly political, as evidenced during Brexit negotiations, when one of the major sticking points -- still a contentious issue today -- was around implementing the necessary customs regulations between Northern Ireland and Ireland in the absence of a hard border between the countries. A common theme among government communications at the time was that a "technological solution" would be capable of tracking goods and ensuring the correct declarations and authorizations were made, without requiring physical checks.

Continue reading

Addressing the cybersecurity talent shortage [Q&A]

talent

Cyber threats are growing in volume and sophistication, but efforts to combat them are being hampered by a shortage of cybersecurity skills.

One way of meeting that shortage is to look at upskilling and retraining within the current workforce. We spoke to Apratim Purakayastha, chief technology officer at Skillsoft, to find out more about how using innovative learning solutions can deliver the skills businesses need.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.