Latest Technology News

Understanding the threats lurking in Microsoft Office documents

Microsoft Office stands as a pillar in the landscape of modern productivity tools. Its suite of programs -- from Word for crafting documents to Excel for data analysis - allows for versatility in both personal and professional environments. Used from everything like notetaking, resumes, essays, and business reports, in today’s digital age, these documents are indispensable and trusted tools.

This versatility, however, presents a double-edged sword. While they enhance efficiency and functionality, they simultaneously create potential security risks. This duality makes Microsoft Office documents an attractive target for threat actors, who exploit their widespread use and familiar interface to deliver phishing and malware with alarming ease.

Continue reading

Microsoft warns Windows 11 users of forced upgrades due to impending end of service for older versions

Windows 11 security

Microsoft has issued a reminder to anyone using older editions of Windows 11 that their operating system is about to reach end of servicing.

Windows 11 versions 21H2 and 22H2 will no longer receive security updates as of October. To avoid the problem of leaving people with an insecure and unsupported operating system, Microsoft has a solution: forced upgrades.

Continue reading

Strong SLAs critical for vulnerability management

A new report from crowdsourced security company Intigriti highlights the need for strong cybersecurity practices and service-level agreements (SLAs) for vulnerability management.

Globally, 75 percent of businesses fail to respond to critical vulnerabilities within 24 hours, consequences of which could include customer dissatisfaction, loss of business, and reputational damage.

Continue reading

Microsoft brings new archive format support, Copilot improvements and new emoji to Windows 11 with the KB5040442 update

Windows 11 screen with reflection

This month’s update for Windows 11 is pretty impressive. There are the typical bug fixes that you would expect, but there are also lots of additions and improvements to the operating system.

Like Windows 10, Windows 11 Copilot now offers a more app-like experience, and there is the very welcome return of the Show Desktop button on the taskbar. Other improvements mean that it is now possible to create 7-Zip and Tape Archive (TAR) files using the context menu, and there is newly added support for Emoji 15.1. But that’s just for starters.

Continue reading

Microsoft releases KB5040427 update to fix bugs and make significant changes to Copilot in Windows 10

Windows 10 laptop

Copilot being added to Windows 10 was something of a surprise for an operating system that is very much breathing its last. And more than just bringing the AI-powered assistant to Windows 10, Microsoft is continuing to update it with big changes.

The release of the KB5040427 update for Windows 10 this Patch Tuesday is a good example. Microsoft has used this update to fix lots of OS bugs -- including an infuriating taskbar niggle – and also tweaked Copilot to make it function like an app.

Continue reading

Why organizations must address the AI skills gap [Q&A]

Skills gap

As AI sees wider adoption, the demand for skills surrounding the technology inevitably increases too. By failing to act to address this AI skills and leadership vacuum organizations could be taking a significant risk.

We spoke to Arun 'Rak' Ramchandran, president and global head -- GenAI consulting and practice, hi-tech and professional services at Hexaware, to find out more about the problem and how it can be tackled.

Continue reading

Resurrecting Internet Explorer -- the nasty threat impacting potentially millions of Windows 10 and 11 users

Check Point Research (CPR) has identified a critical zero-day spoofing attack exploiting Microsoft Internet Explorer on modern Windows 10/11 systems, despite the browser's retirement.

Identified as CVE-2024-38112, this vulnerability allows attackers to execute remote code by tricking users into opening malicious Internet Shortcut (.url) files. This attack method has been active for over a year and could potentially impact millions.

Continue reading

Anticipating tomorrow's threats: AI, evolving vulnerabilities, and the 'new normal'

Artificial-Intelligence-threat

Modern cybersecurity leaders are expected to balance an almost comical number of responsibilities. Threat intelligence, vulnerability management, asset tracking, identity management, budgeting, third-party risk -- and that’s just what the company is willing to put in the job description.

To be a cybersecurity expert is to spend your entire career deepening your well of knowledge in one or a few domains. To be a cybersecurity leader, on the other hand, is to spend your career attempting to drink an ocean through a straw. What makes this moment in cybersecurity so interesting is that generative artificial intelligence (AI) brought a fundamental change to both the ocean and the straw.

Continue reading

Six ways to future-proof your CMS, while elevating your tech teams

In today’s competitive business environment, delivering dynamic experiences across multiple digital channels is becoming increasingly important. In the past, a traditional monolithic CMS was the go-to solution for managing website content in bulk, offering a comprehensive approach with integrated front-end and back-end functionalities.

However, as the importance of web channels for media distribution grew, developers within larger enterprises recognized the limitations of monolithic solutions in managing complex, structured content or delivering unique frontend capabilities. This led to the rise of custom, internal CMS solutions. Performance and extensive customization were possible but at huge engineering costs and time pressure to plan, develop, and uphold these systems.

Continue reading

Lenovo outpaces Apple in shocking PC market surge

The PC market is making a remarkable recovery, showcasing a 3 percent growth in the second quarter of 2024. This is quite impressive after a series of declines, with worldwide shipments of traditional PCs hitting 64.9 million units. Despite challenges in China, growth outside this region exceeded 5 percent, according to the IDC Worldwide Quarterly Personal Computing Device Tracker.

This resurgence is significantly fueled by the excitement around AI-enhanced PCs and a vital commercial refresh cycle. "Navigating through market maturity and various challenges, the back-to-back quarters of growth reflect a vibrant and changing landscape," commented Ryan Reith, Group Vice President at IDC.

Continue reading

No, Linux isn't always best for IoT

Ask a connected device developer which operating system they prefer and most -- about three-quarters to be exact -- will reply with Linux. The open-source system is far and away the king of the Internet of Things (IoT) thanks to its flexibility and support for various architectures.

But there’s a problem. Simple, single-function devices like smart thermostats or connected bird feeders often don’t require the robust processing power of Linux. Loading these devices with multi-tasking capabilities can be inefficient and potentially risky. Recent reports of backdoor vulnerabilities in Linux, for example, raise concerns about its attack surface and open-source origins.

Continue reading

Get 'Cyber Intelligence-Driven Risk' (worth $27) for FREE

Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?

In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.

Continue reading

OptConnect introduces ema:USB, a new smart USB modem for IoT connectivity

OptConnect has announced the release of ema:USB, described as the first smart USB modem. This product is designed to simplify the process of integrating cellular connectivity into various hardware setups, reducing the usual delays and complexities.

The core of ema:USB features the OptConnect ema, a patented embedded modem that has achieved full certification as an LTE Category 4 device. This certification helps users avoid the costs and challenges associated with developing embedded wireless designs.

Continue reading

Plugable USBC-TRAN USB 3.0 Transfer Cable with USB-C Adapter is compatible with Windows XP through Windows 11

Plugable has launched its latest product, the USB 3.0 Transfer Cable with USB-C Adapter (USBC-TRAN), tailored to simplify the process of data migration and syncing across various Windows computers. As an upgrade from the previous USB3-TRAN, the new cable features compatibility with both USB-C and USB-A ports, making it versatile for use with modern and legacy Windows systems.

Designed to support Windows versions from XP through to the latest Windows 11, in both 32-bit and 64-bit configurations, the USBC-TRAN offers comprehensive coverage for all user needs. It comes equipped with Bravura Easy Computer Sync software which can be installed on an unlimited number of PCs, allowing for seamless and unrestricted data transfer of any size -- ideal for both personal and professional settings where frequent data migration is necessary.

Continue reading

Security pros use unauthorized SaaS apps despite the risk

A new survey finds 73 percent of security professionals admit to using SaaS applications that have not been provided by their company's IT team in the past year.

This is despite the fact that they are acutely aware of the risks, with respondents naming data loss (65 percent), lack of visibility and control (62 percent) and data breaches (52 percent) as the top risks of using unauthorized tools.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.