Latest Technology News

Sony ZV-E10 II camera debuts

Sony Electronics has unveiled the ZV-E10 II, the eagerly awaited successor to the widely popular ZV-E10 mirrorless camera, acclaimed for its versatility and ease of use in content creation. The new ZV-E10 II not only retains the beloved features of its predecessor but also introduces enhancements to cater even more effectively to the needs of creators.

The ZV-E10 II is equipped with an updated 26-megapixel Exmor R CMOS sensor and Sony’s latest BIONZ XR image processing engine, promising higher image quality and faster processing speeds. This second-generation model boasts enhanced autofocus capabilities, improved video features including a Cinematic Vlog Setting, and a redesigned user interface that supports vertical content creation seamlessly.

Continue reading

Accuracy worries delay Gen AI initiatives

Calendar delay

Less than 60 percent of manufacturers plan to increase AI spending in 2024 compared to 93 percent in 2023, according to a new survey.

The study from Lucidworks gathered input from over 2,500 leaders involved in AI technology decision-making worldwide and finds in 2023 more than 40 percent of manufacturing leaders had a positive view of AI, with 93 percent planning to increase investments.

Continue reading

UK tech execs not convinced about return on investment from AI

A new study from IT consultancy Zartis shows that UK tech executives are confident about the level of AI skills within their organizations, but aren't convinced about the return on investment from AI.

The report shows 85 percent rate their existing workforce's combined AI knowledge and expertise as 'skilled' while 51 percent rate it as 'highly skilled'. Despite this confidence, many of these executives have concerns about barriers that might prevent further AI adoption.

Continue reading

Maxell launches OWS Pro Open Wireless Earhooks on Amazon

Maxell has launched the OWS Pro Open Wireless Earhooks. These earbuds are designed with an open fit to allow users to stay aware of their surroundings while enjoying audio content.

The earhooks are designed to sit securely on the outer ear and feature fast charging through a Type-C connection. They provide up to 18 hours of total playtime with the charging case, and the earbuds alone can deliver 6 hours of audio playback.

Continue reading

Self-service password reset: How the cure could introduce more security ills

Passwords certainly aren’t new -- they began in ancient civilizations so tribes and their militaries could identify their members and allies. But the management problems they present in a digital world so utterly dependent upon them are voluminous and costly. On average, business users have 87 passwords for their work-related accounts. Granting this complexity, users will inevitably need to turn to IT several times a year to resolve password lock outs. Forrester estimates that it costs an organization $70 per password reset and that large, U.S.-based enterprises allocate $1M annually for password-related support costs.

While Self-Service Password Reset (SSPR) tools -- web-based portals that enable users and administrators to reset their own passwords without IT interaction -- seem like the ideal solution, they come with risks. Today’s threat actors are exploiting every opportunity to gain credentials, and without the proper controls, SSPR solutions can be ripe for social engineering and exploitation. Artificial Intelligence is bolstering social engineering tactics while making them less detectable. Threat actors have increasingly been waging these sorts of attacks against SSPR solutions, in particular Microsoft SSPR, to gain both user and admin credentials. While it has become necessary for IT to streamline tasks in a world of burgeoning demands and complexity, any solutions deployed must be reviewed for vulnerabilities -- or the cure could be worse than the disease, leading to a catastrophic breach.

Continue reading

Get 'AI for Absolute Beginners' (worth $9.99) for FREE

AI for Absolute Beginners begins with an engaging introduction to the world of Artificial Intelligence, making it approachable for those with little to no knowledge on the subject.

The book unravels the mysteries of AI's evolution, from its historical roots to the cutting-edge technologies shaping our future. By explaining complex concepts in simple terms, this guide aims to illuminate the path for those curious about how AI impacts our world.

Continue reading

Understanding the threats lurking in Microsoft Office documents

Microsoft Office stands as a pillar in the landscape of modern productivity tools. Its suite of programs -- from Word for crafting documents to Excel for data analysis - allows for versatility in both personal and professional environments. Used from everything like notetaking, resumes, essays, and business reports, in today’s digital age, these documents are indispensable and trusted tools.

This versatility, however, presents a double-edged sword. While they enhance efficiency and functionality, they simultaneously create potential security risks. This duality makes Microsoft Office documents an attractive target for threat actors, who exploit their widespread use and familiar interface to deliver phishing and malware with alarming ease.

Continue reading

Microsoft warns Windows 11 users of forced upgrades due to impending end of service for older versions

Windows 11 security

Microsoft has issued a reminder to anyone using older editions of Windows 11 that their operating system is about to reach end of servicing.

Windows 11 versions 21H2 and 22H2 will no longer receive security updates as of October. To avoid the problem of leaving people with an insecure and unsupported operating system, Microsoft has a solution: forced upgrades.

Continue reading

Strong SLAs critical for vulnerability management

A new report from crowdsourced security company Intigriti highlights the need for strong cybersecurity practices and service-level agreements (SLAs) for vulnerability management.

Globally, 75 percent of businesses fail to respond to critical vulnerabilities within 24 hours, consequences of which could include customer dissatisfaction, loss of business, and reputational damage.

Continue reading

Microsoft brings new archive format support, Copilot improvements and new emoji to Windows 11 with the KB5040442 update

Windows 11 screen with reflection

This month’s update for Windows 11 is pretty impressive. There are the typical bug fixes that you would expect, but there are also lots of additions and improvements to the operating system.

Like Windows 10, Windows 11 Copilot now offers a more app-like experience, and there is the very welcome return of the Show Desktop button on the taskbar. Other improvements mean that it is now possible to create 7-Zip and Tape Archive (TAR) files using the context menu, and there is newly added support for Emoji 15.1. But that’s just for starters.

Continue reading

Microsoft releases KB5040427 update to fix bugs and make significant changes to Copilot in Windows 10

Windows 10 laptop

Copilot being added to Windows 10 was something of a surprise for an operating system that is very much breathing its last. And more than just bringing the AI-powered assistant to Windows 10, Microsoft is continuing to update it with big changes.

The release of the KB5040427 update for Windows 10 this Patch Tuesday is a good example. Microsoft has used this update to fix lots of OS bugs -- including an infuriating taskbar niggle – and also tweaked Copilot to make it function like an app.

Continue reading

Why organizations must address the AI skills gap [Q&A]

Skills gap

As AI sees wider adoption, the demand for skills surrounding the technology inevitably increases too. By failing to act to address this AI skills and leadership vacuum organizations could be taking a significant risk.

We spoke to Arun 'Rak' Ramchandran, president and global head -- GenAI consulting and practice, hi-tech and professional services at Hexaware, to find out more about the problem and how it can be tackled.

Continue reading

Resurrecting Internet Explorer -- the nasty threat impacting potentially millions of Windows 10 and 11 users

Check Point Research (CPR) has identified a critical zero-day spoofing attack exploiting Microsoft Internet Explorer on modern Windows 10/11 systems, despite the browser's retirement.

Identified as CVE-2024-38112, this vulnerability allows attackers to execute remote code by tricking users into opening malicious Internet Shortcut (.url) files. This attack method has been active for over a year and could potentially impact millions.

Continue reading

Anticipating tomorrow's threats: AI, evolving vulnerabilities, and the 'new normal'

Artificial-Intelligence-threat

Modern cybersecurity leaders are expected to balance an almost comical number of responsibilities. Threat intelligence, vulnerability management, asset tracking, identity management, budgeting, third-party risk -- and that’s just what the company is willing to put in the job description.

To be a cybersecurity expert is to spend your entire career deepening your well of knowledge in one or a few domains. To be a cybersecurity leader, on the other hand, is to spend your career attempting to drink an ocean through a straw. What makes this moment in cybersecurity so interesting is that generative artificial intelligence (AI) brought a fundamental change to both the ocean and the straw.

Continue reading

Six ways to future-proof your CMS, while elevating your tech teams

In today’s competitive business environment, delivering dynamic experiences across multiple digital channels is becoming increasingly important. In the past, a traditional monolithic CMS was the go-to solution for managing website content in bulk, offering a comprehensive approach with integrated front-end and back-end functionalities.

However, as the importance of web channels for media distribution grew, developers within larger enterprises recognized the limitations of monolithic solutions in managing complex, structured content or delivering unique frontend capabilities. This led to the rise of custom, internal CMS solutions. Performance and extensive customization were possible but at huge engineering costs and time pressure to plan, develop, and uphold these systems.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.