Latest Technology News

Microsoft releases KB5026372 update for Windows 11 with security fixes and faster update option

Windows 11 keyboard

It is that time of the month again; Microsoft has released a new update for Windows 11, not only addressing security issues, but adding new options.

With the release of the KB5026372 update for Windows 11, Microsoft has addressed an issue with Windows Local Administrator Password Solution (LAPS) as well as fixing numerous other security flaws, including three zero days. The update also adds the option for Windows 11 users to receive non-security updates faster in future.

Continue reading

Shell Frosting is a free tweaking tool to unlock hidden features of the Windows 11 taskbar

Shell Frosting

Complaints about Windows 11 center on various changes Microsoft has made to the Windows 10 successor, but the taskbar is something that crops up time and time again.

While there is some good news in that Microsoft is listening to feedback and working to implement some of the missing features users want, the bad news is that it is taking time. If you are impatient to see the return of taskbar labels and the option to never combine buttons, Shell Frosting is the tweaking tool you need.

Continue reading

Plugable launches PS-EPR-140C1 140W USB-C GaN power adapter

plug01

Ladies and gentlemen, it's time to break up with your slow and outdated laptop charger, because Plugable has just released a new 140W USB-C power adapter that should be faster and more efficient than your current one!

The Plugable USB-C Power Adapter (PS-EPR-140C1) is a powerhouse, featuring GaN and Extended Power Range (EPR) technology that will blow your mind. Not literally, of course, because safety is a top priority for Plugable. But it will definitely blow your previous charger out of the water.

Continue reading

Safety in the metaverse: What are the risks for businesses?

Businessman-in-metaverse

Like any new innovation, the metaverse is currently at the center of a 'risk versus reward' debate. Unsurprisingly, the 3D virtual world has received a lot of attention, with McKinsey confirming that more than $120 billion was invested in building out metaverse technology and infrastructure in the first five months of 2022.

Promises of extraordinary use cases, from teaching virtualized university lectures to performing surgeries for patients in other countries -- not to mention the potential cost saving and accessibility benefits -- have garnered curiosity. But while it could be some time until we see mass adoption of the metaverse, the security community is already apprehensive of the evolving security risks.

Continue reading

Freespire closes the gap between Linux and Windows 10

Freespire-Laptop

If you've been using Windows for a while, you'll be very comfortable with how Microsoft's operating system looks and works. Although Windows 11 sports a centered taskbar, that OS isn't hugely different to its predecessor, Windows 10.

Familiarity with Windows makes it very difficult for users to switch to a non-Microsoft operating system, but Freespire's latest update aims to make users of Windows 10 or Windows 11 feel more at home using Linux.

Continue reading

Is the NHS cybersecurity strategy to 2030 enough to protect healthcare?

Healthcare data

With the rise in cyberattacks on the healthcare sector, boosting cyber resilience has become critical.

The UK government recently introduced the Cyber Security Strategy to 2030 for health and social care to protect the functions and services citizens depend upon. The policy outlines five pillars to achieve cyber resilience by 2030, which include focusing on more significant risks and harm, defending against threats as a single team, including all people and cultures, building a secure system for the future, and aiming for exemplary response and recovery times. 

Continue reading

Firefox 113 unveils search and picture-in-picture improvements alongside tighter security

Firefox-on-laptop-screen

The Mozilla Foundation has unveiled Firefox 113.0 alongside Firefox ESR 102.11.0, the latest version of its open-source, cross-platform browser.

It’s a relatively big release, with numerous security enhancements and UI improvements, particularly when searching the web through the URL bar and making use of Firefox’s picture-in-picture video player.

Continue reading

Network edge technologies fail to cut it for modern businesses

Networked computers

New use cases are breaking existing edge technologies, such as MPLS and SD-WAN, according to a survey from Graphiant.

Enterprise connectivity has changed a lot in recent years, with a surge in remote workers, remote offices, and IoT. This has exposed shortcomings with MPLS and SD-WAN, with network architects rating both technologies with Ds and Fs for metrics such as scalability, agility, and cost.

Continue reading

Windows 10 is going to be the most stable version of Windows until October 2025

Happy Windows 10 user thumbs up

Microsoft announced last week that it won’t release new feature updates for its Windows 10 operating system anymore. Windows 10 version 22H2, released in late 2022, is therefor the last major version of Windows 10.

The operating system won’t receive new (major) features anymore and Microsoft will focus its engineering energy on Windows 11 and potential successors. It is unclear whether smaller changes will still find their way into the operating system. Many of these, if they happens, may introduce changes that most users may not want.

Continue reading

Business leaders don't understand cybersecurity

businessman confused

A new survey from Delinea of over 2,000 IT security decision makers (ITSDMs) reveals that only 39 percent of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler.

In addition, over a third (36 percent) believe that it is considered important only in terms of compliance and regulatory demands, while 17 percent say it isn't seen as a business priority.

Continue reading

Technology sector suffers most from poor cyber hygiene

security flaw

Analysis of exposed dark web assets from SpyCloud finds that the technology sector has the highest number of malware-infected employees and consumers, the highest number of exposed corporate credentials, and the most exposed malware cookie records.

In the analysis of the darknet exposure of employees of Fortune 1000 enterprises across 21 industry sectors, researchers uncovered 27.48 million pairs of credentials with corporate email addresses and plain text passwords, with over 223,000 exfiltrated by malware.

Continue reading

Cybersecurity awareness education: The beginnings of change

Cybersecurity-awareness

More than eight in 10 data breaches globally can be attributed to human error.

People are the weakest link in cybersecurity. And this weakness comes from a lack of awareness about our cyber risk and the behaviors that influence it. Many people see cybersecurity as an IT concern. In truth, cybersecurity concerns everyone. When our hospitals get infected with ransomware, we can’t receive care. When our organizations experience a cyberattack, we lose our jobs. Still, we tend to underestimate the importance of cybersecurity to our society and economy.

Continue reading

Kingston launches DC600M Enterprise SSD

sedc600m-7680gb-s_hr.jpg

Today, we have some exciting news from Kingston Digital, Inc. The company just announced its latest offering in the world of data storage — the DC600M Enterprise SSD.

This new product has been optimized for mixed-use workloads, with excellent Quality of Service (QoS) to ensure latency and IOPS consistency. With 6Gbps SATA 3.0 storage and 3D TLC NAND, the DC600M is perfectly suited for high-volume rack-mount servers. Plus, it includes hardware-based on-board power loss protection via power loss capacitors, reducing the risk of data loss in the event of an unexpected power failure.

Continue reading

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

Prisoner locked-in

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

Continue reading

Twitter admits a 'security incident' allowed private Circles messages to be seen by anyone

Twitter logo and Elon Musk account

Following numerous complaints from users concerned that the Circles feature of Twitter was broken, the company has conceded that tweets that were supposed to be visible to only a select number of people were in fact accessible by anyone.

The idea of Twitter Circles is that messages can be seen only by people who have been added to a Circle. But Twitter has now revealed "a security incident that occurred earlier this year" that ignored privacy settings.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.