Latest Technology News

Instagram rolls back changes that drew the ire of Kim Kardashian and Kylie Jenner

Instagram logo with silhouettes

Following a backlash from ordinary users, as well as influencers and celebrities such as Kim Kardashian and Kylie Jenner, Instagram has announced that it is rolling back a number of recent changes to the social platform.

One of the new features that caused widespread irritation was a TikTok-aping video-focused recommendation system which means users were no longer seeing as much content from accounts they actually follow. Another unpopular change was a new full-screen view for posts. Instagram owners Meta says that after the rollback it will "take the time" to get the changes right.

Continue reading

MINISFORUM NUCXI5 and NUCXI7 Windows 11 mini PCs have NVIDIA GeForce graphics

Mini desktop computers are all the rage these days, as consumers shy away from the giant towers of yesteryear. Tiny desktops are great for those that don't have a lot of desk space. These days, small computers are pretty powerful too, although they usually only have integrated graphics. In other words, they often lack discrete graphics, which means they aren't ideal for modern PC gaming.

Popular mini-desktop-maker, MINISFORUM, has two new offerings that actually do come with dedicated NVIDIA graphics. The ultra-slim desktop PCs are powered by 11th gen Intel Core processors. Called "NUCXI5" and "NUCXI7," the former is powered by a Core i5, while the latter is equipped with an i7.

Continue reading

Is Zero Trust segmentation the answer to mitigating ransomware threats?

As companies increasingly move towards hybrid cloud infrastructures, fostering hyperconnectivity across applications, systems, and users, ongoing digital transformation projects are breeding complexity for modern enterprises. This is one of the reasons why devastating ransomware attacks are at an all-time high. Research by ESG found that 76 percent of IT and security professionals experienced at least one ransomware attack in the past year. What’s worse, 82 percent of the victims paid the ransom, with the average payout reaching $495,000.

In most cases, the fear of downtime and critical data loss drives the decision to pay the ransom. However, payouts are rarely the best long-term solution to combat this problem. Instead, businesses should focus on containing attacks and minimizing resulting business damage proactively. And one of the best ways to reach both outcomes, while bolstering business resilience, is with a modern Zero Trust approach to cybersecurity.

Continue reading

Best Windows apps this week

Five-hundred-and-one in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft released the first development version of Windows 10 version 22h2 to the Release Preview channel; this marks the final stage of development before official release later this year.

Continue reading

How endpoint security and management are consolidating [Q&A]

Endpoint protection

Securing endpoints used to be a simple matter of installing a firewall and antivirus solution and then keeping them updated.

But as threats have become more sophisticated, networks more complex and working patterns have shifted away from the office, securing and managing endpoints has become a much greater problem for enterprises.

Continue reading

If you're daft enough to pay for Twitter Blue, prepare to dig deeper into your pockets

Twitter logo on wooden background

It was hardly a surprise when Twitter launched a subscription service in the form of Twitter Blue. In exchange for $2.99 a month, anyone keen to gain access to extra feature could help top up the social media company's coffers.

But it seems that the coffers have not been topped up enough as Twitter has announced a price hike. The cost of a Twitter Blue subscription jumps by two thirds for new subscribers with immediate effect, and existing subscribers can expect to pay the new, higher price in the near future.

Continue reading

Microsoft rolls out Windows 11 Beta Builds 22621.440 and 22622.440

Three weeks ago, Microsoft announced that it would be splitting the Windows 11 Beta Channel into two. The idea behind this is that a group of Windows 11 Insiders in the channel will either receive Build 22622.xxx updates with new features, or Build 22621.xxx updates without them.

Today, the company rolls out Builds 22621.440 and 22622.440. Here's what's new.

Continue reading

Microsoft releases Windows 10 22H2 preview build (KB5015878)

Although Microsoft would prefer users to switch to Windows 11, plenty of people and organizations prefer, understandably, to stick with the older, tried and tested Windows 10.

The software giant is preparing to release the next feature update for this OS, and from today Insiders can install the first preview build of Windows 10, version 22H2.

Continue reading

How to get Google Pixel 6a for free

Google's Pixel phones are a dream come true for vanilla-Android fans -- on paper, at least. Sadly, the search giant has failed mightily when it comes to its phones, as the devices are often riddled with bugs. The Pixel line of phones just can't stand up to the high-quality hardware and software Apple provides with the iPhone.

If you still want a Pixel phone, however, but are concerned about it being buggy, then it would be foolish to buy one -- especially at full price. What if the device was free, though? Well, if it costs nothing, then maybe it is worth taking the gamble and dealing with potential bugs. Well, folks, I am happy to report that you can get Google's newest phone, the Pixel 6a, for free when signing up with either Xfinity Mobile or Comcast Business Mobile.

Continue reading

Microsoft releases Windows 11 Build 25169 with new lockdown feature and Windows Spotlight theme

Arriving a day later than usual, this week’s updated Windows 11 Insider build has some new features for Dev Channel Insiders to play around with.

The first of these new additions is a lockdown feature for IT administrators that allows certain apps to run while blocking other OS functionalities.

Continue reading

Lateral movement: A crash course

Security breach lock

Despite the fact lateral movement has been a frequent factor in security breaches for years, attackers still use it in the vast majority of cyber-attacks. Moving across cloud and on-premises applications and services -- threat actors escalate their way to often unprotected core technical assets -- dropping ransomware, stealing data, poisoning the supply chain and more.

Organizations must start thinking more broadly and implementing solutions to proactively detect and prevent lateral movement attacks in real-time.

Continue reading

Relying on CVSS scores for vulnerability management may be misguided

security flaw

The latest vulnerability intelligence report from Flashpoint finds that 52 percent of all vulnerabilities reported in the first half of 2022 that were scored 10.0 -- the most severe level -- on CVSS are likely scored incorrectly.

When scoring, CVSSv2 guidelines take a 'score for the worst' approach if details of some of the metrics used are unclear. But the report points out this has resulted in many vulnerabilities being scored a 10.0, even though they are actually less severe, simply due to vendors providing fewer details.

Continue reading

Increased expectations see burnout on the rise among enterprise tech teams

Digitization and rising consumer expectations are having a major impact on the working conditions of technology teams leading to a rise in burnout and attrition.

A new study from PagerDuty shows 42 percent working more hours in 2021 than in 2020, and 54 percent of responders are being interrupted outside normal working hours.

Continue reading

How to quickly view and recover forgotten Wi-Fi passwords in Windows 10 and Windows 11

In order to keep your wireless network(s) safe from intruders you are encouraged to change the default passwords, replacing them with long, impossible to guess choices. That’s great from a security point of view, but it can be nightmare if you forget or mislay them.

Thankfully, your devices will store the logins for all of the wireless networks you connect to -- including those for hotels, airports and coffee shops -- but it’s not that obvious how to view this information.

Continue reading

Get 'The Act of Leadership' ($13 value) FREE for a limited time

The Act of Leadership, acclaimed leadership and performance coach Dan Haesler shares the insights, techniques and habits you need to thrive, professionally and personally. By combining real-life case studies, cutting-edge research and incisive coaching techniques this one-stop leadership playbook will help you better understand yourself and the people around you, so you can be not only the leader you want to be, but the person your people need you to be, both at work and at home.

As a leader, you might know exactly what you need to do, but might be less clear on how to do it. You might know you need to have that difficult conversation, but you’re less sure about how to have it. You might know you need to hold your team accountable, but don’t know how to do it in a manner that builds authentic engagement rather than mere compliance. 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.