How AI is being used to spread misinformation
          A new research paper from ShadowDragon examines how AI, such as ChatGPT, is being used to spread hate and misinformation via fake reviews and deepfakes.
Written by Nico Dekens, director of intelligence, collection innovation at ShadowDragon, the paper looks at how to identify AI-generated materials online that are intentionally spreading false information or worse.
Get 'Excel Workbook For Dummies, 2nd Edition' (worth $18.00) for FREE
          Looking for easy-to-understand, practical guidance on how to go from Excel newbie to number crunching pro? Excel Workbook For Dummies is the hands-on tutorial you've been waiting for.
This step-by-step guide is packed with exercises that walk you through the basic and advanced functions and formulas included in Excel. At your own speed, you'll learn how to enter data, format your spreadsheet, and apply the mathematical and statistical capabilities of the program.
Email is seen as the enterprise channel most vulnerable to attacks
          The majority of organizations use six or more communication tools, across channels, with email being the single channel seen as the most vulnerable to attacks.
Of those responding to a new survey by Enterprise Strategy Group (ESG) and Armorblox of almost 500 IT and security professionals, 38 percent see email as the most vulnerable channel.
Best Windows apps this week
          Five-hundred-and-forty-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
The next Moments update for Windows will be released soon. It adds smaller features to the system and improves existing features, such as system-wide Captions support or support for Content Adaptive Brightness Control.
How DevSecOps can mitigate the cyber risks of emerging technologies [Q&A]
          The technology world never stands still for very long and as new technologies emerge so too do new threats. With things like quantum computing on the verge of becoming mainstream it's important to understand their security implications.
We spoke to Archie Agarwal, founder and CEO of ThreatModeler to discuss how DevSecOps can help to identify and mitigate these new threats to cloud services.
OpenAI releases an official ChatGPT app for iOS
          There are a huge number of fake ChatGPT apps out there -- particularly for Android handsets -- but now the company behind the artificial intelligence has released an official iOS app.
The app is not only free, it is also devoid of advertising. For most people, the app provides access to the GTP-3 powered AI, but anyone who subscribes to ChatGPT Plus gains access to the power of GPT-4.
Microsoft is working on Windows 11 23H2... but this Moment 4 update will be nothing to get excited about
          Microsoft’s new approach to bigger updates for Windows 11 has already seen the release of Moment 1 and Moment 2. The Moment 3 update is due very soon, and the company is already working away on Moment 4.
This fourth update to the operating system is also known as Windows 11 23H2, and it seems that this may be a bit of a damp squib.
Microsoft provides more details about the drawn-out death of Internet Explorer 11
          You thought Internet Explorer was dead and buried? Almost... but not quite. IE11 is still clinging to life, but Microsoft has detailed plans to finish the task of killing it off.
While the company has used updates to disable the browser in Windows 10, parts of it remain in the operating system. Microsoft has now provided an update about how it plans to completely eliminate Internet Explorer 11 -- which remains accessible in certain circumstances -- from Windows.
Say goodbye to Windows woes and embrace the next generation of Linux laptops with the mighty Kubuntu Focus M2 GEN 5
          Ladies and gentlemen, tech enthusiasts, and Linux lovers, prepare to be blown away by the latest offering from the Kubuntu Focus Team. They've outdone themselves yet again, bringing forth the M2 GEN 5 laptop, a true game-changer in the world of portable computing. With its remarkable hardware upgrades and a price that won't break the bank, this Kubuntu notebook is set to leave Windows users green with envy.
Bid farewell to mediocre CPUs, folks. The M2 GEN 5 takes a giant leap forward with an awe-inspiring upgrade from the i7-12700H to the lightning-fast i9-13900HX, boasting an astonishing 24 cores and 32 threads. With up to a 56 percent increase in multi-core performance, this laptop is a force to be reckoned with, effortlessly handling the most demanding tasks.
Digital accessibility: Supporting a culture of continuous improvement
          In spite of all the attention and welcomed awareness digital accessibility has received in recent years, lawsuits filed against companies who are not attentive to this issue show no signs of abating. In fact, the number of suits brought to federal court citing the Americans with Disabilities Act (ADA) reached a new record in 2022 (and this is just the number of cases that were involved in litigation -- the actual number of ADA demand letters was likely much higher).
Throughout 2022, several high-profile household brand names were the target of legal actions, including the Gap, Zola, Barnes & Noble and Goop. In fact, e-commerce companies remain the biggest risk for digital accessibility lawsuits, amounting to 77 percent of cases according to UsableNet. Almost 20 percent of the top 500 e-commerce websites received accessibility complaints in 2022; however, there is an interesting trend of accessibility lawsuits against smaller e-commerce companies (less than $50 million per year) which is on the rise.
Nitro PDF Pro 14 released, sports refreshed UI and new accessibility tools
          Nitro Software has unveiled a major new -- and renamed -- version of its flagship PDF editing tool. Nitro PDF Pro 14.3 is available now as a free trial download for PCs running Windows.
Chief highlights in this new release include a refreshed user interface, accessibility improvements and improved localization experience thanks to various fixes involving formatted, missing words and redirects.
Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response
          Intelligence is now considered essential to the process of identifying, understanding and acting upon threats. According to the "Global Perspectives on Threat Intelligence" study conducted by Mandiant, 96 percent of decision-makers interviewed for the research believe that it is important to understand which cyber threat actors could be targeting their organization. Consequently, threat Intelligence should be fully integrated into the internal mechanisms linked to threat detection and response.
Before detailing how intelligence can be integrated into defense tools, it is necessary to talk about the nature of intelligence, the complexity of collecting it, and how to curate, qualify and act on it in the most efficient way. Intelligence effectiveness depends on the contextualization of the elements collected in relation to a business’s specific environment. Once the qualified information is available and translated into specific formats and languages, it can then be used appropriately in detection tools, such as network detection probes, SIEMs, EDRs, etc.
Securing APIs is a top priority, yet many don't have dedicated security solutions
          The security of APIs remains a top cybersecurity concern this year, according to a new study, yet there is still a lack of dedicated API security for many companies.
Research from TraceableAI, carried out at this year's RSA conference, finds that though 69 percent of organizations claim to factor APIs into their cybersecurity strategy, 40 percent of companies do not have dedicated professionals or teams for API security.
The top five cloud security risks
          New analysis by Orca Security of scan results from its Cloud Security Platform reveals the top risks facing organizations this year.
The analysis of workload, configuration and identity data from real-world production cloud assets on Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Kubernetes and more identifies five of the most common, yet severe, cloud security risks which are found in many cloud environments.
Tackling patchwork IT: Key strategies MSPs can use to streamline solutions
          
The traditional office has undergone a significant transformation in recent years. The COVID-19 pandemic pushed companies to adopt technologies to facilitate remote work and collaboration. Gone are the days of a centralized, physical workspace and the four walls that defined it. But, this rapid transition has given rise to a new challenge: the emergence of a patchwork of solutions.
A patchwork of solutions refers to when a company uses various technologies or software solutions. Often these solutions don’t work together seamlessly or efficiently. In a recent report from SoftwareOne, 78 percent of IT leaders agree that patchwork systems make it harder to achieve business goals.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.


