Latest Technology News

Plugable UD-3900C4 USB-C docking station can push four displays

USB-C docking stations are pretty common these days. In fact, websites like Amazon are littered with countless makes and models. Of course, not all of them are good, nor are they all the same. Features can vary from dock to dock, such as the number of USB ports or video outputs.

Speaking of video output, most USB-C docks have either one or two such ports. Today, however, Plugable launches a docking station with four HDMI ports, and yes, they can all be used simultaneously for a quad-monitor configuration. But despite having so many video outputs, it doesn't skimp on other useful ports, including an SD card reader!

Continue reading

Get 'Windows 10 All-in-One For Dummies, 4th Edition' ($39.99 value) FREE for a limited time

Computer users have been "doing Windows" since the 1980s. That long run doesn’t mean everyone knows the best-kept secrets of the globally ubiquitous operating system. Windows 10 All-in-One For Dummies, 4th Edition offers a deep guide for navigating the basics of Windows 10 and diving into more advanced features.  

Authors and recognized Windows experts Ciprian Rusen and Woody Leonhard deliver a comprehensive and practical resource that provides the knowledge you need to operate Windows 10, along with a few shortcuts to make using a computer feel less like work. 

Continue reading

Microsoft Entra is a new identity and access-focused family of products

Microsoft Entra

Microsoft has launched a new family of products called Entra. Microsoft Entra encompasses a number of identity and access management solutions including the existing Azure AD. The launch comes after the acquisition of CloudKnox Security last year, and is Microsoft's attempt to help boost security across multicloud environments -- or "secure access for a connected world".

Bolstering the product family, the company has also launched cloud permission management tool Microsoft Entra Permissions Management​, and Microsoft Entra Verified ID​ -- a system that allows for more secure interactions, based on decentralized identity standards. Microsoft has also announced public previews of Workload Identities​ and Lifecycle Workflows.

Continue reading

How artificial intelligence and machine learning are changing the development landscape [Q&A]

Artificial intelligence

It's an increasingly rare application these days that doesn’t claim to incorporate some form of artificial intelligence or machine learning capability.

But while this may be great from a marketing standpoint it does pose a challenge for developers. We spoke to Luis Ceze, CEO and co-founder of OctoML, to find out more.

Continue reading

It may not be long before you can edit WhatsApp messages

WhatsApp

The ability to edit sent messages is something that is common -- although far from universal -- in chat and social apps. The likes of Slack and Skype make it easy to make changes, such as correcting typos in messages, and it is an option that is said to be coming to Twitter at some point in the future.

But while the option to edit tweets may be some way off, users of WhatsApp may have this option sooner rather than later. The developers of WhatsApp are currently working on bringing a message-editing option to the mobile versions of the apps, as well as the desktop and web editions.

Continue reading

Why has Microsoft still not fixed a weeks-old, actively exploited vulnerability affecting Windows 11 and more?

Microsoft building logo

Yesterday we wrote about a zero-day vulnerability called Follina which allows for remote code execution on a victim's computer. While the flow -- tracked as CVE-2022-30190 -- has been described as an Office vulnerability, it is really the result of a security issue with a component of Windows.

A problem exists in the Microsoft Windows Support Diagnostic Tool (MSDT) which is found in all supported versions of Windows, including Windows 11. The vulnerability has been billed as an Office vulnerability as using a malicious Word file is one of the easiest attack vectors to exploit the flaw. But what is worrying about the vulnerability, apart from the fact that Microsoft has not fixed it yet, is that the company was made aware of the fact that it was being actively exploited way back on April 12.

Continue reading

Logitech shows off newest Design Collection of wireless mice

Every year, often in June, Logitech launches its latest Design Collection of wireless mice. These are small portable mice that are intended for laptops, but they can be used with any computer that has a USB-A port. Yes, these use a USB dongle rather than Bluetooth. They also don't have any thumb buttons and they do not have rechargeable batteries.

If you think these mice sound pretty basic, you'd be correct. So what makes them exciting? Ah, good question. This mouse collection is notable for featuring funky designs. Basically, Logitech's Design Collection is intended to be fun and whimsical with unique patterns and wacky colors. This year, the Design Collection seems largely focused on plants and flowers (you can see them above).

Continue reading

Say goodbye to Microsoft Windows 11 and wave hello to Ubuntu-based Linux Lite 6.0

Is Windows 11 a good desktop operating system. Absolutely. Is it the best desktop operating system? Well, that is harder to answer. Ultimately, if you are 100 percent dependent on Windows software, then yes, Windows 11 is the best operating system... for you. If you can get by without using software designed for Microsoft's OS, however, a Linux-based operating system might be the better option -- especially if you have an older computer.

You see, Windows 11 is very polarizing. The operating system features radical changes to the user interface (such as a centered task bar) which some users do like, but many others do not. Not to mention, the system requirements will leave many still-capable computers unable to upgrade without using unofficial hacks. Even worse, computers deemed incompatible could eventually stop getting updates! Linux doesn't have these problems.

Continue reading

Kingston releases hardware-encrypted IronKey Vault Privacy 50 USB flash drive

We recently told you about the Kingston VP80ES IronKey Vault Privacy 80 -- a speedy portable SSD that features USB-C connectivity and a touchscreen for tapping-in a password or pin. While that drive is quite amazing, not everyone will truly need the fast speeds or touchscreen -- it could be overkill. Instead, a hardware-encrypted USB flash drive could be sufficient -- and much less expensive.

Today, Kingston launches its latest hardware-encrypted flash drive. Called "IronKey Vault Privacy 50 (VP50)," the drive uses a USB-A connector and is offered in capacities ranging from 8GB to 256GB. The VP50 features XTS-AES 256-bit encryption and is FIPS 197 certified.

Continue reading

IOGEAR GUV302G Upstream 4K USB-C HDMI capture card has HDCP switch

Anyone can become a YouTuber or Twitch streamer, but not everyone can become rich and famous from doing it. Many young folks have big dreams about becoming the next big video-game-streaming star, but sadly, that is not at all likely. And so, if you are passionate about streaming yourself playing video games, it would be wise to simply do it for fun -- forget about money. Look, if you get fame and fortune from the hobby, just consider it an added bonus.

While streaming yourself playing PC games is incredibly easy, what if you would rather do it with a console (such PlayStation 5, Xbox Series X, or Nintendo Switch) while also sharing your PC webcam? Ah, that is a bit more tough. For this, you will need an HDMI capture card. While PCIe variants do exist for desktops, there is a much simpler route -- USB. Yes, an external capture card is easier to install and works with both desktops and laptops.

Continue reading

82 percent of CIOs believe their software supply chains are vulnerable

supply chain

A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.

The research from machine identity specialist Venafi suggests the shift to cloud native development, along with the increased speed brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex.

Continue reading

Leak suggests Microsoft's new Surface Laptop Go 2 holds few surprises

Surface Laptop Go 2

In the coming weeks, Microsoft is expected to share details of a new Surface Laptop Go. However, it seems we may already know much of what to expect, after a listing for the yet-to-be-announced Surface Laptop Go 2 popped up on a Korean website.

While news of the upcoming device will interest those in the market for an updated model, the listing shows that there may not be a great deal to get excited about besides an upgraded processor.

Continue reading

New study reveals serious disconnect in executive planning for cyberattacks

A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.

The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.

Continue reading

Microsoft reveals workaround for Office zero-day vulnerability that can be used to launch malicious PowerShell commands

Colorful Microsoft logo

While Microsoft may be quick to point out security vulnerabilities in other companies' products, its own software is far from infallible. A good example of this is the recently discovered 'Follina' security hole that affects Microsoft Office.

The vulnerability can be exploited to launch PowerShell and execute a variety of malicious commands; all that a victim needs to do is open a specially crafted Word file. Tracked as CVE-2022-30190, Microsoft has released details of a workaround that helps to mitigate the issue.

Continue reading

Three steps to turn data into an indispensable strategic tool

financial data exchange

While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.

However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.