Latest Technology News

Meta is deleting a billion 'faceprints' and closing down Facebook's facial recognition system

Facial recognition

Facebook's parent company, Meta, has announced a major shift for the social networking, saying it will no longer use facial recognition to identify users in photographs.

As well as closing down the facial recognition system, the company will also delete over a billion people’s individual facial recognition templates. Meta says that it is part of "company-wide move to limit the use of facial recognition in our products", and it is move that will be welcomed by privacy advocates.

Continue reading

NETGEAR NBK752 Orbi 5G WiFi 6 Mesh System should terrify ISP monopolies

When it comes to broadband internet, many parts of the USA are forced to use just one ISP as that is the only option. Sadly, whoever controls the wires that run into the homes has all the power. Even worse, in some rural areas, there are no wires going to homes, making broadband an impossibility. A local ISP may even ask you to shell out many thousands of dollars to cover the cost of running the cables from the street to your home.

Thankfully, 5G wireless can change all of this. Monopolistic companies that run wired ISPs have a current stranglehold, but that is coming to an end. Soon, 5G connectivity will be so ubiquitous, that it can serve not just as your smartphone's mobile internet, but your home's main internet too! Today, NETGEAR unveils a new networking solution to transform a 5G (or 4G LTE) wireless signal into whole-home Wi-Fi. The Orbi 5G WiFi 6 Mesh System (model number NBK752) even utilizes tri-band Wi-Fi!

Continue reading

New project aims to make open data more accessible

Project OpenBytes, announced today by The Linux Foundation, is dedicated to making open data more available and accessible through the creation of new standards and formats.

It will enable a community of developers and data scientists, led by Graviti, to create data standards and formats that enable contributions by anyone.

Continue reading

Fedora 35 Linux-based operating system available for download with GNOME 41

Today is the day many of us have been waiting for -- Fedora 35 is officially here! Yes, folks, you can download the operating system immediately. For many Linux users, Fedora is considered the best distribution based on the open source kernel. Why? Because Fedora focuses on truly free and open source software -- a pure Linux experience. It is also fairly bleeding edge, while at the same time, remaining stable enough for daily use.

What makes Fedora 35 exciting? This version operating system uses the brand-new GNOME 41 as its default desktop environment. GNOME 41 is notable for having significant performance improvements when using Wayland. Speaking of Wayland, Fedora 35 Beta will run faster when using it with an NVIDIA GPU. Plus, version 35 Beta gets NVIDIA with XWayland, for an improved experience when using apps that aren't designed for Wayland.

Continue reading

APIs give enterprises a security headache

api

Over the last year at least 44 percent of respondents to a new survey faced substantial issues concerning privacy, data leakage, and object property exposure with internal or external-facing APIs.

The study for Cloudentity, based on research carried out by PulseQA, shows that as a result of these issues, 97 percent of enterprises have experienced delays in releases of new applications and service enhancements due to identity and authorization issues with APIs and services.

Continue reading

Ancestry.com is offering a Black Friday special on its DNA tests

Are you still searching for that fourth cousin, twice removed? The biggest problem with family trees is that they often amass as many brick walls as new branches. We all have them -- an ancestor who showed up in 1682 on a ship that originated from England or in 1871 from Norway. The problem is that, despite all of the checking that you do in those places, they simply seem to have appeared on that boat out of vapor. 

While our grandparents may have handed us down great information about the family, remember that the data is only as good as the era from which it comes. 

Continue reading

Windows 11 has a weird problem with empty folders

Pile of empty folders

An odd problem has been found in Windows 11 that sees dozens, scores, hundreds or even thousands of empty folders being created in a directory of the System32 folder.

The fact that the folders are empty means that there is no danger of hard disks filling up, but it's a bizarre bug that has many Windows users scratching their heads. If you're affected by the issue, you'll find that your drive is littered with large numbers of folders with names ending in .tmp.

Continue reading

Poor identity management makes it easier for cybercriminals to launch attacks

identity theft mask

New research from identity security specialist One Identity shows that 95 percent of companies report challenges managing identities.

In addition 84 percent say that the number of identities they're managing has more than doubled, which means they have too many identities and credentials to keep track of, leaving holes within their network, evidenced by only 12 percent of security professionals being fully confident they can prevent a credential-based attack.

Continue reading

macOS Monterey update is bricking some Macs

macOS Monterey MacBook Pro

Microsoft may have stolen a lot of the attention with the launch of Windows 11, but Apple has also released the latest update to its own operating system -- macOS 12.

The rollout of macOS Monterey started last week, and as the update spreads, users are experiencing serious issues when performing the upgrade. More and more reports are emerging of Mac owners ending up with computers that are very unstable, or won't even power up.

Continue reading

Energy industry hit by surge in mobile phishing threats

Energy organizations provide infrastructure that's essential for the safety and well being of society, but recent events like the Colonial Pipeline breach demonstrate that the industry is particularly vulnerable to cyberattacks.

A new report on energy industry threats finds that 20 percent of energy employees have been exposed to a mobile phishing attack in the first half of 2021, a 161 percent increase from the second half of 2020.

Continue reading

Microsoft is bringing Clippy out of retirement to make an appearance in Teams

Clippy

Computer users from a certain era may remember with fondness, Clippy. The animated paperclip was an assistant in Microsoft Office, on hand to answer questions, and popping to life every now and then with hints and tips.

While some celebrated its death when the character was dropped, there were also many that mourned its passing. For anyone who falls into the second category, there is good news: Clippy is back!

Continue reading

Kingston launches FURY Renegade PCIe 4.0 NVMe SSD for PC gamers and enthusiasts

Do you need a PCIe 4.0 NVMe solid state drive? No, nobody really needs the insane speed these drives offer. However, the drool-worthy performance is certainly nice to have. Look, if you can afford such an SSD and your computer supports it at full speed, you might as well get one. I mean, why not?

Today, Kingston announces its latest such PCIe 4.0 SSD under its FURY gaming brand. Called "Renegade," it features blazing fast speeds and capacities up to 4TB. Of course, even non-gamers will want to check out the extremely high-end performance FURY Renegade offers.

Continue reading

Linux Mint Debian Edition (LMDE) 4 ditches Mozilla Firefox ESR web browser

Linux Mint is based on Ubuntu -- that is pretty common knowledge. But did you know there is a different version of the operating system that is instead based on Debian? It's true! Called "Linux Mint Debian Edition," or "LMDE" for short, it is far less popular than the "regular" Mint. Then why does it exist? Believe it or not, it exists (partly) to serve as a contingency plan in case Ubuntu ever stops being developed.

Today is November 1, and the Linux Mint developers have shared some monthly development news that is largely boring. One small tidbit of information is interesting, however; Linux Mint Debian Edition 4 (code-named "Debbie") will ditch the Mozilla Firefox ESR web browser. LMDE 4 will instead move users to the normal "rapid release" variant.

Continue reading

What businesses can do to disrupt IT silos

Now that so much of our workplace communication and collaboration has gone digital, businesses are taking steps to ensure that their teams are operating as efficiently as possible and that they’re able to serve customers’ needs. While many of the tech tools that companies have adopted or scaled up in the past couple of years have become essential lifelines to power productivity, there are potential risks that can arise if tools aren’t managed properly or if the business doesn’t have the right resources in place.

One specific challenge that poses a threat to productivity, customer experience and an organization’s bottom line is IT silos -- roadblocks that crop up when different teams use separate tools or apps that don’t integrate with others. IT silos can crop up when different groups adopt systems, apps or tools that are duplicative or unable to integrate with other digital resources. The silos are problematic for teams that need to share information and can negatively impact the team’s efficiency and effectiveness. Employees can become frustrated and burned out by the additional challenge of trying to communicate and work together with others. In addition, IT silos prevent teams from accessing the most accurate data. IT silos can take several forms, but there are action steps companies can take to address them.

Continue reading

Protecting the global supply chain: A shared responsibility

supply chain

Supply chain attacks have dominated news headlines in 2021. From SolarWinds to JBS Foods, cybercriminals are actively targeting national and international supply chains, causing widespread disruption and financial impact. Attackers understand that organizations have less control over and visibility into the security controls of a supply chain -- controls that are typically limited to legal contracts rather than true and comprehensive security policies and procedures. Common cyber supply chain risks and threats include third-party access to IT systems and weak cybersecurity practices of smaller suppliers.

Now more than ever before, protecting every part of the supply chain must be a top priority for both public and private sector organizations globally. To do this effectively, it is important to remember that securing any supply chain cannot be successfully achieved through the work of only an IT department or team. While they do play a significant role, cyber supply chain risks touch upon many different areas. Therefore, a more comprehensive, shared responsibility approach is required.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.