Latest Technology News

Logitech shows off newest Design Collection of wireless mice

Every year, often in June, Logitech launches its latest Design Collection of wireless mice. These are small portable mice that are intended for laptops, but they can be used with any computer that has a USB-A port. Yes, these use a USB dongle rather than Bluetooth. They also don't have any thumb buttons and they do not have rechargeable batteries.

If you think these mice sound pretty basic, you'd be correct. So what makes them exciting? Ah, good question. This mouse collection is notable for featuring funky designs. Basically, Logitech's Design Collection is intended to be fun and whimsical with unique patterns and wacky colors. This year, the Design Collection seems largely focused on plants and flowers (you can see them above).

Continue reading

Say goodbye to Microsoft Windows 11 and wave hello to Ubuntu-based Linux Lite 6.0

Is Windows 11 a good desktop operating system. Absolutely. Is it the best desktop operating system? Well, that is harder to answer. Ultimately, if you are 100 percent dependent on Windows software, then yes, Windows 11 is the best operating system... for you. If you can get by without using software designed for Microsoft's OS, however, a Linux-based operating system might be the better option -- especially if you have an older computer.

You see, Windows 11 is very polarizing. The operating system features radical changes to the user interface (such as a centered task bar) which some users do like, but many others do not. Not to mention, the system requirements will leave many still-capable computers unable to upgrade without using unofficial hacks. Even worse, computers deemed incompatible could eventually stop getting updates! Linux doesn't have these problems.

Continue reading

Kingston releases hardware-encrypted IronKey Vault Privacy 50 USB flash drive

We recently told you about the Kingston VP80ES IronKey Vault Privacy 80 -- a speedy portable SSD that features USB-C connectivity and a touchscreen for tapping-in a password or pin. While that drive is quite amazing, not everyone will truly need the fast speeds or touchscreen -- it could be overkill. Instead, a hardware-encrypted USB flash drive could be sufficient -- and much less expensive.

Today, Kingston launches its latest hardware-encrypted flash drive. Called "IronKey Vault Privacy 50 (VP50)," the drive uses a USB-A connector and is offered in capacities ranging from 8GB to 256GB. The VP50 features XTS-AES 256-bit encryption and is FIPS 197 certified.

Continue reading

IOGEAR GUV302G Upstream 4K USB-C HDMI capture card has HDCP switch

Anyone can become a YouTuber or Twitch streamer, but not everyone can become rich and famous from doing it. Many young folks have big dreams about becoming the next big video-game-streaming star, but sadly, that is not at all likely. And so, if you are passionate about streaming yourself playing video games, it would be wise to simply do it for fun -- forget about money. Look, if you get fame and fortune from the hobby, just consider it an added bonus.

While streaming yourself playing PC games is incredibly easy, what if you would rather do it with a console (such PlayStation 5, Xbox Series X, or Nintendo Switch) while also sharing your PC webcam? Ah, that is a bit more tough. For this, you will need an HDMI capture card. While PCIe variants do exist for desktops, there is a much simpler route -- USB. Yes, an external capture card is easier to install and works with both desktops and laptops.

Continue reading

82 percent of CIOs believe their software supply chains are vulnerable

supply chain

A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.

The research from machine identity specialist Venafi suggests the shift to cloud native development, along with the increased speed brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex.

Continue reading

Leak suggests Microsoft's new Surface Laptop Go 2 holds few surprises

Surface Laptop Go 2

In the coming weeks, Microsoft is expected to share details of a new Surface Laptop Go. However, it seems we may already know much of what to expect, after a listing for the yet-to-be-announced Surface Laptop Go 2 popped up on a Korean website.

While news of the upcoming device will interest those in the market for an updated model, the listing shows that there may not be a great deal to get excited about besides an upgraded processor.

Continue reading

New study reveals serious disconnect in executive planning for cyberattacks

A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.

The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.

Continue reading

Microsoft reveals workaround for Office zero-day vulnerability that can be used to launch malicious PowerShell commands

Colorful Microsoft logo

While Microsoft may be quick to point out security vulnerabilities in other companies' products, its own software is far from infallible. A good example of this is the recently discovered 'Follina' security hole that affects Microsoft Office.

The vulnerability can be exploited to launch PowerShell and execute a variety of malicious commands; all that a victim needs to do is open a specially crafted Word file. Tracked as CVE-2022-30190, Microsoft has released details of a workaround that helps to mitigate the issue.

Continue reading

Three steps to turn data into an indispensable strategic tool

financial data exchange

While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.

However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.

Continue reading

MINISFORUM Venus Series UM560 is a tiny Windows 11 PC powered by AMD Ryzen

MINISFORUM is a computer-maker that has been releasing many models of mini PCs lately. Its machines are often looked upon favorably by consumers that prefer diminutive desktops. Not only are its computers small and well-made, but often quite powerful too. These tiny machines can be good servers, retro-gaming machines, office workstations, home theater PCs, and more.

Many MINISFORUM computers are powered by capable Intel processors, but the company has been embracing AMD chips a lot lately as well. In fact, the company now has several AMD-powered options. Today, MINISFORUM announces an upcoming AMD desktop that is very cute. Called "Venus Series UM560," it is powered by a Ryzen 5 5625U CPU. The little computer can be purchased as either a barebones or with both RAM and storage pre-installed.

Continue reading

Microsoft researchers discover serious security vulnerabilities in big-name Android apps

Microsoft building in California

The Microsoft 365 Defender Research Team has shared details of several high-severity vulnerabilities found in a mobile framework used in popular apps associated with a number of big names.

The framework is owned by mce Systems, and is used in apps from numerous mobile providers. The apps -- from the likes of AT&T, Rogers Communications and Bell Canada -- are often pre-installed on Android handsets, but they have also been downloaded millions of times. If exploited, the vulnerabilities allow for local or remote attacks, including command injection and privilege escalation attacks.

Continue reading

The role of encrypted traffic analysis for threat detection [Q&A]

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.

But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.

Continue reading

Surfshark VPN for Linux gets proper GUI

What makes Surfshark one of the best paid VPN services on the market? Well, besides being extremely affordable, it has no device limit and is very easy to use on many platforms, including Windows, macOS, Android, iOS, and iPadOS. Not to mention, the developers are constantly adding new features -- they don't rest on their laurels. I highly recommend the service.

A desktop Linux version of Surfshark has been available for a while now, but sadly, it did not have a graphical user interface (GUI) -- you had to configure and run it from the terminal. While this technically worked, it was clunky and annoying, making Surfshark on Linux inferior to versions for other operating systems.

Continue reading

Fighting the rising tide of rogue apps

Mobile apps

We're battling a swell of rogue apps, and companies and consumers alike are struggling to keep their heads above water as these applications quickly become the tool of choice for fraudsters. According to our recent fraud data, rogue apps now make up 39 percent of global fraud attacks, growing at a rate of 50 percent per quarter.

Rogue apps attempt to impersonate a brand's application with the intent of committing financial fraud. They have the ability to wreak havoc on consumers and organizations alike, with financial institutions being a particular target.

Continue reading

Best Windows apps this week

Four-hundred-ninety-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

The next feature update for Windows 11, Windows 11 version 22H2, has reached RTM status this week. Work on the update will continue in the coming months before it is released to all users.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.