Latest Technology News

Dynabook's Tecra A40-K And A50-K laptops come with AI features for the modern hybrid worker

Dynabook (formerly Toshiba PC Company) has announced two new laptops in its Tecra range -- the 14" Tecra A40-K and the 15" Tecra A50-K.

Both new laptops are powered by the latest 12th generation Intel Core P-Series 28W processors (up to i7) and come with Windows 11 Pro. They also have AI tools to increase productivity and collaboration within the workplace, including Cortana-enabled dual mics with AI noise reduction, and a face authentication camera with AI-enhanced functionality.

Continue reading

81 percent of organizations have outages caused by expired certificates

Magnified certificare

A new report shows that 81 percent of organizations have experienced at least two or more disruptive outages caused by expired certificates in the past two years, up from 77 percent last year.

The report from machine identity platform Keyfactor, based on research by the Ponemon Institute, finds the cut in SSL/TLS certificate lifespans to one year in September 2020 has made it much more difficult to keep the pace with certificate issuance and management.

Continue reading

How to best serve your SRE and DevOps teams

DevOps

Technology is critical to driving business growth and increasing revenue in our fast-growing digital economy. But the effectiveness of a technology is often determined by its performance and reliability.

DevOps and site reliability engineering (SRE) teams are behind this continuous availability. These teams ensure the top performance of an organization’s apps and vital services, especially as IT environments grow in complexity. Avoiding incidents and outages is only one aspect of the job though.

Continue reading

Most enterprise network assets are cloud-based but policies aren't keeping pace

Nearly 90 percent of device assets in the modern organization are cloud-based, meaning physical devices such as laptops, tablets, smartphones, routers, and IoT hardware represent less than 10 percent of total devices.

However, the latest State of Cyber Assets report from JupiterOne analyzed nearly 10 million security policies and finds that cloud-specific ones represent less than 30 percent of the total.

Continue reading

Pen testing tools increasingly used by threat actors

Attack route

Legitimate penetration testing tools like Cobalt Strike, Impacket and RMM, are being used by threat actors because it's more efficient to use existing tools that are proven to be successful than to create new software.

The latest Threat Detection Report from managed detection and response firm Red Canary shows Cobalt Strike in particular has never been more popular, impacting eight percent of its customers in 2021.

Continue reading

F-Secure creates new corporate security brand

Cybersecurity company F-Secure is rebranding its corporate security business under the new name WithSecure and with a snazzy new logo, above.

Previously known as F-Secure Business, WithSecure will focus on corporate security products and solutions, while consumer security products and services remain available under the existing F-Secure name.

Continue reading

Android Messages and Dialer apps sent data to Google without consent

Google building logo

In a paper published by Douglas J Leith of Trinity College Dublin, it is claimed that the Messages and Dialer apps found in Android have been sending data back to Google. The paper, entitled "What Data Do The Google Dialer and Messages Apps On Android Send to Google?" says that data is sent without user knowledge or consent.

In what could be a breach of GDPR legislation, it is claimed that there is also no way to opt out of the data sharing. Among the data said to be shared with Google are phone numbers, call duration, hashes of messages and more.

Continue reading

Screenshots leaked by Lapsus$ strongly suggest Microsoft has been hacked

Angled Microsoft logo

Microsoft is conducting an investigation after data extortion group Lapsus$ claimed to have hacked the company and stolen data.

In a leaked screenshot, the hackers brag about gaining access to an Azure DevOps repository which is home to source code for all manner of Microsoft projects including Bing and Cortana. Having already hacked the likes of Samsung, NVIDIA and Vodafone, the claims made by Lapsus$ are entirely feasible, but for now Microsoft is saying nothing about what -- if anything -- has been stolen.

Continue reading

Bridging the governance gap -- the rise of Data-Governance-as-a-Service

Recent years have seen an increasing emphasis on data governance, with growing levels of regulation accompanied by a widespread awareness that data is an asset with -- potentially -- huge latent value.

But, with experience and skillsets at a premium, many organizations are applying an inexact set of methodologies and tools in an attempt to manage and exploit their data assets while staying compliant.

Continue reading

Three-quarters of businesses plan to redesign the office as employees return

The switch to hybrid working driven by the pandemic has had a major impact on the relationship between employers and employees.

As people begin to drift back to the office, a new study by audio visual equipment specialist Poly shows that only 19 percent of enterprises are expecting staff to come back to the office full time, while 77 percent plan to redesign the office to include more open-plan areas, collaboration spaces, areas to socialize and quiet zones.

Continue reading

How PSD2 is changing open banking [Q&A]

online banking

Compliance with the EU Payments Services Directive (PSD2) is the next key milestone in the continued evolution of open banking. This evolution involves a new set of rules that will change how we confirm our identity when making purchases online.

The implementation of strong customer authentication (SCA), on top of existing open banking capabilities, will require merchants and payment service providers (PSPs) to work together with technology suppliers, card schemes and many others to deliver SCA in a way which works well for customers.

Continue reading

After tests, Microsoft has decided to add the 'System requirements not met' watermark to Windows 11

Windows 11 laptop

Looking for another reason to be annoyed by Windows 11? Microsoft delivers yet again. It is not very long since the company started A/B testing a watermark on the desktop of people who had installed Windows 11 on unsupported hardware. Now, for reasons best known to Microsoft, the decision appears to have been taken to roll out this irritating banner.

In the latest update pushed to the Release Preview Channel, the watermark is present for everyone running Windows 11 on hardware that doesn’t make the grade. The message has changed slightly, now reading "System requirements not met. Go to Settings to learn more". The good news? You can take steps to hide the watermark if it grates on your nerves

Continue reading

Linux Mint Debian Edition (LMDE) 5 'Elsie' now available for 32-bit and 64-bit PCs

Linux Mint Debian Edition (LMDE) exists in case Ubuntu ever stops being developed. You see, the "regular" Linux Mint is based on Ubuntu, so if Canonical ever closed its doors, things would be quite disastrous for Linux Mint. Will Ubuntu actually die one day? While Ubuntu's demise is unlikely to happen anytime soon, the reality is, nothing lasts forever. So I suppose it makes sense for the Linux Mint developers to have a contingency plan.

With all of that said, you don't have to wait for Ubuntu to die to use Linux Mint Debian Edition. LMDE is a perfectly fine operating system, and it can absolutely be used as your daily distribution. If you fancy giving Linux Mint Debian Edition a try, today is your lucky day. The newest version of the distro, LMDE 5, is finally available for download.

Continue reading

Standard virtual workspace security is improving but still not enough

The COVID-19 pandemic sparked a shift towards work-from-home or telecommuting arrangements, which many companies are saying they are likely to retain even after the pandemic. This new way of working or doing business has raised the demand for collaboration platforms and virtual rooms, which in turn create new cyber security challenges.

One recent flaw is referred to as a cross-site leak or XS-Leak and is linked to Slack's file-sharing feature. If exploited, malicious actors can potentially identify users outside of the workforce messaging platform. It allows cybercriminals to circumvent the web browser security feature called "same-origin policy," which stops browser tabs and frames of different domains from accessing each other’s data.

Continue reading

Get ready for the death of Internet Explorer 11

Microsoft building logo

It may seem like a relic of the past, but Internet Explorer is still doggedly hanging on. But not for much longer. Microsoft has issued a reminder that it is mere months until the desktop app for the browser is retired.

The big day is June 15, and at this point it will be time for Internet Explorer 11 users to move on and pick an alternative. While the death of Internet Explorer has been a very long time coming, the retirement of the app will represent the end of an era.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.