Latest Technology News

The second generation Apple AirPods Pro are named 'AirPods Pro'

Earlier today, Apple announced some cool new products, such as the iPhone 14 and Apple Watch 8. As expected, the company also unveiled the second generation AirPods Pro, and you'll never guess what they are called! Apple's marketing team worked really hard on a name for the product and came up with... AirPods Pro. Yup, to make things more confusing for shoppers, the new variant has the exact same name as its predecessor.

Sadly, this new 2022 version of AirPods Pro are lacking a huge feature many have been hoping for -- USB-C charging. Sigh. Once again, Apple has included a Lightning port, although an Apple Watch charger can now charge the wireless earbuds too. The earbuds do get some cool new features, however, such as an integrated location speaker on the charging case (which also gets a lanyard loop), touch controls, improved low-distortion audio driver, custom amp, longer battery life, and more.

Continue reading

Apple Watch 8 can tell if you've been in a bad car crash

Today at its 'Far Out' event, Apple took the wraps off the Apple Watch Ultra, a rugged version of its smartwatch. While this looks great, and comes packed with features that will appeal to anyone who spends a lot of time exercising or exploring outdoors, most people will be more interested in the updated standard model.

Series 8 of the smartwatch comes with a lot of new features, including Crash Detection which can tell if you’ve been in a bad car crash and will automatically contact emergency services if it detects you're unresponsive.

Continue reading

Apple's new iPhone 14 will make you want the iPhone 14 Pro

While the iPhone 14 Pro (and Pro Max) were the undoubted stars of Apple’s 'Far Out' event hosted today, the company also unveiled the more affordable iPhone 14.

While this device doesn’t offer the advanced camera capabilities or always-on display of its more powerful (and more expensive) sibling, it does offer a new dual-camera system, Crash Detection, Emergency SOS via satellite, and improved battery life.

Continue reading

Apple iPhone 14 Pro and Pro Max swap the notch for a 'Dynamic Island'

We knew that it was going to be the iPhone 14 Pro that delivered the lion’s share of new features when it was announced today at Apple’s 'Far Out' event, and the Cupertino-based company certainly didn’t disappoint.

The iPhone 13 Pro didn’t make any massive advances on the iPhone 12 Pro, so Apple needed to up the ante this year, which it did with a raft of new features including Dynamic Island, a cool new way of displaying notifications and activities, an Always-On display, a 48MP camera, and much more.

Continue reading

Apple Watch Ultra is a rugged smartwatch with significantly better battery life

Alongside an update to the Apple Watch, which introduced crash detection, which can tell when you've been in a bad car crash, and advanced cycle tracking, Apple today announced a brand new model of its popular smartwatch -- Apple Watch Ultra.

This model is designed for "endurance, exploration, and adventure" and comes with a 49mm titanium case and flat sapphire front crystal over the brightest Apple Watch display yet -- up to 2000 nits, which is 2x brighter than the standard Apple Watch display.

Continue reading

7 reasons to start using deception technology

Deception man woman

Hacker attacks are often based on social engineering. Attackers send phishing emails, create fake websites and apps. Their goal is to force the victim to click a malicious link, open a virus file, or provide sensitive data. Simply put, cybercriminals try to deceive their victims. Deception technology adopts the same principle. It is intended to deceive the hackers. And it does it very successfully. Gartner analysts placed the deception approach on their radar of the most promising security technologies. Deception technology is easy to deploy, and it is effective in detecting and avoiding various threats aimed at organizations of all sizes. If you doubt whether your company needs to employ deception technology, here are seven reasons to try this defense practice.

0-day vulnerability protection

Continue reading

Process orchestration: The unsung automation hero

process automation

When you think about process automation, you might naturally think of a company like Amazon. From ordering, to warehouse automation, to delivery, to returns -- end-to-end business processes flow seamlessly, like magic. When you’re building from scratch as a startup, this level of process automation is easier to achieve than if you’re contending with legacy systems.

But today, 70 percent of global companies list legacy modernization as a top strategic business priority. That means automating all of their processes from scratch isn’t always an option. Ripping and replacing legacy systems is disruptive and costly. That’s where process orchestration comes in.

Continue reading

Agile Pentesting offers developers more control and flexibility

Software testing

Pentest as a Service (PtaaS) company Cobalt is today launching Agile Pentesting, a new offering that provides more control and flexibility to better meet the needs of businesses through versatile, ad hoc testing.

Agile Pentesting allows organizations to identify and address vulnerabilities at a faster, more frequent rate to minimize risk. This contrasts with what Cobalt calls 'comprehensive pentesting', which is often done in support of business drivers like compliance or M&A activity, the new offering helps accelerate customers' DevOps journeys while aligning with their CI/CD pipelines.

Continue reading

Talent shortages are shaping tech investment

talent

Almost three quarters (73 percent) of senior IT leaders agree that acquiring IT talent has never been harder and 98 percent say attracting IT talent influences their organization's technology investment choices.

The research from MuleSoft also shows that 86 percent of senior IT leaders now say the experience an organization provides its employees and customers is as important as its products and services.

Continue reading

Watch Apple reveal the new iPhone 14 at today's 'Far Out' event, here live

It’s that time of year again, when Apple is set to unveil the next generation of iPhones, as well as other hardware, like the Apple Watch Series 8.

It is expected that Apple's Pro and Max models will see a processor boost, improved cameras (with the main camera jumping up to a 48-megapixel sensor), and lose the notch at the top. The new phones may also gain an always-on feature.

Continue reading

Understanding threat detection methods [Q&A]

Threat

Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.

In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.

Continue reading

Microsoft releases PowerToys v0.62.0 with THREE amazing new utilities to play with

PowerToys

Recent updates to PowerToys have focused on fixing bugs and improving stability, but now it is finally time for some new features. With the release of PowerToys v0.62.0, Microsoft has added not one, not two, but three new utilities.

If you have been following PowerToys news, you will probably be aware of the Text Extractor tool which can be used to grab text from images, and has been in development for a little while. Likewise, the self-explanatory Screen Ruler utility is one you may have heard of. Completely new, however, is Quick Accent which makes it quick and easy to type accented characters.

Continue reading

Making sure 5G networks are a friend, not a foe, to organizations

5G circuit board

Over the last five years, 5G has been one of the biggest buzzwords in the technology industry, with the largest telecommunication providers and the latest devices offering the service. Whilst it does offer lightning-fast internet speeds, real-time connectivity, and many more benefits, there is a catch.

5G creates businesses both opportunities and dangers, with cyber criminals using the technology to aid their attacks and breach networks. Therefore, organizations must understand the cyber threats that are present within their 5G networks and how they can be stopped.

Continue reading

Why accessibility is good business but rarely a priority

According to the World Health Organization, one billion people -- approximately 15 percent of the world’s population -- live with some form of disability. There are more than 350 million people suffering from color blindness alone, and discretionary disposable income of people with disabilities is estimated to be half a trillion dollars in the U.S. The potential revenue that businesses can gain from better serving people with disabilities is immense.

But despite those staggering numbers, accessibility is often ignored in the design and development of digital products. When not completely ignored, it is commonly planned and budgeted for to be done at a later time, often due to a product management paradox.

Continue reading

Security awareness training goes mainstream but still needs more work

training key

Some form of cybersecurity awareness training has been implemented in 97 percent of enterprises this year, according to a new survey of 1,900 security professionals from ThriveDX.

However, only 42 percent report involving their employees in security detection with the use of such measures as a Phishing Incident Button, while 65 percent agree that their training program needs expansion.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.