Latest Technology News

Most consumers ready to switch banks over fraud protection measures

A new study reveals growing anxiety among consumers that weaknesses in their banks' fraud-protection measures could leave them exposed to scammers, this would result in the vast majority (75 percent) switching providers.

For the report from Jumio sampled the views of more than 8,000 adult consumers, split evenly across the UK, US, Singapore, and Mexico, with research carried out by Censuswide.

Continue reading

Shadow SaaS -- a persistent problem and how to confront it [Q&A]

Shadow IT

There's an abundance of apps and SaaS solutions readily available these days to make the lives of employees easier and perform many work-related tasks. And the list keeps growing, with the likes of ChatGPT and Gemini paving the way for more AI-driven virtual assistants.

This is all well and good, unless your organization doesn't sanction the use of the software in question, turning something seemingly innocuous into shadow SaaS -- and a security risk. We spoke to John Stringer, head of product at data loss prevention specialist Next DLP, to learn more.

Continue reading

From application to zero trust: Identity security fundamentals to stay ahead of the threat landscape

Cybercriminals are not new, and often neither are their tactics. Despite this, phishing attacks, which incorporate social engineering in emails and messages to persuade people to perform an action that puts organizations at risk, continue to be highly successful. New technologies, such as GenAI, are improving these tactics further and companies must implement a strategic approach built on a solid foundation of identity security to minimize risks.

The most glaring vulnerability within an organization stems from human error. Mistakes such as using weak passwords, reusing credentials across multiple platforms, or falling victim to phishing attacks, can provide malicious actors with an easy gateway into secure systems. Social engineering exploits the natural human inclination to trust, deceive employees into divulging sensitive information or unwittingly granting access. Despite widespread awareness campaigns, these tactics continue to succeed, highlighting the gap between knowledge and practice, which presents a major risk to organizations.

Continue reading

Get 'The Self-Taught Computer Scientist' (worth $19.99) for FREE

Fresh out of college and with just a year of self-study behind him, Cory Althoff was offered a dream first job as a software engineer for a well-known tech company, but he quickly found himself overwhelmed by the amount of things he needed to know, but hadn’t learned yet. This experience combined with his personal journey learning to program inspired his widely praised guide, The Self-Taught Programmer.

Now Cory's back with another guide for the self-taught community of learners focusing on the foundations of computer science.

Continue reading

Apple relaunches Beats Pill with new design and enhanced audio for $149.99

Apple has reintroduced the iconic Beats Pill, a portable Bluetooth speaker that merges classic design with modern upgrades, available for $149.99 here. Offered in Matte Black, Statement Red, and Champagne Gold, the speaker comes fully equipped with improved sound quality, enhanced durability, and increased portability.

Oliver Schusser, Vice President of Apple Music and Beats, expressed his enthusiasm about the reintroduction, stating, "The Beats Pill is back and better than ever -- now packed with outstanding sound, all-day battery life, and convenient features."

Continue reading

Businesses regularly face AI-driven fraud

AI-Fraud-hacker

A new report finds that 76 percent of fraud and risk professionals believe their business has been targeted by AI-driven fraud, with over half reporting this type of fraud happening daily or weekly.

The study, from anti-fraud platform Sift, finds the emergence and increased adoption of AI tools, including publicly available chatbots, enables cybercriminals to conduct scalable fraud attacks against both individuals and businesses.

Continue reading

Forget Microsoft Windows 11 Copilot+ PCs: This TUXEDO InfinityBook Pro 15 is the Linux laptop you really need

As the tech world buzzes about Windows 11 and its Copilot+ PCs, those in the know might want to turn their attention to something running open-source software instead. Enter the TUXEDO InfinityBook Pro 15 -- a Linux laptop that combines sleek design with powerful performance, making it the smart choice for anyone looking to step beyond mainstream closed-source offerings. With its robust features and superior portability, this is the laptop you may want.

The newly refreshed TUXEDO InfinityBook Pro 15 has been designed to combine the functionality of a large, bright 15.3-inch screen and high-performance CPU options with the portability of an ultra-thin, lightweight aluminum body. Despite being less than 20 mm thick and weighing just 1.6 kg, the device doesn't compromise on functionality, making it ideal for both business and personal use.

Continue reading

WatchGuard makes enterprise-grade threat detection available for all organizations

Smaller businesses are often more at risk of cyberattack simply because they lack the resources of their larger counterparts.

WatchGuard Technologies is looking to change that with the launch of an open XDR solution that delivers levels of visibility into east/west and north/south network traffic previously only available to large enterprises with the resources to manage their own security operations center.

Continue reading

DORA: A blueprint for cyber resilience in the U.S.

In today’s post-pandemic world, businesses are looking to shift back into the office while leveraging the learnings from the pandemic. Digital operations are going to be the new normal. With business innovations increasingly helping enterprises provide faster and easier-to-consume services to customers, the digital way of business is continuously creating a much larger digital footprint than ever before.

However, continuously increasing digital footprint also means possible targets of cyberattacks are also increasing equally rapidly. What is interesting to note is while investments in cybersecurity are increasing, so have the cyberattacks. According to CrowdStrike, attackers are moving faster within enterprises after an initial breach, with the average time it takes to hit patient 1 after patient 0 (the typical indicator of lateral movement) falling from 84 minutes to 62 minutes in the last year. Unfortunately, while many enterprises are continuing to invest in cyber security, far few invest in cyber defense, yet everyone wants the assurance of cyber resilience.

Continue reading

Office workers not worried about losing out to AI

Although many people fear that artificial intelligence could put their jobs at risk, a new study from Jitterbit shows that many see AI as offering new skills and personal growth opportunities.

Based on a survey by Censuswide of 1,022 full-time office workers in the UK and US, the study looks at how workers really feel about AI and the findings reveal a positive views of working with AI technology in professional settings.

Continue reading

Land of hope, glory and e-waste: Brits are set to become the biggest contributors to electronic waste this year, but why?  

As technology evolves and becomes more accessible, providing new and exciting ways to make our lives easier, it’s easy to ignore the elephant in the room -- the huge amount of e-waste our appetite for consumption is causing. Ignorance has been bliss, but with research suggesting this year the UK could become the world’s biggest contributor to e-waste per head, transformative action is long overdue. 

While our drive to have the latest technology is natural, we need to consider what happens to old devices when we upgrade. 

Continue reading

A technical overview of Cisco IoT part 2: Hardware

Cisco logo on laptop screen

The following article continues the Cisco IoT series, shifting focus to the essential networking hardware that powers IoT solutions. Part one of the series explored the foundational elements of IoT routing and switching, emphasizing the critical role these components play in ensuring seamless connectivity and robust data flow. Building on that discussion, this piece will outline the significant opportunities in IoT networking and security that Cisco supports through its innovative hardware offerings.

IoT is a rapidly expanding area of networking with increasing use cases. It impacts various sectors, including healthcare and retail, by providing valuable security or cost-saving benefits through new forms of sensors. These sensors enable new capabilities such as better inventory management and improved products.

Continue reading

Beyerdynamic launches VERIO 200 open-ear true wireless earphones

Beyerdynamic has officially launched its first open-ear true wireless earphones, the VERIO 200. Designed for active lifestyles, these earphones combine high-quality sound with an open-ear design, allowing users to remain aware of their surroundings. They are constructed with premium materials, including a metal hinge in the charging case for durability.

The VERIO 200 features a 16.22mm high-performance graphene neodymium driver, which delivers precise sound and robust bass. This design minimizes sound leakage, enhancing the listening experience while ensuring users are aware of their environment, making these earphones suitable for commuting, workouts, and outdoor activities.

Continue reading

Google unveils savvy shopping tools to help you save big this summer

Summer has officially arrived in the U.S., and it's not just the temperature that's rising -- so is the anticipation for massive summer sales. It seems everyone's gearing up to grab those hot deals that make summer shopping sizzle. In fact, recent data shows that 44 percent of shoppers are more likely to make purchases during deal days, reflecting a major shift in seasonal spending patterns.

Recognizing this trend, Google has launched new and enhanced shopping tools designed to help you score the best deals without breaking a sweat. With the introduction of an updated deals destination, you no longer have to juggle a hundred browser tabs. Google's Shopping Graph, boasting over 45 billion product listings, offers a streamlined shopping experience, ensuring you find the lowest prices in one convenient spot.

Continue reading

Kingston launches FURY DDR5 RGB Limited Edition memory

Kingston has launched its latest product, the FURY Renegade DDR5 RGB Limited Edition. This memory kit is specifically designed for high-performance computing applications, making it ideal for gamers, video editors, and content creators.

The kit features a striking design with a red and black heat spreader that is inspired by automotive styling. It offers enhanced performance with a speed of 8000MT/s, designed to reduce bottlenecks during intensive computing tasks. The memory also includes 12 LEDs that provide a wide range of customizable lighting effects, managed through the Kingston FURY CTRL software.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.