Latest Technology News

Cybercriminals get better at bypassing defenses

Cybercriminals have become more adept at bypassing defenses with new DDoS attack vectors and successful methodologies, according to the latest DDoS Threat Intelligence Report from NETSCOUT.

The report is based on intelligence on attacks occurring in over 190 countries, 550 industries, and 50,000 autonomous system numbers (ASNs). It finds there were over six million DDoS attacks in first half of 2022, with TCP-based flood attacks (SYN, ACK, RST) still the most used attack vector, accounting for around 46 percent.

Continue reading

Businesses facing a data protection emergency as backup strategies fail to keep up

Nearly eight out of ten (79 percent) of UK and Irish IT decision makers and professionals say there are gaps between their data dependency, backup frequency, SLAs and ability to get back to productive business.

The results of the Data protection Trends Report from Veeam Software also show that 76 percent of respondents admit falling prey to at least one ransomware attack in the past year, with 65 percent now using cloud services as part of their data protection strategy to increase resiliency.

Continue reading

Audacity 3.2 is a major update to the free audio tool that adds realtime effects for non-destructive editing and more

Audacity

Audio editing tools -- much like photo editors -- can be both incredibly expensive, and tremendously complex. Audacity has long served as an alternative to such apps, and with the release of Audacity 3.2 it just became even more powerful.

The developers are not hiding their light under a bushel, describing this update as a "gigantic release". This latest build sees the addition of support for realtime effects that allow for non-destructive editing of audio files. But there is more, including improved VST3 support and the option to upload and share content to audio.com.

Continue reading

Microsoft gives Windows 11 a new security feature to prevent you storing your passwords insecurely

Password keyhole

While software-based password managers are incredibly popular these days, it is still terrifyingly common to find that people store passwords on sticky notes attached to their monitor. A slightly more up to date means of recording passwords is to type them into a text document, and this is something Microsoft is seeking to discourage with the latest update to Windows 11.

With Window 11 2022 Update, the company added a new enhanced phishing protection feature of Microsoft Defender Smartscreen. This security feature can, among other things, issue a warning if it detects that you are entering one of your passwords into a document or, for that matter, a potentially insecure website. The feature is not enabled by default, so here's how to bolster your security.

Continue reading

Is reinforcement (machine) learning overhyped?

machine learning AI

Imagine you are about to sit down to play a game with a friend. But this isn’t just any friend -- it’s a computer program that doesn’t know the rules of the game. It does, however, understand that it has a goal, and that goal is to win.

Because this friend doesn’t know the rules, it starts by making random moves. Some of them make absolutely no sense, and winning for you is easy. But let’s just say you enjoy playing with this friend so much that you decide to devote the rest of your life (and future lives if you believe in that idea) to exclusively playing this game.

Continue reading

Diving into the essence of deception technology

You have probably heard about honeypots -- bait targets used to attract and detect hackers. In recent years, this technology has been upgraded and is now collectively called Deception.

Today, deception technology is represented by quite a few vendors. The most famous are Illusive Networks, TrapX, Fidelity Security Deception, and Cymmetria. In this article, I plan to talk about deception technology from the developer's point of view and tell you what makes it interesting. But first, let us talk about the forerunner of this technology -- honeypots.

Continue reading

Microsoft Windows 11 setup race: 21H2 vs 22H2 -- which operating system installs fastest?

Microsoft has just started to roll out the Windows 11 2022 Update, which fixes a number of annoyances and adds some welcome new features to the fledgling operating system.

The update itself doesn’t take that long to install, but what about if you were installing Windows 11 entirely from scratch? Which version would be faster -- 21H2 or 22H2 (the development name for the 2022 Update)? There can only be one winner…

Continue reading

PayPal faces UK backlash over account closures

As we reported last week, PayPal has cancelled the accounts of a number of campaigning organizations in the UK, citing its Acceptable Use Policy but without providing a specific reason.

On Friday The Times reported that the fintech giant was poised to back down in the case of parents' group UsForThem, which campaigned for schools to be kept open during the pandemic.

Continue reading

Why enterprises need to treat data as a first class citizen [Q&A]

Data has become increasingly important for modern businesses and they increasingly expect it to help them improve their delivery to customers and ultimately their bottom line.

We spoke to Dom Couldwell, head of field engineering, EMEA at DataStax to discuss how companies can use data and how they need to adapt their approach to do so effectively.

Continue reading

NVDIA releases fix for poor gaming performance in Windows 11 2022 Update

Nvidia headquarters

There have not been too many reports of issues following the release of Windows 11 2022 Update, but this does not mean that Microsoft's first major update to Windows 11 is free from problems. Gamers, for instance, have reported poor game performance with NVIDIA GPUs after installing the update.

NVIDIA was quick to start investigating the problems, and has already come up with a solution. The fix involves the installation of a beta app.

Continue reading

The UK government has tightened its cybersecurity rules, your business should too

secure payments lock

In late August, the UK government introduced new cybersecurity rules aimed at protecting telecommunication networks against cyber attacks. The rules, which allow the government to boost the security standards of the UK’s mobile and broadband networks, come at a time when attacks on critical infrastructure are becoming more frequent and more dangerous.

Earlier this year, for example, Costa Rica was thrown into crisis after a ransomware attack affected 30 government institutions, including critical ministries and its social security fund. The group behind the attack, known as Conti, threatened to overthrow the government unless the US$10 million ransom was paid. With the help of international partners -- including the United States, Israel, Spain, and Microsoft -- it was able to get all its systems back online, but it took weeks. Montenegro, meanwhile, also saw critical digital infrastructure crippled following a cyber attack blamed on state-sponsored actors. The attack effectively sent some government departments back to the analogue era and was still being wrestled with more than three weeks after it was first detected.    

Continue reading

Collaboration technologies are essential to optimizing offices and remote employees for hybrid work

The methods and tools used to conduct office work are rapidly expanding to accommodate a wider range of worker situations and needs, including hybrid schedules and fully remote employees that each require different support structures to optimize workflows and communications. While the tasks and responsibilities of most workers haven’t changed, many people are adjusting to different physical spaces and expectations in terms of attending virtual meetings or collaborating with colleagues who traditionally shared a common workplace.

In order to help companies ensure consistent productivity regardless of worker location or situation, there are a number of new collaboration solutions that can help suit any budget, space or need.

Continue reading

Whoopsie daisy! Microsoft accidentally released the Windows 11 KB5017383 update to WSUS

Microsoft building logo

When we write about updates for Windows, it tends to be for one of two reasons -- sharing news that a new update is available, or giving details of problems that have been found with the latest release. Now we have something a little different.

Microsoft has admitted that it made a mistake with the KB5017383 update for Windows 11, windows 10 and Windows Server a few days ago. It is, however, not necessary something that everyone would notice.

Continue reading

2022's most pressing cloud challenges

Despite the disruption and changes the pandemic unleashed on our world, technology continues to iterate through inevitable cycles of adaptation, innovation, and change. The worldwide shift to remote work, for example, placed a huge burden on IT infrastructure, ultimately quickening the pace of digital transformation. With this comes several challenges that IT leaders must navigate and balance.

According to the Foundry’s (formerly IDG Communications) 2022 Cloud Computing Survey, controlling cloud costs, data privacy and security, and securing expertise across in-house and supplier teams, are the three core challenges that will determine the success of cloud investments in the months and years to come. 

Continue reading

Understanding how all businesses can benefit from voice analytics

voice recognition

Voice and speech analytics refers to the process of analyzing recorded conversations such as phone calls to gain insights into customer behavior and call quality, often utilizing AI by employing a Natural Language Processing (NLP) engine that uses context and emotional clues to determine more accurately what is being said.

In utilizing voice analytics solutions, businesses are now able to spot keywords and phrases, as well as detect sentiment and emotional context using pitch, pacing, and language clues to observe whether a conversation is going in the right direction or if it’s going downhill. By evaluating the tone of a customer’s voice, businesses can assess whether their customers are satisfied, annoyed, or upset. 82 percent of customers now consider no longer engaging with a business if they feel they have had a poor customer experience, so understanding potential issues before they arise may be the single most valuable thing a business can do to retain customers.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.