Latest Technology News

Moving to the edge needs a rethink of security

Edge computing

In order to provide real-time services to the user, enhance data management and support latency-critical applications, many businesses are moving computing to the edge.

But this brings with it new issues when it comes to securing systems. The latest Cybersecurity Insights Report from AT&T Cybersecurity focuses on the security considerations needed in order to implement edge computing safely.

Continue reading

How to unlock the updated Task Manager Microsoft has hidden in Windows 11

Windows 11

Task Manager may not be the most exciting component of Windows 11, but it is something that proves very useful from time to time. If you have ever looked at the tool and thought that it could do with a visual revamp, you are not alone -- Microsoft agrees.

So much so that the company has gone ahead and created an updated version of app and locked it away in Windows 11. Here's how you can activate it.

Continue reading

Microsoft could launch its new One Outlook app as early as spring

Microsoft building logo

Outlook is currently available in various versions, and Microsoft is looking to consolidate them into the aptly named One Outlook. Previously referred to as Project Monarch, the app includes not only an email component, but also a calendar.

Originally due for release last year, it is now looking as though One Outlook is going to be available for limited testing some time in the spring. Wider scale beta testing is expected to start in the summer, but the timetable remains flexible.

Continue reading

Microsoft is forcibly upgrading some Windows 10 computers

Windows 10 logo on a beach

It is, of course, no secret that Microsoft would like as many people as possible to use Windows 11. While it may not be realistic for the company to expect all computer users -- or even all Windows users, for that matter -- to install the latest version of the operating system, it can at the very least ensure that it minimizes the number of systems out there running unsupported versions of Windows.

And this is precisely what is happening with machines that currently have Windows 10 2004 installed. Microsoft is automatically (or forcibly, depending on your perspective) upgrading such computers to Windows 10 21H2. And next in the company's sights are people still running Windows 10 20H2.

Continue reading

Almost half of organizations don't use all of Microsoft 365's features

The thing about integrated office suites is that inevitably you don't need all of the features they provide, or at least you use some of them less than others.

New research from managed services provider Ensono shows that 83 percent of enterprises say Microsoft 365 is an invaluable part of their business operations. However, almost half aren't using all of the features available.

Continue reading

Children can now code their own versions of Animal Crossing or The Legend of Zelda

Open-ended role-playing games like The Legend of Zelda and Animal Crossing are hugely popular with younger children, and codeSpark Academy, the learn-to-code app for children, has just added a new set of design tools to help them make their own such games.

codeSpark Academy says the tools in its "Adventure Game" addition require less hand-eye coordination than other creative modes. It also lets users add features like speech bubbles for characters, to enhance storytelling.

Continue reading

To err is human, and that's what hackers are counting on

identity theft hacker

It's understandable if you've made thwarting ransomware your top cybersecurity priority for 2022. The number of successful ransomware attacks, which encrypt computers until victims pay the attackers to unlock their data, surged last year. Ransomware payments reported by banks and other financial institutions (PDF) totaled $590 million for the first six months of 2021, surpassing the $416 million for all of 2020. 

When it comes to protecting your data center and endpoints (e.g., employees' laptops and mobile devices), ransomware should be top of mind. But when securing your cloud environments, don't worry about ransomware -- worry about the misconfigurations that lead to devastating data breaches. 

Continue reading

Governing the ungovernable: Why cybersecurity must adapt to identity sprawl

unknown identity

You may remember the Colonial Pipeline ransomware attack. Launched in May of last year, DarkSide’s attack cost the Colonial Pipeline Company something on the order of $4.4 million dollars (though the FBI was able to claw some of that money back). The attack set the stage for President Biden’s Executive Order on cybersecurity, shut down pipeline production, and caused panic buying across the Southeast.

That’s how the Colonial Pipeline attack ended. It began far more simply: with hackers breaching the company’s networks through a virtual private network (VPN) account that was no longer actively in use.

Continue reading

Effective Contract Lifecycle Management (CLM) requires innovative, adaptable and knowledgeable solutions

e-signature tablet

As companies work to beat out the competition, taking a deeper look into contract management can be a driving force of success. When contracts accidentally expire or key milestones are missed, it can severely handicap business. Effective contract management improves workflow efficiency and leads to a more progressive and well-functioning organization.

Contract Lifecycle Management (CLM) is one of the fastest-growing and important innovations in business today. Spurred by the digital revolution advancing across virtually every key business sector, the CLM market is expected to grow over 13 percent annually for the next decade. But what is it, and why is it such an essential tool for businesses to utilize?

Continue reading

New solution helps guarantee electronic documents

Contract signing

Electronic documents are becoming more common in business, but this doesn't eliminate the risk of forgery or tampering.

UK-based Borderless Security is launching a new e-signature solution that makes use of blockchain technology to create a safe, secure and convenient solution for signing paperwork, contracts and legally binding documents.

Continue reading

What the UK's revised security guidelines mean for business [Q&A]

security meter

Changes to the UK government's Cyber Essentials security certification scheme come into force today. They include things like guidelines on remote working and hybrid approaches, rules for cloud service accounts -- such as deploying multi-factor authentication -- and speeding up critical patch deployments for critical and high severity vulnerabilities

We talked to Karl Alderton, technical account manager at security and compliance specialist Qualys to find out more about how these changes will affect businesses and what they need to do in response.

Continue reading

Reacting with confidence to a new Trojan horse cyber threat

It’s the sophisticated technology that enables the virtual assistant on your kitchen counter, the recommendation engines on your favorite streaming services, and so much more -- and there’s new evidence hackers can use it as a Trojan horse to deliver malware. Because this technology is increasingly embedded not just in your movie nights, but critical industries from healthcare to energy and banking, its newly understood vulnerability is grave news.

But do we tear it out by its roots? Isolate it? No. Artificial intelligence is too important for that -- particularly, ironically enough, in cybersecurity defense. We have no choice but to confront the Trojan horse gambit and block it.

Continue reading

6 IoT trends for 2022

IoT links

The Internet of Things (IoT) has seen incredible growth in a relatively short period. Despite being fairly new, smart devices are everywhere in commercial and consumer circles, and they show no signs of stopping.

While the IoT’s growth may remain unchanged in 2022, it will shift and evolve. Here are six trends that will shape the IoT this year.

Continue reading

Microsoft seems to have changed its mind about killing off the Control Panel in Windows 11

Windows 11

Microsoft has been wielding its axe at the Control Panel in Windows for a while now, gradually migrating options to the Settings app. This is not something that has been universally welcomed by Windows 11 users, so a (slight) change of heart will come as welcome news for fans of the Control Panel.

While there are numerous settings that now have to be accessed through Settings, one Control Panel option has been given something of a reprieve. The applet in question is Network Connections (ncpa.cpl).

Continue reading

MINISFORUM launches AMD Ryzen-powered mini desktop PC running Manjaro Linux

When it comes to computers, there are two things that really get my motor running -- AMD processors and Linux-based operating systems. So when I learned MINISFORUM had begun selling a diminutive AMD Ryzen-powered desktop that comes with Manjaro Linux pre-installed, my heart skipped a beat. It is very exciting to see yet another computer being offered with Linux rather than Windows.

Called "DeskMini UM700," the mini Linux desktop PC is being offered in three configurations -- all powered by the very capable Ryzen 7 3750H APU -- with pricing starting at less than $500. In other words, the tiny computer isn't just capable, but affordable too.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.