Will Microsoft never learn? The company hits paid-up Office 2021 users with ads for Microsoft 365


There are various business models for software these days, ranging from simple purchases to subscriptions. There are also freemium apps and games that are cost-free but feature advertising. If you have spent money on software, you might rightly expect it to be free from ads, but not in the case of Microsoft Office 2021.
Microsoft is certainly no stranger to using its products -- such as Windows 11 -- as platforms to advertise other products and services. Office 2021 is just the latest example, with Microsoft using the software -- for which users have paid a one-off fee -- to advertise the subscription-based its Microsoft 365 products.
Why security training is key to improving cybersecurity posture


The threat landscape is constantly evolving and the shift to hybrid has only widened the attack surface. Today, organizations continue to be in the firing line as cybercriminals exploit their most used application: emails. The proliferation of phishing and business email attacks have seen hackers targeting the biggest corporate security weakness; employees.
Threat actors target workers because they are seen as the weakest link. Cybercriminals are thriving by targeting and exploiting staff, especially those who haven’t received effective user education and training. As the attack surface expands and threats become more sophisticated, organizations must reinvent the wheel by changing their approach to cybersecurity. Where should they start? With training employees and providing omnipresent tools and technology to prevent, detect, and recover from even the most sophisticated of attacks.
Flying high: Could drones help address the delivery crisis?


The UK has been experiencing a shortage of delivery drivers in recent years. So much so, Amazon enticed part-time workers with up to £3,000 in incentives to ensure this didn’t affect profits during the festive period.
As well as this, according to the Road Haulage Association, the industry was short of more than 100,000 HGV drivers in June 2021. This was due to a number of factors, from barriers to obtaining a license to the introduction of Brexit.
What you need to know about prototype pollution and how it affects JavaScript


No, this is not about solid waste generated with the production of prototypes or models for different products. Prototype pollution here refers to a critical cyber threat rated 10/10 on the CVSS scale of severity.
In a paper published in July this year, entitled "Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js," security researchers revealed a serious vulnerability that affects prototype-based languages like JavaScript and the Node.js platform. This threat involves injecting properties into an object's root prototype at runtime and causes the execution of legit code gadgets.
Attacks on healthcare organizations increase 90 percent


There has been a 90 percent increase in the number of healthcare organizations targeted by cyber-attacks, in comparison with the first quarter of 2022.
The latest cyber threat Landscape report from Kroll finds that while phishing continues to be the vector used for initial access, there has been a vast increase in external remote services (such as VPNs and RDP environments) being compromised, up 700 percent.
Microsoft is launching a new PowerToys utility -- Screen Ruler


The last few PowerToys updates have been slightly disappointing (but only slightly) in as much as they have been largely bug-fixing releases, and have not included any new toys to play with. This is about to change.
Microsoft has a new utility in the pipeline, and its name gives you a very good idea of what it does: Screen Ruler. Perfect for all sorts of design work, the tool will let you measure the distance between two points on your screen in a number of ways.
Best Windows apps this week


Five-hundred-and-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft published a warning this week that a recent update has broken XPS viewing. Microsoft also released a new Windows 11 build; this one enabled File Explorer tabs for all users.
Why run your database in Kubernetes? [Q&A]


Kubernetes is one of the most widely used platforms for running containerized applications. Many businesses though still run their databases in a more traditional environment.
Of course there's no reason why you can't run a database in Kubernetes and there are many advantages to doing so. We spoke to Karthik Ranganathan, founder and CTO of cloud-native database specialist Yugabyte, to discuss the pros and cons.
Following bug-related delay, Ubuntu Linux 22.04.1 LTS (Jammy Jellyfish) is finally here


Earlier this month, we shared the news that Ubuntu 22.04.1 LTS (code-named "Jammy Jellyfish") was being delayed. Sadly, the first point release of this wildly popular operating system version was being pushed back an entire week -- an absolute eternity in the world of Linux.
Well, folks, a week has passed, and thankfully, Canonical stayed true to its word (this time) and sorted the show-stopping Ubuntu Linux 22.04.1 issue. Yes, the major bug that caused snaps not to open on computers that used the OEM install option is now resolved. Even better, starting today, Canonical will being prompting Ubuntu 20.04 users to upgrade to Jammy Jellyfish.
Get 'Diversity Intelligence' ($15 value) FREE for a limited time


In Diversity Intelligence: How to Create a Culture of Inclusion for your Business, keynote speaker and diversity and inclusion expert Heidi R. Andersen delivers a step-by-step walkthrough of how to create an inclusive culture, and break down the barriers to achieving diversity.
You’ll find practical advice for creating the necessary cultural transformation that results in diversity intelligence, reaching well beneath the surface until it’s embedded in the foundation of your organization. The author describes the tools, methods, concepts, and goals that are essential to this transformation.
Twice as nice? Who needs a digital twin?


The internet is always abuzz with new technology trends, and anyone who follows them will be familiar with the terms "digital twin" or "digital twin of an organization". Although digital twins have been around for several decades, the rapid rise of Internet of Things (IoT) technology has made the concept more widely considered a tool of the future. So, as digital twins increasingly model systems of interconnected things, what potential does the technology hold to orchestrate processes, people, and things in a sophisticated way that’s beneficial for everyone?
This article defines what a digital twin is, and suggests where the technology is headed in our increasingly interconnected world.
Digital transformation with four underutilized cloud-based capabilities


Making the most productive use of an organization’s digital resources is a vital ingredient for success in today’s ultra-competitive business landscape. Companies are challenged to extract the maximum value from their data assets when using exclusively in-house computing solutions.
This article will discuss cloud-based solutions and methods businesses can adopt to enhance their organization’s digital transformation. Failure to recognize and act on the potential benefits of these cloud technologies can leave a company struggling to keep up with more proactive market rivals.
New cloud-based platform helps protect operational security


As more and more devices that we might not conventionally think of as 'IT' become connected, the risks to enterprises increase.
To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational resilience for modern industrial businesses.
What is the future of cryptocurrency regulation?


The cryptocurrency industry rose to prominence in the United States in 2014. Since then, people have debated whether the U.S. government should get involved in regulating the new form of commerce and to what extent.
On one hand, Congress doesn’t want to stifle the innovation resulting from the burgeoning crypto industry. On the other, regulation would increase safety and encourage investors to feel more confident in cryptocurrency. The future of crypto is up in the air, but professionals agree that any regulation would have to be done delicately.
Stolen data used to launch more effective BEC attacks


New research from Accenture shows that data stolen in ransomware and other cyberattacks is being weaponized in order to carry out business email compromise (BEC) attacks.
Underground forums have sets of credentials for sale for as little as $10 that provide access to genuine corporate email accounts, making malicious emails seem genuine.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.