Latest Technology News

Microsoft launches new resource site for Java developers

Microsoft Java resource site

Whether you're currently a Java developer, someone looking to get started, or if you sit somewhere in the middle and you're looking to up your coding game, Microsoft has a new resource site for you to check out.

Described as a one-stop shop for Java developers, the site includes beginner guides to getting started in Java coding. The site also features information about deploying and scaling Java apps, and has tips and more to help developers code productively.

Continue reading

How decentralized storage can help prevent data breaches [Q&A]

Network

According to a recent IBM report the average cost of a data breach is now $4.35 million. If enterprises don't take steps to protect personal data effectively they risk losing not just money but also the trust of their customers.

We spoke to Saswata Basu, founder and CEO of 0Chain, to discuss how decentralized storage can help to address the problem.

Continue reading

Ex director of UX at Microsoft is 'shocked' at the confusing Start menu experience in Windows 11

There is a lot to like, even love, about Windows 11, but there are also plenty of things which are very divisive. Wading into the debate about the direction in which Microsoft has taken its operating system is Jensen Harris, former Director of User Experience at the company, who takes aim at the Start menu and what he describes as a "confusing" experience.

In a series of tweets, Harris lambasts Microsoft for including banner ads in the Start menu, for placing obstacles in the way of completing simple tasks, and makes various complaints about design choices. It makes for extremely interesting reading.

Continue reading

Satechi USB-C Mobile Pro Hub SD will turn your Apple iPad into a proper desktop PC

Apple's iPad is a tablet, yes, but when you add a keyboard case, it magically becomes a laptop. But did you know the new M1-powered iPad tablets with USB-C can also serve as a legit desktop? It is true! By plugging in a USB-hub, you can connect a keyboard, mouse, monitor, and/or external storage. The desktop capabilities of Apple's M1 tablets will greatly improve with the upcoming iPadOS 16 too.

Today, Satechi launches the "USB-C Mobile Pro Hub SD," which is primarily designed for M1 iPad devices such as iPad Pro and iPad Air 5. The hub plugs into the bottom of the tablet and offers HDMI (4K compatible), USB-A (up to 5Gbps), 3.5mm audio, SD card reader, and microSD carder. It even offers USB-C power delivery (up to 60W) so you can charge the iPad while the hub is in use. There is only a single USB-A port, however, so you will need to use a wireless mouse and/or keyboard -- both cannot be wired.

Continue reading

Logitech G502 X gaming mouse now available for pre-order

Logitech's G502 gaming mouse is iconic and popular, and now, the company is refreshing it with a special "X" moniker. The Logitech "G502 X," as it is called, can be pre-ordered immediately, and there are three variants from which to choose -- wired, wireless, and plus.

The wired version, as you can guess, connects to your PC using a USB cable. While some consumers will consider a wired mouse to be inferior, I actually prefer it -- there is no battery to recharge. Both the wireless and plus models connect without a cable thanks to the included LIGHTSPEED USB-A dongle. They both charge over USB-C, but only the plus variant has RGB lighting.

Continue reading

WinZip 27 offers two new tools for sending files securely and cleaning duplicates

Corel has unveiled WinZip 27, a major new version of its flagship compression tool for Windows. Its headline changes are the addition of two new standalone tools in the form of a duplicate file cleaner and tool to facilitate the quick and secure sharing of zip files online.

The first new addition to all three editions of WinZip -- including the entry-level Standard version -- is WinZip SafeShare. This standalone tool is designed to make it easy to zip up, encrypt and share files securely with others via a three-step wizard.

Continue reading

Enterprises are storing more data than ever

folder stack

According to a new study more than 50 percent of enterprises are managing 5PB or more of data, compared with less than 40 percent that were doing so in the same survey last year.

The 2022 Unstructured Data Management Report from Komprise also shows most are now spending more than 30 percent of their IT budget on storage and backups.

Continue reading

IBM and VMware help businesses modernize hybrid cloud workloads

cloud button

IBM and VMware are using this week's VMware Explore event to announce an expanded partnership to help clients and partners modernize mission-critical workloads and speed up time to value in hybrid cloud environments.

The two companies are also planning to help clients in regulated industries such as financial services, healthcare and the public sector address the cost, complexity and risk of migrating and modernizing mission-critical workloads in the cloud.

Continue reading

Google launches new Open Source Software Vulnerability Rewards Program (OSS VRP)

Google sign

Google is not alone in offering so-called bug bounty programs which give financial incentives to contributors to track down vulnerabilities and security issues in its software. Now the company has launched a new initiative called the Open Source Software Vulnerability Rewards Program (OSS VRP).

As the name suggests, this new program focuses on Google's open source projects. The company is offering rewards of between $100 and $31,337, depending on the severity of the vulnerability.

Continue reading

Ransomware: Recovering after an attack

ransomware laptop

Ransomware attacks have existed for decades and their perpetrators keep advancing in their abilities. By evading detection, encrypting user files, and coercing unsuspecting victims into paying ransoms, ransomware attackers have threatened the survival of many businesses. The first half of 2022 recorded a total of 236.1 million ransomware attacks across the globe.

The most popular types of ransomware attacks are crypto and locker ransomware. The crypto ransomware encrypts a user's data making it inaccessible until the individual pays the ransom, usually in bitcoin. On the other hand, locker ransomware works by blocking the user's access to the computer system and will not give access until an amount is paid. Despite the security measures businesses put in place, ransomware threats are still on the increase which is why businesses must have a ransomware recovery plan to minimize catastrophic effects.

Continue reading

Different ways of building corporate systems based on the zero trust architecture

The corporate infrastructure of US government agencies will soon be transferred to a new network security model called Zero Trust Architecture (ZTA). Last year, U.S. President Joe Biden released an Executive Order on Improving the Nation's Cybersecurity. Later, on January 26, 2022, the Federal Government released a Federal Zero Trust Architecture (ZTA) strategy memorandum that sets the rules for the construction of a new IT infrastructure for government agencies and organizations in accordance with the ZTA strategy.

In this article, I want to look at the fundamental changes that the new paradigm brings, replacing the secure perimeter model, which has so far been the base for the construction of corporate IT systems.

Continue reading

Facial recognition -- the good, the bad and the getting older

Your friends may not be willing to tell you that you're looking older, but facial recognition systems have no such reservations.

Face-recognition algorithms might struggle to identify you as the same person after just five years, according to the New Scientist.

Continue reading

Twilio hack led to compromise of 2FA app Authy

Twilio

Earlier this month, messaging service Twilio suffered a serious data breach following a "sophisticated social engineering attack". After using phishing attacks on company employees, hackers were able to access user data, but it seems that the impact of the hack was more widespread.

Twilio has now revealed that the attackers also compromised the accounts of some users of Authy, its two-factor authentication (2FA) app. Although the number of users affected by the breach is relatively small, the implications are very serious and will dent confidence in the company.

Continue reading

Taking a holistic approach to application security [Q&A]

DevSecOps

Application security is becoming mainstream, and that's a good thing as it means that security testing is becoming an embedded aspect of the software development life cycle (SDLC). It also means that automated security testing tools are becoming faster, more sophisticated, and better integrated, so they're less likely to slow down developers or burden them with too many trivial findings or false positives.

But as good and necessary as AppSec testing tools are, it's not nearly enough simply to buy them and run them -- you need to buy the right ones and configure them correctly so that they help build security into your SDLC without bogging it down. It's important to implement a security strategy and a plan. It’s also important to employ developers with the skills to build trust into your software -- a concept known as 'holistic AppSec'.

Continue reading

Microsoft explains the SMB compression changes introduced by Windows Server 2022 KB5016693 and Windows 11 KB5016691 updates

Windows 11 logo on laptop screen

Last week, Microsoft released previews of updates for various versions of Windows before it unleashes the final versions next Patch Tuesday. Included among these was the KB5016691 update for Windows 11 which --although billed primarily as a bug-fixing update -- added new Server Message Block (SMB) compression options.

The same changes were introduced to Windows Server 2022 with the KB5016693 update, and Microsoft has published details of just what the changes mean, as well as explaining how to take advantage of the new options and settings.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.