Latest Technology News

How artificial intelligence and machine learning are changing the development landscape [Q&A]

Artificial intelligence

It's an increasingly rare application these days that doesn’t claim to incorporate some form of artificial intelligence or machine learning capability.

But while this may be great from a marketing standpoint it does pose a challenge for developers. We spoke to Luis Ceze, CEO and co-founder of OctoML, to find out more.

Continue reading

It may not be long before you can edit WhatsApp messages

WhatsApp

The ability to edit sent messages is something that is common -- although far from universal -- in chat and social apps. The likes of Slack and Skype make it easy to make changes, such as correcting typos in messages, and it is an option that is said to be coming to Twitter at some point in the future.

But while the option to edit tweets may be some way off, users of WhatsApp may have this option sooner rather than later. The developers of WhatsApp are currently working on bringing a message-editing option to the mobile versions of the apps, as well as the desktop and web editions.

Continue reading

Why has Microsoft still not fixed a weeks-old, actively exploited vulnerability affecting Windows 11 and more?

Microsoft building logo

Yesterday we wrote about a zero-day vulnerability called Follina which allows for remote code execution on a victim's computer. While the flow -- tracked as CVE-2022-30190 -- has been described as an Office vulnerability, it is really the result of a security issue with a component of Windows.

A problem exists in the Microsoft Windows Support Diagnostic Tool (MSDT) which is found in all supported versions of Windows, including Windows 11. The vulnerability has been billed as an Office vulnerability as using a malicious Word file is one of the easiest attack vectors to exploit the flaw. But what is worrying about the vulnerability, apart from the fact that Microsoft has not fixed it yet, is that the company was made aware of the fact that it was being actively exploited way back on April 12.

Continue reading

Logitech shows off newest Design Collection of wireless mice

Every year, often in June, Logitech launches its latest Design Collection of wireless mice. These are small portable mice that are intended for laptops, but they can be used with any computer that has a USB-A port. Yes, these use a USB dongle rather than Bluetooth. They also don't have any thumb buttons and they do not have rechargeable batteries.

If you think these mice sound pretty basic, you'd be correct. So what makes them exciting? Ah, good question. This mouse collection is notable for featuring funky designs. Basically, Logitech's Design Collection is intended to be fun and whimsical with unique patterns and wacky colors. This year, the Design Collection seems largely focused on plants and flowers (you can see them above).

Continue reading

Say goodbye to Microsoft Windows 11 and wave hello to Ubuntu-based Linux Lite 6.0

Is Windows 11 a good desktop operating system. Absolutely. Is it the best desktop operating system? Well, that is harder to answer. Ultimately, if you are 100 percent dependent on Windows software, then yes, Windows 11 is the best operating system... for you. If you can get by without using software designed for Microsoft's OS, however, a Linux-based operating system might be the better option -- especially if you have an older computer.

You see, Windows 11 is very polarizing. The operating system features radical changes to the user interface (such as a centered task bar) which some users do like, but many others do not. Not to mention, the system requirements will leave many still-capable computers unable to upgrade without using unofficial hacks. Even worse, computers deemed incompatible could eventually stop getting updates! Linux doesn't have these problems.

Continue reading

Kingston releases hardware-encrypted IronKey Vault Privacy 50 USB flash drive

We recently told you about the Kingston VP80ES IronKey Vault Privacy 80 -- a speedy portable SSD that features USB-C connectivity and a touchscreen for tapping-in a password or pin. While that drive is quite amazing, not everyone will truly need the fast speeds or touchscreen -- it could be overkill. Instead, a hardware-encrypted USB flash drive could be sufficient -- and much less expensive.

Today, Kingston launches its latest hardware-encrypted flash drive. Called "IronKey Vault Privacy 50 (VP50)," the drive uses a USB-A connector and is offered in capacities ranging from 8GB to 256GB. The VP50 features XTS-AES 256-bit encryption and is FIPS 197 certified.

Continue reading

IOGEAR GUV302G Upstream 4K USB-C HDMI capture card has HDCP switch

Anyone can become a YouTuber or Twitch streamer, but not everyone can become rich and famous from doing it. Many young folks have big dreams about becoming the next big video-game-streaming star, but sadly, that is not at all likely. And so, if you are passionate about streaming yourself playing video games, it would be wise to simply do it for fun -- forget about money. Look, if you get fame and fortune from the hobby, just consider it an added bonus.

While streaming yourself playing PC games is incredibly easy, what if you would rather do it with a console (such PlayStation 5, Xbox Series X, or Nintendo Switch) while also sharing your PC webcam? Ah, that is a bit more tough. For this, you will need an HDMI capture card. While PCIe variants do exist for desktops, there is a much simpler route -- USB. Yes, an external capture card is easier to install and works with both desktops and laptops.

Continue reading

82 percent of CIOs believe their software supply chains are vulnerable

supply chain

A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.

The research from machine identity specialist Venafi suggests the shift to cloud native development, along with the increased speed brought about by the adoption of DevOps processes, has made the challenges connected with securing software supply chains infinitely more complex.

Continue reading

Leak suggests Microsoft's new Surface Laptop Go 2 holds few surprises

Surface Laptop Go 2

In the coming weeks, Microsoft is expected to share details of a new Surface Laptop Go. However, it seems we may already know much of what to expect, after a listing for the yet-to-be-announced Surface Laptop Go 2 popped up on a Korean website.

While news of the upcoming device will interest those in the market for an updated model, the listing shows that there may not be a great deal to get excited about besides an upgraded processor.

Continue reading

New study reveals serious disconnect in executive planning for cyberattacks

A new study reveals a major disconnect in the way senior management teams collaborate and determine the risks and impact on their operations when hit by a cyberattack.

The research carried out by Sapio Research for Deep Instinct shows only 12 percent of chief financial officers are actively involved in the process, even though 56 percent say their organization has paid a ransom to recover data.

Continue reading

Microsoft reveals workaround for Office zero-day vulnerability that can be used to launch malicious PowerShell commands

Colorful Microsoft logo

While Microsoft may be quick to point out security vulnerabilities in other companies' products, its own software is far from infallible. A good example of this is the recently discovered 'Follina' security hole that affects Microsoft Office.

The vulnerability can be exploited to launch PowerShell and execute a variety of malicious commands; all that a victim needs to do is open a specially crafted Word file. Tracked as CVE-2022-30190, Microsoft has released details of a workaround that helps to mitigate the issue.

Continue reading

Three steps to turn data into an indispensable strategic tool

financial data exchange

While 'data is the new oil' has become something of a cliché, it's undeniably true. Gartner reports that 90 percent of corporate strategies will explicitly class information as a critical enterprise asset by the end of 2022. Yet, information can only be powerful when it is put to work. Which is why the UK government and industry regulators (such as Ofwat) have set out strategies that encourage organizations to put data to use.

However, making data usable isn't always straightforward. Data doesn't come pre-packaged into customer next best actions and strategic tips. In fact, data analysis is often compared to panning for gold. Not all data is useful and you need to connect the dots to make it relevant -- when you consider the volume of data managed by the average company has grown to 162.9TB, that's one big river to pan.

Continue reading

MINISFORUM Venus Series UM560 is a tiny Windows 11 PC powered by AMD Ryzen

MINISFORUM is a computer-maker that has been releasing many models of mini PCs lately. Its machines are often looked upon favorably by consumers that prefer diminutive desktops. Not only are its computers small and well-made, but often quite powerful too. These tiny machines can be good servers, retro-gaming machines, office workstations, home theater PCs, and more.

Many MINISFORUM computers are powered by capable Intel processors, but the company has been embracing AMD chips a lot lately as well. In fact, the company now has several AMD-powered options. Today, MINISFORUM announces an upcoming AMD desktop that is very cute. Called "Venus Series UM560," it is powered by a Ryzen 5 5625U CPU. The little computer can be purchased as either a barebones or with both RAM and storage pre-installed.

Continue reading

Microsoft researchers discover serious security vulnerabilities in big-name Android apps

Microsoft building in California

The Microsoft 365 Defender Research Team has shared details of several high-severity vulnerabilities found in a mobile framework used in popular apps associated with a number of big names.

The framework is owned by mce Systems, and is used in apps from numerous mobile providers. The apps -- from the likes of AT&T, Rogers Communications and Bell Canada -- are often pre-installed on Android handsets, but they have also been downloaded millions of times. If exploited, the vulnerabilities allow for local or remote attacks, including command injection and privilege escalation attacks.

Continue reading

The role of encrypted traffic analysis for threat detection [Q&A]

Everyone is striving to make their systems more secure and in many cases that means adopting encryption in order to protect data.

But the use of encrypted traffic over networks presents a headache for security teams as malicious content can be harder to detect. We spoke to Thomas Pore, director of security products at Live Action, to find out more about the problem and how it can be addressed.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.