Latest Technology News

Revolut customer data exposed in cyberattack

Revolut cards

Fintech firm Revolut has been hit by a cyberattack that resulted in personal data of tens of thousands of users being exposed.

Described as a "highly targeted" attack -- although it is not clear who was targeted or why -- the security incident took place on the night of September 11. The attack gave an unauthorized third-party access to a range of data including postal and email addresses, account information, and phone numbers.

Continue reading

How AI and computer vision can help retailers to compete [Q&A]

shopping-mall

The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.

But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?

Continue reading

Massive GTA VI video leak reveals the secrets of Rockstar Games' upcoming release

GTA -- Grand Theft Auto

Over the weekend, a user from the GTAForums leaked 90 videos showing gameplay footage from the yet-to-be-release Grand Theft Auto VI. Someone by the name of teapotuberhacker -- who also claims to be responsible for the recent Uber hack -- shared 3GB of data and said that more could be leaked soon.

GTA developer Rockstar Games has confirmed that the leak is genuine, and the videos are surprisingly revealing. The footage is from a test build of GTA VI comprising "GTA 5 and 6 source code and assets" and shows that there will be multiple playable characters, including a female player.

Continue reading

Chrome and Microsoft Edge's enhanced spellcheckers can leak your passwords and personal data

Stealing passwords

Privacy and security are something that all browser manufacturers like to brag about in relation to their products, with Google and Microsoft being no different to others in this regard. But if you are making use of the Enhanced Spellcheck in Chrome or Microsoft Editor in Edge, some highly sensitive information can be sent to the two software giants.

In addition to passwords, we are talking about personal information entered into online forms such as your social security number, date of birth, username and so on. The worrying discovery was made by security researchers from JavaScript security firm otto-js who warn that this is something that will be of particular concern to enterprise users.

Continue reading

This is what's new in the latest Kodi 20 Nexus release

Kodi-Alpha-3

A few days ago we announced that the latest version of Kodi 20 'Nexus' was available to download, but there was no word at the time from the Kodi Foundation on exactly what the changes were.

Now the team has released a full changelog, and as you’d expect from a big milestone, there’s a lot of changes and fixes.

Continue reading

LastPass reveals details of August hack that gave threat actor access to its development environment for four days

LastPass logo on laptop

Last month, LastPass suffered a cyberattack and the company shared some details about what had happened shortly afterwards. Now, having conducted further investigations, more information has been revealed including the fact that the attacker had access to the LastPass development environment for four days.

The company concedes that it is not clear how the attacker was able to gain access but says: "the threat actor utilized their persistent access to impersonate the developer once the developer had successfully authenticated using multi-factor authentication". LastPass has also revealed the impact of the four-day security incident in the name of providing "transparency and peace-of-mind to [its] consumer and business communities".

Continue reading

CDP: A priority in the evolution of ransomware recovery

ransomware laptop

The first ransomware appeared in 1989. It was distributed via floppy disks; its encryption could be easily reversed, and the ransom of $189 was to be paid to a PO box in Panama. Since those humble beginnings, ransomware has evolved into the massive international cybercrime it is today, that causes billions in damage to organizations big or small.

As new successful attacks are reported daily, it seems that the defenses against the ever more sophisticated attack vectors are lagging the attackers. As many organizations continue to struggle to defend themselves against ransomware, it is worth looking at the currently available technologies and how effective they are in combating it.

Continue reading

Get 'Microsoft 365 Fundamentals Guide' ($24.99 value) FREE for a limited time

Microsoft-365-Fundamentals-Guide

With its extensive set of tools and features for improving productivity and collaboration, Microsoft 365 is being widely adopted by organizations worldwide.

This book will help not only developers but also business people and those working with information to discover tips and tricks for making the most of the apps in the Microsoft 365 suite.

Continue reading

Best Windows apps this week

blender

Five-hundred-and-eight in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Microsoft 365 apps can now be updated without user interruption, thanks to the new "update under lock" feature.

Continue reading

Security and compliance issues hold back innovation

Compliance gauge

Three quarters of C-suite executives responding to a new survey say that compliance challenges and security challenges limit their company's ability to innovate.

The study from software delivery platform CloudBees also shows executives overwhelmingly favor a shift left approach, a strategy of moving software testing and evaluation to earlier in the development lifecycle, placing the burden of compliance on development teams.

Continue reading

Three-quarters of organizations have suffered an API security incident in the last year

api

Over three-quarters (76 percent) of respondents in a new survey have suffered an API security incident in the last 12 months, primarily caused by dormant/zombie APIs, authorization vulnerabilities, and web application firewalls.

The research from Noname Security also shows that 74 percent of cybersecurity professionals don’t have a complete API inventory or know which APIs return sensitive data.

Continue reading

Microsoft Teams gains language interpretation for multi-lingual environments

Microsoft Teams

Recognizing the fact that many groups, organizations and work forces are made up of multi-lingual members from many countries, Microsoft has made language interpretation Generally Available for users of Microsoft Teams.

Rather than offering automatic translation of speech, language interpretation allows professional interpreters to convert what a speaker says into another language in real-time.

Continue reading

Microsoft Teams for Windows, macOS and Linux insecurely stores authentication tokens in unprotected cleartext -- and a fix is NOT in the pipeline

Microsoft Teams

Researchers from cybersecurity firm Vectra have issued a warning that Microsoft Teams stores authentication tokens in an unprotected form that could easily be abused by hackers.

The desktop apps for Windows, macOS and Linux all store authentication tokens in cleartext, and this can be used by an attacker to steal an identity and log into accounts. This is clearly worrying, but what is more concerning is Microsoft's reaction; the company says that the issue does not require "immediate servicing".

Continue reading

Why virtualization is making enterprise data warehouses obsolete [Q&A]

Virtualization

For many years the database has been at the heart of enterprise IT. But the shift to the cloud has led to massive challenges with migrations proving both slow and expensive.

A different way to approach this is to use virtualization, allowing existing applications to run on any modern cloud platform without being rewritten or replaced. We spoke to Mike Waas founder and CEO of Datometry, a SaaS database virtualization platform, to find out more.

Continue reading

How to get verified on Twitter -- social network revamps its guide

Twitter header

Users of Twitter crave different things -- everything from an edit button (now available to some) to account verification.

For anyone seeking the much sought-after blue tick, Twitter has revamped its Help Center pages, providing detailed information about how to get verified. While not complicated, the updated guide provides clear information about exactly how to apply, and how to increase your chances of a successful application for verification.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.