Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

Kingston_FURY_Beast_DDR4_RGB_Special_Edition

Kingston unveils FURY Beast Special Edition RGB DDR4 RAM for gamers and enthusiasts

If you build your own desktop computers, you know that the component brands you choose can really matter. For instance, if you opt for an unknown company for your RAM, power supply, or storage, there is a very good chance you will run into problems. This is why I always recommend sticking with reputable brands -- saving a few bucks is never worth the hassle of troubleshooting crashes.

Kingston is a company that has been around for a long time, and its products are typically very reliable -- I trust its products for sure. Today, that company announces its latest DDR4 RAM, and the memory modules are very beautiful. Called "FURY Beast Special Edition RGB," this limited edition RAM features white heat spreaders and RGB lighting.

By Brian Fagioli -
Firefox_logo_2019.svg_

Firefox 105 promises improved stability in low-memory situations, touchpad improvements

Mozilla is rolling out Firefox 105 for Windows, Mac and Linux machines. Key takeaways from this new build include improved stability and efficiency in low memory situations in Linux and Windows, as well as an option to print just the current page from the print preview dialog.

Major new features, then, are hard to find in Firefox 105. Swipe to navigate -- using two fingers on a touchpad -- has been implemented in Windows allowing users to swiftly move back and forwards through their history. The new build also promises a doubling of speed when searching large lists for individual items.

By Nick Peers -
Windows 11 2022 Update

Microsoft releases Windows 11 2022 Update -- here's what new and how to get it

The first major update for Windows 11 is finally here. Starting today, Microsoft is rolling out the Windows 11 2022 Update, ending speculation and rumors about the precise name and release date.

It is hard to downplay the significance of this update; for many people it will transform Windows 11 into the operating system it should have been from the very beginning. There's a lot to explore in this major update including the addition of Focus sessions and Do Not Disturb, new customization options for the Start menu, updates to Snap Layouts and much more. Some things (notably Explorer tabs), unfortunately, are missing for now, and will be added in the coming weeks.

By Sofia Elizabella Wyciślik-Wilson -
Thelio-Accent-Panel-Color-Options

System76 Thelio Linux desktop chassis gets a sexy redesign that may not give you wood

System76's Thelio desktop computers have been notable for three things -- being assembled in the USA, running Linux-based operating systems, and having a largely wooden chassis. Moving forward, the PC will still be assembled in America and ship with a Linux distribution (Ubuntu or Pop!_OS), but it won't necessarily contain any wood.

You see, the computer manufacturer has decided to redesign the chassis to be mostly aluminum, save for a thin accent strip. Actually, while the strip can be made of wood, not all of them are. In other words, it is not a given that a Thelio desktop will contain any wood -- only if you specifically choose a wooden access strip. Some of the strips are instead made of powder-coated aluminum. And yes, you can replace the strip by easily pinching and sliding it off.

By Brian Fagioli -
security meter

Reducing the noise in your cybersecurity operation

What is the true cost of creating a robust cybersecurity defense for your organization? As cyberattacks accelerate around the world, organizations will continue to spend more money on security tools and services to shore up defenses. According to Cybersecurity Ventures, global cybersecurity spending overall will exceed $1.75 trillion from 2021-2025, anticipating a 15 percent year-over-year growth.

With the steady increase of budgets and IT spend, there is no denying the importance of investing in the people who run security operations. Enterprises often have an eclectic group of different vendor solutions added over time, sometimes with overlapping functionality and often with time-consuming onboarding and training requirements. Each cybersecurity product brings its own console, segmenting visibility, and threat correlation. The result is dangerous blind spots that leave enterprises vulnerable to damaging exploits. With the interminable shortage of qualified cybersecurity professionals, we need to investigate ways to more efficiently leverage the talent that we already have. The vast workload is burning them out. At best, this leads to a loss of productivity. At worst, they leave for greener pastures, which translates into turnover costs.

By Scott Chennells -
quantum computing

Half of IT pros believe quantum computing could put their data at risk

A new study from Deloitte shows 50.2 percent of professionals at organizations considering quantum computing benefits believe that their organizations are at risk from 'harvest now, decrypt later' (HNDL) cybersecurity attacks.

In HNDL attacks, threat actors harvest data from unsuspecting organizations, anticipating that data can be decrypted later when quantum computing gets sufficiently mature to render some existing cryptographic algorithms obsolete.

By Ian Barker -
Business man with suitcase full of money

Think your business is ready for ransomware? Think again

Although business leaders think they're fully prepared to deal with ransomware, actual outcomes suggest otherwise, according to a new report.

Druva has commissioned IDC to conduct independent research into ransomware preparedness, challenges, and threats to find out how approaches to ransomware are changing and whether common recovery efforts are effective.

By Ian Barker -
Data center

Data center sector unprepared for expanding sustainability requirements

The latest Annual Global Data Center survey from the Uptime Institute shows an industry that remains strong but is working to address increasing pressure for sustainability progress and reporting.

The sector is also grappling with continuing staffing shortages, supply chain delays, costly outages and other complex challenges.

By Ian Barker -
Ransomware,Cyber,Attack,Showing,Personal,Files,Encrypted,Screen

Ransomware affects 90 percent of companies in the past year

Despite increased spending on cybersecurity, a new report reveals that 90 percent of organizations were affected by ransomware in some way over the past 12 months, up from last year's 72.5 percent.

The study from SpyCloud shows that security efforts are being stepped up, the number of organizations that have implemented or plan to implement multi-factor authentication jumped 71 percent, from 56 percent the previous year to 96 percent. Monitoring for compromised employee credentials also increased from 44 percent to 73 percent.

By Ian Barker -
Revolut cards

Revolut customer data exposed in cyberattack

Fintech firm Revolut has been hit by a cyberattack that resulted in personal data of tens of thousands of users being exposed.

Described as a "highly targeted" attack -- although it is not clear who was targeted or why -- the security incident took place on the night of September 11. The attack gave an unauthorized third-party access to a range of data including postal and email addresses, account information, and phone numbers.

By Sofia Elizabella Wyciślik-Wilson -
shopping-mall

How AI and computer vision can help retailers to compete [Q&A]

The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.

But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?

By Ian Barker -
GTA -- Grand Theft Auto

Massive GTA VI video leak reveals the secrets of Rockstar Games' upcoming release

Over the weekend, a user from the GTAForums leaked 90 videos showing gameplay footage from the yet-to-be-release Grand Theft Auto VI. Someone by the name of teapotuberhacker -- who also claims to be responsible for the recent Uber hack -- shared 3GB of data and said that more could be leaked soon.

GTA developer Rockstar Games has confirmed that the leak is genuine, and the videos are surprisingly revealing. The footage is from a test build of GTA VI comprising "GTA 5 and 6 source code and assets" and shows that there will be multiple playable characters, including a female player.

By Sofia Elizabella Wyciślik-Wilson -
Stealing passwords

Chrome and Microsoft Edge's enhanced spellcheckers can leak your passwords and personal data

Privacy and security are something that all browser manufacturers like to brag about in relation to their products, with Google and Microsoft being no different to others in this regard. But if you are making use of the Enhanced Spellcheck in Chrome or Microsoft Editor in Edge, some highly sensitive information can be sent to the two software giants.

In addition to passwords, we are talking about personal information entered into online forms such as your social security number, date of birth, username and so on. The worrying discovery was made by security researchers from JavaScript security firm otto-js who warn that this is something that will be of particular concern to enterprise users.

By Sofia Elizabella Wyciślik-Wilson -
Kodi-Alpha-3

This is what's new in the latest Kodi 20 Nexus release

A few days ago we announced that the latest version of Kodi 20 'Nexus' was available to download, but there was no word at the time from the Kodi Foundation on exactly what the changes were.

Now the team has released a full changelog, and as you’d expect from a big milestone, there’s a lot of changes and fixes.

By Wayne Williams -
LastPass logo on laptop

LastPass reveals details of August hack that gave threat actor access to its development environment for four days

Last month, LastPass suffered a cyberattack and the company shared some details about what had happened shortly afterwards. Now, having conducted further investigations, more information has been revealed including the fact that the attacker had access to the LastPass development environment for four days.

The company concedes that it is not clear how the attacker was able to gain access but says: "the threat actor utilized their persistent access to impersonate the developer once the developer had successfully authenticated using multi-factor authentication". LastPass has also revealed the impact of the four-day security incident in the name of providing "transparency and peace-of-mind to [its] consumer and business communities".

By Sofia Elizabella Wyciślik-Wilson -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

Categories

AI Technology Software Hardware Security

Quick Links

About Us Privacy Policy Cookie Policy Sitemap

© 1998-2025 BetaNews, Inc. All Rights Reserved.