Latest Technology News

Bitdefender launches new password manager for consumers

Password key image

We all know that we should use complex passwords and different ones for each account but managing them is undoubtedly a chore. It's no surprise then that Bitdefender research shows 50 percent of people use a single password for all online accounts and 32 percent reuse just a few passwords across multiple accounts.

To simplify the creation and management of secure passwords for online accounts across multiple platforms, including mobile, Bitdefender is today launching its own Password Manager.

Continue reading

Passwordless technology is key to reducing risk and improving user experience

Login zero trust

Frustrated by poor user experience and weak security, enterprises are moving towards adopting passwordless, continuous authentication, according to a new report.

The research from Enterprise Strategy Group, sponsored by SecureAuth also shows that multi-factor authentication (MFA) fatigue can result in more friction, loss of productivity and higher IT costs.

Continue reading

Microsoft releases KB5012432 update for Windows 11 -- but not for everyone

Windows 11 monitor

We are, slowly but surely, moving towards the release of Windows 11 Version 22H2, also known as Sun Valley 2, and this is very evident to Windows Insiders. We very recently saw the release of Windows 11 Preview Build 22567 to Insiders and then there was the KB5012427 update for testing the servicing pipeline.

Now Microsoft has released a second Cumulative Update Build of Windows 11 for Windows Insiders signed up for the Dev Channel. The KB5012432 update takes Windows 11 up to build 22567.200, but this time Microsoft is not making it available to everyone -- not even all Insiders.

Continue reading

Supply chain vulnerabilities hit medical and IoT devices

Cardiac monitor

Researchers at Forescout's Vedere Labs have discovered a set of vulnerabilities targeting the PTC Axeda agent which is commonly used in medical and IoT devices.

The Axeda agent enables device manufacturers to remotely access and manage connected devices, making these vulnerabilities reminiscent of the Kaseya hack and the SolarWinds Orion compromise.

Continue reading

Great news: I've been invited to Donald Trump's Truth Social... 18 times at once! The new tech service's problems continue

When Donald Trump launched his new social network, Truth Social, in an effort to mitigate his lifetime ban by Twitter and Facebook, everyone was curious what would come of it. It launched on February 21 of this year with something of a less than stellar debut.  

Early on, people were able to get on, but the servers quickly bogged down, and it began forming a waiting list. Like many of those trying to get in, I fell in that waiting list. As a writer, I have a vested interest in new tech of any kind. After all, we can’t talk about things to readers without first-hand experience. 

Continue reading

Microsoft is working on some amazing new PowerToys for Windows 11

PowerToys

While there have been dozens of PowerToys releases since Microsoft revived the much-loved utilities collection for the Windows 11 era, the software is still in preview.

Usually, it is the new sub-1.x versions that Microsoft pushes out which give cause for excitement, but there is also much to be learned about the future direction of the software from data on GitHub. Recent Pull Requests in the repository shows that Microsoft is working on not only new add-ons for existing PowerToys, but also completely new utilities. So, what can we expect to see? Is TweakUI for Windows 11 on the horizon?

Continue reading

90 percent of clients in professional services industries prefer digital interaction

A new study by one-stop hub platform Moxo (formerly Moxtra), looking at the finance, real estate and legal sectors, finds 90 percent of people's preferred method of communication when asking questions about their account and business transactions is digital (via a designated client portal), rather than scheduling an in-person appointment or phone call.

Moxo surveyed 1,500 clients and 1,500 internal- and external-facing employees and finds that 73 percent of employees believe digital solutions will be extremely important to improve business efficiency and 60 percent believe they will be extremely important in enhancing client service delivery and account management.

Continue reading

Organizations take two months to patch critical vulnerabilities

business security

Organizations are taking nearly two months to remediate critical risk vulnerabilities, with an average mean time to remediate (MTTR) across of 60 days.

A new report from smart vulnerability management firm Edgescan, based on analysis of over 40,000 web application and API assessments, three million network endpoint assessments, and circa 1000 penetration tests, finds high rates of known, patchable vulnerabilities that have working exploits in the wild.

Continue reading

The latest update from Microsoft shows that Windows 11 Version 22H2 is feature complete

Windows 11

It would appear that the current build of Windows 11 available to Insiders on the Dev Channel is the feature complete version of the upcoming Sun Valley 2 update -- also known as Windows 11 Version 22H2.

Last week, Microsoft released Windows 11 Preview Build 22567 to Insiders, and this was followed shortly after by the KB5012427 update. Billed as an update to "test our servicing pipeline", Microsoft did not add any new features, but it did confirm that the update will be called Version 22H2 -- and this also serves as an indication of the release date.

Continue reading

Online PDF editor and converter Smallpdf buys PDF Tools for $30 million

Smallpdf and PDF Tools

Smallpdf, the online PDF editing and management toolbox, has announced that it is acquiring document processing technology provider PDF Tools for $30 million.

Both companies are based in Switzerland and have a history of working together -- PDF Tools products have been used by Smallpdf for a number of years -- so the acquisition is not a complete surprise. It sees Smallpdf spreading further into the document management market, boosting its professional offerings thanks in part to the PDF and PDF/A arciving support provided by PDF Tools.

Continue reading

Silicon Power Marvel Xtreme M80 USB 3.2 Gen 2 flash drive is fast AF

We recently told you about a new flash drive from Silicon Power that was rather unremarkable and ho-hum. Called "Marvel M02," it is your typical run-of-the-mill USB-A drive. Its lack of excitement is absolutely fine, however, as sometimes all you need is a basic flash drive for general use. Not every product has to be exciting.

Well, folks, there is yet another new flash drive from Silicon Power, and it is anything but boring. While its design is nothing special, its performance is. Called "Marvel Xtreme M80," this USB-A drive offers read performance up to 600MB/s and write performance up to 500MB/s. In other words, as its name implies, this drive is extremely fast!

Continue reading

The road ahead for artificial intelligence [Q&A]

Artificial intelligence

There has been a lot of buzz surrounding the adoption of artificial intelligence. According to a recent report from McKinsey 57 percent of companies are now using AI in at least one function. But how much is hype and how much is built on a sound commercial base?

We spoke to Mike Loukides, VP of emerging tech content at O'Reilly Media and author of O'Reilly Media's widely-cited AI Adoption in the Enterprise report, to discuss the current state of AI and what lies ahead.

Continue reading

How to keep customers safe with the correct print security strategy

Today’s Wi-Fi printers possess an array of features that make printing easy, which are especially useful in a world where remote working is commonplace and employees use a range of different devices for producing documents. Despite their advantages, there remain some serious security gaps that hackers can easily exploit if an organization doesn’t have a robust print security strategy in place.

While most businesses do well when it comes to protecting core IT infrastructure including computers, servers and applications, they do often fall short when it comes to secondary assets such as multifunction printers (MFPs). With cybercriminals constantly circling and searching for different ways to infiltrate a company’s network, unsecured connected printers can be a key point of weakness leading to a major breach.

Continue reading

The journey to intelligent office automation

Robotic Process Automation (RPA) has been around longer than you might realize. At its core, RPA simply means the automation of any manually intensive IT or administrative task. For instance, scheduling an email is one early example of RPA. But over the last two years, RPA has become much easier to use and the tools have been democratized out to the business units so arduous daily tasks may now be automated easily. Think of it as a highly evolved Excel macro, created by someone in the business that automatically logs into and out of applications to make the enterprise more effective and efficient.

What's more, due to the lack of resources available, automating enterprise processes traditionally caused friction between business units and IT. Today, IT teams may focus on large, transformative automation (e.g., new ERP Systems, new services) and push everything else back over to other business units. Transforming an organization by allowing business units to accomplish more on their own -- while freeing up IT to focus on more complex and important tasks is a far more effective use of all resources. 

Continue reading

Lapsus$ hackers leak Samsung source code and massive data dump from security breach

Two Samsung building logos

Samsung appears to have fallen victim to a serious security breach if the leaks from data extortion group Lapsus$ are anything to go by.

Amounting to a colossal 190GB of data, the group says it has in its possession Samsung source code and other confidential company data. It is just days since the Lapsus$ claimed responsibility for a hack that resulted in data being stolen and leaked from data stolen from GPU chipmaker NVIDIA.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.