Latest Technology News

Every major Linux distro has a PwnKit flaw that is easily exploited to gain root access

linux-text

Linux-based operating systems are frequently touted as being far more secure than the likes of Windows or macOS. More secure they may be, but they are not completely infallible.

A great example of this is the recently discovered PwnKit vulnerability in the pkexec component of Polkit. The flaw can be exploited to gain root access to a system and it has been a security hole in pretty much all major Linux distros for over 12 years, including Debian, Fedora and Ubuntu.

Continue reading

Microsoft releases KB5009596 update for Windows 10 with new Sync Your Settings feature to simplify Windows 11 upgrades

Windows 10 laptop

Having released a preview of next month's updates for Windows 11, Microsoft has also done the same for Windows 10. With the release of KB5009596, the company has addressed an issue that prevented the Windows Subsystem for Linux 2 (WSL2) localhost relay from starting, as well as fixing a couple of audio problems.

This particular update also sees the addition of a reminder to Internet Explorer 11 users about the browser’s upcoming retirement. One of the more interesting additions that comes with the KB5009596 update is the new feature called Sync Your Settings which has been designed to make it easier to migrate to Windows 11.

Continue reading

Pathetic and predatory? Has Microsoft tried to use Windows 11 updates to sneakily switch people to Edge and Bing?

Edge

Microsoft is not exactly a stranger to -- how can we put this gently? -- slightly underhand tactics. And if complaints about recent updates for Windows 11 are anything to go by, this is not something that's changing any time soon.

According to reports, automatic updates for Windows 11 have been used to not only deliver security fixes, but also to change people's default web browser to Microsoft Edge. Some are also complaining that Bing.com loads every time Windows starts up. The behavior has led some to accuse Microsoft of being "very sneaky".

Continue reading

Microsoft releases KB5008353 update to fix audio and taskbar problems in Windows 11

Windows 11 magnifying glass

We are coming to the end of the month and that means it is time for Microsoft to unleash the preview versions of the Windows updates that will be released on Patch Tuesday. As such, the company has released the KB5008353 update preview for Windows 11, addressing dozens of issues.

The list of changes, fixes and improvements included in this optional, non-security update is fairly lengthy, but there are some definite highlights. Among the most significant changes are fixes for problems with Bluetooth audio, as well as fixes for issues with Windows 11's taskbar that caused app icons to appear unnecessarily.

Continue reading

Overcoming observability challenges in the CI/CD Pipeline

Picture1

When most companies monitor and analyze their software systems, they focus on the most obvious ones. But one essential service often slips through the cracks: the continuous integration/continuous delivery (CI/CD) pipeline. This poses three main observability challenges: pipeline investigation efficiency, pipeline performance, and the ability to access historical data.

Every time developers push out a new version, their pipeline run is triggered. A set of commands checks to make sure everything is valid, that the build process is all right, and that all tests have been passed. If everything checks out, the new service version is deployed to production.

Continue reading

Logitech G413 SE is an affordable mechanical keyboard for PC gamers

g413-se-gallery-1-new

Should all PC gamers own a mechanical keyboard? No, not all of them. If they take their video games seriously, however, and they are focused on winning their competitive matches, such a keyboard can be a wise investment. These days, a quality mechanical offering can be had for under a hundred dollars, making it a no-brainer.

Today, Logitech announces its latest mechanical keyboard. Called "G413 SE," it will be offered in two variants -- a standard model with a number pad, and a tenkeyless (TKL) version without one. What I really love about this keyboard -- besides its affordable pricing -- is its subtle design. There is no wacky RGB lighting, instead using classy white backlighting. There are no gimmicks or nonsense either -- just a quality keyboard from a well-respected manufacturer.

Continue reading

Strengthen your company's security posture with risk quantification

Risk dial

Risk professionals work with uncertainty every day. They need to identify and prioritize which risks to address now versus later, consider many moving parts and rely on judgment and data to make informed decisions.

But how do they communicate those risks to stakeholders? Using "low, medium or high" classifications doesn’t always express the consideration risk requires -- especially since those terms don’t mean the same thing to everyone. If you told key stakeholders "there’s a possibility of rain tomorrow" before a company barbecue, how would they know whether to reschedule or put a few tents up? Is "possibility" enough information to make that decision, especially since not everyone equates possibility with the same level of probability? 

Continue reading

YouTube's TikTok rival is more popular than you might think

Shorts

TikTok’s massive success caught the major social networks napping. While they might not have anticipated the meteoric rise of the platform, they weren’t slow in rushing to produce their own takes on the popular short-form, video-sharing app.

While rivals Byte, Triller, and Clash all have their fans, it’s Instagram’s Reels, and YouTube’s Shorts that have the best chance of dethroning TikTok. You might scoff at the idea of that happening, but YouTube has just announced the all-time views for Shorts so far, and they are massive.

Continue reading

Moving to the edge needs a rethink of security

Edge computing

In order to provide real-time services to the user, enhance data management and support latency-critical applications, many businesses are moving computing to the edge.

But this brings with it new issues when it comes to securing systems. The latest Cybersecurity Insights Report from AT&T Cybersecurity focuses on the security considerations needed in order to implement edge computing safely.

Continue reading

How to unlock the updated Task Manager Microsoft has hidden in Windows 11

Windows 11

Task Manager may not be the most exciting component of Windows 11, but it is something that proves very useful from time to time. If you have ever looked at the tool and thought that it could do with a visual revamp, you are not alone -- Microsoft agrees.

So much so that the company has gone ahead and created an updated version of app and locked it away in Windows 11. Here's how you can activate it.

Continue reading

Microsoft could launch its new One Outlook app as early as spring

Microsoft building logo

Outlook is currently available in various versions, and Microsoft is looking to consolidate them into the aptly named One Outlook. Previously referred to as Project Monarch, the app includes not only an email component, but also a calendar.

Originally due for release last year, it is now looking as though One Outlook is going to be available for limited testing some time in the spring. Wider scale beta testing is expected to start in the summer, but the timetable remains flexible.

Continue reading

Microsoft is forcibly upgrading some Windows 10 computers

Windows 10 logo on a beach

It is, of course, no secret that Microsoft would like as many people as possible to use Windows 11. While it may not be realistic for the company to expect all computer users -- or even all Windows users, for that matter -- to install the latest version of the operating system, it can at the very least ensure that it minimizes the number of systems out there running unsupported versions of Windows.

And this is precisely what is happening with machines that currently have Windows 10 2004 installed. Microsoft is automatically (or forcibly, depending on your perspective) upgrading such computers to Windows 10 21H2. And next in the company's sights are people still running Windows 10 20H2.

Continue reading

Almost half of organizations don't use all of Microsoft 365's features

Home remote worker security

The thing about integrated office suites is that inevitably you don't need all of the features they provide, or at least you use some of them less than others.

New research from managed services provider Ensono shows that 83 percent of enterprises say Microsoft 365 is an invaluable part of their business operations. However, almost half aren't using all of the features available.

Continue reading

Children can now code their own versions of Animal Crossing or The Legend of Zelda

children tablets

Open-ended role-playing games like The Legend of Zelda and Animal Crossing are hugely popular with younger children, and codeSpark Academy, the learn-to-code app for children, has just added a new set of design tools to help them make their own such games.

codeSpark Academy says the tools in its "Adventure Game" addition require less hand-eye coordination than other creative modes. It also lets users add features like speech bubbles for characters, to enhance storytelling.

Continue reading

To err is human, and that's what hackers are counting on

identity theft hacker

It's understandable if you've made thwarting ransomware your top cybersecurity priority for 2022. The number of successful ransomware attacks, which encrypt computers until victims pay the attackers to unlock their data, surged last year. Ransomware payments reported by banks and other financial institutions (PDF) totaled $590 million for the first six months of 2021, surpassing the $416 million for all of 2020. 

When it comes to protecting your data center and endpoints (e.g., employees' laptops and mobile devices), ransomware should be top of mind. But when securing your cloud environments, don't worry about ransomware -- worry about the misconfigurations that lead to devastating data breaches. 

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.