Latest Technology News

Free tool helps enterprises assess their Active Directory security

security meter

Microsoft Active Directory (AD) is used by 90 percent of enterprises as the primary source of trust for identity and access, but it's also exploited in many cyberattacks.

Since AD is rarely safeguarded effectively, attackers have come to depend on weak configurations to identify attack paths, access privileged credentials and get a foothold in target networks.

Continue reading

Dell unveils all-new XPS Desktop with 11th Gen Intel Core processors

Understandably, more and more people are choosing laptops these days, as they are more convenient for those that need to work on the go. By utilizing a docking station, you can usually turn notebooks into makeshift desktops too. With all of that said, true desktops do provide better expandability, upgradeability, and sometimes, better performance too. And so, some consumers are better off with a desktop PC.

If you are in the market for a Windows 10 desktop, you can't go wrong with Dell's XPS Desktop. Today, the company refreshes this beautiful desktop with 11th Gen Intel Core processors. It even comes with an optical drive (DVD-RW or Blu-ray burner) -- something that has become quite rare on modern computers.

Continue reading

29 percent of threats previously unknown as hackers update tactics

data threat

The latest Quarterly Threat Insights Report from HP shows that 29 percent of malware captured between October and December 2020 was previously unknown, due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection.

In addition 88 percent of malware was delivered by email into users' inboxes, in many cases having bypassed gateway filters. It took 8.8 days, on average, for threats to become known by hash to antivirus engines, giving hackers over a week’s head-start on their campaigns.

Continue reading

Avira launches new security product for Mac systems

German cybersecurity company Avira is launching a new security for Mac product with free as well as premium versions, developed from the ground up on Apple’s latest tech stack.

The all-in-one solution blocks and removes threats, enables worry-free browsing, shopping and payment through real-time protection, and protects data with VPN encryption.

Continue reading

Microsoft issues official fix for blue screens and printing problems in Windows 10

Windows key on keyboard

If you've installed Windows 10 updates this month, you may well have started to experience problems with printing, as well as seeing blue screens with an APC_INDEX_MISMATCH error. After acknowledging the problem, Microsoft initially offered a workaround, but now the company has released a proper fix for the issue.

The fix takes the form of an out-of-band update for Windows 10 as Microsoft rushed to patch the bug introduced by the March 2021 cumulative updates. In all, there are four patches to install, each for different builds of Windows -- KB5001565, KB5001566, KB5001567 and KB5001568.

Continue reading

Kodi 19 Matrix-based LibreELEC 10 BETA 1 Linux distro is here, but some Raspberry Pi devices are discontinued

Kodi is an excellent open source media player that provides the user with an immersive experience. While the software gets a bad reputation due to people using it for piracy, many folks only use it for legal media consumption. As more and more illegal Kodi add-on maintainers face legal trouble, and streaming services like Netflix and Disney+ remain competitively priced, fewer folks are seeking pirated content nowadays.

Not familiar with LibreELEC? Please know it is a Linux distribution that exists solely to run Kodi. It supports many hardware configurations, including traditional x86_64 for PC and some ARM devices like the Raspberry Pi 4. Following the release of Kodi 19 "Matrix," LibreELEC 10 BETA 1 finally becomes available for download. Sadly, support for the Raspberry Pi 0 and 1 is now discontinued.

Continue reading

ARCTIC launches MX-5 thermal paste

When you are a system builder, there are certain important aspects that can sometimes get overlooked. For instance, many builders will opt for a cheap power supply and then wonder why their system crashes or is unstable. I know a PSU isn't as exciting as a CPU, GPU, or RAM, but it is still an important component.

Another overlooked thing? Thermal paste -- that gooey stuff that sits between your processor and its cooler. True, some CPU coolers come with pre-applied thermal paste nowadays. And yes, that stuff is probably fine for most regular users. If you care about cooling, however, and you plan to overclock or game, you should wipe off that pre-applied junk and apply a better compound.

Continue reading

What we can learn from organizations who flourished during COVID?

When the knock-on effects of the coronavirus pandemic and subsequent UK lockdowns are discussed, much of the focus is on the negative impact on the economy, our physical health, and our mental health. But, while the damaging effects are unlike anything we’ve ever witnessed, it’s not all doom and gloom.

While many businesses have suffered as a result of the pandemic, others have flourished. Exercise equipment, homeware, DIY, and gardening retailers, amongst others, were some of the businesses that flourished during the first national lockdown. When it comes to business-to-business, technology providers, ecommerce sites, video conferencing software solutions, and healthcare providers led the way. So did the companies who tapped into their services.

Continue reading

Public key infrastructure and digital certificates essential to zero trust

Public key infrastructure (PKI) and digital certificates are essential to achieving zero trust architecture according to 96 percent of North American enterprises.

However, only 39 percent use PKI as part of their zero trust security strategy today according to a survey from Pulse Research and PKI as-a-Service (PKIaaS) company Keyfactor.

Continue reading

Businesses more likely to buy from companies offering ongoing security

business security

Technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk are more likely to win business according to a new study from Intel.

The results show 73 percent of respondents say their organization is more likely to purchase technologies and services from technology providers that are proactive about finding, mitigating and communicating security vulnerabilities, while 48 percent say their technology providers don’t offer this capability.

Continue reading

Hypernotes from Zenkit promises to revolutionize the way you share knowledge with others

Say hello to Hypernotes from Zenkit, the third standalone productivity tool from Germany’s Zenkit. The tool follows on the heels of Wunderlist-replacement Zenkit To-Do and Zenchat and is designed to work in conjunction with both tools as well as a standalone app.

The new app's sales pitch is the promise of creating, sharing, and understanding knowledge in a new way. Think of it as a tool for managing knowledge in various forms, from simple notes to complete documentation like a wiki. As with other Zenkit tools, it offers both free and paid-for tiers, and can be accessed through any modern web browser as well as via a cross-platform collection of desktop and mobile apps for offline use.

Continue reading

Why security and observability are key to software development [Q&A]

Developers are under increasing pressure to create real-time products that make the most of a wide range of digital resources.

This means that DevOps teams have to cope with information drawn from all sorts of different sources. But how can they ensure they are getting an accurate picture?

Continue reading

Linux kernel found to have a trio of 15-year-old vulnerabilities that could allow root access

Linux

Linux-based operating systems are generally recognized as being far more secure than the likes of Windows and macOS -- but that's not to say they're without their flaws. Illustrating precisely this is the discovery of no fewer than three vulnerabilities in the Linux kernel that could be exploited to gain root access to a system.

That researchers from cybersecurity firm GRIMM managed to find so many vulnerabilities in the Linux kernel is one thing, the fact that they have lain there undetected for 15 years is quite another.

Continue reading

Netflix has had enough of people sharing passwords

Netflix on laptop and mobile

Netflix has a lot of subscribers, but it has even more users. It is very common for one member of a family or one friend in a group to pay for the streaming service and to share the login details with other people.

Understandably, Netflix is a little tired of people freeloading rather than paying for a subscription. Now the company is testing a feature that could make sharing Netflix passwords a thing of the past.

Continue reading

Microsoft reveals workaround for Windows 10 printing problems and blue screen issues

Windows 10 logo on a beach

This Patch Tuesday, Microsoft released cumulative updates for Windows 10 and there were numerous complaints about problems with printing after installing them.

Users with various brands of printer found that printing failed as they experienced APC_INDEX_MISMATCH errors and blue screens. A few days ago, Microsoft confirmed that it was aware of the issue and was investigating; now the company has come up with a workaround.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.