Apple unveils M1-powered Macs, and Microsoft Windows 10 is the big loser


ARM is the future of computing -- there's a reason Microsoft keeps trying to switch Windows to the new architecture. Unfortunately, Windows on ARM has not been a success, as consumers have largely rejected Microsoft's attempts. I have a Surface RT tablet that I keep in a drawer which serves as a constant reminder of what could have been.
Apple is in the midst of this switch with Mac, but it looks to have a huge success on its hands. Why? Because the iPhone-maker developed its own chips rather than just work with partners. More importantly, Apple has a very precise plan on transitioning, and consumers seem to be on board.
Plugable launches TBT3-UDZ Thunderbolt 3 and USB-C Docking Station with 100W PD


There are so many docks and docking stations nowadays, that it can be hard to get excited about them. Look, I get it, they all pretty much do the same thing -- turn your laptop into a desktop while also charging it. The thing is, not all of them are created equally. In fact, some are much better than others.
With all of that said, Plugable has a new vertical docking station that is absolutely worth your attention. Called "TBT3-UDZ," it is compatible with both Thunderbolt 3 and USB-C computers thanks to its use of Intel's Titan Ridge chipset. I am happy to say it has both an SD card reader and microSD card reader on the front -- something often omitted from docks nowadays. Thankfully, the host port is on the rear, so there is no ugly wire hanging off the front. And yes, it offers 100W power delivery.
The challenges of video conferencing interoperability


It’s a scenario we all know too well and one that has happened in workplaces around the world. As colleagues gather together in the boardroom to start an important video meeting with a client, they’re stopped in their tracks when they realize they are waiting in a Microsoft Teams Room and the client is on Google Meet.
Then the IT department find themselves on the other end of frantic calls and the inevitable question -- 'How do we get this to work?' This can be a frustrating experience, especially for organizations that have invested in expensive hardware or unified communication services.
System76 refreshes the Galago Pro and you can buy the affordable Linux laptop now


The current trend for laptops is to have them be as thin as possible. I suppose we have Apple to thank for that -- its designers often focus on form over function. As a result, many computers are missing useful ports, such as Ethernet, HDMI, and USB-A. This causes consumers to spend extra money on USB-C docks, adapters, and dongles. Thin machines often have deficient cooling too, which can lead to throttling and an overall negative impact to performance.
And that's why I love the design of System76's newly refreshed Galago Pro -- one of the company's most popular Linux laptops. The affordable Galago Pro isn't thick by any means, but it's really no thicker than it needs to be. You see, the chassis can accommodate the ports that many depend on, such as the aforementioned Ethernet, HDMI, and USB-A.
Shift to remote work drives overhaul of enterprise access technology


This year's massive and sudden shift to remote working has boosted the adoption of cloud technology and the security implications of this transition will reverberate for years to come, according to the latest Trusted Access report from Cisco company Duo Security.
Daily authentications to cloud applications surged 40 percent during the first few months of the pandemic, the bulk of these coming from enterprise and mid-sized organizations looking to ensure secure access to services.
Watch Apple's 'One More Thing' event here


Apple is hosting a new hardware event today using "One More Thing" as its tagline. The Coronavirus pandemic means that -- like events earlier in the year -- this one is pre-recorded and has no audience… but what can we expect to see launched in Cupertino, California?
We are all but certain that this event will be the one at which Apple unveils new models of MacBook Air and MacBook Pro powered by its own custom silicon. But to find out everything about the company's switch to ARM, you'll have to tune in.
DDoS attacks become smarter and easier to carry out


Although ransomware has dominated 2020's cyber threat landscape, DDoS attacks haven’t gone away. In fact the year has seen the largest DDoS attack ever recorded, peaking at 2.3 Terabytes per second.
The attack was carried out by deploying hijacked CLDAP (Connection-less Lightweight Directory Access Protocol) web servers and caused three days of downtime for the unnamed targeted business. This is one of the things highlighted in new analysis from Digital Shadows.
PowerArchiver 2021 adds new viewing and editing tools to Windows release


ConeXware has unveiled a major new version of its trialware archiving tool for Windows users with the release of PowerArchiver 2021. For the first time, PowerArchiver 2021 is also available for macOS too, although this release does not (yet) boast all the features of its Windows cousin.
Version 20.0.58 for Windows unveils tools to help view and edit files within archives without extracting them, plus promises improvements to its Pro edition-only PowerArchiver Cloud feature, and adds some welcome new tools to the Action menu.
Microsoft is going to forcibly upgrade systems running old versions of Windows 10


It is only a month until Windows 10 version 1903 reaches end of service. When December 8 rolls around, any systems running this version of the operating system will no longer receive security updates.
But Microsoft has a solution to ensure that there are not millions of unsecured computers out there -- forcibly upgrading them to a newer, supported version of Windows 10.
KIOXIA unveils XG7 NVMe PCIe 4.0 SSD


Solid state drives continue to get faster, with PCIe 4.0 variants leading the pack nowadays. Of course, most PCs don't have PCIe 4.0 support, so these ultra-fast drives are reserved for enthusiasts and those with brand new computers.
If you have such a cutting-edge PC, you will probably want to get a PCIe 4.0 SSD to maximize your performance. True, it is largely for bragging rights and benchmarks -- you probably won't notice a difference in actual use -- but still, you might as well go for the best if the difference in price isn't totally obscene.
Delivering value to a remote workforce: A practical approach


The overnight switch to remote working triggered by the COVID-19 pandemic has caused an unprecedented amount of change to the usual ways of working. The impact will continue to be felt for the foreseeable future -- and as a result, IT departments’ approach to delivering services to their organizations will need to keep pace with the evolving requirements of this newly remote staff.
To that end, IT needs to embed itself deeper in the organization to understand the unique requirements of every single stakeholder -- be it the C-suite or the manager answering the customer call -- so that those professionals can do their jobs effectively, enabling the business to realize its strategic goals. In practical terms, what does this mean? How can IT departments put these tactics into practice in their enterprises?
Redefining Security post-pandemic: Empowering change control in the new normal


Amid the COVID-19 pandemic, remote working has added a new dimension to the security, compliance, and digital transformation demand landscape. Now, more than ever, it is increasingly important for organizations to embed security solutions and processes that reduce complexity and massively increase the automation of killer manual tasks.
Last month, our team at New Net Technologies had the opportunity to host a virtual panel on securing digital transformation and what COVID-19 means for cybersecurity as we continue to navigate the growing remote workforce. The panel, which consisted of several security experts, focused on the topic of redefining security in a post-pandemic world. The session kicked off with the question, 'Have you noticed a more compliant workforce?'.
The importance of TLS/SSL decryption in a zero-trust model


With upwards of two-thirds of UK adults set to work remotely for the remainder of this year, it’s clear that the pandemic will create a larger attack surface, and increase opportunities for cyber criminals. In effect, the enterprise perimeter has not only expanded but it has also become much more distributed.
Likewise, modern cyber attacks are not just limited to network intrusion from the outside. Internal threat actors can often be found at the center of sophisticated attacks. Therefore, today, threats come from both inside and outside the organization, via the business partner and supplier ecosystem, and through employees working remotely. This means we need to re-assess and re-think the way we defend our networks, users and data. For example, organizations will need more support around connecting and managing BYOD devices on the home network, including sharing of policies and tools around sensitive data, which could be accessed via insecure Wi-Fi. Additionally, with ransomware, phishing and DDoS attacks growing exponentially, they will also be looking for technologies that enable them to protect networks from cyber attacks, especially those that threaten network availability.
Western Digital WD Blue SN550 NVMe SSD now available in 2TB capacity


It was damn near a year ago when we told you about the Western Digital WD Blue SN550 NVMe SSD. This drive was very fast thanks to its PCIe 3.0 interface. In fact, the drive could achieve an impressive 2,400 MB/s read. It was a no-nonsense SSD that provided excellent performance at a competitive price. For instance, the 1TB model can be had here for under $100.
Unfortunately, that 1TB variant was the top capacity, with the other two being 250GB and 500GB. What if you needed more than a terabyte of storage? Thankfully, starting today, the WD Blue SN550 NVMe SSD now comes in 2TB -- double the previous top capacity.
The rise of the shopping bot and what it means for security teams [Q&A]


If you've ever tried to order a recently released tech product, like a new game console or the latest hot graphics card only to find it's sold out, you've no doubt felt frustrated. It's even more frustrating when the product then appears on secondary market sites at many times the original price.
What you're seeing here is probably the action of automated shopping bots that scoop up products for resale at a profit. Is this a form of cyber attack or is it just rather shady commercial activity? We spoke to Ameya Talwalker, co-founder of Cequence Security, to find out more about the behavior of these bots and what can be done to curb their activity.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.