Latest Technology News

Get 'Office 2019 All-in-One For Dummies' ($24.00 value) FREE for a limited time

Knowing your way around Microsoft Office requires you to be part mathematician, part storyteller, and part graphic designer -- with some scheduling wizard and database architect sprinkled in. So what do you do if these talents don't come naturally to you? 

Fear not! Office 2019 All-in-One For Dummies fills in the gaps and helps you create easy-to-read Word documents, smash numbers in Excel, tell your tale with PowerPoint, and keep it all organized with Outlook. With additional books covering Access, OneNote, and common Office tasks, this is the only Office book you need on your shelf.

Continue reading

Google funds two Linux kernel developers to focus on security

Linux kernel

Google and the Linux Foundation are prioritizing funds to underwrite two full-time maintainers for Linux kernel security development.

Gustavo Silva and Nathan Chancellor will focus on maintaining and improving kernel security and associated initiatives in order to ensure the world's most pervasive open source software project is sustainable for decades to come.

Continue reading

Is virtual learning the future of work?

The working environment has changed over the past year. Social distancing restrictions mean that many people have been obligated to work from home. This has affected work across many sectors -- particularly when it comes to training.

The Office for National Statistics measured that in April 2020, 46.4 percent of people in employment did some work from home. Of these people, 86 percent did so as a consequence of the pandemic.

Continue reading

Enterprises at risk from malware delivered by cloud apps

Cloud risk

New research shows that the majority of all malware is now delivered via cloud applications, showing how attackers increasingly abuse popular cloud services to evade legacy security defenses, putting enterprise data at risk.

The report from Netskope reveals that 61 percent of all malware was delivered via a cloud app, up from 48 percent year-over-year.

Continue reading

How cybercrime has adapted to the pandemic

A new report from BlackBerry shows that as our digital habits have changed over the past year cybercriminals have become increasingly successful at finding and targeting vulnerable organizations.

The greater adoption of digital offerings has exposed companies to inadequate protections for employees and customers amongst an ever-growing and under-secured attack surface.

Continue reading

A quarter of people use work emails or passwords to login to other sites

Hacker typing username and password

Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.

A new study from automation platform Ivanti surveyed 1,000 Americans working from home during the pandemic on a company-provided computer to examine how consumer and enterprise cybersecurity habits have changed.

Continue reading

How startups can formulate data-driven marketing strategies using AI

You have successfully launched your startup. Great. But don't make the mistake of thinking there is nothing left for you to do. There are many things still needed to run and grow your startup.

Regardless of how good your product is, you have to create an audience and awareness about it. This is where the role of digital marketing comes into play. And Artificial Intelligence (AI) is creating new possibilities in the digital marketing space.

Continue reading

Pandemic sees organizations of all sizes and industries invest in cyber threat intelligence (CTI)

After a year full of unknowns and new normals, knowledge is power. The spike in cyber breaches in the past year, compounded by COVID-related attacks, has only increased the importance of cyber threat intelligence (CTI) in the past year. The 2021 SANS Cyber Threat Intelligence survey, sponsored by ThreatQuotient, explores the state of play in the global use of CTI and outlines why the difficulties of the past year have contributed to the continued growth and maturity of CTI. 

The 2021 survey saw the number of respondents reporting they produce or consume intelligence rise by 7 percent, more notably, this was the first time the number of respondents without plans to consume or produce intelligence was 0 percent, down from 5.5 percent in 2020. Analyzed CTI helps organizations understand the capabilities, opportunities, and intent of adversaries conducting malicious cyber activities. In turn, this paints a picture about how threat actors are targeting an organization’s systems, information, and people. It is this contextual information that helps organizations and individuals respond to threats, understand risks, design better cyber defenses, and protect their organization. 

Continue reading

5 ways to talk about cybersecurity with anyone

Ever tried explaining cybersecurity to someone who isn’t tech-savvy? Just last year, my 67-year-old mother came to me in a fluster because her laptop was hijacked by a full-screen pop-up that looked like ransomware.

Thank goodness I figured out the problem before it got worse. But when you can’t be there 24/7, how do you help those around you understand basic cybersecurity principles so they can stay safe online?

Continue reading

Firefox 86 boosts user privacy with Total Cookie Protection feature

Mozilla has rolled out its now-customary four-weekly update with the release of Firefox 86 for Windows, Mac and Linux. This latest release contains several notable new features as well as a handful of fixes and improvements.

Users gain support for watching multiple picture-in-picture videos simultaneously, there’s improvement to the app’s Print tool, but most noteworthy of all, a new Total Cookie Protection is offered that isolates website cookies so they can’t track users across multiple sites.

Continue reading

New breed of cybercriminal breaches organizations then sells access

money exchange

Entrepreneurial cybercriminals are operating as middlemen by breaching as many companies as possible and then selling on access to the highest bidder rather than infiltrating systems themselves.

New research from Digital Shadows reveals that these 'Initial Access Brokers' are flourishing during the pandemic as employees increasingly log in to systems remotely.

Continue reading

MSI MEG Aegis Ti5 gaming desktop has hardcore specs and futuristic chassis

PC gamers usually come to a fork in the road when needing a new gaming rig -- build one or buy one. While building a PC can be rewarding, sometimes there are pre-built machines that are worth considering instead -- particularly when they are beyond what you can reasonably do yourself.

As an example, today, MSI launches the MEG Aegis Ti5 gaming desktop and it takes things to another level. It is powered by either an Intel Core i7-10700K or i9-10900K CPU and either a GeForce RTX 3070 or 3080 graphics card. What makes this computer unique, however, is its gorgeous chassis -- it looks futuristic. The case even has a special LED dial on the front for quick and easy tweaks.

Continue reading

Cloud misconfigurations take an average 25 days to fix

Weather cloud

On average it takes 25 days for companies to fix cloud infrastructure misconfigurations, according to a new report from cyber resilience specialist Accurics.

The research highlights security risks identified in cloud native environments. It shows that even organizations that establish a secure baseline when infrastructure is provisioned will experience 'drift' over time, when configuration changes occur in runtime, and these take an average of eight days to fix.

Continue reading

Final quarter of 2020 sees massive spike in ransomware

Ransomware sign

The last quarter of 2020 saw a 10,000 percent increase in ransomware activity according to a new report from managed security services provider Nuspire.

The company's latest Year in Review Threat Landscape Report -- sourced from its 90 billion traffic logs -- outlines new cybercriminal activity and tactics, techniques and procedures.

Continue reading

This amazing iPadOS 15 design shows how Apple could revolutionize the iPad

Two years ago, Apple took the decision to create a slightly different version of iOS for its tablet range. iPadOS makes decent use of the additional real estate, with a new home screen and features that allow for multi-tasking and more ways to use Apple Pencil.

If you've ever wished that Apple would go a step further and really make full use of the iPad's larger screen and powerful internals, then take a look at this designer’s incredible vision for iPadOS 15.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.