Latest Technology News

Ubuntu-based Linux Mint 20.1 'Ulyssa' BETA is here with Cinnamon, MATE, and Xfce

Back in October, we told you that Linux Mint 20.1 would be named "Ulyssa." There was excitement about this version of the operating system, especially since the developers planned to release it around Christmas. Unfortunately, there was controversy and drama surrounding Ulyssa too, as we learned the Linux Mint developers were foolishly wasting resources on an IPTV player named "Hypnotix."

So here we are -- Christmas is fast approaching, and today, the Ubuntu-based Linux Mint 20.1 'Ulyssa' BETA finally becomes available for download. The pre-release operating system can be had with your choice of three excellent desktop environments -- Cinnamon, MATE, and Xfce.

Continue reading

On January 1 2021, many famous works including 'The Great Gatsby' by F. Scott Fitzgerald will enter the public domain

January 1 is not only New Year’s Day, but also Public Domain Day. This is the day where certain previously copyrighted works enter the public domain, allowing anyone to use or creatively reinterpret them without needing to seek permission or pay a fee.

In 2021, copyrighted works from 1925 will enter the US public domain, and the list of books, movies and songs included is an impressive one. The BBC has even stated that 1925 could well be the greatest year for books, ever.

Continue reading

Prioritizing AppSec and data governance in 2021

For many organizations, the immediate shift to remote work meant IT pros had to manage a hyper-accelerated, mass cloud migration coupled with large-scale SaaS platform rollouts. Daily users of Microsoft Teams, for example, rose from 75 million to 115 million in less than six months. Now that the first tidal wave of digital transformation has passed, IT and security teams should recalibrate and reprioritize application security and data governance in 2021 and beyond.

And while the pandemic has underscored major SaaS platform security concerns, including a rise in sophisticated cyber threats, research indicates many organizations still struggle with the fundamental tasks needed to secure the workforce -- both remote and on-prem. Here are three common mistakes and how to avoid them.

Continue reading

Enabling zero trust for small and medium enterprises [Q&A]

Data cloud lock

The move towards zero trust has been one of the big security stories of 2020, driven by a switch to remote work, but so far it has been largely the preserve of bigger organizations.

Now though JumpCloud has added Conditional Access policies to its Directory Platform, enabling IT admins to adopt zero trust security from the same cloud platform that they use to manage and securely connect users to IT resources.

Continue reading

Windows 8 Remastered Edition is better than Windows 10

Microsoft took a big gamble with Windows 8. Back in 2012 the tech giant believed that touchscreens were the way we’d all be interacting with our devices, and so overhauled Windows to give it a touch-first design and a Start screen in place of the traditional Start menu -- which didn’t go down at all well with the Windows faithful.

Although the company relented and eventually added a Start menu and made various other user-requested tweaks, Windows 8 is viewed by many as one of the worst versions of Windows, which is a little unfair as it had much to recommend it.

Continue reading

New spyware seeks to blackmail Android and iOS users

ransom note

Researchers at mobile device security company Lookout have uncovered a new strain of spyware targeting iOS and Android users in multiple Asian countries.

Called Goontact, it targets users lured to illicit sites and steals personal information stored on their mobile devices in order to carry out sextortion scams.

Continue reading

How to avoid getting caught in ransomware's crosshairs

ransomware key

Paying off a bad actor for successfully implementing ransomware into an organization is the enterprise equivalent of rewarding a bad child who vandalized a home with candy -- but unfortunately, many organizations often have no choice but to pay… and pay a lot.

Technology has enabled asymmetric attacks. In other words, one attacker can federate an attack across many organizations. The attacker needs to get the attack right once -- while the defenders (corporations, governments, hospitals, etc.) need to get their defense right every… single… time!

Continue reading

Microsoft foists the Surface Duo and its chunky bezels on more countries

The Surface Duo is a pretty cool device on paper. If you aren't familiar, Microsoft essentially connected two Android smartphones using innovative hinges. Why did the company do this? Well, the goal was productivity -- having two apps running simultaneously on two displays would be great for business use (and entertainment).

Unfortunately, Surface Duo doesn't just exist on paper -- it is an actual product. And for the most part, it has been panned by critics. Its software is reportedly buggy and the hardware durability is questionable -- the damn thing develops cracks. Its bezels are large and unsightly, making it look very outdated. There are reports that the camera is horrible too.

Continue reading

How APIs are aiding the healthcare industry in the 21st century

api

Without a doubt, the pandemic has accelerated digital transformation initiatives, and, in our new remote working environment, enterprises are focusing on how they can continue to provide seamless digital experiences to consumers. To achieve this, APIs are widely recognized as the oil that fuels our digital world, and different types of APIs power the digital mesh to which we are now all connected. 

Once considered niche, API technology has now become mainstream and is viewed as an integral part of the day-to-day digital landscape. In fact, according to The Forrester Wave: API Management Solutions, Q3 2020 report, "By opening access to digital business capabilities, APIs drive agility to optimise customer experiences, create dynamic digital ecosystems, achieve operational excellence, and build platform business models." 

Continue reading

New account fraud is down partly thanks to selfies

Selfie

New account fraud based on ID verification declined by 23.2 percent worldwide, year-on-year in 2020 according to a new report from AI-powered identity verification specialist Jumio.

Although selfie-based fraud rates were five times higher than ID-based fraud, this shows the growing number of stolen ID documents available on the dark web and, more importantly, the growing need to determine if an ID is authentic and belongs to the user.

Continue reading

Microsoft is making big changes to Settings in Windows 10

Windows key on keyboard

Microsoft has made some very dramatic changes to the look and feel of Windows 10 over the years, and this is not a trend that's set to change any time soon. Continuing its plan to kill off the legacy Control Panel, the company is introducing big changes to Windows 10's Settings app.

The changes will be important to anyone who is keen on customizing or taking control of Windows, giving them two important new options that are sure to be welcomed by power users -- especially those who want to kill off the Task View button.

Continue reading

Software industry turns to crowdsourced security during the pandemic

Online security

Among the many things that have changed in 2020 it's proved to be a record year for crowdsourced cybersecurity adoption, according to Bugcrowd.

Enterprises across all industries have been implementing crowdsourced cybersecurity programs to keep up with the evolving threat landscape. Bugcrowd has seen a 50 percent increase in submissions on its platform in the last 12 months, including a 65 percent increase in Priority One (P1) submissions, which refer to the most critical security vulnerabilities.

Continue reading

DDoS attacks up 287 percent as online gaming and gambling become prime targets

DDoS attack

A lockdown increase in online gaming activity has inevitably attracted attention from attackers, resulting in nearly 77 percent of cyberattacks targeting the online gaming and gambling industries in Q3 of 2020.

The latest DDoS Threat Report from Nexusguard also reveals a huge 287 percent increase in total DDoS attacks in the third quarter compared to the same period last year.

Continue reading

Plugable releases TBT3-UDC3 Thunderbolt 3 and USB-C docking station with 100W PD

There are so many docks and docking stations nowadays, that it can be hard to get excited about them. Look, I get it, they all pretty much do the same thing -- turn your laptop into a desktop while also charging it. The thing is, not all of them are created equally. In fact, some are much better than others.

With all of that said, Plugable has a new docking station that is worth your attention. Called "TBT3-UDC3," it is compatible with both Thunderbolt 3 and USB-C computers thanks to its use of Intel's Titan Ridge chipset. What makes this port so intriguing (beyond its 11 ports) is its 100 watts of power delivery and affordable price -- especially with a limited time coupon.

Continue reading

COVID-19 highlights barriers to zero trust adoption

Login key

With many large enterprises using Active Directory (AD) and Azure Active Directory (AAD) to control user permissions and access, this has become one of first places attackers look for weakness.

Add to this an acceleration of digital transformation projects due to the pandemic and more and more companies are looking to implement zero trust to stay secure. But a new report from One Identity suggests this transition may prove challenging.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.