How to enable the secret collapsible grouped tabs option in Chrome 85


The latest update to Chrome has rolled out, and Google has done a lot to improve and evolve the browser. The company says that there are massive improvements to page load times as well as improvements to resource usage by open tabs thanks to Tab Throttling.
But this is not the only change to come to tabs. Google has also made tabs touch-friendly, added tab previews, and introduced a new option to collapse grouped tabs to save space. This last option is currently in beta, however, and you'll have to enable hidden setting to enable it.
New open source API bug detection tool improves application security testing


Software development today usually involves the use of third-party APIs, libraries or frameworks that are complex, rapidly evolving, and sometimes poorly documented.
Security testing solutions company GrammaTech is launching its new Swap Detector, an open-source checker that detects application programming interface (API) usage errors.
Dataguise allows enterprises to report breaches faster and more accurately


Personal data management software specialist Dataguise is launching a new system that enables organizations to report the impact of a data breach faster and more accurately than ever before.
GDPR requires reporting of breaches within 72 hours of becoming aware, and notifying affected individuals without delay. Dataguise is able to extrapolate the number of unique data elements in a data set quickly, with greater than 90 percent accuracy, using a patent-pending approach based on neural network technologies.
IObit Uninstaller 10 promises to remove programs quicker and more thoroughly with its latest update


IObit has released IObit Uninstaller 10, major new update of its uninstall tool for Windows. IObit Uninstaller aims to clean programs (including Microsoft Store apps) more thoroughly from your PC than the apps' own uninstallers by detecting leftover files and Registry entries.
Version 10 promises vastly improved uninstall speeds and better leftover detection, plus improvements to its Install Monitor component. In addition, Pro users gain better bundleware detection, and newly added support for removing over 40 stubborn programs.
Plugable launches elegant USB-C 7-in-1 Hub for Windows, macOS, and Chromebooks


If you buy a new laptop nowadays, there is a good chance it will only have USB-C ports. If you still have older USB-A devices, what are you to do? Yeah, you can buy a USB-C to USB-A dongle, but with multi-port hubs being so affordable, you are better getting one of those. After all, they often have much more value, by offering things like video output and card readers too.
Today, popular company Plugable launches its latest portable USB-C hub (it can also be used at home too, of course). The 7-in-1 hub provides all the things you would expect, like USB-A ports, 4K HDMI, SD card readers, and pass through charging. While it lacks Ethernet, that won't really matter to those that only use Wi-Fi anyway. Best of all, it is extremely affordable -- you can get it right now for less than $25...
Get 'Hands-On AWS Penetration Testing with Kali Linux' ($35.99 value) FREE for a limited time


The cloud is taking over the IT industry. Any organization housing a large amount of data or a large infrastructure has started moving cloud-ward -- and AWS rules the roost when it comes to cloud service providers, with its closest competitor having less than half of its market share. This highlights the importance of security on the cloud, especially on AWS. While a lot has been said (and written) about how cloud environments can be secured, performing external security assessments in the form of pentests on AWS is still seen as a dark art.
Hands-On AWS Penetration Testing with Kali Linux aims to help pentesters as well as seasoned system administrators with a hands-on approach to pentesting the various cloud services provided by Amazon through AWS using Kali Linux. To make things easier for novice pentesters, the book focuses on building a practice lab and refining penetration testing with Kali Linux on the cloud.
New phishing attack tries to steal Office 365 credentials via Box


Researchers at cloud security platform Armorblox have uncovered a phishing attack that seeks to steal Office 365 login credentials.
So far, so predictable. The clever twist here though is that the initial page victims are taken to via the email link is hosted on cloud file sharing service Box, followed by a credential phishing page that resembles the Office 365 login portal.
Edison Mail gives iOS users added phishing protection


Phishing is a problem that shows no signs of going away and indeed the COVID-19 pandemic has seen a new raft of malware and fraudulent emails seeking to trick the unwary.
Edison Software is launching a new AI-based email security subscription plan that can be added to the Edison Mail iOS app to help combat the threat.
Legacy tech holds back modernization efforts


A new study of over 400 technology leaders in the US, UK and Germany shows that 80 percent of organizations are struggling to reach application delivery requirements with their existing infrastructure.
However, even with the other challenges of 2020, efforts to modernize networks and applications to address this challenge are accelerating with 83 percent reporting budget increases for these initiatives over the next three years.
Lazarus Group hackers target cryptocurrency in global campaign


Researchers at F-Secure have uncovered a targeted, advanced attack on a cryptocurrency organization which they have linked to the Lazarus Group, and believe is part of a global, and financially motivated, hacking campaign.
Lazarus has been linked to the now infamous WannaCry attacks of 2017. This latest report identifies the tactics, techniques, and procedures (TTPs) used during the attack, such as spearphishing via a service (in this case, using LinkedIn to send a fake job offer tailored to the recipient’s profile).
Apple donating money to National Park Foundation


President Theodore Roosevelt is largely responsible for kick-starting the national parks movement in America, and we should all be thankful for his thoughtfulness and focus on conservationism. Sadly, these parks are often under attack, most recently by the Trump Administration. Of course, it shouldn't be surprising that a real estate mogul would be a threat to protected land. Hell, if Trump had his way, the national parks would probably be filled with tacky condominiums!
If you want to help protect these parks, all you have to do is buy an Apple product! You see, starting on 8/24 (today) and running through 8/30, the iPhone-maker will donate $10 to the National Park Foundation for every purchase made using Apple Pay at a physical Apple Store, on Apple.com, or with the official Apple Store app. Yeah, depending on how you look at it, they are essentially donating your money and taking the credit. This is to celebrate the 104th birthday of the USA's national parks, which occurs on 8/25. Money aside, the company is also helping people learn more about these national treasures.
Celebrate 25 years of Microsoft Windows 95 by running it on Windows 10, macOS or Linux -- here's how


If you’re looking for a way to feel particularly old, the news that Windows 95 was released a quarter of a century ago today should do it. You can read my recollections of its launch here.
If that’s not enough nostalgia for you, why not experience Microsoft’s game changing OS for yourself, by running Slack developer Felix Rieseberg’s app version.
Windows 95 launched 25 years ago today... and I hated it


I first started writing about computers for a living in 1993, when I joined a UK magazine called PC Home. Back then we used Windows 3.11 and MS-DOS, and much of our online life was spent on CompuServe, although the World Wide Web (and the "information superhighway") was slowly starting to make its presence felt.
After I’d been in the job for a couple of years, Microsoft announced a new version of its OS: Windows 95. The launch event was held on a 12-acre sports field in Redmond. Over 500 press representatives attended, along with 2,000 computer industry heavyweights. Over 70,000 others watched live worldwide via satellite television feeds. The new OS was hugely different to 3.11 -- being 32-bit for starters, integrating DOS and Windows and boasting a smart new look that included a desktop, taskbar and Start button. And I absolutely hated it.
Botnet and exploit activity increases as attackers shift tactics


Botnet and exploit activity have increased over the course 2020's second quarter by 29 percent and 13 percent respectively, representing more than 17,000 botnet and 187,000 exploit attacks a day.
The latest Quarterly Threat Landscape Report from managed security services provider Nuspire also reveals a shift in tactics as attackers pivot away from COVID-19 themes, instead using other prominent media themes like the upcoming US election and exploiting the Black Lives Matter movement.
Why the IoT presents major data challenges [Q&A]


Internet of Things (IoT) devices are generating huge volumes of data and that represents a challenge for organizations when it comes to processing and storing it.
We spoke to Karthik Ranganathan, CTO of the company behind the distributed SQL database YugabyteDB, to find out how businesses can cope with the complexity and performance issues that handling IoT data and its associated metadata raises.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.