Latest Technology News

Master Microsoft Excel 2019 with these three free quick reference guides

Excel is a fantastic piece of software, but unlike Word, its Microsoft Office stablemate, it’s not something most people can conquer unaided.

In fact, I’ve seen many people over the years break off from doing something in Excel to add-up figures needed for their spreadsheet using Calculator, which is madness. There are plenty of courses to take, and books to read, which can help you master Excel, but we’ve got an easier route.

Continue reading

Mark Zuckerberg's pact with the Devil

This is a column about Mark Zuckerberg and Facebook, but it starts with an old story about Intel and Monsanto from my book Accidental Empires. Stick with me here and you’ll soon understand why…

There was a time in the early 1980s when Intel suffered terrible quality problems. It was building microprocessors and other parts by the millions and by the millions these parts tested bad. The problem was caused by dust, the major enemy of computer chip makers.

Continue reading

Microsoft releases Windows 10 Build 19042.421 (20H2) to the Beta Channel with theme-aware tiles in Start and much more

Earlier in the week, Microsoft rolled out a new Windows 10 build for Insiders on the Dev Channel, introducing quick access to tabs on pinned sites, the ability to reset UWP apps via PowerShell, and more.

Today, the software giant delivers a new build to those on the Beta Channel (what used to be the Slow ring), with the main new change affecting the Start menu, but there's a lot more than just that.

Continue reading

NTT launches secure solutions for remote working with Teams

remote work

Research from technology services company NTT Data shows that 56 percent of office workers still expect an element of working from home in their jobs even when offices reopen.

The future workplace is likely to involve a blend of working remotely and working in the office. Core to enabling this new hybrid way of working is secure communication and collaboration technology, particularly Microsoft Teams.

Continue reading

Best Windows 10 apps this week

Three-hundred-and-ninety-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Microsoft Store in the past seven days.

Some Windows 10 users noticed after the installation of a recent update for Windows 10 that certain applications, Notepad and Paint in particular, were no longer available on their system. Mark explains how these can be restored here.

Continue reading

Gmail to start showing authenticated brand logos to fight phishing scams

Gmail

The DMARC standard for email verification has been around for several years. Domain-based Message Authentication, Reporting and Conformance has the potential to rebuild trust in email communications plagued by spam and phishing.

Google's announcement this week that it's about to start piloting the display of authenticated brand logos in Gmail could mark the start of the technology's mainstream adoption.

Continue reading

Quickly batch-remove built-in and sponsored apps from Windows 10

Windows 10 comes with a large number of bundled apps, some of which you may find useful, but most of which you’ll never use and which just consume disk space unnecessarily.

There are a number of ways to remove these -- you may be able to do so through the Windows uninstaller, or using a third-party tool. But you usually need to know what the bundled apps are, and then have to go through the process of removing them one at a time, meaning you’ll probably miss a few. Thankfully there’s an easy way to batch-remove all of this unwanted bloat.

Continue reading

How traffic analysis can help protect business networks [Q&A]

Networked computers

One of the biggest challenges that cybersecurity teams face at the moment is alert noise which can blind them to real threats.

Corporate performance management (CPM) specialist Prophix Software recently chose to adopt a network traffic analysis (NTA) solution to address this issue. We spoke to Kristofer Laxdal, the company's director of information security to discover why it chose invest in NTA technology and what benefits it's seeing.

Continue reading

Logitech G and Herman Miller launch $1,500 'Embody' gaming chair

In life, there are luxury items that aren't achievable by the average consumer. For instance, while many people can afford a car, they probably have to settle for a Ford or Kia rather than a Lamborghini or Ferrari. You know what? That's OK. No one ever said life was fair, and ultimately, some people simply have more money than others. And so, there are specific products designed for those with excess cash.

For example, Logitech G has partnered with Herman Miller on a new variant of the existing “Embody” gaming chair, and it is quite expensive. This piece of furniture costs $1,500! Believe it or not, given its quality and features, it doesn't seem to be overpriced either. Embody features seven points of calibration, allowing it it be customized for top comfort. It also has "posturefit technology" where the chair's back conforms to the sitter's spine. Best of all, it ships completely assembled -- there is no need to use tools or follow confusing instructions.

Continue reading

We're too boring to be hacked say millennials

Boring

Research into changing 'digital comfort zones' during the pandemic shows that 37 percent of millennials think they're too boring to be a victim of cybercrime.

The study from Kaspersky finds that millennials are now spending almost two extra hours online every day and almost half say this has made them more aware of their digital security, with 36 percent saying that they should be doing more to strengthen it.

Continue reading

Organizations are not doing enough to improve SOCs

security breach

The average security operations center (SOC) has considerable room for improvement according to a new report from automation and response platform SIRP Labs.

Almost a third (29 percent) of respondents believe missed alerts due to high volumes are a significant, even a serious, problem. In companies of 1,000-2,500 employees the figure rises to 46 percent.

Continue reading

Get 'Mastering Malware Analysis' ($39.99 value) FREE for a limited time

With the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent ransomware attacks. Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches.

You will learn how to examine malware code and determine the damage it can possibly cause to your systems to ensure that it won't propagate any further. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.

Continue reading

Data engineering teams struggle to keep up with demand

stressed overwork pressure

New research from Ascend.io finds that since the onset of the COVID-19 pandemic 78 percent of data professionals have been asked to take on responsibilities outside of their core job function, with 97 percent now signaling their teams are at or over capacity.

The study of over 300 data scientists, data engineers and enterprise architects in the US also reveals that to increase capacity 89 percent of data professionals are turning to automation, low-code, or no-code technologies, with 73 percent citing automation as an opportunity for career advancement.

Continue reading

Cybercriminals use new techniques to target eCommerce sites

Shopping cart key

With bricks and mortar stores largely shut down for much of the first half of 2020, it’s no real surprise to find that cybercriminals have been targeting eCommerce sites.

New research from IntSights looks at how there has been a rise in cybercriminals targeting eCommerce sites using a variety of attack methods, such as skimming attacks, account takeovers and ransomware.

Continue reading

Hackers to the rescue! UFO VPN user log database leaks online for a second time

Stealing password from code

Just a week ago, we covered the news that user log files from the VPN service UFO VPN had been exposed. A database of user data appeared online despite the company's claims of having a "strict no-logs policy".

But while security experts took steps to lock down the data and restrict access to it by the middle of this month, earlier this week it transpired that a second, newer UFO VPN database had appeared online, containing even more data. This time, however, hackers came to the rescue with a coordinated "Meow" attack.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.