Latest Technology News

Microsoft releases Windows 10 20H1 Build 18985 with Bluetooth pairing improvements

Work continues apace on the next major feature update for Windows 10, due out next May.

Today sees the release of Build 18985 (20H1) to Windows Insiders in the Fast ring, and it introduces Bluetooth improvements and changes to how optional updates are displayed.

Continue reading

Best Windows 10 apps this week

Three-hundred-and-fifty-three in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Microsoft Store in the past seven days.

The recent update for Windows 10 version 1903 is causing lots of problems including sound issues in games, and network & action center problems.

Continue reading

Huawei unveils Mate 30 Series of Android 10 smartphones -- no Google needed

Earlier today, Huawei unveiled five new phones as a part of the Mate 30 series -- the Mate 30, Mate 30 5G, Mate 30 Pro, Mate 30 Pro 5G, and the Porsche Design Mate 30 RS. They are absolutely gorgeous smartphones with high-end specifications. They are even running the latest and greatest Android 10 operating system. Quite frankly, the beautiful design shows how Apple should have laid out its rear cameras on the iPhone Pro. In fact, while the Mate 30 has a triple camera system like the iPhone 11 Pro, the Mate 30 Pro has four cameras! I guess we can really see which phone deserves its "Pro" moniker!

All models of Mate 30 have a notched display, with the notch being a bit bigger on the Pro and RS models. The Pro and RS models have a 6.53-inch screen (OLED FHD+ 2400 x 1176), while the regular Mate 30 is a bit bigger at 6.62-inch (OLED FHD+ 2340 x 1080). All are powered by the same octa-core processor (2 x Cortex-A76 Based 2.86 GHz + 2 x Cortex-A76 Based 2.36 GHz + 4 x Cortex-A55 1.95 GHz), 16-Core Mali-G76 GPU, and 8GB of RAM -- with the exception of the RS, which has 12GB of RAM. The Mate 30 comes with 128GB of storage, while the Mate 30 Pro has 256GB. The high-end RS gets an insane 512GB. And yes, they all feature an in-screen fingerprint reader!

Continue reading

Roku Ultra and Express get big upgrades

Earlier this month, Apple had a big product unveiling, where it showed off a new iPad, Apple Watch, and three new iPhone 11 models. You know what it didn't reveal? A new Apple TV. This was very surprising, as the company is planning to really push its upcoming Apple TV+ streaming service. You would think an upgraded device for Apple TV+ would make sense, but no, the company laid an egg in that regard.

Thankfully, Roku is happy to keep pushing the envelope and releasing new hardware. Following the previous announcement of the innovative Roku Soundbar, today, the company unveils upgrades to two of its most popular devices -- Roku Ultra and Roku Express. The Ultra is its top of the line device, while the Express is a budget offering for the masses.

Continue reading

Mainframes are a critical element for new technologies like AI and blockchain

mainframe

The death of the mainframe is something that's been widely predicted since the 1990s, but these big guns of the computing world stubbornly refuse to succumb.

New research carried out by Forrester for hybrid services provider Ensono and IT consultancy Wipro shows that 50 percent of organizations will continue with and increase mainframe use in the next two years versus just five percent planning to decrease or remove mainframe activity.

Continue reading

Exchange 2010 end of support: How IT pros can leverage Microsoft’s impending deadline into new business

For businesses that still rely on Microsoft Exchange 2010, the time to upgrade is now.

That’s because on Oct. 13, 2020, Microsoft will discontinue support for Exchange 2010. This end-of-support deadline raises a host of potentially disastrous implications for organizations still using this software. There will be no more technical assistance from Microsoft regarding documentation, phone support or general troubleshooting. There will be no more updates for bug fixes or security patches to protect users and data within Exchange 2010, increasing the risk of ransomware and malicious cyberattacks. Finally, running outdated or unsupported software poses risk for being out of compliance, which can present legal issues for certain businesses depending on their industry’s regulation standards.

Continue reading

Ubuntu-maker Canonical shares top 5 snaps per Linux distribution

All Linux users are the same, right? Oh, hell no! Linux users are a diverse bunch, with differing opinions, tastes, and personalities. In fact, that is probably a contributing factor to the fragmentation of the Linux community. Linux users have lots of options between distributions, desktop environments, and more -- they are not stuck in a box like Windows 10 users.

To highlight how different Linux users can be, Canonical has released some data about the installation of snaps, categorized by distro. It chose six of the most popular Linux-based operating systems for its analysis -- Ubuntu, Debian, Fedora, CentOS, Arch Linux, and Manjaro. It then shared the top five most popular snaps for each distribution.

Continue reading

Disclosing vulnerabilities improves security for everyone

code

According to a new study 90 percent of IT professionals believe disclosing vulnerabilities serves a broader purpose of improving how software is developed, used and fixed.

The survey from application security testing specialist Veracode finds more than a third of companies received an unsolicited vulnerability disclosure report in the past 12 months, representing an opportunity to work together with the reporting party to fix the vulnerability and then disclose it, improving overall security.

Continue reading

The Swiss 5G debacle is giving me a headache

tinfoil hat

This is why we can’t have nice things! Just as Switzerland is on the cusp of becoming a leader in 5G adoption, out pop the crazies to rain on the tiny nation’s wireless parade.

The land of Chalets and Saint Bernards has been aggressively pursuing 5G adoption, with major carriers promising coverage for 90 percent of the population by the end of the year. This includes nearly every city and town, as well as remote locations, like ski slopes and mountaintop resorts. Just this past July, operators finished installing or converting over 300 antenna stations for 5G transmission -- no mean feat given the rugged terrain of the Swiss Alps.

Continue reading

Automated attacks on eCommerce get more sophisticated

eCommerce

The sophistication level of bots attacking eCommerce sites is on the rise according to a new report from cybersecurity company Imperva.

Traffic to eCommerce sites is made up of 17.7 percent bad bots, 13.1 percent good bots and 69.2 percent humans, the findings show, and the bad bots are getting better -- but not in a good way.

Continue reading

Cross-Site Request Forgery: How to protect your app from CSRF attacks

The rise of cyber-attacks in the last few years is stunning. The list of targeted organizations includes big name retailers like Macy’s, social sites like Twitter, banks, hospitals, utility companies, governments, military installations… no organization is exempt from this growing threat.

It’s a massive -- and expensive -- problem to fix. The cyber security market is predicted to grow from $150 billion in 2018 to $250 billion by 2023, to help protect apps and businesses from these risks. One of the most common, yet potentially highly dangerous, risks is known as Cross-Site Request Forgery or CSRF.

Continue reading

New open source tool helps prevent brute force and ransomware attacks

Malware shield

Ransomware attacks are a major problem and they often gain access to systems via brute-force attacks against open and exposed remote access points such as Remote Desktop Protocol.

Cloud-native virtual application delivery platform Cameyo is launching its new RDP Port Shield security technology, along with a free, open source monitoring tool that any organization can use to identify attacks taking place over RDP in their environment.

Continue reading

Information security needs to focus on the human factor

Human factor

Human error has become one of the biggest contributors to data breaches. Organizations have traditionally relied on the effectiveness of technology controls but haven't addressed the fundamental reasons why humans make mistakes and are susceptible to manipulation.

A new report from the Information Security Forum finds that by helping staff understand how these vulnerabilities can lead to poor decision making and errors, organizations can better manage risk.

Continue reading

5G has arrived: What you now need to know

5g smartphone

5G, the latest in mobile technology, strives to make mobile communication better and faster than ever before. However, a challenge 5G has that its predecessors did not, is the amount of devices, not just mobile phones, looking to benefit from the new technology. From smartwatches to internet-connected doorbells to even impending autonomous trucks, each of these devices will be looking to connect to the 5G network.

5G is already in use by several cities across the US with other countries not far behind. In fact, a recently released Ericcson Mobility Report predicted that by the end of 2024, there will be 1.9 billion 5G subscriptions, 35 percent of traffic will be carried by 5G networks and up to 65 percent of the global population could be covered by the technology. So the current questions are not when or what, but who will have access and how secure is it?

Continue reading

Saudi IT providers hit by supply chain attacks

Broken chain

Researchers at cybersecurity company Symantec have uncovered a new threat group dubbed 'Tortoiseshell' that is attacking IT providers.

The research has identified 11 targets, most of them in Saudi Arabia. In two cases hundreds of hosts were infected, probably because the attackers were hunting for machines that were of particular interest.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.