Latest Technology News

Microsoft releases Windows 10 Build 19645 with changes to Linux kernel servicing

It’s been a couple of weeks since Microsoft began rolling out the Windows 10 May 2020 Update, and it’s fair to say progress has been slow, with more issues coming to light.

Still, it’s full steam ahead on Windows 10 development as the software giant today releases a new build for Insiders on the Fast ring.

Continue reading

ADATA launches XPG PRIMER RGB gaming mouse

When you think of gaming mice, your mind probably conjures images of brands such as Logitech G or HyperX, am I right? That is totally understandable. However, there are many other companies manufacturing these types of mice nowadays. Believe it or not, even ADATA is making gaming mice and keyboards under its XPG enthusiast brand.

Today, ADATA unveils its latest such pointing device. Called "XPG PRIMER," this optical gaming mouse is wired, so you don't have to worry about replacing batteries. And of course, as a gaming product, the XPG PRIMER has customizeable RGB lighting too.

Continue reading

Protocol flaws leave 5G and other mobile networks open to vulnerabilities

5g smartphone

Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.

Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.

Continue reading

Secure access solution delivers SD-WAN connectivity for remote workers

Home network

Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.

Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.

Continue reading

How Artificial Intelligence is escalating in cybersecurity

When progressive technologies start to deliver on their potential, we can expect a wholesale shift of vendors looking to get on the bandwagon. First the technology enthusiasts and early adopters will come to validate the promises of the newest technology and hone its potential into something viable for the mainstream. Once that is done, the early majority, late adopters and finally, even the skeptics jump in as well.

Finally the time is here for Artificial Intelligence and Machine Learning (AIML) in cyber. There is a widespread move out of the early adopter stage and into the early majority stage of adoption. We need to get onboard if we are going to thwart cybercriminals. The good news is that the industry is recognizing the power and the value of AIML and is finally making investments in this space.

Continue reading

Microsoft partners with NTT DATA to boost public cloud for digital transformation

digital transformation

Businesses are increasingly looking to bring about digital transformation through agile system integration utilizing cloud computing and other technologies.

NTT DATA is expanding its alliance with Microsoft to bring together NTT's global IT services with Microsoft's cloud to help digital transformation projects using Microsoft Azure as a preferred cloud solution.

Continue reading

AI and what it means for humanity

2084 book cover

We hear a lot about what artificial intelligence means for business and research, how it can speed up and streamline tedious processes and so on.

But if machine intelligence is going to be our new normal how does that affect what it means to be human? Emeritus professor of mathematics at Oxford University, John C. Lennox has written a new book exploring these questions. In this exclusive extract he looks at how our brains compare to computers.

Continue reading

The impact of open source on security [Q&A]

DevSecOps

Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.

One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.

Continue reading

60 percent of organizations expect to suffer attacks by email

Malicious email

Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.

Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.

Continue reading

Executives believe their companies will benefit from 'continuous intelligence'

intelligence

New data released today by Sumo Logic highlights increasing demand for a new category of software called 'continuous intelligence' among C-level executives.

Continuous intelligence allows organizations to more rapidly deliver reliable applications and digital services, protect against modern security threats, and consistently optimize their business processes in real time.

Continue reading

Vectra integrates threat detection with Microsoft security

web threats

Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.

Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.

Continue reading

Security priorities change as businesses adapt to 'new normal'

home working

A new study from Check Point looks at how organizations have managed their cyber-security during the recent lockdowns and also their security priorities and concerns over the coming months as they move to the 'new normal.'

Over 86 percent of respondents say their biggest IT challenge during the pandemic was moving to mass remote working, and the biggest security concern (62 percent) was maintaining VPN capacity for staff.

Continue reading

Remote working and obsolete devices increase security risks

Network

The move to cloud applications is leading many businesses to slow down investment in their in-house networks. This combined with a surge in home working is putting a strain on network security and infrastructures.

A new study from technology services company NTT Ltd finds 45.6 percent of organizations' network assets in Europe are aging or obsolete, as a weighted average, representing a huge surge on 2017, when this figure was just 12 percent.

Continue reading

You will soon be able to request Twitter verification

Twitter Verified account

The coveted blue tick of verification is the goal of many Twitter users, and for a very long time the social media company has closed off the request system that existed.

Having used a secretive system to determine whether an account is deemed worthy of being verified or not, Twitter is now going to bring a "Request verification" option into its apps. The feature is currently undergoing development, but Twitter confirms that there is a new system in the works.

Continue reading

Kaspersky launches free online talks to spread cybersecurity knowledge

Webinar conference call

Kaspersky has announced that it's launching a series of online talks, created to present knowledge and the latest cybersecurity findings, freely accessible to anyone with an internet connection.

Titled 'GReAT Ideas. Powered by SAS' the events will be hosted by Kaspersky's Global Research and Analysis Team (GReAT), which works to uncover APTs, cyber-espionage campaigns, major malware, ransomware, and underground cybercriminal trends around the world.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.