Microsoft releases Windows 10 Build 19645 with changes to Linux kernel servicing


It’s been a couple of weeks since Microsoft began rolling out the Windows 10 May 2020 Update, and it’s fair to say progress has been slow, with more issues coming to light.
Still, it’s full steam ahead on Windows 10 development as the software giant today releases a new build for Insiders on the Fast ring.
ADATA launches XPG PRIMER RGB gaming mouse


When you think of gaming mice, your mind probably conjures images of brands such as Logitech G or HyperX, am I right? That is totally understandable. However, there are many other companies manufacturing these types of mice nowadays. Believe it or not, even ADATA is making gaming mice and keyboards under its XPG enthusiast brand.
Today, ADATA unveils its latest such pointing device. Called "XPG PRIMER," this optical gaming mouse is wired, so you don't have to worry about replacing batteries. And of course, as a gaming product, the XPG PRIMER has customizeable RGB lighting too.
Protocol flaws leave 5G and other mobile networks open to vulnerabilities


Vulnerabilities affecting mobile and 5G networks are putting industrial equipment, smart homes, and city infrastructure at risk according to a new report.
Produced by Positive Technologies, this is the fourth in a series of reports on the greatest threats and vulnerabilities in the mobile ecosystem. It highlights the cyber security risks to networks that originate with the GTP protocol -- which is used to transmit user data and control traffic on 2G, 3G, and 4G networks.
Secure access solution delivers SD-WAN connectivity for remote workers


Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.
Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.
How Artificial Intelligence is escalating in cybersecurity


When progressive technologies start to deliver on their potential, we can expect a wholesale shift of vendors looking to get on the bandwagon. First the technology enthusiasts and early adopters will come to validate the promises of the newest technology and hone its potential into something viable for the mainstream. Once that is done, the early majority, late adopters and finally, even the skeptics jump in as well.
Finally the time is here for Artificial Intelligence and Machine Learning (AIML) in cyber. There is a widespread move out of the early adopter stage and into the early majority stage of adoption. We need to get onboard if we are going to thwart cybercriminals. The good news is that the industry is recognizing the power and the value of AIML and is finally making investments in this space.
Microsoft partners with NTT DATA to boost public cloud for digital transformation


Businesses are increasingly looking to bring about digital transformation through agile system integration utilizing cloud computing and other technologies.
NTT DATA is expanding its alliance with Microsoft to bring together NTT's global IT services with Microsoft's cloud to help digital transformation projects using Microsoft Azure as a preferred cloud solution.
AI and what it means for humanity


We hear a lot about what artificial intelligence means for business and research, how it can speed up and streamline tedious processes and so on.
But if machine intelligence is going to be our new normal how does that affect what it means to be human? Emeritus professor of mathematics at Oxford University, John C. Lennox has written a new book exploring these questions. In this exclusive extract he looks at how our brains compare to computers.
The impact of open source on security [Q&A]


Open source software is commonly used to save time as it means developers don't end up repeating the same things over and over.
One of the key things about open source is that the source code is open to examination by everyone, In security terms this means it’s open to both the attackers and defenders.
60 percent of organizations expect to suffer attacks by email


Email is still a favorite attack route for cyber criminals a new study reveals, 77 percent of respondents say they have or are actively rolling out a cyber resilience strategy, yet an astounding 60 percent of respondents believe it is inevitable or likely they will suffer from an email-borne attack in the coming year.
Respondents to the Mimecast survey of more than 1,000 IT decision makers cite other worries as data loss (31 percent), a decrease in employee productivity (31 percent) and business downtime (29 percent) due to a lack of cyber resilience preparedness.
Executives believe their companies will benefit from 'continuous intelligence'


New data released today by Sumo Logic highlights increasing demand for a new category of software called 'continuous intelligence' among C-level executives.
Continuous intelligence allows organizations to more rapidly deliver reliable applications and digital services, protect against modern security threats, and consistently optimize their business processes in real time.
Vectra integrates threat detection with Microsoft security


Network threat detection and response company Vectra AI is announcing deep product integration with Microsoft Defender Advanced Threat Protection (ATP) and Microsoft Azure Sentinel to allow enterprises to better protect their networks.
Vectra has also been invited to become a member of The Microsoft Intelligent Security Association, an ecosystem of independent software vendors purpose-built to defend against increasing cyber threats.
Security priorities change as businesses adapt to 'new normal'


A new study from Check Point looks at how organizations have managed their cyber-security during the recent lockdowns and also their security priorities and concerns over the coming months as they move to the 'new normal.'
Over 86 percent of respondents say their biggest IT challenge during the pandemic was moving to mass remote working, and the biggest security concern (62 percent) was maintaining VPN capacity for staff.
Remote working and obsolete devices increase security risks


The move to cloud applications is leading many businesses to slow down investment in their in-house networks. This combined with a surge in home working is putting a strain on network security and infrastructures.
A new study from technology services company NTT Ltd finds 45.6 percent of organizations' network assets in Europe are aging or obsolete, as a weighted average, representing a huge surge on 2017, when this figure was just 12 percent.
You will soon be able to request Twitter verification


The coveted blue tick of verification is the goal of many Twitter users, and for a very long time the social media company has closed off the request system that existed.
Having used a secretive system to determine whether an account is deemed worthy of being verified or not, Twitter is now going to bring a "Request verification" option into its apps. The feature is currently undergoing development, but Twitter confirms that there is a new system in the works.
Kaspersky launches free online talks to spread cybersecurity knowledge


Kaspersky has announced that it's launching a series of online talks, created to present knowledge and the latest cybersecurity findings, freely accessible to anyone with an internet connection.
Titled 'GReAT Ideas. Powered by SAS' the events will be hosted by Kaspersky's Global Research and Analysis Team (GReAT), which works to uncover APTs, cyber-espionage campaigns, major malware, ransomware, and underground cybercriminal trends around the world.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.