Latest Technology News

You can track Santa Claus again this Christmas with Google

Santa Claus is absolutely real; he lives in the hearts and minds of all true believers of Christmas. Is it possible for one man to deliver gifts to every house in the world in one night? Under normal circumstances no, but Santa Claus is magic -- you must throw all logic and science out the window.

Need proof that Santa Claus is real? Every year, Google provides a way to track the jolly fat man as he makes his journey around the world. Yes, Google's official Santa Tracker is an annual tradition, and in 2019, it continues. As usual, the search giant delivers activities beyond mere tracking, such as an interactive Santa Village. This year, there is a holiday-themed bedtime story for kids called "Ollie Under the Sea." There is even a very cool augmented reality Santa Claus you can summon by searching for "Santa Search" on mobile and clicking the "3D" button.

Continue reading

Windows 7 users will still get updates to Microsoft Security Essentials when the OS is out of support

Windows 7 close up

It's now mere weeks until Windows 7 is no longer supported by Microsoft. When January 14, 2020 rolls around, the end date for support will have been reached, and Microsoft is keen for people to upgrade to Windows 10 to avoid having insecure computers that don't receive updates.

But not all security updates are being dropped. Having previously said that Microsoft Security Essentials would no longer receive updates when Windows 7 support ends, the company has indicated that updates will in fact continue to be released.

Continue reading

Security concerns and the benefits of 5G -- IoT and edge predictions for 2020

2021 predictions

Internet of Things devices are now an accepted part of our home and business lives. They've led to increased focus on edge computing too thanks to the large volumes of data they generate, but what do industry experts think is going to happen in this sector in 2020?

Karl Sigler, threat intelligence manager at Trustwave SpiderLabs thinks the dev-security lifecycle will become the Achilles heel for IoT devices. "IoT devices are not getting any safer. With the huge influx of IoT devices in homes and organizations, the attack surface targeted by criminals is just getting larger and more diverse. Manufacturers and developers need to take the security reins. But today's IoT solutions are often missing security quality assurance during their product development lifecycle. High bandwidth, direct connections to the internet via 5G will increase the threat of Mirai-like botnets. These direct connections will also provide attackers the ability to bypass perimeter protections that are normally in place in homes and organizations. All manufacturers should add security vetting to their product development lifecycle, especially with the cloud and 5G in mind, to get IoT device security in check before the number of vulnerable devices in the market becomes overwhelming."

Continue reading

The New Year will see a transformation in email security

Holding email icon

Email is suffering an identity crisis. Email’s core protocols make no provisions for authenticating the identities of senders, which has resulted in a worldwide spearphishing and impersonation epidemic, leading to billions of dollars in monetary losses, security mitigation costs, and brand damage. As a result, email security will be a central theme in the new year, both as a source of threats as well as an increasingly urgent issue for cybersecurity professionals to address.

In 2020, we will see email security prove itself to be a weak link in election security as well as corporate security. At the same time, Domain-based Message Authentication, Reporting and Conformance (DMARC) will gain popularity across several industries, driven both by the need to eliminate domain spoofing, and by the desire for brands to take advantage of Brand Indicators for Message Identification (BIMI), a new standard that requires DMARC. Email authentication works -- but it’s up to domain owners to take advantage of it. Increasingly they will do so, as they realize that a failure to proactively defend their domains can leave them vulnerable to convincing exploits from cybercriminals.

Continue reading

Top ERP trends and security challenges for the new year

As we enter the new year, the criticality of securing sensitive data will continue to mold and transform the structure of security strategies across enterprises, resulting in a heightened focus on access control and data-centric investments. With numerous data privacy regulations on the horizon, the cost of data breaches will be more catastrophic for businesses. In 2020, enterprises must invest in proactive strategies that combat the dynamic threats targeting an organization’s most sensitive data.

Enterprises can expect the trend of increased data breaches in ERP (Enterprise resource planning) systems to continue to rise in 2020

Continue reading

Compliance struggles and more legislation -- privacy and data predictions for 2020

2020 keyboard

With the California Consumer Privacy Act (CCPA) set to come into force in January, privacy and how companies use data is set to be one of the big themes of 2020. What do some of the industry’s leading figures think this will mean?

Peter Reinhardt, CEO and co-founder of Segment believes, "Though the GDPR roll-out should have given American companies a good taste of what was to come, it's still likely that most will do the bare minimum to comply with the CCPA until the US government starts enforcing it in 2020.

Continue reading

CISOs will shift their priorities in 2020

crystal ball

Not too long ago, information security was a human scale issue. Because the number of assets to compromise was contained, and because there were only a few attack vectors in the adversarial arsenal, enterprises were able to train security analysts to identify and mitigate threats and vulnerabilities.

Managed endpoints, internal applications, routers, switches, DNS servers and domain controllers compromised the majority of an enterprise’s network presence. In today’s world, mobile devices, cloud applications, IoT, and third party connections to vendors have dramatically grown the enterprise digital footprint. Additionally, adversaries were not nearly as sophisticated as they are today, leveraging only a small fraction of modern day attack vectors. Today’s threat actors have a much larger arsenal of attack vectors to use, including newly discovered vulnerabilities, misconfigured cloud services, and more services and applications exposed to the internet.

Continue reading

ADATA releases XPG Hunter DDR4 RAM for desktops and laptops

There is no shortage of great memory modules these days, with many manufacturers catering to both gamers and enthusiasts. Prices are quite reasonable too, meaning it is possible to build a budget machine with 16GB or 32GB of RAM -- 8GB no longer needs to be the baseline for low-cost gaming machines.

ADATA is definitely a trusted company when it comes to RAM, and its XPG brand is well respected by in-the-know system builders. That manufacturer is giving consumers yet another option when shopping for memory -- its all-new XPG Hunter line of DDR4 RAM modules. Not only capacities ranging from 8GB to 32GB, but there are both U-DIMM and SO-DIMM options, so both desktop and laptop users can get in on the action. Not to mention, they are quite classy-looking too -- the design is attractive without being over-the-top.

Continue reading

Best Windows 10 apps this week

Three-hundred-and-sixty-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Microsoft Store in the past seven days.

Microsoft released the first build from its new development branch this week to the Fast Ring. Fast Ring insiders will always receive the freshest builds from this point on (since Skip Ahead was retired) but features that are introduced are no longer linked to a particular release.

Continue reading

Own an Apple Watch? You need to check out this clever new USB-C charger from Satechi

The Apple Watch is undoubtedly the best smartwatch on the market, but that isn't saying very much. Wearables are often nothing more than a fashion statement masquerading as an essential piece of technology. Consumers have these grand ideas about being more productive and healthy by buying a smartwatch, only to discover the wearable becomes both a notification nuisance and yet another thing you have to charge. Hey, at least it can double as a Roku remote these days...

With all of that said, Apple Watch has many fans, and while the device's battery life has gotten better, it still only lasts a mere day at best -- certainly not weeks. And so, if you are a road warrior, you will need to carry a charger for it in your bag. But what if I told you there was an innovative new Apple Watch charger that makes the official charger look like crap? It's true. Today, popular accessory-maker Satechi releases the very clever USB-C Magnetic Charging Dock for Apple Watch.

Continue reading

Organizations search for tougher cybersecurity measures as APTs run rampant

Advanced persistent threats (APTs) have become aggressive in their attempts to breach organizations’ networks. These malicious actors look to gain unauthorized access to infrastructures for prolonged periods of time so that they can perform various acts including mining and stealing sensitive data. Their ability to evade conventional security measures have allowed them to cause costly data breaches against many businesses.

Hackers have even found ways to intensify their malicious activities. According to an Accenture report, threat actors and groups have now teamed up to conduct targeted intrusions and spread malware. Among them are financially motivated groups such as the Cobalt Group and Contract Crew. These increasing cyberattack threats have prompted companies to toughen up their security. Gartner estimates that security spending will grow to $170.4 billion in 2022.

Continue reading

Cloud predictions for 2020

Multi-cloud environments have been a hot topic for the last year. Already, businesses have been realizing the benefits of a vendor-agnostic approach, which not only minimizes costs but gives them the freedom to innovate. However, there are a couple of aspects of operations which will be key in ensuring multi-cloud remains viable for enterprises in the long-term.

Despite the freedom which comes with a vendor neutral ecosystem, orchestrators haven’t yet overcome the headache associated with migrating workloads between these different cloud infrastructures. The past year saw major cloud players like IBM making acquisitions to address this, but as yet, they haven’t found a successful solution. Over the next year, this will be a priority for enterprises looking to remove the bottlenecks in their CI/CD pipeline. Organizations will invest in services which can help them harness a multi-cloud ecosystem, by supporting fast deployment, scalability, integration and operational tasks across public and private clouds.

Continue reading

Improved business cases, skills shortages and a dark side -- AI predictions for 2020

robot hands crystal ball

Artificial intelligence is making its way into more and more areas of our lives. But what can we expect to see happen in this area in 2020? Some industry experts share their views on the latest AI trends.

Synthetic data specialist ARM Insight believes, "There will be a huge investment return gap between those using basic analytics or simplistic machine learning on data from those that are using true artificial intelligence. Machine learning simply won’t cut it any more. Artificial intelligence will be the only path to maximum data value."

Continue reading

30 percent of Americans not confident they could spot a machine voice pretending to be human

robot voice megaphone

With deepfake voice fraud an increasing threat, new research shows that 30 percent of Americans are not confident they would be able to detect the difference between a computer generated voice and a human one.

The study from ID R&D, a provider of AI-based biometrics and voice and face anti-spoofing technologies, shows only just over a third (36 percent) are confident they could spot a fake.

Continue reading

Ubuntu-based Peppermint 10 Respin Linux distribution available for download

Back in May of 2019, Peppermint 10 was released. The Ubuntu-based operating system is great for those switching from Windows, but also, it makes a fine operating system for Linux experts too. It may not be as popular as, say, Linux Mint, but it is still a solid option.

Today, fans of Peppermint -- and the entire Linux community, really -- have reason to celebrate. No, version 11 of the operating system is not released. However, Peppermint 10 Respin is now available for download!

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.