Latest Technology News

Biometrics trust is in crisis -- is there a path forward for the technology's adoption?

Biometrics’ promise of security and convenience has unfortunately given way to widespread distrust and legitimate security concerns. If you’re unfamiliar with biometrics, think of the last time a customer service call offered you voice authentication or when you used Face ID to unlock your phone -- these are examples of collecting and storing your biometric data.

The rise of AI has undoubtedly made an impact on consumer trust in consumer biometrics, as it’s able to piece together all your biometric data for more nefarious purposes such as identity theft. This should come as no surprise as social feeds are littered with convincing deep fake videos of politicians during this election season.

Continue reading

Transforming pain into profit -- modern end-user computing

In the era of end-user computing, the terms ‘next gen’ and ‘revolutionary’ are commonly used to refer to the shift away from outdated legacy Virtual Desktop Infrastructure (VDI) systems to a modern, cloud-first approach that combines on-premises and cloud environments. End-user computing (EUC) has historically been a costly IT expense, but this hybrid multi-cloud approach is a cost-effective performance booster. Contemporary solutions and strategies, including cloud-first VDI implementation, enable these systems to vastly simplify the construction, operation, and management of EUC environments, and revolutionize end-user computing.

IT leaders often face significant challenges when adopting a hybrid multi-cloud strategy, primarily due to the intricate nature of managing different private and public clouds. These complexities are further exacerbated by ongoing issues stemming from legacy VDI systems. In order to turn this source of frustration into a source of proficiency and profit, CIOs and IT leaders must look to modernize their approach.

Continue reading

How will Apple's sideloaded apps impact corporate IT? Analyzing the critical risks

Hand holding an iPhone showing an Apple logo on a green background

Apple is known for maintaining high standards when it comes to the App Store. It has put strict developer guidelines in place, runs a thorough review process on new apps that are submitted to the marketplace, and monitors apps to ensure they deliver what developers promise.

This tightly controlled environment has been established to maintain a great user experience, preserve end-user privacy, and protect the platform from bad actors, all while allowing third-party developers to create compelling experiences on Apple’s mobile platforms. Apple’s operating system design, coupled with these protective policies, has helped to keep the iPhone and the applications that run on it generally immune from widespread threats for almost two decades now.

Continue reading

Gentoo Linux partners with Software in the Public Interest (SPI)

Gentoo Linux has become an Associated Project of Software in the Public Interest (SPI), following a formal invitation by SPI’s Board of Directors. SPI is a non-profit corporation dedicated to supporting open source software and hardware projects by providing fiscal sponsorship services such as accepting donations, holding funds and assets, and more. Importantly, SPI holds a 501(c)(3) status in the U.S., meaning donations made to SPI and its supported projects are tax-deductible for U.S. donors.

Gentoo Linux excels as a Linux distribution but has faced challenges in maintaining its non-profit status in the U.S. The Gentoo Foundation, while a non-profit in New Mexico, is considered a for-profit entity at the federal level. Transitioning directly to a federally recognized non-profit would be complex and costly.

Continue reading

Women face exclusion from cybersecurity roles

women in cybersecurity

A new report uncovers widespread gender disparities in the cybersecurity workplace, with women encountering exclusion at twice the rate of men.

The study -- from Women in CyberSecurity (WiCyS), a non-profit organization dedicated to the recruitment, retention and advancement of women in cybersecurity, in conjunction with with DEI firm Aleria -- finds the top four categories of exclusion faced by women are: respect, career and growth, access and participation, and recognition.

Continue reading

Auto industry is prime target for email attacks

The automotive industry has become a popular target for business email compromise and vendor email compromise attacks, according to new research from Abnormal Security.

Between September 2023 and February 2024, BEC attacks against businesses in the automotive industry increased by 70.5 percent. Over the same period 63 percent of Abnormal Security customers in the automotive industry experienced at least one VEC attack.

Continue reading

Meta adds HD photo support, 100MB files and collaborative shared photo albums to Messenger

Messenger shared photo albums

Meta has announced a quartet of new features for Messenger all aimed at improving the file sharing experience. Kicking things off is the ability to send high-definition photos to ensure that quality is retained.

This is a change that will please many users, but the other additions are arguably more interesting. There is not only support for the sending of significantly larger files than has been possible thus far, but also a new shared album feature that enables chat participants to collaborate on a photo album. There is also the new option to add people to your Messenger contacts using QR codes.

Continue reading

Microsoft releases Windows 11 Moment 5 and fixes scores of vulnerabilities with KB5036893 update

Windows 11 on convertible laptop

Windows 11 Moment 5 is now available to everyone. Microsoft has released the KB5036893 update as part of its monthly update schedule, bringing the new Moment 5 features to all users, not just Windows Insiders.

As well as updating Snap Layouts and Copilot, KB5036893 also includes changes to widgets and injects AI features into Photos and Clipchamp. There are also fixes for a huge number of security issues.

Continue reading

Why you should worry more about SaaS than generative AI [Q&A]

SaaS

There's a lot of talk at the moment about how the use of AI opens up businesses to additional risk. But is AI itself the issue or is it the way in which it's integrated with other applications?

We talked to Ran Senderovitz, chief operating officer of Wing Security, to discuss how enterprises need to re-prioritize their security to address the real attack surface, the SaaS apps that leverage AI.

Continue reading

Microsoft brings Blizzard Entertainment games back to China

Blizzard Entertainment, Microsoft Gaming, and NetEase have announced a renewed publishing deal that will see beloved video game titles return to the Chinese market, starting this summer. The agreement marks the continuation of discussions over the past year and signifies a commitment to once again support players in mainland China.

The renewed publishing agreement includes popular games that Chinese players had access to under the previous agreement, such as World of Warcraft, Hearthstone, and other titles in the Warcraft, Overwatch, Diablo, and StarCraft universes.

Continue reading

Canonical unveils Ubuntu Pro for Devices: Enhancing IoT security and compliance

Canonical, the publisher of Ubuntu Linux, has announced the launch of Ubuntu Pro for Devices, a new subscription service aimed at simplifying security and compliance for IoT device deployments. The service provides 10 years of security maintenance for Ubuntu and thousands of open source packages, including Python, Docker, OpenJDK, OpenCV, MQTT, OpenSSL, Go, and the Robot Operating System (ROS).

Ubuntu Pro for Devices offers device management capabilities through Landscape, Canonical’s systems management tool, and access to Real-time Ubuntu for latency-critical use cases. The subscription is available directly from Canonical and through a range of original device manufacturers (ODMs) in Canonical’s partner ecosystem, such as ADLINK, AAEON, Advantech, and DFI.

Continue reading

TRIBIT launches XSound Plus 2 portable Bluetooth speaker

TRIBIT has launched its XSound Plus 2 Portable Bluetooth Speaker, an upgraded iteration of the MaxSound Plus. The new model boasts several enhancements over its predecessor, including an additional 6W of power, an extended playtime of 4 hours, Bluetooth 5.3, the introduction of Party Mode, and full compatibility with the TRIBIT App for customizable sound preferences.

The XSound Plus 2 is equipped with 30W Twilight sound, featuring neodymium full-range drivers that produce a wider frequency response compared to traditional magnets. This ensures crisp clarity in every audio experience. The advanced DSP and amplifiers, along with the XBass patented algorithm, elevate wireless listening to new heights.

Continue reading

Insider threats linked to nation states increase 70 percent

Insider threat

Insider threats are usually thought of as being down to disgruntled or careless employees, but a new report from risk management specialist DTEX finds insiders have never been more vulnerable to interference from nation state actors.

The report, by the DTEX Insider Intelligence and Investigations (i3) team, based on more than 1,300 investigations within DTEX's global customer base, finds investigations into insider threats from nation-states and foreign interference increased 70 percent since 2022, mainly within critical infrastructure and public sector.

Continue reading

Logitech launches G PRO X 60 LIGHTSPEED gaming keyboard

Logitech has launched the G PRO X 60 LIGHTSPEED, a compact gaming keyboard designed for professional gamers. The keyboard’s 60 percent form factor is preferred by some gamers for its space-saving design, allowing for more room for mouse movements essential in FPS competitions.

To address the limitations of smaller keyboards, Logitech has developed KEYCONTROL technology, enabling gamers to assign multiple functions to each key, offering extensive customization options. This technology, combined with G-SHIFT, allows players to access a new layer of keys, providing quick access to essential commands. The addition of KEYCONTROL is aimed at ensuring that gamers do not miss any critical keys during gameplay.

Continue reading

Quantum threat highlights need for digital trust

With the National Institute of Standards and Technology (NIST) expected to finalize post-quantum cryptography (PQC) standards in the second half of 2024, a new report from Keyfactor explores the challenges that create barriers to building a strong foundation of digital trust.

It finds that only 23 percent of organizations have started work on PQC, with 36 percent expecting to start after the first release of standards later this year. Another 25 percent of organizations will begin implementing PQC when standards are finalized.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.