Latest Technology News

TEAMGROUP launches T-CREATE EXPERT R31 3-in-1 Card Reader

Today, TEAMGROUP has launched the T-CREATE EXPERT R31 3-in-1 Card Reader. Designed with portability in mind, the EXPERT R31 measures just 8.5 cm and is lightweight, making it easy to carry and access creative content wherever inspiration strikes.

The T-CREATE EXPERT R31 is equipped with a Type-C interface and supports USB 3.2 Gen2x2 specifications, allowing for read and write speeds of up to 2,000MB/s. This means that a 10GB file can be transferred in under 20 seconds, significantly reducing data transfer times and allowing creators to focus more on their creative work.

Continue reading

New Malwarebytes tool lets you see where your data is exposed

With so many data breaches having taken place it's almost inevitable that at least some of your personal information has been exposed online. But finding out exactly what can be tricky.

Malwarebytes is launching a new web portal that gives individuals deep visibility into their exposed personal information, so anyone can easily see where and when a breach compromised their data, types of data exposed, and specific personal data for sale on the dark web.

Continue reading

Large businesses struggle to tackle cyber threats

Large businesses are finding it significantly more difficult to manage their cybersecurity than their smaller counterparts, according to new research from passwordless authentication company IDEE.

Based on a survey of more than 500 IT and cybersecurity professionals within UK businesses, the data reveals that 74 percent of respondents from large businesses (more than 500 employees) believe it has become far more challenging to defend against cyber attacks since the Covid-induced rise of remote and hybrid working.

Continue reading

Native Spectre v2 exploit puts Intel systems running Linux at risk

Ghost

It's been some time since we discussed the initial Spectre security flaw that impacted numerous CPUs, and which was subsequently followed by the Spectre v2 vulnerability. Now there are new concerns following the discovery of the first native Spectre v2 exploit against the Linux kernel.

Researchers from the Systems and Network Security Group at Vrije Universiteit Amsterdam (VUSec) have demonstrated that Intel CPUs running Linux are vulnerable to Native Branch History Injection (BHI). VUSec says its InSpectre Gadget tool can be used to "not only uncover new (unconventionally) exploitable gadgets in the Linux kernel, but that those gadgets are sufficient to bypass all deployed Intel mitigations".

Continue reading

Here are the best new features of Windows 11 Moment 5 -- and why you should install it now right!

Windows 11 tiles

While Microsoft releases updates for Windows 11 every month, some are more significant with others. The company has taken to releasing 'moment' updates from time to time, and these are where more interesting changes and additions are to be found.

Earlier this week, Microsoft released the eagerly awaited Moment 5 update for Windows 11 when it unleashed the KB5036893 update on April's Patch Tuesday. But just what is included in Moment 5, and is it worth installing? In short, there's a lot to be found in the update and, yes, it is definitely worth installing now. Let's take a look.

Continue reading

Google Photos gets FREE editing tools: Magic Eraser, Photo Unblur, and more

Google Photos is set to enhance your photo editing experience with an exciting update. The search giant is bringing a suite of AI-powered editing tools, including the much-loved Magic Eraser, Photo Unblur, and Portrait Light, to all users for free, starting May 15.

Previously exclusive to subscribers, these features will now be accessible to anyone using Google Photos, with no subscription required!

Continue reading

Get 'Cybersecurity and Decision Makers: Data Security and Digital Trust' (worth $142) for FREE

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience.

As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities.

Continue reading

Peace of mind: Cloud is key in scaling systems to your business needs

Cloud bursting through laptop screen

Meeting the demands of the modern-day SMB is one of the challenges facing many business leaders and IT operators today. Traditional, office-based infrastructure was fine up until the point where greater capacity was needed than those servers could deliver, vendor support became an issue, or the needs of a hybrid workforce weren’t being met. In the highly competitive SMB space, maintaining and investing in a robust and efficient IT infrastructure can be one of the ways to stay ahead of competitors.

Thankfully, with the advent of cloud offerings, a new scalable model has entered the landscape; whether it be 20 or 20,000 users, the cloud will fit all and with it comes a much simpler, per user cost model. This facility to integrate modern computing environments in the day-to-day workplace, means businesses can now stop rushing to catch up and with this comes the invaluable peace of mind that these operations will scale up or down as required. Added to which, the potential cost savings and added value will better serve each business and help to future-proof the organization, even when on a tight budget. Cloud service solutions are almost infinitely flexible, rather than traditional on-premises options and won’t require in-house maintenance.

Continue reading

Biometrics trust is in crisis -- is there a path forward for the technology's adoption?

Biometrics’ promise of security and convenience has unfortunately given way to widespread distrust and legitimate security concerns. If you’re unfamiliar with biometrics, think of the last time a customer service call offered you voice authentication or when you used Face ID to unlock your phone -- these are examples of collecting and storing your biometric data.

The rise of AI has undoubtedly made an impact on consumer trust in consumer biometrics, as it’s able to piece together all your biometric data for more nefarious purposes such as identity theft. This should come as no surprise as social feeds are littered with convincing deep fake videos of politicians during this election season.

Continue reading

Transforming pain into profit -- modern end-user computing

In the era of end-user computing, the terms ‘next gen’ and ‘revolutionary’ are commonly used to refer to the shift away from outdated legacy Virtual Desktop Infrastructure (VDI) systems to a modern, cloud-first approach that combines on-premises and cloud environments. End-user computing (EUC) has historically been a costly IT expense, but this hybrid multi-cloud approach is a cost-effective performance booster. Contemporary solutions and strategies, including cloud-first VDI implementation, enable these systems to vastly simplify the construction, operation, and management of EUC environments, and revolutionize end-user computing.

IT leaders often face significant challenges when adopting a hybrid multi-cloud strategy, primarily due to the intricate nature of managing different private and public clouds. These complexities are further exacerbated by ongoing issues stemming from legacy VDI systems. In order to turn this source of frustration into a source of proficiency and profit, CIOs and IT leaders must look to modernize their approach.

Continue reading

How will Apple's sideloaded apps impact corporate IT? Analyzing the critical risks

Hand holding an iPhone showing an Apple logo on a green background

Apple is known for maintaining high standards when it comes to the App Store. It has put strict developer guidelines in place, runs a thorough review process on new apps that are submitted to the marketplace, and monitors apps to ensure they deliver what developers promise.

This tightly controlled environment has been established to maintain a great user experience, preserve end-user privacy, and protect the platform from bad actors, all while allowing third-party developers to create compelling experiences on Apple’s mobile platforms. Apple’s operating system design, coupled with these protective policies, has helped to keep the iPhone and the applications that run on it generally immune from widespread threats for almost two decades now.

Continue reading

Gentoo Linux partners with Software in the Public Interest (SPI)

Gentoo Linux has become an Associated Project of Software in the Public Interest (SPI), following a formal invitation by SPI’s Board of Directors. SPI is a non-profit corporation dedicated to supporting open source software and hardware projects by providing fiscal sponsorship services such as accepting donations, holding funds and assets, and more. Importantly, SPI holds a 501(c)(3) status in the U.S., meaning donations made to SPI and its supported projects are tax-deductible for U.S. donors.

Gentoo Linux excels as a Linux distribution but has faced challenges in maintaining its non-profit status in the U.S. The Gentoo Foundation, while a non-profit in New Mexico, is considered a for-profit entity at the federal level. Transitioning directly to a federally recognized non-profit would be complex and costly.

Continue reading

Women face exclusion from cybersecurity roles

women in cybersecurity

A new report uncovers widespread gender disparities in the cybersecurity workplace, with women encountering exclusion at twice the rate of men.

The study -- from Women in CyberSecurity (WiCyS), a non-profit organization dedicated to the recruitment, retention and advancement of women in cybersecurity, in conjunction with with DEI firm Aleria -- finds the top four categories of exclusion faced by women are: respect, career and growth, access and participation, and recognition.

Continue reading

Auto industry is prime target for email attacks

The automotive industry has become a popular target for business email compromise and vendor email compromise attacks, according to new research from Abnormal Security.

Between September 2023 and February 2024, BEC attacks against businesses in the automotive industry increased by 70.5 percent. Over the same period 63 percent of Abnormal Security customers in the automotive industry experienced at least one VEC attack.

Continue reading

Meta adds HD photo support, 100MB files and collaborative shared photo albums to Messenger

Messenger shared photo albums

Meta has announced a quartet of new features for Messenger all aimed at improving the file sharing experience. Kicking things off is the ability to send high-definition photos to ensure that quality is retained.

This is a change that will please many users, but the other additions are arguably more interesting. There is not only support for the sending of significantly larger files than has been possible thus far, but also a new shared album feature that enables chat participants to collaborate on a photo album. There is also the new option to add people to your Messenger contacts using QR codes.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.