Latest Technology News

Bose launches new QuietComfort Earbuds with enhanced noise cancellation and wireless charging

Bose is expanding its QuietComfort line with the launch of its new, designed for everyday use. Available for $179 here, these earbuds offer top-tier audio performance, featuring the company's renowned noise cancellation technology. Available in Black, White Smoke, and Chilled Lilac, they are available for purchase now.

The QC Earbuds come packed with features, including customizable tap controls, voice commands, and a wireless charging case. With up to 8.5 hours of battery life, they promise to keep you connected throughout the day. The wireless charging case provides an additional 2.5 charges, with a 20-minute quick charge delivering up to three hours of listening time. The buds also feature Bluetooth 5.3, providing a range of up to 30 feet and multipoint connectivity for seamless switching between devices.

Continue reading

KeyBudz Covert Mount offers ultimate protection for your Apple AirTag

If you want to track your valuables without worry, the KeyBudz Covert Mount for AirTag is a top-tier solution. Crafted from fiberglass-reinforced copolymer, this mount can withstand extreme environments, including submersion in water and harsh temperatures. Designed for adventurers and everyday users alike, this durable accessory promises to keep your AirTag secure in the toughest conditions.

What truly sets the Covert Mount apart is its IP-68 waterproof rating. This rating means the mount can be submerged underwater for over 60 days while maintaining a firm grip on various surfaces, thanks to the included 3M VHB adhesive. The adhesive ensures a reliable, permanent hold on a range of materials, including metals, glass, plastics, and painted surfaces. Whether you're attaching it to your bike, electric scooter, skis, or even construction equipment, the Covert Mount has you covered.

Continue reading

Aluratek PicStick transforms any TV into a wireless digital photo frame

Aluratek has introduced the PicStick Wireless HDTV Photo and Video Viewer, a device that effectively transforms any HDTV into a digital picture frame. The PicStick offers a wireless solution for sharing and displaying photos and videos on a larger screen. By connecting the device to an HDTV’s HDMI port and using the Frametime app, users can easily transmit media from smartphones, tablets, or computers, making it a practical tool for displaying digital content.

The PicStick eliminates the need for cables and complex setups, offering a more seamless experience for wireless transmission of photos and videos. Installation is straightforward, allowing users to enjoy their media on an HDTV in just a few minutes.

Continue reading

UK public worried about cyberwarfare

A new survey of 2,000 people in the UK for the International Cyber Expo shows that 72 percent believe that cyberwarfare is likely to be the next step in modern combat.

Over half of people (52 percent) said they believe cyberwarfare may be the next step in warfare combined with physical tactics.

Continue reading

Scratch that! We’re actually no wiser about when Microsoft plans to release the Windows 11 24H2 update

Windows 11 24H2 2024

For those who are keenly awaiting the release of the Windows 11 24H2 update, a recent Microsoft blog post caused a good deal of excitement. It appeared to reveal that this significant feature update is due to roll out this very month; but all was not as it seems

Microsoft has now updated the blog post to clarify that the information it includes has been misinterpreted -- or perhaps that it was not sufficiently clearly written in the first place. Where does this leave us?

Continue reading

Reolink Battery Doorbell now available

Reolink has unveiled its latest product -- the industry's first Smart 2K 4MP Battery Doorbell with a 1:1 aspect ratio. This new addition to Reolink's growing lineup offers an impressive 2K 4MP high-definition resolution with an expanded head-to-toe view, alongside dual-band Wi-Fi connectivity. It’s designed to provide homeowners with enhanced security and convenience, serving as an advanced guard for the front door.

Priced at $145.99 (but currently on sale for $124.09), the Reolink Battery Doorbell is now available for pre-order here in the United States and Europe, with plans to launch in Australia and Canada next month. It delivers a unique combination of a 1:1 aspect ratio and 150-degree field of view, allowing users to see more at their doorstep than conventional doorbell cameras.

Continue reading

Logitech introduces Signature Slim Combo MK955 for Business Copilot Edition

Logitech has launched the Signature Slim Combo MK955 for Business Copilot Edition, a keyboard and mouse combo designed to enhance productivity for Windows users. The combo features a dedicated Copilot key, allowing users to quickly access Microsoft's Copilot AI tool.

The Signature Slim Combo MK955 aims to help employees work quietly and efficiently. The keyboard offers a laptop-like typing experience, while the mouse includes SmartWheel technology for precise scrolling. Shortcut keys on the keyboard allow for quick access to common functions, such as volume control and screenshot capture.

Continue reading

GNOME 47 Denver transforms the Linux desktop with new features and improved performance

The latest version of the GNOME desktop environment, GNOME 47, is now available, introducing several enhancements and user-focused improvements. This release, nicknamed “Denver,” honors the organizers of GUADEC 2024 and represents six months of dedicated work by the GNOME community.

One of the standout features in GNOME 47 is the addition of accent colors, allowing users to customize the blue interface with a range of alternative hues. Another key enhancement is better support for lower-resolution screens, ensuring that app icons and UI elements are more visible and easier to interact with. GNOME 47 also introduces hardware encoding for screen recording, optimizing performance on Intel and AMD GPUs, and making it easier to capture screencasts without impacting system responsiveness.

Continue reading

Shining a light on spyware -- how to keep high-risk individuals safe

With elections across the world, there is a tremendous amount of attention placed on the threat posed by AI and digital misinformation. However, one threat we need to have more focus on is spyware.

Spyware has already been used by nation states and governments during elections to surveil political opponents and journalists. For example, the government of Madagascar has been accused of using the technology to conduct widespread surveillance ahead of its elections.

Continue reading

Businesses ignore security when deploying AI

A new report from Orca Security highlights that, as organizations invest in AI innovation, most of them are doing so without regard for security.

The report uncovers a wide range of AI risks, including exposed API keys, overly permissive identities, misconfigurations, and more.

Continue reading

Organizations vulnerable to software supply chain attacks

According to Gartner, 60 percent of organizations work with over 1,000 third parties, and a new report shows many of these supply misconfigured or vulnerable hardware and software, putting customers at risk.

The study from CyCognito finds web server environments, including platforms like Apache, NGINX, Microsoft IIS, and Google Web Server, were the host of 34 percent of all severe issues across surveyed assets. They accounted for more severe issues than 54 other environments combined (out of 60 environments surveyed),

Continue reading

75 percent of organizations affected more than once by ransomware

A new report from SpyCloud finds that Ransomware is seen as the biggest cybersecurity threat across every industry, with 75 percent of organizations affected by ransomware more than once in the past 12 months -- a jump from 61 percent in 2023.

Based on a survey of 510 individuals in active cybersecurity roles within organizations in the US and the UK with at least 500 employees, the report shows some industries are more at risk than others, with insurance firms 6.3x more likely to experience a ransomware attack and healthcare 2.1x more likely.

Continue reading

The five stages of vulnerability management

Five-stages-of-grief

Nearly every organization today builds a lot of software, and the majority of that software is developed by cobbling together open source components. When using open source and trying a software composition analysis (SCA) scanner for the first time, it is not uncommon for those organizations to be surprised at what they learn about their open source usage. Many times it quickly comes to light that they have a large load of new and unplanned work to address in the form of security issues in dependencies. They need to fix these issues not just for the organization itself but also to stay compliant with certifications such as PCI or SOC2.

That’s when these organizations begin to experience the five stages of vulnerability management.

Continue reading

How CISOs should tackle the year of deepfakes

Deepfakes are picking up steam and no one is safe -- not even the President of the United States, who was recently the subject of an election-based audio deepfake scandal. And with an unavoidably heated year ahead with the impending presidential election, I anticipate deepfakes will continue to proliferate.

Deepfakes are a unique cybersecurity topic. They stem from social engineering and are always evolving, but there’s a responsibility for CISOs to position their organizations to combat them.

Continue reading

Closing the gap between cyber risk strategy and execution

plugging a gap

Effective cyber risk management is more crucial than ever for organizations across all industries as threat actors are constantly evolving their tactics. Yet, the latest Cyber Risk Peer Benchmarking Report from Critical Start unveils a striking dichotomy between strategy and execution in cyber risk management. While 91 percent of organizations acknowledge the criticality of having a robust risk management strategy, the execution of these strategies appear to fall short.

This gap between cyber risk strategy and execution widens as organizations grow larger. To fully comprehend an organization’s risk and executive strategies effectively, IT leaders must first understand the lifecycle of cyber risk and ensure each stage is addressed.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.