Latest Technology News

Google Chrome 90 to use HTTPS by default

With privacy and security being so important nowadays, you would think internet users would demand that all websites use the encrypted HTTPS protocol rather than "regular" HTTP. But as usual, humans are often ignorant or lazy when it comes to their own online safety. Ultimately, it is up to corporations to protect us. After all, we can't depend on the government for such oversight (nor would we want to).

Once again, Google is stepping in to better protect its users. This time, the wildly popular Chrome web browser is getting more secure thanks to a simple tweak. You see, in the upcoming version 90 of the browser, the search giant is making HTTPS default when typing in an address in the URL bar. In other words, you will now see https:// instead of http:// unless you specifically type in the latter.

Continue reading

Download Manjaro Linux 21 Ornara with GNOME, Xfce, and KDE Plasma now!

One of the most popular Linux-based desktop operating systems these days is the Arch-based Manjaro. Following a short testing period, version 21 of that distribution is now available for download. Code-named "Ornara," Manjaro 21 uses the fairly new Linux kernel 5.10 LTS.

Manjaro Linux 21 can be had with your choice of three desktop environments -- GNOME 3.38, KDE Plasma 5.21, and Xfce 4.16. All three are great, but unfortunately, GNOME 40 has still not been finalized, so it is (obviously) not included here. If you do want to try an early version of the upcoming GNOME 40, you can download the recently released Fedora 34 Beta.

Continue reading

Fedora Linux 34 Beta with GNOME 40 is here

Oh my. Today is officially the day many of us have been waiting for. Yes, Fedora Linux 34 has officially achieved Beta status, and you can download it immediately. For many Linux users, Fedora is considered the best overall operating system to be based on that open source kernel, and I happen to agree. The distro focuses on truly free and open source software -- a pure Linux experience. It is also fairly bleeding edge, but at the same time, it remains stable for everyday use. Hell, even the inventor of Linux, Linus Torvalds, uses Fedora.

But what is so exciting about Fedora 34 Beta? Well, this pre-release version of the upcoming operating system uses GNOME 40 as its default desktop environment, and version 40 is the most electrifying version of GNOME in years. GNOME 40 is notable for having a horizontal workspace switcher and having the Dash (favorites launcher) moved to the bottom of the screen.

Continue reading

What your fraud risk service provider may not want you to know

eCommerce

Since the advent of B2C eCommerce in earnest about twenty years ago, an "armed conflict" has been raging between the merchants and financial services providers on one side of the equation, and the fraudsters attempting to take advantage of vulnerabilities in the ecosystem on the other side.  A typical metaphor for this conflict is the reference to the "Whack-A-Mole" game.  The implication is that immediately after a vulnerability is quashed by the implementation of technologies targeted to detect and block it, new technologies and tactics are introduced by fraudsters to perpetuate successful fraud. And so the battle rages on… until now.

One key consideration in preventing fraud is the use of technologies to determine whether the purchaser at the other end of an Internet session is actually the person they represent themselves to be.  Some would say that the first major breakthroughs in identifying "Who is there?" on the purchaser side was the use of IP intelligence, and associated technologies like proxy piercing detection. Additional enhancements to complement the first fraud detection technologies have included the addition of more sophisticated "inference-dependent" technologies categorized as Artificial Intelligence and Behavioral Biometrics.  All of the services delivered in this category use the combination of various dynamic and static inputs or "signals" to infer the probability that there is indeed a person at the other end of an Internet session, and that it is indeed the person is actually who they represent themselves to be. In other words, implying "Who is there?"

Continue reading

Delivering resilience for IT operations in 2021

Enterprise operations leaders today are facing a challenge: Support the rapidly growing and evolving needs of the business without losing control of the complex infrastructure that is needed to do so.

In recent years, and especially in the accelerated digital transformation spurred on by the pandemic, it’s become common practice to increase productivity by siloing development, with multiple teams working autonomously to rapidly deploy code. In simpler times, in organizations running on a handful or applications, it was possible to operate according to a linear, predictable blueprint of development. The dev team was able to identify and de-bug code to keep their applications, and therefore the business, running smoothly. 

Continue reading

Telematics can be a valuable tool in the distribution of COVID-19 vaccine

One thing authorities are learning with the distribution of the COVID-19 vaccine is that data matters. Since the first vials of this medical breakthrough began leaving their factories on highly specialized refrigerated trucks in December last year, there have been numerous reports of seemingly avoidable mistakes.

From a miscommunication between logistics officials and the U.S. Food and Drug Administration that left 14 states with vaccine shortfalls to reports of vaccine shipments going to waste or spoiling because of poor timing or confusion over protocols, there is a general state of confusion clouding this initial phase of the distribution effort.  With the CDC reporting more than 16 million cases and 300,000 deaths in the U.S. throughout 2020, the stakes could not be higher, and these mistakes could be avoided.

Continue reading

How technical teams can better collaborate in a crisis

remote work

The transition to remote work has been difficult for technical teams. Software professionals were already struggling to deliver everything on their plate, and shifting to a fully remote model has resulted in ever-changing patterns of communication, making it more difficult to build the human relationships that are so important for good collaboration. Just as tech workers were settling into more agile workflows, they must now also manage cross-team collaboration and alignment without being in the same space.

Software professionals have limited bandwidth to adapt and work on the soft skills required to navigate these remote interactions, and collaboration has suffered as a result. In fact, a recent study by Lucid revealed that as much as 75 percent of respondents said that collaboration has suffered the most in their work life since the start of the pandemic, even more than productivity. This lack of successful collaboration within technical teams and across companies can have a truly detrimental impact on an organization, especially during a crisis.

Continue reading

SentiLink's new ID Theft Scores targets stolen identities used to open financial accounts

identity theft

Security has become slightly more difficult these days given that many people are now working at home and online. That’s just the beginning of the headaches for firms. 

SentiLink, a leading security company, is trying to fight back against identity fraud with a new ID Theft Scores program. This is designed to complement its Synthetic Scores that are already in place and used by used by many top financial institutions in the US. 

Continue reading

A year on from the home working surge, cybersecurity practices are still inadequate

home working

A new report from cybersecurity firm PC Matic finds that one year on from the start of the COVID-19 pandemic, nearly 35 percent of Americans are still working from home.

However, the study of more than 5,800 people across the US finds less than 10 percent of respondents are provided with an antivirus software solution for the personal device they use for work purposes.

Continue reading

How AI can help prevent 'catastrophic forgetting' of malware data

With large numbers of new samples appearing every day the old signature-based methods of malware detection have become unwieldy.

AI can learn from millions of samples, but if it uses all samples for optimum detection that means slower learning and updates. The alternative is to use only select samples to keep up with the rate of change of malware, but this runs the risk of 'catastrophic forgetting ' of older patterns.

Continue reading

Talent shortage impacts security awareness efforts

Over three-quarters of security awareness professionals are spending less than half their time on security awareness, according to a new report from SANS.

This underlines the fact that awareness training is often a part-time effort, commonly assigned to staff with highly technical backgrounds but who may lack the skills needed to effectively engage their workforce in simple-to-understand terms.

Continue reading

0xc004c003 error and problems activating Windows 10? Microsoft has a workaround

Windows 10 logo on a beach

To get the most out of Windows 10, and to avoid being pestered by constant reminders, you need to activate it. This is not always the smooth, trouble-free process it should be, and people often run into problems.

If you have installed the KB4598291 update for Windows 10, you may well have been plagued by activation failure with a 0xc004c003 error. Now Microsoft has provided details of what is going wrong, as well as revealing a workaround.

Continue reading

Threat data helps enterprises strengthen security

Threat

Threat data feeds can help enterprises strengthen their cybersecurity posture, according to a new report from Ponemon Institute, sponsored by IT services company Neustar.

A majority (79 percent) of the more than 1,000 security professionals taking part in the study say threat data feeds are essential to their organization's ability to achieve a strong cybersecurity posture, and 55 percent rate the quality of their threat feeds' ability to pinpoint cyberthreats as very high.

Continue reading

Opera Touch gets a name change on iPhone

One of the best things about using an Apple iPhone, iPad, or Mac is having access to the best overall web browser on the market -- Safari. That's why I am always a bit perplexed when someone chooses an alternative like Chrome or Firefox for an Apple computer or device. Don't get me wrong, those two browsers from Mozilla and Google are great too, but Apple's offering is just faster, more focused on privacy, and better for battery life.

But OK, for whatever reason, people do pick third-party web browsers on the iPhone; even though Apple doesn't allow those browsers to use alternative browsing engines. But hey, at least you can change your default web browser on iOS and iPadOS nowadays.

Continue reading

How changes to tracking will affect the online world [Q&A]

The Identifier for Advertisers (IDFA) is a random device identifier assigned to a user's device which advertisers use to track data so they can deliver customized advertising.

But Apple is about to replace the iOS IDFA tracking system in iOS 14 with a new App Tracking Transparency (ATT) feature which will allow iPhone users to opt-out of tracking on third-party apps and sites. This, plus Google's crack down on third-party cookies, means privacy is a hot topic currently -- and all signs point to even more shifts in the coming year.

Continue reading

Most Commented Stories

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.