System76 Pangolin Linux laptop gets aluminum body and 2K display upgrade


System76 has launched the latest version of its Pangolin Linux laptop, now featuring an all-aluminum body and a 16-inch 2K display. Known for catering to Linux users, the updated Pangolin combines premium build quality with powerful AMD hardware, making it suitable for a variety of workflows.
The new aluminum chassis offers improved durability and a sleek, smooth feel while maintaining the laptop’s lightweight design. System76’s focus on aesthetics and functionality shines through, giving the Pangolin a more polished look and a rigid build that alleviates concerns about flex.
Fedora Asahi Remix 41 brings Fedora Linux to Apple Silicon Macs with Vulkan 1.4 and x86 emulation


Fedora Asahi Remix 41 is now available, delivering Fedora Linux 41 to Apple Silicon Macs. This release is the result of ongoing collaboration between the Fedora Asahi SIG and the Asahi Linux project. Fedora Asahi Remix was first introduced at Flock 2023 and made its debut later in December with Fedora Asahi Remix 39.
A major highlight of this release is support for x86 and x86-64 emulation, opening the door for AAA games on Apple Silicon hardware. This is made possible with the inclusion of the new Vulkan 1.4 driver, which brings improved compatibility and performance for gaming. Beyond that, Fedora Asahi Remix 41 delivers solid device support, including high-quality audio that works right out of the box.
More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025


Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.
There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.
Enterprises struggle to deliver AI agents but new tool could help


Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.
According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.
Get 'Java Essentials For Dummies' for FREE and save $9.99


Java Essentials For Dummies is a reliable and succinct reference on the core components of Java -- the multifaceted general-purpose language used for desktop, mobile, and web applications.
This straightforward book gets right to the point -- eliminating review material and wordy explanations -- so you get what you need, fast.
Newly launched APIs found by attackers in under 30 seconds


Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and less secure. New research from Wallarm shows the average time for a new API to be found by attackers is just 29 seconds.
The research used a honeypot to look at API activity and in its first 20 days in November the lngest time taken for a new API to be discovered was 34 seconds.
Experts call for proactivity to combat state-sponsored cyber threats in 2025


In 2024, opposing nation-states have utilized cyberattacks to project power and disruption from within their own borders. This shift has been epitomized by the rise of the “Axis of Upheaval,” dominated by the CRINKs nations -- China, Russia, Iran, North Korea -- who share a common reliance on using cyberattacks to wreak havoc in an affordable manner.
Whether it’s North Korea using ransomware to generate revenue for its isolated regime, or Russia focusing on disrupting and eroding public trust in democratic institutions, each state is finding its niche to cause harm. Despite these varied goals and techniques, it’s the same sectors again and again in the crosshairs. Whether it’s CNI, healthcare, or finance, these organizations now must protect against a wide range of attack styles and techniques.
Elon Musk seems to confirm some details of his Gmail rival X Mail


There have been rumors circulating for some time that creating an email service to compete against Gmail was on Elon Musk’s to-do list. While concrete details about what it might look like and when it might appear have been elusive, Musk has started to give something of an idea of his vision.
The billionaire has said on multiple occasions, including in the last few days, that X Mail is on the cards, but now he has given a clearer indication of what it might involve. The question is -- are people ready for it?
Netflix expands Moments feature from iOS to Android, so you can share your favorite clips from shows


There are so many classic scenes from shows and movies and, just like music fans like to share amazing drum solos, guitar riffs and lyrics with friends, there is something joyous about connecting over a shared video clip.
YouTube has long made it possible to share snippets of a videos, and earlier this year, Netflix introduced a feature called Moments to iOS. This provides a way to share a meaningful, impactful, funny or beautiful scene from a Netflix show or movie, and now the same feature is available globally on Android.
Google launches Whisk for creative AI image remixing


Google has introduced Whisk, a new generative AI tool designed to make image creation more interactive and creative. Unlike traditional AI tools that rely heavily on lengthy text prompts, Whisk allows users to start with images. Simply drag and drop images into the interface, and Whisk lets you generate unique creations by combining these visuals in novel ways.
Whisk enables users to input up to three images: one for the subject, one for the scene, and another for the style. This approach gives users the flexibility to create anything from digital plushies to enamel pins or stickers. Some early examples from Whisk include a fantastical fish, a whimsical walrus, and even a glazed doughnut reimagined as an enamel pin.
The dark side of AI: How automation is fueling identity theft


Automations empowered by artificial intelligence are reshaping the business landscape. They give companies the capability to connect with, guide, and care for customers in more efficient ways, resulting in streamlined processes that are less costly to support.
However, AI-powered automations also have a dark side. The same capabilities they provide for improving legitimate operations can also be used by criminals intent on identity theft. The rise of low-cost AI and its use in automations has empowered scammers to widen their nets and increase their effectiveness, leading to a drastic increase in identity theft scenarios.
2025 cybersecurity forecast: Preparing for the next generation of threats


As we navigate an increasingly digital landscape, the threats posed by cybercriminals are evolving at an alarming pace. The latest predictions highlight a future where AI-driven technologies, particularly deep fakes, will become more sophisticated, making it challenging for individuals and organizations to distinguish between genuine and malicious entities.
This article explores three critical predictions regarding the future of cyber threats: the rise of hyper-realistic deep fakes, the escalation of browser-based ransomware attacks targeting essential infrastructure, and the growing risk of insider threats in remote work environments. Understanding these trends is crucial for developing effective strategies to safeguard against the next wave of cybercrime.
Sophisticated AI-Driven Deepfakes Will Bypass Traditional Security Measures
Why PorteuX Linux 1.8 is a faster and lighter alternative to Microsoft’s bloated Windows 11


The lightweight Linux distribution PorteuX has launched version 1.8, delivering huge updates across multiple desktop environments and a modern alternative to Windows 11. The release introduces the newly released Xfce 4.20, a sleek and efficient desktop environment, alongside updates to Cinnamon 6.4.2, GNOME 47.2, KDE 6.2.4, and LXQt 2.1.0, offering users a customizable and resource-friendly experience without the performance trade-offs often associated with Windows 11.
PorteuX 1.8 upgrades its kernel to version 6.12.5, ensuring better hardware compatibility and security. For AMD users who encounter upstream performance regressions, the kernel from version 1.7 remains available. Unlike Windows 11, which can struggle with older hardware and system requirements, PorteuX maintains its lightweight design, running smoothly even on less powerful machines.
Easier payments, robot assistants and improved accessibility -- fintech predictions for 2025

Are UFOs, drones, and glowing orbs just Elon Musk's Starlink satellites launching for T-Mobile beta?


Could the strange lights, glowing orbs, and supposed UFO sightings in the night sky actually have a simple explanation? With the launch of the T-Mobile Starlink beta program, it’s possible that what people think are mysterious flying objects are, possibly, Starlink satellites being deployed to make mobile dead zones a thing of the past.
Elon Musk’s Starlink, operated by SpaceX, has been rapidly expanding its satellite constellation as part of its partnership with T-Mobile to bring direct-to-cell satellite coverage across the United States. These satellites, designed to function like cell towers in space, are now at the center of a beta program that promises to connect customers in areas where traditional infrastructure can’t reach.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.