Latest Technology News

TCL brings NXTPAPER Android smartphones to the US

TCL Mobile has officially released its NXTPAPER smartphones in the United States, with the debut of the TCL 50 XE NXTPAPER 5G and TCL 50 XL NXTPAPER 5G. These devices are now available, with the TCL 50 XE offered nationwide at Spectrum for $149.99, and the TCL 50 XL available regionally at C Spire for $199 or at no cost with a 36-month agreement.

Both smartphones feature TCL’s NXTPAPER 3.0 display technology, which enhances eye comfort and preserves vibrant colors, balancing high refresh rates with a comfortable viewing experience. This technology has garnered attention for its ability to combine performance with viewer comfort, making it popular among both consumers and tech reviewers.

Continue reading

Mint Mobile announces free roaming in Canada

Mint Mobile, a subsidiary of T-Mobile US, has announced a big update for its customers traveling to Canada. Starting today, all Mint plans now include unlimited talk, text, and 3GB of high-speed data per month for roaming in Canada at no extra charge. This enhancement builds on the existing perks of Mint Mobile plans, which already offer free calls to Mexico, Canada, and the UK, unlimited domestic talk and text, and access to T-Mobile’s extensive and award-winning 5G network in the US.

Aron North, Chief Marketing Officer of Mint Mobile, expressed enthusiasm about the new feature, stating, "Since joining forces with T-Mobile, we’ve been hard at work building an even better experience for Mint customers everywhere, and today, we’re excited to bring free roaming in Canada to everyone on every plan. Now, any Mint customer traveling to Canada this summer and beyond can call, text, and browse just like they’re at home.”

Continue reading

Surfshark launches Alternative Number

Surfshark has introduced Alternative Number, an addition to its Alternative ID product suite. This feature provides users with a virtual US-based phone number, accessible through the Surfshark app, aimed at protecting users' actual phone numbers from misuse online.

Alternative Number helps shield personal information in an era where phone numbers are commonly required for online activities. "It can be difficult to keep your phone number to yourself online. We’re constantly asked for our numbers whenever we post ad listings, shop online, or sign up for free products/services. But there’s no telling where your number ends up once you share it online," says Sarunas Sereika, Alternative ID Product Manager at Surfshark.

Continue reading

Cybersecurity pros don't like being ignored

A new survey reveals that 29 percent of security professionals say their biggest frustration is that their advice is being ignored.

The study, conducted by security awareness specialist KnowBe4 at Infosecurity Europe 2024 in London, finds other issues include a stated a lack of skilled workers to employ (15 percent), while a further 13 percent highlight working in an inadequate security culture or environment is their biggest complaint, with the same percentage claiming they have too many tools to manage at their organizations.

Continue reading

Offices not prepared for hybrid working

stressed worker

New research, from AV solutions company Kinly, reveals that despite calling workers back into the office 65 percent of enterprises admit that their office spaces are not optimized for hybrid working.

The complexities of flexible and remote communication may be a factor in the call to return to office, with 28 percent of enterprises naming it as a top challenge. Over half of respondents also say that poor hybrid workflows (57 percent) and outdated AV technologies (58 percent) are damaging the productivity of hybrid teams.

Continue reading

Breaches increase despite confidence in security measures

data breach

Despite there being a record-breaking number of data breaches in the last year, 63 percent of organizations report that they believe their security measures are effective.

A new report from Dasera looks at how data risk perceptions and actual preparedness against breaches fluctuates across different industries and finds the top threats concerning organizations are data breaches, ransomware, insider threats, and misconfigurations.

Continue reading

Sony ZV-E10 II camera debuts

Sony Electronics has unveiled the ZV-E10 II, the eagerly awaited successor to the widely popular ZV-E10 mirrorless camera, acclaimed for its versatility and ease of use in content creation. The new ZV-E10 II not only retains the beloved features of its predecessor but also introduces enhancements to cater even more effectively to the needs of creators.

The ZV-E10 II is equipped with an updated 26-megapixel Exmor R CMOS sensor and Sony’s latest BIONZ XR image processing engine, promising higher image quality and faster processing speeds. This second-generation model boasts enhanced autofocus capabilities, improved video features including a Cinematic Vlog Setting, and a redesigned user interface that supports vertical content creation seamlessly.

Continue reading

Accuracy worries delay Gen AI initiatives

Calendar delay

Less than 60 percent of manufacturers plan to increase AI spending in 2024 compared to 93 percent in 2023, according to a new survey.

The study from Lucidworks gathered input from over 2,500 leaders involved in AI technology decision-making worldwide and finds in 2023 more than 40 percent of manufacturing leaders had a positive view of AI, with 93 percent planning to increase investments.

Continue reading

UK tech execs not convinced about return on investment from AI

A new study from IT consultancy Zartis shows that UK tech executives are confident about the level of AI skills within their organizations, but aren't convinced about the return on investment from AI.

The report shows 85 percent rate their existing workforce's combined AI knowledge and expertise as 'skilled' while 51 percent rate it as 'highly skilled'. Despite this confidence, many of these executives have concerns about barriers that might prevent further AI adoption.

Continue reading

Maxell launches OWS Pro Open Wireless Earhooks on Amazon

Maxell has launched the OWS Pro Open Wireless Earhooks. These earbuds are designed with an open fit to allow users to stay aware of their surroundings while enjoying audio content.

The earhooks are designed to sit securely on the outer ear and feature fast charging through a Type-C connection. They provide up to 18 hours of total playtime with the charging case, and the earbuds alone can deliver 6 hours of audio playback.

Continue reading

Self-service password reset: How the cure could introduce more security ills

Passwords certainly aren’t new -- they began in ancient civilizations so tribes and their militaries could identify their members and allies. But the management problems they present in a digital world so utterly dependent upon them are voluminous and costly. On average, business users have 87 passwords for their work-related accounts. Granting this complexity, users will inevitably need to turn to IT several times a year to resolve password lock outs. Forrester estimates that it costs an organization $70 per password reset and that large, U.S.-based enterprises allocate $1M annually for password-related support costs.

While Self-Service Password Reset (SSPR) tools -- web-based portals that enable users and administrators to reset their own passwords without IT interaction -- seem like the ideal solution, they come with risks. Today’s threat actors are exploiting every opportunity to gain credentials, and without the proper controls, SSPR solutions can be ripe for social engineering and exploitation. Artificial Intelligence is bolstering social engineering tactics while making them less detectable. Threat actors have increasingly been waging these sorts of attacks against SSPR solutions, in particular Microsoft SSPR, to gain both user and admin credentials. While it has become necessary for IT to streamline tasks in a world of burgeoning demands and complexity, any solutions deployed must be reviewed for vulnerabilities -- or the cure could be worse than the disease, leading to a catastrophic breach.

Continue reading

Get 'AI for Absolute Beginners' (worth $9.99) for FREE

AI for Absolute Beginners begins with an engaging introduction to the world of Artificial Intelligence, making it approachable for those with little to no knowledge on the subject.

The book unravels the mysteries of AI's evolution, from its historical roots to the cutting-edge technologies shaping our future. By explaining complex concepts in simple terms, this guide aims to illuminate the path for those curious about how AI impacts our world.

Continue reading

Understanding the threats lurking in Microsoft Office documents

Microsoft Office stands as a pillar in the landscape of modern productivity tools. Its suite of programs -- from Word for crafting documents to Excel for data analysis - allows for versatility in both personal and professional environments. Used from everything like notetaking, resumes, essays, and business reports, in today’s digital age, these documents are indispensable and trusted tools.

This versatility, however, presents a double-edged sword. While they enhance efficiency and functionality, they simultaneously create potential security risks. This duality makes Microsoft Office documents an attractive target for threat actors, who exploit their widespread use and familiar interface to deliver phishing and malware with alarming ease.

Continue reading

Microsoft warns Windows 11 users of forced upgrades due to impending end of service for older versions

Windows 11 security

Microsoft has issued a reminder to anyone using older editions of Windows 11 that their operating system is about to reach end of servicing.

Windows 11 versions 21H2 and 22H2 will no longer receive security updates as of October. To avoid the problem of leaving people with an insecure and unsupported operating system, Microsoft has a solution: forced upgrades.

Continue reading

Strong SLAs critical for vulnerability management

A new report from crowdsourced security company Intigriti highlights the need for strong cybersecurity practices and service-level agreements (SLAs) for vulnerability management.

Globally, 75 percent of businesses fail to respond to critical vulnerabilities within 24 hours, consequences of which could include customer dissatisfaction, loss of business, and reputational damage.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.