INTERPOL says we should rename pig butchering to romance baiting to avoid victim shaming


There are always lots of financial scams running online, and pig butchering is currently one of the most commonly used techniques for parting victims from their money.
But INTERPOL doesn’t like the term, saying it is shaming and puts people off reporting crime. The international crime-fighting agency believes that a shift to the rather fluffier sounding “romance baiting” is important.
Intel has released one fix for poor Arrow Lake performance, and has another in the pipeline


Intel’s recently released Arrow Lake processors were notable for the wrong reasons. Performance was found to be more than a little disappointing, particularly for gamers. A fix was promised, and one has been delivered.
The fix takes the form of a not only an update to Windows, but also a BIOS update. But it does not end there. Intel says that it will be releasing a further update in January which will introduce additional performance optimizations.
At long last, Microsoft makes it possible to use your webcam with multiple apps simultaneously in Windows 11


Webcam users rejoice: the end of the “Another App Is Using the Camera Already” error message could be nigh.
People have been asking for the ability to use a single webcam in two or more apps at the same time for what feels likes forever. Built ostensibly as an accessibility feature, Microsoft is finally bringing what it is calling “Multi-app camera” to Windows 11.
StarTech.com launches 140W USB-C GaN wall charger with premium 6-foot cable


StarTech.com has announced its latest product, the 140W USB-C GaN Wall Charger, aimed at providing consistent power for high-performance devices, including Apple’s M4 Pro and Max MacBooks, M3 MacBooks, premium laptops, and other USB-C electronics. This charger is designed to deliver reliable power while minimizing heat during extended use.
The 140W USB-C GaN Wall Charger features a design intended to remain cool even under full load, addressing common issues with overheating in similar products. Product Manager Tony Parackal explains, “This charger is designed to provide an optimal continuous peak power delivery while ensuring user and device safety.”
Threat actors spoof email security providers


A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies such as Proofpoint, Mimecast and Virtru to trick users into disclosing sensitive credentials.
The attacks make use of fake email attachments, phishing links and credential-harvesting tactics to compromise sensitive data. By mimicking well-known brands, threat actors boost the likelihood that the recipients will trust the emails and engage with harmful content, leading to them exposing critical information.
Get 'The Data Science Handbook, 2nd Edition' for FREE and save $60!


Becoming a data scientist is hard. The job focuses on mathematical tools, but also demands fluency with software engineering, understanding of a business situation, and deep understanding of the data itself. This book provides a crash course in data science, combining all the necessary skills into a unified discipline.
The focus of The Data Science Handbook is on practical applications and the ability to solve real problems, rather than theoretical formalisms that are rarely needed in practice.
Credential phishing attacks up over 700 percent


Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks surged dramatically in the second half of 2024, rising by 703 percent.
The report from SlashNext shows that overall, email-based threats rose by 202 percent over the same period, with individual users receiving at least one advanced phishing link per week capable of bypassing traditional network security controls.
What will attackers target in 2025? CNI, CNI, and more CNI!


Critical national infrastructure (CNI) has had a rough 2024 in the UK when it comes to cybercrime. From the chaos caused by a teenager who hacked into TfL to the dangerous impact on the NHS after the Synnovis breach. And let us not forget the ongoing fallout from the Sellafield breach in December 2023.
These are just a few of the notable cases of a much wider problem, with Bridewell finding that 60 percent of UK CNI organizations experiencing at least one ransomware attack over the past 12 months.
More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025

Data breach trends -- progress, challenges, and what's next [Q&A]


Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down.
We spoke to Jon Fielding, managing director, EMEA at Apricorn, to discuss the latest data breach trends, the progress that's been made and where more work is needed to address security threats.
System76 Pangolin Linux laptop gets aluminum body and 2K display upgrade


System76 has launched the latest version of its Pangolin Linux laptop, now featuring an all-aluminum body and a 16-inch 2K display. Known for catering to Linux users, the updated Pangolin combines premium build quality with powerful AMD hardware, making it suitable for a variety of workflows.
The new aluminum chassis offers improved durability and a sleek, smooth feel while maintaining the laptop’s lightweight design. System76’s focus on aesthetics and functionality shines through, giving the Pangolin a more polished look and a rigid build that alleviates concerns about flex.
Fedora Asahi Remix 41 brings Fedora Linux to Apple Silicon Macs with Vulkan 1.4 and x86 emulation


Fedora Asahi Remix 41 is now available, delivering Fedora Linux 41 to Apple Silicon Macs. This release is the result of ongoing collaboration between the Fedora Asahi SIG and the Asahi Linux project. Fedora Asahi Remix was first introduced at Flock 2023 and made its debut later in December with Fedora Asahi Remix 39.
A major highlight of this release is support for x86 and x86-64 emulation, opening the door for AAA games on Apple Silicon hardware. This is made possible with the inclusion of the new Vulkan 1.4 driver, which brings improved compatibility and performance for gaming. Beyond that, Fedora Asahi Remix 41 delivers solid device support, including high-quality audio that works right out of the box.
More complexity, more non-human IDs and shifting strategies -- identity predictions for 2025


Identity is at the root of most cyberattacks, but although we're seeing greater adoption of things like biometrics we still rely heavily on passwords.
There's added complication in the form of soaring numbers of machine identities too. Here's what some industry leaders think the identity landscape has in store for 2025.
Enterprises struggle to deliver AI agents but new tool could help


Businesses are often under pressure to deliver AI agents, but development teams are struggling with siloed tools, fragmented governance and limited functionality that makes promising prototypes unfeasible in production.
According to a survey of over 1,000 enterprise technology leaders released today by Tray.ai, 42 percent of respondents need access to eight or more data sources to deploy AI agents successfully -- which is impossible when SaaS app agents are restricted in scope by the integrations to which their host applications have access.
Get 'Java Essentials For Dummies' for FREE and save $9.99


Java Essentials For Dummies is a reliable and succinct reference on the core components of Java -- the multifaceted general-purpose language used for desktop, mobile, and web applications.
This straightforward book gets right to the point -- eliminating review material and wordy explanations -- so you get what you need, fast.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.