Tech news you may have missed: Aug. 18 – 25 – TechRepublic

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.
You will also receive a complimentary subscription to TechRepublic’s News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.
All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
Tech news you may have missed: Aug. 18 – 25
Your email has been sent
Apple updates, cookie theft, tech tips and a 5G cheat sheet top this week’s most-read news on TechRepublic.
Too busy this week to catch all of the latest tech news? Have no fear: We’ve compiled and summarized TechRepublic’s top stories for Aug. 18 – 25.
Only a few weeks before the fall Apple event, the tech company announced security patches that would keep hackers from gaining control of an affected device. The vulnerability could be found on iPhone, Mac, iPad and Safari.
TL;DR: Users were instructed to remain calm and update iOS to version 15.6.1 and the latest versions of Monterey, Big Sur and Catalina. It’s unclear whether beta testers of iOS 16 are affected.
Sophos recently released a report on a threat that could bypass multi-factor authentication called “pass the cookie.” The new threat is perpetrated by malware that duplicates session cookies used to validate authentication and passing those duplicates on to bad actors who can use them to open new sessions.
TL;DR: Bad actors can use the stolen cookie until the session expires, and session cookies can last up to several months. Cedric Pernet provides several ways that companies and individuals can protect themselves against these increasingly-prevalent attacks.
From what (not) to do when something goes wrong to protection against malware and scams, Jack Wallen covers the five most important tips that everyone who uses a computer should know. Share these at your next all-hands meeting for calmer IT interactions.
TL;DR: While many of these tips could feel elementary to digital natives, Jack also details the reasons these tips work. Knowledge is power!
Pivot tables, writing formulas, styling tables and working with time values are all included in this compilation of Excel tips. Browse for the most-asked questions to include in your wiki or internal documentation, or just to learn some new spreadsheet magic tricks.
TL;DR: Another great resource to pass around in the next company newsletter, this sheet has all the basic tutorials and more. Bookmark, share and never have to troubleshoot a VLOOKUP again.
The 5G mobile network standard has been used to boost computing at the edge and help us stream cat videos with lower latency. But, it’s still not widely understood. This cheat sheet breaks down all of the essential 5G knowledge, including the best mobile network for 5G.
TL;DR: There’s a lot more to 5G than faster speeds, including the complicating factors of moving from 4G to 5G networks, latency issues and adoption woes.
Our editors highlight the TechRepublic articles, downloads, and galleries that you cannot miss to stay current on the latest IT news, innovations, and tips.
Tech news you may have missed: Aug. 18 – 25
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Windows 11 gets an annual update on September 20 plus monthly extra features. In enterprises, IT can choose when to roll those out.
Edge AI offers opportunities for multiple applications. See what organizations are doing to incorporate it today and going forward.
This is a complete guide for Apple’s iPadOS. Find out more about iPadOS 16, supported devices, release dates and key features with our cheat sheet.
Discover data intelligence solutions for big data processing and automation. Read more to explore your options.
Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.
Edge computing is an architecture intended to reduce latency and open up new applications. The terms around it can be fluid, but are helpful to know. From the glossary’s introduction: Edge computing is an architecture which delivers computing capabilities near the site where the data is used or near a data source. In an idealized …
This document helps make sure that you address data governance practices for an efficient, comprehensive approach to data management. This checklist from TechRepublic Premium includes: an introduction to data governance, a data governance checklist and how to manage a data governance checklist. From this checklist’s introduction: Data governance is the process by which an organization …
Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions …
Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

source

Leave a Comment

Your email address will not be published.