Spotlight

Latest Technology News

AMD Zen processors will have 32 cores and Symmetrical Multi-Threading

black_amd_logo

We seem to have hit something of a ceiling when it comes to the raw speed of processors; things are now progressing rather more slowing than they have been. Attention has now turned to other areas, such as the number of cores. Dual-core, quad-core, and octo-core CPUs are now quite common, but AMD's upcoming processor -- codenamed 'Zen' -- will feature no fewer than 32 cores.

We already knew that Zen would have 'a lot' of cores, but a CERN engineer has now revealed not only how high this figure is, but more details of the processor. But this is not a true 32-core processor -- AMD is using a little trickery to up the numbers.

Continue reading

How much do you know about telemetry and privacy in Windows 10... and how much do you care?

good_bad

Privacy concerns about Windows 10 have existed since the moment the operating system was released. Endless virtual column inches have been spawned from fears about the telemetry features Microsoft employs, and a small cottage industry has sprung up creating tools that disable 'spying' features. But for all of the words that have been spilled, how much does the average user know -- or indeed care -- about privacy issues, data collection and the like?

There's one thing that just about everyone can agree on: Microsoft did a terrible job of communicating information about data collection in Windows 10. We also know that the mere existence of data collection features has irked a lot of people. Microsoft listened to enterprise users and made it possible to completely disable telemetry in Windows 10 Enterprise, but the same courtesy has not been extended to home users. Are you bothered by this?

Continue reading

King Arthur is back on Facebook after falling foul of Real Name policy

stonehenge

For many, Arthurian legend is just that: legend. But for others, it is very real. One such person is King Arthur -- or Rev Arthur Uther Pendragon to give him his full title -- was recently kicked off Facebook as the social network did not believe he was using his real name.

But now the king is back. Having proved his identity, the once and future king (Rex Quondam Rexque Futuris) has had his account restored under his legal name of Arthur Uther Pendragon. King Arthur is not the first person to cross swords with Facebook's real name policy, and he certainly won't be the last.

Continue reading

Pay for piracy? uTorrent's latest plan is banking on it

utorrent

Believe it or not, people download movies and music illegally. This may not be earth-shattering news to anyone, as it has been going on for a long time, most famously with things like Napster and The Pirate Bay. These days it has become more sophisticated and turned into a real business for the torrent sites.

Now the popular service uTorrent is instituting a new pay plan. No, you don't have to pay, but the service hopes to give those who do a better experience.

Continue reading

What I like about Apple iPad Pro [fourth in a series]

Cat and iPad Pro

Day 10, and it's difficult to wonder where nearly two weeks went. Yet here I am with iPad Pro, and more settled than last weekend, when griping about how the tablet frustrates me.

I want to start by discussing Apple's Smart Keyboard, which is a $169 accessory that I recommend for everyone who doesn't plan on using fingers and Pencil as primary, ah, utensils. Typing is amazingly smooth and accurate. The keys present terrific travel, without requiring too much force while still giving plenty of tactile response. Shocked best describes my reaction to the experience. Sometimes what's missing brings something more: Ommission of the trackpad, which either is brilliant conception or Apple chief designer Jony Ive and team getting goddamn lucky.

Continue reading

Court rules it is not illegal for GCHQ to hack computers

gchq_header_contentfullwidth

Privacy International has lost a court case that questioned the legality of GCHQ's hacking operations. The UK-based privacy and human rights charity launched a legal campaign after Edward Snowden revealed the spying and surveillance that was being carried out by the NSA and GCHQ.

In the course of the case, GCHQ admitted for the first time that it was involved in hacking devices and computers not only in the UK, but around the world. The Investigatory Powers Tribunal (IPT) ruled that activities such as the installation of keyloggers, the remote activation of microphones and cameras, and the use of malware by the intelligence agency is entirely legal.

Continue reading

Everything you need to know about SIM swap scams

SIM Card Phone Smartphone

In today’s mobile-centric world, using mobile phones for Internet banking is standard practice for most people, but do customers know they could be at risk of a new type of scam?

SIM swap fraud, where scammers cancel and re-activate new SIM cards to hack into bank accounts, is reportedly on the rise.

Continue reading

PSA: Time to switch to Google Photos as Picasa shuts down

Google Photos shown on Chromebook, Android smartphone and tablet

It has been a long time coming, but when 15 March rolls around Google will no longer support the desktop Picasa app -- and this is just the start of the shutdown. Picasa is being gradually shuttered in favor of Google Photos as the search giant focuses its energy on a single photo service.

So what does this mean for Picasa fans? Well, the good news is that there's nothing to do in terms of migrating content from one service to another. Picasa Web Album content can be viewed, edited and shared through Google Photos, but if you don't want to migrate then it will be archived from 1 May.

Continue reading

It's too easy to breach a bank

bank_theft

I arrived onsite to suite 102 -- the bank’s corporate headquarters -- around 9:40 am. I was impersonating a local utility worker -- with all the garments like a hardhat, clipboard, obnoxious yellow vest, and some old Timberland work boots. I played the part well.

When I approached the suite I saw a giant glass entrance into the main office of the bank with a secretary minding the entrance and questioning visitors. I also noticed employees were entering and exiting an unmarked door at the end of the hallway -- no cameras to be seen. I proceeded slowly past the main entrance and then ran to catch the secured door as it was closing behind an unsuspecting employee. I was in!

Continue reading

Pedophiles are reportedly using Facebook to share images of children

shhh

An investigation by the BBC has found that secret groups on Facebook are being used by pedophiles to share images -- and Facebook doesn't seem to be doing much to control such activity.

The BBC reportedly unearthed numerous private groups which were both run by and for men with a sexual interest in children. One group was found to have a convicted pedophile as its administrator. Despite many of the groups and images being reported to Facebook, not all of them were removed, raising the question as to whether Facebook is doing enough to combat pedophilia.

Continue reading

binvis.io is the visual way to analyze binary files

binvis.200.175

Exploring the structure of binary files can be very useful for identifying malware, and tools like PeStudio and HxD may help point you in the right direction.

But if you find they bury you in fine detail, when you’re more interested in the big picture, then you might like to try another approach.

Continue reading

Samsung to plant Trojan horse in Apple's yard

Trojan horse a

Samsung already has a bunch of its apps on iOS, but this year the company plans to bring the majority of its apps to the App Store. In fact, it's quite possible that all of Samsung's apps will be available for iPhones and iPads soon.

To many, this decision comes across as counterintuitive considering Samsung's rivalry with Apple. However, there’s no reason for Samsung not to make money off of Apple. In fact, it’s a smart decision that will support its position on the market, while Apple will likely take a hit, which may not seem quite that obvious.

Continue reading

Better customer experience can turn travel searchers into bookers

plane smartphone

When people are booking travel, companies like travel agencies, hotel chains and airlines have an opportunity to gain a loyal customer.

But a new survey of more than 500 travelers from data science specialist Boxever suggests that the window to turn searchers into bookers and beat the competition is a narrow one.

Continue reading

Electronic toys maker wants to blame parents for data breaches

finger point pointing accuse accusation

Electronic toys maker VTech has recently been a victim of a cyber-attack, which has seen the data of more than 6.3 million children exposed. The hackers got access to chat logs and photos.

Following the breach, VTech has updated its End User License Agreement, saying the company can’t provide a 100 percent guarantee that it won’t be hacked. It also shifts the responsibility back to the parents:

Continue reading

Get your legs moving, Asics buys RunKeeper app

Runner

As a society we tend to put an emphasis on being physically fit. There may be more diet plans out there than there are people to follow them. But honestly, there's no substitute for a smart meal plan and exercise, nothing fancy is needed.

If you exercise then you're likely familiar with the name Asics, a popular manufacturer of running shoes and clothing. To keep it all in the family, the company has now purchased FitnessKeeper, maker of one of the top running apps available in the mobile space. The app can track more than just runs, though. It handles walking and cycling as well, using GPS to calculate distance and pace.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.