Latest Technology News

RogueKiller 11 ships with rewritten kernel driver, ADS detection


French developer Adlice Software has released RogueKiller 11, the latest edition of its powerful malware detection tool.

The new build comes with a completely rewritten kernel driver, delivering more efficient scans and improved reliability for the latest versions of Windows.

Continue reading

Google killing Chrome for 32-bit Linux


If you live in the web browser, using a Linux-based operating system makes a lot of sense. By combining say, Ubuntu and Google Chrome, you can have a very secure and easy-to-use platform running the world's best web browser. A bloated and heavy Windows 10, for instance, could be unnecessary.

Sadly, if you are like me, and the first thing you install on any fresh Linux-based operating system is Google Chrome, you might be in for a world of trouble. You see, Google is killing Chrome for Linux; well, the 32-bit version at least. Is Google making a big mistake?

Continue reading

The threats of November 2015, Linux ransomware leads the way according to new report

House security

November is almost in the books and we're into the holiday season. Unfortunately that means some people would like your money to shop with. November was about ransomware, not just viruses, trojans and malware, or at least that's what a new report has found.

Dr Web states that Linux was at the top of the list in terms of what could go wrong. Linux.encoder.1 ranked as the top threat of the month. This is a derivative of Trojan.encoder.737 which was found in 2014 and has since been changed into this iteration.

Continue reading

The security risks of IoT devices

Internet of things

The Internet of Things (IoT) isn’t a new concept, but it has gained momentum especially within the last year, as more and more connected devices have come to market. While connecting everything brings added convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective, and importantly, which devices could pose a threat either now or in the future.

With so many connected devices we decided to take a look at those that have made the headlines so far this year. Cars, for instance, have only recently become connected, although they have long been computerized. However, with poor Internet security expertise some manufacturers are being caught out.

Continue reading

Where in the world is Google Pixel C?

Google Pixel C

Black Friday is behind us, Cyber Monday is here, and Christmas shipping new purchases cuts off in about three weeks. Which makes me wonder: Where is Google's new tablet? When announced at the end of September, Google product director Andrew Bowers said that the "Pixel C will be available in time for the holidays on the Google Store". Eh, yeah—by whose measure is "in time". The information giant typically sells out of new gear, which leaves little time to manage inventory. "Out of stock" notices will disappoint many shoppers, who may buy something else.

I watched for this baby to drop before Thanksgiving, particularly with Apple iPad Pro already available—three weeks now. Granted, the devices target different markets, if for no other reason than size (12.9 and 10.2 inches, respectively). But each is innovative and stylish and would make great presents for someone. I'm ready to buy, Google. As surely are many Android fanboys. I reached out to the PR staff there today and was told to "stay tuned", which could be interpreted as soon. We shall see, eh?

Continue reading

Microsoft continues to earn its enterprise dominance with new business solutions

Businessman Business best better good

When I am doing personal computing at home, I will often use Ubuntu and LibreOffice. Free and open source solutions are more than enough for my personal needs. Hell, I can sometimes even get by with a Chromebook if my needs are very light.

When it comes to the enterprise, however, and getting serious work done, I depend on Microsoft and its closed source solutions. Software like Office 2016, SharePoint and Skype for Business are absolutely brilliant. The company has earned its dominance in the business space. Today, at the Convergence EMEA conference, it announces new solutions that further cement the company's reign of the enterprise.

Continue reading

Is your network ready for IoT devices?

Internet of things

The stats are here: investment bank Goldman Sachs cites the Internet of Things as a $7 trillion opportunity by 2020 -- with IoT set to have an impact at every stage in the production and distribution of products.

Wikibon predicts the value of efficiency savings from machine data alone could reach close to $1.3 trillion and will drive $514 billion in IT spend by 2020. Manish Sablok, head of Field Marketing, North West and East Europe at ALE, looks at the four fundamental network requirements to enable businesses to take full advantage of the transformations that IoT will drive.

Continue reading

Windows 10 on Mac: Boot Camp vs Parallels

Windows 10 running natively on Mac via Boot Camp 2

If you want to run Windows 10 on a Mac there are really only two options worth considering: a native install using Boot Camp or virtualization through Parallels. Each is excellent in its own right, but which one best meets your needs?

Trying to answer that question can prove to be a daunting task for many Mac users, based on my experience. The conundrum: Boot Camp is easy to use and readily available in OS X, while Parallels is the most versatile software of its kind for OS X. It's not easy. Fortunately, this article will help you understand which one is right for you.

Continue reading

Spoiler alert! Google reveals the trending gift searches for Cyber Monday


Black Friday is out of the way (not that it is really restricted to just one day this year) and now it's time for Cyber Monday. Traditionally -- if the word can be applied to such a recent phenomenon -- this is the day when you can snap up a techy bargain in time for Christmas, and Google has shed some light on what people are searching for this year.

The search data is like peering into the future. The searches of today, are the gifts of next month. If you want to get an idea of what your nearest and dearest might be popping under the tree for you this year, the top trend gift searches could give you some pointers. Warning: there may be gift spoilers ahead.

Continue reading

How to keep your mobile data safe

Security Lock Circuit

Every month we see another story hit the headlines of how a household name has lost customer data. These type of incidents can cost millions to put right, not just in updating the IT systems, but in terms of lost revenue due to loss of good reputation, and potentially punitive fines.

When the new EU General Data Protection Regulation (GDPR) comes into force, expected during 2017, fines for non-compliance could be five percent of global turnover. This is a significant sum for any size of organization and deserves serious consideration.

Continue reading

Government enterprise surveillance demands drive BlackBerry to quit Pakistan


BlackBerry wants nothing more to do with Pakistan. The Pakistani government had demanded that it be permitted to monitor BlackBerry Enterprise Service emails and BBM messages. Unwilling to bow to these demands, the company has decided to pull out of the country entirely.

From the end of 2015, BlackBerry will no longer operate in Pakistan as the company says that it does not want to compromise its customers' privacy. Unwilling to comply with surveillance directives or show any sort of support for backdoors, BlackBerry has decided to cut its losses and run.

Continue reading

The benefits of disaster recovery in the cloud

disaster recovery plan

As more systems are moving to the cloud it's leading to an evolution in requirements for disaster recovery.

Irish IT solutions company ERS Computer Solutions has produced an infographic looking at how companies can benefit from disaster recovery in the cloud.

Continue reading

Taking enterprise security to the next level with two-factor authentication

Smartphone lock unlocked key

Two-factor authentication (2FA) has been about for much longer than you think. For a decade or more we have been used to being issued with a card reader (in essence a hardware token device) to use with our bank card and Personal Identification Number (PIN) when looking to complete our internet banking transactions.

2FA technology has also, over the past years, been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice.

Continue reading

Amazon unveils new hybrid drone prototype for 30-minute Prime Air deliveries


When you make an impulse purchase -- or you're just an impatient type -- time is of the essence. Next day delivery is far too slow, and same-day delivery has gradually spread to certain places. Some cities have the option of delivery within the hour, but Amazon is working on cutting this down to as little as 30 minutes with Prime Air.

As you would probably expect, these super-speedy deliveries will be facilitated by drones, and Amazon has unveiled a new prototype drone that blends elements of a helicopter with those of an airplane. Unlike other drones we’ve seen the Prime Air model is quite large, and is capable of carrying up to 5 pounds.

Continue reading

How to: Find your misplaced phone with Amazon Echo and IFTTT

Amazon Echo

Amazon just recently introduced support for IFTTT (If This Then That) to its Echo product. The company is pushing fairly hard to add functionality to its device. On a regular basis you will find a new addition at the top of the app when you fire it up on your phone or tablet.

With the introduction of IFTTT Triggers Alexa can now do even more. There are a number of recipes to choose from, but setting them up, in most cases, is pretty similar. Many involve your phone so be prepared to turn your number over, though neither entities have given reason for mistrust.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.