Spotlight

Latest Technology News

Cinemax makes its debut on Sling TV

cinemaxannouncement

When Sling TV launched it already had a number of deals with major networks such as ESPN and CNN, bringing real-time TV viewing over an internet connection, and doing so for a reasonable price, especially compared to cable and satellite providers. There were also a number of add-on packages for such things as extra sports and news channels.

Last year, just in time for Game of Thrones, the service landed HBO, and now it has another prize in its lineup, one that may attract even more customers.

Continue reading

Changing the date could permanently brick your iPhone

Dead Phone

There have been a few serious iPhone issues discovered recently. Some phones got bricked by the iOS 9 Slide to Upgrade bug, there was a website that instantly crashed browsers and rebooted iPhones, and -- most recently -- Error 53 bricked devices repaired by non-Apple technicians.

Now a new iPhone-bricking bug has reportedly been discovered. And I say reportedly, because I’m certainly not about to try it.

Continue reading

Gmail now warns you if your emails are not TLS encrypted

broken_padlock

To celebrate Safer Internet Day the other day, Google gave away an extra 2GB of cloud storage to anyone who completed a simple security audit of their account. At the same time the company also introduced a couple of important security enhancements to Gmail.

The first change sees the appearance of a simple indicator that makes it clear when an email is received through, or is about to be sent through, a service that doesn’t support TLS encryption.  A broken padlock icon indicates that TLS encryption is not available, serving as a warning that there is the potential for the email in question to be dangerous or for the message to be intercepted.

Continue reading

Mac tool vulnerability exposes lots of apps to man-in-the-middle attacks

shot_padlock

A security specialist has discovered a flaw in Sparkle, a third-party framework that Mac apps use to receive updates, which makes a man in the middle attack possible when unencrypted HTTP connections are used.

If the attacker has the ability to intercept the unencrypted data stream for example on a public Wi-Fi hotspot they could possibly inject malicious code.

Continue reading

SourceForge pledges to clean up its downloader act

Trust

Likely just about everyone has installed software from SourceForge at some point in their computing history. In 2013, the software repository enabled a feature called DevShare which developers could opt-in to. This wrapped developer software in SourceForge’s own installer, which also, unfortunately, came with bundled junk  -- something many users might breeze right past during an installation.

But last month Sourceforge, along with Slashdot, was sold to BIZX and some changes are going to take place under the new ownership, and that means no more DevShare.

Continue reading

Microsoft is slowly conquering Android

Victory Winner Free

Microsoft may not have a strong presence in the smartphone market as a vendor, but the software giant is trying to make a splash in a different way, by partnering with other players to make its mobile apps available on as many devices as possible. And it stands a very good chance of making serious inroads.

Microsoft has so far teamed up with 74 companies, in 25 countries, to ship its apps on their Android smartphones and tablets. The latest major player to partner with Microsoft is Acer, which will preload some of the software giant's most-prominent Android apps.

Continue reading

How B2B eCommerce is evolving in the cloud [Q&A]

eCommerce global

Modern IT architectures have opened commercial off-the-shelf software categories to new forms of innovation. But still, most B2B eCommerce solutions have yet to evolve. The result is that many firms are left with outdated, in-house infrastructures or bulky SaaS tools that hamper operations, leave customers unsatisfied and can’t keep up at the speed businesses demand. Developers today who work with B2B eCommerce tools gravitate toward cloud-based platforms that are more comprehensive, agile and customizable. This allows for the creation of services and workflows that meet their unique needs.

I spoke with Steve Davis, chief technology officer at Four51, which powers B2B eCommerce for over 10,000 businesses and nearly 20 million users, about what B2B eCommerce solutions should entail and what developers’ priorities are -- or should be -- when building a modern day eCommerce site.

Continue reading

Microsoft introduces Windows 10 Mobile update history page

Microsoft Lumia 950 Windows 10 Mobile

Microsoft has decided to give more information about the updates it releases for Windows 10 by introducing a dedicated update history page on its site, where you can check all the major changes that the software giant includes. And, so that users of its new smartphone operating system are not left in the dark either, Windows 10 Mobile now also gets the same treatment.

However, before you get too excited, just like the update history page for Windows 10 is not exactly filled with all the relevant information you might need, the update history page for Windows 10 Mobile is not yet ready for prime time either.

Continue reading

The Internet Archive now lets you run over 1,000 Windows 3.1 programs in your browser

win31logo

Windows 3.1 was the first version of Windows I ever used. The Internet Archive, which has over the past couple of years made it possible to play classic DOS games and console games in your browser, has just added over 1,000 Windows 3.1 programs to its catalog.

These include games, utilities and business software, and each can be run in your browser just by clicking on them.

Continue reading

The top threats to watch for in 2016

Hidden threat

Messaging and infrastructure security specialist Cloudmark has released its Annual Global Threat Report for 2015 which reveals the biggest current threats based on its crowd sourced security platform, which analyses user behavior from more than a billion subscribers.

Top of the list is the Swizzor malware which delivers unsolicited ads, modifying browser settings without user permission. This silent threat delivers booby-trapped emails to unsuspecting users with varying subject lines. Each email contains a zip file carrying the malware payload, this uses a simple domain generation algorithm for command and control synchronization to create a large number of domains that then clash with legitimate websites and make it difficult for them to be taken down.

Continue reading

More consumers now care about how businesses handle their data

wave_goodbye

Nearly three million Brits have decided to leave a service provider that got hacked, a new research by security firm Privitar reveals. The report shows that 23 per cent of Brits have been affected by a security breach at some point, and 24 per cent of these reacted by switching providers.

The company says consumers now pay attention to how well a company handles data, when making choices. Even though data handling has become one of the key selling points for many companies, 52 per cent of consumers say it’s difficult to find any information on how companies store and use their personal information.

Continue reading

LG announces Quick Cover for yet to be unveiled G5 flagship

LG G5 Quick Cover case

LG is certainly tackling the launch of its upcoming G5 flagship differently than other major players. Earlier this month, when it announced the event during which the Android smartphone will be presented, it officially referred to it as G5. The company has also revealed that it would arrive with a so-called Active Display.

But that is not all. Unlike other manufacturers which mention official accessories right after showcasing their latest flagship, LG has decided to talk about G5's Quick Cover ahead of the handset's unveiling next week.

Continue reading

Dating apps -- the good the bad and the ugly

cupid broken heart

It's coming up to Valentine's Day, so inevitably the IT industry turns its thoughts towards dating apps. Two new reports show that the apps may not be living up to expectations, and that users of them could be revealing more than they intend to.

New research from app quality researcher Applause shows that consumers are more dissatisfied with dating apps than any other type.

Continue reading

The problem with current 'smart' access control systems

Biometric

There’s been an explosion in products that promise to make our facilities, assets, networks and cloud resources "smarter", more secure and safe, but do they?

With control system hacks on the rise and traditional lock/entrance manufacturers like Honeywell, Assa Abloy and Stanley developing more intelligent lock systems, it’s clear that enterprises in hospitality, healthcare and government are looking for a more granular access control that increases security.

Continue reading

Twitter's new Trust & Safety Council is a desperate measure for desperate times

blue_twitter_logo

All is not well at Twitter. Rumors about a rejigged timeline last week led to #RIPTwitter trending on the site and reassurances from Jack Dorsey did little to calm users' fears. But Twitter is failing to attract new users -- as today's earning's report shows -- and it is desperate to be seen listening to people, and providing tools that are valuable.

This is precisely why the micro-blogging site puts out feel-good stories about how it is tackling terrorists, shouts about beating online trolls, and goes out of its way to try to appeal to, and be useful to, people who don’t have an account yet. The move is the latest attempted to try to rejuvenate interest in the site which is failing to grow at the rate expected. It's an attempt to balance freedom of speech with control of those seen to be abusing the service.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.