Latest Technology News

Making sense of the cloud: SaaS, PaaS and IaaS explained

cloud_theader_4_contentfullwidth

Cloud computing is one of the most important technologies in the world right now, but it can be extremely confusing at times.

What, for example, are SaaS, PaaS and IaaS? Read on as we take the jargon out of the cloud and explain things in a much more brain-friendly way.

Continue reading

G.SKILL unveils Ripjaws 4 Series DDR4 Memory Kits

mid

When it comes to building a computer, there are many routes to take. Of course, if you are wealthy, you can throw money at your build and achieve something wonderful. However, for many of us average folks, money can sometimes be tight. If you are on a budget, you can aim for either cheap or inexpensive; there is a difference. You see, cheap components are of low quality, but inexpensive can mean high quality at a value.

For my last few major desktop builds, I have trusted G.SKILL exclusively. My brand loyalty is due to past performance; the manufacturer's memory has proven to be reliable and reasonably priced. Today, the company sets my heart aflutter, as it announces the Ripjaws 4 Series DDR4 Memory Kits.

Continue reading

Rebel NSA and GCHQ agents are actually helping make Tor more secure

Rebel NSA and GCHQ agents are actually helping make Tor more secure

For anyone looking to stay anonymous online, Tor seems like an obvious option. At the same time, it could lull users into a false sense of security -- after all, this is a network that was, at least in the past, funded by the military and US government -- and conspiracy theories abound that Tor is nothing more than a honey trap to catch the kind of people who have a need for anonymity because of their nefarious activities. The network has evolved over the years and now agencies such as the NSA in the US and GCHQ in the UK are actively seeking out vulnerabilities so they can crack the network. But the relationships are actually far more complex than that.

According to Andrew Lewman, chief of operations at Tor, the same agencies that are trying to break Tor are also posting tips anonymously about the vulnerabilities that have been found -- giving a chance for them to be patched. Talking to the BBC Lewman said:

Continue reading

PortableApps.com Platform 12 adds app menu, instant search, automatic app closing

PortableApps200-175

John Haller’s PortableApps.com has announced the release of PortableApps.com Platform 12, a major update for the all-in-one app manager.

Right-clicking the Platform system tray icon now displays a cascading menu containing all your apps, links to system folders, Backup/ Restore/ Eject functions and more.

Continue reading

SSL vulnerabilities leave Android apps open to attack

Android danger sign

If you're an Android user you may already have been tempted to don your tin hat and descend to your bunker following today's earlier story about app hacking. Prepare to settle in for a long seige then as new research reveals that many of the most popular Android apps have SSL vulnerabilities that leave them open to man in the middle (MITM) attacks aimed at stealing personal information.

According to threat protection specialist FireEye a significant proportion of apps allow an attacker to intercept data exchanged between the Android device and a remote server.

Continue reading

Best Windows 8 apps this week

pet run

Ninety-fifth in a series. Welcome to this week's episode of the best new apps and games for Microsoft's Windows 8.x operating system.

This week has been rather uneventful. Microsoft did release an update for its OneNote application that adds options to print notebooks and pages to the app among other things.

Continue reading

Sophos looking for beta testers for new Android security software, prizes offered

photo by Slavoljub Pantelic, Shutterstock

While the claims of Android malware may be a bit overblown, it does exist and has to be a consideration for customers. That fact has brought about an abundance of software designed to combat the perceived problem.

Now Sophos is jumping into the market, but for the moment its solution is in a testing phase. The company is calling on Android users to begin beta testing the new offering, and the security firm is adding an incentive in the form of prizes for people willing to step up.

Continue reading

5 tips to make your browsing safe and secure

safety button

The internet has become as ubiquitous as air. You’re connected at home via Wi-Fi, then you go out and stop by a cafe to grab a quick morning coffee and check your Facebook, then you come to the office, get all serious and send business mail to your colleagues. The internet gives us great freedom. But with that freedom comes great dangers and great responsibility -- you are responsible for protecting yourself on the web.

Every time you indulge into any sort of online activity, your data can be easily monitored and checked. The websites you visit receive your IP address, location, browser and operating system, screen resolution, ISP and more. You can check on what information you give away at stayinvisible.com. I have nothing against sharing this data when I do simple browsing. I am like Dutch windows without curtains -- doing nothing wrong, peep in whenever you want, I have nothing to hide.

Continue reading

Information security spending to grow 8 percent in 2014

Security alert

Worldwide spending on information security is set to top $71.1 billion this year, up almost 8 percent over 2013, according to forecasts by Gartner. It's also forecast to grow by a similar percentage next year to reach $76.9 billion.

Gartner says increased use of mobile, cloud and social services will drive new security technology through 2016. There's been a democratization of security threats too, driven by the easy availability of malware and infrastructure, via the underground economy, that can be used to launch targeted attacks.

Continue reading

Pebble scores the ESPN app, brings sports to your wrist

pebble

Yes, I know not everyone is a smartwatch fan. It is a device reserved for geeks, athletes and the curious souls who wish to know what it's about. Pebble was one of the first to market (Microsoft came early, but failed) and now it has one more app to get existing customers, and potential ones, excited.

With baseball season heading into the homestretch and football, basketball and hockey all looming, the company has landed ESPN for its wrist technology. You'll get scores and game updates right from the watch -- Sports Center always with you while you're out and about, not sitting on the sofa watching the game.

Continue reading

Apple launches OS X 10.10 Yosemite Beta 2

Apple Mac OS X 10.10 Yosemite

In late-July, Apple launched the public beta testing program for OS X 10.10 Yosemite, which it previewed at WWDC 2014. It was the first time the fruit logo company gave its non-developer Mac-toting users the ability to install a pre-release version of its long-lasting operating system. As an early adopter, I was eager to try it out as soon as possible. Sadly, the first public beta, as it was likely to happen, had its kinks.

But Apple has launched the second public beta of OS X 10.10 Yosemite (dubbed Beta 2), which brings with it a number of important changes over its predecessor, including some necessary bug fixes. Maybe the second time's the charm for those of us who ran into trouble with the first public beta.

Continue reading

Transform your photos with PhotoWand for Windows 8

PhotoWand200-175

PhotoWand is a free photo effects app for Windows 8. It’s not going to compete with the desktop equivalents any time soon, but there’s more than enough power here to make it genuinely useful.

There are simple and practical tools to improve your photos, for instance, including a crop function, blur and sharpen filters, and adjustments for hue, saturation, brightness and contrast.

Continue reading

Lenovo Yoga 2: A decent budget hybrid [Review]

lenovo-yoga-2-header_fullwidth

The Lenovo Yoga 2 is not to be confused with the Yoga 2 Pro. Although the basic principle of a notebook with a screen that flips over to turn the device into tablet is the same, the specification is markedly different. Just for starters, this is an 11.6in device rather than 13.3in -- but what's inside is much more value-oriented as well.

Instead of a processor from Intel's Core range, our Yoga 2 sample came with a Pentium N3520. This is part of Intel's Silvermount microarchitecture generation, in particular the Bay Trail-M family, which means it's actually from the same line as the Atom processor, despite the Pentium brand name. The N3520 has a nominal frequency of 2.166GHz, but a single core can rise to 2.42GHz in Turbo mode.

Continue reading

Gmail app hacked with 92 percent success rate

padlock phone

Researchers from the University of California Riverside's Bourns College of Engineering have identified a weakness in Android which allows personal data to be obtained from apps.

Tested against seven popular apps the method was between 82 and 92 percent successful on six of them, only Amazon with a 48 percent success rate proved more difficult to crack. Most vulnerable were Gmail and H&R Block at 92 percent, followed by Newegg (86 percent), WebMD (85 percent), CHASE Bank (83 percent) and Hotels.com (83 percent).

Continue reading

Get 6 months of Bitdefender Antivirus Plus 2015 for FREE [BetaNews exclusive offer]

bitdefender-av-2015

The new Bitdefender Antivirus Plus 2015 keeps consumers safer than ever from online threats. It is designed for extreme ease of use and will actually maximize your computer’s performance. The full version usually retails for $59.95 but BetaNews readers can enjoy it FREE for the next six months!

Bitdefender Antivirus Plus 2015 is among the world’s most effective security software and comes armed with a new Profiles technology that automatically detects whether you are working, playing, or watching movies, and tailors the use of resources to your benefit.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.