Spotlight

Latest Technology News

How IT teams of the future will look

Team meeting

IT teams will look completely different in the next five years, according to professional IT resourcing company Experis.

The company has released a new report, titled Tomorrow’s Tech Teams, in which it polled 1,000 IT workers and 200 senior IT managers. Six in ten (59 percent) believe the traditional IT department doesn’t exist in modern business.

Continue reading

New solution helps enterprises guard against chat-based phishing

hand arm laptop security phishing lure scam

Slack is the largest enterprise chat platform in the world with more than 2.7 million daily active users who spend an average of 140 minutes per day using it.

Not surprising then that alert attackers see it as an opportunity to expand their social engineering campaigns. The fact than many people use Slack without the IT team's knowledge creates a further security issue.

Continue reading

What new tech will you see in your lifetime?

crystall ball

Technology has already shaped the world we live in. Things like television, the jet engine and the first computers have made major changes to the way we live our lives.

But what can we expect in the future? The pace of change is faster than ever and there are innovations on the horizon that will change our lives just as radically as those of the past.

Continue reading

Monitor and analyze your network traffic with SmartSniff

SmartSniff.200.175

We recently wrote about Microsoft Message Analyzer, and explained how it could be used to monitor and better understand your network and internet traffic.

It’s a hugely powerful tool, but also bulky and with an intimidating interface. If you’d prefer something more lightweight, then as usual, NirSoft might have the answer.

Continue reading

61 percent of Americans fear having their cars or home security cameras hacked

Car protection

As more and more devices get connected to the Internet of Things, so their susceptibility to hacking increases too.

New research from enterprise data protection company Vormetric in conjunction with Wakefield Research shows that this is a concern for many people.

Continue reading

Microsoft facing more lawsuits over forced Windows 10 upgrades

lawsuit_keyboard_button

Microsoft’s aggressive campaign to get customers to upgrade to Windows 10 might have seen the new OS grow in popularity, but the company's approach has, understandably, upset a lot of users. The software giant employed some increasingly sneaky tricks to fool Windows 7 and 8.1 users into accepting an OS upgrade they didn’t want and, inevitably, some unhappy victims are now looking to sue.

The software giant has already paid out $10,000 to a Californian whose PC was ruined by a Windows 10 update, and several US Attorney-Generals are reported to be actively pursuing cases against Microsoft. But on top of that two new lawsuits seeking class-action status have surfaced.

Continue reading

Xen hypervisor has 'fatal' security vulnerability

Computer bug

Security expert Jérémie Boutoille from Quarkslab says that he has found a critical bug in the Xen hypervisor. The open-source hypervisor, which has the likes of Amazon, and IBM on its cloud clients list, has had a bug which could lead to potential privilege escalation.

The bug, identified as CVE-2016-6258, affects all versions of Xen. However, only PV guests on x86 hardware should be worried. Hardware virtual machine (HVM) and ARM guests are deemed invulnerable.

Continue reading

Microsoft changes minimum hardware requirements for Windows 10 to improve security

Windows-10 key

Today -- the day before the free upgrade to Windows 10 expires, and just a few more days before the release of Windows 10 Anniversary Update -- Microsoft is tweaking the minimum system requirements for the operating system.

Specifically, hardware manufacturers will have to include TPM 2.0 in PCs, smartphones and tablets if they are to be considered Windows 10 compatible. TPM 2.0 (Trusted Platform Module) is an added hardware-based security layer that helps to protect user data,

Continue reading

Sennheiser unveils PC 373D 7.1 Dolby Surround Sound Gaming Headset

Sennheiser_PC_373D

If you were to observe me playing PC games alone in my basement (yes, I am a cliché), you may hear me talking. No, I'm not a crazy person speaking to myself; I am likely wearing a gaming headset and chatting with a stranger over the internet.

If you are a serious PC gamer, you should invest in a quality headset. Look, you spend all kinds of money on your gaming computer, mouse, and keyboard; why not splurge on a headset too? Today, Sennheiser announces an intriguing surround sound headset -- the PC 373D.

Continue reading

AMD unveils workstation Radeon Pro WX Series graphics cards

Radeon-Pro-WX-5100

We have a lot of news coming out of AMD’s kitchen, including new GPUs, an open-source rendering engine, and a new solution for large dataset applications.

First in line is the Radeon Pro WX Series of professional graphics cards, aimed at modern content creation and engineering. It is based on the Polaris architecture, and AMD says it was built with open-source software in mind. The new cards are "designed for creative professionals and those pushing the boundaries of science, technology and engineering".

Continue reading

O2 customer information available for sale on the dark web

O2 store

O2 customer data has been found available for sale on the dark web, most likely as a result of a hack that occurred several years ago.

The gaming website XSplit was hacked three years ago and those responsible for the hack were able to obtain usernames and passwords from the site. Through the process of credential stuffing, in which account credentials acquired through a hack are tested on multiple websites, the hackers were able to gain access and log into O2 accounts.

Continue reading

Did Google remove presidential candidates Donald Trump and Gary Johnson from search results?

Google logo sign building

The US has four nominees for president now. The choices narrowed a bit yesterday when Bernie Sanders officially nominated Hillary Clinton upon losing a hard fought campaign. Clinton swallowed her pride and did the same thing for Barrack Obama back in 2008.

Despite the common misconception, the US does have more than two parties, though most citizens seldom hear about others. There are also fringe parties that really aren't heard of.

Continue reading

At last! Google Play Family Library lets you share purchased apps, games and movies with others

google-play-family-library

It's something that Android users have been begging for -- the ability to buy an app once, and share it with members of the family. Until now, one way around the problem was to create a shared family account that could be used to download everything, but now Google has a better solution: Google Play Family Library.

This new feature not only lets you share purchased apps with up to six family members, but also games, movies, TV shows and books. It's something that could save Android-using families a good deal of money, and it's rolling out right now.

Continue reading

Seagate unveils 'Industry First' 2TB Nytro XM1440 M.2 PCIe NVMe Enterprise SSD

nytro-xm1440-ssd-dynamic-1000px

Solid state drives have been a huge boost to performance for home computer users. Long gone are the days where your PC had to have moving parts. The sound of a slow and loud HDD seeking data is a noise I will never miss.

SSDs are not just for the home, however, as the enterprise can leverage them too. Today, Seagate unveils what it calls an "Industry First" -- a 2TB M.2 NVMe Enterprise SSD, dubbed "Nytro XM1440". This fast drive with massive capacity could be a godsend for servers.

Continue reading

The easy way to become a cyber criminal

cyber criminal

You might think that becoming a cyber criminal required some hard work and dedication to your task, maybe even some form of apprenticeship where you learn the craft at the side of a more experienced hacker.

But new research has identified a one-stop, outsourced online shop, providing hosting, design and payment solutions for cyber criminals looking for a low-cost of entry method to sell their ill-gotten assets.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.