Latest Technology News

Facebook hit with lawsuit over new stock option that gives Zuckerberg a license to print money

facebook_logo_phone

When Facebook announced its first quarter results this week, it also announced that it created a new class of stock. The non-voting Class C stock proposed would enable Mark Zuckerberg and his wife Priscilla Chan to more easily fund their philanthropic ventures, whilst keeping Zuckerberg himself firmly in control of Facebook.

In response to this, a lawsuit has been raised that says the proposed deal is unfair. The shareholders raising the class action lawsuit said the deal would grant Zuckerberg even more control and that the board committee didn’t do enough "to obtain anything of meaningful value" in return. The lawsuit accuses him of wanting "to retain this power, while selling off large amounts of his stockholdings, and reaping billions of dollars in proceeds".

Continue reading

Outlinely Express is a powerful free outliner for Mac

Outlinely.200.175

Glam Software has released Outlinely Express 2.0, a free version of its popular Mac outliner, Outlinely.

The new edition has all the same outlining features as its commercial cousin, with no annoying restrictions or limitations.

Continue reading

Apple: You're saying it wrong -- iPhones is not a word!

iphone_question_mark

Apple's marketing chief Phil Schiller has taken to Twitter to set the record straight about the nomenclature of the company's product names. Specifically, he takes umbrage with just sticking an 's' onto the end of product names to pluralize them.

Yep -- iPhones is, apparently, not a word. Someone might need to speak with Tim Cook to get him on the same page though, as he doesn't seem to have seen the memo.

Continue reading

Twitter's unfair token system gives it far too much control over rival apps

twitter_tokens

In recent days you probably heard about the demise, and subsequent resurrection, of the Twitter client Fenix. Earlier this week, the app became a victim of its own success, succumbing to what it described as "the infamous Twitter tokens limitation". It's now back in the Google Play Store having carved out some sort of deal with Twitter, but the debacle highlights an important issue.

If you want to create a Twitter client -- and why wouldn’t you? -- you'll need access to the Twitter API. This is not something Twitter wants, or permits, to just be a free-for-all, and it limits developers' use of the API through a token system. Simply put, one token equals one user, and Twitter decides how many tokens each developer has, in turn dictating the maximum number of users any rival Twitter client may have. Anyone spot a problem?

Continue reading

A company reborn: Intel ditches Atom chips to focus on the cloud, the Internet of Things and 5G

intel_logo_building

Big changes are afoot at Intel. A spokeswoman has confirmed that the company is scrapping its Sofia and Broxton mobile Atom chips, and will instead shift focus to more profitable ventures. Having invested billions of dollars in Atom for smartphones and tablets Intel is now switching its attention to the world of connected devices.

Giving Atom chips the chop comes just after the company announced 12,000 job cuts and effectively walked away from the PC market. In moving away from mobile devices as well, Intel is undergoing a rebirth. It is looking to focus on key areas of growth, particularly the cloud and IoT as well as 5G, memory, and data center products.

Continue reading

Qbot malware resurfaces with renewed powers ready to steal your banking credentials

steal_data_malware

Qbot -- also known as Qakbot -- is a form of malware that's been around for a number of years, but security researchers at Cisco Talos have noted that it has returned with a vengeance. Once installed the malware steals sensitive data stored in files and cookies, and also monitors live web sessions to grab login credentials.

Detection and immunization is made difficult thanks to the fact that Qbot uses random strings, code blocks, file names and encryption keys to slip under the radar, although it can still be detected by its behavior. Cisco Talos analyzed no fewer than 618 examples of the malware; Qbot was found to feature its own auto-update function and it appears that developers have been hard at work on it.

Continue reading

Microsoft looking into storing data using DNA

DNA

Now that users are generating more data than ever before, Microsoft has begun to explore the idea of using DNA molecules to store data.

To begin investigating the possibility of accomplishing such a complex task, the company will be purchasing 10 million strands of long oligonucleotides -- or lab made DNA molecules -- from a startup in San Francisco called Twist Bioscience.

Continue reading

What is the most popular Windows Phone?

Most popular

The Windows Phone landscape has evolved at a slow pace in the past three years, and the list of the ten most popular smartphones running the tiled operating system is proof of that. Since July 2013 Lumia 520 has held the top spot in the charts, taking Lumia 920's crown just a few months after being introduced. But, fast forward to today and we finally have a new king.

Before you get too excited and think that we finally have some major changes at the top you should know that Windows Phones appeal mainly to folks who shop in the low-end segment of the market. As such, the smartphone that follows Lumia 520 at the top of the pack is also an entry-level handset.

Continue reading

Lack of data is a roadblock to account-based marketing

marketing compass

The idea of account-based marketing (ABM), treating B2B customers as individual marketing targets, has been around for a while. Technology has made it more practical approach in recent years, but a new survey reveals there are still factors holding back its use.

Business insights specialist Avention has carried out a survey of 100 B2B sales and marketing practitioners about their use of ABM techniques and strategies. While more than 90 percent of those surveyed believe ABM is relevant to their businesses, respondents say that their number one roadblock to starting an ABM program is lack of access to the right data and the ability to use it.

Continue reading

How to boost your free Microsoft OneDrive storage back up to 15GB

cheating whispering shock

Last year, Microsoft announced plans to drop the free OneDrive storage amount from 15GB down to 5GB, and also discontinue the 15GB camera roll bonus.

Earlier this week we learned that the software giant will be putting this plan into action from July, which means if you’re currently using more than 5GB of storage you will either have to remove some files to get under the new limit, or upgrade to a paid plan. But hold on a minute. Before you do either, there is a third option which you can use to keep your free storage at 15GB.

Continue reading

Boys aspire to work in IT, girls find it boring

boy girl laptop students

The Internet organization Nominet, best known for running the .uk infrastructure, has compiled new research on the dream jobs of today’s students that shows how male students have begun to aspire for careers in technology while female students find the field less interesting.

The top three dream jobs of young boys all pertain to the tech industry, with computer game developers being number one, app developers being number two and website developers being number three. Twenty-four point eight percent of school aged boys would like to develop computer games while 17.2 percent envision themselves developing apps and 15.1 percent hoping to build websites. A sportsman is the fourth most popular dream job for boys at 14.6 percent followed by entrepreneur at 13.4 percent.

Continue reading

Microsoft takes just 7 hours to patch colossal Office 365 vulnerability that exposed companies' data

microsoft_logo_building

Companies are often criticized for the length of time it takes them to patch security problems found in software. But this week Microsoft exceled itself, taking just 7 hours to patch a serious security hole in Office 365 that made it possible to gain unrestricted access to businesses' cloud accounts.

A problem with the SAML authentication system meant that it was possible to gain access to just about any Office 365 account, including accessing connected services like Outlook, OneDrive and Skype for Business. More than this, the exploit allowed an attacker to infiltrate companies and organizations such as Verizon, Georgia State University and British Airways who use Office 365. The researchers who unearthed the issue have praised Microsoft for dealing with it so quickly.

Continue reading

Facebook's mobile ads boosting revenue

facebook_logo_phone

Facebook has put other tech giants to shame by comfortably beating analyst expectations in the last quarter, with revenues over 50 percent up thanks to surging mobile advertising sales.

As mobile web browsing continues to grow throughout the world, advertisers are realizing that taking a mobile-first approach has the potential to be extremely lucrative. Facebook has looked to capitalize on this by improving its mobile app and expanding its live video solution, both of which have attracted advertisers.

Continue reading

Facebook transparency report shows increase in government data requests, most with gagging orders

facebook_mac

Facebook has published its latest Global Government Requests Report covering the second half of 2015. The transparency report reveals that there has been as 13 percent increase in the number of government requests for data, but it also shows that Facebook is still not able to be as transparent as it might want.

For the first time the social network is able to report about the number of data requests that have a non-disclosure order attached to them. More than half of the requests -- 60 percent, in fact -- have gagging orders that prevent Facebook from notifying users about requests for their data.

Continue reading

Hacker creates reality TV with users' webcams

spy_button

The webcam debuted long ago and has become integrated into many computer systems. People use it for any number of things, and products like Skype utilize this functionality. But the innovation has a darker side. It turns out this little add-on can be hacked, allowing the perpetrator to view the user.

A hacker in Russia took this to a higher level by not only accessing people's cameras, but broadcasting the video online, right on YouTube.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.