BetaNews Staff

Lizard Squad goes after Xbox Live, Twitch

attack mac keyboard security malware virus

As you're almost certainly aware if you're a PlayStation owner, this weekend saw an attack mounted on the PlayStation Network which took it down for a large chunk of time.

But PSN wasn't the only gaming service to get bombarded by DDoS (distributed denial of service) attacks this weekend, and indeed, other attacks are continuing right now -- courtesy of the so-called Lizard Squad, a "hacktivist" group which is enjoying its time in the media limelight. (Though note that another hacker from Anonymous claimed responsibility for the PSN attack, so it's unclear exactly what went on in that case.)

Continue reading

LG's first 4K OLED TVs go on sale

LG_4K_OLED_TV

LG’s first OLED 4K Ultra-HD televisions are on the way after the company combined the two technologies to make the first curved-TV to feature the new level of resolution.

The sets, which go on sale in September, will be the first such devices to reach retail stores and cost an eye-watering ₩12 million (roughly $11,796) to any consumer who wants to take advantage of the revolutionary technology on board.

Continue reading

How businesses can reduce security risks

business-security

Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, such as anytime, anywhere communications and the storage of vital and personal information for use in our work and personal lives. It has also provided greater flexibility in where and how we work and communicate, making things much easier for us.

However, it is important to acknowledge security aspects when evaluating mobility policies in particular. Cyber attacks are on the increase and will continue in their complexity and frequency. We hear about serious breaches on a daily basis. This can range from password leaks or mobile phone hacks to international scale bugs. I often find that in the corporate world, many recognize the threats but fail to implement any strategy, let alone take tangible action. The good news is that there are steps that can be taken by businesses to drastically improve mobile security.

Continue reading

Enterprise mobility: How to choose the right strategy

businessmen laptop notebook

Finding the ideal alignment and balance between hardware, software and employee preference has become the Holy Grail for those tasked with defining enterprise mobility strategy. BYOD delivered many great things, such as higher employee productivity and satisfaction. It also made IT managers rethink their strategies to make technology work for their organization in terms of mobility, security and management. Then COPE (corporate owned, personally enabled) came along, which promised to solve some of the problems that BYOD didn't, such as security. However, COPE also posed challenges of its own and is being followed now by CYOD (choose your own device).

With so many acronyms flying about, it might appear hard to know where to start identifying the best solution. However it would seem that 2014 has heralded the end for BYOD, with a recent report by analyst firm Gartner declaring its demise, stating, "There is no way for IT to assume full responsibility of securing and managing devices without ownership". Indeed, the acronym is now being translated by some as "bring your own disaster", suggesting it would perhaps be wise to learn from others' mistakes.

Continue reading

China takes on Windows, Android with new homegrown operating systems

china keyboard

China really is serious about shrugging off the shackles of Windows and other Western operating systems, as the country is apparently developing its own OS which is free from the security misgivings the government has about foreign software.

According to the Xinhua news agency (via Reuters), the Chinese government is looking to boost its domestic software industry and develop alternatives firstly for desktop operating systems (namely Windows), and then it will follow those footsteps in the mobile world with an Android usurper (or that's the theory). This is according to a certain Ni Guangnan, head of an "official OS development alliance" which was put together back in the spring.

Continue reading

Google Drive for Work sees strong enterprise adoption

office workers

Google’s Drive for Work storage product is seeing 1,800 new businesses sign up every week as enterprises continue to come around to the secure storage and collaboration option that it offers.

blog post by Scott Johnston, director of product management at Google Drive, explained that the $10 (£6) per user per month package has been popular across a number of industries since it was launched just two months ago.

Continue reading

Most people don't know the Internet of Things is actually a thing

secrets shock surprise man woman

A recent report has suggested that the biggest barrier to the Internet of Things (IoT) is that a large proportion of consumers have never even heard of the term.

According to a survey by The Acquity Group, titled "The Internet of Things: The Future of Consumer Adoption", 87 percent of respondents had not heard of the Internet of Things prior to the questionnaire.

Continue reading

Malicious email barrage hits European car rental companies

hacker attack

Automobile companies are being targeted by a new malware threat that is spreading like wildfire across Europe and stealing a wealth of sensitive information.

Symantec reports that the spam campaign, known as Infostealer.Retgate or Carbon Grabber, is aggressively targeting automobile companies with malware that steals encrypted information such as user names and passwords.

Continue reading

Making sense of the cloud: SaaS, PaaS and IaaS explained

cloud_theader_4_contentfullwidth

Cloud computing is one of the most important technologies in the world right now, but it can be extremely confusing at times.

What, for example, are SaaS, PaaS and IaaS? Read on as we take the jargon out of the cloud and explain things in a much more brain-friendly way.

Continue reading

5 tips to make your browsing safe and secure

safety button

The internet has become as ubiquitous as air. You’re connected at home via Wi-Fi, then you go out and stop by a cafe to grab a quick morning coffee and check your Facebook, then you come to the office, get all serious and send business mail to your colleagues. The internet gives us great freedom. But with that freedom comes great dangers and great responsibility -- you are responsible for protecting yourself on the web.

Every time you indulge into any sort of online activity, your data can be easily monitored and checked. The websites you visit receive your IP address, location, browser and operating system, screen resolution, ISP and more. You can check on what information you give away at stayinvisible.com. I have nothing against sharing this data when I do simple browsing. I am like Dutch windows without curtains -- doing nothing wrong, peep in whenever you want, I have nothing to hide.

Continue reading

Lenovo Yoga 2: A decent budget hybrid [Review]

lenovo-yoga-2-header_fullwidth

The Lenovo Yoga 2 is not to be confused with the Yoga 2 Pro. Although the basic principle of a notebook with a screen that flips over to turn the device into tablet is the same, the specification is markedly different. Just for starters, this is an 11.6in device rather than 13.3in -- but what's inside is much more value-oriented as well.

Instead of a processor from Intel's Core range, our Yoga 2 sample came with a Pentium N3520. This is part of Intel's Silvermount microarchitecture generation, in particular the Bay Trail-M family, which means it's actually from the same line as the Atom processor, despite the Pentium brand name. The N3520 has a nominal frequency of 2.166GHz, but a single core can rise to 2.42GHz in Turbo mode.

Continue reading

How to secure commercial online file sharing

security_image_contentfullwidth

Cloud-based file-sharing services benefit all types of businesses by providing easy, convenient access to information anytime, anywhere. With technology increasingly blurring the lines between work and personal lives -- often with the same platform being used in both worlds -- it can be easy to forget that work-related information often needs to be handled with greater care and a higher level of security.

If employees use personal accounts and free services designed for consumer use, in order to manage clients' documents, they could be putting your business at high risk for a security breach. This will become ever more important as the regulations around management of sensitive and private information get stronger and enforced more strictly. However, there are several simple steps companies can take to tackle these issues and keep business information protected.

Continue reading

Nearly 70 percent of homes will have an Internet of Things device by 2019

nest_thermostat_800_contentfullwidth

Acquity Group (part of Accenture Interactive) has just released the findings of its 2014 State of the Internet of Things Study, and the headline fact is that the firm estimates 69 percent of consumers will own an in-home IoT (Internet of Things) device come the year 2019.

Looking nearer to hand, by the end of 2015, 13 percent of consumers (2,000 US consumers were surveyed, incidentally) will have at least one IoT device in their home, such as a thermostat from the likes of Nest, or home security camera. Only 4 percent own a device like this right now, so that's a tripling up of ownership by the end of next year.

Continue reading

Software-defined networking on the edge

network_contentfullwidth

Software-defined networking (SDN) enabling the wireless LAN (WLAN) can help deliver a consistently high performance of critical business applications and simplify unified management of wired and wireless networks. However, to do this effectively, WLAN vendors need to provide solutions that offer immediate benefits to the IT department without any additional training or a "rip-and-replace" of existing controllers and access points.

It also means that these solutions must truly embrace the open architecture approach to SDN enabled by OpenFlow and advocated by communities and industry organizations like the Open Networking Forum and Project Open Daylight.

Continue reading

Gartner: 3D printing still a decade away for most consumers

3d_printing_header_640_contentfullwidth

Gartner says that 3D printers will be used to print medical devices in just two to five years. According to Pete Basiliere, research vice president at Gartner, in the next half decade "3D printing of medical devices will offer exciting, life-altering benefits that will result in global use of 3D printing technology for prosthetics and implants".

However it could be a decade before consumer level 3D printing reaches the mainstream. Basiliere continued, "over 200 startups worldwide are developing and selling consumer-oriented 3D printers, priced from just a few hundred dollars. However, even this price is too high for mainstream consumers at this time".

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.