Latest Technology News

Kids are dying because of their parents' obsessive phone use

iPhone by pool

Although it is the children of today who have never known a world in which mobile phones do not exist, it is the parents of these children that are causing serious problems -- and not just by using phones while driving.

The German Lifeguard Association (DLRG) has warned that children are dying because of their parents' phone usage. The organization says that rather than keeping an eye on their kids as they swim, parents are "fixated by their smartphones" and fail to notice when their youngsters get into trouble.

Continue reading

Microsoft pulls Your Phone app for non-Windows Insiders

Yesterday, Microsoft rolled out its new Your Phone app for Windows 10. Previously only available for Windows Insiders, the app allows Android users to access their photos on a Windows 10 PC.

If you’ve been wanting to try out the app, we’ve some bad news for you. You’ll once again need to be an Insider to use it.

Continue reading

Taking a look back: Where do 2018 wireless predictions stand?

5G, carrier updates, mergers -- we rang in 2018 with a slew of big wireless predictions. But where do these predictions stand now at the year’s halfway point? Let's take a look, starting with a big one -- 5G is coming

Ah, 5G. We’ve read about it, researched it, and heard the predictions that it’ll be available by the end of 2018. But is it all true? Well, AT&T claims it plans to launch 5G in 12 cities -- including Atlanta and Dallas -- by year’s end. The carrier giant has already taken 5G for a test drive with an introduction to visitors of Magnolia Market in Waco, Texas. The trial area, which sees approximately 5,000 visitors each day, was a real-world experiment for AT&T’s new 5G capabilities allowing the company to evaluate performance and visitor response.

Continue reading

Four ways to prevent an enterprise phishing attack

According to a new FBI report, businesses lost more than $676 million as a result of email fraud in 2017 -- up 88 percent from the year before. Clearly, businesses are losing the war against email scammers, as phishing attacks have become increasingly sophisticated and widespread.

Phishing is a method of social engineering (i.e. deception) used to gain access to a social media account, bank account or another protected resource. Hackers typically use an email or text message to trick the user into providing login information. Once the user reveals a username and password, the attacker will hijack the account. The outcome can be as devastating as a fully drained bank account. Frankly, all individuals and businesses should take phishing seriously.

Continue reading

Latest version of Marvel Contest of Champions causing iPhones to overheat

If you updated your Marvel Contest of Champions (MCoC) app recently, you might have noticed something -- your phone heating up to the point of not being usable.

Although version 19.0 of the game was supposed to fix some bugs, in reality, it introduced a new problem. Players noticed shortly after downloading the update that their phones started severely overheating when they tried to play the game.

Continue reading

Knowledge commerce: Building a solid brand with Kajabi

Photo: Petrenko Andriy/Shutterstock

"An investment in knowledge always pays the best interest." -- Benjamin Franklin

The same thought rings true in the online business sphere. Apart from assimilating the best strategies in your field, you also need to build and share your knowledge in order to win your audience’s vote of confidence. Remember, people flock to those who have proven their expertise in their respective niches. It isn’t rocket science: You can’t just expect your visitors to subscribe to your blog, subscribe to your services, or purchase your products if they don’t trust your brand. That’s why marketers invest in branding strategies that not only help them reach their target audience, but also earn their approval by providing valuable content.

Continue reading

How to backup your computer to the cloud with OneDrive folder protection

Previously only available to OneDrive for Business users, Microsoft is now rolling out OneDrive folder protection to everyone.

Also referred to as "known folder move" -- and rather copying the Backup and sync app from Google -- OneDrive folder protection makes it possible to back up your important files and folders to the cloud. Here's how to get started.

Continue reading

Money, power and ego, the factors that drive people to cybercrime

Cybercriminal with cash

We reported last week on a report highlighting how many security professionals are turning to a life of cybercrime.

In a follow up research piece, Wendy Zamora at Malwarebytes, has been looking at the psychology, motivations and other underlying factors that drive people to take part in cybercrime.

Continue reading

If you want to record calls in Android 9 Pie, you'll need to root your phone

Record button

Recording phone calls is dodgy territory legally speaking, but whether you choose to do it depends on where you are in the world, and whether you're concerned about complying with the law. Since Marshmallow, Google has made it difficult to record calls on Android phones by killing the recording API, but this has not stopped third party developers finding ways around it.

But with Android 9 Pie, Google has made it impossible for apps such as Call Recorder - ACR and BoldBeast Android Call Recorder to be used to record calls. Unless, that is, you're willing -- or able -- to root your handset.

Continue reading

Quickly remove unwanted bundleware using the latest IObit Uninstaller 8

We handle support for people who purchase software and the number one issue we consistently experience is the inability to install updated versions of their favorite software.

There are very basic reasons, too. When you first install your software, you’re often asked to reboot. After this procedure, it’s in use. The application may start when you boot your PC, run in the background, checking your system and much more. When you decide to upgrade, people expect to simply install the latest version on top, forgetting the application is being used and that Windows cannot remove active files.

Continue reading

Trojans increase as cryptomining declines

Trojan horse

The second quarter of 2018 has seen a significant increase in Trojan activity, seeing them become the leading type of malware, according to the latest report from Comodo Cybersecurity.

At the same time there has been a slight decrease in cryptomining software. However, this has gone hand-in-hand with a sharp increase in their harmful capabilities, including better concealment and stronger persistence.

Continue reading

Organizations still struggle with basic firewall management

firewall

Firewalls remain an important element of security architecture, but many organizations are still struggling with the basics, according to a new study.

Security policy management company FireMon has released its 2018 State of the Firewall report which reveals that 94 percent of respondents believe firewalls are as or more critical than ever.

Continue reading

SnapLogic integrates with GitHub to speed up DevOps capabilities

DevOps

Self-service application specialist SnapLogic is announcing new integration with GitHub to automate critical elements of continuous integration and continuous delivery (CI/CD).

The integration enables system administrators to host different versions of their work, including tasks, pipelines, and projects from SnapLogic, with visibility into changes with each update.

Continue reading

How to enable Chrome's secret Emoji Context Menu to make it easier to type emoji

Google Chrome Emoji Context Menu

The likes of Duolingo have made it easier than ever to learn French, Spanish, Polish, Hebrew or whatever other tongue tickles your fancy, but the language of the internet is -- arguably -- emoji. On your mobile phone, these handy little characters are easy to type, but less so on your computer.

To make things a little easier, Google Chrome now has a hidden Emoji Context Menu that you can enable. Once activated, this menu can be used to access an emoji picker to add emoji to text fields. Here's how to enable it.

Continue reading

Twitter is killing push notifications for third party apps -- here's what you need to do

Twitter logo and envelopes

Starting tomorrow -- Thursday, August 16 -- Twitter is disabling push notifications for third party clients. If you use the likes of Twitterific, Fenix or Plume, this could mean you miss out on important messages as Twitter clamps down on what third party tools are able to do.

Twitter has long had a tempestuous relationship with app developers, including its frankly bizarre token limit which effectively restricts the number of users any app can ever attract. This latest move is billed as a part of a security drive, but it's one that will impact a large number of people. There is something you can do to ensure you get Twitter notifications on your iPhone or Android handset, but it's not ideal.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.