Latest Technology News

Google can show you where to safely dispose of unneeded prescription drugs

The abuse of opioids and other prescription drugs in America is an absolute tragedy and epidemic. It affects people from all socioeconomic classes. Not only do these drug abusers risk death and financial ruin, but their actions negatively impact friends and family too. In other words, even if you don't abuse prescription drugs, there's a good chance your life will be impacted by somebody that does.

While many people envision prescription drug abusers buying their pills from an abandoned building or street corner (and that does happen), the truth is, many people get their drugs from medicine cabinets. In fact, according to Google, more than half of prescription drug abusers get started down the path to addiction with pills obtained from people they know -- friends and family. Why is this? Well, one reason is many people apparently don't know how to properly dispose of their unneeded prescription pills -- the search giant has seen a huge increase in searches for how to do so.

Continue reading

The changing enterprise mobile threat landscape

mobile shield

As enterprises continue the shift towards mobile devices there's concern that the risks could begin to outweigh the benefits.

Mobile security specialist Wandera has released a new report on the mobile threat landscape which looks at the risks faced by enterprise mobile users.

Continue reading

83 percent of US organizations have accidentally exposed sensitive data

data magnifier

According to a new survey 83 percent of security professionals believe that employees have accidentally exposed sensitive customer or business data at their organization.

The study from data protection specialist Egress also finds that accidental data breaches are often compounded by a failure to encrypt data prior to it being shared -- both internally and externally.

Continue reading

Security researchers reveal details of serious bug in compression tool WinRAR


If you're a user of WinRAR -- a staple tool for decompressing files whose popularity stems from not only its support for RAR files, but also its never-ending trial period -- it's time to ensure you have the latest security patch installed.

Security experts from Check Point Research have revealed details of a serious bug that has been present in the software for at least 14 years. The archiving tool was found to have a vulnerability in one of its .dll files, which could be exploited by simply opening a compressed file, and allows an attacker to "gain full control over a victim's computer".

Continue reading

Microsoft releases Windows 10 19H1 Build 18342 with Timeline for Chrome and access to Linux files from File Explorer

Microsoft has released a new Windows 10 build to insiders -- Windows 10 19H1 Build 18342. This new build sees improvements to gaming that fix problems with State of Decay. There is also the new and much-requested ability to access Linux files from Explorer, a host of bug fixes, and the launch of a Chrome extension for Timeline.

But while this is a significant update with a lot to explore, it's not for everyone. Microsoft has disabled the rollout of the build for systems with certain processors.

Continue reading

Google Maps for Apple iPhone and iPad now lets you follow your favorite places

While Apple reigns supreme on mobile from both a hardware and operating system perspective (iPhone and iOS are best in class), Google is still king of apps and services. Things like Google Maps, Chrome, and Gmail are used by many iPhone and iPad users. Why do Apple fans opt for these Google solutions? They simply work well and are extremely dependable. Apple Maps, for instance, is good, but Google Maps is great. The search giant provides reliable tools that people enjoy using.

Today, Google announces that its Maps app for iOS is getting even better. You see, users can now "follow" their favorite locations, such as theaters, restaurants, and museums to name a few. As a result of following these places, you will be provided with interesting information about them, such as discounts, holiday hours, or dinner specials, for example.

Continue reading

Howard Stern SiriusXM video content comes to Amazon Fire TV

Howard Stern is arguably the greatest broadcaster of all time -- his radio show is legendary for its innovation and laugh-out-loud comedy. For well over 30 years, Stern has been broadcasting in some form -- first terrestrial radio, but since 2006, he has been on satellite (what is now known as SiriusXM).

As great as listening to Howard is, his show can be very visual too -- it can be very rewarding to actually see what is happening in his radio studio. His E! television show is long gone, as is his "Howard TV" on demand service. Thankfully, the SiriusXM mobile app for Android and iOS now offers Howard Stern video content. Of course, wouldn't it be better to watch that content on your television rather than a small screen? Starting today you can, as the video content is now available on Amazon Fire TV. Previously, the only way to get the video onto your TV was using a Chromecast dongle.

Continue reading

Privacy: Facebook now lets Android users block background collection of location data

White location pin on a blue background

Faced with continued criticism about privacy, Facebook is rolling out an update to Android users that gives a greater degree of control over the sharing of location data with the social network.

Specifically, the update makes it possible to stop Facebook from using tracking your location in the background when you are not using the app. The change brings parity to the iOS and Android Facebook apps.

Continue reading

Employees and contractors expose information online in 98 percent of organizations

web threats

Employees and contractors are exposing confidential and sensitive information online and in the cloud in some 98 percent of organizations. This is found primarily in Dropbox, Google, and Microsoft SharePoint.

This is among the findings of a new report from insider threat specialist Dtex Systems which has analyzed information from work-issued endpoints and more than 300,000 employee and contractor accounts.

Continue reading

Cloud data warehouses are key to digital transformation

cloud data cable

Cloud data warehouses (CDW) offer broader data capabilities, stronger performance, and greater flexibility than traditional on-premise databases according to a new survey.

But the study by TDWI on behalf of Talend also shows enterprises need to follow some best practices to overcome implementation challenges and increase investment return.

Continue reading

GitHub widens the scope of its bug bounty program and increases rewards


Now in its fifth year, the GitHub Security Bug Bounty has been updated to offer larger rewards to those who find bugs. At the same time, the scope of the program is being expanded and protections for researchers have been added through new Legal Safe Harbor terms.

As well as expanding the program to cover any of its "first-party services", GitHub has effectively removed any upper limit on the size of reward pay-outs for critical bugs.

Continue reading

Formjacking is the new cash generator for cybercriminals

password theft

The latest Symantec Annual Threat Report reveals that cybercriminals are continuing to follow the money, but as ransomware and cryptojacking show falling returns they are turning to other techniques.

One of these is formjacking -- essentially virtual ATM skimming -- where cybercriminals inject malicious code into retailers' websites to steal shoppers' payment card details.

Continue reading

Microsoft reveals Russian hacking attacks as it expands AccountGuard protection across Europe

Angled Microsoft logo

Microsoft has revealed that it detected various attacks by Russian hackers targeting democratic groups in Europe. The company says that numerous attacks carried out between September and December 2018 can be linked to a group known as Strontium.

Also known as Fancy Bear, the group is a cyber espionage outfit with ties to Russian intelligence agencies. At the same time as revealing some details of the attacks, Microsoft also announced the expansion of its AccountGuard security program to more European countries ahead of European Parliament elections.

Continue reading

Kali Linux 2019.1 with Metasploit 5.0 available for download

Kali Linux

The first release for 2019 of the Debian-based Linux distro Kali Linux is now available for download. Kali Linux 2019.1 sees the kernel moving up to version 4.19.13, and it also includes Metasploit 5.0.

Offensive Security's penetration testing distro is much-loved by the infosec community, and this latest release includes ARM improvements, a range of bug fixes and package updates.

Continue reading

Eve Flare is an Apple HomeKit-enabled color-changing portable LED orb lamp

Having a "smart home" is all the rage these days, with people installing Wi-Fi cameras, locks, and security systems. Not to mention, voice assistant hardware from companies like Amazon, Google, and Apple allow you to interact with those aforementioned smart devices. Understandably, however, some people are wary of installing such things due to privacy concerns and hacking. These folks shouldn't feel bad about being cautious -- there is absolutely nothing wrong with being hesitant to allow major corporations into your home.

With all of that said, even if you don't trust having cameras or microphones in your home, smart lighting is a less risky option that you should still consider. It is very convenient to turn on a lamp, for instance, using your smartphone. Today, a company called Eve Systems launches a really cool such lamp. Called "Eve Flare," it is compatible with Apple HomeKit and features the ability to change the lighting color using your iPhone, iPad, or Apple Watch. You can even charge the lamp wirelessly.

Continue reading

© 1998-2019 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.