If you want to secure your Galaxy smartphone, the first thing that you should do is set up a screen lock. But what if you want to go a bit further, and protect specific things on the device? Well, Samsung just released Secure Folder, which gives you a "private, encrypted space" to store sensitive data in.
Secure Folder is derived from Knox, the company's secure platform for business users, and can be seen as a consumer-focused iteration. It acts as a sandbox for apps and data and works with existing authentication options to keep them safe.
Two-hundred-and-twenty in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Windows Store in the past seven days.
As always, if I missed an app or game that has been released this week that you believe is particularly good, let me know in the comments below or notify me via email instead.
Most Commented Stories
Today in Tech History
Dropbox is looking to tackle unauthorized access and other security incidents in the workplace with a chatbot. Called Securitybot, it that can automatically grab alerts from security monitoring tools and verify incidents with other employers.
The company says that through the use of the chatbot, which is open source, it will no longer be necessary to manually reach out to employees to verify access, every time someone enters a sensitive part of the system.
The Necurs botnet is one of the largest around at the moment and is principally known for sending spam including the Locky ransomware.
However, new research from BitSight's Anubis Labs has uncovered a new component being loaded in infected systems that allows it to use bots to enable proxy communications and perform DDoS attacks.
Just last week we were talking about Google's championing of RCS (Rich Communication Services), the successor to SMS. Now the company has renamed its Messenger app to Android Messages as it aims to become not just the default SMS app, but the default RCS app for Android users.
The name change also helps to better differentiate the app from others that had the same name -- such as Facebook Messenger, which is shortened to just Messenger on shortcuts. At the same time, the change is likely to cause a degree of confusion thanks to the sheer number of messaging apps Google now has.
The global public cloud services market is expected to grow 18 percent this year, according to Gartner’s latest report. Totaling $246.8 billion (up from $209.2bn last year), the growth will mostly come from IaaS, which is expected to grow 36.8 percent and reach $34.6 billion.
The growth will also be fueled by SaaS (20.1 percent increase, to $46.3 billion).
One of the best things about the Linux kernel (and associated operating systems) is the ability to work on various hardware types, including ARM. Microsoft's operating systems, by comparison, are far more narrow. True, there is the lightweight Windows 10 IoT for ARM boards, but it is hardly a factor nowadays.
Today, Ubuntu Core comes to the i.MX6-based and ARM-powered TS-4900 Computer on Module. While Android and other Linux options were already available for the IoT-friendly CoM, Ubuntu Core is still a major win. Canonical's revolutionary snap packages should work beautifully here.
Microsoft is currently working hard on the next big update to Windows 10, which it’s calling the Creators Update. This will be the second release on the Redstone branch (Redstone 1 being the Anniversary Update).
There is yet another release from the Redstone branch planned for later this year, and although Microsoft has yet to name it, work is already underway internally.
Cyber-attacks against organizations in 2017 will continue to be as successful as they were last year, because organizations aren't addressing the pain points they had last year, a new report says.
Fujitsu's "Blind spots and security basics -- letting your guard down could cost you in 2017" report says that attacks over encrypted channels will continue to be missed, due to the lack of SSL inspection capabilities.
After two years of research, Google has shown that it has successfully broken SHA-1 encryption. The company is yet to release details of how it achieved the first SHA-1 "collision", but has released a proof of concept.
In keeping with its own disclosure policy, details of how the encryption was effectively broken will be released after 90 days. In the meantime, you can take a look at two specially-crafted PDF files that have identical SHA-1 hashes but different content (the definition of a collision).
Sony today unveils a new line of SD cards aimed at DSLR and mirrorless camera users wanting to capture high-resolution photos and record 4K videos. Called SF-G Series, it has the "world's fastest" SD cards, featuring write speeds of up to 299MB/s.
The SF-G Series currently includes three storage options, namely 32GB, 64GB and 128GB, and is designed to keep data safe and maintain performance over time.
Security researchers from Kaspersky Lab are currently investigating the first Windows-based spreader for the Mirai malware, something that can have huge implications for companies that invested heavily in IoT.
The spreader was apparently built by someone with "more advanced skills" than those that had created the original Mirai malware. This, Kaspersky Lab says, has "worrying implications for the future use and targets of Mirai-based attacks."
Any website that allows contributions from visitors -- whether it is a platform such as Twitter or a site that has a comments section -- has to contend with the problem of abuse, swearing and harassment. Manually keeping on top of this sort of content can be a hellish task, but Google and fellow Alphabet subsidiary Jigsaw have launched a new technology called Perspective to help automate things.
The technology uses machine learning to identify what are being called "toxic comments" (defined as "a rude, disrespectful, or unreasonable comment that is likely to make you leave a discussion") so they can be dealt with appropriately.
Less than a fifth (17 percent) of customer relationship managers believe their CRM is generating revenue. This is according to a new report by marketing technology company Wiraya, based on a poll of 500 CRM managers.
Despite not having a great image, CRM is still perceived as a key business driver in a third of businesses. The problems, according to the report, lie in the fact that many lack a clear direction and customer insight to support their goals. Without these things, it’s hard to create direct business profitability.
Red Hat Product Security has published details of an "important" security vulnerability in the Linux kernel. The IPv6 implementation of the DCCP protocol means that it is possible for a local, unprivileged user to alter kernel memory and escalate their privileges.
Known as the "use-after-free" flaw, CVE-2017-6074 affects a number of Red Hat products including Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7 and Red Hat Openshift Online v2. Mitigating factors include the requirement for a potential attacker to have access to a local account on a machine, and for IPV6 to be enabled, but it is still something that will be of concern to Linux users.