Latest Technology News

New identity platform delivers passwordless authentication

We regularly hear stories about the imminent death of the password. Add in thousands of Internet of Things devices needing to authenticate and it’s clear that the time has come for a better system.

Identity management company ForgeRock is launching the latest edition of its ForgeRock Identity Platform, with advanced new capabilities that will enable organizations to employ passwordless login.

Continue reading

Businesses can minimize software costs by 30 percent

Reducing costs

Businesses can cut software costs by 30 percent if they stick to software management best practices, Gartner has announced -- research director Hank Marquis says potential savings are just "too large to ignore". Companies will spend $332 billion on it in 2016, so yes, it is a pretty big deal.

There are three best practices organizations can use to achieve these savings: optimizing software configurations, recycling licenses and using software asset management (SAM) tools.

Continue reading

Investigate suspect EXEs with Professional PE Explorer

Professional PE Explorer is a portable tool which allows investigating Windows executables including EXE files, SYS, DLL and more.

The download is so tiny you’ll wonder if it’s broken -- 78.1KB, really? -- but no, this is all you get. Unzip it and run PPEE.exe to get started.

Continue reading

Deezer now generally available in US

Most US consumers may not be familiar with Deezer and for good reason. While it is one of the oldest players in the music streaming industry, having launched nine years ago in France, the service has only been offered alongside some audio products and carrier subscriptions so far.

That is about to change though, as Deezer is now, finally, widely available in US. Just like its main competitors, it can be sampled on all the major platforms, including Android, iOS, macOS, and Windows, with customers getting unlimited access to the "world's largest music streaming library", live radio, news, and podcasts.

Continue reading

DisCoverJ automatically finds cover art for your MP3s

While there are endless MP3 tag editors around, cover art support is often basic, if it’s included at all. DisCoverJ is a Java-based editor which focuses solely on cover art, automatically locating, downloading and tagging your MP3s with the right images.

Installation is straightforward on Windows, Linux and Mac. There’s no adware or other hassles and you’re ready to go in seconds.

Continue reading

BT Broadband customers hit by connection problems due to DNS issues

BT broadband customers across the UK are reporting problems accessing websites today. The ISP is aware of the issue and is currently working to implement a fix, but in the meantime, thousands of users up and down the country are experiencing DNS problems.

The problem is also affecting customers of Plusnet, a separate branch of BT. The company says that "Engineers are working to fix things as fast as possible", but this will come as little comfort to those who find they are unable to go about their daily business.

Continue reading

Twitter slaps a permanent ban on Breitbart's Milo Yiannopoulos, AKA @Nero

There's a lot going on at Twitter at the moment. Yesterday, the company opened the floodgates, giving everyone the opportunity to apply for account verification. In the same day, Twitter also handed out a rare permanent ban to Breitbart tech editor and right wing pundit Milo Yiannopoulos, who went under the handle of @Nero.

Yiannopoulos has long-been a controversial figure -- a troll, many would say -- who has spoken out against feminism, movements such as Gamergate, Islam, and political correctness. This is not the first time he has received a ban, but in the past they have been temporary. The permanent ban comes after he was involved in a spate of tweets attacking Ghostbusters actress Leslie Jones.

Continue reading

Microsoft Stream lets businesses securely manage and share videos

Microsoft has announced a new video service called Stream that will enable businesses of all sizes to securely manage and share videos.

From today on, any user with a business email address will be able to sign up for the preview of the new service in seconds. With Stream they can then begin to upload, share and tag videos from their organization. It will also be simple to discover relevant videos since the company will employ machine learning to help users find trending videos and will also give them the ability to search by hashtag, most liked videos or other key search terms.

Continue reading

Forget Hillary's email server, Republicans use phony 'I vote Trump!' Wi-Fi hotspots!

Donald Trump secured the Republican nomination at the RNC tonight, meaning he is now officially their candidate for president. Most likely, Hillary Clinton will secure the Democrat nomination, so we can expect to hear Trump's criticism of her private email server usage for the next several months leading up to the election.

While Hillary Clinton's private email server usage was against the rules and wrong, it seems she is not the only one in politics demonstrating poor judgement regarding technology and security. It turns out, many Republican delegates are also lax in this regard, by connecting to non-secure Wi-Fi hotspots.

Continue reading

Google and Bing have no obligation to censor searches for torrents

The High Court of Paris has ruled that Google and Bing do not have to have automatic filters in place to scrub torrent-related results from searches. The battle against piracy is something that search engines have found themselves pulled into, but this latest ruling turns the debate on its head.

French music industry group SNEP went to court on behalf of a trio of artists, requesting that Microsoft and Google automatically filter out links to pirated material. The group had called for a complete block on searches that include the word 'torrent' as well as blocking sites whose name includes the word.

Continue reading

Security pros lack the necessary tools to thwart cyber attacks

Attack button

A new study from the Ponemon Institute reveals that external cyber attacks cost enterprises $3.5 million a year and that the majority of security and IT professionals lack the necessary resources and infrastructure to deal with these attacks, despite the growing risks and costs associated with them.

A number of threats were examined in the report including executive impersonations, social engineering exploits and branded attacks that occurred outside of a company’s traditional security boundaries. To address these external threats, security professionals cited an ever-growing need for expertise, technology and external services.

Continue reading

How to get your Twitter account blue tick verified

Perform a search for how you can get your Twitter account verified and get the much sought after blue tick, and you'll find all manner of nonsense. For a very long time Twitter users have not been able to request verification, but Twitter has reached out to those it deems worthy. Today that changes.

As of right now you can submit a request for verification. No need to sit back and wait for Twitter to contact you; you can now contact Twitter to plead your case. Of course, requests for verification are not guaranteed to result in a blue tick, but here's what you need to do.

Continue reading

Everything you need to know about ransomware

ransomware cash

Ransomware is one of the most feared security threats today and it is fast becoming one of the most profitable areas of cybercrime for attackers. It allows criminals to monetize their cybercrime efforts quicker than previous tactics allowed. Historically, they would have to steal their target’s data, and then find an avenue to resell that data to make it profitable. With ransomware, criminals are simply stealing a person’s data and selling it back to them for a price.

The victim already owned the data so they will definitely want it back. This therefore means the cybercriminal does not have a hard sell ahead of him. In addition to this, with the rise of anonymous currency, such as Bitcoin, there is even less of a chance of cybercriminals getting caught. Attackers can make hundreds to thousands of dollars per infection and get paid immediately, instead of going through other risky steps to make a profit.

Continue reading

Fedora-based Korora 24 'Sheldon' Linux distro now available -- 32-bit ISO dead

While there are many Linux-based operating systems to choose from nowadays, not all of them are great. Quite frankly, there are probably only a handful of distributions that I would truly recommend.

My absolute favorite Linux-based operating system is Fedora, but understandably, it is not ideal for all beginners. While I like the focus on free software only, some folks need some non-free stuff. Adding repos and setting up some of this software can be tricky for some. Luckily, Korora is a distro that takes the work out of setting up Fedora for beginners. Today, it achieves version 24, code-named 'Sheldon'.

Continue reading

How to get the Prisma beta on your Android phone

Some apps become overnight sensations -- something ably demonstrated by the Pokémon Go phenomenon. But it's not just games that experience an explosion in popularity. You can't help but have seen stylized pictures posted to Facebook: photos that have been transformed into striking works of art.

This trickery is the handiwork of the Prisma app. The app has only been available for iOS users, but that's about to change. It would have been madness not to have released Prisma for Android, and the company behind the app -- Prisma labs inc -- knows this. A beta version of Prisma is about to launch, and you can be the first to learn of its release.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.