Latest Technology News

Warning! Windows 8 will no longer receive security updates from today

If you’re still using Windows 8 it’s now time to upgrade because that operating system is about to get a whole lot less secure.

From today, January 12 2016, Microsoft will stop issuing security patches for its 3-year-old tiled OS, which will mean users will no longer be safe from newer threats.

Continue reading

Apple previews upcoming iOS 9.3 features for iPad, iPhone, and iPod touch

If you want a very secure and feature-rich Unix-like mobile operating system, Apple's iOS is incredible. In fact, many forward thinking folks, like myself, envision a day where it becomes a desktop OS too, potentially replacing OS X. While iPad Pro is a good first step, the iOS operating system still has a long way to go in that regard.

Today, Apple announces the features for the upcoming iOS 9.3 -- currently in beta. While hardly revolutionary, this evolutionary upgrade is packed full of some really cool new things. It may even be able to help you sleep better. No, really; iOS 9.3 could improve your overall health and well-being.

Continue reading

Amazon may release a new Echo, but here's what I really want

The Amazon Echo is a great device and I've made no secret of the fact that I use it a lot and like it very much. It's capable of doing quite a bit and more features come along all the time. We've witnessed, just recently, the addition of the game Jeopardy! as well as minor updates that didn't always go in favor of the users, but still improved the overall product.

A new report, well really a rumor because Amazon hasn't confirmed it (and I tried asking), claims the company has plans for a portable version of the digital assistant.

Continue reading

Police could tap into router data to verify digital alibis

Law enforcement agencies are missing out on a vast amount of valuable data that could be used to convict criminals, or prove innocence. Dan Blackman from Edith Cowan University, Australia says that police are missing out on swathes of data that could be gathered from Wi-Fi devices.

For privacy advocates it's a suggestion that is likely to make the gag reflex kick in, but Blackman says that router data could be a valuable tool in fighting crime. Information such as device MAC addresses, coupled with data about connections to routers can be used to place individuals at the scene of a crime -- or away from it -- but timeliness is the key to success.

Continue reading

The pros and cons of implementing a bug bounty program

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

A recent incident with the Facebook Bug Bounty program has led to many different reactions supporting both Facebook and the security researcher. Regardless of who is right in that whole story, the one fact is clear: the researcher went far beyond what the social media site had initially expected, and got access to the sensitive data the company didn’t really want to share with anybody, including the researchers’ community.

These days bug bounties have become very popular, raising more and more questions about their efficiency and effectiveness. We will try to understand how and if bug bounties can be used to test your corporate web applications. I intentionally omit bug bounties for stand-alone software (e.g. Chrome or various IoT applications) as it’s a different topic.

Continue reading

Security time bomb: Businesses are not ready for the end of Internet Explorer 8, 9 and 10 support

The end of support for older versions of Internet Explorer has been known about for some time now. Despite the fact that there has been plenty of time to prepare for a move away from Internet Explorer 8, 9 and 10, many businesses are simply not ready and security experts warn that this could lead to a spate of attacks from hackers.

Microsoft has been encouraging people to move to Internet Explorer 11, or Edge in Windows 10 for a while, and the countdown comes to an end tomorrow -- 12 January. From this point forward, there will be no more patches or security fixes issued. Security analysts fear that with Internet Explorer 9 and 10 accounting for 36 percent of IE and Edge use, and with more than 160 vulnerabilities discovered in Internet Explorer in the last three years, there are risky times ahead.

Continue reading

How to scale your DevOps efforts

Developer

All companies -- from retail, to media, to IoT -- are increasingly becoming software companies. Data loss, security threats, service downtime and performance issues can sink a business. As a result, DevOps has evolved from an island of marginalized system administrators to an organization-wide cultural shift.

Companies like Netflix, Ticketmaster and Etsy understand that DevOps entails established processes, interconnected systems for monitoring and diagnosing, and org-wide vigilance about incident response. As our businesses continue to become more software-driven, Heavybit’s community of developer-focused entrepreneurs, advisors and investors provide tips and tactics to scale your DevOps efforts:

Continue reading

Google further legitimizes YouTube creators with upcoming interview of President Obama

As the media landscape changes, alternative media is becoming much more popular. Creators on online platforms like YouTube and Twitch are becoming stars, rivaling their mainstream media counterparts. In other words, someone like PewDiePie could possibly attract a bigger crowd than some network TV stars.

Unfortunately, there is still a stigma that being a YouTube creator, for example, is a lesser level of celebrity. Well, Google is aiming to change this, and today, it announces that it will continue the tradition of giving some YouTube stars the opportunity to interview President Obama a few days after his final State of the Union address. Does this further legitimize YouTube creators?

Continue reading

Should your business build a mobile app?

You are thinking about having an app built to help grow your business. After all, the biggest and the best all have apps, so should you, right? Ideally, you do need an app for your business.

In fact, a recent study published by the Gallup Poll reports that 52 percent of the population checks its smart phones several times per hour, and of the remaining 48 percent, 20 percent of the people claim to check their phones once per hour. These numbers are a marketing team’s dream! So many easy to reach people in one place! So yes, you need an app!

Continue reading

Windows XP Embedded Service Pack 3 dies tomorrow

ATM keypad

Products, no matter how much we may like them, don't last forever. You don't want to be the person keeping a batch of Palms in the freezer for future use -- and there are people who do that. Product cycles run their course and technology moves forward.

Microsoft customers, in some cases, move forward very grudgingly. That's especially true of business, particularly ones who had to be dragged off of IE 6 -- they now need to be dragged even further from that comfort zone.

Continue reading

Security trends to watch in 2016

pixel padlock

2015 was a year for the record books in information and cyber security. Dozens of new vulnerabilities were uncovered, and government organizations, businesses and individuals continued to find themselves victims of high-profile data breaches.

As we settle into the new year, we don’t expect this trend to slow down. We foresee more security issues on the horizon that must be addressed in order to ensure privacy for companies and consumers in the year ahead. Here are our predictions on what’s coming in 2016:

Continue reading

The future of enterprise storage [Q&A]

Storage has undergone some major changes in recent years. The growth of cloud usage, the Internet of Things and the exploitation of big data have all meant increased demand and a shift towards different solutions. But how has this affected the storage industry and and what further changes can we expect to see?

We spoke to Mark Lewis, Chairman and CEO of storage specialist Formation Data Systems to get his view on how the industry is evolving.

Continue reading

Xiaomi announces Redmi 3 smartphone with huge battery

Xiaomi is well known for delivering attractive devices at very affordable prices. Its new Redmi 3 is no exception. The company's latest Android smartphone is a mid-range handset with a huge battery, but with a price tag that puts it closer to entry-level offerings.

Redmi 3 is positioned as one of the more affordable Android devices in Xiaomi's lineup, being introduced at the RMB699 (roughly $107) price point. For the money, there is really nothing that potential buyers might miss.

Continue reading

Brits acquiesce to internet surveillance but distrust data storage

UK web users are coming round to the idea of online surveillance by the government, but harbor concerns about how personal data will be stored. These are the findings of a survey by Broadband Genie that suggests terror attacks have led to a swing in public opinion of the Snooper's Charter.

But while people may be coming round to the idea of internet surveillance, they remain concerned about how private data -- such as browsing history -- will be stored. 27 percent of those surveyed said their opinion had been swayed by recent terrorist attacks by the likes of ISIS.

Continue reading

Turn desktop windows transparent instantly with Move Aside Please

Organizing a busy PC desktop can take a little work, as you’re forever minimizing, resizing, repositioning, and generally relocating windows for easier viewing.

Move Aside Please is a free tool which simplifies the process by moving windows -- or turning them transparent -- when you move the mouse over them.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.