Latest Technology News

Master & Dynamic MH40 headphones [review]

Newcomer is the only way to describe Master & Dynamic, which on Dec. 31, 2015 completed its first full year of revenue. Young or not, its audio gear is vintage and refined. Wanna see? You can find the MH40 headphones, which look like something World War II bomber pilots would wear, inside any Apple Store. Distribution partnership of that caliber from a near start-up says much about M&D earphones and headphones—design, price, and sound.

The signature sound is full, which is atypical in a market where booming bass ranks among headphone buyers’ top priorities. But for those listeners who delight in the faintest tap of the symbol, warmest treble, and deep lows that reveal details rather than thump, thump, Master & Dynamic delivers. For Christmas I bought the company’s MW60 wireless headphones, which I will review soon. Today's topic is the MH40, which are wired.

Continue reading

Acer Chromebook 14 has aluminum body, 14-inch screen, and up to 14 hours of battery life

When it comes time to name a device, a marketing team usually gets involved. Many monikers are thrown about, often with a number designation that signals screen size, generation, or something else altogether. The Nexus 6 is based on screen size, iPad naming is sometimes based on generation, and the Xbox One -- well, who knows what Microsoft was thinking with its third console!

Today, Acer announces its newest Chrome OS laptop, the Chromebook 14. I know what you are thinking -- 14 inch screen, right? You would be correct -- that is the size of the display. While that is the obvious inspiration for the name, the number 14 is significant in another way too. You see, the Acer Chromebook 14 features up to 14 hours of battery life. While that is impressive, Acer has one more trick up its sleeve too.

Continue reading

Xiaomi launches Redmi 3 Pro with fingerprint reader at less than $140

Xiaomi is one of the first brands that spring to mind when we talk about affordable smartphones today. That's because the Chinese maker has come up with some highly attractive devices which feature very impressive specs at more than reasonable price points. A good example is its new Redmi 3 Pro.

At less than $140 (RMB 899), the new Redmi 3 Pro features a premium build, large, high-resolution display, fast processor, lots of RAM and storage, bit battery, competitive cameras, but also a fingerprint sensor, which is a feature that is typically seen on much more expensive smartphones.

Continue reading

New service addresses security concerns in Microsoft SCCM environments

Enterprise security

Potential security vulnerabilities in Microsoft SCCM (System Center Configuration Manager) environments are a concern for 70 percent of IT professionals, according to a new survey, with 65 percent planning to conduct an SCCM security review in the next year.

The results of the study of more than 150 professionals by security company Adaptiva have been released to coincide with its launch, along with Windows Management Experts, of a new security auditing service for SCCM users.

Continue reading

A closer look at Bitdefender's new free ransomware security tool

Bitdefender Labs has released BDAntiRansomware, a free tool which keeps your PC safe from some of the most common ransomware threats.

The program "protects against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families", the company explains.

Continue reading

The biggest barriers to adopting BYOD

BYOD key

Thanks to the benefits that it offers in terms of productivity and employee satisfaction, BYOD remains a popular option for many companies and the market is predicted to be worth $360 billion by 2020.

But a new report from Crowd Research Partners in conjunction with some leading data security vendors -- including Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security --provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.

Continue reading

IT budgets will mostly go towards buying mobile devices, security

Business mobile devices

IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.

According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.

Continue reading

Bitdefender's new tool protects against ransomware

Ransomware eye

Ransomware is the malware du jour, and each strain seems more vicious than the last. As with any virus variant, there is a game of cat and mouse played out between virus writers and security companies as each battles to outwit the other.

Trying to get ahead of the curve, Bitdefender has released a tool that offers protection against the likes of CTB-Locker, Locky and TeslaCrypt. When it comes to dealing with ransomware the advice, unfortunately, has become a case of either pay up, or revert to data backups. Alternatively, you could try prevention rather than cure, and Bitdefender's 'crypto-ransomware vaccine' could be what you've been looking for.

Continue reading

Apple responds to FBI iPhone hack, but questions remain

Yesterday, the FBI announced that it had managed to break into the San Bernardino shooter's iPhone sans help from Apple. The iPhone manufacturer will undoubtedly be pleased that the court case has come to an end without the company having to cave in and assist the agency.

In a statement, Apple said: "From the beginning, we objected to the FBI’s demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent. As a result of the government’s dismissal, neither of these occurred. This case should never have been brought". But with the FBI's previous insistence that help from Apple was absolutely essential, some serious questions remain.

Continue reading

A closer look at the Never 10 automatic upgrades disabler for Windows 7, Windows 8.x

Never 10 is a new freeware tool which aims to prevent Windows 7 and Windows 8.x systems from automatically updating to Windows 10. Sounds like a host of other recent update-blockers, we thought -- but no. It’s more interesting than that.

First up, it’s written by veteran developer Steve Gibson, the man behind SpinRite, ShieldsUp! and assorted early Windows freeware, and someone who knows what he’s doing. If you need more reassurance, the 81KB download size tells you there’s no adware here, no extra payload.

Continue reading

Is IBM guilty of age discrimination? -- Part one

Is IBM guilty of age discrimination in its recent huge layoff of US workers? Frankly I don’t know. But I know how to find out, and this is part one of that process. Part two will follow on Friday.

Here’s what I need you to do. If you are a US IBMer age 40 or older who is part of the current Resource Action you have the right under Section 201, Subsection H of the Older Worker Benefit Protection Act of 1990 (OWBPA) to request information from IBM on which employees were involved in the RA and their ages and which employees were not selected and their ages.

Continue reading

The benefits and challenges of building a hybrid cloud

The growth of cloud computing over the last decade has been unprecedented. From a relatively unheard-of concept, the cloud has become a key part of the boardroom conversation amongst CIOs and IT directors at companies across industries, sizes, and revenues for its promise of organizational transformation.

A large amount of enterprises have already built their own private cloud networks, hosting essential applications and providing anywhere, anytime access to mission critical data for employees scattered across the world. In many cases, the effort pays off, resulting in increased productivity, reduced costs and ease of access.

Continue reading

AT&T announces hardcore and rugged Unite Explore 4G LTE mobile Wi-Fi hotspot

Most smartphones can double as Wi-Fi hotspots nowadays -- depending on your cellular plan, of course. For instance, I have an unlimited data plan from Verizon that prevents me from using the hotspot functionality of my iPhone. In order to get that feature working, I'd have to move to a tiered plan -- they'd have to pry my unlimited plan from my cold, dead hands. A dedicated hotspot device is my best option.

Even if you can use the hotspot feature on your phone, you may still want to opt for a dedicated device. Why? It won't drain your phone's battery and might offer better performance. Today, AT&T announces a hardcore and rugged hotspot called the Unite Explore. It even doubles as a battery pack to charge your devices!

Continue reading

Google enables cloud-based image search saving for desktop

Some say Bing is the best search engine for adult-themed image searches -- I wouldn't know. What I do know, however, is that Bing is the new integrated image search for Microsoft Office -- it works very well for that. With that said, Google is what I use most often. Since it is the search engine I use for text, I just go to it for images too -- it works brilliantly.

Today, Google is improving its desktop image search with a new cloud-based saving system. This mirrors the functionality found on mobile and enables a more robust way to "save" images you want to look at later. Rather than save the files locally, they are kept in the cloud -- sort of like a bookmark.

Continue reading

FBI cracks San Bernardino iPhone without help from Apple

The US justice department has announced that it has successfully cracked the iPhone belonging to the San Bernardino shooter, Syed Farook. The FBI was able to unlock the phone without help from Apple, ending the lawsuit that had pitted the FBI against Apple.

In a statement, the Justice Department said: "The government has now successfully accessed the data stored on Farook's iPhone and therefore no longer requires the assistance from Apple." It has been thought that Israeli security firm Cellebrite was helping the FBI, but the question now has to be asked about the security of other iPhones and whether law enforcement agencies will use the same technique to access data in the future.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.