Latest Technology News

Secure your Twitter account with two-factor authentication

There are not many well-known online services that don't offer two-factor authentication (2FA) nowadays, but Twitter is very late to the party. Well, that might not be strictly true. Twitter recently added support for third-party authenticator apps, but failed to make any sort of song and dance about it.

The change means that it's now possible to make use of the likes of Google Authenticator and Authy with Twitter -- but you'd be forgiven for not having found the option by accident already.

Continue reading

Unigine ships graphics benchmark with 8K, VR support

Russian software developer Unigine Corp has shipped a new graphics benchmark based on the Unigine 2 engine.

Unigine Superposition Benchmark can use DirectX or OpenGL to stress-test your GPU, and offers support for resolutions from 720p up to 8K.

Continue reading

'Here be dragons': Look past FUD to see the real security threats

looking ahead

It shouldn’t come as a surprise that cybercrime is big business, and is growing at an exponential rate. In 2015, UK insurer Lloyd’s of London estimated the cybercrime market at $400 Billion. Today, just two years later, the World Economic Forum estimates that same market to currently be $3 trillion. And the prediction from Cybersecurity Ventures is that it will cost the world in excess of $6 trillion annually by 2021.

The "darknet" -- the part of the Internet that most people have never seen and which lies beyond normal web browsers -- is protected by layers of anonymity, and has become a haven for criminal commerce. Its inaccessibility lends it a certain mystique, but that aura of mystery breeds misunderstanding. At the edge of the unknown, understanding tends to be a scarce commodity and is often replaced with fear, uncertainty, and doubt -- a trio so intertwined they’re better known simply as "FUD."

Continue reading

Twistlock delivers enhanced security and compliance for container environments

security flaw

In recent years containerization has seen increased popularity thanks to its ability to deliver an agile, flexible environment in which software can be reliably moved from development to testing to live, or from in-house to the cloud.

But the use of containers also throws up new challenges, particularly when it comes to keeping data secure. Container security specialist Twistlock is using this week's DockerCon to launch an updated product with new features, improved performance and a revised user interface.

Continue reading

My Family Tree 7 extends GEDCOM, PAF support

Chronoplex Software has released My Family Tree 7.0 (32-bit here), the latest edition of its excellent freeware genealogy package.

This release adds support for importing the old FamilySearch Personal Ancestral File (PAF) records, as well as older GEDCOM files produced by the Family History System.

Continue reading

Are bots set to replace apps for mobile commerce?

As the world has moved more towards using mobile platforms for eCommerce and accessing the web, many companies have been looking to shift away from apps towards more responsive technology delivered by bots.

But is this model the future? Mobile development company ROKO Labs has produced an infographic looking at the pros and cons of both approaches.

Continue reading

The Internet Archive now lets you run classic Apple Mac games and programs in your browser

The Internet Archive is a fantastic resource for old software. It’s home to large collections of Windows 3.1 programs, classic DOS games, Amiga games, arcade games, vintage console games, and more.

Now the site is hosting a collection of old Apple Macintosh programs that you can run in your browser.

Continue reading

Force Windows to write cached data to disk with FFB

Run a Windows program which writes to disk and the changes won’t necessarily be saved immediately. The OS holds them in its cache for a short while, then writes them all at once in an optimized order to improve performance.

While that seems like a smart speedup move, it can also cause problems. Unplug a USB key before all the changes have been corrupted and the drive could be corrupted.

Continue reading

Facebook responds to the Cleveland murder shared on the social network

Over the weekend, it was suggested that Steve Stephens used Facebook Live to livestream himself fatally shooting a man in his 70s. He went on to use the social network to admit to other murders, as well as saying that he wanted to "kill as many people as I can."

Despite rumors of a murder having been committed live on Facebook, the social network issued a statement clarifying that, while Stephens had broadcast on Facebook Live over the weekend, the footage had actually been uploaded rather than livestreamed. Whether broadcast live or not, the story -- once again -- brings into question Facebook's content vetting procedures.

Continue reading

Microsoft says Golden State Warriors will beat Cleveland Cavaliers to become NBA Champions

Today at 3pm Eastern Time, the 2017 NBA Playoffs will begin. All of the playoff series are best of seven, meaning the first team to win four games in each is victorious and moves on. This happens for both the Eastern and Western conferences, until the best of both meet each other for the Finals.

This year, Microsoft -- through its "Bing Predicts" service -- says that Stephen Curry and the Golden State Warriors of the West will beat LeBron James and the the Cleveland Cavaliers of the East to become NBA Champions.

Continue reading

Microsoft already fixed the 'Shadow Brokers' exploits on supported versions of Windows

happy customer

Say what you want about Microsoft, but the company stays on top of security. Yeah, it may issue more patches and fixes for Windows compared to some other operating systems, but that doesn't necessarily mean the OS is less secure -- it could mean that the company is simply more proactive and transparent than others. Quite frankly, I'd rather get many patches than be lulled into a false sense of security.

When hacking group "Shadow Brokers" started leaking NSA-discovered exploits, many people were understandably worried. While the leaks would enable operating system makers to issue patches -- thereby making the OS more secure -- it also meant that before the fixes were issued, many computers would be at an increased risk. Luckily, when it comes to the recently leaked Windows exploits, Microsoft was already prepared -- currently supported versions of the operating system are not impacted.

Continue reading

UK businesses face nearly 500 attacks a day

Attack button

OK, so, Beaming says UK businesses suffered, on average, 43,000 cyber-attacks in the first quarter of 2017 -- each. If this number sounds way too big, then it would be even more interesting to hear that this is actually seven per= cent lower than what was going on in the same period last year.

Breaking the numbers down, Beaming says each business gets attacked 474 times per day. Almost all of these attacks, 92 percent of them, are targeting Internet of things devices, such as networked security cameras or building control systems, as these IoT devices can be controlled remotely, over the internet.

Continue reading

G.SKILL hits 4500MHz with all-new Trident Z DDR4-4333MHz 16GB memory kit

Now that AMD has embraced DDR4 with Ryzen and AM4, as Intel already had with its processors and platforms, it is time to wave goodbye to DDR3. For legacy systems, it could make sense to buy the increasingly more expensive DDR3 for an upgrade, but in 2017, most new builds will probably be using DDR4.

If you do need to buy some memory, there are plenty of quality manufacturers nowadays, such as HyperX, Crucial, and Corsair. G.SKILL is another respected RAM maker, and the company is constantly pushing the envelope. Today, it announces a new DDR4-4333MHz 16GB Memory Kit (2x8GB) -- the first ever. While that alone is very cool, the company is bragging about what it accomplished with it -- an overclock that hit 4500MHz using an Intel Core i5-7600K processor paired with an ASUS ROG Maximus IX Apex motherboard.

Continue reading

Automation is the next level of digitization

Automation

So far, it's safe to say that the predominant trend in 21st-century business has been digitalization. Every industry, organization and individual has been touched by it one way or another.

As we head towards 2020, we are moving to the next level of digitalization. Now, what has already been digitalized will increasingly be automated -- whether it's the way we work, trade or connect with each other. Automation is becoming increasingly prevalent as computers gain in processing speed and power, and as the amount of data available for computation continues to grow exponentially. At the start of the Internet age, very few things were connected and available for analysis. But with the rise of the Internet of Things and the implantation of computers into all walks of life, from driving to warehousing, more and more facets of our world can now be mapped from within dedicated software.

Continue reading

Which Windows phones will get Windows 10 Mobile Creators Update?

Windows 10 Creators Update is already live for those who have a desktop, laptop or tablet, but for Mobile users the wait is not yet over. However, the roll out is expected to kick off soon, with Microsoft announcing that it will release Windows 10 Mobile Creators Update on April 25. Question is, which devices will it support?

Windows 10 Mobile works on quite a few smartphones, but the launch of Windows 10 Mobile Creators Update will see this list reduced to just 13 smartphones. The devices that didn't make the cut are mostly older handsets, which launched in the Windows Phone 8.1 era.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.