Satechi launches Aluminum USB Type-C UHS-II Micro/SD Card Reader

Satechi_Type-C_Aluminum_UHS-II-03

More and more laptops are being manufactured without SD card slots. For many consumers, this isn't a problem. For others, such as photographers, it is a huge pain point. Thankfully, adding a card reader to a notebook or desktop is as easy as plugging in a USB adapter.

Of course, these days, laptop manufacturers are also forgoing USB Type-A ports, making existing adapters incompatible without a USB-A to USB-C dongle. Alternatively, you can simply buy a USB-C card reader, and today, Satechi launches an absolutely gorgeous such product. Its new reader, which is made with aluminum, supports both SD and micro SD cards with up to UHS-II speeds. It doesn't just work with laptops, but tablets and smartphones too.

Continue reading

Apple kills off its app affiliate program

App Store icon

Apple has announced that it is removing apps from its affiliate program. The change means that people will no longer receive commission for iOS and Mac apps.

Having once enabled sites to earn 7 percent commission for app sales, Apple then dropped this to just 2.5 percent. As of October 1, no commission will be paid at all as Apple says the App Store does a good enough job of increasing app discovery.

Continue reading

Facebook API changes mean you can no longer cross-post from Twitter

Facebook and Twitter icons

Twitter users can no longer automatically cross-post to Facebook. The restriction has come about after Facebook made changes to the way third parties are able to make use of its APIs.

It means that Twitter users who have connected their Facebook account to make it easier to post the same content on both services via Facebook Login can't have their tweets automatically posted to Facebook. The -- rather unsatisfactory -- solution from Twitter is simply copy the URL of a tweet, and this can then be manually posted to Facebook.

Continue reading

Preempt allows organizations to detect and block hacker reconnaissance tools

Hacker

Increasingly cybercriminals are using their initial attacks to probe systems and look for other vulnerabilities or network resources that they can later exploit.

Threat detection platform Preempt is launching new capabilities that allow enterprises to prevent lateral movement and unauthorized domain access due to the misuse of network credentials in reconnaissance tools.

Continue reading

Opera web browser for Linux available as a Snap -- install on Ubuntu, Fedora, Mint, and more!

ubuntustore

There is no shortage of web browsers for Linux. Two of the most popular browsers -- Google Chrome and Mozilla Firefox -- are easy to install and work quite brilliantly. Another fairly popular option is available too -- Opera. All three aforementioned browsers are cross-platform, making them great options not only for Linux, but Mac and Windows too.

Today, the Opera web browser for Linux becomes available as a Snap. If you aren't familiar, this means it is packaged for installation on any Linux distribution that supports Canonical's Snap format. This has the benefit of helping the developer, as they don't have to waste resources with multiple packaging options.

Continue reading

Carbon Black launches real-time security ops solution

endpoint protection

Security and operations teams often have no reliable way to assess the current state of endpoints across their enterprise.

Lack of visibility is a major concern which leads to greater risk of a breach and a lack of information to take appropriate action after a problem occurs.

Continue reading

SMBs rank network security as top concern

Firewall

SMBs are just as likely to be attacked by cybercriminals as larger businesses, yet they lack the budgets and resources to secure their systems and deal with the aftermath of an attack.

It’s not surprising then that a poll of more than 350 SMBs worldwide by cybersecurity specialist Untangle finds that firewall and network security are rated as the top security concerns, particularly as more systems move to the cloud.

Continue reading

Massive router hack used to spread CoinHive cryptomining script

Cryptojacking

Researchers at Trustwave have uncovered an attack on tens of thousands of MikroTik routers which is being used to embed CoinHive cryptominer scripts in websites.

A surge in CoinHive actvity in Brazil at the start of this week alerted researchers that something was happening. Further investigation showed that MicroTik devices were at the root of the problem and all were using the same CoinHive site key.

Continue reading

Spotify removes numerous Alex Jones podcasts, deeming them 'hate content'

infowars-alex-jones

Spotify is the latest company to come down on Infowar's Alex Jones. The music streaming service has taken down multiple several episodes of The Alex Jones Show for violating its policies on hate speech.

The removals come after Alex Jones was hit with another strike by YouTube for policy violations, and after Facebook also took action against him.

Continue reading

2FA SNAFU led to Reddit security breach in which user data was stolen

Reddit mobile icon

Reddit has revealed details of a security breach that enabled a hacker to gain access to private messages, usernames and encrypted passwords. The self-proclaimed "front page of the internet" is undertaking an investigation and taking steps to improve security.

The attack took place between June 14 and June 18 this year, and the perpetrator was able to access "all Reddit data from 2007 and before including account credentials and email addresses", the site said in an announcement. The breach was made possible after the attacker beat SMS-based two-factor authentication and compromised several employee accounts.

Continue reading

Avast responds to CCleaner controversy

ccleaner4-200x175

Yesterday I wrote about why people might want to skip the latest version of popular system cleaning tool CCleaner. This isn’t the first time that I, and other long-time users, have expressed dissatisfaction in how the program is evolving under Avast.

Following yesterday’s piece, the Avast-owned Piriform -- CCleaner’s maker -- contacted me to clarify the situation. This is what the company had to say.

Continue reading

Leaked report shows Google plans a censored search engine for China... but China says otherwise

Google Chinese flag

A leaked document suggests that Google is planning on making a return to China, launching a censored version of its search engine to comply with strict Chinese laws.

Going by the codename of Dragonfly, the project has been in the works since 2017 and has led to the creation of China-specific Android apps with the internal testing names Maotai and Longfei. But while the documents and people familiar with the matter say that the launch date could be just six to nine months away, China says the reports are not true.

Continue reading

The future role of AI in fact checking

fake-news-facts

As an analyst, I’d like to have a universal fact checker. Something like the carbon monoxide detectors on each level of my home. Something that would sound an alarm when there’s danger of intellectual asphyxiation from choking on the baloney put forward by certain sales people, news organizations, governments, and educators, for example.

For most of my life, we would simply have turned to academic literature for credible truth. There is now enough legitimate doubt to make us seek out a new model or at a minimum, augment that academic model.

Continue reading

Edge Computing 101

Edge computing

Enterprises today have adopted a cloud-first mentality, and the numbers show it. According to a 2018 Gartner survey, investment is public cloud services will reach $186.4 billion this year, representing 21.4 percent growth from 2017. But there’s growth that is just as exciting and strategic taking place far from the cloud, down at the network edge in the world of end user devices, Internet of Things (IoT) devices, and other network-connected systems.

Without strategic management of the network edge, investments in the cloud are going to run into trouble. To be a successful cloud-first enterprise, you need manage both the cloud and the edge equally well. Why is edge computing so important? Let’s take a look.

Continue reading

Windows 10 continues to close in on Windows 7, will overtake it soon

Windows runners

NetMarketShare reports on the state of the desktop operating system market on the first day of each month. Usually at least. It spent a few days auditing June’s figures last month, which caused a bit of a delay.

There’s no such lag for July’s figures though, which arrive on time and show Windows 10 continuing to cut into Windows 7's dominance.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.