iPhone X is unresponsive in the cold and has a green line screen problem

iPhone X with unicorn animoji

Just days after the launch of the iPhone X, problems are starting to emerge with Apple's latest handset. Users are reporting various issues with the screen including the fact that it becomes unresponsive in cold conditions.

On top of this, other iPhone X users have found that the screen suffers with a green line appearing at the side of the display. These reports are in addition to Apple's own warnings of the OLED-centric screen burn-in problems, and in spite of the fact that the iPhone X has been found to have the best display of any smartphone.

Continue reading

Leaked: Here is the OnePlus 5T

As is often the case -- whether planned or not -- details of upcoming handsets frequently leak out. Things are no different with OnePlus phones; in fact, it's one of the leakiest companies out there. With the launch of the OnePlus 5T in just a few days, it should come as little surprise that leaks mean we now know just about everything there is to know about the smartphone.

Not exactly a million miles removed from the OnePlus 5, the 5T's full specs have been leaked, complete with photographs and a detailed reviewers' guide. The major news is that the phone will be running Android 7.1.1 Nougat (nope, no sign of Oreo yet), and has very small bezels thanks to the disappearance of the front home button (it's now on the reverse).

Continue reading

Twitter pauses verification program after giving white supremacist the coveted blue tick

Head of Twitter, Jack Dorsey, has admitted that the company's verification system is "broken" after a blue tick was awarded to white supremacist Jason Kessler. There was a backlash this week after Kessler -- who helped to arrange the Unite the Right rally in Charlottesville earlier in the year -- had his Twitter account verified.

Responding to the negative reaction this prompted, Twitter announced that its verification program has been paused. The company also said that the verification tick had been largely misinterpreted by people.

Continue reading

Roku's latest remote can control more of your home

If you aren't using a Roku then you may be missing out on something special. The tiny streaming device has many features such as Netflix, Hulu and hundreds of other apps, including music ones.

There is, however, much more that can be done if you integrate other products into the entertainment setup, but that can get pricey when you begin bringing in other products to control different items. It could also mean you regularly having to reach for other remote controls.

Continue reading

Almost half of consumers are in the dark about AI

Confused woman

According to a new study, 43 percent of consumers in the US and 46 percent in then UK say they have 'no idea what AI is about.'

The research by business management software specialist Sage looks at major public concerns about AI and reveals what consumers and the tech community believe to be the greatest areas of potential impact.

Continue reading

Gmail accounts make up 30 percent of marketing databases

Gmail

The number of Gmail users subscribed to marketers' email programs has increased from 17 percent in 2014 to 30 percent today, according to new data released by Yes Lifecycle Marketing.

The company analyzed more than 7 billion emails sent through its cross-channel communications platform Yesmail360i. According to the findings, Gmail users make up nearly half (49 percent) of new subscribers -- those who opted into a brand's email program within the last 90 days -- and 38 percent of subscribers who opted in over the last year.

Continue reading

WikiLeaks: CIA source code leak shows agency impersonating Kaspersky

Following on from its Vault 7 series of leaks relating to CIA hacking tools, WikiLeaks has kicked off a new series -- Vault 8. The purpose of this latest series is to reveal the source code of previously exposed hacking and surveillance tools, and the first release relates to Hive.

The tool itself is interesting enough, serving as backbone to the CIA's malware operations, but there's more. What's intriguing about the first leak in the Vault 8 series is that it seems to show the agency impersonating Kaspersky, by making use of a fake certificate for the anti-virus company.

Continue reading

Facebook explains its creepy-sounding anti-revenge porn plan

Facebook has revealed more details about how its test program for combating revenge porn works. The social network has been trialing a system which allows users to upload naked images of themselves to Facebook so the company can look out for and block others from sharing them.

People were rather shocked at this idea, but even more so when it transpired that the uploaded nudes would be reviewed by Facebook employees. Keen to calm the storm that has whipped up around the issue, Facebook's global head of safety, Antigone Davis, has penned a blog post explaining that "we want to be clear about how it works."

Continue reading

Twitter more than doubles the length of user display names

Signing up for any service means facing the username battle. There are two obstacles: is your username still available, and does it meet the necessary requirements. With Twitter, getting an @YourName handle is tricky because there are simply so many users (and bots), but there has long been a highly restrictive limit on the length of names -- just 15 characters.

Twitter has long offered something of a compromise in allowing display names that are slightly longer -- but only up to 20 characters. Now, the company has announced that there are more than twice as many characters to play with. Display names can now be up to 50 characters in length -- usernames, unfortunately, remain unchanged.

Continue reading

Google helps fake Microsoft software con victims out of money

Most people rely on and trust Google's search results. It’s what the company is best known for, after all. However, anyone searching for a copy of Microsoft’s video editing software is in for a nasty surprise.

Windows Movie Maker was put out to pasture in January of this year, but its appeal is such that a fake version has arrived, and is conning people into parting with money thanks to an unlikely ally -- Google.

Continue reading

New self-service tool helps unlock customer data across ad platforms

data bucket

Advertising via platforms like Google and Facebook is popular, but any insights gained from using these services are difficult to apply elsewhere.

Identity management company Drawbridge is launching a new Self Service Graph dashboard that gives marketers transparency into their cross-device data by letting them tap into the service, without requiring any engineering on the client side.

Continue reading

Google Files Go is a new Android app that lets you manage and share files

Google FIles Go Android beta file manager share files free up storage

Google is getting ready to expand its collection of Android apps once more, as it just introduced a new title on Google Play. Currently available as a preview, Files Go lets you manage and share files and free up space on your smartphone or tablet.

The app is split into two tabs, one that's called Storage, which helps you delete the app cache, remove files and get notifications for unused apps, and another, named Files, which is where you will find the file manager and the option to send and receive files.

Continue reading

84 percent of enterprises plan to move workloads to the cloud

Cloud

The need for greater scalability and flexibility, and a desire to avoid capital expenditures are driving enterprises to move more of their workloads to the cloud.

A survey by hybrid cloud operations company OpsRamp of IT professionals in organizations with over 500 employees reveals that 84 percent are planning to move more work to the cloud in the next two years.

Continue reading

Microsoft brings Windows Defender Advanced Threat Protection to macOS, Linux, iOS, and Android

Microsoft has announced that it is teaming up with Bitdefender, Lookout, and Ziften to expand the reach of Windows Defender Advanced Threat Protection (ATP). By partnering with the three major security firms, Microsoft is set to bring ATP to macOS, Linux, iOS, and Android devices.

Bitdefender, Lookout, and Ziften will all feed threat detection information into one central resource, and this can then be used by security teams to keep an eye on all threats in a single location.

Continue reading

Comodo launches free service to remove website malware

Many recent security breaches have been caused by poor website safety, allowing hackers to exploit vulnerabilities to steal data.

Cyber security company Comodo is launching a free malware removal service for websites to help businesses stay secure. Once a business submits a request Comodo's security operations center analysts will instantly remove all malware, perform hack repairs, including checking the files, databases and any malicious code running to remove infection from the site, and keep the customer fully updated.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.