Apple has already contacted the FBI with help to access the Texas shooter's phone

Apple logo

Following the shooting at the weekend in a Texan church, the FBI revealed that it was unable to access the encrypted phone belonging to the gunman, Devin Patrick Kelley. While the FBI said that it did not want to reveal any specific details of the phone, it was widely believed to be an iPhone -- and now Apple has revealed that it has already been in contact with the agency.

The iPhone-maker says that it got in touch with the FBI "immediately" to offer help in accessing the gunman's phone.

Continue reading

How machine learning is set to shake up marketing

AI

Artificial intelligence and machine learning are expanding their reach into many areas of business, and marketing is no exception.

B2B marketing specialist Engagio has produced an infographic looking at how marketers can incorporate the latest technology into their own account based marketing strategies.

Continue reading

Apple expands its Everyone Can Code initiative around the world

Originally limited to just the US, Apple's "Everyone Can Code" initiative has now been opened up to over 20 universities and colleges around the world. The expansion takes the coding curriculum to Australia's RMIT, Plymouth University in the UK and many other establishments.

The aim is to give people the chance to learn how to code, using the App Development with Swift curriculum for online and on-campus courses. The year-long course serves as an introduction to coding, and is open to students of all levels of ability.

Continue reading

If you send nudes to Facebook for revenge porn protection, the photos will be checked by humans

Facebook caused more than a little eye-rolling with its anti-revenge porn program which requires users to upload the naked images of themselves that they would like to protect. It had been assumed that the entire process would be automated, making use purely of algorithms to analyze images and protect privacy. This assumption was wrong.

Facebook says that in actual fact an employee -- an actual human being -- will have to review the nude images that are sent in.

Continue reading

Microsoft uses Artificial Intelligence for all-new LinkedIn-powered 'Resume Assistant' for Word

job resume

If you are currently unemployed, underemployed, or simply looking to change jobs, I urge you to create a LinkedIn profile if you haven't already. The days of showing up at a job with a pen to complete an application is largely dead. Heck, many employers don't even want you to email them a resume nowadays -- some just ask for your LinkedIn profile instead. Don't have one? You are out of luck.

But OK, some employers do still ask for a traditional resume, so it is good to be prepared just in case. Today, Microsoft announces that it will make creating a resume even easier. How? With the upcoming "Resume Assistant" for its Word program. This tool is powered by LinkedIn -- a service Microsoft now owns. The Windows-maker is even leveraging Artificial Intelligence to make this endeavor work better. Basically, the tool will create a resume in Microsoft Word using your LinkedIn history, while also suggesting ways to improve the way you are describing your skills, education, accomplishments, and more.

Continue reading

Microsoft releases feature-packed Windows 10 Redstone 4 Build 17035 to the Fast ring... but not for everyone

Microsoft is busy working on the next big feature update for Windows 10, codenamed Redstone 4, and today it releases a new build for Windows Insiders on the Fast ring (and Skip Ahead).

It’s been a fortnight since we last had a new build as Microsoft encountered some major bugs that meant it wasn’t able to push out a new version last week. Build 17035 comes with some exciting new features and improvements, but unfortunately not everyone will be able to install it.

Continue reading

Samsung Galaxy Note8 gets new 'Deepsea Blue' color option in the USA

If you are in the market for an Android smartphone, now is an exciting time. There are so many excellent models from which to choose -- a great problem to have.

Of course, you can never go wrong with a Samsung flagship, and the company’s latest such smartphone -- the Galaxy Note8 -- should delight you in more ways than one. It is powerful, beautiful, and offers one of the best cameras on the market. Today, Samsung announces that its popular Note8 will soon be getting a new color in the USA -- Deepsea Blue.

Continue reading

Controversial Bitcoin hard fork Segwit2x has been shelved

broken_bitcoin

Bitcoin investors, myself included, have had November 16 marked on their calendars for a while. This is when (roughly) it was anticipated the latest Bitcoin hard fork -- Segwit2x, or 2x for short -- would take place.

The aim of the plan was to trigger a block size increase at block 494784 via a software upgrade. As was the case with the Bitcoin Cash hard fork, investors were expecting to receive an amount of the new Bitcoin2x asset on the Bitcoin2x blockchain.

Continue reading

FBI can't access data on Texas shooter's encrypted phone

With echoes of the San Bernardino shooting from a couple of years ago, the FBI has revealed that it is unable to break the encryption on the phone belonging to Devin Patrick Kelley, the gunman who killed 26 people in Texas at the weekend.

The agency has not said what make or model of phone they are not able to access, and this is information that will not be revealed -- and for very good reason, says the FBI. Despite the agency's desire for secrecy, there is strong speculation that the device is an iPhone.

Continue reading

Facebook: send nudes and we'll protect you against revenge porn

Revenge porn is one of the latest online problems, and it's one to which it would seem difficult to come up with a solution. Facebook, however, thinks it has the answer. If you're willing to share your nude photos with the social network, it will use them to protect you against revenge porn attacks.

It's an idea that sounds like utter madness, but Facebook is at pains to convince users that it's actually a brilliant solution. Compromising images that are shared with Facebook will be hashed to create a digital fingerprint which the company can then use to identify the same images if they are uploaded by someone else.

Continue reading

Enterprises are risking an IoT technology time bomb

The increased use of connected devices leads to significant security challenges for 77 percent of enterprises, according to a new survey.

The study conducted by Forrester for IoT security company ForeScout Technologies also reveals that 82 percent struggle to identify all of their network-connected devices, and when asked who is primarily responsible for securing IoT, IT and line of business (LoB), leaders don't have a clear answer or measure of ownership.

Continue reading

SoftMaker releases Office 2018 with enhanced Thunderbird

You have to admire some of the recent design work from Microsoft. Windows 10 has transitioned into a robust and visually-appealing operating system, whilst Office 2016 really is a superb, well-designed, cross-platform office suite.

In addition, Office 365 offers reasonably priced subscription and includes a fair number of licenses for your devices. We have Office 365 installed on our Mac and Windows computers and it’s seamless switching between the two platforms. So, why would you need anything else? That’s certainly a valid question. We do not see too many Office 365 subscribers complaining about the price and home users can pick up a license for as little as $5.99/month for a single device.

Continue reading

90 percent of IT pros worry about public cloud security

cloud worry

New research commissioned by network testing, visibility, and security vendor Ixia reveals that more than 90 percent of respondents are concerned about data and application security in public clouds.

In addition nearly 60 percent report that public cloud environments make it more difficult to obtain visibility into data traffic.

Continue reading

New endpoint protection platform aims to stop targeted attacks

endpoint protection

Increasingly attacks against businesses and government organizations are targeted against a specific entity.

The latest platform from endpoint protection specialist Endgame uses enhanced attack mapping and automated guidance to empower users of any skill level to stop even the most aggressive attacks.

Continue reading

SJCAM SJ6 Legend action camera review

Of all the action cameras that I have used, the SJCAM SJ5000X Elite is probably the one I liked the most. The video quality was top-notch, it was well made and it also got lots of updates. The SJ6 Legend has replaced it, but does it live up to its predecessor?

The new action camera is similar in terms of specs, but thanks to some key changes it makes for a much more interesting proposition. But how does it perform? I've tested the SJ6 Legend to find out.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.