Kodi users now need to turn to VPNs to watch Premier League football

It has been difficult to avoid talk of Kodi for one reason or another recently, and it's something that's likely to be on the lips of fans of UK football now the 2017/18 Premier League season has started up.

Watching pirated streams of football matches through IPTV providers and other services has long been a popular use for Kodi, and the English Premier League (EPL) has had enough. The organization previously obtained a High Court order blocking illegal streams in real-time, and a more recently obtained injunction extended this ability. With the new season now under way, football fans are discovering that they now need a VPN like IPVanish to get their fix.

Continue reading

Peek enables you to locate local activities on your next vacation

Travel to any destination, whether for leisure or business or leisure, and the question we ask ourselves is what should we do when we’re there. Leave it late and you find yourself scrambling online and looking for tour guides to find what there is to do when you’ve arrived. Then there is the issue of finding the best value for the experience you desire.

Peek is an all in one app which enables you to discover and book incredible activities. Whether you want to go spearfishing in Cabo San Lucas, doing the Haunted Ghost walking tours in New Orleans, an electric bike tour around Paris, or a culinary walking tour around one of many cities, Peek has you covered and so much more.

Continue reading

Over a third of IoT medical device organizations suffer security incidents

Healthcare tablet

As the internet of things spreads into more and more areas, increasing numbers of medical devices are now connected, making them vulnerable to cyber attacks that could shut down medical processes, expose critical hospital and patient data, and ultimately put patient safety at risk.

Many medical devices are not built with cybersecurity in mind, yet a survey by Deloitte Cyber Risk Services of over 370 professionals organizations operating in the medical device/IoT arena shows that 36.5 percent have suffered a cyber security incident in the past year.

Continue reading

HPE and NASA sending a supercomputer to space

The computers the human race currently work with aren't built for space, and can't last long in off-planet environments. Astronauts aboard the ISS need new machines every month, as the old ones get destroyed by various factors that don't exist on Earth, like solar flares, radiation, subatomic particles, and irregular cooling.

Considering that SpaceX is currently preparing for a mission to Mars, it is paramount that the astronauts that eventually head out there have durable, working machines. Now, HP has announced it is working with NASA to create such a computer.

Continue reading

Companies are losing ground against cyber threats

Businesses are struggling to keep pace against the rising level of cyber security threats, according to a new study.

The Threat Monitoring, Detection and Response Report from Crowd Research Partners -- produced in partnership with a number of leading cyber security vendors -- finds that the biggest concern is dealing with advanced threats in three key areas, ransomware (48 percent), phishing attacks (48 percent) and attendant data loss (47 percent).

Continue reading

Why hackers love privileged accounts

Hacker

Accessing privileged accounts is the hacker's number one choice of the easiest and fastest way to get access to critical data according to a new study.

Privileged account solutions specialist Thycotic carried out a survey of more than 250 hackers at 2017's Black Hat conference and found that 32 percent of respondents see privileged accounts as the best way of getting hold of sensitive data, with 27 percent preferring access to user email accounts.

Continue reading

Department of Justice wants to identify 1.3 million visitors to anti-Trump site

The Department of Justice is trying to force a web host to reveal the IP addresses of over 1.3 million visitors to an anti-Trump website. The DoJ is also requesting contact information, email content and photos.

The site -- #DisruptJ20 -- was used to organize protests against Donald Trump on the day of his inauguration. DreamHost says that it is fighting the warrant that has been issued, because the "information could be used to identify any individuals who used this site to exercise and express political speech protected under the Constitution's First Amendment. That should be enough to set alarm bells off in anyone's mind."

Continue reading

Police in India arrest four over Game of Thrones leak

HBO has had something of a rough time of things lately, suffering not only a hack that led to a series of leaks, but also a Game of Thrones leak via a distribution partner. Police in India have now arrested four people in connection with the leak of the episode The Spoils of War.

Shortly after the leak occurred, HBO's distribution partner Star India admitted it was the source of the episode. Now three employees and one former employee of Prime Focus Technology -- a company which processes Game of Thrones ready for streaming on Hotstar -- are being questioned in relation to the leak.

Continue reading

Facebook expands Marketplace across Europe

Looking to compete with the likes of eBay and Craigslist, Facebook's Marketplace serves as a place for people to go to buy and sell locally. Following on from success in the US, UK, Australia and other countries, the social network is expanding the exchange further into Europe.

In total, Facebook's Marketplace is spreading to 17 European countries, meaning that it is now available in a total of 24 countries.

Continue reading

SteelSeries launches 'complete package' APEX M750 Mechanical Gaming Keyboard

If you are a PC gamer and you don't have a mechanical keyboard, you simply aren't doing life right. Look, a truly great video game player can succeed with any properly functioning keyboard and mouse, but if you can get an edge, why not take it? A mechanical keyboard doesn't just provide a more satisfying gaming and typing experience, but they are often built to last, making them a wise investment.

Today, respected manufacturer SteelSeries launches a new such mechanical gaming keyboard that it is referring to as the "complete package" -- bold words! The APEX M750, as it is called, has QX2 switches that the company claims will offer superior gaming performance. Since it is a gaming product in 2017, it of course has customizable RGB lighting.

Continue reading

Read Microsoft CEO Satya Nadella's leaked staff email regarding Charlottesville

The unrest and violence in Charlottesville, VA was absolutely heartbreaking. Never did I think that in 2017 we would have large amounts of White Nationalists and Nazi sympathizers marching in America. It was very scary. To see that on display was bad enough, but when I saw the video of a man driving his car into innocent people -- killing one person and injuring many others -- I was in shock and deeply affected. I have been haunted by the images and videos of that domestic terrorist attack.

I know what you are thinking -- why does this belong on a technology site? Fair point. Today, an email that Microsoft CEO Satya Nadella sent to employees leaked online. Since Nadella is the leader of the company, his words don't just impact the employees internally, they also signal the status of Microsoft's culture and overall leadership. Below are Satya Nadella's words, dated August 14, 2017, as obtained by Mike Murphy of Quartz Media.

Continue reading

Mozilla finally offering 64-bit Firefox to Windows users by default

Consumer 64-bit processors have been around for a long time now -- AMD began selling the Athlon 64, for instance, way back in 2003. Windows XP Professional x64 Edition was released by Microsoft in 2005. I was an early adopter at the time, buying that first-ever Athlon 64 and later running that aforementioned version of Windows.

I say all of that because I am shocked that in 2017 it is considered news if a company starts offering a 64-bit version of its Windows software by default. Well, folks, that is exactly what is happening today. Mozilla will now serve 64-bit Firefox by default to 64-bit Windows users when downloading from the web. In other words, if the user agent reports a 64-bit version of Windows, the webpage will offer 64-bit Firefox first. Users of 32-bit Windows will, of course, still be served the 32-bit Firefox variant.

Continue reading

The benefits of intrusion prevention systems in security

Cloud data security

There’s a penchant by many to measure the quality of IPS (Intrusion Prevention System) solutions by the number of threat signatures supported by the vendor. Checkpoint points to how it delivers "1,000s of signature, behavioral and preemptive protections." Fortinet claims its FortiGuard IPS service inspects "over 8,000 signatures consisting of 15,649 rules." Cisco IOS Inline IPS "supports more than 7000 signatures."

Presumably, the more signatures the more thorough the IPS. But is that really the right measure for today’s defending against today’s threat landscape?

Continue reading

StarTech launches U.2 NVMe SSD to PCIe Drive Adapter Expansion Card

SATA is so out of style. Nowadays, all the cool kids are using much-faster NVMe PCIe-based solid state drives that utilize either U.2 or M.2 connectors; I prefer the latter, but I digress. Of course, to maximize the performance of these ultra-fast drives, you will not only need the appropriate connectors, but PCIe 3.0 too. If you don't have the correct connector, all is not lost. Thanks to PCIe adapter cards, you might able to add compatibility to your system without the need of a new motherboard.

While M.2 adapter cards are very commonplace, U.2 variants are not. Today, StarTech is back with another very useful product -- the U.2 to PCIe Drive Adapter Expansion Card. If you don't have a U.2 connector port, but do have a PCIe 3.0 x4 or higher slot, this card will allow you to connect a compatible drive at top speed. It will work with PCIe 1.0 and 2.0 too, albeit at much slower speeds. You can mount the 2.5-inch U.2 drive (15mm, 12.5mm, 9.5mm, 7mm, and 5mm height) directly on the card, meaning there are no unsightly cables.

Continue reading

The importance of proactive defense in enterprise security

business security

The moment a cybercriminal targets an organization, the victim enters a race against time. Every minute that the attacker is able to operate undetected is more time for them to compromise systems, steal data, and cause more harm to their target. The ability to detect an attack and shut it down quickly can make the difference between a minor security incident and a huge breach that costs millions of pounds, or even brings an end to the company itself.

The good news is that organizations seem to be making great strides in detecting security breaches, according to our 2017 Trustwave Global Security Report, which examines the results of thousands of our investigations into security incidents. Across the incidents we investigated in 2016, the median time from intrusion to detection of a compromise had fallen to 49 days, down from 80.5 days in 2015.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.