Facebook taps into teen market with acquisition of anonymous feedback app tbh


Facebook's desperation to appeal to the teenage market is well known, and its latest attempt to tap into it sees the social network acquiring tbh. The anonymous feedback app has proved to be a huge hit on iOS since its launch in August. An Android version is still in the pipeline.
With tbh, despite the anonymity, there's a strong focus on positive polls -- questions like "who has the best smile?" crop up, for instance -- and over a billion pieces of feedback have been given in a matter of weeks. It's not clear whether Facebook will keep the service truly anonymous, or will make use of the data it could undoubtedly gather through the app.
AWS and Microsoft announce deep learning library Gluon


Microsoft and Amazon Web Services have joined forces to make machine learning accessible to a greater number of developers.
With that in mind, the duo has launched an open-source deep learning library called Gluon. The library will work as an interface where developers will be able to create prototypes, build, train and deploy ML models for either cloud or mobile apps.
Google and IBM launch open-source security tool for containers


Google and IBM, together with a few other partners, released an open-source project that gathers metadata that developers can use to secure their software.
According to an IBM blog post, the goal of the project is to help developers keep security standards, while microservices and containers cut the software supply chain.
Google rolls out Chrome Cleanup to help secure its web browser


With so much time now spent online, and with so many cloud-based tools now in use every day, we're all spending more time than ever in our web browsers. To ensure that this is as secure an experience as possible, Google is rolling out a trio of important changes to Chrome -- for Windows users, at least.
At the heart of these changes is Chrome Cleanup. This feature detects unwanted software that might be bundled with downloads, and provides help with removing it -- but Mac and Linux users miss out.
Russia set to take on Bitcoin with its own 'CryptoRuble'


Having earlier called for crypto currencies to be banned, Russian President Vladimir Putin has now officially stated that Russia will issue its own CryptoRuble using Blockchain technology.
According to communications minister Nikolay Nikiforov, CryptoRubles will be exchangeable for conventional Rubles and will be accepted by Russian banks. However, holders will need to pay 13 percent tax if they don't provide proof of origin, a measure intended to combat money laundering.
Synology DiskStation DS418j is a four-bay NAS ideal for home users [Review]


The new DiskStation DS418j is among Synology's most attractive options for home users with higher storage needs. Part of the entry-level J Series, the four-bay NAS has solid hardware and all the right features that you expect in this segment, including a powerful operating system and lots of useful software add-ons.
It is also among the most-affordable NAS devices in the four-bay range, which makes it a prime choice for buyers on a budget. But, just how good is it in real life? I've tested the DS418j to find out.
[Updated] Microsoft has patched Windows against the KRACK Wi-Fi vulnerability -- Google will secure Android soon


Earlier today, news broke about the KRACK vulnerability that affects the WPA2 protocol. Security researchers have warned that the problem affects millions of devices running everything from Windows to Android and Linux.
Microsoft has announced that it has already released a security patch to fix the vulnerability in Windows. Google says that a patch for affected Android devices will be released "in the coming weeks."
PureVPN scrambles to defend itself against accusations of logging users


Last week it transpired that PureVPN had helped the FBI track down a cyberstalker from Massachusetts. This came as something of a surprise to other PureVPN users who were under the impression that using the service made them completely anonymous -- a belief strengthened by the company's assertion "We do NOT keep any logs that can identify or help in monitoring a user's activity."
Strictly speaking, this is true, but that's not to say that the company doesn’t maintain IP logs that can be used to identify users. The company does exactly this, logging IP addresses and timestamps, and this is how it helped the FBI. In a blog post, the company tries to explain this as it attempts to convince concerned users that it is not logging their activities.
AsTech offers Qualys Cloud Platform with a $1 million breach cost guarantee


The Qualys Cloud Platform is designed to give customers a continuous, always-on assessment of their global security and compliance posture across all global IT assets, wherever they reside.
Cyber risk management company AsTech is boosting its attractiveness further for its Managed Qualys Service customers by offering a $1 million guarantee for securing perimeter networks.
Almost half of UK infrastructure will have moved to the cloud in six months


A new survey of UK IT decision makers by cloud and network provider Interoute shows the cloud is increasingly seen as the best platform for providing scalable infrastructure.
The results reveal that businesses plan to move on average just under half (46 percent) of their infrastructure to the cloud over the next six months.
Android: DoubleLocker ransomware encrypts data and changes PINs


A new breed of Android ransomware has been discovered that hits victims with a double whammy. DoubleLocker not only encrypts data as all ransomware does, it also changes the PIN on the target device.
DoubleLocker was discovered by security researchers at ESET. They say that the ransomware abuses Android accessibility settings, and is the first to use a double-lock approach. Based on previously released banking malware, it is though that a test version of DoubleLocker could have been in the wild since as early as May.
Microsoft showcases the Fluent Design changes found in Windows 10 Fall Creators Update and beyond


When you update your copy of Windows 10 to the Fall Creators Update (from tomorrow), one of the changes you may notice is the introduction of a new, but quite subtle, look to the OS.
Microsoft's Fluent Design language is essentially like Aero, with cool transparency and blur effects added throughout.
KRACK warning: Severe WPA2 security vulnerability leaves millions of devices open to attack


A severe security warning has been issued after Belgium researchers managed to exploit a serious vulnerability in the WPA2 wireless protocol.
Known as KRACK (Key Reinstallation Attacks), the vulnerability makes it possible to eavesdrop on Wi-Fi traffic. Millions and millions of devices are at risk -- Windows, Linux, Android and more -- but it is not known whether there is an active exploit in the wild yet. Details about the vulnerability were due to be released at 8:00AM ET (1:00PM BST), but the research paper has now been published early after someone leaked a draft version.
Twitter vows to take a more aggressive approach to unwanted sexual advances, abuse and more


Jack Dorsey has promised that Twitter will take a more aggressive stance in applying its rules. The announcement came after the #WomenBoycottTwitter protest was used to draw attention to women being silenced.
The Twitter CEO also said that new rules will be introduced to try to counter "unwanted sexual advances, non-consensual nudity, hate symbols, violent groups, and tweets that glorifies violence."
Samsung Connect Tag is a smart IoT tracker using narrowband technology


Samsung has unveiled the latest addition to its range of Internet of Things devices: the Samsung Connect Tag. It is designed to make it possible to keep track of anything you can’t bear to lose, from a bag or keys, to a child or pet.
Based on the Tizen operating system, the Samsung Connect Tag can be clipped to a range of objects and, using a combination of NB-IoT, Cat.M1, GPS and GLONASS, it will report the location of whatever it is attached to. It is described as the first consumer product to take advantage of narrowband technology.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.