The way is clear for Wikimedia to sue the NSA for warrantless surveillance
A federal appeals court has ruled that the Wikimedia Foundation may sue the NSA for its warrantless use of the "Upstream" surveillance program. The ruling overturns an earlier one which said the foundation could not sue due to an inability to prove that Wikimedia communication was being monitored either directly or indirectly.
The ruling by the United States Court Of Appeals for The Fourth Circuit means that the foundation is now able to proceed with legal action that was previously blocked. The amount of traffic generated by Wikimedia proved key to winning the appeal.
HP software helps turn old PCs into thin clients
As software moves towards the cloud, many companies are opting for thin client architecture on the desktop. But this involves an investment in new hardware that may strain restricted budgets.
HP has used this week's Citrix Synergy event to launch its Thin Client Conversion Suite, allowing old PCs to be turned into a thin client solution at low cost.
Here's when and where you can buy Samsung Gear 360 (2017)
On the day that Samsung announced the Galaxy S8, there was another device that made an appearance too -- the newest version of the Gear 360. This isn't the company's first 360 camera, but it is its most elegant. The camera is small, modern, and even uses USB-C.
Today, Samsung unveils what you really want to know, however -- how much it will cost, plus when (starting tomorrow) and where you can get it. Not only do we finally have all of those details, but there is even a special promotion for new Samsung Galaxy S8 buyers too.
Media players expose users to hacker attacks via subtitles
Security researchers from Check Point have discovered a major vulnerability in popular media players, like VLC, Kodi and Popcorn Time, which leaves users vulnerable to hacker attacks via malicious subtitles. The security firm estimates that the number of potential victims is around 200 million.
Media players give users the option to load subtitles from repositories, which can be tricked by attackers to rank their altered subtitles higher. This leads to those malicious subtitles being recommended to the user. If they are loaded, attackers can gain control over "any device running them." Check Point notes that the "potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, mass Denial of Service attacks, and much more."
Kaspersky launches Threat Intelligence Portal for businesses
Companies have to deal with an increasing number of cyber threats. To allow them to stay in touch with this ever evolving landscape they need up to date intelligence.
With the launch of its Threat Intelligence Portal, Kaspersky Lab is enabling security operation center operators to be able to work more efficiently while facing hundreds and thousands of threat alerts.
OnePlus 5 may be available in four color options
As we are getting closer to the launch of the eagerly-awaited OnePlus 5, we are learning more things about the upcoming flagship killer. We know its name, when it will be released, and what sort of improvements we can expect to see in the camera department.
And now, thanks to a new teaser posted by OnePlus on Twitter, we also have a pretty good idea about the color options that could be available for the OnePlus 5 and how many there will be.
Samsung's Galaxy S8 iris scanner is easily defeatable
If you want to secure your Samsung Galaxy S8, relying on the iris scanner to keep it locked is not the best idea. That's because it can be easily fooled using just a printed photo and a contact lens.
This reinforces the belief that biometric authentication is -- at least for now -- less secure than traditional options, like PINs and passwords, which have the advantage of not being tied to a physical trait that can be easily exploited by hackers, thieves or the authorities.
Credential stuffing tools help hackers break into accounts
With thousands of stolen account details available for sale on the web, cyber criminals are turning to new methods using them efficiently to try to break into accounts.
According to a new report by risk analysis specialist Digital Shadows, 'credential stuffing' tools are the latest technique being used to automate attempts at account takeover.
Netgear clarifies precisely what data it collects from Nighthawk AC1900 R7000 router users
A recent firmware update to its Nighthawk AC1900 R7000 router saw Netgear start to collect analytics data from its users. This had many people upset because of concerns about privacy, but the company is at pains to stress that no personal data is being collected.
In addition to this, the company points out that the program is voluntary, and users are free to opt out at any time. Rather than anything sinister or underhand, Netgear says that the data collection is purely to isolate problems and improve the router.
Live Chat With Friends brings private chats to Facebook Live
Facebook understands the importance of video on its platform, particularly live video. Facebook Live has proved to be an incredibly popular component of the social network and now the company is introducing new ways to connect with friends through the service.
Known as Live Chat With Friends, the new feature makes it possible to chat privately with friends during live broadcasts. The company is also rolling out another new feature called Live With. This "lets you invite a friend into your live video so you can hang out together, even if you’re not in the same place."
QuickLook is a speedy, simple file previewer
QuickLook is an open-source Windows version of the OS X "Quick Look" file preview feature.
There’s no installation required. Run QuickLook, select a file in Explorer, hit the space bar and a window appears with a preview.
Microsoft brings Fluent Design System's acrylic material to the Windows Store in Windows 10
When Windows 10 Fall Creators Update is released later in the year, it will be the first glimpse many users get of Microsoft's new Fluent Design System. But Windows Insiders can already enjoy the new look, and an update to the Windows Store sees the app getting an acrylic makeover.
Formally known as Project NEON (when we were still talking about Redstone 3 builds), the Fluent Design System sees Microsoft bringing elements of Glass and Aero back to life. The acrylic material, specifically, refers to the blurring of backgrounds, and if you're an Insider on the Fast Ring, you can grab an update to check it out for yourself.
1Password's new Travel Mode hides your private information from airport security
There have been numerous cases recently of travelers being forced to unlock their phones by security staff at airports. If you have all of your passwords for apps and online accounts stored in a password manager, this could mean that vast amounts of personal data become accessible -- but 1Password has a solution.
A new feature called Travel Mode enables users of the app to mark certain passwords and other data as "safe for travel." When the mode is activated, everything else which has not been flagged in this way is temporarily deleted from the device so it cannot be accessed.
CISO salaries topping €1 million in Europe
Now might be a good time to consider that job as a chief information security officer you always wanted, because salaries are skyrocketing.
Thanks to an ever-increasing number in breaches, and the damage these breaches are causing, businesses in Europe have begun offering much better salaries to their CISOs.
Red Hat Enterprise Linux (RHEL) 7.4 Beta is here
There is a common misconception that companies can't make money from open source solutions, such as Linux. While a company like Canonical -- maker of Ubuntu -- is in a state of confusion, Red Hat continues to see success in the enterprise. The company is quite profitable with is popular Red Hat Enterprise Linux (RHEL) operating system, serving as a great example for the open source community.
Today, Red Hat announces that RHEL 7.4 has achieved Beta status. The pre-release version of the distribution is available immediately, and administrators can begin testing now. The company promises many security additions including Network Bound Disk Encryption and OpenSSL HTTP/2.0 enhancements.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.