Philips announces 34 inch Brilliance UltraWide QHD Curved LCD Display (BDM3490UC)


Buying a monitor can be quite the daunting affair. Not only are there many styles to choose from, but various resolutions too. While 4K monitors are all the rage, some operating systems, such as Windows 10 and some Linux distros, are not optimized for higher resolutions. Text and icons will appear small, and increasing sizes in the OS can cause some programs to display blurry text. In my experience, only OS X scales well to high res monitors.
Keeping that in mind, it is understandable if you are willing to put up with those concerns, as images, movies and games can be absolutely gorgeous on high-resolution screens. Today, Philips announces a beast of a monitor -- 34 inches, curved, with a resolution of 3440 x 1440. While less than 4K, this resolution offers a very wide view.
GRE tunneling: Keeping human traffic unaffected during DDoS attacks


Picture a standard subway ride during rush hour. The car, of course, is crammed full. Some of those subway riders are pleasant commuters, and some are subway villains like pickpockets and purse-snatchers. Now imagine someone has invented a private subway that quickly and efficiently connects you and other pleasant commuters to the subway station in your neighborhood. You don’t have to deal with slowdowns, unexpected stops, or any of the risks associated with being lumped in with the aforementioned subway villains.
Now stop imagining, because someone has invented such a blissful sort of system. It’s just that instead of being a form of transportation it’s a method of directing legitimate human traffic to a website while it’s being protected from a DDoS attack. Not the best news for your commute, but great news for your website.
Ping Identity offers flexible real-time access for digital enterprises


Legacy identity management solutions can struggle to keep up with the current interconnected world where systems may be both local and in the cloud.
Security company Ping Identity is launching a new Federated Access Management product designed to offer lightweight, open and hyper-connected identity technology for the modern digital enterprise.
Baidu's browser leaks sensitive information


The browser provided by Baidu (China's answer to Google), leaks all kinds of personal data. Researchers at Canada’s Citizen Lab tested the browser and concluded it "collects and transmits a lot of personal user data back to Baidu servers that we believe goes far beyond what should be collected, and it does so either without encryption, or with easily decryptable encryption".
The Android version of the browser is even worse: "Data collected and transmitted in the Android version without any encryption includes a user’s GPS coordinates, search terms, and URLs visited. The user’s IMEI and nearby wireless networks are sent with easily decryptable encryption".
OnePlus fans rejoice -- new flagship launches by June


There is no denying that flagships like Samsung's Galaxy S7, LG's G5 and Xiaomi's Mi 5 have just raised the bar for the high-end smartphone market. Rivals need to step things up a notch, as it is going to be extremely hard to compete against the latest-generation hardware and software, especially when it is offered at price points as low as $300.
For OnePlus and its current flagship, OnePlus 2, things are not looking good. Mi 5, which competes in the same price range, is a better device on paper and cheaper too. Other similar devices will soon follow, of course. What is OnePlus' answer? Well, it is OnePlus 3 and it is coming by June.
New platform offers endpoint protection for Linux servers


Most of the internet is powered by Linux servers, so it's not surprising that they’re increasingly a target for attack. In particular recent attacks have focussed on using compromised systems to distribute malware to other systems.
Many Linux systems rely on traditional signature-based threat detection which leaves them vulnerable to zero-day attacks. Endpoint security company SentinelOne is announcing a new solution aimed at protecting enterprise data centers and cloud providers from emerging threats that target Linux servers.
Batch print documents, drawings and more with Print Conductor 5.0


If you regularly need to batch print folders of documents then you’ll know it’s a lengthy and tedious process: Ctrl+P+Enter+repeat until you die of boredom, essentially.
Print Conductor is a free-for-personal-use application which automatically lines up and dispatches your targets to their source programs for printing.
Netskope launches threat protection for enterprise cloud apps


Use of cloud apps, including unauthorised 'shadow' IT, is booming, but it leaves a gap in the protection provided by traditional perimeter security.
To plug this gap cloud access security broker Netskope is launching a threat protection solution for the cloud. Netskope Active Threat Protection combines threat intelligence, static and dynamic analysis, and machine-learning based anomaly detection to enable real-time detection, prioritized analysis, and handling of threats that may originate from cloud apps.
New platform can use any data source to gain visibility into attacks


A security breach can involve many different elements, this means that analyzing attacks can be a complex and difficult task.
Security analytics specialist Niara is launching a new version of its security analytics platform that can analyze any data source and supports the customization of behavioral analytics modules, providing organizations with complete visibility into attacks and risky behaviors inside their environments.
View all your Chrome, Firefox and IE addons with NirSoft's BrowserAddonsView


Freeware developer NirSoft has released BrowserAddonsView, a free tool which detects and displays all your installed Chrome, Firefox and IE extensions, in all user profile folders.
Every installed addon is displayed in the usual NirSoft table, with details including item ID, status (enabled/ disabled), browser, addon type (extension, plugin, browser helper, ActiveX, more), name, version, description, title and creator.
Microsoft buys Xamarin to strengthen mobile side


If a few years back we were laughing off Microsoft's efforts in the mobile market, today we are looking at the software giant in a different light. That "mobile first, cloud first" mantra that Satya Nadella introduced us to when he became CEO now defines Microsoft, which has quickly evolved into one of the most important players in the mobile space afterwards.
Under Nadella, Microsoft has tackled mobile in a more meaningful way, refocusing its strategy so that it could become a major developer for more than Windows and Windows Phone. Today, the software giant's best services and products are also found on Android and iOS, the most important mobile platforms, and more have been added following high-profile acquisitions like Acompli and SwiftKey. Now, Microsoft adds Xamarin to its mobile portfolio, proving once again that it is dead serious about conquering mobile.
Apple, encryption, iPhones, and the FBI plainly explained


Most Americans, and many of the world’s iPhone users, are now aware that a court order was filed on February 16 to compel Apple to assist the FBI in retrieving information from an iPhone. This was the phone uncovered in the aftermath of the mass shooting in San Bernardino in December last year. Apple objected to the FBI’s demands and very public legal maneuvering ensued.
In this article I endeavor to explain some of the key issues that this situation raises, for both privacy and security, as they impact companies, consumers, and governments.
Pawn shop phones contain left over personal data


If you buy a used mobile phone you could be getting more than you bargained for according to security software company Avast. It seems that some phone owners are inadvertently pawning their porn.
Avast purchased 20 used smartphones from pawn shops in 4 cities -- New York, Paris, Barcelona and Berlin. The goal being to see if used phones are regularly being sold with previous owners’ personal information still retrievable on them.
Google's Project Shield protects news and human rights sites from DDoS attacks


The web facilitates free speech, but it also gives groups the opportunity to try to silence those they disagree with. DDoS attacks are common way to retaliate against opposing views, and today Google is expanding Project Shield to protect sites from such attacks.
Project Shield is not a new service, but it has been limited to a group of testers since its launch a few years back. Designed to detect and eliminate "DDoS as a form of censorship" the free service is now available to everyone -- those who qualify, at least. The aim is to protect news and human rights sites to ensure uninterrupted access to news and information.
HP teams up with iPass to offer global Wi-Fi across select devices, including those running Windows 10


Among the downsides of traveling, is limited access to Wi-Fi. Finding hotspots becomes a priority, leaving travelers scrambling for places like Starbucks and various other cafes, libraries and, well...any port in a storm. Wi-Fi is becoming more ubiquitous, though.
Now HP is looking to help out those using its devices, including both tablets and laptops. The company is extending its partnership with iPass Inc to bring connectivity to what it terms "select devices". Previously this was only available in the Asia-Pacific region, but it is now expanding worldwide.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.