RoboForm boosts security with two-factor authentication

Password

Two-factor authentication is increasingly common as a way of verifying logins to websites so that you’re not relying on just a password.

Now Siber Systems maker of the popular RoboForm password manager is adding 2FA to allow users to receive a password via text message to verify trusted desktop, laptop and mobile devices for repeat use with the software.

Continue reading

Moving legacy apps to the cloud: Why and how you should do it

girl in cloud

With shrinking IT budgets it is crucial that businesses ensure they are spending their IT budget wisely. As a result, organizations are already taking advantage of the economies of scale that cloud computing offers.

However, despite the benefits being clear, businesses still have applications running on legacy environments. Moving legacy applications to the cloud is one way to reduce operating costs and relieve staff from managing tasks that are better served in the cloud, freeing them to focus on tasks that contribute to business growth.

Continue reading

Twistlock strengthens container security for enterprises on Google Cloud

padlock box secure

More and more businesses are adopting a container strategy but this leads to problems for operations and security staff seeking to maintain control and visibility.

Container security specialist Twistlock released its Container Security Suite in beta back in May and has now announced general availability of the product along with its participation in the Google Cloud Platform partner program.

Continue reading

Offline navigation comes to Google Maps

google_maps_mobile

One of the biggest problems with Google Maps on your smartphone is that you need an internet or data connection. At least that used to be the case. Today Google announces that navigation is now possible in offline mode.

In a move that has the potential to kill off the likes of TomTom and Garmin, Google is making it possible to download maps to your phone so turn-by-turn directions can be initiated even when there is no connection. It's a feature that people have been waiting for for some time, but Google has more to offer.

Continue reading

Best Buy reveals its Black Friday deals and sales start now

best-buy-black-friday

The holiday shopping season is right around the corner or, in some cases, here now. We've already seen Amazon launch its store which contains the "Lightning Deals" it offers each year as an incentive to keep customers coming back frequently.

Not to be outdone, Best Buy is kicking off its festivities now as well. The company announces today that deals will be available immediately both in stores and online.

Continue reading

ARM's new IoT mbed products could bring 8-week battery life to wearables

arm_mbed_cloud_iot

At ARM TechCon 2015, ARM is unveiling a number of new mbed IoT Device Platform products. Designed to make it easier to deploy IoT devices on a large scale, developers will be able to use mbed Device Connector to build cloud-integrated web apps.

There's also a new build of the mbed OS Technology Preview and together these technologies can be used to connect and securely manage IoT devices. Two new reference designs for industry and wearables have also been released.

Continue reading

New compliance solution helps developers tackle software piracy

Software piracy

A recent study by the Business Software Alliance estimated that 43 percent of software installed today is not properly licensed, which equates to more than $63 billion in lost revenue.

SmartFlow Compliance Solutions is launching an innovative solution designed to help companies combat intellectual property theft and establish effective in-house compliance programs.

Continue reading

Twitch flips the switch on two-factor authentication

twitch-tv

Enabling two-factor authentication is a simple and effective way to beef up the security of your online accounts. Also known as 2FA, it introduces an additional step in the log in process, which typically requires the user to enter a code received via SMS or retrieved from an app, after their password is validated.

To take advantage of two-factor authentication the services that you use have to offer this feature, which is not always the case. But, as far as Twitch is concerned, two-factor authentication is no longer missing from the options.

Continue reading

Microsoft to offer cloud services from the UK

Cloud access

At the Future Decoded event, which kicked off today at London’s ExCel Center, Microsoft CEO Satya Nadella took to the stage to talk about his firm’s mobile first, cloud first strategy.

During his speech he announced that Microsoft plans to offer commercial cloud services from the UK. Azure and Office 365 will be available from local data centers in late 2016, followed by Microsoft Dynamics CRM Online shortly afterwards.

Continue reading

Secretly record desktop activity with Hidden Capture

HiddenCapture200-175

Finding out what others are doing on your PC can be difficult. You might spend an age exploring various histories -- browsers, applications launched, documents opened -- and still not be entirely sure.

Hidden Capture is a free tool which can help by automatically taking screenshots of your desktop at regular intervals.

Continue reading

Addressing the mobile app trust gap

Mobile data spy

According to a new survey 80 percent of consumers would stop being a customer if there were a security breach in a company's mobile app. But app developers admit in the same study that many apps are not secure due to pressure to release them to market before they are ready.

These findings come from mobile security and analytics company Bluebox Security which talked to over 400 consumers and approximately 300 developers.

Continue reading

A quarter of all websites run WordPress

WordPress and other CMSs are 'inherently insecure'

Out of all websites on the entire internet that have any sort of content management system (CMS), WordPress powers more than half.

Considering the fact that half of the internet doesn’t use any recognizable CMS system, it brings us to the conclusion that WordPress, the open-source content management platform, powers 25 percent of the entire Internet

Continue reading

The next target for surveillance: the dark web

futuristic_dark_web_mesh

The surveillance activities of the NSA and GCHQ are well known, and many people hoping to slip under the radar have taken to the 'dark web'. Famous for sites such as Silk Road, as well as being home to illegal content such as child pornography, the dark web may not be a safe haven for much longer.

Joint Operations Cell (JOC) is a new venture in the UK which sees the National Crime Agency (NCA) and GCHQ joining forces. Described as a "genuinely innovative development", the operation aims to home in on online criminals, with a particular focus on crimes involving child exploitation.

Continue reading

New machine learning solution delivers insight into VMware environments

Machine learning

As many businesses have shifted their systems to VMware environments they have a need for real-time insights into application and server performance, efficiency, and reliability.

To meet this need SIOS Technology is announcing the latest release of its SIOS iQ machine learning analytics software. This offers new features to deliver accuracy and precision in performance analysis for VMware environments.

Continue reading

Windows 10 'Redstone' branch showing up for some Windows Insiders

redstone

The major Threshold 2 update for Windows 10 was released to Fast ring Insiders last week, and moved on to the Slow ring yesterday in preparation for pushing to all users of the new OS in a couple of days' time.

With that branch of development done and dusted, Microsoft has switched its attention to the next big update, codenamed Redstone. This will bring some much needed improvements to Windows 10 -- including extensions in Microsoft Edge -- when it arrives sometime in 2016.

Continue reading

Load More Articles