Connectivity could make digital cameras vulnerable to ransomware

Digital camera user

Modern digital cameras with wireless and USB capabilities could be vulnerable to ransomware and malware attacks, enabling attackers to hold precious photos and videos to ransom.

Check Point Research reveals that the standardized protocol known as Picture Transfer Protocol (PTP) used to transfer digital images from camera to PC has critical vulnerabilities.

Continue reading

MSI hits 5902MHz with HyperX Predator RAM to set DDR4 overclock world record

Do memory speeds matter? A little bit, yes, but the truth is, benefits seen from incremental increases are negligible at best. Enthusiasts may spend a lot of money buying fast RAM, and hey, there is nothing wrong that -- as long as they understand it is more bragging rights than anything. Gamers, for instance, would be better served by putting more money into their GPU or CPU when building their rig.

With all of that said, it is still fun to see how fast memory can be -- especially when overclocked. RAM made by HyperX -- the gaming division of Kingston -- has apparently set a new world record. MSI used HyperX Predator DDR4 memory to achieve an insane 5902MHz!

Continue reading

The Hitchhiker's Guide to Ethical AI

In the 1979 cult-fiction novel, The Hitchhiker's Guide to the Galaxy, an enormous super computer named Deep Thought took 7.5 million years to conclude that "The answer to the ultimate question of life, the universe and everything is 42."

He may not have meant it, but what Douglas Adams wrote in 1979 was a portent to why so many questions are being asked about the practical use of AI in business. The recent explosion in AI technology has largely been driven by the availability of large quantities of data, the availability of sufficient computation power and the ever-increasing demand for data analytics to support business strategy. These strategies can be driven by greater efficiency by reducing operating costs or increasing revenue opportunity by improving customer service and product availability.

Continue reading

Apple widens the scope of its bug bounty program, and increases top payout to $1 million

Apple money

Bug bounty programs are a common way for companies to learn about problems with their hardware and software, while giving people the chance to get paid for finding them. Apple is one of the big names to run such a program, and it has at long last expanded it to included macOS.

The iPhone-maker made the announcement at the Black Hat security conference, where it also revealed that not only will its bug bounty program spread to tvOS, watchOS and iCloud as well, but also that the maximum reward is increasing to a cool $1 million.

Continue reading

Microsoft is at it too: workers are listening to your Skype and Cortana conversations

Eavesdropping

The idea that conversations you have with or via your computer are confidential has been completely dispelled over the last couple of weeks. We've learned that not only were Google workers listening to recordings of people using Google Assistant, Apple workers were listening in on Siri commands, and Amazon workers could hear what you're saying to Alexa.

If you thought Microsoft would not engage in such activity, think again. A new report reveals evidence that contractors working for Microsoft are listening to Skype calls made via the translation feature.

Continue reading

Almost half of employees have access to more data than they need

Access management

A new study of over 700 full-time US employees reveals that that 48 percent of employees have access to more company data than they need to perform their jobs, while 12 percent of employees say they have access to all company data.

The survey by business app marketplace GetApp also asked employees what classifications of data protection are in place at their company. No more than a third of businesses were found to use any one individual data classification.

Continue reading

The hard truth about mass shootings and the internet

"You can’t handle the truth!" That iconic line from the 90’s era Tom Cruise legal thriller, A Few Good Men, is what comes to mind as I mull over the headlines of the past few weeks. From El Paso, Texas to Dayton, Ohio, from Gilroy, California to Christchurch, New Zealand, sick and twisted individuals are committing horrendous acts of violence against innocents. And, as I struggle to understand the seemingly disparate motivations of these despicable individuals, a singular thought keeps popping into my head:

This sort of stuff didn’t happen before the internet.

Continue reading

Apple is discouraging the installation of third party batteries by displaying Battery Health warnings

iPhone battery

In a move that is going to prove more than a little controversial, Apple is using the Battery Health feature of iOS to strongly discourage people from using cheaper third-party batteries rather than official Apple units.

Now, if you install a non-official battery in an iPhone XS, XR or XS Max, Battery Health will display a "Service" notification that is usually used to indicate that there is a problem. Click through, and you'll see a message that reads: "Unable to verify this iPhone has a genuine Apple battery. Health information not available for this battery".

Continue reading

Load balancer flaw could lead to major breaches at large organizations

data breach

A security flaw in the F5 Networks’ BIG-IP load balancer, which is popular among governments, banks, and other large corporations, could be exploited to allow network access.

F-Secure senior security consultant Christoffer Jerkeby has discovered the issue in the Tcl programming language that BIG-IP's iRules (the feature that BIG-IP uses to direct incoming web traffic) are written in. Certain coding practices allow attackers to inject arbitrary Tcl commands, which could be executed in the security context of the target Tcl script.

Continue reading

pdf Creator 9.0 unveils new zipper merge tool, unveils new options for manipulating PDFs

Geek Software GMBH has released pdf24 Creator 9.0, a major new version of its freeware suite of tools designed to create and manipulate PDF files. Features include the ability to merge, split and extract individual pages from PDF files, plus create secure documents.

The program adds several new features, including a zip-like merge tool for PDF documents as well as the ability to quickly reverse a document’s page order. Users also gain a handful of additional options as well as a selection of minor improvements

Continue reading

Satechi launches 72W Type-C PD Car Charger and Apple MFi Certified USB-C to Lightning Cable

If you are a road warrior that spends a lot of time in the car, you know how essential a quality charger can be. Low cost car chargers from little-known manufacturers may work, but not necessarily well. For instance, I have had many cheap chargers die after less than a week of use -- sometimes within a day. Even more often, despite the listed specifications, it can't charge fast enough to maintain battery life during heavy use. In other words, even though my phone is charging, the battery percentage still goes down -- albeit slower than not charging at all.

Ultimately, I learned the hard way, when it comes to chargers, you should always aim for one made by a quality manufacturer. One such company is Satechi, and today, it launches an impressive 72W Type-C PD Car Charger. Don't worry, it also has a USB-A port. In fact, those 72 watts are shared between the two. In addition, the company unveils a new Apple MFi Certified USB-C to Lightning Cable for iPhone and iPad users.

Continue reading

Ransomware turns its sights on large organizations

Ransomware sign

Detections of ransomware aimed at businesses rose by a massive 363 percent between the second quarter of 2018 and the same period this year. Meanwhile consumer ransomware is down 34 percent.

The latest quarterly threat report from Malwarebytes also sees a 235 percent overall increase in threats aimed at organizations from enterprises to small businesses, with ransomware as a major contributor.

Continue reading

Software producers need more flexible licensing models in order to compete

SaaS

Once upon a time you bought a license for a piece of software and you could, essentially, run it forever. While much of the market has now shifted to subscription models, 65 percent of producers are still offering perpetual licenses, while 74 percent utilize subscription models for some or all of their products.

A new report from Flexera, which looks at changing licensing and deployment models, finds that when software producers are asked how they will change their monetization models over the next 18 months, both usage and subscription models will see the strongest increases.

Continue reading

IBM launches new toolkit to boost understanding of and trust in AI

Artificial intelligence

AI and machine learning have demonstrated some impressive abilities in recent years, but the models behind the technology and the reasons why it came to the decision it did are often hard for the people interacting with it to understand.

In order to help people gain an insight into machine decision making, IBM Research is launching AI Explainability 360, a comprehensive open source toolkit of state-of-the-art algorithms that support the interpretability and explainability of machine learning models.

Continue reading

Linux Journal shuts down, because cheapskate Linux users don't spend money

Linux users are cheap as hell. Sorry, but it is largely the truth. I am not just talking about traditional Linux desktop users either, but Android users too. This is why iOS is so profitable despite its paltry market share compared to Android. iPhone users will actually buy apps, while Android users would rather look at ads than part with a measly dollar. Sadly, many people only choose Linux because it is free -- not because they prefer it.

And look, that's fine. There's nothing really wrong with being averse to spending money. Quite frankly, not wasting money is a noble trait. However, like it or not, there is no such thing as a free lunch, and that includes open source software. Eventually, when developers can't pay their bills, that free software you love will disappear.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.