Apple and Zoom push out updates to remove potentially privacy-invading web server

Apple logo in squares

A few days ago, a security issue with the Zoom chat tool came to light -- a flaw that made it possible for Mac webcams to be switched on without permission. Despite seemingly suggesting that the flaw was in fact not a flaw, Zoom issued an update that grants users more control over the software.

Apple has also produced an update of its own which nukes the security hole. The silent update has been pushed out to users and is installed without the need for confirmation or user interaction.

Continue reading

Microsoft releases Windows 10 20H1 Build 18936 with passwordless sign-ins

Even though the next major feature update for Windows 10 isn’t due for a year, Microsoft is rolling out weekly new builds for it.

Windows 10 20H1 Build 18936 offers a number of new features, including the ability to go passwordless on your device, and create calendar events directly from the taskbar.

Continue reading

Is app apathy hurting your marketing?

Are you reaching your audience directly through mobile apps? If not, there is a whole new digital market that remains, literally, untapped.

Content consumption is nearly universal on mobile devices in 2019, especially on apps. From Instacart to Waze, apps capture the attention of billions on a daily basis. Three of every four users not only say their phone is useless without apps, but default to using apps when they’re bored. Access to these app users is easily unlocked for mobile marketers, who have access to targeting capabilities that other advertising forms do not. The prevalence of in-app marketing is currently the biggest shift in the digital marketing industry especially in the rapidly growing Asian marketplace, and any brand or company not taking advantage could fall behind fast.

Continue reading

5G's 'G-wiz' environment

5g smartphone

The U.S. is leading in 5G. That’s the latest findings from the Cellular Telecommunications Industry Association’s (CTIA’s) 2019 Annual Survey. But hold the smartphone! According to CNN’s June 26, 2019 article titled, Huawei is still signing up 5G customers despite US pressure, "Huawei is a leader in 5G technology and has invested $4 billion over the last decade in developing the next generation of wireless technology…"

When it comes to the 5G measuring stick, "leading," "readiness," and "patents" all have dramatically different leaders. For example, according to the CTIA report, being ready for 5G means building the required infrastructure, and testing and launching early networks in key locations. The report cites that AT&T has launched 5G in over a dozen markets, while Chinese 5G networks are still in trial stages -- advantage U.S.

Continue reading

Nintendo Switch Lite shows less can be more

One of the coolest things about Nintendo's Switch console is that it is both a home and portable video game system. You can use it when on the move with the integrated screen, or if you prefer, connect it to a TV. And so, taking away one of the biggest selling points of the Switch would be foolish, right? Well, yes and no.

Today, Nintendo announces a new variant of the console called Switch Lite. It is smaller, less expensive, and comes in three colors -- turquoise, yellow, and gray. All good news! Except... it cannot connect to a TV like the normal Switch. The controllers are permanently affixed too -- there is no kickstand either. In other words, you cannot play with a friend simultaneously with one console. While many folks will pass on Switch Lite because of these new limitations, others may welcome it.

Continue reading

Get 'Learn Ethical Hacking from Scratch' ($23 value) FREE for a limited time

Learn Ethical Hacking from Scratch from Packt Publishing will teach you how to hack systems like black hat hackers and secure them like security experts.

It will help you understand how computer systems work and their vulnerabilities, explain how to exploit weaknesses and hack into machines to test their security, and learn how to secure systems from hackers now.

Continue reading

Emotet botnet down for maintenance

Maintenance workers

June's Global Threat Index from Check Point reveals that the botnet behind the Emotet banking Trojan has been inactive for most of the month.

Check Point's researchers believe that Emotet's infrastructure could be offline for maintenance and upgrade operations, and that as soon as its servers are up and running again, it will be reactivated with new, enhanced threat capabilities.

Continue reading

SoftMaker FreeOffice 2018 gains Anniversary Edition update with dozens of new features and improved Office 2019 compatibility

German software developer SoftMaker has unveiled SoftMaker FreeOffice 2018: Anniversary Update, extending major new features and compatibility improvements to its free office suite for Windows, Mac and Linux.

The update, officially dubbed Revision 966, comes with dozens of new features across the suite’s three main applications: TextMaker, PlanMaker and Presentations. It also updates its compatibility settings to work seamlessly with Microsoft Office 2019 documents.

Continue reading

Managing third-party risk costs the healthcare industry over $23 billion a year

Screen and stethoscope

The ability to adequately assess and understand the risks that vendors pose is a problem for healthcare providers, and a costly one at that, according to a new report.

The study by risk management platform Censinet and the Ponemon Institute  shows the yearly hidden cost of managing vendor risk is $3.8 million per healthcare provider, higher than the $2.9 million that each data breach costs providers. This adds up to a total cost across the industry of $23.7 billion.

Continue reading

Don't buy the faulty Raspberry Pi 4 -- get a different Linux-compatible single-board computer instead

Raspberry Pi computers are pretty damn great. Not only are they small and inexpensive, but they are ideal for tinkering and learning. And yes, they can serve as excellent media boxes thanks to the Linux-based LibreELEC. With the Raspberry Pi 4, however, it is finally powerful enough to serve as a true desktop computer -- prior models were capable, but offered woefully slow desktop experiences.

With all of that said, surely the Raspberry Pi 4 is highly recommended, right? Actually no. Sadly, we must warn you not to buy this seemingly solid piece of hardware. Unfortunately, it has one massive faulty aspect, meaning you should probably pass on it.

Continue reading

Is your online cloud storage secure enough?

Cloud data security

Having cloud storage is a reality of living and working in an ever more connected world, where we expect to have access to our data anywhere with an internet connection at the drop of a hat. Cloud storage makes it easier for us to travel, to share and most importantly keep our data safe. However, not all cloud storage solutions are created equal. While many commercial services are more quick and convenient, they sacrifice security in order to be more accessible. If you deal with sensitive data such as financial documents for clients, are you using a cloud solution that’s secure enough?

When using cloud services for storing and sharing critical documents it’s important to know if you’re using a solution that employs the highest levels of protection. To know if a cloud solution is secure enough, you need to determine if it has any of the following features:

Continue reading

YouTube app returns to Amazon Fire TV, while Prime Video comes to Chromecast

A few months back, we shared with you some very, very good news -- Amazon and Google were burying the hatchet. You see, the two giant companies were at odds, keeping their respective video apps from each other's hardware platforms. Then in April, the two companies announced that the feud was over -- YouTube was coming back to Amazon Fire TV, while Prime Video would come to Chromecast.

Wow! Great news, right? Well, yes and no. While it was undoubtedly positive, it was not immediate -- consumers would have to wait months for this to happen, sadly. Well, folks, today it finally becomes a reality!

Continue reading

IBM officially acquires Red Hat for $34 billion -- Linux distros are unaffected

Red Hat and IBM

IBM has closed its acquisition of Red Hat following the statement of intent back in October. Following the $34 billion deal, Red Hat will operate as a distinct unit within IBM -- and will be reported as part of IBM's Cloud and Cognitive Software segment.

For IBM, the deal means fully embracing open source as it looks to accelerate its business model within the enterprise. For Red Hat, it means expanding its client base and working with a big player in the enterprise cloud business.

Continue reading

US Court of Appeals says Trump can't block people on Twitter

Trump baby blimp

Donald Trump's love of Twitter is legendary and often ridiculed; it is also the source of frequent controversy.

The US president is huge fan of ranting, raving and venting steam in tweet storms, but his famed love of sycophants also comes to the fore. Many people who have responded to his tweets critically have found themselves blocked. Now the US Court of Appeal says this is a violation of their First Amendment rights.

Continue reading

It's 2029, you're paying more to read this page at peak time (and we're paying your ISP to stop you visiting other tech sites)

hacker laptop

What would a world be like where ISPs and businesses are in control of everything you see and do online? A world, in other words, without net neutrality.

VPN comparison site TheBestVPN.com has been considering this and has created an interactive simulator looking at what the web without net neutrality could look like in 2029.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.