Windows 10 users will get to choose when they install the May 2019 Update

It was generally assumed that the next big Windows 10 feature update -- codenamed 19H1 -- would be the April 2019 Update available later this month, but it turns out it will actually be the May 2019 Update, and users will have quite a wait before they can install it.

Microsoft says the OS update will undergo additional testing before it’s made available to everyone. A smart move, given the October 2018 Update debacle. But that’s not all.

Continue reading

New hybrid platform helps enterprises to maximize cloud use

cloud button

Cloud management company RackWare is launching its new Hybrid Cloud Platform, designed to remove the barriers to enterprise cloud adoption.

It allows enterprises to migrate to the cloud seamlessly, implement a cloud-based approach to disaster recovery and offers oversight and control of all cloud resources.

Continue reading

Get 'Coding All-in-One for Dummies' ($17 value) FREE for a limited time

Whether you need to learn how coding works to build a web page or an application, or see how coding drives the data revolution, Coding All-in-One for Dummies introduces the languages and processes you'll need to know.

The demand for people with coding know-how exceeds the number of people who understand the languages that power technology. Whether you're looking for a complete beginner's guide or a trusted resource for when you encounter problems with coding, there's something for you here!

Continue reading

How I quit social media, but it didn't quit me

Facebook censorship

My name is Jason Kingdon, social media addict and Founder and CEO of BOLDFISH. I've been Facebook free for three years now, but I can't seem to separate it from my life. Wherever I go, there it is. Sign in with Facebook or follow us for more. At networking events, new contacts are incredulous and offended when I state my lack of social media. He lies, their eyes read

Some of my friends have acclimated to just texting me, but others have fallen out of touch. I've become accustomed to the "OMG! How are you!? I haven't seen you in forever! Are you still in China?" It’s as though time had frozen since the last time we made contact. There are amazing memories from pictures and status updates, yet they assume that what they consume is all that there ever was or will be.

Continue reading

Spear phishing attack targets HR and payroll systems

Phishing

Payday should be a pleasurable time of the month, but thanks to a new spear phishing campaign, some employees are losing their pay checks to cybercriminals.

Email defense specialist Vade Secure uncovered the attack in which criminals initiate an email conversation with HR staff to get them to change bank details for receiving direct payroll payments.

Continue reading

Vulnerability in Xiaomi's pre-installed apps could affect more than 150 million devices

man-in-the-middle

A vulnerability that could allow man-in-the-middle attacks and the injection of malicious code has been found in a pre-installed app on devices manufactured by Xiaomi, one of the biggest mobile vendors.

The flaw, uncovered by researchers at Check Point is -- somewhat ironically -- in the pre-installed security app, 'Guard Provider', which is meant to protect the phone from malware.

Continue reading

WhatsApp now lets you block people from adding you to a group chat

WhatsApp on iPhone

Facebook is hardly renowned for respecting privacy, but with WhatsApp the company is taking a small step to give users greater control.

A change to privacy settings for groups means that it is now possible -- at last -- to avoid being added to a group chat you don't to be involved in. WhatsApp has announced that "we're introducing a new privacy setting and invite system to help you decide who can add you to groups".

Continue reading

Microsoft Bounty Program offers larger rewards for bug hunters

Microsoft Bounty Program

Bug bounty programs are a popular way for tech companies to track down problems with their products without having to spend large sums of money on dedicated research teams. Microsoft is one of the big names with such a program, and it has just announced that it is increasing the payouts it makes.

As well as offering people more money for finding issues with its products, Microsoft also says that it will pay people faster.

Continue reading

Data of 540 million Facebook users exposed in latest privacy cock-up

Facebook logo and padlock

It is only a couple of weeks since we learned that Facebook has been storing user passwords in searchable plain text, and now there is -- yet another -- privacy scandal. This time, the private data of over half a billion Facebook users was left exposed on publicly-accessible Amazon servers.

Security firm UpGuard discovered that the private data of 540 million Facebook users was exposed in Amazon Web Services S3 buckets. Now removed, the data included identification numbers, comments, reactions and account names. In some instances, names, passwords and email addresses were also exposed.

Continue reading

Apple and Beats designed Powerbeats Pro wireless earphones are coming in May

Powerbeats Pro

Beats by Dr Dre has revealed details of its soon-to-be-released Powerbeats Pro wireless earphones. Scheduled for release in May, the earphones combine the engineering talents of Apple and Beats to create AirPod alternatives for music lovers and athletes alike.

Smaller and lighter than its predecessor, Powerbeats Pro provide both audio quality and comfort, and have been designed to withstand rigorous workouts. Available in four colors -- Black, Ivory, Moss and Navy -- the earphones deliver "powerful, balanced sound with dynamic range and noise isolation for a premium listening experience".

Continue reading

Office 365 phishing attacks: How hackers get access to your business

With 155 million corporate users, the highly popular Microsoft Office 365 has become a target-rich environment for sophisticated phishing attacks. On top of all the standard phishing and spear phishing threats, Office 365 presents a number of unique attack techniques for hackers looking to compromise the platform.

Microsoft is the number one phished brand for the third straight quarter -- thanks to Office 365. A multisystem platform, Office 365 combines email, file storage, collaboration, and productivity applications, including OneDrive and SharePoint. Together, they represent a honeypot of sensitive data and files that phishers are looking to exploit.

Continue reading

Lexar Professional SL100 Pro Portable SSD is 'world's fastest'

USB-C friggin' rules, y'all. Everybody loves the new connector type, as unlike the classic USB-A, Type-C is reversible. Quite frankly, the ports and connectors even look better too -- symmetry for the win! Even if your computer doesn't have a USB-C port, you can always interface with a Type-C device using a dongle or USB-C to USB-A cable. In other words, you can buy a USB-C device today and use it without worry as long as your computer has a USB port.

Remember, folks, USB-C does not indicate speed -- it is merely a connector type. With that said, USB-C (and USB-A) devices that use the USB 3.1 gen 2 interface are very fast. Today, Lexar announces a very speedy external solid state drive that the company claims is the world's fastest portable USB SSD with a Type-C port. Obviously, this claim does not include Thunderbolt 3 drives. Called "SL100," it offers up to 950 MB/s read, and 900 MB/s write. Regardless of whether it is or isn't the world's fastest, one thing is for sure -- those speeds are very impressive.

Continue reading

Marketers have high hopes for artificial intelligence

Marketing

There's strong interest in and high expectations of AI from B2B marketing and sales professionals, with 84 percent of participants in a new study currently planning, evaluating, implementing or using it.

Account-based marketing company Demandbase has revealed the results of the survey conducted in conjunction with Salesforce Pardot and global research firm, Demand Metric.

Continue reading

The world of cybersecurity in numbers

TechJury graphic header

We all know that cybersecurity is a major issue, but it can sometimes be hard to grasp the scale of the problem and who is at risk.

Software reviews site TechJury has created an infographic to vizualize what is happening in the cybersecurity field as well as the top threats to look out for.

Continue reading

Google+ is officially dead... but you may still be able to download your content

Google+ closure

As promised, Google has now closed down Google+, the social networking experiment that just never really took off. If you try to access the site -- or use the mobile app -- you'll be advised that "Google+ is no longer available for consumer (personal) and brand accounts".

Google gave fair warning of the impending closure, telling users to take advantage of the option to download their data before it was deleted forever -- although the Internet Archive said it would try to backup as much as possible. Now the closure has actually happened, it seems that there is still time to download your Google+ content... but you'll have to be quick.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.