Happy 25th Birthday, Debian Linux!

Debian is one of the most important open source projects ever. The Debian Linux operating system is extremely popular in its own right, but also, it is used as the base for countless other distributions. Ubuntu, for instance -- one of the most-used distros -- is Debian-based. Even Linux Mint, which is based on Ubuntu, also has a Debian edition. Not to mention, Raspbian -- the official Raspberry Pi OS -- which is based on Debian too.

Today, Debian is celebrating a very important milestone -- a 25th birthday! Yes, it is seriously that old -- its development was announced on August 16, 1993. Hell, many of its current users weren't even born then!

Continue reading

Telecoms industry sees a higher percentage of advanced attacks

web threats

Threat intelligence specialist Lastline produces regular reports on the global cyberthreat landscape.

Its latest study looks at the telecoms industry and how the threats it faces differ from those in the wider world. Among the findings are that the industry sees a higher percentage of attacks (one in 10) exhibiting advanced threat capabilities, which is greater than the global standard of one in 12.

Continue reading

Apricorn unveils Aegis Secure Key 3NX 256-bit AES XTS hardware-encrypted USB drive

Storing files in the cloud is very convenient, but understandably, if they contain extremely sensitive information -- such as trade secrets -- you may not want to transmit them over the internet. For this, locally stored data is probably a better move. Of course, if possible, you should encrypt the storage drive. Encryption may even be required as a result of new laws and regulations such as California's Consumer Privacy Act and GDPR.

Software-based encryption for storage drives is better than nothing, but hardware-based is obviously superior. Apricorn has been producing hardware-encrypted USB drives for a while now, and they are very well respected. Today, the company unveils its latest such drive. Called "Aegis Secure Key 3NX," it uses 256-bit AES XTS hardware-encryption -- FIPS 140-2 Level 3 validation is pending. The successor to the well-received Secure Key 3z features a convenient keypad, making it easy to lock and unlock when needed.

Continue reading

Kaspersky releases Security Cloud Free... and it's very basic

Microsoft appears keen to encourage people to use the latest Windows Defender and, frankly, it’s a more-than-adequate security tool. You’re missing some of the features you’ll find in a paid security suite, such as a VPN or 'safe money' but do you really need those features?

With the above in mind, security developers such as BitDefender and, more recently Kaspersky, are releasing free versions of their security suites, to encourage people to use, gain familiarity and then upgrade. Let’s face it, once you have a security suite on your computer and you receive a fantastic offer, you’re more likely to pay than remove.

Continue reading

WhatsApp now lets you backup to Google Drive without using any of your cloud storage quota

WhatsApp mobile icon

Facebook and Google have struck a deal that benefits WhatsApp users. Starting later in the year, users will be able to store WhatsApp backups on Google Drive without using up any of their storage space.

The new arrangement means that WhatsApp users now essential have unlimited storage space available to them free of charge. But the company has also issued a warning that people need to take action if they want to avoid backups being deleted.

Continue reading

Kids are dying because of their parents' obsessive phone use

iPhone by pool

Although it is the children of today who have never known a world in which mobile phones do not exist, it is the parents of these children that are causing serious problems -- and not just by using phones while driving.

The German Lifeguard Association (DLRG) has warned that children are dying because of their parents' phone usage. The organization says that rather than keeping an eye on their kids as they swim, parents are "fixated by their smartphones" and fail to notice when their youngsters get into trouble.

Continue reading

Microsoft pulls Your Phone app for non-Windows Insiders

Yesterday, Microsoft rolled out its new Your Phone app for Windows 10. Previously only available for Windows Insiders, the app allows Android users to access their photos on a Windows 10 PC.

If you’ve been wanting to try out the app, we’ve some bad news for you. You’ll once again need to be an Insider to use it.

Continue reading

Taking a look back: Where do 2018 wireless predictions stand?

5G, carrier updates, mergers -- we rang in 2018 with a slew of big wireless predictions. But where do these predictions stand now at the year’s halfway point? Let's take a look, starting with a big one -- 5G is coming

Ah, 5G. We’ve read about it, researched it, and heard the predictions that it’ll be available by the end of 2018. But is it all true? Well, AT&T claims it plans to launch 5G in 12 cities -- including Atlanta and Dallas -- by year’s end. The carrier giant has already taken 5G for a test drive with an introduction to visitors of Magnolia Market in Waco, Texas. The trial area, which sees approximately 5,000 visitors each day, was a real-world experiment for AT&T’s new 5G capabilities allowing the company to evaluate performance and visitor response.

Continue reading

Four ways to prevent an enterprise phishing attack

According to a new FBI report, businesses lost more than $676 million as a result of email fraud in 2017 -- up 88 percent from the year before. Clearly, businesses are losing the war against email scammers, as phishing attacks have become increasingly sophisticated and widespread.

Phishing is a method of social engineering (i.e. deception) used to gain access to a social media account, bank account or another protected resource. Hackers typically use an email or text message to trick the user into providing login information. Once the user reveals a username and password, the attacker will hijack the account. The outcome can be as devastating as a fully drained bank account. Frankly, all individuals and businesses should take phishing seriously.

Continue reading

Latest version of Marvel Contest of Champions causing iPhones to overheat

If you updated your Marvel Contest of Champions (MCoC) app recently, you might have noticed something -- your phone heating up to the point of not being usable.

Although version 19.0 of the game was supposed to fix some bugs, in reality, it introduced a new problem. Players noticed shortly after downloading the update that their phones started severely overheating when they tried to play the game.

Continue reading

Knowledge commerce: Building a solid brand with Kajabi

Photo: Petrenko Andriy/Shutterstock

"An investment in knowledge always pays the best interest." -- Benjamin Franklin

The same thought rings true in the online business sphere. Apart from assimilating the best strategies in your field, you also need to build and share your knowledge in order to win your audience’s vote of confidence. Remember, people flock to those who have proven their expertise in their respective niches. It isn’t rocket science: You can’t just expect your visitors to subscribe to your blog, subscribe to your services, or purchase your products if they don’t trust your brand. That’s why marketers invest in branding strategies that not only help them reach their target audience, but also earn their approval by providing valuable content.

Continue reading

How to backup your computer to the cloud with OneDrive folder protection

Previously only available to OneDrive for Business users, Microsoft is now rolling out OneDrive folder protection to everyone.

Also referred to as "known folder move" -- and rather copying the Backup and sync app from Google -- OneDrive folder protection makes it possible to back up your important files and folders to the cloud. Here's how to get started.

Continue reading

Money, power and ego, the factors that drive people to cybercrime

Cybercriminal with cash

We reported last week on a report highlighting how many security professionals are turning to a life of cybercrime.

In a follow up research piece, Wendy Zamora at Malwarebytes, has been looking at the psychology, motivations and other underlying factors that drive people to take part in cybercrime.

Continue reading

If you want to record calls in Android 9 Pie, you'll need to root your phone

Record button

Recording phone calls is dodgy territory legally speaking, but whether you choose to do it depends on where you are in the world, and whether you're concerned about complying with the law. Since Marshmallow, Google has made it difficult to record calls on Android phones by killing the recording API, but this has not stopped third party developers finding ways around it.

But with Android 9 Pie, Google has made it impossible for apps such as Call Recorder - ACR and BoldBeast Android Call Recorder to be used to record calls. Unless, that is, you're willing -- or able -- to root your handset.

Continue reading

Quickly remove unwanted bundleware using the latest IObit Uninstaller 8

We handle support for people who purchase software and the number one issue we consistently experience is the inability to install updated versions of their favorite software.

There are very basic reasons, too. When you first install your software, you’re often asked to reboot. After this procedure, it’s in use. The application may start when you boot your PC, run in the background, checking your system and much more. When you decide to upgrade, people expect to simply install the latest version on top, forgetting the application is being used and that Windows cannot remove active files.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.