Latest Technology News

PureVPN scrambles to defend itself against accusations of logging users

Last week it transpired that PureVPN had helped the FBI track down a cyberstalker from Massachusetts. This came as something of a surprise to other PureVPN users who were under the impression that using the service made them completely anonymous -- a belief strengthened by the company's assertion "We do NOT keep any logs that can identify or help in monitoring a user's activity."

Strictly speaking, this is true, but that's not to say that the company doesn’t maintain IP logs that can be used to identify users. The company does exactly this, logging IP addresses and timestamps, and this is how it helped the FBI. In a blog post, the company tries to explain this as it attempts to convince concerned users that it is not logging their activities.

Continue reading

AsTech offers Qualys Cloud Platform with a $1 million breach cost guarantee

The Qualys Cloud Platform is designed to give customers a continuous, always-on assessment of their global security and compliance posture across all global IT assets, wherever they reside.

Cyber risk management company AsTech is boosting its attractiveness further for its Managed Qualys Service customers by offering a $1 million guarantee for securing perimeter networks.

Continue reading

Almost half of UK infrastructure will have moved to the cloud in six months

cloud button

A new survey of UK IT decision makers by cloud and network provider Interoute shows the cloud is increasingly seen as the best platform for providing scalable infrastructure.

The results reveal that businesses plan to move on average just under half (46 percent) of their infrastructure to the cloud over the next six months.

Continue reading

Android: DoubleLocker ransomware encrypts data and changes PINs

A new breed of Android ransomware has been discovered that hits victims with a double whammy. DoubleLocker not only encrypts data as all ransomware does, it also changes the PIN on the target device.

DoubleLocker was discovered by security researchers at ESET. They say that the ransomware abuses Android accessibility settings, and is the first to use a double-lock approach. Based on previously released banking malware, it is though that a test version of DoubleLocker could have been in the wild since as early as May.

Continue reading

Microsoft showcases the Fluent Design changes found in Windows 10 Fall Creators Update and beyond

When you update your copy of Windows 10 to the Fall Creators Update (from tomorrow), one of the changes you may notice is the introduction of a new, but quite subtle, look to the OS.

Microsoft's Fluent Design language is essentially like Aero, with cool transparency and blur effects added throughout.

Continue reading

KRACK warning: Severe WPA2 security vulnerability leaves millions of devices open to attack

A severe security warning has been issued after Belgium researchers managed to exploit a serious vulnerability in the WPA2 wireless protocol.

Known as KRACK (Key Reinstallation Attacks), the vulnerability makes it possible to eavesdrop on Wi-Fi traffic. Millions and millions of devices are at risk -- Windows, Linux, Android and more -- but it is not known whether there is an active exploit in the wild yet. Details about the vulnerability were due to be released at 8:00AM ET (1:00PM BST), but the research paper has now been published early after someone leaked a draft version.

Continue reading

Twitter vows to take a more aggressive approach to unwanted sexual advances, abuse and more

Jack Dorsey has promised that Twitter will take a more aggressive stance in applying its rules. The announcement came after the #WomenBoycottTwitter protest was used to draw attention to women being silenced.

The Twitter CEO also said that new rules will be introduced to try to counter "unwanted sexual advances, non-consensual nudity, hate symbols, violent groups, and tweets that glorifies violence."

Continue reading

Samsung Connect Tag is a smart IoT tracker using narrowband technology

Samsung has unveiled the latest addition to its range of Internet of Things devices: the Samsung Connect Tag. It is designed to make it possible to keep track of anything you can’t bear to lose, from a bag or keys, to a child or pet.

Based on the Tizen operating system, the Samsung Connect Tag can be clipped to a range of objects and, using a combination of NB-IoT, Cat.M1, GPS and GLONASS, it will report the location of whatever it is attached to. It is described as the first consumer product to take advantage of narrowband technology.

Continue reading

Creative Sound BlasterX AE-5 32-bit 384 KHz PCIe gaming sound card [Review]

With many consumers owning laptops or tablets as their sole computers nowadays, the concept of installing a sound card -- let alone any add-on card -- can be totally foreign. Believe it or not, however, many people still use and love desktop computers -- including yours truly. Not only can a tower be more powerful than their mobile counterparts, but they can be much easier to upgrade too.

Even if you do own a desktop computer, a high-end sound card, such as the Creative Sound BlasterX AE-5 which I have been testing, may not be in your best interest. This card is designed for computer enthusiasts that are audiophiles, gamers, or both with decent headphones or speakers; there is no point in buying a high-end sound card to use with $10 Walmart speakers, right? The big question is, should you purchase the card?

Continue reading

LinkedIn is testing autoplaying video ads

Looking for new ways to make money out of its professional social network LinkedIn, Microsoft is testing video advertisements. Currently in closed beta testing, video advertising is available to "a limited number of advertisers" and it may well prove unpopular with LinkedIn users.

Following a well-worn path set out by the likes of Google, Facebook and others, the video ads will autoplay. The one saving grace is that videos will play without sound, but this is unlikely to be enough to prevent them from quickly becoming an irritant.

Continue reading

Windows 10 telemetry violates privacy laws

Windows 10 box

The data collecting activities of Windows 10 has landed Microsoft in trouble again. Investigating the telemetry built into the operating system, the Dutch Data Protection Authority (DPA) has said that Microsoft's spying is a violation of local privacy laws.

Of particular concern to the authority is the fact that users are not clearly told that data will be collected in both Windows itself and Microsoft Edge. With Microsoft's web browser gathering data about every URL that's visited by users who have not opted out of telemetry, and Windows 10 itself sucking up detailed information about app usage, the DPA is concerned that users are not adequately informed or protected.

Continue reading

Arrow Launcher for Android exits beta and becomes Microsoft Launcher

microsoft-launcher-icon

It came as something of a shock to people when Microsoft first released an Android launcher in the guise of Arrow Launcher. Now the company is making it more obvious who is behind the app, bringing the launcher out of beta and relaunching it as Microsoft Launcher.

Joe Belfiore only very recently admitted that Windows Phone is dead, and this is something that is borne out by Microsoft's increasing interest in developing iOS and Android software. What may well come as a surprise to many is that Microsoft Launcher is actually a decent piece of software.

Continue reading

OnePlus opens up about its secret data collection and promises an opt-out opportunity

Last week it emerged that OnePlus has been secretly gathering a huge amount of data from handsets, revealing a wealth of personally identifiable information about their users. Now the smartphone company has spoken out in response to the uproar, and vowed to give users the ability to opt out of data collection.

Company founder Carl Pei took to the OnePlus community forums to explain why data was collected, stressing that OnePlus takes privacy seriously. But while Pei promises that an update is on the way by the end of the month that will introduce the ability to opt out of telemetry, users are still not happy, and many questions remain -- particularly about the secrecy involved.

Continue reading

Download the Android Oreo beta for your OnePlus 3 or 3T

OnePlus has earned itself quite a reputation for pushing out new Android builds to its users, and it's no different with Android 8.0 Having previously announced that Oreo would be the last major update for the OnePlus 3 and 3T, the Chinese smartphone-maker has now made a beta version available to everyone.

Just last month, a closed group was given access to an early Oreo beta for the OnePlus 3, but now the OnePlus Open Beta program means that anyone who likes the idea of trying out Android 8.0 on their handset can do so.

Continue reading

How Apple put an end to iOS jailbreaking

"iPhone jailbreaking is dead" reads the headline. Four words signaling the end of a 10-year long battle between Apple and those who wanted open control of their iOS devices. Here is an admission in black and white that prominent members of the jailbreaking community are giving up on attacking iOS devices. Apple created a system where their engineers, like soldiers in a castle under siege, were able to outlast the besieging army; throwing back assault after assault, until the attackers, deciding the siege was no longer worthwhile, packed up and headed home.

Ten years ago, finding a jailbreak was fairly doable, though it required skill. As iOS jailbreaks became harder to find, however, they became more valuable. Zerodium publicly announced it would pay $1 million, now increased to $1.5 million, for a remote jailbreak flaw (e.g. remote code execution) on iOS. This effectively priced the jailbreak community out of the market for iOS vulnerabilities. Markets only assign commodities such value when they are rare and difficult to obtain. If somehow you remain unconvinced, consider that the last publicly available untethered (e.g. persistent across reboots) jailbreak was discovered over a year ago, and was part of the government-quality attack tool Pegasus. The current generation of jailbreaks require the user to run a jailbreak app every time they reboot.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.