Latest Technology News

Amazon kills off unlimited cloud storage option for Amazon Drive

Anyone looking for unlimited cloud storage now has one less option available to them. Amazon is dropping the unlimited storage option for Amazon Drive, meaning that the largest package now available is 30TB.

The unlimited tier has been with us for two years, but it's no longer available for new subscribers, and anyone currently signed up will find their storage space drops when renewal time rolls around. It's not all bad news, however. Amazon Prime subscribers still have access to unlimited cloud storage for photos.

Continue reading

Chrome Delight brings gorgeous time-lapse video to your New Tab page

There’s now a whole library of Chrome extensions which aim to enhance your "new tab" page, typically by importing new wallpaper from sources like Flickr and Shutterstock.

Delight goes a step further, replacing the usual static images with gorgeous time-lapse videos.

Continue reading

IBM builds 5nm chip with better performance and energy efficiency

IBM logo

We haven't even seen 7nm chips in mass production, however, IBM has already announced that it has managed to build a 5nm one.

What's even more important than its size, is the fact that it is much, much faster than the 7nm one. How faster, you ask? Well, 7nm chips can hold 20 billion transistors. These 5nm chips can hold as much as 30 billion transistors.

Continue reading

System76 Galago Pro is the MacBook Pro alternative the Linux community has been waiting for [Review]

System76 sells really great Ubuntu Linux laptops, but there has been one glaring issue -- the machines aren't exactly svelte. Don't get me wrong, the notebooks aren't ridiculously large or heavy, but compared to, say, a new MacBook Pro, there is a very big difference.

Many people have been anxiously awaiting a thin and light System76 laptop, and I am happy to say that it is finally here. The newest version of the Galago Pro notebook is very elegant, featuring an aluminum body and HiDPI display. But is the whole package worth your money?

Continue reading

Why companies need a two-step plan to secure credit card transactions

Bank card security

It’s the latest in a long line of cybersecurity incidents involving a well-known brand: In April, Chipotle Mexican Grill notified customers that it detected "unauthorized activity" on a credit card payment processing system. This put the restaurant chain in a position no company wants to be in -- recommending that customers "closely monitor" their bank statements for unauthorized charges.

With the incident, Chipotle joins the ranks of high profile organizations that have suffered breaches of their payment processing networks. The impact proves damaging: A study from the Federal Reserve Bank of Boston found that only 35 percent of consumers believed their personal information was secure during credit card purchases before the Target breach in 2013. But after that breach, this low level of confidence plunged even further to 24 percent.

Continue reading

Chinese company Rafotech believed to be behind millions of malware infections

malware alert

According to extensive research from the Israeli cyber-security firm Check Point, a Chinese digital marketing company called Rafotech has infected millions of computers worldwide with adware that redirects user traffic to fake search engines.

The fake search engines then divert their search queries through Google and Yahoo's affiliate programs to earn a commission for the company behind the adware. So far Rafotech has infected over 250 million computers according to a rough estimation from Check Point.

Continue reading

7 Tips for setting up a server room in your startup or small business

Despite the advent of cloud-based services, there are still some situations where on-premise hardware is the preferred route. Whether it’s a desire for direct control over security or the option to get hands-on with the hardware, some small businesses prefer to host their servers in-house.

Servers offer redundancy, make your environment more compliant to data recovery plans and are more secure than a peer-to-peer network. If your startup or small business is ready for its first server, here are some tips to get started.

Continue reading

Insider threats putting many financial services at risk

The majority of financial services are at risk of insider cyber threats because their mainframe environments have blind spots, according to Compuware.

The company's latest research claims that organizations such as banks keep the majority of the sensitive customer data on the mainframe, as they consider it the securest in the entire enterprise. However, they are not monitoring it close enough to truly understand what those with privileged access are doing with that data.

Continue reading

Facebook launches a trio of features to help US constituents connect with elected officials

Image credit: Niyazz / Shutterstock

Donald Trump is just one example of politicians using social media to get their messages out. With President Trump, Twitter acts very much as a one-way means of communications -- Facebook wants to make the channels between elected officials and constituents a two-way street.

As such, the social network is launching three new features -- Constituent Badges, Constituent Insights and District Targeting -- to help users get in touch with their elected representatives. These are the latest attempts by Facebook to increase meaningful civic engagement through its service while fighting back complaints about fake news.

Continue reading

Impersonation attacks rising sharply

hacker laptop

The number of impersonation attacks rose by 400 percent this quarter, new research has revealed.

According to a new report by Mimecast, attacks where malicious actors carefully impersonate C-level executives, employees or business partners are on the rise.

Continue reading

Apple pushing macOS devs to release 64-bit apps

Apple has long made it clear that support for 32-bit apps will be phased out eventually. On the iPhone and iPad side, the final nail in the coffin comes with iOS 11. However, macOS developers have a bit more time left to prepare for a 64-bit only future.

Starting next year, Apple will no longer accept 32-bit macOS apps in the App Store, which means that any new titles must be 64-bit from January onwards. However, for existing apps and their upcoming updates there is a different deadline.

Continue reading

Linux Mint-powered MintBox 2 has security vulnerability -- needs Microsoft Windows to fix it

There is a belief that Linux-based computers are inherently secure, and yeah, there is some truth to that. With that said, no operating system, kernel, or hardware is infallible. All computers have vulnerabilities and can ultimately be hacked.

A good example of this is the Linux Mint-powered MintBox 2. While the diminutive PC is not built by the Linux Mint team (it is merely a rebranded Intense PC), it is supported by them. Today, it is revealed that the computer is suffering from a dangerous vulnerability that can impact the machine's BIOS. Luckily, a patch is available.

Continue reading

Unsecured online database exposes details of millions of cars and their owners

Researchers from the Kromtech Security Research Center have discovered an unprotected database online that includes information on about 10 million cars sold in the US.

As well as data such as VIN and details of payment plans, the database also includes detailed information about owners, such as name, address, phone numbers and occupation. It has been left exposed online for over four months, but it's not clear who the owner is -- or how to address the security risk it poses.

Continue reading

Majority of vulnerabilities appear online before official databases

hacker

New research from threat intelligence company Recorded Future reveals that of 12,500 disclosed Common Vulnerabilities and Exposures (CVEs), more than 75 percent were publicly reported online before they were published to the NIST's centralized National Vulnerability Database (NVD).

Sources reporting include easily accessible sites such as news media, blogs, and social media pages as well as more remote areas of the internet including the dark web and criminal forums.

Continue reading

iOS 11 will not support iPhone 5, iPhone 5c and 4th-gen iPad

goodbye

It looks like iOS 11 will be a great upgrade for iPhone and iPad users, but not everyone will be able to join the party. As usual, Apple has dropped support for older -- yet still popular -- devices, and this time around two iPhones and an iPad are getting the axe.

As you might expect, the devices in question are the oldest iPhones and iPads that can run iOS 10, namely the iPhone 5, iPhone 5c and 4th-generation iPad. All the 32-bit devices, and the last to debut with a 32-bit processor, which means that iOS 11 will be a 64-bit-only affair.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.