Latest Technology News

Majority of enterprises use more than 10 mobile business apps

Mobile apps

Almost 80 percent of companies are using more than 10 mobile apps for business, according to a new report.

The third edition of the Mobile Security and Risk Review by MobileIron also finds that 18 percent of companies use Apple's Volume Purchase Program (VPP) to streamline their app deployment.

Continue reading

Twitter tweaks Lists because of potential for abuse -- and then reverses the changes

Twitter has tried various methods of cracking down on trolling and abuse, and it is now rolling out its latest batch of safety measures. The most recent change only lasted a few hours before it was killed off due to protests.

In a seemingly well-intentioned move, Twitter decided to no longer notify users when they were added to lists. The idea was that lists could be used as a form of abuse: you might not be able to message someone, but you could add them to a list called "you're a douchebag", and they would be notified. But the change did not last very long at all.

Continue reading

Why you need extra layers of security for your PC and how to get them for up to 55 percent off

These days, the threats posed to your PC have never been greater. It’s no longer enough to rely on simple basic anti-malware protection and the built-in Windows firewall. If you want to really close the door to hackers, Trojans and other threats, you need to add multiple layers of security to your computer.

That’s the bad news. Here’s the good news: thanks to the Downloadcrew Software Store, there’s never been a better time to beef up your protection, with great deals for the latest software, from Malwarebytes 3 to Emsisoft Anti-Malware 2017.

Continue reading

Quickly find Unicode symbols with SymbSearch

Need to enter a Unicode symbol on your PC? Then launch the Character Map, find what you need to the clipboard and copy it to the clipboard. Sounds easy, right? Until you try it.

The reality is the Character Map gives you hundreds of characters to examine, organised in a way which doesn’t always match their purpose, and displayed in such a small font that you’ll barely be able to see some of them at all.

Continue reading

GEAR4 launches rugged 'Buckingham' flip case for Apple iPad

While tablets may not be as popular nowadays compared to a few years ago, they are still totally relevant devices. Even as large-screen smartphones gain in popularity, some consumers still enjoy owning a tablet too. For instance, I own an iPhone 6s Plus, but I absolutely adore my iPad mini 4; my Apple tablet gets used every day.

If you are the proud owner of an Apple iPad, and you want to protect it, there are countless cases available. Today, GEAR4 announces yet another, and it hopes it will grab some attention in the crowded market. The rugged "Buckingham" flip case is available for iPad mini 4, Air 2, Pro 9.7, and Pro 12.9.

Continue reading

Razer Blade 14-inch Windows 10 gaming laptop gets Kaby Lake, GTX 1060, and 4K

While Windows 10 has its fair share of vocal detractors, the operating system is actually very good. In fact, some people say it is the best version of Microsoft's desktop operating system ever -- particularly for gaming. Consumers that want a Windows 10 computer are very lucky nowadays, as there are many quality machines from which to choose.

One such quality laptop is the Razer Blade. The 14-inch Windows 10 laptop is quite popular with gamers, as it is both svelte and powerful. Today, Razer announces that it is refreshing the notebook with new Intel Kaby Lake processors and an optional 4K display.

Continue reading

Google officially brings Instant Tethering to Pixel and Nexus

It's only a matter of weeks since we were talking about the impending arrival of Instant Tethering. This delight of technology makes it possible to quickly and painlessly share a data connection between devices, and now it's officially available to Pixel and Nexus devices.

To use Google's explanation, Instant Tethering means "you can automatically share a cellular data connection between certain Pixel and Nexus devices via Wi-Fi when they're signed in to the same Google Account." Now the rollout is official, and many people are able to make use of this very handy feature.

Continue reading

IBM brings the power of Watson to cyber security

The technology industry is having to contend with ever more sophisticated cyber security threats. With a growing shortage of security analysts and masses of data to process this throws more emphasis on the use of AI techniques.

This week at RSA Conference, IBM Security will be demonstrating what the "cognitive security operations center" of the future will look like, including new Watson-powered tools for investigating security events, new services for building these SOCs and breakthrough research that allows customers and analysts to interact with Watson through voice and chat.

Continue reading

Upcoming iPhone might get Qi wireless charging, as Apple joins WPC

One of the things that the iPhone is missing compared to some of its main Android rivals is wireless charging support. While this may not sound like a major omission, many consumers nowadays -- especially buyers in this segment -- expect a modern smartphone to have this technology. And it looks like Apple might finally offer it.

In what can only be considered as a big first step towards an iPhone with wireless charging support, Apple has joined the Wireless Power Consortium (WPC), the group responsible for promoting the Qi standard that is prevalent in devices that offer wireless charging -- like the Samsung Galaxy S7.

Continue reading

Breach analytics platform speeds up incident response

Breach detection

It's increasingly said by experts that data breaches are now a matter of when rather than if. Being able to respond quickly is therefore vital for companies to minimize damage and disruption.

Cybersecurity solutions and breach analytics cloud platform Eastwind Networks is launching an enhanced Breach Analytics Cloud platform to provide complete visibility across the entire attack surface.

Continue reading

Google Maps for iOS and Android gains Lists to save and share your favorite places

The days of dedicated satnavs are surely numbered, with the likes of Waze and Google Maps bringing turn-by-turn directions to smartphone owners for free. The feature set for these apps just keeps on growing, and Google Maps now includes a new Lists feature which lets you use the app to create and share lists of places.

There are lots of possible uses for Lists -- Google suggests using it to create your bucket list of places to visit, but it's better used to draw up a list of places to visit on vacation, say, and then share it with friends who are planning a similar trip. While lists can only be created in the iOS and Android app, they can also be viewed on the desktop.

Continue reading

New authentication platform seeks to tackle fake news and profiles

Fake/genuine

Fake news is big news at the moment, making it increasingly difficult to assess the reliability of material, particularly when it appears online.

A new company launching today at the 2017 RSA conference is seeking to create a secure online community to identify individuals and provide a more "authentic" online experience.

Continue reading

Enterprises need to be aware of threats from internal email

Email fraud

Insider attacks are of increasing concern to businesses. New research shows that internal email can be a major source of threats that often gets overlooked.

The study from email security company Mimecast and Forrester Research reveals that more than a third of companies have experienced some information loss, theft, or attack via email within the past two years.

Continue reading

TCP Monitor Plus is a portable network toolkit

Portable network toolkit TCP Monitor Plus has had its first update since 2015, adding a snapshot feature and some handy display tweaks.

The program opens with a scrolling graph of network traffic, and assorted low-level stats on bandwidth, speeds, and packets sent and received.

Continue reading

How email filters can improve malware protection

email icon

Spam has been around since the earliest days of email. While many spam messages are poorly written and reek of malicious intent, others are less conspicuous. Cyber-criminals can slyly embed malware and ransomware into emails that can do serious damage if opened.

Fortunately, today’s email filtering systems do an excellent job at finding and isolating these messages. Here we’ll examine the details of email filtering and why they should never be taken for granted.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.