Majority of enterprises use more than 10 mobile business apps
Almost 80 percent of companies are using more than 10 mobile apps for business, according to a new report.
The third edition of the Mobile Security and Risk Review by MobileIron also finds that 18 percent of companies use Apple's Volume Purchase Program (VPP) to streamline their app deployment.
Twitter tweaks Lists because of potential for abuse -- and then reverses the changes
Twitter has tried various methods of cracking down on trolling and abuse, and it is now rolling out its latest batch of safety measures. The most recent change only lasted a few hours before it was killed off due to protests.
In a seemingly well-intentioned move, Twitter decided to no longer notify users when they were added to lists. The idea was that lists could be used as a form of abuse: you might not be able to message someone, but you could add them to a list called "you're a douchebag", and they would be notified. But the change did not last very long at all.
Why you need extra layers of security for your PC and how to get them for up to 55 percent off
These days, the threats posed to your PC have never been greater. It’s no longer enough to rely on simple basic anti-malware protection and the built-in Windows firewall. If you want to really close the door to hackers, Trojans and other threats, you need to add multiple layers of security to your computer.
That’s the bad news. Here’s the good news: thanks to the Downloadcrew Software Store, there’s never been a better time to beef up your protection, with great deals for the latest software, from Malwarebytes 3 to Emsisoft Anti-Malware 2017.
Quickly find Unicode symbols with SymbSearch
Need to enter a Unicode symbol on your PC? Then launch the Character Map, find what you need to the clipboard and copy it to the clipboard. Sounds easy, right? Until you try it.
The reality is the Character Map gives you hundreds of characters to examine, organised in a way which doesn’t always match their purpose, and displayed in such a small font that you’ll barely be able to see some of them at all.
GEAR4 launches rugged 'Buckingham' flip case for Apple iPad
While tablets may not be as popular nowadays compared to a few years ago, they are still totally relevant devices. Even as large-screen smartphones gain in popularity, some consumers still enjoy owning a tablet too. For instance, I own an iPhone 6s Plus, but I absolutely adore my iPad mini 4; my Apple tablet gets used every day.
If you are the proud owner of an Apple iPad, and you want to protect it, there are countless cases available. Today, GEAR4 announces yet another, and it hopes it will grab some attention in the crowded market. The rugged "Buckingham" flip case is available for iPad mini 4, Air 2, Pro 9.7, and Pro 12.9.
Razer Blade 14-inch Windows 10 gaming laptop gets Kaby Lake, GTX 1060, and 4K
While Windows 10 has its fair share of vocal detractors, the operating system is actually very good. In fact, some people say it is the best version of Microsoft's desktop operating system ever -- particularly for gaming. Consumers that want a Windows 10 computer are very lucky nowadays, as there are many quality machines from which to choose.
One such quality laptop is the Razer Blade. The 14-inch Windows 10 laptop is quite popular with gamers, as it is both svelte and powerful. Today, Razer announces that it is refreshing the notebook with new Intel Kaby Lake processors and an optional 4K display.
Google officially brings Instant Tethering to Pixel and Nexus
It's only a matter of weeks since we were talking about the impending arrival of Instant Tethering. This delight of technology makes it possible to quickly and painlessly share a data connection between devices, and now it's officially available to Pixel and Nexus devices.
To use Google's explanation, Instant Tethering means "you can automatically share a cellular data connection between certain Pixel and Nexus devices via Wi-Fi when they're signed in to the same Google Account." Now the rollout is official, and many people are able to make use of this very handy feature.
IBM brings the power of Watson to cyber security
The technology industry is having to contend with ever more sophisticated cyber security threats. With a growing shortage of security analysts and masses of data to process this throws more emphasis on the use of AI techniques.
This week at RSA Conference, IBM Security will be demonstrating what the "cognitive security operations center" of the future will look like, including new Watson-powered tools for investigating security events, new services for building these SOCs and breakthrough research that allows customers and analysts to interact with Watson through voice and chat.
Upcoming iPhone might get Qi wireless charging, as Apple joins WPC
One of the things that the iPhone is missing compared to some of its main Android rivals is wireless charging support. While this may not sound like a major omission, many consumers nowadays -- especially buyers in this segment -- expect a modern smartphone to have this technology. And it looks like Apple might finally offer it.
In what can only be considered as a big first step towards an iPhone with wireless charging support, Apple has joined the Wireless Power Consortium (WPC), the group responsible for promoting the Qi standard that is prevalent in devices that offer wireless charging -- like the Samsung Galaxy S7.
Breach analytics platform speeds up incident response
It's increasingly said by experts that data breaches are now a matter of when rather than if. Being able to respond quickly is therefore vital for companies to minimize damage and disruption.
Cybersecurity solutions and breach analytics cloud platform Eastwind Networks is launching an enhanced Breach Analytics Cloud platform to provide complete visibility across the entire attack surface.
Google Maps for iOS and Android gains Lists to save and share your favorite places
The days of dedicated satnavs are surely numbered, with the likes of Waze and Google Maps bringing turn-by-turn directions to smartphone owners for free. The feature set for these apps just keeps on growing, and Google Maps now includes a new Lists feature which lets you use the app to create and share lists of places.
There are lots of possible uses for Lists -- Google suggests using it to create your bucket list of places to visit, but it's better used to draw up a list of places to visit on vacation, say, and then share it with friends who are planning a similar trip. While lists can only be created in the iOS and Android app, they can also be viewed on the desktop.
New authentication platform seeks to tackle fake news and profiles
Fake news is big news at the moment, making it increasingly difficult to assess the reliability of material, particularly when it appears online.
A new company launching today at the 2017 RSA conference is seeking to create a secure online community to identify individuals and provide a more "authentic" online experience.
Enterprises need to be aware of threats from internal email
Insider attacks are of increasing concern to businesses. New research shows that internal email can be a major source of threats that often gets overlooked.
The study from email security company Mimecast and Forrester Research reveals that more than a third of companies have experienced some information loss, theft, or attack via email within the past two years.
TCP Monitor Plus is a portable network toolkit
How email filters can improve malware protection
Spam has been around since the earliest days of email. While many spam messages are poorly written and reek of malicious intent, others are less conspicuous. Cyber-criminals can slyly embed malware and ransomware into emails that can do serious damage if opened.
Fortunately, today’s email filtering systems do an excellent job at finding and isolating these messages. Here we’ll examine the details of email filtering and why they should never be taken for granted.
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.