Latest Technology News

Windows 10 Cloud already hacked to run Win32 programs

Windows 10 Cloud, Microsoft's new (and likely free) operating system hasn't been officially announced yet, but the first build of it leaked over the weekend, giving people a chance to see what the successor to RT looks like.

In this early version, the answer is mostly just like Windows 10, albeit with one major difference -- Windows 10 Cloud can only run apps from the Windows Store, not Win32 programs. Or at least that used to be the case.

Continue reading

The smart office revolution

The recent headlines and buzz around Amazon Alexa is just one indication that smart home technology may have finally broken through to mainstream. Consumers have grown accustomed to interacting with smart technology to make their lives easier at home and soon will expect that experience to continue when they arrive at the office. While smart technology promises greater efficiency and innovation in the workplace, IT teams face a daunting task of determining which technologies are hype and which will actually make work a better place.

As organizations start to adopt technology that will make work-life better, they need to ensure organizations are set up for success from the beginning. The challenge of supporting and deploying new "smart office" technologies, while upholding corporate security policies is not an easy feat. It might be tempting to act prematurely and incorporate all the latest technologies right away but it’s important to take a holistic approach when evaluating IT projects and prioritize what to implement to ensure organizations are set up for success. While there are a myriad of smart office trends invading the workplace today, here are the top trends we think will most significantly alter the way we communicate and collaborate in the future.

Continue reading

Windows 10 Creators Update Build 15031 for PC arrives on the Fast ring, introduces yet more new features

Microsoft has been busy bug bashing this week, but has still found time to push out a new Insider Preview build to the Fast ring.

Build 15031 is for PC only (a Mobile Build is anticipated later this week), and introduces yet more new features to the forthcoming Creators Update, including Dynamic Lock.

Continue reading

How criminals use Artificial Intelligence and Machine Learning

cyber criminal

It has become common practice for attackers to use Artificial Intelligence (AI) and Machine Learning (ML) to link tools together so that they can be run in parallel when conducting an attack.

Attackers use AI and ML to take the results from one tool and then allow the other tools to "learn" about the finding and use it against other systems. As an example, if a one tool finds a password, that tool can feed the information to another tool or bot that may conduct the exploitation of one or many systems using the discovered password.

Continue reading

IBM i Trends in Modernization for 2017

2016 was a blur of airports and hotels for me as I flew almost 200,000 miles in order to visit with hundreds of IBM i professionals all over the world.

One of the hottest trends for IBM i shops is exposing existing IBM i application functions as web services. Many companies I have spoken with want to leverage the rich capabilities they have already built into their core IBM i applications by making them available through web browsers, to mobile devices or to applications belonging to business partners or customers. Rather than rewriting those functions, they are simply building a service wrapper around them. Those services can then be consumed in a way that makes sense for the mobile or web user experience. They also can be used as connectors that allow disparate applications to talk to each other.

Continue reading

Enterprise change management goals are out of sync with strategy

The results of a new study to be released tomorrow, but seen exclusively by BetaNews, reveal a severe misalignment between the way IT leaders talk about change management and the strategies they have in place to execute these initiatives.

The survey of more than 320 IT leaders by document productivity company Nitro shows that change management strategies vary between organizations, but many fall short.

Continue reading

Planning to visit the US soon? You might be asked to hand over your internet passwords

password

Donald Trump’s controversial travel ban might have been overturned for now, but the new administration intends to do what it can to tighten entry into the United States.

One of the plans being considered as part of Trump’s "extreme vetting" policy is to ask visitors what websites they visit, and request their passwords. Should anyone refuse to hand over this information they will be prevented from entering the US.

Continue reading

Security consultancy offers $1 million guarantee against breach-related costs

One of the biggest worries for businesses is the cost of suffering a major cyber attack in terms of both money and business reputation.

San Francisco-based independent security consultancy AsTech is so confident of its track record that it's offering a $1 million warranty against breach-related costs if an organization using its Paragon Security Program suffers unauthorized access to non-public information through a vulnerability that AsTech fails to discover.

Continue reading

DDoS tactics shift towards a blended approach

DDoS attack start

The world of cyber security is a constant arms race with attackers and defenders constantly on the lookout for an edge.

Cyber security company NexusGuard has released its latest threat report for the final quarter of 2016, and notes a shift towards blended DDoS attacks combining multiple vulnerabilities with the intent of overloading targeted monitoring, detection and logging systems.

Continue reading

The problems facing the app development industry

Developer

The app development business is being plagued by long development times, skills gaps and large backlogs according to a new report.

The study from low-code development platform supplier OutSystems identifies the critical issues that the industry needs to address if it’s to avoid missed opportunities and lost revenue.

Continue reading

Duo Security launches fast, simple alternative to VPN

Access management

Enterprise users increasingly want access to their data while they're out of the office. This generally requires a VPN or Network Access Control (NAC) solution but these can be time consuming and complex to set up and administer.

To make things faster and simpler, trusted access specialist Duo Security is launching a major commercial implementation of Google's BeyondCorp framework that drastically improves and simplifies management of how employees and devices access critical corporate applications.

Continue reading

Vivaldi introduces flexible screenshot tool, universal mute option for tabs

Vivaldi 1.7 has been released for Windows, Mac and Linux. It’s the brainchild of Opera co-founder Jon S von Tetzhner, and makes a good claim to be the most customizable web browser out there.

The new release debuts some significant new features, including a fully functional built-in screenshot tool, more flexible options for muting sounds across multiple tabs and a host of other minor tweaks and enhancements.

Continue reading

Threat hunting gains in popularity to combat cyber threats

insider threat

The use of threat hunting techniques to combat cyber attacks is increasing according to a new report.

The study by Crowd Research Partners of cybersecurity professionals in the 350,000 member Information Security Community on LinkedIn reveals that threats are rising dramatically and that deployment of sophisticated threat hunting platforms can significantly accelerate the time needed to detect, investigate and fix threats.

Continue reading

Microsoft creates a Digital Civility Index -- encourages people to be more respectful online

The problem of trolls and general rudeness is something that many people would like to change about social networks and online interaction in general. Twitter is trying to curb abusive behavior on its service, but Microsoft has a more interesting approach -- it wants people to embrace "digital civility" and to treat each other with respect and dignity online.

With this aim in mind, the software giant has created a Digital Civility Index -- a new measure of people’s safety online and exposure to risks.

Continue reading

Cut, crop and rotate movies with Video Clip QuickTool

Video Clip QuickTool is a simple utility for cutting, rotating and cropping individual digital video files. Installation is quick and hassle-free. There’s no adware, no bulky dependencies and the package takes minimal space on your hard drive.

Video Clip QuickTool’s interface is basic. There are no button-packed ribbon controls, no toolbars or function-packed dialogs -- it’s just a couple of video preview panes, with a scattering of buttons and controls.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.