Get the 'Practical Linux Security Cookbook' ($22 value) FREE for a limited time


Practical Linux Security Cookbook, from Packt Publishing, will teach you how to secure your Linux machines and keep them secured with the help of exciting recipes.
Whether you are new to Linux administration or an experienced user, this ebook will provide you with all the skills you need to make systems more secure.
Microsoft unveils a massive redesign of Skype, heavily plagiarizing Snapchat


If imitation is the sincerest form of flattery, there's a hell of a lot of flattery going on in the world of chat and messaging apps. Such is the level of feature borrowing and design inspiration that we're entering a phase of unbridled homogeneity. This isn’t enough to put off Microsoft, of course, and today the company lifts the lid on its latest -- and arguably most radical -- redesign of Skype.
Coming first to Android -- as is becoming increasingly common for Microsoft these days -- the Skype redesign boasts a fresh new look that makes it clear from the start that things are going to be different around here. While Skype is well known for its voice and video calling capabilities, now the focus switches rather more toward messaging; as Microsoft puts it: "chatting is front and center."
Turn your phone or tablet into a mobile scanner with Adobe Scan


Adobe has released Adobe Scan 17.05.31 for iPhone, iPad and Android mobiles. The app allows users to turn their mobile camera into a scanner for various types of paper document, including receipts and magazine pages.
Apps that turn your phone or tablet into a portable scanner are two-a-penny, so at first glance Adobe Scan looks like a very late gate crasher to a party that’s already in full flow. But it claims one major advantage over its rivals: OCR support for free.
Plex rolls out Live TV and improved DVR to Plex Pass subscribers


Coming out of beta, Plex's DVR feature is now rolling out to all Plex Pass subscribers. On top of this, the platform is also gaining Plex Live TV -- a way to stream OTA broadcasts from your TV tuner to the Plex app.
To start with, Live TV is coming to the Android TV and iOS apps, but it will also make its way to Plex's other offerings meaning subscribers will be able to watch live TV from just about anywhere. On top of this major announcement, Plex has also unveiled -- in a blog post entitled "#$%@ it! We'll do it live!" -- a number of key improvements to its DVR feature.
Major UK companies at risk of breaking key GDPR principle on collecting PII


New research shows that more than a third of all public web pages of FTSE 30 companies capturing personally identifiable information (PII) are in danger of violating the GDPR regulations by doing so insecurely.
The FTSE 30 is made up of the 30 most influential companies listed on the London Stock Exchange. The study by RiskIQ looking at the sites of these organizations finds that more controls on outward facing web assets are needed.
Microsoft Surface devices are immune to Intel AMT security vulnerability


Intel revealed in early-May that there is a critical security vulnerability in its Active Management Technology, which can be exploited to gain remote access to PCs. The feature is designed to help system administrators manage devices, so, due to its nature, it is more likely to affect enterprise users than consumers.
However, since the Surface line is popular with businesses, Microsoft wants to let its enterprise users know that no Surface devices are affected by the AMT vulnerability, despite it being offered in some of the processors available with its tablets and laptops.
Facebook redesigns security settings page making two-factor authentication easily identifiable


Realizing that its security settings were off-putting to many people due to being a shambolic mess, Facebook has rolled out a redesign which it says helps to improve clarity.
As well as giving greater prominence to the most important security settings, some options have been renamed. This comes after Facebook conducted some research into why users were clicking certain options but not changing them -- it turns out they had no idea what the settings actually did.
Healthcare sector accounts for 43 percent of all UK data breaches


Data security services company Egress has released data from the UK's Information Commissioner's Office (ICO) which shows that the health sector accounts for nearly half (43 percent) of all data breaches.
It also shows that human error, rather than external threats, is the main cause of incidents across every sector. Staff mistakes accounted for 49 percent of all breach incidents in the last quarter of 2016.
OnePlus releases OxygenOS Open Beta 17/8 -- here's what's new


On top of the official software releases, OnePlus 3T and OnePlus 3 users also have access to beta versions of OxygenOS. The builds, which are labeled "Open Beta," typically add new features and improvements to the Android distribution, but may also cause some issues -- something that's to be expected, given their nature.
The latest Open Beta build, which was just released, bears the 17/8 version number and comes with a number of new features, improvements, optimizations and changes to OxygenOS. Here's what you should be looking forward to.
LG G6 users can now unlock the bootloader


LG started giving users of select devices the ability to unlock the bootloader a few years ago, and the tradition continues with its latest flagship Android smartphone, the G6.
This option is not available to every LG G6 user, however, as the official tool provided by the South Korean maker only supports the European model, featuring the H870 model number. The unlocked bootloader makes it easy to load custom ROMs on the device.
Dipiscan is a professional, customizable network scanner


Dipiscan is a professional network scanner, fast, capable, and with a huge number of configuration options. The package is easy enough for anyone to use. Launch it, click Analyze to scan your current network (no need to enter an IP address range, it figures out sensible defaults for itself), and the process is completed within seconds.
A table displays details on every detected network device: reply time, NetBIOS name, DNS name, domain and user, MAC address, adapter manufacturer, and maybe the operating system, device description, available shares and more.
Microsoft Planner now available for Android


Nearly two weeks after introducing the iPhone app, Microsoft officially announces the availability of Planner on Android. The tool was released a year ago to help teams using Office 365 better manage and collaborate on projects.
Microsoft says that Planner is available to Office 365 subscribers on the Business Essentials, Business Premium, Enterprise E1 to E5 and Education plans.
Bad news for Microsoft as Windows 10's growth slows


When Microsoft started the roll out of Windows 10 Creators Update on April 11, it seemed likely the new OS would see a boost in its market share as a result. Indeed, April’s usage figures from NetMarketShare suggested that was the case, with Windows 10’s share growing by a decent amount for the first time in months.
But the Creators Update roll out has been more of a dribble out so far, with only 15.2 percent of US Windows 10 users running it, and the boost that the operating system enjoyed in April hasn’t continued in May.
'Alexa, how do people interact with Alexa?'


A new study analyzing the way users interact with their "smart speakers" shows that the most used feature of devices like the Amazon Echo and Google Home isn't to stream music or even to get the latest weather.
The most commonly used feature of smart speakers is asking "general questions," proving that getting answers to life's daily queries and curiosities from a cloud-based computer voice is becoming an increasingly standard practice in today's society.
Security experts warn about UK's nuclear Trident submarines: 'the vulnerability to cyberattacks is real'


A report published by the British American Security Information Council (BASIC) cautions that the UK's fleet of Trident submarines faces "growing potential for cyber-attack." The authors issue a stark warning that "a successful attack could neutralise operations, lead to loss of life, defeat or perhaps even the catastrophic exchange of nuclear warheads."
Government officials have long dismissed the risk of hacking the nuclear subs because they are not connected to the internet. But the report, entitled Hacking UK Trident: A Growing Threat, suggests that risk of malware infection during manufacturing or software updating are just two possible attack vectors that could lead to the compromise of nuclear weapons.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.