Latest Technology News

Citizen AID app helps saves lives during a terror attack

Citizen AID is a free UK-developed iOS, Android and Windows app which gives advice on the best immediate response to a bomb blast or armed attack.

It’s essentially an ebook with simple step-by-step guidance on how to deal with different situations. Some of this seems very obvious. If there’s an ongoing attack, for instance, you’re advised to run, hide if that’s not possible, tell the emergency services and only treat the injured once you know you’re safe.

Continue reading

Best Windows 10 apps this week

Two-hundred-and-twenty-four in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Windows Store in the past seven days.

Microsoft seems to have found the Windows 10 Creators Update RTM build. It is build 15063 according to the leaked Update Assistant.

Continue reading

OnePlus 3T and OnePlus 3 get Google Assistant

Google Assistant made its debut on the Pixel and Pixel XL last year, and after a period of exclusivity the search giant started to bring the voice assistant to other Android smartphones. The new LG G6 and the Samsung Galaxy S7 line have it, and, now, so do two other popular flagships.

OnePlus has announced on Twitter that the successor to Google Now is finally available on its OnePlus 3T and OnePlus 3. Both smartphones run Android Nougat, which is required for Google Assistant.

Continue reading

Uncovering the cost and profitability of DDoS attacks

DDoS attack

DDoS attacks are a popular cyber criminal technique, used either to cause a distraction for a different crime or demand a ransom for calling off or not launching an attack.

New research from Kaspersky Lab reveals how profitable this activity can be. Researchers studied the DDoS services on offer on the black market and looked at how far the illegal business has advanced, as well as the extent of its popularity and profitability.

Continue reading

Privacy warning: US ISPs could sell and share your browsing history without consent

In a major blow for privacy advocates and individual rights, the US Senate has voted to permit ISPs to sell or share customers' data -- including their browsing histories -- without consent.

The vote overturns a Federal Communications Commission rule that banned such activity. While there are still legislative hoops to jump through before the result of the vote is ratified, ISPs will be rubbing their hands in glee at what the Senate has done.

Continue reading

Instagram ups security with two-factor authentication

Just about every app and online service offer two-factor authentication (2FA) as a security measure these days, and Instagram is the latest to join the party.

After numerous instances of hacking for other services, it's little surprise that Instagram wants to offer its users an extra level of protection. Once enabled, users are required to enter a six-digit code that is sent to their mobile via SMS, greatly eliminating the risk of unauthorized access.

Continue reading

Machine learning pays well in the UK

machine learning

If you are a developer looking to earn some serious cash, you might want to consider becoming a machine learning specialist. According to a new report by Stack Overflow, entitled "Developer Hiring Landscape Report," machine learning specialists earn 24 percent more than what’s the average among developers on the British Isles.

That's £56,851 a year.

Continue reading

Apple says it has already fixed CIA's Mac and iPhone hacks revealed by WikiLeaks

Apple logo

Yesterday WikiLeaks published the second batch of its Vault 7 documents, Dark Matter, revealing information about Apple-related hacks used by the CIA. This time around, the documents focus on hacks for MacBooks and iPhones, and comes two weeks after the initial batch of documents came to light.

Apple previously said that it had addressed "many of the issues" from the first Vault 7 leaks, and now the company has said much the same regarding the second batch. Despite promises from Julian Assange, it seems that WikiLeaks has not been in contact with Apple to provide further details about the exposed vulnerabilities.

Continue reading

Windows 10 Creators Update RTM is Build 15063 confirms leaked Update Assistant

It is only three days since Windows 10 Creators Update Build 15063 arrived on the Fast ring. The same build has already made its way to Insiders on the Slow ring as well, fueling understandable speculation that this could well be the final build.

This does in fact appear to be the case. We already know that Microsoft is due to release Windows 10 Creators Update in April, and a leaked Update Assistant tool shows that Build 15063 is indeed the RTM build number.

Continue reading

Wikileaks finds a business model

Within minutes of the electrons drying on my last column about the Wikileaks CIA document drop called Vault 7, Julian Assange came out with the novel idea that he and Wikileaks would assist big Internet companies with their technical responses to the obvious threats posed by all these government and third-party security hacks. After all, Wikileaks had so far published only documentation for the hacks, not the source code. There was still time! How noble of Assange and Wikileaks!

OR, Wikileaks has found a new business model. When organized crime offers assistance against a threat they effectively control it’s called a Protection Racket and is against the law pretty much everywhere.

Continue reading

Ubuntu Linux 17.04 'Zesty Zapus' Final Beta now available for download in multiple DE flavors

When someone is interested in trying a Linux-based desktop operating system for the first time, they often choose Ubuntu. This is a smart choice, as it is easy to use, well supported, and quite beautiful. Even if you don't like the Unity desktop environment, there are several other DEs, or flavors, from which to choose -- GNOME, KDE, and Xfce to name a few.

Today, the Final Beta of Ubuntu 17.04 'Zesty Zapus' becomes available for download. While it is never a good idea to run pre-release software on production machines, Canonical is claiming that it should be largely bug free at this point. In other words, if you understand the risks, it should be fairly safe. Home users aside, this is a good opportunity for administrators to conduct testing prior to the official release next month.

Continue reading

WikiLeaks' Dark Matter documents reveal CIA hacks for Macs and iPhones

It's only a couple of weeks since WikiLeaks unleashed the first batch of its Vault 7 CIA documents, revealing the agency's spying and hacking capabilities. Now the organization has released a second cache of files dubbed Dark Matter, and they show that the CIA has developed tools for hacking Apple products.

Bold and exciting names like Sonic Screwdriver, DerStarke, Triton and DarkSeaSkies are the monikers given to attack the firmware of MacBooks and iPhones. What's particularly interesting about the documents is that they appear to show that the CIA had the ability to exploit Apple hardware and software a full decade ago.

Continue reading

How to create your first Alexa skill

AlexaEcho

For the last couple of weeks, Graham, Marcel, Sinem and I, from Red Badger, have been experimenting with Amazon’s Alexa Echo Dot. An Electric Hockey Puck that uses voice recognition powered by Amazon Alexa voice assistant.

In this post, I’d like to explain how one goes about creating their first Alexa skill.

Continue reading

eBay now recommends mobile over token-based two-factor authentication -- should you switch?

Two factor authentication strikes the right balance between convenience and security, which is why so many services offer it nowadays. But its implementation differs. Many companies have SMS or app-based systems, others prefer tokens, and some offer both as an option.

eBay falls in the third category, allowing users to receive the security code for the second authentication stage via SMS or a token. However, the company is now recommending users switch to the former method, touting its convenience as the main reason to abandon the token. But, should you take the advice?

Continue reading

CORSAIR ONE Intel Kaby Lake-powered VR-Ready gaming PC is small, powerful, and pricey

If you are a PC gamer, there is a good chance that you enjoy building your own computers. After all, building them yourself guarantees that you select every single component that goes inside. Not only can you pick the parts from a performance perspective, but aesthetically too -- for some folks, looks matter.

While a self-built gaming rig can be rewarding, it can be an expensive headache too. If something goes wrong, you have to reach out to each component manufacturer for support and warranty purposes. Alternatively, when you buy a pre-built machine, you have a single company to contact. Today, PC component maker CORSAIR announces an all-new gaming computer series -- its first ever. Simply called "ONE," it is designed to be both svelte and powerful. The hardcore mini PC is rather pricey, however, as it starts at $1,800 -- there are several "PRO" variants which will increase the cost dramatically. Unfortunately for AMD fans, this is an Intel/NVIDIA-only affair.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.