'Refugee' Julian Assange arrives on Twitter


Wikileaks founder Julian Assange has activated his Twitter account. His profile gives his location as the Ecuadorian embassy in London, and describes him as "refugee" who is "picking the lock to the chain that enslaves mankind -- ignorance."
Within minutes of activating the account, Assange managed to amass thousands of followers, and this is a number that is sure to skyrocket in the coming days now that the account is actually being used. So what did the reclusive man have to say with his first tweet?
[Updated] PayPal very sneakily increases its charges and adds weird non-discouragement clause for sellers


Nobody likes to share bad news, and PayPal is no different. Price increases certainly fall into the category of bad news, and PayPal has decided to publish the details as "Policy Updates". But it's not just the price hike that's included in this misleadingly-titled document -- there's also something rather weird.
If you are a seller -- such as on eBay or other shopping sites -- you will soon be subject to a "non-discouragement clause". What does this mean? In short it means that sellers are not permitted to encourage shoppers to use another payment method instead of PayPal. Let's drill into the detail.
New platform helps enterprises comply with privacy regulations

Logtrust launches real-time integrated threat analytics


Big data analytics specialist Logtrust is using RSA to launch a new solution for delivering real-time, integrated threat analytics.
The program enables companies to build solutions that analyze the historical behavior of systems and attackers in order to detect, understand and eliminate potential threats in real-time -- even those that are coming from multiple sources, across multiple devices.
Lavasoft rebrands to adaware, launches antivirus 12

Four major advantages to using open source software in the enterprise


With WordPress, Firefox and Linux now the virtual infrastructure for many millions of Internet users globally, and the likes of Apache and database management system MySQL widely embraced by corporations, open source (OS) software has long since passed a tipping-point moment. Yet despite growing familiarity with what OS means -- and usage even by the EU and the US government -- doubts among many businesses about the quality and reliability of OS software persist.
Such concerns tend to cluster around three perceptions. The first is that because many OS products were built by the wider developer community -- projects and foundations without the resources of a software giant with a history of producing proprietary programs -- they cannot then be truly enterprise grade; indeed, they must be of inferior quality and reliability.
Microsoft aims to calm cloud security fears with revamped Trust Center site


The modern Microsoft places more importance on the cloud than ever before, and this means addressing the security concerns that users might have. As part of this, the company has upgraded and redesigned its Trust Center, home to a wealth of security information.
Designed to provide "support and resources for information professionals, as well as the legal and compliance community," the Trust Center is also of interest to anyone concerned about security in general and those who want to know how Microsoft is complying with laws around the world.
Majority of enterprises use more than 10 mobile business apps


Almost 80 percent of companies are using more than 10 mobile apps for business, according to a new report.
The third edition of the Mobile Security and Risk Review by MobileIron also finds that 18 percent of companies use Apple's Volume Purchase Program (VPP) to streamline their app deployment.
Twitter tweaks Lists because of potential for abuse -- and then reverses the changes


Twitter has tried various methods of cracking down on trolling and abuse, and it is now rolling out its latest batch of safety measures. The most recent change only lasted a few hours before it was killed off due to protests.
In a seemingly well-intentioned move, Twitter decided to no longer notify users when they were added to lists. The idea was that lists could be used as a form of abuse: you might not be able to message someone, but you could add them to a list called "you're a douchebag", and they would be notified. But the change did not last very long at all.
Why you need extra layers of security for your PC and how to get them for up to 55 percent off


These days, the threats posed to your PC have never been greater. It’s no longer enough to rely on simple basic anti-malware protection and the built-in Windows firewall. If you want to really close the door to hackers, Trojans and other threats, you need to add multiple layers of security to your computer.
That’s the bad news. Here’s the good news: thanks to the Downloadcrew Software Store, there’s never been a better time to beef up your protection, with great deals for the latest software, from Malwarebytes 3 to Emsisoft Anti-Malware 2017.
Quickly find Unicode symbols with SymbSearch


Need to enter a Unicode symbol on your PC? Then launch the Character Map, find what you need to the clipboard and copy it to the clipboard. Sounds easy, right? Until you try it.
The reality is the Character Map gives you hundreds of characters to examine, organised in a way which doesn’t always match their purpose, and displayed in such a small font that you’ll barely be able to see some of them at all.
GEAR4 launches rugged 'Buckingham' flip case for Apple iPad


While tablets may not be as popular nowadays compared to a few years ago, they are still totally relevant devices. Even as large-screen smartphones gain in popularity, some consumers still enjoy owning a tablet too. For instance, I own an iPhone 6s Plus, but I absolutely adore my iPad mini 4; my Apple tablet gets used every day.
If you are the proud owner of an Apple iPad, and you want to protect it, there are countless cases available. Today, GEAR4 announces yet another, and it hopes it will grab some attention in the crowded market. The rugged "Buckingham" flip case is available for iPad mini 4, Air 2, Pro 9.7, and Pro 12.9.
Razer Blade 14-inch Windows 10 gaming laptop gets Kaby Lake, GTX 1060, and 4K


While Windows 10 has its fair share of vocal detractors, the operating system is actually very good. In fact, some people say it is the best version of Microsoft's desktop operating system ever -- particularly for gaming. Consumers that want a Windows 10 computer are very lucky nowadays, as there are many quality machines from which to choose.
One such quality laptop is the Razer Blade. The 14-inch Windows 10 laptop is quite popular with gamers, as it is both svelte and powerful. Today, Razer announces that it is refreshing the notebook with new Intel Kaby Lake processors and an optional 4K display.
Google officially brings Instant Tethering to Pixel and Nexus


It's only a matter of weeks since we were talking about the impending arrival of Instant Tethering. This delight of technology makes it possible to quickly and painlessly share a data connection between devices, and now it's officially available to Pixel and Nexus devices.
To use Google's explanation, Instant Tethering means "you can automatically share a cellular data connection between certain Pixel and Nexus devices via Wi-Fi when they're signed in to the same Google Account." Now the rollout is official, and many people are able to make use of this very handy feature.
IBM brings the power of Watson to cyber security


The technology industry is having to contend with ever more sophisticated cyber security threats. With a growing shortage of security analysts and masses of data to process this throws more emphasis on the use of AI techniques.
This week at RSA Conference, IBM Security will be demonstrating what the "cognitive security operations center" of the future will look like, including new Watson-powered tools for investigating security events, new services for building these SOCs and breakthrough research that allows customers and analysts to interact with Watson through voice and chat.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.