Latest Technology News

Logitech Harmony remotes gain Amazon Alexa voice controls when connected to Echo

AlexaHarmony

We are currently in the golden age of television. Not only are shows like The Walking Dead and Game of Thrones excellent, but there are so many ways to consume it all. Of course, you can watch TV live on cable or satellite, but thanks to DVR and streaming, you can watch on your schedule too. It is all quite glorious.

For those serious about their television watching, an investment in a quality remote control can be very wise. Logitech's Harmony line is arguably the best, and today, it gets even better. Owners of hub-compatible models can now link their Amazon Echo to the Harmony app, enabling voice controls for their AV equipment. Yes, fellow couch potatoes, we can now be even lazier when watching TV!

Continue reading

Canonical explains Ubuntu Advantage benefits -- could your business switch to Linux?

Ubuntu-Advantage_Feat

Linux-based desktop operating systems are better than Windows because they are free, right? Whoa there, folks. Neither are necessarily better or worse -- it really depends on your needs. Cost-free operating systems, such as Ubuntu and Fedora, are definitely great for home consumers looking to breathe new life into old machines. With that said, the benefits of Linux extend beyond money and cost-savings.

Linux being free is sort of misleading when it comes to business use too. While a small business with a few employees can sometimes get by without paying for support, larger companies would be crazy to go it entirely alone -- paid support is a necessity for success. Today, Canonical releases a well-designed infographic that explains the benefits of its paid support, called 'Ubuntu Advantage'.

Continue reading

WinZip 21 adds direct email support, makes individual file sharing easier

WinZIp20-200x175

Fresh off the production line comes WinZip 21, a major new release of perhaps the best-known zip utility in the world. Version 21 introduces a number of new features and improvements, including more cloud connections (Pro only), enhanced MP3 file compression and streamlined sharing.

The update builds on WinZip 20, which introduced a new ribbon-based user interface. Version 21 continues to expand its flexibility with additional file and folder interactions.

Continue reading

Millennial behavior puts federal IT systems at risk

Capitol building

The security habits of the millennial generation could be putting federal IT systems at risk, if agencies don't adjust their cyber defenses in time.

This finding comes from a new study by cyber security company Forcepoint, which examines how members of the millennial generation use technology.

Continue reading

Looking for a case for the new Google Pixel? Incipio has some choices

pixel-xl-cases-600x421

Google recently released two new flagship Android phones -- the Pixel and Pixel XL.

Designed to be serious iPhone rivals, these handsets represent a large investment and one that any buyer would certainly wish to keep safe. To that end, Incipio is releasing a lineup of cases to keep your Pixel or Pixel XL protected.

Continue reading

The seven IoT devices that could be putting your business at risk

Risk dial

We've already seen concerns about the threats Internet of Things gadgets may pose in the home, with hackable Barbie dolls and snooping Smart TVs. Not to mention that the latest Dyn DDoS attack was carried out using unsecured IoT devices.

IoT devices are starting to become commonplace in businesses too so the potential for problems can only grow. Security company ForeScout, along with leading ethical hacker Samy Kamkar, has been investigating the risks these devices pose.

Continue reading

What you need to know about BYOD

BYOD bring your own device

With the rise of smartphone technology, BYOD -- or bring your own device -- certainly cannot be ignored by businesses. Whether they endorse the policy of using personal devices for workplace tasks or not, employees will use the best tools, or those they are most familiar with, to complete tasks, which frequently means using their own smartphone.

Of course, this extends far beyond simply taking work calls. Smartphones in the workplace are now being used to access corporate applications and perhaps more importantly, the data that they contain. Disregarding the mobility benefits of BYOD, this raises a number of security risks that businesses must consider.

Continue reading

IT executives are out of step with their teams

employee snoop

A new report finds that there's a disconnect between IT executives and their staff on critical issues, including control over SaaS applications.

The report from cloud specialist BetterCloud shows that non-executive IT staff, when compared to IT executives, are 29 percent more likely to say their team lacks complete control over their SaaS applications and 56 percent more likely to feel like their IT team lacks complete visibility into them.

Continue reading

Xiaomi's new Mi Max is a huge smartphone with near bezel-less design

Xiaomi Mi Max front back

Xiaomi today unveiled a new high-end smartphone, featuring a massive, "edgeless" display and cutting-edge internals. It is called the Mi Max and although it is labeled as a concept, likely due to its futuristic design, it will be available on the market, with prices starting at around $515 (CNY3,499).

With a Xiaomi smartphone, especially a high-end one, the focus is always on specs, more specifically ticking all the right boxes while keeping the price in check. The Mi Max is a bit different in the sense that Xiaomi has gone a bit further, offering some things that we do not normally see from other manufacturers.

Continue reading

New tool offers SWIFT network protection through deception

Shadows street

Attacks on the inter-bank SWIFT system have been making the headlines this year, proving lucrative for the hackers and worrying for the industry.

Help is on the way though as Cyber security company TrapX is launching a deception-based security solution, DeceptionGrid, specifically designed protect SWIFT.

Continue reading

Thycotic launches free tool to expose endpoint threats

Threat

We're seeing attacks on endpoint systems becoming more common and increasingly clever. Yet for administrators knowing what's happening on their endpoints presents a challenge.

Privileged account management specialist Thycotic is launching a new, free Endpoint Application Discovery Tool to automatically discover and reports on applications installed on Windows endpoints.

Continue reading

Grim London is an interactive guide to the very worst of the city's past

Grim London title

London is a fantastic city, with a long, and fascinating history. While you may be aware of many of the famous people who called the city their home in the distant past, there are thousands more infamous characters whose misdeeds you likely haven’t heard of. People like The Witch of Wapping, The Blackout Killer, and 'Lord Minimus'.

Created in time for Halloween, digital creative agency Impero has put together an interactive horror map of London, chronicling the city’s creepy past. What may appear to be a normal house to a passing tourist, might well have been built on a plague pit, or once been a baby farmer’s residence.

Continue reading

Entire Game of Thrones season 7 plot leaks to Reddit

game-of-thrones-logo

The internet has posed a serious problem for movie and television studios for many years now. Usually it is pirated copies of movies and shows that are cause for concern, but for the likes of the Walking Dead and Game of Thrones, it's the dreaded spoiler that needs to be tamed.

Spoilers tend to be a problem on Facebook and other social media the night after a big show has aired, as those yet to watch the show don’t want to have the plot ruined. In the case of season 7 of Game of Thrones however -- not due to air until the middle of next year -- the problem is that the entire plot has leaked to Reddit.

Continue reading

Rowhammer memory attack can root Android phones in seconds

hammer-anvil

Smartphones from LG, Samsung and Motorola are all vulnerable to an attack that makes it possible to gain root access in a matter of seconds. Known as Rowhammer, the attack works using a bit flipping technique that exploits a vulnerability in the design of RAM chips.

Because the attack takes advantage of a physical aspect of design, it is going to be difficult to quickly devise a fix. In the meantime, millions of smartphones are at risk of compromise in what could be as large an issue as the recently-discovered Dirty COW bug -- and there's an app you can use to check if you are at risk.

Continue reading

Opera 41 slashes start times, improves newsreader feature

Opera33-200-175

Opera Software has released Opera 41 for Windows, Mac and Linux, making reduced start times its major priority. The headline new feature is accompanied by a number of other performance improvements.

Opera 41 also includes a majorly revamped personalized newsreader, containing a wide list of tweaks and enhancements to give users some extra features to play with on top of the under-the-hood updates.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.