Latest Technology News

Microsoft releases more details on its Edge Translator extension

Last week Microsoft finally revealed extensions for its Edge web browser for Windows 10. It began with just a handful of add-ons, but more are on the way. We previously told you how to install them, including the translator, but now Microsoft is adding a bit more information.

The new Edge extensions are currently considered previews and are only available to Windows 10 Insiders, and you'll need Build 14291 to use them.

Continue reading

The rise of the advanced persistent bots

Overall bad bot activity is decreasing, but the number of advanced persistent bots is up according to a new report.

The 2016 Bad Bot Landscape Report from Distil Networks reveals that 88 percent of all bad bot traffic has one or more characteristics of an advanced persistent bot, one that's able to mimic human activity and evade detection.

Continue reading

Zero day OS X flaw can bypass System Integrity Protection

Bitten apple

Security company SentinelOne has released news of a major flaw in Apple OS X systems that can allow the bypassing of the latest System Integrity Protection security feature.

This zero day vulnerability is present in all versions of Apple's OS X operating system. It has been reported to Apple and patches will be available soon. SentinelOne’s lead OS X security expert, Pedro Vilaça, is presenting the full findings on this vulnerability today at SysCan360 2016 in Singapore.

Continue reading

You might want to hold off on upgrading to iOS 9.3, OS X 10.11.4 El Capitan [Update]

Apple earlier this week released new versions of its mobile and Mac operating systems, namely iOS 9.3 and OS X 10.11.4 El Capitan. They come with a significant number of changes, like Night Shift mode, extended Wi-Fi calling support and lots of security fixes, but also introduce bugs which are causing major issues for some early adopters.

It is not unheard of a new iOS or OS X release to break things, as Apple seems to be dealing with these kind of things quite frequently nowadays. Not everyone may be affected, but if you have an iPad 2 or use Apple's messaging services often on your Mac you might want to hold off on performing the upgrade.

Continue reading

Uber announces bug bounty program

Google relaxes Project Zero bug disclosure policy after Microsoft complaints

Uber is calling on independent computer researchers and experts to find weaknesses in its system as the transportation firm is set to release its technical map.

As Uber jumps into the bug bounty bandwagon -- a philosophy that has long been advocated by the open-source software movement -- it details its software infrastructure to the public, identifies what sorts of data might be exposed inadvertently and suggests what types of flaws are the most likely to be found.

Continue reading

Logitech G900 Chaos Spectrum wireless gaming mouse outperforms wired mice

Wireless mice are a tricky situation. On the one hand, they eliminate unsightly wires, creating a more aesthetic desktop look. The downside, of course, is the need of batteries. Whether it is rechargeable or not, it can be a total bummer when the juice runs out. Hardcore gamers in particular just don't have time for such things -- depleted batteries can cause lost matches and other frustrations. Not to mention, wired mice can have less lag, offering better performance.

Today, Logitech announces a gaming-focused mouse. Called the G900 Chaos Spectrum, it features a selectable DPI between 200 and 12,000. While wireless gaming mice are nothing new, the company claims this model has advanced wireless technologies, offering better performance than wired mice. That is quite the bold statement -- is it realistic?

Continue reading

Reclaim lost disk space on a USB key with imageUSB

There are many tools to help you customize a USB flash drive. You could make it bootable, run one or more LiveCDs, lock it to prevent unauthorized access, create encrypted storage areas, and more.

This will often work just as you expect, but sometimes, when you try to use the flash drive to store files again, you might find that some of its capacity has disappeared.

Continue reading

User error is the leading cause of data loss in SaaS applications

Accidental deletion of information is the leading cause of data loss from SaaS applications, responsible for 43 percent in the US and 41 percent in the UK, ahead of data loss caused by malicious insiders and hackers.

This is among the findings of a new survey of IT professionals in the US and UK from cloud backup specialist Spanning which also has insights into who is responsible for SaaS data protection, organizational confidence in SaaS data protection, and the top concerns surrounding moving data to the cloud.

Continue reading

Police: if you fall victim to online fraud, it's your own fault

credit card phishing

Victims of online fraud are to blame for their misfortune and should not be rewarded with a refund for money they lose. This is the view of UK Metropolitan police commissioner Sir Bernard Hogan-Howe who says that banks should not pay money lost to online fraud as the victims have not taken their security seriously.

Rather than offering refunds to customers, banks should instead be encouraging them to use stronger password, keep antivirus software up to date, and generally be more careful. It's a view that’s certainly going to prove controversial and raises the question of whether the carrot or the stick is the best approach to tackling online fraud.

Continue reading

90 percent of US federal agencies are vulnerable to data threats

unknown threat

According to new research 90 percent of IT security leaders in US federal agencies say they feel vulnerable to data threats.

In addition 61 percent have experienced a past data breach, with nearly one in five indicating a breach in the last year. This is among the findings of the US Federal Government Edition of the 2016 Vormetric Data Threat Report from enterprise data protection company Vormetric and 451 Research.

Continue reading

GNOME 3.20 'Delhi' Linux desktop environment is here, and it looks amazing

One of the great things about Linux-based operating systems is the ability to change the user interface by way of desktop environment. If you like Ubuntu, for instance, but don't like Unity, you can choose an alternative such as KDE, Xfce, or GNOME, to name a few.

While GNOME 3x was initially quite controversial for its abrupt design change from 2x, it has evolved into something quite remarkable -- my favorite such DE. Actually, GNOME 3 is much more than a pretty UI -- it is a design philosophy and suite of useful programs. Today, it reaches a major milestone with 3.20. It features many enhancements, such as improved Wayland support.

Continue reading

IT pros: Security budgets are not growing fast enough

Cloud money

As an answer to the ever increasing threats of cyber-attacks, the security budgets across various industries are growing, a new survey by The Institute of Information Security Professionals (IISP) suggests.

However, the rise in budgets is not enough to tackle the problem.

Continue reading

Star Wars: The Force Awakens Blu-ray leaks online early -- available for torrent download

The Star Wars franchise is a runaway train-like phenomenon, lasting decades and being enjoyed by several generations. When the newest such film, The Force Awakens, was announced there was a fury of media coverage and marketing cross-promotions. Quite frankly, I found myself sick of the Star Wars franchise after a while, although I did eventually see the film -- it was pretty good.

Yesterday, a rip of the Retail Blu-ray version of Star Wars: The Force Awakens apparently made its way to the seedy underbelly of the Internet. Even though the disc is not available for purchase until April 5th, pirates can start watching immediately. This is rather sad, as honest fans of the franchise must wait to spend their money, while dastardly thieves can watch now for free.

Continue reading

Apple iPad scheme seeks to reclaim the tablet market and win the post-PC wars

Something surely seems missing from this week's Apple Event. A year ago this month, Apple introduced the svelte, 12-inch MacBook. That makes the little laptop ripe for refresh, but it is MIA. Following a media hoopla where the figurative fireworks failed to light, everyone should ask: What is Apple doing? The new 4-inch iPhone is little more than the 5 model introduced in 2012 with fresh internals. The 9.7-inch iPad Pro fits into a crowded category where Apple is mob in the room. Where's the innovation?

After watching the live stream, carefully reviewing what Apple executives said, and looking over device sales trends, I must say this: Either Tim Cook is stupidest tech CEO on the planet, or one of the smartest. The event's big takeaway is this: Apple is trying to corner a faltering computing category on the presumption it's the next big thing. Cook takes great risk in search of greater rewards. If he's right, Apple may come to dominate the next personal computing platform—even as Android armies spread across the planet. Everything hinges on these: Will tablets replace PCs and can Apple become the overwhelming market share leader, regaining dominance held six years ago?

Continue reading

How to access Windows 10's secret Apps View

How do you check to see what apps you have installed on your Windows 10 computer? Your first port of call might be the Start menu. While this might seem logical -- there's an All Apps entry, after all! -- it's not necessarily the best option.

If you've spent any time working in File Explorer, you'll know that there are various views to choose from; different views suit different tasks. What you might not know is that there's a secret Apps View which is great for not only showing you what you have installed, but also makes it easy to perform actions such as Start menu pinning with multiple apps.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.