Latest Technology News

Windows 10 to be installed on 4 million US Department of Defense computers

Windows 10

Microsoft keeps shouting about the millions of users that have switched to Windows 10, and soon the company will have another 4 million to bray about. The US Department of Defense is the latest big name to give Windows 10 the seal of approval apparently unconcerned with the privacy and telemetry issues that have put off others.

4 million enterprise upgrades for Windows 10 is a real feather in the cap for Microsoft, and the aim is to get each system running the latest version of the operating system inside a year. The DoD has also announced that it is granting certification to Surface 3, Surface Pro 3, Surface Pro 4, and Surface Book devices, meaning that they now appear on its Approved Products List.

Continue reading

Threat Stack launches integrated cloud security suite

Private secure cloud

Keeping systems secure has become more complicated as companies adopt cloud and hybrid environments for their systems.

To eliminate the need for multiple different security products and give users a single-pane view into workloads, infrastructure monitoring, vulnerability management, threat intelligence and compliance reporting, Threat Stack is launching a new Cloud Security Platform.

Continue reading

Windows 10 Mobile to roll out starting soon (hopefully)

Believe it or not, Windows 10 Mobile is already three months old. Microsoft introduced its new smartphone operating system to the public in late-November, last year, when it released Lumia 950 and Lumia 950 XL. However, an update to Windows 10 Mobile for older devices has yet to make an appearance, forcing users to join the Windows Insider program to sample the goods.

We first heard that Windows 10 Mobile would roll out for popular Windows Phone devices in December, but just before the end of the year Microsoft announced that users would have to wait a bit longer. Now, we have a new official estimate -- is third time the charm?

Continue reading

Experiment tracks what happens to stolen credentials

cyber criminal

We all know that hackers are looking to steal credentials and get their hands on sensitive data, but exactly how does this process work?

Researchers at data protection company Bitglass carried out its second 'Where’s Your Data' experiment, creating a digital identity for an employee of a fictitious retail bank, a functional web portal for the bank, and a Google Drive account, complete with real credit-card data.

Continue reading

Seagate announces 'world’s slimmest and fastest' 2TB mobile HDD

Almond Joy and Mounds are two fairly popular candy bars -- I see them often in most convenience stores. Both feature coconut and chocolate, but only the former features nuts. There was quite the popular marketing campaign years ago, with the jingle of "sometimes you feel like a nut, sometimes you don't". The same can be said of technology. Sometimes you feel like a solid state drive, sometimes you don't. But why would you ever prefer a mechanical hard drive?

Capacity. True, SSDs are faster, but HDDs typically offer higher capacities at lower prices. If cost and capacity are your focus -- speed be damned -- a hard disk drive could be what you need. Today, Seagate releases what it claims is the "world's slimmest and fastest" 2TB mobile hard drive. Oh my.

Continue reading

Critical security gaps found in secure web gateways

Attack detection and analytics specialist Seculert has released a new report identifying critical security gaps in popular web gateway solutions.

During the first 10 months of 2015, Seculert observed the web gateway performance of Barracuda, BlueCoat, Fortigate, Ironport, McAfee Web Gateway, Palo Alto Networks, Websense and Zscaler to determine whether existing gateway solutions were allowing infected internal devices to communicate traffic outside the organization.

Continue reading

Get your life organized with Makagiga

Makagiga started life long ago as an open-source, Java-based RSS reader. But then the developer started to take it further. Much, much further.

The program now also has a capable to-do manager. A note taker. A simple image editor. And, via optional plugs, web searching, an OpenStreetMap viewer, a thesaurus, LaTex/ Markdown/ BB Code previews, screen capture, barcode generation and more.

Continue reading

Why Apple is right to reject the order to unlock a killer's phone

Apple has been ordered by the US courts to help the FBI gain access to data on an iPhone belonging to San Bernardino gunman Syed Rizwan Farook. Farook and his wife killed 14 people in the California city late last year before being shot dead by police.

The FBI says the phone contains information crucial to the investigation, and needs Apple’s help to unlock it. Data on Apple devices is encrypted by default -- and has been since September 2014 -- which means no one, other than the device owner, can access it. And that includes Apple itself.

Continue reading

Toshiba 15nm TLC SG5 SSD has up to 1TB capacity and either 2.5 inch or M.2 form factor

If your desktop or laptop doesn't have an SSD, you are missing out on something wonderful. If you think your mechanical hard disk drive is "good enough", please know that a solid state upgrade can reduce noise, increase battery life, and most importantly, dramatically improve performance. Even if you are adverse to spending money, there are plenty of affordable drives nowadays.

Today, Toshiba announces a new series of SSD with the 'SG5' designation. These solid state drives have capacities up to 1TB and feature 15nm fabricated TLC nand chips. To meet the needs of most consumers, the drives will come in either 2.5 inch or M.2 form factors. Unfortunately, the drives -- including the M.2 variant -- utilize the SATA interface, so speeds will not be mind-blowing like a PCIe SSD.

Continue reading

Fourth party networks put enterprises at risk

Broken chain

We're all aware that sometimes data can be put at risk by third party systems belonging to suppliers. But a new report by security rating company BitSight looks further down the chain at vulnerabilities posed by fourth parties -- the subcontractors of third party vendors.

Changes in the way organizations source their IT have increased their dependency on cloud service providers, web hosting platforms, and other external services. Cyber criminals are recognizing that these outside vendors and subcontractors can often be their best point of entry into many companies.

Continue reading

Why peer to peer lending is a disruptive industry [Q&A]

Cloud money

In the last ten years, peer-to-peer lending has grown to be a serious disruptive influence in the financial services landscape.

Jaidev Janardana, CEO of Zopa, the world’s first and UK’s leading peer-to-peer lending platform, discusses why the industry has proved so disruptive and what the future holds.

Continue reading

Microsoft releases KB3140742, a hidden update that takes Windows 10 to build 10586.112

Microsoft has been busy pushing new versions, or builds, of Windows 10. The company is still in an effort to get things right. Some patch holes, while others bring noticeable improvements to all of the "rings". But what if Microsoft hid an update from users? That's apparently the case from what we are finding out.

A new Knowledge Base update, specifically KB3140742, can take your Windows 10 installation to the next level, or it could potentially cause you endless problems. There's likely a reason it isn't released yet, so be cautious with this one.

Continue reading

Google 'Monotune' is goddamn good metaphor marketing

Great advertising strikes a chord, in this instance quite literally, with consumers. The best compares the primary product to another, effectively evoking emotional connection. Apple's "1984" commercial and "Get a Mac" series are excellent examples. In the former, the IBM PC is portrayed as Big Brother, while in the latter actors represent Mac and PC—the benefits of one and detriments of the other. Both examples use metaphors to simplify complex comparisons and to make lasting impressions rather than to checklist features.

Google spot "Monotune" is a magnificent metaphor—piano of 88 different keys representing Android set against another, portraying iPhone, where all the notes are the same. Music is memorable, and the comparison striking as much for the under current. Apple's brand often is associated with music and also creative individuals.

Continue reading

Eternal 5D nanostructured glass optical discs hold 360TB of data and last billions of years

Storing data is extremely important for many situations. Businesses often need to retain information for legal purposes, while home users cherish things like family photos and heirloom recipes. For many people, utilizing flash drives, optical media, or the cloud is sufficient. I prefer redundancy -- cloud and local data.

What if you need to store a lot of data? I'm talking, like, a lot of friggin' data. Well, your needs may be met by a new invention from the University of Southampton. Not only can its newly announced Eternal 5D nanostructured glass discs hold 360TB of data, but they can last billions of years too. Hell, these discs could possibly outlive the Earth and its sun!

Continue reading

Mozilla wants to educate us all on encryption

Data encryption

Terrorists use encryption. They also breathe air, drive cars, and drink water. What do I mean by saying this? Well, just because a bad person uses something, doesn't make the thing they use evil. In fact, encryption is not evil at all -- it is a tool to protect the privacy and communications of all people.

Sadly, not everybody understands encryption. There is nothing wrong with being ignorant on a subject -- not everyone can be knowledgeable about everything. With that said, some politicians and other decision-makers could enact policy about encryption due to knee-jerk reactions to things they don't understand. Luckily, Mozilla has a new initiative aimed at educating people as to what encryption actually is.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.