Red Hat buys API management company 3scale


The open source software company Red Hat has just announced that it will acquire 3scale for its software which manages application programming interfaces (APIs).
The deal is not crucial to Red Hat though it does plan to "open source the code in the Red Hat way", according to a blog post from the vice president and general manager of middleware at the company, Mike Piech. The company also said that its GAAP operating expenses will increase by $7 million during the 2017 fiscal year.
New version of CryptXXX ransomware is harder to decrypt


Researchers at endpoint protection specialist SentinelOne have uncovered a new variant of the CryptXXX ransomware family which is being spread via spam and possibly other means.
The latest version fixes previous flaws in its file encryption methods which prevents use of free decryption tools and makes it impossible to decrypt files without paying the ransom.
Hybrid cloud security: What it is and best practices


A virtualized hybrid cloud infrastructure comes with the assurance of better business outcomes but the rapid transformation that accompanies cloud also leaves the infrastructure vulnerable to cyber attacks. This makes risk management critical for every enterprise. Since no two enterprises work exactly the same way, a standard risk tolerance profile cannot sustain the potential risks posed by technical hurdles.
Despite a cloud service provider’s best possible efforts, security issues are inevitable. With hybrid-cloud deployments you will also need to ensure that sensitive business data remains secure between private and public cloud. This is why hybrid cloud environment strategies need to take into account the possibility of regular movement of data between private and public clouds. Here are security issues to take into account when handling hybrid cloud security:
New platform offers self-service data preparation


Companies are keen to gain the edge that big data can offer, but collecting and analysing information and getting it to a point where it's useful takes time and resources.
Cloud integration and big data specialist Talend is launching the latest version of its Talend Data Fabric, a platform designed to meet the integration needs of both developers and business users whether their applications are on-premises or in the cloud.
Nest wants to give you a free thermostat -- if you live in Chicago


Nest is one of the big names in the world of home automation. It brings a lot to your home, linking up with other products in the domicile, but it isn't perfect at first -- it takes a bit of time to learn your habits and what you want.
The drawback is, of course, cost. The thermostat is not particularly cheap. But for the folks who have wanted one and not yet pulled the purchase trigger, there's a deal to be had. That is, providing you live in a certain location.
Show and tell: A brief guide to explainer videos


Whether you have a story to tell or product to sell, there are multiple benefits to Explainer Videos. Producing short films for online audiences allow you to showcase your wares and expertise, offering an affordable, snappy and entertaining route toward grabbing attention, boosting conversion rates and increasing sales.
With recent research predicting that 79 percent of global consumer Internet traffic will be video by 2018, it’s little wonder that marketers the world over are focusing on the medium of moving pictures and investing in explainer videos, confident of the potential for generating healthy returns.
New ransomware targets Office 365 users


A new zero-day malware has been discovered in Australia that affects all of Microsoft’s Office 365 products including Word, Excel, PowerPoint and Outlook.
The malware was discovered by the cyber security company Check Point and comes in the form of an invoice sent by email. The attack is designed to catch unsuspecting victims according to security analyst Raymond Schippers who said: "The email sent to Office 365 users via Outlook gives the appearance of an invoice in the form of an Office document. When they go to open it, a message will appear telling people the document was created with a previous version of the software, so they will need to click something to enable the content".
Identify edited JPEGs with JPEGSnoop


It’s been a few years since we last looked at JPEGSnoop, a low-level tool for investigating images. Is it still useful today? Let’s take a look. The program is as convenient to use as ever. No installation, no adware, just unzip the download and run the single executable.
The interface is basic, a tiny toolbar and a few menus, but the first step is simple enough to understand: hit Open and choose an image.
Foxit Reader 8.0 introduces ConnectedPDF collaboration, adds Touch Mode support


Foxit Software has unveiled Foxit Reader 8.0, the latest version of its PDF viewer and creator for Windows PCs. The reader, renowned for its lightweight and speedy nature, introduces support for Foxit’s new online ConnectedPDF Document Management System.
The new release also adds support for Touch Mode on supported models as well as Dropbox integration. Users also gain a handy new auto-save PDF option to protect against crashes or power failures.
Businesses get used equipment and third-party maintenance


More than half of IT decision makers opt to go for third-party maintenance (TPM) and pre-owned equipment, to cut costs and take advantage of improved support independent maintenance providers offer. It was also said they’ve had a "positive experience" with prior-generation hardware.
The news was published by Curvature, an IT infrastructure solutions provider, which polled 500 IT decision makers. Out of the 500 respondents, 60 percent use TPM, and 53 percent decide to purchase pre-owned equipment.
Find out more about the world below your flight path with Flyover Country


It sounds much like any other mapping app: enter a starting point and destination, see the route and points of interest along the way. Flyover Country won’t give you driving directions, local hotels or someone’s random picture of a lake, though. It’s a geoscience app from the University of Minnesota, and these points of interest are more about geologic maps, data, fossil information, georeferenced Wikipedia articles and more.
Setup is easy enough. Tap two or more points on the map to define your route, select "Load Path", and watch as Flyover Country finds data associated with that journey.
Chrome flaw makes it possible to copy DRM video streams such as Netflix


Security researchers from Ben-Gurion University Cyber Security Research Center (CSRC) have unearthed a vulnerability in Google Chrome that can be exploited to make copies of DRM-protected video streams. The problem affects all Chromium-based browsers, and makes it possible to circumvent Widevine encryption technology Google uses to secure streams.
Widevine has been used in Chrome for a while, after Google acquired it back in 2010. It has been used to prevent piracy of premium YouTube channels, and is also used to protect Amazon Prime and Netflix streams. Google was informed about the problem back in May, but is yet to issue a patch.
Post-Brexit, an online campaign for a second UK referendum gains huge support


The UK may not yet have introduced online voting -- nor is it likely to any time soon -- but it does have a website that can be used to raise petitions for debate. The House of Commons website is home to a huge number of such petitions, and any that gain 100,000 signatures will be raised in Parliament.
After the UK referendum on EU membership saw the country narrowly voting in favor of Brexit (even if they didn’t know what this meant), a petition calling for a second referendum has been signed more than 3 million times. Ironically, the petition was set up by a pro-Brexit, anti-EU politics student a month before the referendum actually took place. His plan was to call for a re-run in the event of a narrow vote to remain in the EU, but his wording is such that it could (although it's unlikely) backfire on him.
Report: YouTube and Facebook are now using automated tools to remove extremist content


With the likes of ISIS understanding the power of social media, Facebook and other online services find themselves under increasing pressure to counter terrorist and other extremist content. A report by Reuters says that a number of online companies are using automated tools to remove videos that violate terms of use.
Such tools have previously been used to prevent the spread of copyright videos online, but now it seems that they have been put to a new task. While automation can do little, if anything, to prevent the initial appearance of extremist videos, social networks can use them to stem the flow of republishing.
Microsoft to kill off Surface 3 in December


If you're in the market for a Surface 3, now is the time to buy one. Microsoft says that production of the Surface 3 will come to an end in December this year, and warns that stocks are already starting to run low.
It's not yet clear whether the end of production for the cheapest Surface device signals the end of Microsoft's Atom-based devices. But it certainly seems as though the company is keen to focus its attention on the Pro range as well as the Surface Book.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.