Latest Technology News

New solution protects enterprise websites from attack

Some of the latest cyber attacks seek to steal information using man-in-the-browser (MITB) attacks. These represent a dangerous trend because they circumvent even the strongest authentication techniques by hijacking the session after the user has authenticated a bank or other site.

Threat intelligence start up buguroo is looking to combat this with its new online fraud detection solution that can detect hijacked sessions in real time and stop them before any money leaves the bank.

Continue reading

Microsoft's Lego-like PC makes upgrading super-easy

Part of the reason the PC was originally so successful is down upgradability, and that’s still a factor today. If your computer starts to run a little sluggish, you can always add more RAM, or swap your HDD for an SSD. Some PCs are easier to upgrade than others, but Microsoft is looking into a way to make upgrading so easy that absolutely anyone could do it.

The idea is a modular computer that consists of magnetic units that you can snap off without the use of tools and replace with newer, better components. Not unlike building a PC from Lego.

Continue reading

UK government wants money-making porn sites to age-check visitors

The UK government is launching a public consultation over its plans to require pornographic websites to verify that visitors are aged 18 or over. The Conservative party wants to deliver on its manifesto pledge to introduce age verification to all porn sites, but the latest proposals go further.

The government wants all companies that profit from pornography online to implement systems to have a legal requirement to ensure that visitors are over 18. The consultation runs until 12 April and has the aim of using British Board of Film Classification (BBFC) issued 18 / 18R ratings for sites, but it's unclear how effective the system would be for free porn sites.

Continue reading

The Vega+ is a handheld ZX Spectrum packed with retro goodness

If you grew up in the UK in the 1980s, you likely either had a Sinclair ZX Spectrum or a Commodore 64. I was firmly in the Spectrum camp, and whiled away much of my youth playing classics such as Jet Set Willy and Skool Daze.

Retro Computers, led by Sir Clive Sinclair, last year resurrected the Spectrum in the form of the Vega, and this year it’s following up that low-cost games computer with a handheld model -- the Vega+.

Continue reading

IBM unveils new mainframe for secure hybrid clouds

IBM logo

More and more organizations are seeing the benefits of adopting the hybrid cloud, but they don’t want to risk sacrificing the security advantages of more traditional systems.

To help businesses tap into hybrid cloud without sacrificing security, IBM is announcing a new mainframe, the z13s. Building on the mainframe’s world-class performance and security profile, the z13s features new embedded security technologies, enhanced data encryption and tighter integrations with IBM Security solutions.

Continue reading

Has Windows 10 reset your default apps back to Microsoft stock?

Yesterday, The Inquirer reported on how Windows 10 was resetting some changed app defaults back to Microsoft’s own bundled universal apps.

In the primary example given, image viewer Irfanview was displaced by Windows 10’s own Photos app, a change that had been instigated, it seems, by cumulative update KB3135173.

Continue reading

End of an era as pioneering BBC3 becomes an online-only station

13 years ago, BBC3 launched in the UK. Last night, the TV station broadcast over the airwaves for the last time. In a bid to slash expenditure, the youth-oriented channel that launched countless comedy careers is now only available online.

The likes of Being Human, The Mighty Boosh, Gavin and Stacey, and the like will live on, but only on the web -- which the BBC is spinning as an opportunity to be freed from the constraints of regular scheduling. The change has been known about for some time now, and there have been a number of campaigns and petitions to try to get the BBC to change its mind.

Continue reading

Ransomware is lucrative -- almost half of all victims pay

ransomware key

I recently covered a story in which security firm Imperva said Cryptowall 3.0 was the most successful ransomware of all time, earning its creators $325 million (£225.7m) so far. Now another story about ransomware emerges, and this one comes from another major security firm, Bitdefender.

In its report, the company says almost half (44 percent) of all ransomware victims have paid to get their data back, with 39 percent saying they expect to be attacked again, in the future.

Continue reading

You can now watch Hulu on your Windows 10 device

You could always watch Hulu on your PC or Mac, or for that matter, on multiple other mobile devices. Now the streaming service wants to integrate much deeper, using Windows 10 as its launchpad.

This doesn't mean it will cease to be accessible in all of the previous ways, it just adds one more option for customers of the service.

Continue reading

iPad Pro's fatal flaw? [fifth in a series]

Editor's Note: Apple contacted me on February 16th, suggesting the short battery life is abnormal. We discussed tech support option but I chose instead to replace the whole kit—iPad Pro and keyboard—to see if the short battery life with Smart Keyboard is a one-off hardware problem.

The follow-up post, on February 24th, countermands the negative conclusions stated in this review. Battery life from the second kit is hugely satisfying and plenty long enough for the typical workday. The user experiences aren't comparable. I debated about deleting the original story but that feels like hiding something. Hopefully this addendum sufficiently retracts the original conclusion.

Continue reading

What you need to know about biometric security

fingerprint scanner

Generally speaking, biometrics refers to the measure or statistical analysis of a person’s physical or biological characteristics. However, increasingly the term is being defined more narrowly, at least in a business context, to refer to biometric security.

Although passwords can be guessed and network vulnerabilities exploited, overcoming biometric security protocols is significantly more challenging. For example, how would a cybercriminal go about duplicating a fingerprint or an iris scan? As a result, the unique aspects that make up our physical features are increasingly being utilized for authentication methods by businesses all over the world.

Continue reading

How to find and buy the ever-elusive $5 Raspberry Pi Zero

The Raspberry Pi Zero is incredibly hard to get hold off. Hardly surprising, when you consider its $5 asking price.

Retailers such as The Pi Hut do replenish their stocks on a semi-regular basis, but even so you’ll have to act fast as even with a one-per-customer restriction in place, they sell out again almost immediately. Fortunately, there is a clever way to find out where the Pi Zero is in stock.

Continue reading

IT security experts are confident they can spot a data breach

data breach

A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they do not share the same levels of confidence.

The survey questioned 763 IT professionals in various verticals, including retail, energy, financial services and public sector organizations in the US, about the seven key security controls that need to be in place in order to quickly spot an ongoing hack attack.

Continue reading

Five tools for recovering corrupted Word documents

You’ve been working on it forever, and had almost finished, but… Disaster. That all-important Word document no longer opens.

If you’re using some other viewer, try reopening it in Word. It may offer to repair the file, and this can fix a lot of problems.

Continue reading

Should you use Amazon S3?

In any discussion about cloud computing, it is becoming harder and harder to ignore Amazon Simple Storage Service (S3), the massively scalable, cost-effective cloud storage solution developed specifically to house the huge influx of data created by organizations worldwide.

Amazon S3 commands twice the market share of all its closest competitors combined and is likely to be the storage platform of choice for on-premise hybrid or private cloud deployments for some time to come.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.