What you need to know about biometric security


Generally speaking, biometrics refers to the measure or statistical analysis of a person’s physical or biological characteristics. However, increasingly the term is being defined more narrowly, at least in a business context, to refer to biometric security.
Although passwords can be guessed and network vulnerabilities exploited, overcoming biometric security protocols is significantly more challenging. For example, how would a cybercriminal go about duplicating a fingerprint or an iris scan? As a result, the unique aspects that make up our physical features are increasingly being utilized for authentication methods by businesses all over the world.
How to find and buy the ever-elusive $5 Raspberry Pi Zero


The Raspberry Pi Zero is incredibly hard to get hold off. Hardly surprising, when you consider its $5 asking price.
Retailers such as The Pi Hut do replenish their stocks on a semi-regular basis, but even so you’ll have to act fast as even with a one-per-customer restriction in place, they sell out again almost immediately. Fortunately, there is a clever way to find out where the Pi Zero is in stock.
IT security experts are confident they can spot a data breach


A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they do not share the same levels of confidence.
The survey questioned 763 IT professionals in various verticals, including retail, energy, financial services and public sector organizations in the US, about the seven key security controls that need to be in place in order to quickly spot an ongoing hack attack.
Five tools for recovering corrupted Word documents

Should you use Amazon S3?


In any discussion about cloud computing, it is becoming harder and harder to ignore Amazon Simple Storage Service (S3), the massively scalable, cost-effective cloud storage solution developed specifically to house the huge influx of data created by organizations worldwide.
Amazon S3 commands twice the market share of all its closest competitors combined and is likely to be the storage platform of choice for on-premise hybrid or private cloud deployments for some time to come.
The tech industry's greater responsibility


Today, Internet censorship is becoming a growing concern among dozens of developing countries. In the mid-1990s, China began blocking foreign websites and saw successful results, proving to other authoritarian countries wishing to control their constituents that these types of regulations are well worth the effort. Since then, Iran, North Korea, Cuba, Azerbaijan, Syria and others have followed China’s footsteps and began implementing regulations censoring Internet activity.
This means that the people living within these countries are unable to access information from the outside world. Thus, they are fed filtered information that praises their leadership and government, and because they are not exposed to varying and contrary opinions, are susceptible to believing and accepting their government’s authoritarian policies. In western countries we often take our first amendment right for granted. We are allowed to say, write, and scream whatever we’d like about our government without the risk of being jailed or beaten. We’re allowed, even encouraged, to question policies and think differently. If only this were the case worldwide.
'The room had started to smell. Really quite bad': Stephen Fry exits Twitter once again


For a man so readily associated with words -- and certainly for a wordsmith so enamored with technology -- Twitter seems like something of a natural home for Stephen Fry. Over the years he has amassed hundreds of thousands of followers, but last night he closed his account. Fry's latest exit from Twitter (there have been several over the last few years for numerous reasons) came about because of the backlash he received for making a joke at an award ceremony.
Hosting the BAFTAs (British Academy of Film and Television Arts) on Sunday, he referred to costume designer and award winner (and, indeed, friend) Jenny Beavan as being "dressed as a bag lady". 'Offended' Twitter users attacked Fry in their droves, and he fought a valiant battle, before eventually giving up and terminating his account. It comes just days after Twitter set up a new Trust & Safety Council.
LG lets you choose a flagship feature with X series smartphones


Two of the features that consumers get by opting for a flagship smartphone, as opposed to a mid-range or low-end device, are a nicer display and a better camera. Typically, if you are looking for a lesser (and less expensive) handset you will have to settle for less. Manufacturers have to sell those premium devices somehow, right?
But, with its new X series smartphones, LG is challenging the status quo by giving prospective buyers the option to get a flagship-worthy camera or display. It is an interesting strategy, but how is it implemented?
Wink home automation hub gets water sensors with leakSMART


Water damage is a big deal, in fact, it's one of the most reported claims for home insurance, behind only fire and lightning, and wind and hail. Now with home automation products increasingly gaining market share and mainstream acceptability, that problem can be reigned in to a certain extent. No, it won't prevent extremes like Hurricane Katrina, but if a pipe springs a leak then you can get a jump on it.
Wink, makers of a home automation hub that is compatible with many third-party devices, is getting its first water sensors thanks to leakSMART, one of the more prominent manufacturers in the business.
New report reveals in-game purchase habits


Only around two percent of free to play game users spend money making in-game purchases. A new report into buying habits from gaming analytics specialist SOOMLA reveals the -- perhaps unsurprising -- information that those who made an in-app purchase in one game are six times more likely to do so in another.
Yaniv Nizan, Co-founder and CEO of SOOMLA, says, "Attracting payers to your game is like finding a needle in a haystack, but when crossing in-app purchase data from thousands of other games, our payer prediction technology reveals which user segments will eventually convert and what they're likely to buy".
Rampant waste: the hidden cost of enterprise software


A new Flexera Software report reveals that most organizations are unnecessarily wasting significant portions of their enterprise software budget.
Consider these statistics: 75 percent of enterprises are out of compliance with regards to at least some percentage of their software, 44 percent of enterprises (compared to only 25 percent the prior year) paid $100,000 or more in true-up costs to their software vendors as a result of noncompliant software use; and for 20 percent (up from only 9 percent in the prior year) the software audit true-up costs were $1,000,000 or more! In addition, 93 percent of organisations report spending money on at least some software that is under-used -- i.e. shelfware.
Samsung starts rolling out Android 6.0 Marshmallow for Galaxy S6


Android 6.0 Marshmallow has reached only a small number of Android users since its debut in early-October of last year. Google's latest numbers place it at just 1.2 percent distribution share. Aside from a limited number of handsets that arrive with Marshmallow on board, the other reason why Android 6.0 has such a small reach is the fact that upgrades are only available for very few popular handsets.
Samsung is now changing that, as today it announces that the much-awaited Android 6.0 Marshmallow update has finally started to roll out, with its Galaxy S6 and Galaxy S6 edge flagships being the first devices to get it.
Microsoft Lumia 650 is an affordable Windows 10 Mobile device, but does a missing feature make it a fail?


When Microsoft purchased Nokia's handset business, it was viewed by many as a way to stop the Finnish company from defecting from Windows Phone. In other words, Microsoft may have thrown money at a problem to prevent embarrassment. Since the purchase, Lumia hardware has been fairly beautiful and affordable, but sales have continued to be abysmal, while Windows 10 Mobile has seen delays.
Despite dark skies in Lumia Land, today Microsoft cranks out yet another handset. The Lumia 650 body is aluminum, and at $199, the phone is affordable too. Unfortunately for Microsoft fans, there is a huge catch that, for many, could make this business-focused smartphone worthless.
Mazar Bot malware can root and wipe Android smartphones


Security experts are warning about a new malware attack that targets Android users. Mazar Bot is delivered via SMS, is able to gain root access to devices, installs software including Tor, and can even go as far as completely wiping a victim's phone.
Mazar Bot was discovered by Heimdal Security whose researchers analyzed a text message that had been found sent to random numbers. The message purports to provide a link to an MMS, but in fact tricks recipients to install the malicious mms.apk -- Mazar Android BOT in disguise.
App stores to generate over $100bn in revenue in five years


When apps first came to smartphones, it completely changed the ways users interacted with their devices. Mobile phones went from being just phones that could make calls and send short messages to devices that resembled miniature computers.
Apple’s App Store and the Google Play Store saw a dramatic rise in the number and quality of the apps they offered almost instantly. For many users, apps have become commonplace and they no longer hold our interest or excitement as they once did.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.