Latest Technology News

Canonical announces premium Linux-powered Meizu PRO 5 Ubuntu Edition smartphone

While I love iOS when it comes to mobile devices, Linux is my true love on the desktop. Android used to be my choice for mobile, but I jumped ship due to scary exploits and untimely (or nonexistent) OS updates. Linux should be synonymous with security, but Google's mobile OS has tainted that, sending me into Apple's loving arms.

Luckily, Google is not the only Linux player with mobile -- Canonical is still moving ahead with Ubuntu. True, it is a long shot to ever meet or exceed iOS or Android in market share, but fans of Linux and other open source software should pay attention. Today, Canonical announces the Meizu PRO 5 Ubuntu Edition -- a premium and luxurious smartphone.

Continue reading

Fujitsu, Toshiba and Vaio plan to merge PC divisions

Handshake

Toshiba, Fujitsu and Vaio, which was recently spun off from Sony, have entered into the final round of negotiations to integrate their PC divisions.

If the three firms can reach an agreement, they plan on establishing a joint holding company with subsidiaries responsible for running each firm's PC businesses.

Continue reading

Your VoIP phone could be used to spy on you

You should be careful when running voice-over-IP (VoIP) phones, as weak passwords could turn your device into a covert spying tool.

Security consultant Paul Moore says he has discovered how default and weak passwords on enterprise-grade Snom VoIP phones could allow attackers to make their own calls using your service, or listen to your conversations.

Continue reading

ID as a Service solution helps to secure digital access

ID verification

Identity and access management (IAM) is a growing field, expected to be worth around $18 billion by 2019 according to a recent report.

This is partly down to cloud growth creating the need for a secure solution that can scale quickly, in on-premise environments and across cloud applications, without additional costs for installation and extra hardware.

Continue reading

Windows 10 to be installed on 4 million US Department of Defense computers

Windows 10

Microsoft keeps shouting about the millions of users that have switched to Windows 10, and soon the company will have another 4 million to bray about. The US Department of Defense is the latest big name to give Windows 10 the seal of approval apparently unconcerned with the privacy and telemetry issues that have put off others.

4 million enterprise upgrades for Windows 10 is a real feather in the cap for Microsoft, and the aim is to get each system running the latest version of the operating system inside a year. The DoD has also announced that it is granting certification to Surface 3, Surface Pro 3, Surface Pro 4, and Surface Book devices, meaning that they now appear on its Approved Products List.

Continue reading

Threat Stack launches integrated cloud security suite

Private secure cloud

Keeping systems secure has become more complicated as companies adopt cloud and hybrid environments for their systems.

To eliminate the need for multiple different security products and give users a single-pane view into workloads, infrastructure monitoring, vulnerability management, threat intelligence and compliance reporting, Threat Stack is launching a new Cloud Security Platform.

Continue reading

Windows 10 Mobile to roll out starting soon (hopefully)

Believe it or not, Windows 10 Mobile is already three months old. Microsoft introduced its new smartphone operating system to the public in late-November, last year, when it released Lumia 950 and Lumia 950 XL. However, an update to Windows 10 Mobile for older devices has yet to make an appearance, forcing users to join the Windows Insider program to sample the goods.

We first heard that Windows 10 Mobile would roll out for popular Windows Phone devices in December, but just before the end of the year Microsoft announced that users would have to wait a bit longer. Now, we have a new official estimate -- is third time the charm?

Continue reading

Experiment tracks what happens to stolen credentials

cyber criminal

We all know that hackers are looking to steal credentials and get their hands on sensitive data, but exactly how does this process work?

Researchers at data protection company Bitglass carried out its second 'Where’s Your Data' experiment, creating a digital identity for an employee of a fictitious retail bank, a functional web portal for the bank, and a Google Drive account, complete with real credit-card data.

Continue reading

Seagate announces 'world’s slimmest and fastest' 2TB mobile HDD

Almond Joy and Mounds are two fairly popular candy bars -- I see them often in most convenience stores. Both feature coconut and chocolate, but only the former features nuts. There was quite the popular marketing campaign years ago, with the jingle of "sometimes you feel like a nut, sometimes you don't". The same can be said of technology. Sometimes you feel like a solid state drive, sometimes you don't. But why would you ever prefer a mechanical hard drive?

Capacity. True, SSDs are faster, but HDDs typically offer higher capacities at lower prices. If cost and capacity are your focus -- speed be damned -- a hard disk drive could be what you need. Today, Seagate releases what it claims is the "world's slimmest and fastest" 2TB mobile hard drive. Oh my.

Continue reading

Critical security gaps found in secure web gateways

Attack detection and analytics specialist Seculert has released a new report identifying critical security gaps in popular web gateway solutions.

During the first 10 months of 2015, Seculert observed the web gateway performance of Barracuda, BlueCoat, Fortigate, Ironport, McAfee Web Gateway, Palo Alto Networks, Websense and Zscaler to determine whether existing gateway solutions were allowing infected internal devices to communicate traffic outside the organization.

Continue reading

Get your life organized with Makagiga

Makagiga started life long ago as an open-source, Java-based RSS reader. But then the developer started to take it further. Much, much further.

The program now also has a capable to-do manager. A note taker. A simple image editor. And, via optional plugs, web searching, an OpenStreetMap viewer, a thesaurus, LaTex/ Markdown/ BB Code previews, screen capture, barcode generation and more.

Continue reading

Why Apple is right to reject the order to unlock a killer's phone

Apple has been ordered by the US courts to help the FBI gain access to data on an iPhone belonging to San Bernardino gunman Syed Rizwan Farook. Farook and his wife killed 14 people in the California city late last year before being shot dead by police.

The FBI says the phone contains information crucial to the investigation, and needs Apple’s help to unlock it. Data on Apple devices is encrypted by default -- and has been since September 2014 -- which means no one, other than the device owner, can access it. And that includes Apple itself.

Continue reading

Toshiba 15nm TLC SG5 SSD has up to 1TB capacity and either 2.5 inch or M.2 form factor

If your desktop or laptop doesn't have an SSD, you are missing out on something wonderful. If you think your mechanical hard disk drive is "good enough", please know that a solid state upgrade can reduce noise, increase battery life, and most importantly, dramatically improve performance. Even if you are adverse to spending money, there are plenty of affordable drives nowadays.

Today, Toshiba announces a new series of SSD with the 'SG5' designation. These solid state drives have capacities up to 1TB and feature 15nm fabricated TLC nand chips. To meet the needs of most consumers, the drives will come in either 2.5 inch or M.2 form factors. Unfortunately, the drives -- including the M.2 variant -- utilize the SATA interface, so speeds will not be mind-blowing like a PCIe SSD.

Continue reading

Fourth party networks put enterprises at risk

Broken chain

We're all aware that sometimes data can be put at risk by third party systems belonging to suppliers. But a new report by security rating company BitSight looks further down the chain at vulnerabilities posed by fourth parties -- the subcontractors of third party vendors.

Changes in the way organizations source their IT have increased their dependency on cloud service providers, web hosting platforms, and other external services. Cyber criminals are recognizing that these outside vendors and subcontractors can often be their best point of entry into many companies.

Continue reading

Why peer to peer lending is a disruptive industry [Q&A]

Cloud money

In the last ten years, peer-to-peer lending has grown to be a serious disruptive influence in the financial services landscape.

Jaidev Janardana, CEO of Zopa, the world’s first and UK’s leading peer-to-peer lending platform, discusses why the industry has proved so disruptive and what the future holds.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.