OnePlus fans rejoice -- new flagship launches by June


There is no denying that flagships like Samsung's Galaxy S7, LG's G5 and Xiaomi's Mi 5 have just raised the bar for the high-end smartphone market. Rivals need to step things up a notch, as it is going to be extremely hard to compete against the latest-generation hardware and software, especially when it is offered at price points as low as $300.
For OnePlus and its current flagship, OnePlus 2, things are not looking good. Mi 5, which competes in the same price range, is a better device on paper and cheaper too. Other similar devices will soon follow, of course. What is OnePlus' answer? Well, it is OnePlus 3 and it is coming by June.
New platform offers endpoint protection for Linux servers


Most of the internet is powered by Linux servers, so it's not surprising that they’re increasingly a target for attack. In particular recent attacks have focussed on using compromised systems to distribute malware to other systems.
Many Linux systems rely on traditional signature-based threat detection which leaves them vulnerable to zero-day attacks. Endpoint security company SentinelOne is announcing a new solution aimed at protecting enterprise data centers and cloud providers from emerging threats that target Linux servers.
Batch print documents, drawings and more with Print Conductor 5.0


If you regularly need to batch print folders of documents then you’ll know it’s a lengthy and tedious process: Ctrl+P+Enter+repeat until you die of boredom, essentially.
Print Conductor is a free-for-personal-use application which automatically lines up and dispatches your targets to their source programs for printing.
Netskope launches threat protection for enterprise cloud apps


Use of cloud apps, including unauthorised 'shadow' IT, is booming, but it leaves a gap in the protection provided by traditional perimeter security.
To plug this gap cloud access security broker Netskope is launching a threat protection solution for the cloud. Netskope Active Threat Protection combines threat intelligence, static and dynamic analysis, and machine-learning based anomaly detection to enable real-time detection, prioritized analysis, and handling of threats that may originate from cloud apps.
New platform can use any data source to gain visibility into attacks


A security breach can involve many different elements, this means that analyzing attacks can be a complex and difficult task.
Security analytics specialist Niara is launching a new version of its security analytics platform that can analyze any data source and supports the customization of behavioral analytics modules, providing organizations with complete visibility into attacks and risky behaviors inside their environments.
View all your Chrome, Firefox and IE addons with NirSoft's BrowserAddonsView


Freeware developer NirSoft has released BrowserAddonsView, a free tool which detects and displays all your installed Chrome, Firefox and IE extensions, in all user profile folders.
Every installed addon is displayed in the usual NirSoft table, with details including item ID, status (enabled/ disabled), browser, addon type (extension, plugin, browser helper, ActiveX, more), name, version, description, title and creator.
Microsoft buys Xamarin to strengthen mobile side


If a few years back we were laughing off Microsoft's efforts in the mobile market, today we are looking at the software giant in a different light. That "mobile first, cloud first" mantra that Satya Nadella introduced us to when he became CEO now defines Microsoft, which has quickly evolved into one of the most important players in the mobile space afterwards.
Under Nadella, Microsoft has tackled mobile in a more meaningful way, refocusing its strategy so that it could become a major developer for more than Windows and Windows Phone. Today, the software giant's best services and products are also found on Android and iOS, the most important mobile platforms, and more have been added following high-profile acquisitions like Acompli and SwiftKey. Now, Microsoft adds Xamarin to its mobile portfolio, proving once again that it is dead serious about conquering mobile.
Apple, encryption, iPhones, and the FBI plainly explained


Most Americans, and many of the world’s iPhone users, are now aware that a court order was filed on February 16 to compel Apple to assist the FBI in retrieving information from an iPhone. This was the phone uncovered in the aftermath of the mass shooting in San Bernardino in December last year. Apple objected to the FBI’s demands and very public legal maneuvering ensued.
In this article I endeavor to explain some of the key issues that this situation raises, for both privacy and security, as they impact companies, consumers, and governments.
Pawn shop phones contain left over personal data


If you buy a used mobile phone you could be getting more than you bargained for according to security software company Avast. It seems that some phone owners are inadvertently pawning their porn.
Avast purchased 20 used smartphones from pawn shops in 4 cities -- New York, Paris, Barcelona and Berlin. The goal being to see if used phones are regularly being sold with previous owners’ personal information still retrievable on them.
Google's Project Shield protects news and human rights sites from DDoS attacks


The web facilitates free speech, but it also gives groups the opportunity to try to silence those they disagree with. DDoS attacks are common way to retaliate against opposing views, and today Google is expanding Project Shield to protect sites from such attacks.
Project Shield is not a new service, but it has been limited to a group of testers since its launch a few years back. Designed to detect and eliminate "DDoS as a form of censorship" the free service is now available to everyone -- those who qualify, at least. The aim is to protect news and human rights sites to ensure uninterrupted access to news and information.
HP teams up with iPass to offer global Wi-Fi across select devices, including those running Windows 10


Among the downsides of traveling, is limited access to Wi-Fi. Finding hotspots becomes a priority, leaving travelers scrambling for places like Starbucks and various other cafes, libraries and, well...any port in a storm. Wi-Fi is becoming more ubiquitous, though.
Now HP is looking to help out those using its devices, including both tablets and laptops. The company is extending its partnership with iPass Inc to bring connectivity to what it terms "select devices". Previously this was only available in the Asia-Pacific region, but it is now expanding worldwide.
Samsung unveils speedy 256GB Universal Flash mobile storage -- will Apple use it for iPhone 7?


Last year, I bought my first iPhone. Shockingly, the base model still came with a paltry 16GB of storage. Since this was my first-ever such Apple smartphone, I decided to go nuts and splurge on the massive 128GB. Since I store my photos in the cloud, and stream music and movies, I have come nowhere near filling it up. I should have bought the 64GB, but I digress.
Of course, my situation is not the same as everyone else -- some people truly need 128GB or more. Unfortunately, Apple does not offer more than 128GB -- yet. This may change, however, as Samsung announces crazy fast 256-Gigabyte Universal Flash Storage for mobile. The high performance should make these 256GB modules very popular with manufacturers. This will certainly show up in Android devices, but could Apple select it for the upcoming iPhone 7?
Google Chromecast could come built into future TVs


Google’s Chromecast is a nifty piece of kit. The $35 dongle lets you stream content from your smartphone or tablet to the big screen. It’s great for casting TV shows, movies, music, sports, games and more.
At the moment you need to purchase a dongle and attach it to your set via HDMI to use this functionality, but in the future that step might not be required as Google is reportedly looking to partner with TV manufacturers to offer Chromecast-like functionality natively.
Tim Cook goes off-script describing FBI iPhone backdoor request as 'cancer'


Say what you like about Apple, one thing is for sure -- it is one of the most scripted and tightly-controlled companies in existence. Everything is stage-managed to within an inch of its existence. Leaks about upcoming releases are rare, and there is a tight rein on the media and who has access to its products for review. So when the FBI asked Apple to unlock the iPhone of the San Bernardino shooter it was hardly surprising that the company was a little shaken and unprepared.
This was a media situation Apple was not in control of. Tim Cook has gone on the offensive in recent days, defending his company's decision not to help the FBI, and in a new interview with ABC News the CEO referred to the request to unlock the phone as requiring "software that we view as sort of the equivalent of cancer" -- something of a shocking thing to say when you consider the cause of death of his predecessor, Steve Jobs.
IObit Malware Fighter 4 arrives


IObit has announced the release of IObit Malware Fighter 4, with what looks like some major improvements in protection.
A new IObit anti-malware engine and a 10x larger database aim to detect and remove even more threats.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.