New platform helps protect enterprise Android use


Allowing the use of mobile devices and BYOD in the enterprise has led to new challenges for IT teams. Not lease of these is controlling which apps employees can access and how they can use them.
Security solutions provider OptioLabs is launching a new platform that will allow enterprises to create policies that control each of the 3,300 system methods in Android to provide targeted security protections.
Ford announces new Kuga at MWC 2016

Endpoint specific malware renders signature detection useless


Signature-based security could be virtually useless as 97 percent of malware is unique to a specific endpoint says a new report.
This is among the findings of the latest annual Webroot Threat Brief which shows that today's threats are truly global and highly dynamic. Many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information.
Unsurprisingly, cyber criminals are using the Zika virus to their advantage


The Zika virus has been all over the news lately and people are treating it as if it is something new. In fact, the virus named for the Zika Forest in Uganda, was first discovered way back in 1947. During the time since then, it was isolated to a narrow region near the equator, but several years ago it began to spread, jumping to south Pacific islands and finally landing in Mexico and South America.
Of course, anytime something is making news and playing to people's fears then there are at least two sectors you can count on to try and latch onto it – the media and cyber criminals. Three if you care to lump in politicians, four if you include recent statements from the Pope.
Ghostery 6.0 for Firefox redesigns UI, syncs settings with other devices


Anti-tracking company Ghostery has updated its Firefox add-on to version 6.0 in what the developer is calling "the most significant upgrade to Ghostery since its inception".
The interface has been redesigned, with a new dashboard giving an immediate view of the trackers on a site, revamped menus and alerts, and assorted beginner-friendly usability tweaks ("Whitelist Site" is now "Trust Site").
Android Pay's security to be put to the test in 2016


Dell has released its Security Annual Threat Report, taking a detailed look into the IT security landscape of 2015, as well as predicting a few trends for the ongoing year.
The report is based on "Dell SonicWALL Global Response Intelligence Defense (GRID) network with daily feeds from more than one million firewalls and tens of millions of connected endpoints, Dell SonicWALL network traffic and other industry sources".
Picosmos Tools is a quirky image editing suite

90 percent of Android devices are running an outdated OS


According to new research over 90 percent of Android devices are running an out of date version of the OS. In addition, 32 percent of those in use in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities like Stagefright.
The study by cloud based access provider Duo Security analyzed data from its installed base of over a million mobile devices. It reveals that the problem isn't just with Android, only 20 percent of iPhones run the latest Apple operating system version, iOS 9.2. Outdated iOS devices have well-known vulnerabilities such as Ins0mnia and Quicksand that make these devices susceptible to attacks.
Microsoft improves Windows Store's app visibility


Finding apps that are published in Windows Store should not be a problem, but this is exactly what some developers have been complaining about. It seems that when conducting a search there are titles that do not show up in the results, even though the query matches their name. As a developer put, it is a "disaster".
This is a problem not only for the developers who have worked hard to make apps for Windows Store, but also for Microsoft and its users. After all, what the search feature turns out reflects the quality of the app store. This issue may now be gone, as the software giant says that app visibility has finally been improved.
Avast finds Mobile World Congress visitors among the least safe


One would think that those attending a big technology show would be among the more savvy tech users, but sometimes they are the ones who maybe think they are above the fray and forget about the multitude of things that can go wrong whenever you are online.
To illustrate this problem, security firm Avast took a trip to Barcelona, where the Mobile World Congress show is underway. Much of the flow of people entering the airport were there to attend the show, though likely some tourists and business travelers were in the mix as well.
Fiat Chrysler leverages Google's Android-powered Project Tango to improve car shopping


I love cars, but hate shopping for them. My vehicle is a meager Ford Focus, but it took me a year to buy it. Why? Some car salespeople can be very high-pressure, but worst of all, negotiating a price is an exercise in frustration -- it took me a long time to find the right car at the right price.
Why is it that buying a car can't be more straightforward? Well, Fiat Chrysler may have part of the solution to that problem. By leveraging Project Tango, Google's Android-powered augmented reality solution, consumers will soon be able to experience the vehicle of their desires without entering a showroom.
NetSpot 1.0 Wi-Fi analyzer and troubleshooting tool launches on Windows


Etwok LLC has launched NetSpot 1.0 on the Windows platform, joining the existing Mac tool. The initial release of the Windows version has been made free for both personal and commercial use, and contains a subset of the features found in the Mac build.
The tool is designed to help troubleshoot problematic Wi-Fi network connections by revealing overall reception strength, and includes a mapping tool to help identify 'dead' zones where reception is poor or non-existent.
Thanks to encryption, UK efforts to block torrent sites are pointless


In the UK, ISPs are required to block access to a number of big-name torrent sites -- the thinking being that sites such as The Pirate Bay are used primarily for (gasp!) downloading pirated material. Despite the government's desire to control what people can access online, good old HTTPS means that people are able to very easily bypass any blocks that may be put in place.
There are all manner of proxy services and mirror sites that provide access to otherwise-blocked content, but these are really not needed. With the likes of The Pirate Bay and Kickass Torrents offering secure, encrypted connection, accessing the goodies they contain could involve little more than sticking an extra 's' in the URL.
The cost of mobile data breaches in big companies


A mobile data breach could cost a large enterprise over $25 million (£18 million) according to a new report.
The study of security and IT leaders in Global 2000 companies, carried out by mobile security specialist Lookout and the Ponemon Institute, examines the risk introduced by employees accessing increasing amounts of corporate data via their mobile devices.
Microsoft's Bill Gates sides with FBI in Apple iPhone unlocking row, likens it to 'cutting a ribbon around a hard disk'


The debate about whether Apple should help the FBI to access content stored on an iPhone used by one of the San Bernardino shooters rumbles on. Based on our poll, the majority of BetaNews readers are against Apple cracking the phone (67 percent say no, 30 percent say yes, and 3 percent are currently undecided), and most tech firms have expressed similar sentiment.
But in an interview today with the Financial Times (story behind a paywall) Microsoft co-founder Bill Gates has come out firmly on the side of the FBI.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.