Swipebuster: $4.99 is all it costs to see if your partner (or anyone you know) is using Tinder
Its developer -- who wishes to remain anonymous -- says that his website exists to educate people about the importance of privacy. But Swipebuster sells itself as a way for suspicious partners to check upon their other halves if they think they might be making use of Tinder to seek out some 'extracurricular activity'.
Swipebuster taps into the Tinder API to access publicly available data to see if a particular individual appears in the membership database. It’s perfect not only for confirming or denying worst fears, but also a valuable tool for a would-be blackmailer. For just $5, you can conduct three searches to see if people you know are using Tinder.
Reminders come to Google Calendar on the web, bringing to-do list support
A calendar offering reminders might seem like a fairly obvious feature, but here we're talking about Reminders (note the initial cap). Towards the end of last year, Google Calendar on iOS and Android gained support for Reminders -- and, as a result, to-do lists -- and now the same feature is coming to Google Calendar on the web.
Unlike standard calendar appointments, Reminders stick around until you tick them off. There's no need to keep changing the due date on something you don't get round to doing, as it will automatically roll over to the next day and appear on your calendar until you take the appropriate action.
Full end-to-end encryption shows WhatsApp is serious about privacy
Encryption has been a hot topic for some time, but the battle between Apple and the FBI really brought it to the fore in recent weeks. In response to the FBI trying -- ultimately successfully -- to crack into the San Bernardino shooter's iPhone, WhatsApp was just one of the companies that promised to increase encryption.
Today the popular chat tool made good on its promise, enabling full end-to-end encryption; this means that calls, messages, photos, videos, files, voice messages, and group chats are all protected with end-to-end encryption. Importantly, this extra layer of security is enabled by default, leading WhatsApp to claim it is "a leader in protecting your private communication".
HP and Nvidia team up to offer Z Workstations with VR Ready systems
HP and Nvidia are teaming up to offer developers an easier time building virtual-reality content. The joint effort will see HP’s Z Workstations upgraded with Nvidia's VR Ready systems, equipped with Quadro professional GPUs.
The new systems, which can come with up to two NVIDIA Quadro M6000 24GB cards, support the Scalable Link Interface (SLI), GPU Affinity API and VR Synchronization technologies, doubling the rendering power of even the most demanding VR applications and practically eliminating image tearing.
Twitter now offers an easier way to share public tweets privately
While Twitter is designed to provide an open forum for your thoughts, occasionally you might want to have one-to-one discussions in private, and that’s where the Direct Message option comes in.
Today, as part of its quest to make DM conversations "richer", Twitter introduces a feature to make it much easier to share public tweets privately with friends and followers.
IT pros have bad security habits
Double standards, double standards everywhere. Our IT bosses might force us to change our passwords every so often, but they rarely change their own credentials, even though theirs offer administrative privileges.
Those are the results of a new survey conducted by cyber security vendor Lieberman Software. The company had asked 200 IT professionals at RSA Conference 2016 about their password changing habits.
Would you pay $3.99 a month for an Outlook.com Premium subscription?
Outlook.com offers all the right features that most consumers expect in an email service these days. But, if you are power users, Microsoft believes you may be looking for more, which is why the software giant is now trialling a Premium subscription.
Costing $3.99 a month, this is not the first and only Outlook.com subscription. There already is an Ad-free plan for users who want to get rid of advertisements, that goes for $19.95 a year, however the Premium tier is meant to unlock more extra, pro-level features.
Open source database targets the big data analytics market
Leader in open source databases MariaDB is announcing the release of its new big data analytics engine, MariaDB ColumnStore.
It unifies transactional and massively parallelized analytic workloads on the same platform. This is made possible because of MariaDB's extensible architecture that allows the simultaneous use of purpose built storage engines for maximum performance, simplification, and cost savings. This approach sets it apart from competitors like Oracle, and removes the need to buy and deploy traditional columnar database appliances.
Reducing costs is a growing priority for IT departments
IT departments in businesses across Europe are still focused on saving money, and not on adding value to the company, or innovating to support further growth. Those are the results of a new survey by Vanson Bourne on behalf of Claranet.
Polling 900 European IT leaders, it was unveiled that despite growing IT budgets, these departments are still looking to cut costs and save money. Today, 46 percent said reducing cost was the top priority, compared to 34 percent a year before. For 29 percent, new revenue streams were their core activity, and for 25 percent, that was increasing customer loyalty.
Ashampoo releases Photo Optimizer 2016, Backup 2016
Berlin-based developer Ashampoo has released two free programs: Ashampoo Photo Optimizer 2016, and Ashampoo Backup 2016.
Photo Optimizer 2016 is a stripped down version of the company’s commercial photo fixing tool, Ashampoo Photo Optimizer 6. The program can automatically optimize a folder of photos with a click, or you can use manual tools to crop, resize, rotate, sharpen, blur or straighten an image, tweak brightness, contrast or colors, add watermarks and more.
Behavior ID strengthens mobile and web security
Whether it's down to stolen credentials, weak passwords or bot-based attacks, the threat of an account takeover is one of the major worries for most users.
Mobile identity company TeleSign is launching Behavior ID, a new offering that enables web and mobile applications to measure and analyze a user's behavioral patterns to provide continuous authentication, even after the user has been verified with traditional security measures like passwords.
iPhone 6s security flaw lets anyone bypass the passcode and access contacts and photos
It might have taken the FBI quite some time to find a way to unlock a shooter's iPhone 5C, but it turns out to be trivially easy to access contacts and photos stored on the company’s newest flagship, the iPhone 6s.
The trick makes use of Siri and Twitter, and as the owner of a 6s I’ve been able to test this method myself, and can confirm not only that it works, but it’s very simple to implement.
Use of next generation databases hindered by backup technology
Businesses are showing increased interest in developing their infrastructure to support distributed, scale-out databases and cloud databases, but a lack of robust backup and recovery technologies is hindering adoption.
Backup and recovery is cited by 61 percent of enterprise IT and database professionals as preventing adoption. However, 80 percent believe that deployment of next-generation databases will grow by two times or more by 2018.
Why assessing the value of data is vital to your organization
Based on my experience around data and metadata, I strongly believe that in today’s business environment, understanding the value of data should be a top priority for almost any organization.
Although there are certainly other core elements that help to define organizations, I would say the three most important are people, processes and technology. What each of these elements has in common is its reliance on data -- without which, nearly any organization’s productivity would quickly come to a grinding halt. Of course, most organizational leaders would agree that data is valuable, at least in a general sense. But it takes an additional focus, and deliberate processes, to measure the actual value of data within your organization, and then set up systems that allow you to take advantage of it.
Upgrade to Windows 10 Mobile and you can still roll back to Windows Phone 8.1 -- with caveats
After months of testing, Microsoft has started the process of rolling out Windows 10 Mobile to a selection of Windows Phone 8.1 handsets. Users who have been part of the Insider program will know what to expect, but for others the changes may come as something of a surprise.
In fact, it's entirely possible that you'll upgrade to Windows 10 Mobile and not like what you see. The good news is that Microsoft will allow you to roll back to Windows Phone 8.1, and there's no time limit on doing so.
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.


