Microsoft announces NCAA March Madness Windows 10 app and Bing bracket experience

NCAA-Official-Tag-wide-tag-v2

Computers and sports have historically been viewed as separate -- at least from a stereotypical point of view. It used to be perceived that there were jocks and nerds, and that computers were reserved for the latter. Over time, however, computers have gone so mainstream that they are ubiquitous in pretty much every sector. Hell, Microsoft's awesome Surface computers are seen on the sidelines of NFL games.

Today, Microsoft and the NCAA announce a partnership to further marry sports and computers with the Bing-powered March Madness basketball bracket experience. The NCAA is also releasing a new universal Windows 10 app! Sports fans -- and bracket gamblers -- should absolutely love the experiences created by this partnership.

Continue reading

'Accessibility Clickjacking' malware could impact 500 million Android devices

Android danger sign

Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to spy on and even control a device.

It can monitor all of a victim's activity and allow attackers to read, and possibly compose, corporate emails and documents via the victim's device, as well as elevating their permissions to remotely encrypt or even wipe the device.

Continue reading

How to fix Windows 10's most annoying problems

win10 fire

Windows 10 has been out for seven months now, and while it’s still not the perfect, most polished operating system there is, Microsoft has at least fixed a lot of the problems users originally encountered with it.

However, our original two guides to fixing Windows 10’s worst problems remain hugely popular, suggesting that users are still having issues and looking for workarounds to try. For that reason, we’ve decide to revisit the topic, with some new problems and solutions.

Continue reading

7 things needed for a successful cyber attack

Cyber attack

While it is true that pretty much every network is vulnerable to a cyber attack, it is also the case that attackers must follow a certain formula of actions to compromise these systems. Industry research has shown that, on average, advanced attacks nest inside organizations for 200 days before discovery. That’s a long time for an attacker to stealthily gather private data, monitor communications and map the network.

However, once we understand the steps of a successful cyber attack from an attacker’s point of view, then it is possible to, at the very least, shorten the amount of time it takes to detect it; or mitigate it entirely.

Continue reading

Amazon Echo gets new companions in Echo Dot and Amazon Tap

PR_AlexaFamily_V01

We've covered the Amazon Echo extensively and the company has been running a series of ads as of late, featuring several amusing spots with Alec Baldwin, which began at the Super Bowl with Dan Marino featured in that particular one.

Now the company is trying to further its inroads into everyone's home with two new companion products for its popular device, even as it continues to push updates to the current offering.

Continue reading

One in five Brits blocks ads

block_ads

An increasing aversion to online ads amongst British adults is posing a threat to online publishers, new figures show.

The latest figures from IAB in conjunction with YouGov reveal that more than one in five British adults, or 22 percent, are now using ad-blockers, representing a four percent rise compared to previous results in October 2015.

Continue reading

Real-time messaging is displacing email

email open read

According to a new report, 56 percent of respondents believe that real-time messaging will displace email as their organization's primary workplace communication and collaboration tool.

The latest Trends in Cloud IT Research survey from BetterCloud surveyed over 800 people split between IT professionals and end users. The results show that while real-time messaging is gaining popularity, 27 percent of end users and 23 percent of IT professionals say some employees are less productive because of it.

Continue reading

Log PC activity in real time with Event Monitor Service

EMSvc.200.175

Security vendor NoVirusThanks has released Event Monitor Service (EMSvc), a Windows application which logs key system events in real time.

The package can track file creations, file deletions, PE files dropped to disk, created processes, loaded modules, loaded drivers and registry changes.

Continue reading

Microsoft releases Windows 10 Mobile Insider Preview Build 10586.122 -- here's what's new

Microsoft Lumia 950 Windows 10 Mobile

While the Windows 10 Mobile roll out has yet to finally kick off, new preview builds are frequently released for users enrolled in the Windows Insider program. Microsoft is working on ironing out the kinks before unleashing its latest smartphone operating system, while trying to improve the user experience for those who have already purchased Windows 10 Mobile handsets.

And, now, early adopters are treated to Windows 10 Mobile Insider Preview Build 10586.122. This "cumulative update", which is offered in the Slow and Release Preview rings, adds support for new smartphones, a significant number of improvements to existing features and some bug fixes. Here's everything that you need to know about it.

Continue reading

Fake profiles on social media could become illegal

fake-nose

Facebook has faced a great deal of criticism over its real names policy, and a number of people have fallen foul of the rule that prevents users from assuming a pseudonym. UK law enforcement agencies are looking for ways to tackle the problem of online abuse perpetrated by trolls.

Among the suggestions put forward by the Crown Prosecution Service is that people who use fake social media accounts to harass and abuse others should be prosecuted. The proposals would normally only apply to adults, but children could be hit by the legislation in certain circumstances as well.

Continue reading

Google fights Zika virus with open source

zika two

Friends and colleagues often tell me I am a bit of a hypochondriac. As soon as a virus makes its way to the news, I am convinced I have it. Hell, I even bought respiratory face masks from Amazon in case Ebola somehow spread to Long Island! Ultimately, I end up looking foolish -- my fears were for naught.

The Zika virus has me worried, however, and this time, sadly, my fears are warranted. Carried by mosquitoes, the virus itself is usually fairly harmless to the infected, but can spread globally. The true devastation caused by Zika is birth defects for babies, such as microcephaly, caused by virus-infected mothers. Luckily, Google is working to fight the Zika virus by contributing money and resources and, more good news, the resulting platform will be open source.

Continue reading

Twitter to help UK prosecutors fight revenge porn and online abuse

handcuffs

Twitter has long-battled trolls and after launching various tools to help combat abuse, the social network is lending its support to the Crown Prosecution Service (CPS) in the UK. The social network is to work with prosecutors to provide training that will help the CPS to fight revenge porn, stalking and other forms of online abuse.

The move comes after a marked increase in the use of social media to perpetrate attacks on individuals, particularly women. But while levels of technical nous have generally increased, legal services have been slow to keep up with the latest changes. With new guidelines set to be published covering the persecution of women through social media, prosecutors are ready to call on Twitter's experience.

Continue reading

Here are the passwords cybercriminals are most likely to use in hacking attempts

Hacker

The security group Rapid7 has released a new report that may prompt some alarm from web users who are heedless when it comes to choosing their online passwords.

Instead of using the passwords that internet users are the most likely to pick, the group took a different route and examined the passwords that cybercriminals are actually trying to use to hack into a number of systems including POS systems, kiosks, and computers.

Continue reading

Disable Windows 10's Microsoft Consumer Experience to take control of your Start menu

Windows 10

Microsoft's use of the Start menu to promote 'recommended apps' is nothing new, but recent builds of the operating system take things a step further. Install Windows 10 on a new computer, or create a new user account, and you'll find that a number of extra apps -- including Candy Crush Soda Saga, Flipboard, and Twitter -- appear in the Start menu.

Getting rid of these Start menu entries is simple enough, but the Microsoft Consumer Experience feature which is used to push the apps could be used to add links to more third party apps in future. Here's what you need to do to disable the Microsoft Consumer Experience and regain control of your computer.

Continue reading

Samsung now shipping 15.36TB PM1633a SSD -- world's largest capacity solid state drive

15.36TB_SSD_02

Back in the 1990's, my first-ever computer came with a 4GB hard drive. At the time, this was absolutely massive -- my computer-literate friends told me I would never need a bigger drive in my lifetime. Obviously, this thinking was wrong -- 4GB is considered rather small for a flash drive nowadays. Heck, when it comes to technology, never believe anything is "good enough", or that things won't get better and faster.

Today, Samsung begins shipping an SSD that makes large HDDs looks worthless by comparison. You see, the PM1633a is the world's largest solid state drive, with a capacity of 15.36TB! No, you aren't dreaming -- this is real.

Continue reading

Load More Articles