The security risks of IoT devices


The Internet of Things (IoT) isn’t a new concept, but it has gained momentum especially within the last year, as more and more connected devices have come to market. While connecting everything brings added convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective, and importantly, which devices could pose a threat either now or in the future.
With so many connected devices we decided to take a look at those that have made the headlines so far this year. Cars, for instance, have only recently become connected, although they have long been computerized. However, with poor Internet security expertise some manufacturers are being caught out.
Where in the world is Google Pixel C?


Black Friday is behind us, Cyber Monday is here, and Christmas shipping new purchases cuts off in about three weeks. Which makes me wonder: Where is Google's new tablet? When announced at the end of September, Google product director Andrew Bowers said that the "Pixel C will be available in time for the holidays on the Google Store". Eh, yeah—by whose measure is "in time". The information giant typically sells out of new gear, which leaves little time to manage inventory. "Out of stock" notices will disappoint many shoppers, who may buy something else.
I watched for this baby to drop before Thanksgiving, particularly with Apple iPad Pro already available—three weeks now. Granted, the devices target different markets, if for no other reason than size (12.9 and 10.2 inches, respectively). But each is innovative and stylish and would make great presents for someone. I'm ready to buy, Google. As surely are many Android fanboys. I reached out to the PR staff there today and was told to "stay tuned", which could be interpreted as soon. We shall see, eh?
Microsoft continues to earn its enterprise dominance with new business solutions


When I am doing personal computing at home, I will often use Ubuntu and LibreOffice. Free and open source solutions are more than enough for my personal needs. Hell, I can sometimes even get by with a Chromebook if my needs are very light.
When it comes to the enterprise, however, and getting serious work done, I depend on Microsoft and its closed source solutions. Software like Office 2016, SharePoint and Skype for Business are absolutely brilliant. The company has earned its dominance in the business space. Today, at the Convergence EMEA conference, it announces new solutions that further cement the company's reign of the enterprise.
Is your network ready for IoT devices?


The stats are here: investment bank Goldman Sachs cites the Internet of Things as a $7 trillion opportunity by 2020 -- with IoT set to have an impact at every stage in the production and distribution of products.
Wikibon predicts the value of efficiency savings from machine data alone could reach close to $1.3 trillion and will drive $514 billion in IT spend by 2020. Manish Sablok, head of Field Marketing, North West and East Europe at ALE, looks at the four fundamental network requirements to enable businesses to take full advantage of the transformations that IoT will drive.
Windows 10 on Mac: Boot Camp vs Parallels


If you want to run Windows 10 on a Mac there are really only two options worth considering: a native install using Boot Camp or virtualization through Parallels. Each is excellent in its own right, but which one best meets your needs?
Trying to answer that question can prove to be a daunting task for many Mac users, based on my experience. The conundrum: Boot Camp is easy to use and readily available in OS X, while Parallels is the most versatile software of its kind for OS X. It's not easy. Fortunately, this article will help you understand which one is right for you.
Spoiler alert! Google reveals the trending gift searches for Cyber Monday


Black Friday is out of the way (not that it is really restricted to just one day this year) and now it's time for Cyber Monday. Traditionally -- if the word can be applied to such a recent phenomenon -- this is the day when you can snap up a techy bargain in time for Christmas, and Google has shed some light on what people are searching for this year.
The search data is like peering into the future. The searches of today, are the gifts of next month. If you want to get an idea of what your nearest and dearest might be popping under the tree for you this year, the top trend gift searches could give you some pointers. Warning: there may be gift spoilers ahead.
How to keep your mobile data safe


Every month we see another story hit the headlines of how a household name has lost customer data. These type of incidents can cost millions to put right, not just in updating the IT systems, but in terms of lost revenue due to loss of good reputation, and potentially punitive fines.
When the new EU General Data Protection Regulation (GDPR) comes into force, expected during 2017, fines for non-compliance could be five percent of global turnover. This is a significant sum for any size of organization and deserves serious consideration.
Government enterprise surveillance demands drive BlackBerry to quit Pakistan


BlackBerry wants nothing more to do with Pakistan. The Pakistani government had demanded that it be permitted to monitor BlackBerry Enterprise Service emails and BBM messages. Unwilling to bow to these demands, the company has decided to pull out of the country entirely.
From the end of 2015, BlackBerry will no longer operate in Pakistan as the company says that it does not want to compromise its customers' privacy. Unwilling to comply with surveillance directives or show any sort of support for backdoors, BlackBerry has decided to cut its losses and run.
The benefits of disaster recovery in the cloud


As more systems are moving to the cloud it's leading to an evolution in requirements for disaster recovery.
Irish IT solutions company ERS Computer Solutions has produced an infographic looking at how companies can benefit from disaster recovery in the cloud.
Taking enterprise security to the next level with two-factor authentication


Two-factor authentication (2FA) has been about for much longer than you think. For a decade or more we have been used to being issued with a card reader (in essence a hardware token device) to use with our bank card and Personal Identification Number (PIN) when looking to complete our internet banking transactions.
2FA technology has also, over the past years, been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice.
Amazon unveils new hybrid drone prototype for 30-minute Prime Air deliveries


When you make an impulse purchase -- or you're just an impatient type -- time is of the essence. Next day delivery is far too slow, and same-day delivery has gradually spread to certain places. Some cities have the option of delivery within the hour, but Amazon is working on cutting this down to as little as 30 minutes with Prime Air.
As you would probably expect, these super-speedy deliveries will be facilitated by drones, and Amazon has unveiled a new prototype drone that blends elements of a helicopter with those of an airplane. Unlike other drones we’ve seen the Prime Air model is quite large, and is capable of carrying up to 5 pounds.
How to: Find your misplaced phone with Amazon Echo and IFTTT


Amazon just recently introduced support for IFTTT (If This Then That) to its Echo product. The company is pushing fairly hard to add functionality to its device. On a regular basis you will find a new addition at the top of the app when you fire it up on your phone or tablet.
With the introduction of IFTTT Triggers Alexa can now do even more. There are a number of recipes to choose from, but setting them up, in most cases, is pretty similar. Many involve your phone so be prepared to turn your number over, though neither entities have given reason for mistrust.
NSA stops bulk collection of phone metadata


The NSA's bulk surveillance and collection of phone data has come to an end. President Obama announced that the current surveillance program would stop by 11:59 pm EST Saturday, but this does not mean that phone surveillance has completely disappeared.
Instead of wide scale dredging of data, the NSA will now engage in more targeted surveillance programs -- something that privacy advocates have been calling for for some time. The scaling back of surveillance has not come out of the blue; it's became of a legal requirement earlier in the year that has now been implemented two and half years after Edward Snowden blew the whistle on NSA spying.
Google to work with Israel to censor Palestinian YouTube videos [UPDATED]


Coverage of any conflict is rarely free from bias, with propaganda being a staple tool. This certainly rings true of the war between Israel and Palestine, and Israeli Deputy Foreign Minister has engaged in talks with representatives of YouTube and Google with a view to censoring videos coming out of the region.
Tzipi Hotovely met with Google's Director of Public Policy, Jennifer Oztzistzki, and YouTube CEO Susan Wojcicki. On the agenda was discussion about how to censor Palestinian video footage deemed to be "inflammatory" or "inciting violence and terrorism" by Tel Aviv.
Holiday 2015 Gift Guide: Smartphones


If you're smartphone shopping this holiday and wondering what to buy, my primer can assist—with caveats. I focus solely on Androids that are higher end but affordable, and I ignore iPhones. No slight against Apple devices is intended. I figure that people who want an iPhone won't likely consider an alternative. Also: The differences aren't as pronounced. For example, the major benefit choosing 6s or 6s Plus over the two previous models is slightly lower price (3D Touch is an unnecessary gimmick). The major benefit picking 5s over the 6 or 6 Plus is again price but also smaller size.
Among Androids, differences abound—and many, such as older OS versions or custom UI skins, are carrier or manufacturer imposed. That's without considering the bloatware that either or both parties might impose. I intentionally focus on devices that offer the most value for price paid, which includes upfront or payment-plan purchased unlocked.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.