Apple could track your iPhone, iPad when turned off


Apple has been granted a patent that could potentially allow it to track an individual’s iPhone, even when it appears to have been turned off.
The feature enables phones to enter a sleep-like state that suggests it has been shut down, but instead the phone’s movements can still be traced.
Enterprises fail to get the best from mobile messaging initiatives


A new report from IDC and enterprise mobile specialist Amdoc's OpenMarket reveals that taking an ad hoc approach to mobile messaging is harming return on investment.
The findings reveal that 62 percent of businesses have more than one messaging platform deployed and 78.5 percent have more than one instance of the same platform active across different departments.
Exciting new experimental apps emerge from Microsoft Garage


Microsoft Garage is home to all manner of innovative projects from Microsoft employees, and today a new batch of projects has been unveiled. As Garage is a cross-platform venture, there are apps for Windows Phone, Android and desktop Windows, and the myriad tools cover everything from app development to the weather.
On the productivity front, Mouse Without Borders is a name that might seem familiar. Strictly speaking, this is a re-release rather than a new release, and the utility makes it possible to control up to four computers with a single keyboard and mouse by acting like a virtual KVM switch. If this isn’t your sort of thing, there are plenty more tools to explore.
New solution makes online payments simpler for small businesses


Being able to do business online is almost essential these days, but for smaller companies the mechanisms needed to accept payments can prove complex and expensive.
Specialist in web client engagement software for small businesses vCita is making things simpler with the launch of its new, seamless online payment solution for service-based small businesses.
Technician's Toolbox is a portable troubleshooting toolkit


Utilities developer Tweaking.com has released Technician’s Toolbox and Technician’s Toolbox Portable, a free-for-personal-use suite of 20+ PC maintenance, monitoring and management tools.
Networking features are a highlight, with a graphical netstat, in-depth details on your network adapters, traffic monitoring, DNS server management, an IP subnet calculator, network scanner and more.
Smart glasses, coming soon to an enterprise near you


Up to now smart glasses have been a bit of a gimmick, but they could soon be making a major impact in the enterprise market, allowing workers to communicate as they carry out tasks.
Eyewear technology company Vuzix has announced a partnership to use its Vuzix M100 Smart Glasses for the EyeSight platform from wearable software specialist Pristine. Customers taking advantage of the combined Pristine and Vuzix platform will benefit from impressive video quality, strong integrations into safety goggles and a vertically adjustable camera, useful for surgery and hands-on repair tasks.
Seagate Wireless: Portable mobile storage that can stream media to up to three devices at once [Review]


Unless you and your family are into just the one tech manufacturer -- Apple say -- the chances are you will have various devices running different operating systems. In my home, for example, there are three Windows PCs, two Android phones, two Android tablets, an iPad and an iPhone. All of which have media -- photos, videos, music -- stored on them.
There are various ways to make all of this content accessible across the different devices, but Seagate Wireless from Ebuyer is a simple, yet powerful solution. It’s a portable, battery powered 500GB drive with a built-in wireless network that can stream content to up to three smartphones, tablets and laptops simultaneously.
Data classification is the key to protecting information


Although organizations are increasingly concerned about data protection many of them don’t have the appropriate tools in place to secure their information.
According to a new report from data loss prevention specialists Boldon James compiled by Bloor Research, although over half of organizations see data security as a major concern 47 percent say they don't have a data classification tool.
Pebble Time can make it without Kickstarter, but why bother?


Pebble launched its first smartwatch through Kickstarter, raising more than $10 million from nearly 70,000 backers. It's one of the most successful campaigns to ever be hosted on the crowdsourcing site. Some might say that it's time for Pebble to move on to the next level.
However, earlier this week Pebble used Kickstarter once again to launch its latest smartwatch, called Pebble Time. The company's second crowdsourcing campaign is a huge hit, days after its start, surpassing its initial goal of just $500,000 by nearly $8 million at the time of writing this article, with 30 more days to go before the grand finale.
Reddit imposes ban on non-consensual sexual content


If you want to post naked pictures or videos of people on Reddit without their consent, you only have a couple of weeks to do so. As of March, the site is imposing a ban on content of an explicit nature that the subject has not given permission to be posted.
The cleanup of the site comes hot on the heels of news from Google that explicit content will be banned from Blogger. It also comes in the wake of last year’s Fappening which saw a glut of naked celebrity photos leaked online.
Gemalto confirms hack on network, but says it didn't result in massive theft of SIM card keys


Gemalto, the world’s largest producer of SIM cards which reportedly had its encryption keys stolen by the NSA and GCHQ spying agencies, announced today that its network was hacked, but it didn’t result in massive theft of keys used to encrypt conversations, messages and data traffic, a conclusion it reached after a thorough investigation.
The Netherlands-based SIM manufacturer says that it noted sophisticated attacks on its networks between 2010 and 2011 that appear to have been carried out by the aforementioned intelligence agencies. But the company notes that the agencies couldn’t get in far enough to get access to SIM encryption keys.
CCleaner 5.03 improves support for Windows 10, enhances Chrome cleaning


Piriform Ltd has today released CCleaner 5.03 and CCleaner Portable 5.03, the latest revisions of its popular Windows maintenance tool.
The build brings new support for cleaning Google Chrome IndexedDB, a technology which websites can use to persistently store data within a visitor’s browser.
WatchESPN hits Roku, more channels on the way


Sports is the great pain of the cord-cutter -- networks force set-top box providers to verify a cable or satellite account to log into their channels, at least in many cases. The latest addition to Roku changes that somewhat, though not enough to satisfy most customers.
The manufacturer is introducing WatchESPN as a new channel on its product. You'll get everything -- right after you verify your subscription. Otherwise, you'll have access to news clips. Not terrible, and certainly better than nothing, but also not what we want to hear.
Google's Pwnium V to last forever and offer unlimited money rewards -- get rich, y'all!


Paying developers and users for discovering security vulnerabilities has become rather commonplace. You know what? Good. Why shouldn't the "average Joe" have the opportunity to earn some cheddar in exchange for making software more secure? It's a win / win proposition.
Every year, Google announces the annual Pwnium event, in which people have one day to show off a Chrome browser or Chrome OS exploit and get money. The problem? Limiting this activity to one day per year limits the opportunity. In other words, why not pay people all year long for discovering exploits? Well, Google is doing exactly that; Pwnium V will last forever and offer unlimited money rewards. Ready to get rich?
Tails reaches 1.3 -- the Linux distro that Edward Snowden used gets major update


If you have nothing to hide, you shouldn't care if the government spies on you, right? Wrong. No stupider words can ever be spoken. Your privacy should be very valuable to you, even if you only do squeaky-clean things. If someone was to snoop on my computer, they wouldn't find much; some family photos, a few games and other nonsense. Guess what? It is my nonsense, and I'll do whatever it takes to secure it.
If you want to cover your tracks, however, the best way is to use a CD or DVD-based operating system, as there is no hard drive access -- everything is run from the read-only medium. To be sure, you can physically remove the hard drive from your machine. A flash drive or SD Card can be used too, but they are less secure as both can be written to. Edward Snowden took this approach when he wanted to hide from the NSA. His OS of choice? The Linux-based Tails. Today, it hits version 1.3 and many security issues have been fixed.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.