Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

It's not unknown for technology companies to run bounty programs that reward bug hunters for unearthing problems with software. Discover a security vulnerability and you could be in line for a nice cash bonus. Microsoft is one firm that runs such a program, and today the Microsoft Bounty Program is being expanded -- with a particular focus on Azure and Project Spartan.

Microsoft has already been asking for feedback about Windows 10 Technical Preview, but this is the first time a financial reward has been offered for pointing out security issues with any of its components. The maximum pay-out has been increased to $15,000 USD, so there's more incentive than ever to seek out problems and report them to Microsoft.

By Sofia Elizabella Wyciślik-Wilson -
Facebook's Hello app tells you who's calling before you pick up

Facebook Hello tells you who's calling before you pick up

It's easily forgotten with the number of apps available, but mobile phones are primarily designed for making calls on the move -- whodda thunk it? When you receive a call you'll usually see the number of the caller, but this may not be helpful in identifying them before you decide whether to pick up. Facebook's answer to this problem is Hello.

This new app comes from the Facebook Messenger team and aims to tell you more about the person getting in touch with you even if you don’t have their number saved in your address book. Currently available for Android, the dialer app also allows for the blocking of calls from individuals.

By Sofia Elizabella Wyciślik-Wilson -
vividvminkeyubuntu

Ubuntu Linux 15.04 Vivid Vervet is here

Today is Wednesday, aka "Hump Day". The middle of the work week can be quite the miserable day. If you are stuck in a soul-sucking corporate job, it means you still have a long way to go before the weekend brings sweet release.

Don't worry, people, I have good news; this is a very special Wednesday. Why? One of the world's best Linux-based operating systems, Ubuntu, sees a stable and final release of 15.04, codenamed Vivid Vervet (it's a type of monkey). At the end of today's work day, you can hopefully go home and try out the latest version of the popular Linux distribution -- once the download links go live, that is.

By Brian Fagioli -
Anonymous declares war on Lizard Squad after DDoS attacks on game networks

Anonymous, LulzSec, Guardians of Peace... A guide to the most notorious hacking groups

In 2015, the number of cyber-attacks and data breaches being reported by companies and governments across the world does not appear to be decreasing. Many high profile attacks have taken place in the past year alone. As a result of government investigations into cyber-attacks, it was discovered that many of these attacks are not the work of a single criminal acting alone.

In fact, organized hacking groups are increasingly responsible for these incidents. As time goes on, the data breaches and attacks are becoming more devastating and authorities are looking to see who is behind these events in order to stop these groups from organizing further. As the world becomes more technologically integrated, cyber-attacks pose issues of national security that need to be addressed.

By Daniel Alarcon -
Privacy policy

Corporate privacy policies are out of step with protecting sensitive data

Technology makes it easier than ever for businesses to collect data but that also means they have greater responsibility for looking after it.

Data protection specialist Druva has released the results of a new study conducted by Dimensional Research which examines companies' efforts to protect sensitive data, the challenges they face ensuring data privacy and gathers respondent views on protecting data privacy in the cloud.

By Ian Barker -
mobile lightning

You're more likely to be struck by lightning than hit by mobile malware

We constantly see stories about the latest threat from malware, particularly relating to mobile devices. But is it really as bad as it's made out to be?

No, says threat detection and containment specialist Damballa which is unveiling new research based on its big data analysis of almost half of US mobile traffic.

By Ian Barker -
safari king

Safari is king of the mobile browsers -- which could be bad news for Google

Google’s dominance of the web is best illustrated by Mobilegeddon. The search giant has made changes to its algorithm, prioritizing sites that are "mobile friendly" and demoting those that aren’t. Google says that mobile-friendliness is just one of 200 signals that it uses to determine the ranking of results and that sites which don’t have mobile versions won’t disappear as a result of this change. That said, the truth is if Google says you need a mobile site -- that it approves of -- then you need a mobile site.

But while Google is forcing sites to offer mobile friendly versions or suffer the consequences, it’s Apple’s browser that the majority of people are using to access the web while on the go.

By Wayne Williams -
Business laptop graph

New tools help speed up the unlocking of business intelligence

Where business intelligence is concerned it's often the case that companies don't lack data. However, they struggle to use the information they have in a way that offers meaningful insights.

San Francisco-based cloud analytics provider GoodData is releasing some new additions to its platform to break down the barriers of traditional business intelligence and improve self-service options without compromising the IT department's need for data governance and integrity.

By Ian Barker -
Microsoft steps into the future with HoloLens, holographic computing meets virtual reality

Microsoft confirms Windows 10 universal apps will work on HoloLens

Microsoft has launched a question and answer section for Windows Holographic and the HoloLens headset, sent in an email to Windows 10 'Insiders' currently testing the new updates to the operating system.

The FAQ answers ten of the most popular questions on HoloLens, before Microsoft’s annual BUILD conference on April 29th to May 1st. Amongst the answers, Microsoft details that HoloLens will be able to run Windows 10 universal apps.

By David Curry -
Busy office

Office 365 Video begins its worldwide rollout

Back in November we told you about Office 365 Video, although at the time it was only available for First Release customers. The service, if you recall, brings video sharing to the enterprise, allowing customers to manage and post, as well as making it available across all devices -- PC, tablet and phone. Microsoft also claims that it will be automatically optimized for each device.

Now the service is rolling out worldwide, so everyone can begin putting it to use for training videos, company messages and the like. Microsoft's Claire Tutill states that "Video is fast becoming one of the most powerful forms of communication, so this is a very exciting development for Office 365 users".

By Alan Buckingham -
Hacker detection

Cybercrime gets smarter and more complex

There are 85,000 new malicious IPs launched every day and the top phishing targets are technology companies and financial institutions.

These are among the findings of a new report from threat intelligence and security company Webroot. The Webroot 2015 Threat Brief provides the latest cyber threat trends collected from tens of millions of users and over 30 security technology partners.

By Ian Barker -
16GB iPhones and iPhones quake in fear as Apple increases maximum app size to 4GB

iOS 8 vulnerability can send iPhones, iPads into reboot loop

At the 2015 RSA Conference, security researchers from Skycure showcased a new iOS 8 vulnerability which, if properly exploited, can send iPhones and iPads connected to a malicious hotspot into a reboot loop. The vulnerability affects both the operating system as well as apps which use SSL to communicate.

All that an attacker has to do to exploit the vulnerability is to set up a router in a "specific configuration", and allow anyone to connect (basically make it an open hotspot). The iOS 8 devices that connect will be affected, without the attacker having to have access to them.

By Mihăiță Bamburic -
facebook_logo

Facebook revamps your newsfeed yet again

Facebook is, once again, making changes to the algorithm that controls what appears in newsfeeds. If you had ever been under the impression that you were going to see a chronological list of status updates from your friends in your newsfeed, numerous changes over the years will have put paid to that notion.

It has been a source of many a social networking grumble, and now Facebook is taking steps to address the issue. Depending on how you use Facebook, you may be connected to not only real-world friends, but also companies, celebrities and even TV shows. Your newsfeed has likely turned into less of a collection of bon mots from your mates and more of a stream of updates from entities you're only vaguely interested in. Now your friends will be given greater priority.

By Sofia Elizabella Wyciślik-Wilson -
MemReduct200-175

Mem Reduct: a memory cleaner which isn't rubbish

Let’s be frank: most memory cleaners are garbage. They’ll lure you in with bogus claims about fixing memory leaks, dazzle you with flashy interfaces and colorful graphs, yet usually make no difference at all to system performance (or even slow you down) because they’re doing something Windows does as required, all on its own.

If you still think they might help you anyway, there are a few more honest and capable tools you can try, and Mem Reduct is a great example.

By Mike Williams -
cloud money dollars

Funding for SaaS businesses grows by 70 percent

Software as a Service (SaaS) is one of the biggest technology growth areas at the moment. That's reflected in the amounts of capital being pumped into the sector by investors.

A new SaaS Trends Report by Tibco Analytics and venture capital tracker CB Insights shows that funding for SaaS companies was $11.7 billion in 2014, up 70 percent over the past year. SaaS funding has tripled since 2011.

By Ian Barker -

© 1998-2025 BetaNews, Inc. All Rights Reserved.