Sony hack leads to unreleased movies leaking online


A number of unreleased movies, as well as some confidential data, has been leaked online following a massive hack at Sony Pictures that happened last week.
In the Reddit thread covering the issue it says that, movies aside, confidential data including visa and passport information of cast and crew members working on different Sony projects, email inboxes and other important documents were leaked.
TV 3.0 is already here


Ethernet inventor Bob Metcalfe, when I worked for him 20 years ago, taught me that we tend to over-estimate change in the short term and under-estimate it in the long term. So it can be pretty obvious what is coming but not at all obvious when. And what we know about the when of it is that making money from new technologies is often a matter of investing right before that bend upward in the hockey stick of exponential change.
We all know television is bound to enter a new era sooner or later. Heck, I’ve written dozens of columns on the subject over my 17 years in this job. But this is the first time I feel confident in saying when this TV transition will take place. It already has. Forces are already in motion that will completely transform TV over the next 24 months. Come back two years from today and it will all be different with at least a few new leaders and a few icons gone bust. Get ready for TV 3.0.
View and convert EPS/ PS files with EPS Viewer


Adobe’s Encapsulated PostScript (EPS) is a powerful graphics format which first appeared almost 30 years ago, so you might have expected there to be plenty of viewers around by now. But no: it’s so horribly complex that most image viewers either ignore the format entirely, or offer basic support, but with very unreliable results.
There are specialist tools which claim they’re different. The free EPS Viewer not only displays EPS/ PS files, but can also convert them to a few bitmap formats (JPEG, PNG, GIF, TIFF). Is it really better than the leading image viewers, though? We grabbed a test copy.
Microsoft Research thinks Haven might be the answer to cloud storage security problems


Storing your data in the cloud requires you to place trust in a company and its service. Whether you're talking about Dropbox, Google Drive or an enterprise level solution, security is of paramount importance. There have been numerous high profile cases in recent months in which data breaches have occurred and private data has been accessed by unauthorized people -- including the NSA et al. It's little wonder that many people are wary of moving entirely to the cloud.
But Microsoft Research may have a solution. A small team of researchers came up with the idea of Haven, a cloud system that introduces the idea of shielded execution. This is a platform designed not just for storing data, but also to securely run cloud-based applications, including those based on legacy code.
Microsoft replaces Office clip art and image library with Bing Image Search


If you have ever created or sat through a PowerPoint presentation for work, or created a report for school lately, you've surely seen or used clip art. There is nothing inherently wrong with using images to enhance a presentation or document, but the clip art in Office has been downright terrible. The images are typically outdated and cliched examples of business life, drawn by artists who likely came straight from hell (I kid -- actually, I bet they are very nice people).
Today, we may have finally seen the last of these horrid Pablo Picasso-esque nightmares, as Microsoft kills the Office clip art and image library. This is surely a time for celebration, but you are probably wondering where you will get images for your next quarterly presentation. No worries, Microsoft will now be directing users of Office to Bing Image Search instead.
Student registrations open for Google Code-In 2014


Google Code-In has been running for a few years now and serves as a platform for promoting the importance of programming and computer science to students. The current batch of computing student represents the next breed of app coders, website designers and computer experts. Google is keen to encourage teenagers to get involved and today is the day that registrations open for Google Code-In 2014.
One of the aims of the event is to promote the open source community, and encourage 13-17 year olds to get involved in whatever way they can. Google Code-In is a contest but it has been set up in such a way that it simulates working on a real-world open source project.
StatCounter: Windows 8.1 is now more popular than XP


It still has plenty of haters, but Windows 8.1 is finally finding an audience. It may not be anywhere near as sizable as the audience Windows 7 commands, but after losing usage share earlier in the year, the tiled OS is finally headed in the right direction, and at speed.
Earlier today I reported on NetMarketShare’s figures which show Windows 8.1 as having 12.10 percent of the desktop OS market, but now StatCounter has released its own figures which show Windows 8.1 as having just hit a pretty special milestone -- overtaking Windows XP for the first time.
Does your company need an Intrusion Detection System?


Unauthorized access to networks is currently one of the most serious threats to the hosting business. Intruders and viruses present the two biggest security threats to the industry. Let us examine three key definitions: intruders (or hackers), intrusion, which is a formal term for describing the act of compromising a network or system, and Intrusion Detection Systems, which help business detect when they are vulnerable to an attack.
Intruders can be external or internal and their intents may vary from benign to serious. Statistically 80 percent of security breaches are committed by internal users and these are by far the most difficult to detect and prevent. These intruders create a significant issue for network systems and IT equipment. Intruders come in a variety of classes with a varying level of competence -- an external user without authorized access to the system will want to penetrate the system to exploit legitimate user accounts to access data, programs or resources with a purpose of misuse. Intruders may even use compromised systems to launch attacks.
Track weather for any ZIP code with WeatherDan


Rain? Wind? Ice? Snow? Just about everyone needs to know what’s happening next with the weather, and there are a vast number of tools and websites to keep you up-to-date.
Most weather monitors try to win you over by piling on the features: multiple locations, detailed long-term graphs, customized alerts, whatever it might be. The results can be very powerful, but also bulky and complex.
Girl Scouts launch Digital Cookie -- buy Thin Mints and Do-si-dos online without shame


As a fat guy, I am an easy mark for the Girl Scouts. When they knock on my door and ask me if I want to buy cookies, that question is rhetorical; of course I want them! Heck, they don't only get me at home, but in public too. Coming out of the grocery store, they will often be camping out for sales. There too, I gladly buy a box of cookies, feeling ashamed as I walk to my car.
I can't speak for all fat people, but myself and others may feel embarrassed to buy cookies, when we are already so out of shape. Yes, it is for a good cause, but you imagine people seeing you buy them, and judging you; perhaps rightfully so. Today, however, this changes as the Girl Scouts are going online with Digital Cookie; you will soon be able to buy the cookies directly online. In other words, I can buy Thin Mints and Do-si-dos without shame or judgment.
Consumers warned to be on the alert for Cyber Monday scams


Cyber Monday is once again set to break records for online sales and web traffic, but there’s a darker side to the day too.
Social risk management company ZeroFOX has released the results of some research into the risks associated with the Cyber Monday spending spree.
Microsoft acquires mobile email firm Acompli -- this time it's for real


As first revealed on BetaNews just before Thanksgiving, a rogue Microsoft blog post seemed to let slip that the company was on the verge of acquiring Acompli. Now it's official. Both Microsoft and Acompli have confirmed that the acquisition is going ahead and the "innovative mobile email apps for iOS and Android" are now in the hands of Microsoft. Seen by many as the mobile app that Outlook.com deserves, Acompli fits neatly into Microsoft's plan to expand further into mobile realms.
Corporate Vice President of Outlook and Office 365, Rajesh Jha says "it's essential to give people fantastic email experiences wherever they go". The existing Acompli app is destined to become integrated into the work already carried out by the Outlook team. While iOS and Android are both mentioned, no reference is made to Windows Phone.
Enterprise mobility set to remain a hot topic for 2015


It's that time of year when industry analysts like to start rolling out their predictions for the year ahead. One of the first out of the blocks is technology research specialist Ovum with a new report on enterprise mobility.
Up to now mobility has been driven by the consumer market with employees demanding to use their own devices in the workplace. Among Ovum's predictions are that this will continue to lead to a 'mobility mismatch' where employee demand isn't matched by IT department's ability to deliver.
Permission-free post-loading lets carriers push crap apps to Android handsets


It used to be that you'd buy a new PC or laptop and have to spend the first hour or so removing all of the crap that the manufacturer had installed. The same idea carried across to mobile phones, particularly in the case of Android handsets, but the key difference is that -- at least without rooting -- many carrier apps can be all but impossible to remove. Now, thanks to "post-loading" the problem is about to get worse.
As the term suggests, post-loading makes it possible for a carrier to push apps to handsets and install them secretly. This is all thanks to Digital Turbine's Ignite system, and the likes of Vodafone, Verizon, T-Mobile and more are listed as clients. Of course, it's all about money or, as Digital Turbine puts it, "maximizing the efficiency of pre and post loading applications on smartphones for more advertising revenue".
Intel acquires password management solution PasswordBox


Having a strong and unique password for every website you visit is a great idea. Unfortunately, there is a major problem with that -- it can be impossible to remember them all. If it becomes a tedious affair, users will start recycling passwords for multiple sites, which is a huge best-practice "no-no". Think about it; if a hacker gets your password from one site, they now have it for other sites too. Even worse than recycling passwords? Writing them down on Post-It-Notes and sticking them on a monitor.
While it is easy to judge people for not securing their passwords, remember, it is not their fault that current systems are deficient. True, there are password management solutions by various companies, but how can a user know which one to trust? Luckily, consumers will soon have a very trustworthy name available -- Intel. Today, that company announces it is acquiring password management solution PasswordBox.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.