Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

Emblem of the Government of China

China is the victim of an Internet smear campaign, alleges its government

In its latest and broadest-ranging official statement since a major policy conference last week at the US State Department, aligning American foreign policy with "Internet freedom" and directing skepticism against China, the Chinese government said this morning it had absolutely nothing to do with any cyber-attack on anyone's Internet assets. China was careful not to mention Google by name, which might have been interpreted as an acknowledgment that such an attack happened.

"Accusation that the Chinese government participated in cyber attack, either in an explicit or inexplicit way, is groundless and aims to denigrate China," reads an official China government statement issued through the Xinhua news agency. "We firmly opposed to that [sic]. China's policy on Internet safety is transparent and consistent... China is the biggest victim country of hacking as its Internet has long been facing severe threats of hacker and online virus attacks."

By Scott M. Fulton, III -
NASA map using GeoServer

Open source mapping software meets the enterprise

The Open Planning Project (TOPP) is a nonprofit organization that advocates the use of free and open source software in the public sector, and for more than ten years, TOPP's OpenGeo initiative has worked on creating an open environment for sharing geospatial data. Its principal product, GeoServer, is a free Java-based Geographic Information server built on open standards which lets users share and edit public geographic data.

Following the GeoServer 2.0.1 update that was released last week, OpenGeo today released OpenGeo Suite Enterprise Edition 1.0, the complete package of open source mapping software that OpenGeo will professionally support.

By Tim Conneally -
A morphed photograph of Brad Pitt with Angelina Jolie.  [Courtesy MorphThing.com]

Twitter couldn't save Brangelina

I'm not one to follow the lives of celebrities. I don't watch TMZ, and the very sound of Entertainment Tonight's Mary Hart's voice is enough to make me nauseous. I turn my head as I walk past the supermarket tabloids in the checkout aisle because I could care less who Jennifer Aniston is dating this week or that Elvis was spotted in a rural Kentucky laundromat. I've got better things to do with my life than wonder how many more kids Angelina Jolie and Brad Pitt want to adopt or when she plans on getting another tattoo.

For all my celeb-fatigue, though, I found it interesting this past weekend when I first learned about the Brangelina supercouple's separation not from television, radio, or a newspaper, but from my Twitter feed. After I sarcastically retweeted the supposed news, I heard from a number of friends that they, too, had gotten the news from online sources.

By carmilevy -
LTE logo

Early LTE deployments are no faster than HSPA, says report

It appears that the United States isn't the only place where broadband performance in the real world is vastly different from the performance promised by carriers in advertisements.

Leading Scandinavian mobile network operator Teliasonera AB launched the first two commercial 4G wireless networks based on LTE in mid-December. On the company's Web site, the service is being billed as "10 times faster than 3G" with downlink speeds up 50 megabits per second.

By Tim Conneally -
Microsoft Office 2010 main story banner

Microsoft Office is obsolete, or soon will be

This month's Office 2010 retail pricing announcement and ongoing discounts for Office 2007 Home and Student are Microsoft's tacit acknowledgment that the productivity suite isn't as valuable as it once was. Office is tracking a course of unplanned obsolescence and the inevitable end shared by oh-so many other products: Commoditization. Desktop productivity suite commoditization is inevitable, and it is a force that Microsoft can resist but not stop. Additionally, Microsoft faces a fundamental shift in what content people create and where. Commoditization and the emerging mobile device-to-cloud services applications stack are Office killers.

I'll ask upfront: Do you really need Microsoft Office on a daily basis? Is Office vital to your work day? Do you use it at home? If you use it at work, how often? If you use it at home or for college, how often? Please respond in comments.

By Joe Wilcox -
'The international Chinese Communist conspiracy,' as envisioned by legendary Monty Python animator Terry Gilliam.

The Internet Explorer fracas: Let's find something else worth dumping

Fair warning, everyone: What follows is my opinion. Given the propensity of opinion traffic on the Web, I shouldn't have to say this: It truly is my opinion. Nothing to which I attach my byline or my face has been adjusted or colored in order to more thoroughly polarize my characterization of the subjects I cover, or to agitate your feelings so as to prompt you to post comments.

In fact, in all sincerity, I realized long ago that I'm not a very polarizing figure, I've accepted that fact, and I've come to embrace it. The art of persuasion, I was taught centuries ago, was developed with the aim of getting other people to agree with you. I'd like to get a hold of the person by the tea bags who came up with this notion that popularity must be driven by populism, which in turn can only be generated through agitation, anger, and outrage, hoist him onto a flagpole, and tell him flat out, "Rush, Americans are smarter, more sensible, wiser, and more capable than you think they are or than you would have them become."

By Scott M. Fulton, III -
RIM BlackBerry Curve 8530 from Verizon Wireless

Motorola strikes out against RIM for mobile patent infringement

Mobile technology patents are golden, and the battles over intellectual property between major players in the mobile device space keep getting deeper. Today, Motorola filed a complaint with the US International Trade Commission, charging BlackBerry maker Research in Motion with patent infringement.

Motorola is asking the ITC to investigate RIM's alleged infringement of five patents on "early stage innovations" such as Wi-Fi access, user interfaces, and application and power management.

By Tim Conneally -
Steve Ballmer and Tablet PC

Microsoft, don't give up on Steve Ballmer just yet

Ten years ago last week -- Jan. 14, 2000 -- Steve Ballmer took over the chief executive's position as Bill Gates stepped back to be Microsoft chairman and chief software architect. Ballmer has officially entered his second decade as Microsoft's CEO. There are fairly constant complaints about Microsoft's performance under his leadership.

NBC is sending Conan O'Brien packing; today ends his seven-month career as "The Tonight Show" host. Should Microsoft do something similar -- remove Ballmer and replace him with someone else, even Gates in a move like Jay Leno coming back and replacing O'Brien? I expect that many commenters to this post will answer "YES!" to that question. But I wouldn't give up on Ballmer just yet.

By Joe Wilcox -
USB Longhorn

Data encryption tool maker: Antivirus has become ineffective

The following commentary is by Mark Smail, the CTO of Onix International, which distributes a data encryption tool called EncryptStick, designed to work with USB thumb drives. This is not an advertisement; Betanews is merely presenting Mr. Smail's point of view.

Consumers are growing increasingly comfortable storing sensitive information on their computers, USB flash drives, and external hard drives, as well as using Web-based solutions to automate regular tasks such as shopping for holiday gifts, paying bills, and tracking financial portfolios. The push from vendors encouraging their customers to move toward e-billing has also played a major role in more personal information being stored locally on personal computers.

By Mark Smail, TechNewsWorld -
Intel Atom badge

Apple tablet could give ARM the lion's share of UMPC architectures

Convergence in computing is an exciting trend to watch, and as our devices improve, they start to take on the characteristics of each other. Our mobile PCs are getting lighter, flatter, and more touchable with better perpetual connections; and our mobile phone screens are getting bigger, their processors are getting more powerful, and they're interacting with the many of the same services we use on our PCs.

Even if the mystery Apple product next week doesn't look exactly like a "big iPhone," the fact that many people already assume that's what it will be, is a sign of the strong current of convergence in consumer electronics.

By Tim Conneally -
History's most iconic living symbol of the individual's stand against government oppression: one brave Chinese citizen against a column of tanks.

Google's deal with the devil: Declaring war in China while competitors wimp out

I was just old enough to remember, and appreciate the significance of, the Tiananmen Square Massacre in 1989. The iconic image of a dissident standing defiantly in front of a column of People's Liberation Army tanks is as powerful today as it was when we first saw it.

Back then, activists fighting for greater freedom used surreptitiously acquired fax machines to get the word out to the rest of the world. It was an early sign that technology held the potential to undercut control-freak-government efforts to stifle free speech. Now that the Internet has taken over as the platform of choice for Chinese freedom-lovers and freedom-crushers alike, the battleground has shifted irrevocably, and the autocratic Chinese government hardly has enough political officers to keep its spy game machinery in balance.

By carmilevy -
Oracle main story banner

EU clears Oracle + Sun: If MySQL fails, there's always PostgreSQL

In green-lighting Oracle's proposed acquisition of Sun Microsystems today, the European Commission says it considered whether in doing so, Oracle would effectively eliminate the "competitive constraint" of competition from the open source field by way of MySQL, the open source relational database that Sun acquired in 2008. That acquisition gave Sun its first competitive database product; but Oracle already has one of the leading commercial entries.

The conclusion the Commission reached today is a surprising one, especially from Competition Commissioner Neelie Kroes just days before a planned Commission-wide job swap. Kroes had been seen as a protector of the interests of open source alternatives as a plurality. But in today's decision, the EC implied that the open source field only needed one active competitor to be relevant. If that competitor for some reason stops being MySQL, it announced, then PostgreSQL can step in and fill its shoes.

By Scott M. Fulton, III -
A typical authentication / password / login prompt

Security report: Web users pick passwords that are way too easy to hack

According to a report on Consumer Password Best Practices culled from an analysis of 32 million passwords exposed in the recent Rockyou.com Web security breach, the three most commonly used passwords among users of the Rockyou social networking site turned out to be 123456, 12345, and 123456789.

Also making in into the top ten, in this order, were the following: Password, iloveyou, princess, rockyou, 1234567, 12345678, and abc123.

By Jacqueline Emigh -
Internet Explorer 8 (IE8) badge

Newly released Windows fix addresses both new and old IE browsers

Over the past few days, security engineers have warned that variations of the publicly-released Hydraq exploit are being engineered for later versions of Internet Explorer than the one targeted in the recently discovered wave of attacks against Google and others, IE6. One security researcher on the "good side," Dino Dai Zovi, claimed on Twitter earlier today he has a functional derivative of Hydraq for IE7 and IE8...kind of. To make them work, two of Windows 7's more celebrated security features -- Address Space Load Randomization and Data Execution Prevention -- have to be manually turned off first.

Still, the nearness of such an exploit to reality prompted Microsoft to release its out-of-band security update today, as promised yesterday, for IE6, IE7, and IE8. Separate update packages are currently being deployed through Windows Update, and are available for download now.

By Scott M. Fulton, III -
The 'Grayfox' Persona applied to the RTM version of Mozilla Firefox 3.6.

Firefox 3.6 RTM officially released, includes personalization

Download Mozilla Firefox 3.6 for Windows from Fileforum now.

It's been said that improvements to Web browsers aren't truly improvements unless the user can both see and feel them. Mozilla's latest efforts in that area have just been finalized: a new stable version of Firefox that not only provides more control features to the new Windows 7 taskbar, but lets you paste posters on its wall.

By Scott M. Fulton, III -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.