Spotlight

Latest Technology News

Windows 10 Creators Update rollout 'on track', but only 15.2 percent of US users have it

bored waiting

Microsoft officially began the Windows 10 Creators Update rollout on April 11. I cautioned about rushing to upgrade to it at the time, and then Microsoft said much the same thing shortly afterwards, recommending users didn’t install it until the upgrade was offered to them.

Six weeks since the rollout began, and still the Creators Update isn’t available to the vast majority of Windows 10 users.

Continue reading

Executives are the most at risk employees when leaving the office

Risk puzzle piece

Four in ten organizations in the US and Western Europe believe C-level executives are the most at risk of cyber attacks when working outside the office.

That's according to research by iPass, whose Mobile Security Report 2017 says that coffee shops and cafes are the riskiest venues (42 percent), followed by airports (30 percent), hotels (16 percent) exhibition centers (seven percent) and airplanes (four percent).

Continue reading

It's on: Xbox Game Pass sets a new stage in console wars

Xbox Game Pass

The big news out of Microsoft's video game division today is the launch of a new service called Xbox Game Pass. For a $9.99 monthly fee, players will be able to access a wide library of Xbox One titles on demand, making it less and less necessary to dole out dozens of dollars every time you want to play a new game.

This represents not only a milestone moment in the evolution of the Xbox One platform and the way people play games on it, but also for the console wars as a whole. Sony has a competing service -- similar in some ways and starkly different in others -- which means it's officially time to clear the stage for a new chapter in the perennial battle for gaming dominance.

Continue reading

Apple Pay now supports purchases over £30 in UK

Apple Pay UK

The latest move from Apple may soon lead to consumers leaving their wallets at home, now that a majority of cash registers in the UK will be able to accept Apple Pay mobile payments over £30.

According to the vice president of Internet Services at Apple Pay, Jennifer Bailey, more than half of the contactless payment terminals in the UK are now able to accept Apple Pay payments of any value. Previously they had been limited to £30, which is the limit for card readers when dealing with contactless card payments.

Continue reading

Elgato Thunderbolt 3 Dock for MacBook Pro and Windows 10 devices arrives next month

Tb3Dock

The MacBook Pro only has USB-C/Thunderbolt 3 for connecting devices. For many, this is not a problem. After all, with wireless accessories, it is quite possible that a user might never need to connect anything by wire -- other than the charger, of course.

With that said, some users absolutely need to connect legacy devices, such as USB Type-A hard drives, mice, keyboards, and more. Heck, they may even need to connect to a monitor or Ethernet. Luckily, Thunderbolt 3 makes this a breeze, as single-cable docking solutions can bring all of the needed ports and more. Best of all, they can charge the computer too. Today, Elgato announces that its Thunderbolt 3 Dock will be available for purchase on June 6. While it looks amazing, it is certainly not an inexpensive affair.

Continue reading

New digital assistant answers data-related questions

data magnifier

In our private lives we're used to getting answers quickly from digital assistants. So far though this is something that hasn't really taken off in business environments.

That could be about to change as data search specialist Knoema launches Yodatai, a bot that's designed to answer data-related questions.

Continue reading

The way is clear for Wikimedia to sue the NSA for warrantless surveillance

nsa_gchq

A federal appeals court has ruled that the Wikimedia Foundation may sue the NSA for its warrantless use of the "Upstream" surveillance program. The ruling overturns an earlier one which said the foundation could not sue due to an inability to prove that Wikimedia communication was being monitored either directly or indirectly.

The ruling by the United States Court Of Appeals for The Fourth Circuit means that the foundation is now able to proceed with legal action that was previously blocked. The amount of traffic generated by Wikimedia proved key to winning the appeal.

Continue reading

HP software helps turn old PCs into thin clients

HP Thin Client

As software moves towards the cloud, many companies are opting for thin client architecture on the desktop. But this involves an investment in new hardware that may strain restricted budgets.

HP has used this week's Citrix Synergy event to launch its Thin Client Conversion Suite, allowing old PCs to be turned into a thin client solution at low cost.

Continue reading

Here's when and where you can buy Samsung Gear 360 (2017)

Samsung360

On the day that Samsung announced the Galaxy S8, there was another device that made an appearance too -- the newest version of the Gear 360. This isn't the company's first 360 camera, but it is its most elegant. The camera is small, modern, and even uses USB-C.

Today, Samsung unveils what you really want to know, however -- how much it will cost, plus when (starting tomorrow) and where you can get it. Not only do we finally have all of those details, but there is even a special promotion for new Samsung Galaxy S8 buyers too.

Continue reading

Media players expose users to hacker attacks via subtitles

hacker dark laptop room

Security researchers from Check Point have discovered a major vulnerability in popular media players, like VLC, Kodi and Popcorn Time, which leaves users vulnerable to hacker attacks via malicious subtitles. The security firm estimates that the number of potential victims is around 200 million.

Media players give users the option to load subtitles from repositories, which can be tricked by attackers to rank their altered subtitles higher. This leads to those malicious subtitles being recommended to the user. If they are loaded, attackers can gain control over "any device running them." Check Point notes that the "potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, mass Denial of Service attacks, and much more."

Continue reading

Kaspersky launches Threat Intelligence Portal for businesses

Hidden security threat

Companies have to deal with an increasing number of cyber threats. To allow them to stay in touch with this ever evolving landscape they need up to date intelligence.

With the launch of its Threat Intelligence Portal, Kaspersky Lab is enabling security operation center operators to be able to work more efficiently while facing hundreds and thousands of threat alerts.

Continue reading

OnePlus 5 may be available in four color options

OnePlus 5 color options

As we are getting closer to the launch of the eagerly-awaited OnePlus 5, we are learning more things about the upcoming flagship killer. We know its name, when it will be released, and what sort of improvements we can expect to see in the camera department.

And now, thanks to a new teaser posted by OnePlus on Twitter, we also have a pretty good idea about the color options that could be available for the OnePlus 5 and how many there will be.

Continue reading

Samsung's Galaxy S8 iris scanner is easily defeatable

Samsung Galaxy S8 iris scanner defeated

If you want to secure your Samsung Galaxy S8, relying on the iris scanner to keep it locked is not the best idea. That's because it can be easily fooled using just a printed photo and a contact lens.

This reinforces the belief that biometric authentication is -- at least for now -- less secure than traditional options, like PINs and passwords, which have the advantage of not being tied to a physical trait that can be easily exploited by hackers, thieves or the authorities.

Continue reading

Credential stuffing tools help hackers break into accounts

hacker username password login

With thousands of stolen account details available for sale on the web, cyber criminals are turning to new methods using them efficiently to try to break into accounts.

According to a new report by risk analysis specialist Digital Shadows, 'credential stuffing' tools are the latest technique being used to automate attempts at account takeover.

Continue reading

Netgear clarifies precisely what data it collects from Nighthawk AC1900 R7000 router users

netgear-r7000-router

A recent firmware update to its Nighthawk AC1900 R7000 router saw Netgear start to collect analytics data from its users. This had many people upset because of concerns about privacy, but the company is at pains to stress that no personal data is being collected.

In addition to this, the company points out that the program is voluntary, and users are free to opt out at any time. Rather than anything sinister or underhand, Netgear says that the data collection is purely to isolate problems and improve the router.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.