Internet traffic set to explode over the next five years
By 2022 more IP traffic will be created on global networks than in the entire 32 year life of the internet to date.
This rather startling prediction comes from network infrastructure specialist Cisco which reckons that by 2022, 60 percent of the global population will be internet users. More than 28 billion devices and connections will be online, and video will make up 82 percent of all IP traffic.
ADATA unveils XPG INFAREX K10 keyboard and M20 mouse for gamers
Gaming is a big business these days, and some companies offer special branding for such products. For instance, Kingston's gaming offerings are typically sold under the HyperX brand. It is sort of similar to car companies that have luxury brands, like Ford to Lincoln, or Honda to Acura. It's the same company, but it signals that the product is a cut above its "normal" vehicles.
ADATA is yet another tech company that has a special brand for its gaming and enthusiast-grade products -- "XPG." This week, there are two new gaming accessories to fall under that umbrella -- the XPG INFAREX K10 keyboard and M20 mouse. Both products look well made and full of great features. And of course, they both have RGB lighting, because... gaming!
The industries that can expect to see the most from XR in the next 4 years
For many years, Virtual Reality was seen as just a futuristic concept, but in 2010, the prototype of the Oculus Rift was released, before eventually being rolled out for general consumption in 2012. Since then, other companies have followed suit, including Samsung, Sony (PlayStation) and HTC (Vive). The use of Augmented Reality has also started to rise, both in the gaming world and in many other sectors. Both technologies are now being referred to as Extended Reality (XR), and there are huge plans afoot to develop them for a range of industries.
Here are the industries that will be utilizing XR technology the most in the next four years:
Exploit developer discovers security vulnerability in VirtualBox and publishes a full guide to exploiting it
A security researcher has not only discovered a vulnerability in the virtualization tool VirtualBox, but has released details of the exploit and a step-by-step guide to the zero-day vulnerability.
Russian exploit developer Sergey Zelenyuk found a way to break out of VirtualBox's virtual environment and he chose to go public with the vulnerability because of his displeasure at the "contemporary state of infosec, especially of security research and bug bounty". Having told Oracle about the problem, he also tired of the "delusion of grandeur and marketing bullshit" he experienced in the infosec community.
Exploit developers claim 'we just broke Edge'
Security researchers claim to have unearthed a zero-day vulnerability in Microsoft Edge. The remote code execution is due to be revealed with a proof-of concept.
Microsoft has not yet been informed about the details of the security issue, but exploit developers had been looking for a way to break Edge out of its sandbox -- and it would appear that this objective has now been achieved.
Are APIs becoming the keys to customer experience?
In recent years, APIs have encouraged the emergence of new services by facilitating collaboration between applications and databases of one or more companies. Beyond catalyzing innovation, APIs have also revolutionized the customer-company relationship, allowing it to provide an accurate and detailed picture of the consumer at a time when a quality customer experience now counts as much as the price or capabilities of the product.
Over the years, customer relationship channels have multiplied with consumers who can interact with their brands through stores, voice, email, mobile applications, the web or chatbots. The multiple points of interaction used by customers have made its journey more complex, forcing companies to consider data from these many channels to deliver the most seamless customer experience possible. To do this, they must synchronize data from one channel to another and cross-reference data related to its history with the brand. This is where APIs come into play. These interfaces allow data processing to refine customer knowledge and deliver a personalized experience.
Non-Microsoft exploits on the rise as hackers turn to servers
A new report from AlienVault, based on findings from vendors' threat reports in its Open Threat Exchange (OTX) platform, reveals more non-Microsoft exploits are in the top 10 list this year.
This is largely due to a rise of server attacks, particularly cryptocurrency-mining botnets that use remote exploits, such as Drupal. The report also sees an IoT exploit make the list for the first time.
Linux systems vulnerable to privilege escalation and file overwrite exploit in X.Org server
An "incorrect command-line parameter validation" vulnerability in X.Org server makes it possible to escalate privileges as well as overwrite files. The problem affects Linux and BSD distributions using the open source X Window System implementation.
The vulnerability has been present for a couple of years, but has been brought to light by security researcher Narendra Shinde. Unpatched system can be exploited by non-root users if X server is running with elevated privileges.
Ring unveils its 'next generation neighbor experience'
You've no doubt heard of Ring -- there’s near constant ads for it on TV these days, some featuring Shaquille O’Neal.
Ring became famous for its video doorbell that shows you who is outside, without you needing to open the door. The company has since expanded into video security cameras and full security systems, complete with camera, doorbell, sensors and all. Coverage runs you $10 per month, much cheaper than the big names that tend towards $30.
Microsoft releases Windows 10 19H1 Build 18267 with expanded search indexing
Microsoft is still busy fixing the many problems that have blighted the Windows 10 October 2018 Update, but that hasn’t stopped development on the follow up, due out next spring.
Build 18267 for Insiders on the Fast ring, introduces -- among other things -- the ability for the OS to index all of your folders and drives, to make finding files on your PC much easier.
Google is 'exploring' a censored search tool for China
The possibility of Google making a return to China was leaked this summer, but the company has remained pretty tight-lipped about the matter. But now CEO Sundar Pichai has spoken publicly about the prospect of Google producing a censored version of its search engine to comply with Chinese regulations.
Speaking at a conference in San Francisco, Pichai revealed that Google has, internally, built a search engine for China, because "we wanted to learn what it would look like". He said that the company is "exploring" the idea, and pointed out that 99 percent of searches would not be censored.
Instagram co-founders resign from Facebook-owned company to 'explore curiosity and creativity again'
Six years after their company was bought by Facebook, Instagram co-founders Kevin Systrom and Mike Krieger have resigned. The pair say they are "planning on taking some time off to explore our curiosity and creativity again".
But while the departures have been presented as being amicable, sources suggest that the resignations came about because of Systrom and Krieger's unhappiness at the direction in which Facebook was taking the app.
Browser Reaper: exploit causes Firefox to crash
A security researcher has developed an attack that exploits a Firefox bug, making it possible to crash the web browser.
Sabri Haddouche used his Browser Reaper website to share a live test version of the exploit -- the site is also home to exploits for Chrome and Safari. The Firefox attack uses JavaScript to crash or freeze the browser, with the effect of the exploit depending on whether the browser is running on Linux, Windows or macOS.
Hacked: Newegg suffers month-long card-skimming attack, exposing credit card details
Just 15 lines of code was all it took for hackers to hijack the checkout of online retailer Newegg. The month-long attack took the form of a huge card skimming operation and is believed to have been carried out by the same group that was responsible for hacking both British Airways and Ticketmaster recently -- Magecart.
The hackers inserted car-skimming code into Newegg's payment page, and this script remained in place between August 14 and September 18. It is not known how many people may have been affected by the incident, but with millions of visitors each month, the numbers are potentially huge.
Privacy: Grindr API is STILL exposing the location of its users
Earlier in the year it was revealed that a security flaw made it possible to determine not only the location, but also the HIV status of Grindr users. Months down the line, Grindr is still exposing the precise location of its users by failing to block third-party access to a private API.
Using a trilateration technique, and exploiting the fact that Grindr lets users know -- with some degree of accuracy -- how far away they are from others, it is very easy for just about anyone to build a tool that shows precise locations.
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.