Latest Technology News

Chromebook owners get Android versions of DOOM and DOOM II for free -- Here's how

Chromebooks are wonderful computers. In fact, the underlying Linux-based Chrome OS is arguably the most secure desktop operating system on the planet. Yes, it is more secure than Windows or macOS. If you have to access a website for banking information or other sensitive data, a Chromebook is probably the safest way to do so.

With all of that said, they aren't just good for surfing the web or education, but for fun stuff too. Not only can you enjoy streaming media on a Chromebook, but you can actually do some light gaming too -- thanks to Android support and the Google Play Store. Two classic games -- DOOM and DOOM II -- are on Play Store for $5 a piece, but if you own a Chromebook, you can get both for free!

Continue reading

Make the Windows Package Manager WinGet easier to use by adding a GUI

Winstall icon

With the recent launch of WinGet, Microsoft brought a Linux-style package manager to Windows 10, making life easier for system administrators and anyone looking to automate software installation.

But while the Windows Package Manager is undoubtedly useful, it's also a little intimidating for many people. The command line driven tool can appear very off-putting, so why not add a graphical front end to make it more approachable? We show you how to create software installation scripts without having to use the command line.

Continue reading

How to schedule tweets from the Twitter website

Twitter logo and a woman in silhouette

While Twitter is used for sharing live news, real-time reactions and the like, it's also used for promotion -- and promotion means planning. There are numerous apps and services that you can turn to if you would like to be able to send a tweet at a date or time in the future, but now you can do it direct from the Twitter website.

The ability to tweet when you're not at your computer can be extremely useful, so here's what you need to know about scheduling tweets.

Continue reading

LibreOffice 7.0 Beta 1 arrives with ODF 1.3 document support

The Document Foundation has released the first public beta of its upcoming LibreOffice 7.0 office suite for Windows, Mac and Linux. Users are encouraged to download and test the software -- which installs alongside any existing production release -- ahead its final release, expected to be in August.

The new release doesn’t boast any major new features, but does update ODF support to 1.3, plus unveils improvements both major and minor to the suite’s major components -- in particular Writer.

Continue reading

IBM launches innovative encryption toolkit for MacOS and iOS

Encryption

Usually files are encrypted while in storage or in transit but are decrypted in order to be used, providing a window of opportunity for hackers to access the information.

The technique of fully homomorphic encryption (FHE) solves this problem by allowing the manipulation of data by permissioned parties while it remains encrypted, therefore minimizing the time it exists in its most vulnerable state.

Continue reading

Best Windows 10 apps this week

Three-hundred-and-eighty-nine in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Microsoft Store in the past seven days.

The new feature update for Windows 10, version 2004, is rolling out slowly. You can check out the removed or deprecated features here, and find out what the "your device isn't quite ready" message means exactly.

Continue reading

SoftMaker Office 2021 is a genuinely viable alternative to Microsoft Office

We may only be halfway through 2020, but SoftMaker Office 2021 is already here. After a period of beta testing, the office suite is ready for a full release on Windows, macOS and Linux.

Available either as a one-off purchase or on a subscription, SoftMaker Office 2021 is pitched squarely as an alternative to Microsoft Office. The office suite makes bold claims about competing with Microsoft's famous suite of tools, but the claims that more than stand up to scrutiny. This is an impressive selection of programs that has much to offer.

Continue reading

Are cyber attacks really as advanced as we think? [Q&A]

Cyber attack

When organizations suffer a cyberattack it's often described by them as 'advanced'. But just how good does an attack need to be to breach defenses?

We spoke to Matt Walmsley, head of EMEA marketing at threat detection and response platform Vectra to find out about the attack landscape, how most attacks aren't all that advanced at all, and how companies can better defend themselves.

Continue reading

Get 'Learn Penetration Testing' ($31.99 value) FREE for a limited time

Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.

You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats.

Continue reading

Fractal Design launches 'Define 7 Compact' ATX case with sleek and classy design

When you build a gaming PC (or any type of computer, really), there are often two ways you can go -- flashy or classy. Neither is wrong, but your decision probably says a lot about your personality and/or your age. For instance, if you choose a case that looks like an alien spaceship, and you fill it with RGB lighting, you are probably a teen or someone in their early 20s. Age aside, maybe you just like being ostentatious. If you prefer a more sophisticated-looking PC, you may be in your late 20s or older, or just prefer subtlety.

For those of you that prefer a more subdued and classy style, Fractal Design's cases are probably for you. Why? They are wonderfully boring -- and yes, I mean that in a good way. The company's no-nonsense cases are beautiful while also looking mature. In other words, a Fractal Design chassis tells the world you are sophisticated and not a clown. The company's latest case -- the Define 7 Compact -- is a diminutive version of the existing 7 Series chassis, but believe it or not, it can still accommodate up to a full-sized ATX motherboard! The Define 7 Compact has a very purposeful design -- no space is wasted.

Continue reading

Get 'Performance Management For Dummies' ($19.99 value) FREE for a limited time

Performance Management For Dummies is the definitive guide to infuse performance management with your organization's strategic goals and priorities. It provides the nuts and bolts of how to define and measure performance in terms of what employees do (i.e., behaviors) and the outcome of what they do (i.e., results) -- both for individual employees as well as teams.

Inside, you’ll find a new multi-step, cyclical process to help you keep track of your employees' work, identify where they need to improve and how, and ensure they're growing with the organization -- and helping the organization succeed.

Continue reading

Cyber ransom demands up 200 percent in 2019

Ransomware sign

Requested amounts in ransomware attacks rose nearly 200 percent from 2018 to 2019, averaging $115,123 per attack last year.

A report from incident response, risk management and digital forensics firm Crypsis Group reveals that threat actors across a range of cyberattack types have significantly escalated their tactical approaches, becoming more targeted, conducting victim research and employing techniques that enable them to be more successful and extract higher payouts for their efforts.

Continue reading

Fake job applications used to steal banking credentials

job resume

During May, researchers at Check Point have seen a doubling in the number of malicious files sent by email claiming to be resumes or CVs from individuals, as hackers exploit the unemployment and remuneration schemes resulting from the COVID-19 pandemic.

In addition they have noted that seven percent of domains registered containing the word 'employment' are malicious. There has also been a 16 percent increase in malware attacks overall, compared to March and April.

Continue reading

Tor Browser 9.5 arrives with the option to automatically switch to more secure Onion versions of sites

Increasing numbers of internet users are becoming aware of the privacy and security implications of being online, and it is for this reason that secure browsers such as Tor are growing in popularity. Now, with the release of Tor Browser 9.5, the browser features an option that can automatically switch to the secure .onion version of a site if one is available.

In short this means that sites are able to actively promote the fact that they have a secure .onion site available. Publishers now can advertise their onion service to Tor users by adding an HTTP header, so if someone visits the regular version of a website, a notification will appear informing them of the more secure option.

Continue reading

Securing SaaS applications for a remote workforce [Q&A]

Cloud data security

The current shift to remote working looks likely to have a long-term impact on the way businesses operate in future. But this raises issues over security and ensuring that misconfigurations don't lead to data being exposed.

How big is the risk and what are the key issues enterprises face? We spoke to Brendan O'Connor, CEO of cloud security specialist AppOmni to find out.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.