Microsoft bans CCleaner from its support forums
Microsoft has blacklisted the CCleaner utility and links to the software can no longer be posted in its support forums.
An email sent out to community moderators reveals a total of 11 domains which Microsoft censors with its blacklist filter. If an ordinary user attempts to post a link to a banned site, that post will be removed.
Replacing the screen of a Samsung Galaxy Fold might not be as expensive as you feared
Beset by a seemingly endless list of problems and delays, the Samsung Galaxy Fold will surely go down in technological history as one of the most troublesome launches ever.
For anyone who stuck things out and was willing to part with the best part of two grand, there is some good news. Despite the unique technology used in the handset, Samsung has revealed that for early purchasers it has a special, low price for replacing a broken screen... the first time it happens, at least.
Official Kodi site vanishes, taking the software with it [Updated]
Kodi has weathered a lot of storms in recent years. Although the software is perfectly legal, its name -- somewhat unfairly -- has become synonymous with piracy due to its support for plug-ins that allow streaming of illegal content.
If you were hoping to download a copy of Kodi today then you’re out of luck. The official website has been taken offline.
Microsoft releases Windows 10 20H1 Build 18990 with automatic restart for UWP apps and Windows Subsystem for Linux (WSL) improvements
The next major update of Windows 10 isn’t due out until next May, but Microsoft is hard at work, rolling out new builds on a weekly basis.
Build 18990, released to Insiders on the Fast ring today, comes with a number of new features including Windows Subsystem for Linux (WSL) improvements and updates to the Xbox Game Bar.
Logitech MK470 Slim Wireless Keyboard and Mouse Combo is quiet, elegant, and affordable
Quality computer hardware doesn't have to cost an arm and a leg. Sure, some gamers and enthusiasts will gladly spend over $100 on a mouse or headset, for example, but many consumers wouldn't. After all, computers are quite inexpensive these days. A quality device used to cost thousands of dollars, while today, a decent machine can be had for less than $500. It would be quite foolish to spend $100 for a keyboard if your PC cost, say, $300.
Today, Logitech launches a keyboard and mouse combo for the "everyman." The "MK470," as it is called, is comprised of a slim keyboard and elegant mouse -- both are wireless and are designed to be quiet. They use a single USB dongle between them, meaning only one USB-A port will be taken up. Both are powered by AAA batteries, but Logitech promises they will last a very long time -- a year and a half for the mouse, and an insane three years for the keyboard! That will vary based on usage, of course. Best of all, it is ridiculously affordable.
Retailers remain a top target for cyberattacks
US retailers are under siege as nearly two thirds (62 percent) report experiencing a data breach and over a third (37 percent) say they were breached in the past year, according to the latest report produced by IDC for Thales.
This high rate of data breaches comes amidst a decline in the rate of growth in security spending. Less than two thirds (62 percent) say that they are increasing spending this year compared to 84 percent last year, yet nearly all (96 percent) of the retailers surveyed claimed they use sensitive data within digitally transformative environments.
85 percent of employees don't get the resources they need on starting a new job
Only 15 percent of employees have all the resources they require to be productive on day one according to a new report from Ivanti.
When it comes to employee onboarding, 38 percent of IT professionals report it takes between two and four days to get a new employee everything they need to do their job, while 27 percent say accomplishing this goal can take more than a week.
The top vulnerabilities in enterprise ransomware attacks
A new report from vulnerability management company RiskSense looks at the most common vulnerabilities used across multiple families of ransomware that target enterprises and government organizations.
Among its key findings are that almost 65 percent target high-value assets like servers, close to 55 percent have CVSS v2 scores lower than eight, nearly 35 percent are old (from 2015 or earlier), and the vulnerabilities used in WannaCry are still being used today.
Why we get hooked by phishing attacks
What makes us click on phishing links? A new study from Webroot has surveyed 4,000 office professionals from the US, UK, Japan and Australia to find out.
While a majority (79 percent) of people report being able to distinguish a phishing message from a genuine one, 49 percent also admit to having clicked on a link from an unknown sender while at work.
Court rules Google need only apply the 'right to be forgotten' in Europe, not worldwide
Google has won a case in the European Court of Justice meaning the company does not need to apply the controversial "right to be forgotten" on a global basis.
In a case between Google and Commission Nationale de l'Informatique et des Libertés (CNIL ) -- a French privacy regulator -- the court ruled that Google need only remove links from search results within Europe.
Microsoft releases emergency patches for Internet Explorer zero-day and Windows Defender flaw
Microsoft has released a pair of emergency patches, one for a remote code execution zero-day in Internet Explorer, and one for a denial of service vulnerability in Windows Defender.
In the case of Internet Explorer, the security flaw -- discovered by Clément Lecigne from Google's Threat Analysis Group -- is being actively exploited. Microsoft describes it as a "scripting engine memory corruption vulnerability", and has assigned it CVE-2019-1367.
Razer Blade Pro 17 Windows 10 gaming laptop gets 120Hz 4K display upgrade
If you want a Windows gaming laptop, there are many from which to choose. If you want a thin Windows 10 gaming laptop, however, your options are much more limited.
One of the more popular maker of such svelte gaming laptops is Razer, and today, it upgrades the Blade Pro 17 with an eye-popping new feature -- a 17.3-inch 4K, 3840 x 2160 display with 400 nits brightness! Yes, seriously.
Google Play Pass is the Netflix of Android apps and games
Apple recently launched its Arcade service -- a monthly games subscription for iOS. For just $4.99 a month, you get access to a bunch of titles without advertisements or in-app purchases. The first month is free, so I have been testing it on my iPhone 8 Plus. You know what? It is just OK -- not great. Many of the games are garbage that I wouldn't have bought in the first place. In other words, while $5 a month seems like a good deal, you have to actually find value in the games for it to be worthwhile.
Today, Google launches its version of Apple Arcade, and it seems like a much better deal. While it carries the same $4.99 monthly cost, and it too includes games, it also provides access to something Arcade doesn't -- applications. Quite frankly, as an adult, a buffet of productivity apps is more interesting to me than a collection of mobile games. Having both, however, is really cool, though -- I hope Apple follows Google's lead.
Apple says the Mac Pro will be made in America
Just after US trade regulators approved tariff exemptions for Apple, meaning that it could manufacture products abroad and import them without huge financial penalties, the company has announced that it will be making the Mac Pro in Austin, Texas.
Apple says that the decision to produce the redesigned Mac Pro in the US is "part of its commitment to US economic growth".
3 must-do tasks to make vulnerability management useful in today's environments
I recently heard an executive describe how his team essentially threw its vulnerability report in the trash every time they received one. This seemed a bit extreme, but he informed a group of conference attendees that it wasn’t because the vulnerability reports didn’t contain important information -- it was because they have become so overwhelming.
Vulnerability management vendors today are routinely scanning for more than 100,000 vulnerabilities. Imagine the strain that places on an organization if even only a fraction of these vulnerabilities are found within their network. Then consider the feeling associated with the knowledge that there is no possible way to address them all in an effective time frame that will ensure that you are not at risk.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.