Latest Technology News

CVE-2018-3665: Floating Point Lazy State Save/Restore vulnerability affects Intel chips

CPU vulnerability

There has been something of a spate of chip vulnerability discoveries recently, and now another one has emerged. Known as Floating Point Lazy State Save/Restore, the security flaw (CVE-2018-3665) is found in Intel Core and Xeon processors and it is another speculative execution vulnerability in a similar vein to Spectre.

The security flaw takes advantage of one of the ways the Linux kernel saves and restores the state of the Floating Point Unit (FPU) when switching tasks -- specifically the Lazy FPU Restore scheme. Malware or malicious users can take advantage of the vulnerability to grab encryption keys. Linux kernel from version 4.9 and upwards, as well as modern versions of Windows and Windows Server are not affected.

Continue reading

#BetaNews20 Giveaway: Linksys WRT32XB AC3200 Xbox One wireless gaming router

Here at BetaNews, our 20th birthday cerebration is in full swing. We have several amazing giveaways running, including the Linksys Velop Dual-Band Whole Home Mesh Wi-Fi System. But what if you don't need or want a mesh networking solution? What if you are a gamer that just wants a single router?

Enter the Linksys WRT32XB. Yes, we are giving away this hardcore Xbox One-optimized gaming router. Don't own Microsoft's gaming console? Don't worry. It will still function perfectly fine as a router for all of your non-gaming needs too. In other words, Xbox or not, you should enter the giveaway, as this router is a beast.

Continue reading

5 keys to customer data protection now that GDPR is here

GDPR in Europe

Protecting customer data should always be a top priority for businesses. But doing so is increasingly extending beyond moral responsibility and taking on the form of legal requirement. As you’ve surely heard, the General Data Protection Regulation (GDPR) took effect May 25. This set of regulations, which replaces the Data Protection Act 1998, legislates online data rights for any organization that sells products or services to European Union (EU) customers.

Complying with these new rules might seem daunting (and even unnecessary) for US-based small businesses, particularly since there’s still a lot of confusion regarding the specifics of these new rules and requirements. But if you can understand these five keys to customer data protection, it will go a long way toward helping your business achieve compliance.

Continue reading

Solving for GDPR: It’s about technology and human behavior

GDPR graphic

GDPR -- it’s a nightmare for organizations, but a much-needed protection for citizens in our world of Cambridge Analytica, criminal hackers, and nation-states cyberthreats. There are many aspects of the regulation that are extremely tricky to implement, but let’s consider just one. Imagine the following scenario:

A new customer signs up to your eCommerce website. Their data gets moved into several back-end systems; maybe a CRM, an accounts system, an order management system, marketing, and probably some kind of data science workbench. Sometime later, an analyst is tasked with analyzing new customers and their behaviors, their retention rates, and other important factors. They know customer data is spread out across dozens of these systems, so they ask IT to prepare a dataset for them. Maybe a month later IT come back with a dataset that has been provisioned in the corporate Data Lake. The data isn’t quite fit for purpose and contains far more information than the analyst needs.

Continue reading

Get a full year of Sticky Password Premium, worth $29.95, for FREE with our latest software giveaway! #BetaNews20

Protecting your personal information has made big headlines in 2018, and will continue to do so as hackers continue to outwit even the biggest firms. This is what makes our new software giveaway so essential: a year’s license for Sticky Password Premium.

Sticky Password is a suite of products for mobile and desktop that allow you to store your online passwords, form fills and credit card information securely -- our giveaway will give you access to all its Premium features across all supported devices, including Windows, Mac, iOS and Android.

Continue reading

Google and The American Red Cross partner for World Blood Donor Day

Whenever there is a tragic event, such as a natural disaster or large-scale terrorist attack, people turn out in droves to donate blood. This is very noble, but such a donation is not only needed during publicized tragedies. Every day, hospitals around the world use donated blood to save lives.

Each year, we celebrate World Blood Donor Day -- an annual occasion to raise awareness regarding the necessity of this life-changing donation. On this day, people often want to donate, but it can be hard to know where to go. Thankfully, Google is partnering with The American Red Cross to make finding such a destination even easier. A Google employee has even chosen to share their personal story about how donated blood saved a family member's life.

Continue reading

Why London will always be a global connectivity leader

Scene on London Bridge

With the General Data Protection Regulation (GDPR) in effect, and Brexit negotiations in full swing, there is tremendous debate about London’s new place in the world economy. However, even in a post-Brexit and GDPR world, London is a resilient city with a 400-year history at the center of trade and finance.

In 1998, my company, Interxion,strategically chose central London as the location of its first data center. Twenty years later, we continue to invest in this city with the launch of our third data center, opening in July. So what makes London such an attractive connectivity hub for businesses all over the world?

Continue reading

Mobile: The driving force behind digital transformation

From retail to manufacturing, the digital transformation is taking the world by storm, and mobile is leading the charge. With mobile affecting everything from corporate processes to the customer experience, it’s important for businesses to understand just how mobile and the digital revolution are bringing big changes.

As productivity increases, so does the need to communicate more quickly. Currently, it takes 50 milliseconds to send a piece of data from one mobile device to another. Impressively, with 5G, that time will be cut to just one millisecond -- now, that’s fast. While operators are projected to spend $1.7 trillion on equipment upgrades between now and 2020 in preparation for the arrival of 5G, the results will be well worth it. By 2025, 5G is expected to reach 2.6 billion subscribers -- or one-in-five mobile connections around the world.

Continue reading

Privacy: Facebook advertisers must warn users if ads are targeted because of data they purchased

Like us on Facebook

The fall out from the Cambridge Analytica scandal continues for Facebook, and the social media giant is busy trying to repair its somewhat tattered reputation. The latest measures see the company introducing new privacy safeguards to inform users if advertisers are using information supplied by so-called "data brokers".

These brokers are firms that gather data about people and then sell this information on to other companies, often for the purposes of targeted advertising. Facebook is not banning the practice, merely requiring advertisers to keep users informed.

Continue reading

Apple updates App Store rules to prevent devs gathering data from contacts

iPad and iPhone

Apple has tweaked its App Store policies, closing a loophole that made it possible for developers to gather data from phone contacts and then sell or share that data without consent.

Until very recently app developers have been able to ask for permission to access users' address books and then use this permission to gather data about contacts. But with the latest policy change -- introduced with no announcement -- Apple has clamped down on this practice in the name of privacy.

Continue reading

Microsoft Office gets a facelift to improve usability

Office simplified ribbon

Microsoft has announced that it's giving its flagship Office suite a makeover designed to deliver a balance of 'power and simplicity'.

The updates apply to Office.com and Office 365 and will be rolled out over the next few months, the company says it will 'test and learn' as it goes -- those of a cynical mind might see that as code for letting users find the bugs.

Continue reading

Xbox One reported to integrate with Google Assistant and Alexa

Rumors are swirling that it won’t be long before people could talk to their smart speakers to control aspects of their Xbox One systems. Details are scarce, but here’s what’s known so far.

Microsoft formerly offered voice control functionality for Xbox players through its Kinect accessory. But, once the company discontinued it in 2017, and then quit making Xbox One adapters for the Kinect shortly afterward, gamers became more limited. The Xbox One does have Cortana, but the availability of features that work with Alexa and the Google Assistant could help players do even more with their systems.

Continue reading

Data science moves away from big data towards containers and cloud

Digital data

Traditional Hadoop-style big data is giving way to cloud and container solutions like Docker, according to the results of a new survey.

The State of Data Science survey, carried out by Python data science platform Anaconda, among over 4,000 of its users, shows that Docker now makes up 19 percent of data science platforms, beating Hadoop/Spark with 15 percent and Kubernetes at 5.8 percent.

Continue reading

Ransomware: As big a threat as the media claims

Ransomware eye

Ransomware is a very real threat that targets businesses of all sizes and industries. Really any business can be a target. With that being said financial institutions and retail are most at risk given the transactional nature of their business and the number of people that may have access to a terminal or computer at any given point in time.

The first thing that an organization needs to do is recognize that they are a target for ransomware just like any other company. Next, they need to ensure that they have the proper tools anti-virus/anti-malware installed on all computer systems to detect and defend against ransomware attacks. Of course, after this comes ensuring that the anti-virus/anti-malware software is kept up-to-date to ensure that the signature and traffic detection patterns are updated. It is critical that businesses have some sort of ransomware defense plan in place.

Continue reading

Free Chrome extension helps internet users spot fake news

Trusted News

The rise of fake news has affected many people's faith in the internet as a reliable source. In order to help with the problem, Adblock Plus maker eyeo is launching a new browser extension called Trusted News.

Available free for Chrome browsers, the extension works by checking domains, websites, and news sources against the world's largest network of fact-checking databases.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.