Articles about Digital Lifestyle

Less than a third of attackers account for 80 percent of comment spam

Megaphone laptop

You don't need to spend very much time on popular websites and forums to encounter the curse of comment spam, adverts or links embedded in fields intended for reader interaction.

Comment spammers are most often motivated by search engine optimization, using a busy site's comment fields and guest books to get views for advertisements and malware distribution. A new report by enterprise security specialist Imperva takes a close look at comment spam and looks at ways that companies can combat it.

Continue reading

Lumsing's sexy 'Harmonica Style' battery pack delivers power on the move

lumsing

Battery packs may not be the most exciting or sexiest gadgets on the market, but the LUM-008-01 Power Bank from Lumsing has a good stab at changing things. But stabbing isn’t the first thing that comes to mind when picking up this battery pack for the first time. Yes, the manufacturers "Harmonica style" description is fairly accurate but this is a unit that is rather weightier than the handheld instrument favored by blues and folk musicians. The mass of 236g (8.3oz) coupled with the way it nestles in the hand brings to mind a form of cudgel; this is a battery pack that could double as a murder weapon. Maybe that's just me... I should probably evaluate it for what it is.

Let's cut to the chase. This is a battery pack. There's a limit to how animated one can get about such a device, but Lumsing's offering gets off to a great start by being so easy on the eye. It's good to look at, and it also feels good in the hand. Style drips from every port. In all there are three ports: one USB input for charging the unit itself, and two outputs for charging other devices such as mobiles and tablets. There's one low powered 1.5 A port and one rated at 2.1 A so there's scope for charging all manner of devices.

Continue reading

Queen's speech proposes life sentences for cyber criminals in the UK

Dungeon

Edward Snowden is on the run, living in exile as a means to evade the long arm of US law. The United States seems keen to have him prosecuted for leaking documents that have arguably put national security at risk. He acted in good faith, but has been branded a cyber criminal. Today in the UK, the Queen gave her annual speech -- well, it's really a speech written by the government, but dear Liz reads it out so she gets to call it hers -- and she revealed that cyber criminals could face life sentences for their endeavors, and that existing punishments for digital crimes cold become harsher.

Singled out for particular attention are those "cyberattacks which result in loss of life, serious illness or injury or serious damage to national security, or a significant risk thereof". Those committing such acts could be put behind bars for life. But the proposals do not end there. The aging Computer Misuse Act could be updated, so that criminals that cause "a significant risk of severe economic or environmental damage or social disruption" incur a 14 year term compared to the current 10.

Continue reading

The new industrial revolution -- machines rise up to become our equals

Web

The Internet of Things is just the latest buzzword that is being used to push all manner of products. Let's cut to the chase -- it's just about "stuff" (other than obvious things like computers and phones) connecting to the internet. Nothing more than that. But this dismissive-sounding definition is not meant to undermine the importance or the significance of the IoT. We've spent the last 20 years or so getting used to the idea of accessing the web, harnessing what it has to offer, exploiting it in various ways and finding all manner of methods of using it to make life easier, more entertaining, and more profitable. The evolution of the Internet of Things sees this taken to the next level.

We are on the cusp of a new industrial revolution. Many would say that the wheels are already in motion. The tired -- very, very tired -- example of what the Internet of Things is about, is the prospect of owning a fridge that will be aware of when you run out of milk, and then either alert you or place an order on your behalf. This is a very simplistic view of things, but it is the communication between devices that will be the hallmark of things to come. Inter-device communication, or machine-to-machine (M2M) connectivity. Devices that can be left to their own devices (ahem) are approaching in ever-growing numbers, and there are advantages to be gained.

Continue reading

Dirty desktops and titillating tablets -- the browsers you use to get a porn fix

Shocked surprised man woman girlfriend boyfriend laptop

Porn has always been big business, and online porn accounts for a staggering proportion of web traffic. The availability of always-on internet connections in the home, and near blanket use of internet-enabled mobile phones and tablets, means that it is now easier than ever to get a porn fix if you feel the urge. But have you ever wondered how all of this porn is being accessed? Well… wonder no more! Porn site (you don’t say!) PornHub conducted research after Gizmodo expressed an interest in seeing which browsers were most used by consumers of porn, and the figures make for interesting reading.

It perhaps comes as no surprise that desktop browsers prove the most popular. Some 51 percent of Pornhub's traffic comes from people using desktop computers. But, without wanting to put too many unpleasant images in your head, this leaves 49 percent of porn perusal that is enjoyed on mobile phones and tablets. You know, those devices that are easily transported to a quiet room and are rather easier to hold in one hand than a laptop...

Continue reading

Google offers End-To-End encryption with new alpha Chrome extension

computer-data-binary

Today, Google took the wraps off a new security tool for Chrome users. Currently available as an alpha release, End-To-End is an extension for Google's browser that offers... well... end-to-end encryption for data arriving in and departing from Chrome. As this is only an alpha version, the extension is not currently available in the Chrome Web Store, but Google has made the code available so the privacy-conscious and security-minded can take it for a test drive.

Based on OpenPGP and a newly developed, JavaScript-based crypto library, End-to-End can be used to encrypt, decrypt, digitally sign, and verify signed messages. Google is keen to receive feedback -- discover a problem and you could cash in, thanks to the Vulnerability Reward Program. In a post on the Google Online Security Blog, Stephan Somogyi, Product Manager, Security and Privacy explains that "we recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection. But we hope that the End-To-End extension will make it quicker and easier for people to get that extra layer of security should they need it".

Continue reading

Apple opens the door to Bitcoin and other virtual currencies

Currency

Yosemite! Woo! iOS 8! Yay! New way of programming! Huzzah! These were the obvious highlights of Apple's WWDC keynote yesterday, but as the dust settles there are some additional interesting tidbits emerging. As this was a developer conference, it should come as no surprise that the announcements and revelations have the most immediate impact on developers -- but things will also filter down to users. One change that was not given any fanfare at the WWDC is an alteration to Apple's App Store Review Guidelines which paves the way for virtual currency support.

The guidelines themselves are surprisingly easy to read -- this document is nothing like an EULA! But if you'd like to cut to the chase, jump to 11.17 in the "Purchasing and currencies" section. Here you'll find the advice that "Apps may facilitate transmission of approved virtual currencies provided that they do so in compliance with all state and federal laws for the territories in which the app functions". There is no reason that this possible virtual currency support should not include Bitcoin, although the currency has not been specifically mentioned.

Continue reading

Reset the Net shows a groundswell of opposition to the NSA

flipping the bird

Internet heavyweights such as Reddit, Imgur, BoingBoing and the WikiLeaks Party are joining forces to encourage internet users to take control of their privacy. Reset The Net is a campaign that flips the virtual bird at the NSA by inviting people to make use of privacy and encryption tools to keep themselves protected online. Also involved are such names as Greenpeace, Amnesty International and the Electronic Frontier Foundation, and the campaign is gathering momentum as internet citizens find themselves increasingly disillusioned by the post-Snowden world.

We have already seen an upsurge in the use of online encryption, but this has been largely employed by those who are more technically minded. The Reset the Net website asks web users to make a pledge: "On June 5, I will take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same". Reset the Net is not an end in itself, but more of an awareness-raising campaign that aims to educate people as much as send a message to the NSA and its ilk.

Continue reading

HP wants you to forget Chrome OS and embrace the Android laptop SlateBook

hp_slatebook

At the cheap end of the laptop market, there isn’t really all that much choice at the moment. Chromebook has the bargain basement side of things covered, but this is not an OS that works for everyone. Android is, by quite some way, the most popular operating system on phones and tablets, so it makes sense that it should also prove popular on a laptop, right? This is what HP is hoping, at least, as it launches its new SlateBook, a 14 inch, touchscreen laptop that runs Android.

Launching July 20, the SlateBook has a price tag of $399 and includes a full-sized keyboard in addition to a 1080p touchscreen. As this is a device running Android, it should perhaps come as no surprise that battery life is fairly high. The quoted nine hours is fairly impressive and this is being touted as an entertainment device. To back up this claim, in addition to the longevity of the battery, four speakers from the Apple-acquired BeatsAudio provide what is described as "the best-sounding, richest audio on a notebook".

Continue reading

Pirate Bay founder arrested as Demonoid returns from the dead

Pirates

The Pirate Bay saga is one that has been running for a number of years now, and the latest chapter sees one of the founders arrested in Sweden. Peter Sunde had been on the run for two years after failing to make an appearance having been sentenced to two years in prison. He had been handed an eight month term for aiding and abetting breach of copyright laws, although those associated with the site have long-maintained that they should not be held responsible for the sharing of copyrighted material as no data was stored on the site.

Sunde had been sought by Interpol and his arrest coincided with the eight-year anniversary of the police raid of Pirate Bay servers. He had been living in hiding in Berlin, but having family in Sweden meant that he often returned to the country. Torrent news website TorrentFreak reports that the arrest was a joint operation between Swedish and Polish law enforcement agencies.

Continue reading

The most popular stories on BetaNews this past week - May 25 -- May 31

may-2014-cal

No week would be complete without a little Windows news, and this week was no different. A registry hack emerged that should make it possible to receive updates for the no-longer-supported Windows XP right up until 2019. Microsoft later spoiled the fun by pointing out that it could lead to problems as the updates that would be made available as a result of implementing the hack would not be designed for regular desktop versions of Windows XP.

Last week we were wondering why it took eBay quite so long to warn users to update their passwords after a security breach earlier in the year. This week we discovered that it was because the company was under the impression that no user data had been accessed. Apple forgot to renew its SSL certificate, and in another Apple-related security story, a hacker managed to take control of iOS and Mac devices, and hold them ransom. To console itself, the company then splashed the cash on Beats Music -- Joe pondered whether this was just another indication of Apple's lack of innovation.

Continue reading

Samsung unveils its Simband and Sami health platform

i6cS1nv_5Hp8_contentfullwidth

Samsung has taken a new march in the wearables race through a new wristband and development platform to revolutionize the way sensors are used to collect critical health data about the user.

The Simband and Sami [Samsung Architecture Multimedia Interactions] platform, which were announced at a San Francisco press event, will be used by third-party sensor developers to collect and store data.

Continue reading

Google gives in, sets up 'forget me' form following EU ruling

erase-past

A couple of weeks ago, a European court ruling said that internet users had a "right to be forgotten". Google was at the center of the test case, and the internet giant expressed disappointment at the court's decision that individuals should be able to request that their details be removed from search results. Now a removal request form has been created for those looking to clear their name from search queries.

In order to use the form, individuals are required to provide a "valid form of photo ID". It is then possible to request that information that is "inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed" be removed. Google has already made it clear that it found the court ruling "disappointing", and the company says that submitting a request is no guarantee of having details removed from search results.

Continue reading

NSA: Edward Snowden did not raise surveillance concerns internally

Covering ears

In an interview with NBC earlier in the week, Edward Snowden -- ever a thorn in the side of the NSA -- defended his decision to leak documents to the press, saying "Sometimes to do the right thing, you have to break a law". The whistleblower has long insisted that his revelations were born of a desire to help his country, and claims that he previously tried to voice his concerns about the US government's surveillance tactics through official channels.

Speaking in Wednesday's interview, Snowden said "I actually did go through channels, and that is documented. The NSA has records, they have copies of emails right now to their Office of General Counsel, to their oversight and compliance folks, from me raising concerns about the NSA’s interpretations of its legal authorities". This is something disputed by the NSA who released details of a brief email exchange between Snowden and the Office of General Counsel.

Continue reading

The Internet of Things brings the future of the web as we know it into question

m2m-graphic1-2013-01-564x317_contentfullwidth

The so-called Internet of Things (IoT) came to the British public's fullest attention earlier this month, following national media coverage about two household name retailers announcing their proposed £3.4 billion merger. Dixon's and Carphone Warehouse positioned their desire to marry consumer electrical goods, such as fridges and TVs, with smartphone devices, as part of their preparation for IoT. In so doing, they would appear to want their slice of the multi-billion treasure trove tech industry giants such as Cisco and GE have been forecasting in the next five years.

Of course, the definition of IoT is not new. In fact it's been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up with the vision of an always-on, always-connected world. If you look into the details of what comprises the IoT, then you'll see that it includes everything from cloud computing, big data analytics, Internet-enabled devices, applications, network and storage.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.