We have a lot of news coming out of AMD’s kitchen, including new GPUs, an open-source rendering engine, and a new solution for large dataset applications. First in line is the Radeon Pro WX Series of professional graphics cards, aimed at modern content creation and engineering. It is based on the Polaris architecture, and AMD says it was built with open-source software in mind. The new cards are "designed for creative professionals and those pushing the boundaries of science, technology and engineering". A total of three cards were unveiled. The Radeon Pro WX 7100 GPU, created for engineering and media… [Continue Reading]
O2 customer data has been found available for sale on the dark web, most likely as a result of a hack that occurred several years ago. The gaming website XSplit was hacked three years ago and those responsible for the hack were able to obtain usernames and passwords from the site. Through the process of credential stuffing, in which account credentials acquired through a hack are tested on multiple websites, the hackers were able to gain access and log into O2 accounts. O2 has contacted the police to report the case and is working to aid the authorities in their… [Continue Reading]
The US has four nominees for president now. The choices narrowed a bit yesterday when Bernie Sanders officially nominated Hillary Clinton upon losing a hard fought campaign. Clinton swallowed her pride and did the same thing for Barrack Obama back in 2008. Despite the common misconception, the US does have more than two parties, though most citizens seldom hear about others. There are also fringe parties that really aren't heard of. However, a search of Google as of this morning told people there were only three candidates, and one of those was no longer in the race. The ones listed… [Continue Reading]
It's something that Android users have been begging for -- the ability to buy an app once, and share it with members of the family. Until now, one way around the problem was to create a shared family account that could be used to download everything, but now Google has a better solution: Google Play Family Library. This new feature not only lets you share purchased apps with up to six family members, but also games, movies, TV shows and books. It's something that could save Android-using families a good deal of money, and it's rolling out right now. To… [Continue Reading]
Solid state drives have been a huge boost to performance for home computer users. Long gone are the days where your PC had to have moving parts. The sound of a slow and loud HDD seeking data is a noise I will never miss. SSDs are not just for the home, however, as the enterprise can leverage them too. Today, Seagate unveils what it calls an "Industry First" -- a 2TB M.2 NVMe Enterprise SSD, dubbed "Nytro XM1440". This fast drive with massive capacity could be a godsend for servers. "As the latest addition to the Seagate Nytro SSD product line, the 2TB Nytro XM1440… [Continue Reading]
You might think that becoming a cyber criminal required some hard work and dedication to your task, maybe even some form of apprenticeship where you learn the craft at the side of a more experienced hacker. But new research has identified a one-stop, outsourced online shop, providing hosting, design and payment solutions for cyber criminals looking for a low-cost of entry method to sell their ill-gotten assets. Cyber attack prevention specialist Digital Shadows conducted research into deer.io, a Russian-language site that hosted darkside.global. The service appears to have been active since at least October 2013 and, at the time of… [Continue Reading]
Malware isn’t just about native executables or rogue apps, not any more -- a malicious browser extension can cause almost as many problems on all your devices at once. With the right permissions, for example, your new Chrome add-on could steal your user credentials, post as you on social media, read your emails, help launch a DDoS attack, and more. Worst of all, this isn’t even particularly difficult. Some carefully crafted JavaScript gives the hacker everything they need. What can you do? The first step is to understand the possibilities, and Maxime Kjaer’s recent blog post can help. The Computer… [Continue Reading]
Microsoft is on a mission to destroy Steam with Windows 10. At least that is what Tim Sweeney, co-founder of Epic Games believes. He says that Microsoft's love of UWP (Universal Windows Platform) apps means that Win32 apps are gradually being driven to extinction. In an interview with Edge magazine, Sweeney says that he predicts Microsoft will release patches for Windows 10 over the next few years that will render Steam "progressively worse and more broken". Sweeney has spoken out against UWP before, and his hatred is far from a secret. He believes that Microsoft will use its position with… [Continue Reading]
In the second quarter of this year DDoS attacks increased by 83 percent to more than 182,900, according to the latest threat report from security solutions company Nexusguard. The report shows that Russia has become the number one victim country. Starlink -- a Russian ISP supporting small, medium and large enterprises -- received more than 40 percent of the DDoS attacks measured over a two-day period. This targeted DNS attack also pushed the mean average DDoS duration to hours instead of minutes, as measured in the previous quarter. Nexusguard's researchers attributed this increase to nationalist hactivists organizing a targeted attack… [Continue Reading]
Salespeople spend a lot of their time in communication with customers and prospects, so time spent updating CRM systems can often be seen as unproductive. Business cloud platform Zoho aims to change that with the launch of its latest CRM product which incorporates SalesInbox, an email client designed exclusively for salespeople. Zoho SalesInbox works with Gmail, Exchange, Yahoo! Mail, Zoho Mail and other standard email hosting services. It's part of Zoho CRM Enterprise and will also work with Salesforce. What it does is to organize emails according to how important they are for a salesperson, enabling them to prioritise and… [Continue Reading]
BlackBerry's Priv, hasn't quite been a huge hit with consumers, but the company is not ready to give up just yet as it has introduced its second Android handset, called DTEK50. The selling point? BlackBerry claims that it is the "world's most secure Android smartphone". The market for privacy and security-focused smartphones seems to be quite small -- insignificant, really -- if we are to look at how poorly Priv and Silent Circle's Blackphone have been selling so far. And it is hard to see how the new DTEK50 will change that. BlackBerry's second Android smartphone is actually a rebadged Alcatel… [Continue Reading]
A Google Project Zero hacker has discovered a zero-day vulnerability in the password manager LastPass that could lead to accounts being completely compromised. The security flaw can be triggered by visiting a malicious website, and it has been confirmed to be an issue by white hat security researcher Tavis Ormandy. He has filed a full report to LastPass with a view to getting the vulnerability patched. As the security hole is yet to be fixed, full details have not been publicly released. However, Ormandy has gone as far as saying that "it's a complete remote compromise" -- something which will… [Continue Reading]
A Google Project Zero hacker has discovered a zero-day vulnerability in the password manager LastPass that could lead to accounts being completely compromised. The security flaw can be triggered by visiting a malicious website, and it has been confirmed to be an issue by white hat security researcher Tavis Ormandy. He has filed a full report to LastPass with a view to getting the vulnerability patched. As the security hole is yet to be fixed, full details have not been publicly released. However, Ormandy has gone as far as saying that "it's a complete remote compromise" -- something which will… [Continue Reading]
Data risk reduction specialist Identity Finder has rebranded itself as Spirion and has released the results of long-term sensitive data audits at three of its largest enterprise sites. During the audits, the company discovered that if left unchecked, every legitimate piece of sensitive data will create up to 1,000 unnecessary copies. What's more, the company found that if left unmanaged, for every legitimate user of sensitive data, up to 100 additional users will end up having access to it. These assessments are based on before and after audits of the implementation of Spirion’s Data Platform. "To eliminate the risks associated… [Continue Reading]
There are a number of secure flash drives on the market, but most of them rely on a software lock that requires you to enter a PIN on the computer after you've plugged in the drive. Apricorn takes a different approach with its Secure Key which has a keypad on the device itself, allowing you to lock and unlock it independently. At 95.5 mm it's about half as long again as a normal flash drive and fits snugly into an aluminum slip case so you can't accidentally press buttons in your pocket. The keys are small but have a positive… [Continue Reading]
Xiaomi has been busy. On top of introducing its first laptop, the Mi Notebook Air, today the company also unveils the Redmi Pro. Its newest phablet has an attractive price and an impressive specs sheet, which includes a dual camera setup. Xiaomi has been betting on specs to attract consumers and the Redmi Pro is yet another solid example of its strategy. The device has specs that would not look out of place on a premium phablet, yet the $225 starting price puts it at the lower end of the mid-range segment. It is a combination that is sure to… [Continue Reading]
If you’re wondering what someone’s been doing in Firefox then you could check the browser history, but if they’ve deleted it, along with any cookies, cache or logins, you won’t learn very much. What isn’t so obvious is that Firefox has a hidden browsing history which records some of the sites you’ve visited, and isn’t removed when you wipe the official "Browsing & Download History". This is all about HSTS (HTTP Strict Transport Security) and HPKP (HTTP Public Key Pinning), web security mechanisms which enable servers to protect against attacks using cookie hijacking, protocol downgrades and fraudulent certificates, among others.… [Continue Reading]
Here is a scary prospect. Ransomware that hides in a corporate network, analyzing it and multiplying itself until it is found on every machine in an organization. Only after it has contaminated every machine in a network will it activate, in a coordinated attack, bringing an entire company’s business to a screeching halt, until a large sum of money is paid to the attacker. Such an idea is not yet reality, but it’s not far from it, either. Cisco’s Midyear Cybersecurity Report says it is only a matter before we hit this milestone, mostly because ransomware has become the most… [Continue Reading]
A product listing that surfaced in January signaled that Xiaomi planned to introduce its first laptop this year, with leaked specs suggesting that we should expect a big and powerful laptop. However, today's introduction of the Mi Notebook Air comes as a surprise, as the ultrabook actually comes in two vastly different versions instead, which are designed to appeal to a wider range of consumers. Here is what you need to know. Xiaomi has clearly differentiated the two Mi Notebook Air devices, giving them not only differently-sized displays but also different internals as well. Some folks call it a MacBook… [Continue Reading]
However careful you are online it's always possible to get caught out by a maliciously coded website or advert that leads to malware ending up on your machine. Online safety service SafeDNS is launching a new system for detecting malicious internet resources, which it claims blocks close to 100 percent of them for better online protection. Using continuous machine learning and user behavior analysis, the new SafeDNS system takes a step forward from static lists of categorized resources to dynamically created databases. The SafeDNS research team has produced a technology able to detect malicious internet resources with 98 percent precision.… [Continue Reading]
Apple today announced its financial report for Q3 FY2016 (Q2 CY2016), revealing a drop in revenue and falling iPhone sales compared to both the previous quarter and this time last year. Apple posted quarterly revenue of $42.4 billion and a net income of $7.8 billion, with the bulk (nearly $18 billion) coming from the Americas. This revenue is compared to $50.5 billion in Q2 FY2016 and $49.6 billion in Q3 FY2015, drops of 16 percent and 15 percent respectively. The iPhone sales slump is also continuing, with 40,399 units sold in Q3 FY2016 compared to 51,193 in the previous quarter… [Continue Reading]
The "new" Microsoft led by folks like Satya Nadella, Dona Sarkar, and Panos Panay is very different than prior regimes. The company in its current form listens intently to users, while being increasingly transparent regarding Windows and other software. One of the biggest examples of Microsoft's customer-first focus is the Windows Insider program. This allows any user to experience early builds of the operating system, while providing valuable feedback. Windows 10 is truly influenced by its own users. To celebrate the program, Microsoft ran a contest to design an official team t-shirt. Today, Dona Sarkar announces the finalists and opens up voting. There… [Continue Reading]
When I bought my first-ever iPhone in September 2015, I was a die-hard Spotify user. Since I was starting fresh by abandoning Android, I decided to give Apple Music a try instead. I loved it. The sound quality is superb, and the human-curated playlists are second to none. While it is not perfect, it is very satisfying and getting better. Today, Apple makes a seemingly curious purchase to bolster the aforementioned streaming music service -- a TV series. While that may sound odd, it actually makes sense as it is music related. You see, it is based on the wildly popular "Carpool Karaoke" segment… [Continue Reading]