Despite being the default browser in Windows 10, Edge really hasn’t taken off in the way that Microsoft would have hoped. According to the latest usage figures from NetMarketShare, the new browser currently has just 5.26 percent share. In a bid to improve matters, the software giant has started using pop-up notifications to push Edge in Windows 10, and bash its "rival" Chrome on both security and battery life. But if those arguments aren't enough to persuade you to switch, maybe the lure of 4K content from Netflix being exclusive to Edge will do the trick. SEE ALSO: Microsoft Edge… [Continue Reading]
Security researchers have discovered a new distributed denial of service (DDoS) method that requires less effort to launch large-scale attacks that can bring down servers or firewalls from a single laptop. The new method of launching DDoS attacks called BlackNurse was discovered by researchers at the Security Operations Center of the Danish telecom operator TDC (TDC SOC). It operates by using attacks based on low volume Internet Control Message Protocol (ICMP) to overload firewalls to the point where they shut down. BlackNurse also specifically targets firewalls made by Cisco, PaloAlto and other companies that are vulnerable to a "ping flood attack"… [Continue Reading]
The concept of data protection has been around for many years, since the UK first implemented a Data Protection Act in 1984. The general data protection regulation is a piece of legislation drawn up by the European Commission to unify data protection within the EU and to govern the export of personal data beyond the EU’s boundaries. GDPR is due to come into force across the EU in May 2018 following a two year transition period. Being a regulation rather than a directive, it doesn’t require enabling laws to be passed by member states. Why Data Protection Matters Businesses and… [Continue Reading]
Apple's AirPort wireless routers are iconic -- well designed aesthetically, while being rock solid from a performance standpoint. The company even took an odd approach to management -- an app that was only available for macOS, iOS, and Windows. In other words, it did not use a browser-based web interface like routers from other companies. The routers' lack of a web UI meant that it could not be managed from Linux-based operating systems. If you owned an Android device, Chromebook, or PC running Ubuntu, you could not change the AirPort settings. Some would argue that a lack of web interface made… [Continue Reading]
When looking at the budget action camera market there are few brands that stand out from the crowd. SJCAM is one of them. The company has built up a reputation for delivering quality action cameras at attractive price points and, most importantly, that can hold their own when pitted against premium rivals. It is no wonder that so many folks recommend them. SJCAM's SJ5000x Elite is among the most popular options in this segment, featuring impressive specs just above the $100 mark. On paper, it seems to have everything that you could want and more, but just how good is it really?… [Continue Reading]
In the run up to the holiday season many of us will be buying internet connected devices. But new research from Intel Security shows that technology bargains and gifts could be putting consumers' data at risk. The survey among UK consumers shows smartphones and tablets come top of many seasonal shopping lists, with 42 percent planning to upgrade gadgets to the latest models. Yet 60 percent say they have no plans to ensure security software is installed. "An underlying issue is that consumers simply don't know which products need protecting," says Nick Viney, VP consumer at Intel Security. "A fifth of… [Continue Reading]
BullGuard has released the latest version of its all-in-one anti-malware suite, BullGuard Internet Security. The new package extends its cloud storage abilities with enhanced support for Dropbox, OneDrive and Google Drive. Simplified backups enable users to copy files to the cloud directly from the program, without having to manually transfer them to a provider’s virtual drive first. Files and folders may now be encrypted before they’re uploaded to protect your privacy. A scheduler runs automated backups at regular intervals. Smaller enhancements include improved parental controls, smarter Registry protection, and more PC cleanup options and tweaks. A simpler licensing scheme means… [Continue Reading]
Edward Snowden. A liberal darling, and simultaneously a figure of hate. His surveillance leaks are now legendary, and while the NSA whistle-blower hides away in Russia, there are calls for President Obama to issue a pardon before President Trump becomes a reality. But Obama is having none of it. In an interview with Germany's Der Spiegel, the out-going president was asked bluntly about pardoning the former NSA contractor. His response was: "I can't pardon somebody who hasn't gone before a court and presented themselves". Obama, of course, could pardon Snowden if he wanted, regardless of whether he has faced trial,… [Continue Reading]
As Windows 10 evolves, Microsoft is incorporating a number of different technologies from 3D to mixed reality. The company's own AR/VR platform, Windows Holographic, has headsets like Oculus Rift, and the minimum spec for connected PCs is slowly starting to emerge. As noted by the Verge, the latest insider builds of Windows 10 include a Windows Holographic First Run app that gives you the chance to test your computer to see if it is compatible with Windows Holographic. The minimum specs are surprisingly low. While it is certainly not going to be possible to connect a Windows Holographic headset to… [Continue Reading]
If you happen to own the Amazon Echo and also happen to have a Fire Tablet sitting around, then you have an update for the tablet that has either arrived or soon will. Version 5.3.2 brings a very interesting feature that many users have been clamoring for. This update rolls Alexa into the mix, bringing voice control to the handheld device. This means you can access the Echo from anywhere in your home, even out of voice range. When the update is first installed it will walk you through what you can do, but it's pretty much anything you'd be able… [Continue Reading]
Freeware developer SoftwareOK has released MultiClipBoardSlots, a lightweight clipboard extension for Windows. The program extends Windows with up to ten clipboards. You’re able to copy to any slot with Ctrl+<slot number> without overwriting anything else, and paste from it with Alt+<slot number>. This works with text, images, Explorer files and folders and anything else you might normally pass through the clipboard. MultiClipBoardSlots is extremely configurable. You can enable or disable individual slots, customize their hotkeys, or choose to play an audio alert for copy and/ or pasting operations (handy as reassurance that everything is working correctly). The program can also… [Continue Reading]
With Black Friday, Cyber Monday and the holiday season on the horizon, many people are going to be shopping online. But how much do you trust the sites you’re dealing with? Password management company LastPass has released a report looking at each site's password requirements, how much information they store, and how much effort they put into helping customers follow good password security practices. It has identified the top online retailers based on e-commerce sales in 2015 and analyzed each website on a set of six criteria. It then ranks each on a scale of zero to 10 points, depending… [Continue Reading]
Intel has announced its plans to develop artificial intelligence (AI) and the chipmaker has claimed that within the next three years it will reduce the time needed to train a deep learning model by up to 100 times. The company's AI development will be centered around its own Intel Nervana platform that is the result of its recent acquisition of Nervana Systems. Intel purchased the deep learning startup earlier this year for over $400 million and its technology will play a key role in its efforts to pursue AI. Nvidia is currently at the forefront of AI due to its GPU… [Continue Reading]
Today's businesses face a wave of challenges when it comes to protecting their data. Securing data in the cloud, a rise in ransomware attacks, and increases in unstructured data all make it hard to plan operations effectively and can lead to unscheduled downtime. Cloud data protection company Arcserve, however, sees this as an opportunity for organizations to re-assess their ability to cope with problems. The company has released a report setting out five strategies to help organizations prepare for and respond to unplanned downtime. These include improving risk management and making more effective use of the cloud. By applying Arcserve's strategies… [Continue Reading]
This is my promised column on data security and the Internet of Things (IoT). The recent Dyn DDoS attack showed the IoT is going to be a huge problem as networked devices like webcams are turned into zombie hoards. Fortunately I think I may have a solution to the problem. Really. I’m an idiot today, but back in the early 1990’s I ran a startup that built one of the Internet’s earliest Content Distribution Networks (CDN), only we didn’t call it that because the term had not yet been invented. Unlike the CDNs of today, ours wasn’t about video, it… [Continue Reading]
Apple has launched its second repair program in quick succession, this time focusing on iPhone 6s handsets that suffer unexpected shutdowns. The program will see batteries replaced in a number of affected phones. The battery replacement program comes hot on the heels of a repair program for iPhone 6Plus handsets afflicted with 'touch disease'. Apple stresses that the battery problems are not a safety issue such as seen with the Samsung Galaxy Note7, and advises customers with problematic handsets how to get a repair. The battery replacement program is in operation around the world, and Apple is offering refunds to… [Continue Reading]
Supply chain management (SCM) is a vitally important business feature for many industries, having an impact on every aspect of the supply chain, from supplier to customer. Every detail of this process must be managed carefully, as even the smallest mistake could lead to delays, customer frustration and lost revenue. What’s more, supply chain management does not only refer to the movement of physical products through the supply chain. Any data associated with these products, including invoices, schedules and delivery information, also needs to be managed appropriately to ensure that businesses have visibility and clarity across the length of the… [Continue Reading]