For UK companies with at least 1,000 PCs, virtualization is a "strategic priority", however, they are yet unprepared for all the different security challenges this approach brings. This is according to a new report by Bitdefender. Surveying 153 IT decision makers in the UK, working in such companies, the report says hybrid infrastructures are the major common architecture in enterprise environments, as CIOs all over the world being to increasingly adopt them. The report sheds some light on the biggest fears and concerns IT decision makers have with the new infrastructure approach. Most (75 percent) fear the possibility of a… [Continue Reading]
In an increasingly digital world, criminals have the information and the means to ensure that high profile security breaches, involving major household names, continue to make the headlines. As technology evolves, so do the threats being developed by hackers who have a whole host of motivations for wanting to disrupt businesses of all sizes. It’s a constant battle but thankfully one that has resulted in increasingly sophisticated security tools coming to the market. Security Threats In many ways the hackers have more opportunities to attack, given the proliferation of devices being used to access systems and data remotely -- all… [Continue Reading]
Virtual reality is rather cool, although it requires money and commitment. To truly experience VR on a PC, you need a powerful computer and, sometimes, a room to be dedicated to it too. After all, the VR mask usually has to be tethered to the desktop PC -- a messy experience, leading to tangled wires. Sadly, it is these wires that really limit the fun of VR on PC. Thankfully, some PC manufacturers have wisely created backpack computers -- a PC designed to be worn on the user's back. This creates greater mobility while experiencing VR, although it does have the… [Continue Reading]
One of the benefits of shopping with Amazon is that you are able to read reviews written by other customers before you part with your cash. Now the company has updated its review policy, placing a limit on the number of reviews customers can write in a week. The new limit means that there is now a maximum of five reviews per customer per week, but there is an exception. If Amazon is able to verify that products have been purchased by -- rather than gifted to -- the reviewer, the limit is increased. But it gets a little more… [Continue Reading]
Earlier this year, Dropbox open-sourced Lepton, a lossless image compression algorithm which can reduce the size of JPEG images by an average of 22 percent. The technology converts your target JPEGs into the compacted LEP format, and restores the original version on demand. Dropbox is using Lepton right now to save bandwidth and storage space, and if you grab a copy of the Windows build then you can try it, too. The program is a single executable which you’ll need to run from the command line. At a minimum all you have to do is provide a target file name,… [Continue Reading]
If you've updated your iPhone to iOS 10.1.1, you may have started to feel that your battery is not lasting as long as it used to. You are not alone; you could be experiencing what has been named the 30 percent bug. Many users are complaining that their iPhones will suddenly drop from 30 percent battery charge to 1 percent, and then shutdown. The problem does not seem to affect one particular generation of iPhone, suggesting that the issue lies with iOS itself, but at the moment Apple does not have a fix available. There is a fairly lengthy thread… [Continue Reading]
The OnePlus 3T is shaping up to be one of the best smartphones that you can buy today. Replacing the OnePlus 3, it is a slightly beefier version of the former "flagship killer" that, at first glance, also feels more refined. Visually, it looks nearly the same, but the updated internals and improved software could make a big difference in day to day use. This is a first look at OnePlus' new flagship, which I feel is well needed as the OnePlus 3T today makes its European debut. Many of you will be considering it as your next smartphone, and… [Continue Reading]
If you didn't manage to pick up the tech bargains you were hoping for on Black Friday, the good news is you get a second chance with Cyber Monday! Courtesy of our partners at TechBargains, our selection of great Cyber Monday deals include laptop and desktop computers, televisions, media streamers, tablets, games consoles, vacuum cleaners and much more. See the latest Cyber Monday Deals at TechBargains... Top Rated for Picture Quality: 50" Vizio M50-D1 4K UltraHD Home Theater Display + $200 Dell Gift Card + 6" Android Tablet Remote for $599.99 (list price $849.99). Dell Inspiron 15 3000 Intel Celeron… [Continue Reading]
As organizations store more of their information in the cloud increased focus is placed on keeping it secure from breaches and other threats. Cloud storage specialist Scality is launching a new version of its RING software defined storage technology to provide extended security features and a trusted, compliant and secure storage infrastructure. "Data is a business critical asset but we are increasingly seeing more data breaches, security attacks and malware threats on businesses," says Giorgio Regni, CTO at Scality. "Organizations today need to reduce risk, assure compliance, securely store data and implement strict access controls and governance. We designed Scality… [Continue Reading]
Windows 10 has a lock screen mode called Windows Spotlight that pulls attractive images from the web on a daily basis. In most instances, you’ll only see these when you log on, or lock your PC. If you see an image that you’d like to use as Windows wallpaper, you can’t simply right-click and save it, but there is a way to easily export Windows Spotlight images to a folder so you can use them as desktop backgrounds. Firstly, if you aren’t currently using Windows Spotlight, right-click the desktop and select Personalize. Click on 'Lock screen', and change the Background… [Continue Reading]
The Muni public transport system in San Francisco has been hit by a major ransomware attack over the weekend that left the network having to give passengers free travel. It's estimated that around 2,000 systems have been affected by the attack, which began on Friday, including ticket machines, servers and Windows workstations. The software used in the attack is believed to be a variant of HDDCryptor. This uses freeware and open source tools to encrypt hard drives and network-shared files, as well as overwriting the master boot record on infected systems. Locked machines displayed a message reading, "You Hacked, ALL… [Continue Reading]
A quarter of the world's Wi-Fi networks are so insecure that the only thing stopping hackers from abusing them is their own lack of will. This is according to a new, extensive research by security experts at Kaspersky Lab, which have analyzed more than 31 million public Wi-Fi hotspots all over the world. Basically, 25 percent aren’t using any type of encryption or password protection, meaning the information going through these networks is wide open for everyone to see. Another three percent are using WEP, which is a protocol that can be cracked "within minutes, using tools that are freely… [Continue Reading]
Linux-based desktop operating systems can sometimes be incredible for productivity and security, but they can be deficient from a feature and application perspective too. Windows 10 and macOS Sierra, for instance, are chock-full of some exciting software that is simply not available on Linux, such as Microsoft Office and Adobe Photoshop, although alternatives (LibreOffice and Gimp for example) can sometimes be passable. With all of that said, Microsoft has delivered an incredible feature to Linux-based desktop operating systems by way of the latest Alpha version of its Skype client. What is this exciting feature of which I speak? Well, the newly-released Skype… [Continue Reading]