Global Airport Action initiative targets credit card fraudsters
Global law enforcement agencies and the airline, travel and credit card industries have joined forces in a major concerted action to combat online fraud.
The operation, organized via three coordination centers at Europol, in The Hague, Interpol in Singapore and Ameripol in Bogota, and involving over 60 airlines and 45 countries at more than 80 airports across the world, saw 281 suspicious transactions reported and 118 individuals arrested.
Why Virtual Desktop Infrastructure is not the future
One of the current challenges for a business IT team is supporting a variety of desktops, laptops, tablets and mobile end user devices for employees. This task can be a considerable overhead in terms of time, resource and cost. Physical desktops are not only expensive, insecure, and maintenance heavy, they are also not necessarily a good fit for an increasingly mobile and demanding workforce. The groundswell of Windows 7 migration plans, an expanding virtual workforce, the growing popularity of mobile devices, and tighter IT budgets each point to the need to re-evaluate desktop strategies.
While virtual desktop infrastructure (VDI) seems like a promising alternative to managing physical desktops and mobiles, in reality, it’s too costly and complex for most companies to implement successfully. Cloud services, however, are helping to mitigate many of the challenges of traditional VDI implementations. Cloud based virtual desktops deliver benefits around centralized management and simplified deployment without the high costs, limitations, or difficulties of VDI.
Sony hack leads to unreleased movies leaking online
A number of unreleased movies, as well as some confidential data, has been leaked online following a massive hack at Sony Pictures that happened last week.
In the Reddit thread covering the issue it says that, movies aside, confidential data including visa and passport information of cast and crew members working on different Sony projects, email inboxes and other important documents were leaked.
Does your company need an Intrusion Detection System?
Unauthorized access to networks is currently one of the most serious threats to the hosting business. Intruders and viruses present the two biggest security threats to the industry. Let us examine three key definitions: intruders (or hackers), intrusion, which is a formal term for describing the act of compromising a network or system, and Intrusion Detection Systems, which help business detect when they are vulnerable to an attack.
Intruders can be external or internal and their intents may vary from benign to serious. Statistically 80 percent of security breaches are committed by internal users and these are by far the most difficult to detect and prevent. These intruders create a significant issue for network systems and IT equipment. Intruders come in a variety of classes with a varying level of competence -- an external user without authorized access to the system will want to penetrate the system to exploit legitimate user accounts to access data, programs or resources with a purpose of misuse. Intruders may even use compromised systems to launch attacks.
7 top tips for making money on Twitter
Twitter is a great tool, not only for communicating, but also for making money. There are a whole host of individuals out there who have forged successful careers out of money made on Twitter. However, you do not have to be a social media genius to get in on the action.
All you really need to make money on Twitter is some creativity and ambition. Below are 7 tips that can help you out.
Social networks do not represent the real world
Researchers have warned that big data trends discerned from social networks, like Twitter and Facebook, misrepresent the real world because they use biased information.
Computer scientists at McGill University, Montreal and Carnegie Mellon University in Pittsburgh, have discovered that social media is often guilty of "population bias", as large sections of society are not represented by the sites.
The benefits of choosing SaaS over ASP
There has been a lot of discussion in the treasury management software market over the years about which deployment method is the best for clients. The general consensus, both among industry experts and, as evidenced by growth figures put out by analysts such as IDC and Apps Run The World, is that the installed model is on its last legs and SaaS (software as a service) is how the majority of treasury systems will be deployed in the future.
Given this backdrop, it’s not hugely surprising that the treasury vendors themselves are clamoring to talk about how their solutions are SaaS, in order to capitalize on market interest.
US military worried about stolen cars being used as weapons
The US military is preparing to wage war on car crime with the specific remit to develop a plan with manufacturers that prevents hackers stealing cars and one day turning them into weapons.
A group of hackers was recently hired by the US Defense Department to see if they could break into a 2012 model car and computer scientist Kathleen Fisher, who heads the group, showed that an electronic key could be created to unlock to car’s network.
11 top tips to get the most from iPhone 6 and iOS 8.1
For those of you who have made the commitment of purchasing the new iPhone 6 or iPhone 6 Plus, you’ve probably spent a fair bit of time figuring out all the cool tricks and shortcuts that they offer. The same may also be true for anyone who has recently upgraded to Apple’s new operating system, iOS 8.1.
However, there are always a few secrets that slip under the radar. With that in mind, here are 11 tips and tricks for your iPhone 6 and iOS 8.1 that you may not know yet, but definitely should.
Analog TV frequencies could be used for 'super Wi-Fi', say scientists
Outdated analog TV frequencies should be used to create new space for "super Wi-Fi" that would boost the world’s economy and take the strain off overloaded mobile networks even though worries persist over how workable they are.
Scientists from the Karlsruhe Institute of Technology [KIT] are calling for governments to hand over the unused frequencies so that a widespread free Wi-Fi network can be created.
When iPads fall, Windows tablets rise
It's time for enterprises to get crazy with communication
It’s been a long time coming. Fifteen years after VoIP proved its cost benefits, ten years after 'telephony' reinvented itself as unified communications and five years since the whole lot became 'just another app', we’re finally witnessing the consumerization and democratization of enterprise-class, personal communications and messaging by going ‘over-the-top’.
In the telecoms world, the OTT (over-the-top) acronym is well understood, if not a little overused. Traditional telecom providers have been forced into developing innovative services that move above their traditional infrastructure markets of lines and minutes, in order to compete with the innovative OTT services provided by the likes of Google, Facebook and Skype that capture the user so effectively and give them an experience they just can’t do without.
PlayStation games can run on Android Wear smartwatches
Is your company making the most of web-based tech?
Technologies available to businesses are changing daily. In the competitive business arena, it has become imperative to constantly evolve along with the technology. No matter which aspect of your business you consider, there is a relevant technology to make it more efficient.
When it comes to web-based technologies, there are a gamut of options that companies can benefit from to build their market reputation, outreach, drive more sales and enhance revenue. In this article, we will talk about a few of the most significant web based technologies that have changed the dynamics of how businesses operate and market themselves in today’s world.
France wages war against US tech companies
France is a country that has been a continual stone in the shoe of American companies expanding into Europe. The country has been vocal opponent of the dominance of US Internet services and this week it has escalated its attacks.
Netflix, which began its foray into Europe in Scandinavia, has been labeled by the French consumer association as "malicious" due to a number of "illegal clauses" it includes in its user agreement. Among these were changing terms without alerting customers and writing all clauses in English only.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.

