BetaNews Staff

Global Airport Action initiative targets credit card fraudsters

Global law enforcement agencies and the airline, travel and credit card industries have joined forces in a major concerted action to combat online fraud.

The operation, organized via three coordination centers at Europol, in The Hague, Interpol in Singapore and Ameripol in Bogota, and involving over 60 airlines and 45 countries at more than 80 airports across the world, saw 281 suspicious transactions reported and 118 individuals arrested.

Continue reading

Why Virtual Desktop Infrastructure is not the future

looking ahead

One of the current challenges for a business IT team is supporting a variety of desktops, laptops, tablets and mobile end user devices for employees. This task can be a considerable overhead in terms of time, resource and cost. Physical desktops are not only expensive, insecure, and maintenance heavy, they are also not necessarily a good fit for an increasingly mobile and demanding workforce. The groundswell of Windows 7 migration plans, an expanding virtual workforce, the growing popularity of mobile devices, and tighter IT budgets each point to the need to re-evaluate desktop strategies.

While virtual desktop infrastructure (VDI) seems like a promising alternative to managing physical desktops and mobiles, in reality, it’s too costly and complex for most companies to implement successfully. Cloud services, however, are helping to mitigate many of the challenges of traditional VDI implementations. Cloud based virtual desktops deliver benefits around centralized management and simplified deployment without the high costs, limitations, or difficulties of VDI.

Continue reading

Sony hack leads to unreleased movies leaking online

A number of unreleased movies, as well as some confidential data, has been leaked online following a massive hack at Sony Pictures that happened last week.

In the Reddit thread covering the issue it says that, movies aside, confidential data including visa and passport information of cast and crew members working on different Sony projects, email inboxes and other important documents were leaked.

Continue reading

Does your company need an Intrusion Detection System?

security

Unauthorized access to networks is currently one of the most serious threats to the hosting business. Intruders and viruses present the two biggest security threats to the industry. Let us examine three key definitions: intruders (or hackers), intrusion, which is a formal term for describing the act of compromising a network or system, and Intrusion Detection Systems, which help business detect when they are vulnerable to an attack.

Intruders can be external or internal and their intents may vary from benign to serious. Statistically 80 percent of security breaches are committed by internal users and these are by far the most difficult to detect and prevent. These intruders create a significant issue for network systems and IT equipment. Intruders come in a variety of classes with a varying level of competence -- an external user without authorized access to the system will want to penetrate the system to exploit legitimate user accounts to access data, programs or resources with a purpose of misuse. Intruders may even use compromised systems to launch attacks.

Continue reading

7 top tips for making money on Twitter

Twitter is a great tool, not only for communicating, but also for making money. There are a whole host of individuals out there who have forged successful careers out of money made on Twitter. However, you do not have to be a social media genius to get in on the action.

All you really need to make money on Twitter is some creativity and ambition. Below are 7 tips that can help you out.

Continue reading

Social networks do not represent the real world

Researchers have warned that big data trends discerned from social networks, like Twitter and Facebook, misrepresent the real world because they use biased information.

Computer scientists at McGill University, Montreal and Carnegie Mellon University in Pittsburgh, have discovered that social media is often guilty of "population bias", as large sections of society are not represented by the sites.

Continue reading

The benefits of choosing SaaS over ASP

There has been a lot of discussion in the treasury management software market over the years about which deployment method is the best for clients. The general consensus, both among industry experts and, as evidenced by growth figures put out by analysts such as IDC and Apps Run The World, is that the installed model is on its last legs and SaaS (software as a service) is how the majority of treasury systems will be deployed in the future.

Given this backdrop, it’s not hugely surprising that the treasury vendors themselves are clamoring to talk about how their solutions are SaaS, in order to capitalize on market interest.

Continue reading

US military worried about stolen cars being used as weapons

The US military is preparing to wage war on car crime with the specific remit to develop a plan with manufacturers that prevents hackers stealing cars and one day turning them into weapons.

A group of hackers was recently hired by the US Defense Department to see if they could break into a 2012 model car and computer scientist Kathleen Fisher, who heads the group, showed that an electronic key could be created to unlock to car’s network.

Continue reading

11 top tips to get the most from iPhone 6 and iOS 8.1

For those of you who have made the commitment of purchasing the new iPhone 6 or iPhone 6 Plus, you’ve probably spent a fair bit of time figuring out all the cool tricks and shortcuts that they offer. The same may also be true for anyone who has recently upgraded to Apple’s new operating system, iOS 8.1.

However, there are always a few secrets that slip under the radar. With that in mind, here are 11 tips and tricks for your iPhone 6 and iOS 8.1 that you may not know yet, but definitely should.

Continue reading

Analog TV frequencies could be used for 'super Wi-Fi', say scientists

Outdated analog TV frequencies should be used to create new space for "super Wi-Fi" that would boost the world’s economy and take the strain off overloaded mobile networks even though worries persist over how workable they are.

Scientists from the Karlsruhe Institute of Technology [KIT] are calling for governments to hand over the unused frequencies so that a widespread free Wi-Fi network can be created.

Continue reading

When iPads fall, Windows tablets rise

The tablet market could be slowing down after years of growth, according to industry estimates, with Apple's iPad set to be hardest hit.

Research firm IDC projects that total tablet shipments globally are set to increase by only 7.2 percent this year, compared with 52.5 percent growth in 2013.

Continue reading

It's time for enterprises to get crazy with communication

It’s been a long time coming. Fifteen years after VoIP proved its cost benefits, ten years after 'telephony' reinvented itself as unified communications and five years since the whole lot became 'just another app', we’re finally witnessing the consumerization and democratization of enterprise-class, personal communications and messaging by going ‘over-the-top’.

In the telecoms world, the OTT (over-the-top) acronym is well understood, if not a little overused. Traditional telecom providers have been forced into developing innovative services that move above their traditional infrastructure markets of lines and minutes, in order to compete with the innovative OTT services provided by the likes of Google, Facebook and Skype that capture the user so effectively and give them an experience they just can’t do without.

Continue reading

PlayStation games can run on Android Wear smartwatches

With the latest smartwatches boasting a significant amount of processing power, it was only a matter of time before fans of classic video games starting emulating older titles to run on them.

Now, one particular retro enthusiast has managed to run PlayStation One games on their Android Wear device.

Continue reading

Is your company making the most of web-based tech?

Technologies available to businesses are changing daily. In the competitive business arena, it has become imperative to constantly evolve along with the technology. No matter which aspect of your business you consider, there is a relevant technology to make it more efficient.

When it comes to web-based technologies, there are a gamut of options that companies can benefit from to build their market reputation, outreach, drive more sales and enhance revenue. In this article, we will talk about a few of the most significant web based technologies that have changed the dynamics of how businesses operate and market themselves in today’s world.

Continue reading

France wages war against US tech companies

France is a country that has been a continual stone in the shoe of American companies expanding into Europe. The country has been vocal opponent of the dominance of US Internet services and this week it has escalated its attacks.

Netflix, which began its foray into Europe in Scandinavia, has been labeled by the French consumer association as "malicious" due to a number of "illegal clauses" it includes in its user agreement. Among these were changing terms without alerting customers and writing all clauses in English only.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.