BetaNews Staff

Facebook could make explicit content more difficult to view

Facebook's own safety advisers are calling for new controls to be put in place that prevent gruesome images appearing on the social network after harrowing images appeared on one page in particular.

The new move is being proposed by Stephen Balkam, chief executive of the US Family Online Institute (Fosi), at the next meeting of Facebook's Safety Advisory Board after images of severed heads appeared on the social network courtesy of the Islamic State (IS).

Continue reading

What you really want is iPhone 6 with sapphire display

What do you want to see most on the new iPhone 6 (if you care about Apple's upcoming device, that is)?

That was the question posed by Usell.com in a poll of a thousand mobile owners across the US, and the resoundingly top response was the much talked-about sapphire screen. 45 percent of respondents said they wanted a super-tough sapphire display, with 50 percent of Android and iPhone users saying they would ditch their current smartphone for the iPhone 6 if it came with such a screen.

Continue reading

Apple and Samsung may have to settle in patent litigation

handshake

Apple and Samsung are reportedly close to reaching an amicable conclusion in a long-winded patent litigation battle after the US firm lost another court case against its rival.

The familiar US District Judge Lucy Koh ruled against Apple's bid to impose a sales ban on some older Samsung smartphones in the US and it follows the decision to drop all suits against each other in a range of different countries in the past few months.

Continue reading

Uber is stealing drivers away from Lyft

Ride sharing startup Uber has been caught using "brand ambassadors" to steal drivers away from its biggest competitor, Lyft.

Uber provides teams of independent contractors with credit cards and "burner" phones (essentially phones that can be bought without signing a contract) who then order rides from Lyft and charm the drivers over to Uber.

Continue reading

Google, Nvidia and VMware team up to bring graphics-intensive apps to Chromebooks

VMware, Google and Nvidia are all teaming up in a scheme which will allow high-end graphics intensive applications to be used on a lowly Chromebook.

How will that work? Obviously a Chromebook doesn't have the horsepower to run heavyweight programs such as, say, Photoshop or AutoCAD, but the laptop won't be running it in this case. The software will run in the cloud, on powerful machines in data centers, and be streamed to the notebook.

Continue reading

What’s wrong with my next-generation firewall?

Confused woman

Next-Generation Firewalls (NGFWs) are a foundational component for many traditional network security strategies. While nothing is technically wrong with today's NGFWs, much is wrong with the approach. Most solutions in the market today do exactly as advertised -- combine traditional packet filtering with some application control and rudimentary IPS layered on top. While these capabilities are still important, traditional NGFWs were designed for a more simple time, before advanced threats began burrowing into enterprises through new and innovative means.

Today's sophisticated attacks leverage an array of threat vectors that can take endless form factors. We are now seeing attacks that we couldn't have anticipated just a few years ago. The traditional network security approaches in place to address these challenges have been built from disparate point technologies, amounting to considerable complexity, that create gaps in these defenses that attackers exploit.

Continue reading

HP recalls 6 million laptop power cords over safety risks -- is yours affected?

laptop on fire

HP has recalled over six million LS-15 AC power cords in the US and Canada over potential fire and burn risks.

HP and the US Consumer Product Safety Commission said there have been several claims for minor burns and property damage following 29 reports of the power cords overheating and melting.

Continue reading

Are weak iPad sales just a 'speed bump' as Tim Cook says?

In usual fashion, Apple has been the talk of the tech world over the summer, and for good reason. As well as being one of the premier companies in the world, it recently signed a landmark partnership with old enemy IBM and is set to launch a brand new batch of iPhones in a fortnight.

However, the Cupertino-based firm has also come in for a lot of criticism, especially where the iPad is concerned.

Continue reading

Internet of Things-specific job titles becoming more common -- here’s why

As the Internet of Things continues to cement its place in the headlines with seemingly every tech business looking to lead the discussion (and the innovation), it’s becoming more common, too, that companies are creating roles dedicated to IoT. Microsoft, Cisco and Samsung are just a few examples of businesses that have appointed IoT leaders.

Heads of IoT are tasked with quite a hefty assignment -- believe me, I would know. This role aims to address customers’ technological needs as they digitalize their operations, and to help them develop their own long-term IoT strategies. With an estimated 50 billion data devices being connected by 2020, it’s worthwhile to have someone dedicated specifically to leading this charge.

Continue reading

Faith rises in the IT contractors job market

Faith in the IT contractors job market has returned to pre-recession levels according to research by Giant Group, a cross sector employment agency.

At the beginning of 2007, 6.02 percent of the agency's contractor database expected rates to drop, but now only 5.5 percent expect a decline.

Continue reading

Discounts assuage consumers' privacy concerns about wearables

Consumers are concerned about privacy issues when it comes to the increasingly connected smart world heralded by the incoming Internet of Things, where many more devices such as household gadgets and wearables are going to be online.

It's the latter that some new research (conducted by Acquity Group) focuses on, which found that the vast majority -- 80 per cent -- of consumers had privacy concerns when it comes to connected wearables.

Continue reading

China focuses on Internet Explorer, Windows Media Player in its beef with Microsoft

There has been more (big) trouble for Microsoft over in China, as the software giant is now facing scrutiny of its web browser (Internet Explorer) and Windows Media Player.

This is part of a Chinese antitrust investigation against Redmond, which apparently kicked off when Microsoft's offices in China were swooped on by officials from the State Administration for Industry & Commerce (SAIC) at the end of July.

Continue reading

Lizard Squad goes after Xbox Live, Twitch

Attack key

As you're almost certainly aware if you're a PlayStation owner, this weekend saw an attack mounted on the PlayStation Network which took it down for a large chunk of time.

But PSN wasn't the only gaming service to get bombarded by DDoS (distributed denial of service) attacks this weekend, and indeed, other attacks are continuing right now -- courtesy of the so-called Lizard Squad, a "hacktivist" group which is enjoying its time in the media limelight. (Though note that another hacker from Anonymous claimed responsibility for the PSN attack, so it's unclear exactly what went on in that case.)

Continue reading

LG's first 4K OLED TVs go on sale

LG’s first OLED 4K Ultra-HD televisions are on the way after the company combined the two technologies to make the first curved-TV to feature the new level of resolution.

The sets, which go on sale in September, will be the first such devices to reach retail stores and cost an eye-watering ₩12 million (roughly $11,796) to any consumer who wants to take advantage of the revolutionary technology on board.

Continue reading

How businesses can reduce security risks

Embracing the digital revolution is unavoidable for businesses. It has brought great advantages with it too, such as anytime, anywhere communications and the storage of vital and personal information for use in our work and personal lives. It has also provided greater flexibility in where and how we work and communicate, making things much easier for us.

However, it is important to acknowledge security aspects when evaluating mobility policies in particular. Cyber attacks are on the increase and will continue in their complexity and frequency. We hear about serious breaches on a daily basis. This can range from password leaks or mobile phone hacks to international scale bugs. I often find that in the corporate world, many recognize the threats but fail to implement any strategy, let alone take tangible action. The good news is that there are steps that can be taken by businesses to drastically improve mobile security.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.