Wednesday, 31 August 2016

Smart energy

A "smart energy" revolution could help ensure that the UK does not suffer blackouts, according to National Grid's new UK chief.

Twitter to share video advertising cash with creators

Twitter will start sharing advertising revenue generated by videos made by individual users with their creators.

Benefits nurse sacked in Facebook posts row

A disability benefits assessor who was suspended after allegedly posting abusive comments about disabled claimants on Facebook is sacked.

Shenzhen's start up scene: from ski sensors to worm farms

Shenzhen is famous for making electronics, but it's also become a popular spot for start-ups from all over the world.

How tech is helping a casino catch the cheats

Dan Simmons finds out how one casino uses its own technology to catch cheats

Lenovo Yoga Book reads scribbles made on paper

Lenovo unveils a tablet that can read notes and drawings made on a pad of paper put on top of its digitiser.

Jeremy Corbyn proposing digital 'bill of rights'

Every home and business in the UK would have guaranteed access to high-speed broadband as part of a digital "bill of rights" proposed by Jeremy Corbyn.

SES company first to use 'second-hand' SpaceX rocket

Luxembourg-based SES says it is going to be the first satellite operator to launch a spacecraft on a "second-hand" rocket - a Falcon 9 that previously sent supplies to the space station.

EU's net neutrality guidelines get published

New guidelines are published setting out how the EU's net neutrality rules should be applied.

Google to expand ride-sharing service in San Francisco

Google plans to expand a ride-sharing service in San Francisco, setting up a potential showdown with market leaders Uber and Lyft.

Google DeepMind targets NHS head and neck cancer treatment

Anonymised scans from 700 former cancer patients at a London hospital will be analysed by Google's artificial intelligence division, DeepMind.

Pakistani farmers to be given five million smartphones

Five million smartphones are to be given to farmers in Pakistan in an effort to improve knowledge of modern farming techniques.

Dropbox hack 'affected 68 million users'

A Dropbox security breach that occurred in 2012 appears to have affected more than 68 million accounts.

Tuesday, 30 August 2016

How to Remove EverydayManuals Toolbar

You should know that most of these ads tend to be annoying and have negative effects on the high quality involving your internet browsing sessions. Automated infection Removal:

We all recommend using SpyHunter Malware Protection Suite.

You can find SpyHunter & it will detect an infection and remove it, by clicking typically the download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will detect all threats offer on the system, but to unlock the total potential of the SpyHunter Malware Protection Suite, use it as a removal program, you need to purchase a license.

Download Now

Remove infection from the browser:



Internet Explorer:

Go to Tools -> Internet options -> Innovative Tab and click the Reset switch (make sure to select the Delete Personalized Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the web browser as you will lose all personal options.

After Internet Explorer accomplishes the operation, click close press button and then re-start it for the brand new changes to take effect.

Google Chrome:

Go to the using path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

However, you can navigate to these folders by these steps:

For Or windows 7:

1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.



For Windows Vista/7/8:

1 . Click on the Windows custom logo in the lower left part of the display.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Over the rest the Firefox Main window (top-right corner), click the Firefox Menu switch, go over to the Help sub-menu and choose Troubleshooting Information.

2 . not Click the Refresh / Reset Internet explorer button in the upper-right corner with the Troubleshooting Information page.

3. To continue, click Refresh and Reset Firefox in the confirmation windowpane that opens.

some. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.

Delete any folders or perhaps files related to infection by exploring the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download NowSo, we recommend that you obtain rid of the…. EverydayManuals generates the lot of ads about the screen which can easily deleted mts file make anyone https://webshop.telekom.rs/ visit certain web sites along with help the developers to produce money

WhatsApp policy changes prompt FTC complaints from privacy groups

Privacy groups in the U.S. have complained to the Federal Trade Commission that changes last week in WhatsApp’s terms and privacy policy break its previous promise that user data collected would not be used or disclosed for marketing purposes.

The Electronic Privacy Information Center and the Center for Digital Democracy have described the move as an unfair and deceptive trade practice, subject to an investigation and injunction by the FTC, in their complaint Monday.

WhatsApp said last week it will be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.

To read this article in full or to leave a comment, please click here

Poisoned Word docs deploy rogue web proxies to hijack your encrypted traffic

Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.

A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.

In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.

To read this article in full or to leave a comment, please click here

Kim Dotcom explains why he wanted his appeal livestreamed.

Kim Dotcom, fighting extradition to the US over copyright infringement, discusses why he wanted the court case livestreamed.

Sri Lankan teenager held over hacking of president's website

A Sri Lankan schoolboy is arrested for allegedly hacking the website of President Maithripala Sirisena, police say.

Kim Dotcom wins right to livestream extradition appeal

A New Zealand judge allows internet entrepreneur Kim Dotcom to livestream his appeal against extradition to the US on YouTube.

Driverless Roborace car speeds around Donington

A prototype racing car, testing self-driving technology for the forthcoming Roborace contest, takes a lap around Donington Park's circuit.

Fastest mobile 4G network speed record 'broken'

A new record has been set for the world's fastest 4G mobile internet speed, according to a network operator.

Rail firm to test Uber-style mobile payments system

Smartphones could soon replace the traditional rail ticket if an experiment by Chiltern Railways is successful.

Facebook lets users prompt danger alert

Facebook is to enable members to trigger its Safety Check service themselves if a dangerous event occurs near them.

How to remove Citybonanza.club Support Scam

Threat Classification: Ransomware/Rogueware Citybonanza. Auto infection Removal:

We all recommend using SpyHunter Malware Stability Suite.

You can find SpyHunter & it will detect disease and remove it, by clicking often the download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will detect all threats existing on the system, but to unlock the entire potential of the SpyHunter Malware Stability Suite, use it as a removal device, you need to purchase a license.

Download Now

Remove infection out of your browser:

Internet Explorer:

Go to Tools -> Internet options -> Innovative Tab and click the Reset option (make sure to select the Delete Individual Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the internet browser as you will lose all personal configurations.



After Internet Explorer wraps up the operation, click close switch and then re-start it for the fresh changes to take effect.

Google Chrome:



Go to the pursuing path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

As an alternative, you can navigate to these folders using these steps:

For Or windows 7:

1 . Click on Come from the lower uninstall SuperWeb left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows logo design in the lower left part of the display screen.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Over the rest the Firefox Main window (top-right corner), click the Firefox Menu press button, go over to the Help sub-menu and choose Troubleshooting Information.

installment payments on your Click the Refresh / Reset Flock button in the upper-right corner on the Troubleshooting Information page.

3. To continue, click Refresh or Reset Firefox in the confirmation windows that opens.

some. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.

Delete any folders or perhaps files related to infection by exploring the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download Nowlubis the nasty, deceptive along with bogus support scam website, which in turn goal would be to deceive computer customers straight into thinking that his or her pc if infected simply by several nasty malware/virus/spyware/ransomware or it's got a few very complex operating-system issue, which could trigger DATA LOSSand if they would like to remove this issue, that they should call…

Monday, 29 August 2016

Irish church review over Grindr claims

Catholic church authorities in Ireland order a review of social media access for trainee priests after allegations some of them used the gay dating app Grindr.

Driverless taxis roam Singapore streets

Driverless taxis are being tested on the streets of Singapore for the first time.

Pneumatic octopus is first soft, solo robot

Engineers in the US have built the first self-contained, entirely soft robot - in the shape of a 7cm octopus.

Ghostbusters star hit by cyber-attack

Intimate images of Ghostbusters star Leslie Jones and racist photos appear on her website after it was targeted in a cyber-attack.

Self-driving taxi trial kicks off in Singapore

As the industry races to make driverless cars viable, a small fleet of computer-driven taxis are taking passengers in Singapore.

Asian companies have world's worst cybersecurity says study

Asian organisations are the worst prepared against cyber-attacks globally, according to US security company Mandiant.

Pokemon Go-playing driver kills woman in Japan

A driver playing Pokemon Go while behind the wheel in Japan is arrested after hitting two women, killing one of them, say police.

Uber adds advance bookings in London

Transport app Uber allows customers in London to book journeys up to 30 days in advance.

Italy quake rescuers ask locals to unlock their wi-fi

Rescue teams searching for earthquake survivors trapped in central Italy have asked locals to unlock their wi-fi passwords.

Microsoft Excel blamed for gene study errors

Microsoft's Excel has been blamed for some errors in academic papers on genomics.

McDonald's fitness bands recalled after skin-burn complaints

McDonald's is recalling millions of fitness wristbands that it bundled with Happy Meals after customers complained of skin irritation and burns.

Sunday, 28 August 2016

Love to chat

As chat apps achieve colossal valuations and more keep coming onto the market, are we reaching chat saturation point?

Star Wars Millennium Falcon shed attacked by raiders

A shed replica of the Millennium Falcon cockpit from Star Wars is vandalised during a raid on a charity-run farm.

Judge's 'LOL' as he jails online boaster who ducked sentence

A man who avoided prison after being convicted of a street attack is jailed for refusing to perform unpaid work then boasting about it online.

Exoskeleton gloves allow you to feel in VR and other news

BBC Click's Marc Cieslak looks at some of the best of the week's technology news.

Meet the Premier League's first e-sports player

The Premier League's first e-sports player - Sean "Dragonn" Allen - meets the BBC's Rory Cellan-Jones.

Airlander 10: Longest aircraft hit power cable before nosediving

The world's longest aircraft came into contact with "high voltage power cables" before nosediving on landing, UK Power Networks says.

Head teacher Ashley Yates jailed for filming pupils in toilets

A primary school head teacher who used a spy pen to film pupils in the toilets at his school is jailed.

US authorities investigate cyber-attack against Ghostbusters actress Leslie Jones

The Department of Homeland Security says it's looking into a cyber-attack on Leslie Jones' website and iCloud account.

Russian MP's son convicted of hacking scheme

Russian Roman Seleznev has been found guilty in the US of running a hacking scheme that stole $169m (£131m).

WhatsApp and Facebook data sharing plan being investigated

The UK's Information Commissioner (ICO) is looking into WhatsApp's decision to share more data with parent company Facebook.

'First Apple computer' sells for $815,000

A prototype Apple 1, a holy-grail item in electronics memorabilia, has sold for $815,000 (£618,000) in an online auction.

Saturday, 27 August 2016

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.

As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.

To read this article in full or to leave a comment, please click here

Facebook overhauls trending feature after bias claims

Social media giant Facebook makes its Trending feature more automated after criticism it was biased against conservative views.

Friday, 26 August 2016

Privacy Shield data transfer agreement now shelters 200 companies

There are now 200 companies standing behind Privacy Shield, the framework agreement allowing businesses to process the personal information of European Union citizens on servers in the U.S.

Companies must register with the International Trade Administration of the U.S. Department of Commerce to be covered. It's a self-certification process, so the ITA is only checking that the forms are filled in correctly, not that companies are necessarily complying with all 13,894 words of the rules. The Privacy Shield rules are needed to ensure that EU citizens' personal information is afforded the same legal protection in the U.S. as required under EU law.

To read this article in full or to leave a comment, please click here

How to remove Netutils Adware

How to end up being able to remove Netutils Adware Precisely what is Netutils: Threat Classification: Adware/PUP Netutilsor Netutils Adware is truly a bogus and also deceptive adware, that is generally distributed by various other ad-supported freeware items andafter performing a thorough investigationand. Motion 1. Launch phone Data Recovery Magician. Select "Graphics" but also click "Next" buttons to start your incredible picture recovery vocation.





Step merely two. Select generally disk even you thrown away your material http://searchmobilecomputing.techtarget.com/definition/iPhone and merely "Scan" button, the pc software will quick scan our selected storage to try to find all your favorite lost std. If you may lost your prized partition, chosen "Lost Drive Drives" combined with "Scan" for you to continue your recovery action.

Step much more. After scan, somebody can critique all specific listed recoverable picture clips http://en.iphonephotorecovery.com one just by one but select in those unwanted weight. Then, view "Recover" icon to getting them again once. At this point you may want to save many of the recoverable files for another cd to data overwriting.



multiple tests,our safety specialistsclassified Netutilsas an extremely dangerousadware and a PUP (PotentiallyUnwanted Program), able to delivering intrusive ads and also collecting…

Thursday, 25 August 2016

HP's new privacy protecting laptop screen thwarts would-be spies

HP just introduced a new technology to fight back against the feeling that somebody’s watching you.

HP’s EliteBook 1040 and EliteBook 840 laptops now have an option to add a new one-touch solution called SureView that combats what the company calls “visual hacking.” SureView was developed with 3M privacy technology, and HP first showed off the technology during CES in January.

To call this activity “hacking”, however, is a bit of a stretch. What we’re really talking about is someone who’s literally peeking over you shoulder to read the information on your screen.

To read this article in full or to leave a comment, please click here

Facebook taps Whatsapp user data to target ads

Two years after its acquisition by Facebook, WhatsApp is changing its privacy policy to allow it to share more information about its mobile app users with its owner.

There’s no risk of your WhatsApp messages appearing on your Facebook timeline, or status updates being sent to your WhatsApp friends, the companies say—but they will be sharing more user data behind the scenes in order to better target advertising and suggest new contacts across the two services.

WhatsApp has long promoted itself as a strong protector of user privacy.

The changes will also help WhatsApp users better communicate with businesses, the company said in a blog post

To read this article in full or to leave a comment, please click here

Poor security 'aided' Ashley Madison hack

The Ashley Madison dating site had "inadequate" security systems and used fake icons to make people think it was safe, reveals a report.

Russian hackers 'targeted New York Times'

The FBI is investigating whether Russian hackers have carried out a series of cyber attacks on the New York Times, officials tell US media.

India investigating French submarine company data leak

India is investigating a massive data leak from French shipbuilder DCNS that revealed crucial details about submarines being built for the Indian navy.

How good is Tibet's Beijing-backed search engine?

A new Tibetan-language search engine has raised suspicions about the Chinese government's motives.

University hit 21 times in one year by ransomware

Universities and NHS trusts have been hit hard by ransomware in the last year, according to Freedom of Information requests carried out by two cybersecurity firms.

Google punishes sites with pop-up adverts

Google will give a lower search ranking to sites with "frustrating" pop-up ads from 2017.

Why Pokemon Go may have passed its peak

New independent data suggests that the augmented reality craze is beginning to cool off.

Apple accused of iPhone 6 'touch disease' defect

Apple faces claims that it is failing to address a flaw that causes iPhone screens to become unresponsive.

How to Remove TurboMac Virus Completely

TurboMac will be classified being an adware. Programmed infection Removal:

Most of us recommend using SpyHunter Malware Safety Suite.

You can get SpyHunter & it will detect illness and remove it, by clicking typically the download button below. Once installed, SpyHunter will automatically initiate a malware have a look at that will detect all threats found on the system, but to unlock the entire potential of the SpyHunter Malware Safety Suite, use it as a removal instrument, you need to purchase a license.

Download Now

Remove infection out of your browser:



Internet Explorer:

Go to Tools -> Internet options -> State-of-the-art Tab and click the Reset control key (make sure to select the Delete Private Settings checkbox).

*please note that in order to save your favorites, you need to foreign trade them before resetting the internet browser as you will lose all personal options.

After Internet Explorer tidies up the operation, click close switch and then re-start it for the fresh changes to take effect.

Google Chrome:

Go to the using path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle



On the other hand, you can navigate to these folders by these steps:

For Or windows 7:

1 . Click on Come from the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows logo design in https://blogs.office.com/ the lower left part of the display.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . Over the rest the Firefox Main window (top-right corner), click the Firefox Menu control key, go over to the Help sub-menu and choose Troubleshooting Information.

2 . not Click the Refresh / Reset Opera button in the upper-right corner with the Troubleshooting Information page.

3. To continue, click Refresh as well as Reset Firefox in the confirmation windows that opens.

5. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Complete and Firefox will reopen.

Delete any folders or perhaps files related to infection by exploring the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download Nowit is installed inside the delete computer, this means you will have to expertise a…. The idea is not a pc virus, yet should you certainly tend to be a computer user that truly cares about the personal computer system and net based security, a person won't want this adware to stay in your computer system

Wednesday, 24 August 2016

Opera's free VPN app expands to Android

Opera is expanding the reach of its free, mobile VPN app. The browser maker recently announced that Opera VPN is now available for Android in Google Play. The new app is similar to the iOS version Opera released in May.

Opera provides five virtual server locations to choose from including the United States, Canada, Germany, Singapore, and the Netherlands. These server locations can either help you stay secure while you’re using a public Wi-Fi hotspot or evade regional restrictions—just don’t count on fooling Netflix.

To read this article in full or to leave a comment, please click here

Airlander 10: Longest aircraft damaged during flight

The world's longest aircraft - the Airlander 10 - is damaged when it takes a nosedive on landing during its second test flight.

Flipped 3D printer makes giant objects

A 3D printer that can produce large items such as plane parts is developed.

Windows 10 update stops webcams working

Millions of people are reporting that a Windows 10 update has stopped their webcams from working.

Can political apps send more young people to the polls?

Will smartphone apps encourage more young people to go to the polls?

Facebook launches Lifestage app for school teens

Facebook has launched a new social media app, without privacy settings, aimed at young people in school.

Android 7.0 Nougat released by Google

Google rolls out a new version of Android that allows mobile devices to run two apps simultaneously on the same screen.

Wikileaks criticised on sensitive data

Wikileaks has been criticised for not doing enough to screen sensitive information found in documents released via the site.

Tuesday, 23 August 2016

U.S. plan to collect social media info from visitors faces fierce opposition

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.

“This program would invade individual privacy and imperil freedom of expression while being ineffective and prohibitively expensive to implement and maintain,” wrote organizations like the American Civil Liberties Union, Center for Democracy & Technology and Electronic Frontier Foundation in comments to the Department of Homeland Security on Monday.

The provision allows for collection of information on their online presence from certain categories of visitors in their visa-waiver arrival/departure records (Form I-94W) and their online application for an Electronic System for Travel Authorization (ESTA).

To read this article in full or to leave a comment, please click here

Who's bugging you?

After the New Zealand rugby team discover a listening device in their Sydney hotel meeting room, we examine just how much spying technology has advanced in recent years.

Barbra Streisand teaches Siri a lesson

After discovering Apple's Siri pronounced her surname incorrectly, singer Barbra Streisand sets the record straight.

Buses battle it out on test track

BBC News visits an annual bus competition designed to test handling and fuel efficiency, which helps a UK bus group choose the next generation of vehicles.

Drones seized over HMP Pentonville carrying drugs and phones

Drones carrying larges amounts of drugs and mobile phones are intercepted by police as they were being flown near a north London jail.

Gun crime tech 'failed to save lives' in Chicago

An attempt to use software to identify potential gun crime victims did not save any lives, a study suggests.

North Korea 'Netflix' device unveiled

A set-top box offering video-on-demand services has been unveiled by the state broadcaster KCTV in North Korea, according to local reports.

Sunday, 21 August 2016

Is Russia hacking the US election?

Huge leaks of data from US organisations have been attributed by some to Russia, so has the former Soviet state launched cyberwar on the US elections?

China demands stricter rules for live streaming

China's internet regulator demands stricter controls over the hugely popular practice of live streaming, as part of a range of new requirements for websites.

Saturday, 20 August 2016

Spyware maker faces legal battle over alleged affair

A spyware company could face legal action after a US court ruled that it illegally intercepted an unwitting man's messages.

Grooming prompts online lessons call

More than 150 people are reported to police in Wales for meeting children following sexual grooming over the last five years, prompting calls for compulsory online safety lessons for pupils.

Uber's $100m settlement with drivers rejected by judge

A $100m settlement between the taxi-hailing app Uber and some of its drivers is rejected by a US judge.

Internet spying powers backed by review

Britain's spies should be allowed to continue harvesting internet data, the government's reviewer of terror laws has said in a review.

Uber to deploy self-driving cars in Pittsburgh

Ride-sharing firm Uber will begin allowing users to hail a self-driving car in a US city later this month, it confirms.

T-Mobile deal 'may breach US net neutrality' rules

An 'unlimited' smartphone data deal that charges extra for premium services may be in breach of US net neutrality rules, campaigners say.

News site Gawker.com to shut down next week

Media company Gawker says it will close its main news site next week, days after it was bought by Univision in a bankruptcy auction.

Friday, 19 August 2016

How to turn on Twitter's quality filters and silence trolls

Twitter has finally come up with a solution to muzzle trolls.

The company published a blog post on Thursday announcing two new controls for filtering your notifications. Twitter notifications are the primary method through which trolls can contact and harass users.

The first new setting reduces the noise in your notifications stream. By default, anyone who mentions your Twitter username with the “@” symbol shows up in your Twitter notifications. It doesn’t matter if they’re asking a simple question, offering constructive criticism, or threatening to cut your head off. Everyone shows up.

To read this article in full or to leave a comment, please click here

Can't wait, won't wait!

Online shoppers want fast websites and apps that are also visually rich and personalised, but how technically difficult is this to achieve?

Airlander 10: Maiden flight at last for longest aircraft

The maiden voyage of the world's longest airship takes place despite an earlier setback.

Meet the robots in Amazon's UK warehouses

These robots are being rolled out to Amazon's warehouses across the UK.

Cisco to cut up to 5,500 jobs

US tech giant Cisco Systems says it is cutting up to 7% of its global workforce, or 5,500 jobs, starting this summer.

Sage employee arrested in fraud probe

A 32-year-old Sage employee is arrested at Heathrow airport in connection with a fraud investigation.

Tencent overtakes Alibaba as China's biggest tech company

Tencent, the owner of popular messaging app WeChat, overtakes rival Alibaba as China's biggest technology firm by market value.

Twitter shuts 235,000 more 'extremist' accounts

Twitter has suspended 235,000 accounts for violating its policies on the promotion of terrorism, the social network says.

Wednesday, 17 August 2016

Maker of web monitoring software can be sued, says court

The maker of so-called spyware program WebWatcher can be sued for violating state and federal wiretap laws, a U.S. appeals court has ruled, in a case that may have broader implications for online monitoring software and software as a service.

The U.S. Court of Appeals for the Sixth Circuit rejected WebWatcher vendor Awareness Technologies' motion to dismiss a lawsuit against the company. The appeals court overturned a lower court ruling granting the motion to dismiss.

The appeals court, in a 2-1 decision Tuesday, rejected Awareness' claims that WebWatcher does not intercept communications in real time, in violation of the U.S. wiretap act, but instead allows users to review targets' communications. While plaintiff Javier Luis' lawsuit doesn't address real-time interception of communications, his allegations "give rise to a reasonable inference" of that happening, Judge Ronald Lee Gilman wrote.

To read this article in full or to leave a comment, please click here

Would you put your phone in a cement mixer?

British phone retailer Tuffphones has unveiled a new range of hard-wearing handsets aimed at construction workers and outdoors enthusiasts - so the BBC tried them out.

Gawker case: Thiel is 'serious threat' to press freedom

The PayPal entrepreneur represents a "serious threat" to press freedom after funding a legal case that bankrupted Gawker, campaigners say.

Audi cars 'will talk to traffic lights', firm says

Vehicles will soon be able to communicate with traffic lights and tell drivers when they are about to change, Audi says.

Tuesday, 16 August 2016

Google launches video chat app, Duo, to compete with FaceTime, Skype and Messenger

Duo is Google's response to Apple's FaceTime, Microsoft's Skype and Facebook's Messenger.

Hackers auction files 'stolen from NSA'

A group of hackers calling itself Shadow Brokers claims to have stolen a collection of malware files from a group linked to the US National Security Agency (NSA).

Monday, 15 August 2016

Russian pizza restaurant 'hacker' faces US trial

The son of a Russian member of Parliament is accused of orchestrating a hacking scheme that targeted US eateries - mostly pizza restaurants.

Twitter lifts Guccifer ban after Democrat phone numbers leak

Twitter reinstates a suspended account that publicised leaked personal data belonging to Democrat politicians.

Sunday, 14 August 2016

Sage software firm hit by data breach

A data breach at large UK software company Sage may have compromised personal information for employees at 280 UK businesses, it is understood.

Friday, 12 August 2016

Paranoid parents?

Can tech help busy working parents keep tabs on their toddlers or does it simply make them feel more guilty and paranoid?

ReCore: Getting gamers to care about a new franchise

Joseph Staten, the creative director of Xbox's publishing team, talks to Newsbeat about making ReCore.

Split BT and Openreach, ex-minister Anna Soubry says

Former business minister Anna Soubry says Openreach, which runs much of the UK's broadband infrastructure, should be split off from BT.

Social media stars warned over undeclared paid-for ads

Authorities warn dozens of celebrities after they are found posting paid-for advertising on social media accounts - but refuse to name any of them.

US couple sues IP mapping firm over 'digital hell'

A US couple is suing a firm that maps internet connections to real world locations, saying their home was put at the centre of criminal investigations

Seismic sensor security claims denied

A seismic sensor firm has rejected claims that its geological monitoring systems are vulnerable to cyber attack.

Dragonfly army drone could be developed if company wins Ministry of Defence funding

Dragons' Den meets James Bond - companies pitch for £800m to make futuristic tech for the Armed Forces.

'Millions' of Volkswagen cars can be unlocked via hack

A sizeable proportion of 100 million Volkswagen cars sold since 1995 can be unlocked remotely by hackers, a team of researchers says.

Wednesday, 10 August 2016

Box extends its global push with new Zones in Canada and Australia

Box has made no secret of its global ambitions, and on Wednesday it advanced them another step by announcing two new regional "Zones" in Canada and Australia.

"Our mission is to build out the most advanced social cloud," said Aaron Levie, cofounder and CEO of the California-based company, in an interview. "We want to make sure we can deliver no matter what your security, compliance or data-residency requirements."

Different countries have established different requirements for the treatment and storage of data, resulting in a complex landscape for companies to navigate. Delivered through partnerships with Amazon Web Services and IBM Cloud, Box Zones essentially allows companies to store data in the location of their choice. When the paid feature was announced in April, the first non-U.S. Zones were in Germany, Ireland, Japan, and Singapore.

To read this article in full or to leave a comment, please click here

Disable WPAD now or have your accounts and private data compromised

The Web Proxy Auto-Discovery Protocol (WPAD), enabled by default on Windows and supported by other operating systems, can expose computer users' online accounts, web searches, and other private data, security researchers warn.

Man-in-the-middle attackers can abuse the WPAD protocol to hijack people's online accounts and steal their sensitive information even when they access websites over encrypted HTTPS or VPN connections, said Alex Chapman and Paul Stone, researchers with U.K.-based Context Information Security, during the DEF CON security conference this week.

WPAD is a protocol, developed in 1999 by people from Microsoft and other technology companies, that allows computers to automatically discover which web proxy they should use. The proxy is defined in a JavaScript file called a proxy auto-config (PAC) file.

To read this article in full or to leave a comment, please click here

Monday, 8 August 2016

Screen test

TV show Mr Robot has won a strong following among hackers for its accurate portrayal of how hacks can happen

How this bed could rock you to sleep

The Somnomat uses bespoke motors to make smooth movements without making too much noise.

The hackers backing Hillary Clinton

Hillary Clinton gains some unlikely support from the hacking community, which is gathering in Las Vegas this week.

Security of seismic sensor grid probed

Thousands of seismic sensors monitoring geological activity are vulnerable to cyber attack, suggests research.

Tesla car 'drove owner to hospital'

Lawyer Joshua Neally puts his Tesla into autopilot to take him to a local hospital while suffering piercing pain in his chest.

Delta: Thousands of passengers stranded by power cut

Thousands of air passengers around the world are left stranded after a power cut forced the US airline Delta to suspend flights.

Facebook tests Express Wi-fi service in India

Facebook confirms that it is in the early stages of testing a wi-fi service with Indian internet service providers (ISPs).

Bitfinex users to share 36% of bitcoin losses after hack

People who stored bitcoins at a popular exchange are told they will lose 36% of their assets following a cyber-attack.

Sunday, 7 August 2016

Push to tackle online 'booter' services

Teenagers are behind many of the web attacks that cripple websites and knock people offline, suggests an FBI study.

Def Con: Do smart devices mean dumb security?

Big security bugs are being found in devices that make up the internet of things - but who do they put at risk?

Saturday, 6 August 2016

Apple given all-clear to sell energy from solar farm

Electronics giant Apple has been granted the right to sell energy generated at its $850m solar farm in California.

Could online bug hunting make me rich?

How easy is it to find security bugs on websites that might be exploited by cyber-thieves?

Apple urged to rethink gun emoji change

Apple is urged to rethink its plan to convert the handgun emoji symbol into a water pistol icon.

Facebook to suppress clickbait stories

Facebook is intensifying its crackdown on so-called "clickbait" news that appears on the social network.

Lost Greek statue of Zeus remade with 3D printing

An ancient Greek statue of Zeus has been recreated using 3D printing, after it was lost in the 5th Century.

Friday, 5 August 2016

Tinder swipes too much personal information, says E.U. lawmaker

Marc Tarabella wants to swipe left on Tinder’s privacy policy.

The company’s terms of use breach European Union privacy laws, according to Tarabella, a member of the European Parliament.

Tarabella particularly dislikes the way the company gives itself the right to swipe the personal information and photos of its users, and to continue using it even if they deactivate their accounts.

It’s not just Tinder: Tarabella is also unhappy about how much personal information Runkeeper keeps about runners’ movements, even when the app is inactive. He has the same concerns about Happn, a sort of missed-connections dating service.

The lawmaker wants the European Commission to root out abusive clauses in the terms of use of a number of mobile apps, and to penalize their developers.

To read this article in full or to leave a comment, please click here

X-rays reveal hidden Degas portrait

A hidden portrait by the French Impressionist painter Edgar Degas has been revealed using powerful x-rays, scientists report.

Pokemon Go banned by Iranian authorities over 'security'

Authorities in Iran ban the Pokemon Go app because of unspecified "security concerns", joining other countries to have worries over the hit game.

Technology explained: What is phishing?

Chris Foxx explains how a cyber-attack known as phishing works, and how you can protect yourself.

A robot that can sing by itself and other technology news

BBC Click's Jen Copestake looks at some of the best of the week's technology news.

Turkey coup accused 'traced via messaging app'

Thousands of people accused of taking part in an attempted coup have been traced via a messaging app, a senior Turkish official tells Reuters.

Can companies ever keep our data safe?

As millions of login names, passwords and other personal details go missing, is there anything companies can do to protect their data?

US health insurer warns 3.7m after cyber-attack

US health insurer Banner Health writes to 3.7 million customers and healthcare providers following a cyber-attack.

Cologne games show bans toy weapons in wake of terror attacks

Toy weapons have been banned from the German video games event Gamescom as the country recovers from a spate of attacks.

ZTE wants the public's ideas for its next smartphone

Electronics giant ZTE wants the public to help design one of its next mobile phones.

'Mayhem' program wins grand hacking challenge

A program named Mayhem has provisionally won a competition to find software that does the best job of automatically defending against cyber attacks.

Thursday, 4 August 2016

Moon Express cleared for lunar landing

Moon Express becomes the first private firm to win US approval for an unmanned mission to the moon.

Rio 2016: Kohei Uchimura gets £3,700 Pokemon Go bill

Olympic gymnast Kohei Uchimura racks up a £3,700 mobile phone bill playing Pokemon Go after arriving in Brazil for the Rio Games.

Vibrations bring still photos to life

Photographs in which still objects can be manipulated are developed at the Massachusetts Institute of Technology (MIT).

Tinder 'violates privacy rules', claims Belgian MEP

Makers of the popular dating app Tinder have been accused of breaching EU rules by recording the personal data of users without explicit consent.

Bahrain 'internet curfew' for village, say activists

Nightly mobile network disruption has been detected in a Bahraini village at the centre of recent protests, an advocacy group claims.

Net overload 'sparks digital detox for millions of Britons'

More than half of people in the UK feel hooked by digital devices, leading many to take days, weeks or even months away from their screens, says a study.

Wednesday, 3 August 2016

Game on

Gaming is going into the cloud - but it's not been an easy journey for the industry.

Machine versus hackers?

Artificial intelligence could soon be spotting and sealing security bugs in software before malicious hackers can slip through the holes.

Privacy Shield certifications begin trickling in

The U.S. Department of Commerce is not just rubber-stamping applications to join the new Privacy Shield data protection program: 24 hours after companies began certifying their compliance, the administration's website still listed no approvals.

Microsoft was among the first businesses to certify that it complied with the new rules for transferring European Union citizens' personal information to the U.S. when the Commerce Department's International Trade Administration began accepting applications on Monday.

"We expect it to be approved in the coming days," Microsoft Vice President for EU Government Affairs John Frank wrote on a company blog.

To read this article in full or to leave a comment, please click here

Monday, 1 August 2016

Hashtag ban

The United States Olympic Committee have been accused of bullying companies who want to talk about #Rio2016

Slumdog multi-millionaire

How Ambarish Mitra, the boss of mobile phone app Blippar, went from living in an Indian slum to running a technology business worth $1.5bn.

The Great Wall: Is Matt Damon 'whitewashing' or good business?

Social media is both excited and confused by Matt Damon's starring role in the upcoming US-Chinese joint production - a monster adventure epic called The Great Wall.

Manchester taxi firm will drive you around the city to catch Pokemon

A Manchester taxi firm introduces dedicated Pokemon rides that take passengers to known Pokemon hotspots around the city.

Pokemon Go 'transformed teenager's life'

A mobile phone game that has caught the attention of the world also appears to have caused a breakthrough with autism sufferers, as the Victoria Derbyshire programme finds out.

What is Geocaching?

Ahead of this weekend's Geolympix, why are there millions of little plastic containers hidden all around the world?

'Spider' could keep an airship aloft

Lockheed Martin's Skunk Works has created a device which will help patch holes in airships

Banks turning to voice recognition

Voice as a form of secure ID is becoming more widespread, with Barclays announcing it is using the technology for telephone banking customers.

Tesla agrees $2.6bn deal to buy SolarCity

US electric carmaker Tesla says it has reached a deal to buy solar panel company SolarCity for $2.6bn.

Russia cyber attack: Large hack 'hits government'

A "professional" cyber attack hits Russian government bodies, the country's intelligence service says.

New head of Government Digital Service announced

Kevin Cunnington, the former director of business transformation at the Department for Work and Pensions, is appointed head of the Government Digital Service.

Uber plots global roadmap scan to help drivers

Uber embarks on a global mapping project that it hopes will offer its drivers more useful data on pick-up locations and traffic patterns.