Archive

Anyone with a stake in keeping ahead of cybersecurity assaults and enterprise network intrusions through API vulnerabilities can now tap into expert advisories and security reports. API security company Salt Security last week launched Salt Labs, a now-public forum for publishing research on API vul...

Called Email Protection, the feature will be initially distributed through a waiting list that anyone can add their name to. Consumers chosen from the list will be able to create a free, personal @duck.com email address. Email sent to the @duck address will be denuded of trackers before being forwar...

In addition to its condemnation of China, the White House announced that the U.S. Justice Department has filed charges against four Ministry of State Security hackers allegedly engaged in a multiyear campaign targeting foreign governments and entities in key sectors, including maritime, aviation, de...

OPINION

Tech Solutions To Beat the Heat

It's been a sweltering summer for those of us on the West Coast of the United States, and keeping power bills down when running air conditioning 24/7 is a challenge. This week, let's highlight technologies you can use to personally respond to the heat problem and deal with a world that is becoming ...

Google went live earlier this summer with its new Core Web Vitals algorithm to determine search rankings. With the implementation of Core Web Vitals as a key component of its search algorithm, Google has made a well-considered decision to reward sites that perform the best and that have been specifi...

After a successful rollout in the U.S. earlier this year, Amazon is expanding support for end-to-end encryption for video captured on its Ring products. Part of what's motivating this is probably setting a higher global standard so wherever Amazon goes, they will be welcome by satisfying stringent l...

Ransomware gangs are increasingly turning to specialists to complete their capers on corporations, according to a Dark Net intelligence provider. A report issued by Tel Aviv-based Kela noted that the days when lone wolves conducted cyberattacks from start to finish are nearly extinct, as the one-man...

Those of us who grew up with Star Trek might remember a device from the series called a replicator. This was a 3D printer of sorts that could create almost anything, ranging from food to weapons, at the touch of a button. Let's talk about our progression to the home-based replicator that could take ...

Now that we've entered the era of drones, these unmanned aerial vehicles increasingly are becoming an integral part of everyday life. As drones evolve, industries and governments are finding new ways to make use of this emerging technology. TechNewsWorld spoke with several experts to find out how dr...

Thousands of hacker attacks were launched on a network of smart home devices designed by researchers to assess the risk the gadgets pose to consumers. During the initial week the "honeypot" network was online, 1,017 unique scans or hacking attempts were directed at the devices on the net, which incl...

Microsoft recently disclosed that it too was no doubt a victim of the same Russian-based hacker gang responsible for the SolarWinds onslaught. As some of the details surrounding the cyberattack become known, the bleak disclosures might justifiably cause a sniffled gasp indicating that if Microsoft c...

The advantage of using a VR rig without a tether is huge because in a complex movement-oriented game you tend to get tangled in the tether. Let's talk about the Oculus Quest 2 this week and the announcement that this class of products is about to embrace 5G for its next generation. We'll close with ...

Cancel culture and politics aside, one of the more brutal threats lurking in the shadows of the internet is the slander industry. All too often, unsuspecting people become victims of websites that promote slanderous, often unverified information about individuals. This false and vilifying informatio...

EXCLUSIVE INTERVIEW

Apply Meaningful Metrics to Makeover Your Product Code

Effective metrics provide a point of comparison for the business and become behavior-changing in how decisions are made, according to Aurimas Adomavicius, president of Devbridge, a global digital products consultancy. TechNewsWorld spoke with Adomavicius to pursue the concept of how software develop...


Technewsworld Channels