data

Tue
03
Nov
John Lister's picture

Low Orbit Satellite Internet Becomes More Practical

A mobile broadband service that uses low-orbit satellites to reach areas with neither fixed-line or cellular service is proving a hit with some early testers. Starlink is the work of the private company SpaceX, better known for running commercial ... delivery services to the International Space Station. The company plans to eventually launch more than 40,000 miniature satellites which will orbit at around half the distance from the Earth as most satellites. The idea is to be able to offer service anywhere in the world with users simply connecting to satellites as they pass overhead. (Source: ... (view more)

Tue
29
Sep
John Lister's picture

Google Maps Now Shows COVID Hotspots

Google has added an optional setting for its Maps tool showing the levels of reported COVID-19 infections in an area. However, users need to check exactly what area the data covers. For now the feature is only available on mobile apps rather than ... the desktop website version. It's also rolling out slowly, and may not be available immediately. Once available, the feature is accessible by tapping the layers button in the top-right corner of the screen. That's the button with an icon similar to a diamond with a v-shape underneath. This will then show the map in marked areas. Each area will have a ... (view more)

Fri
11
Sep
John Lister's picture

Android 11 to Get Significant Security Boosts

Android devices will are getting some key security changes. The tweaks to the permissions system are meant to reduce the need to weigh up security against convenience. The changes will come in Android 11, which begins rolling out to handsets this ... month. Because its an open source system, the new version of the operating system will take longer to get to some brands than others, and older phones and tablets won't ever get it. The main changes are to Android's permission system, which allows users to theoretically control parts of the device's software and hardware an app can access or control ... (view more)

Tue
25
Aug
John Lister's picture

Fastest Internet Speed Record Destroyed

The new record for fastest Internet connection is quick enough to download everything on Netflix in under a second. It's safe to say the average home user won't see such speeds, but the techniques used to achieve the speeds could benefit everyone. ... The transfer was done over a fiber-optic cable between computers 25 miles apart. It reached a peak speed of 178 terabits per second. That's around 20 percent faster than the previous record and five times the speed of the fastest connections currently in regular use, namely cables running between machines in data centers. University College London, ... (view more)

Tue
09
Jun
John Lister's picture

Google Sued Over Incognito Mode

Google faces a class action lawsuit over claims it "misled users of Chrome's private browsing mode." But suggestions users are in for a $5,000 windfall are premature, to say the least. That's the minimum amount the lawsuit seeks per affected user, ... though for starters that assumes not only that the plaintiffs win the case, but that the court agrees to that amount. It also assumes the amount isn't reduced by lawyer fees and that anyone eligible is able to sign up to the case and provide any necessary proof. The crux of the case, brought in the United States District Court for the ... (view more)

Tue
12
May
John Lister's picture

Thunderbolt Flaw Could Bypass Security, Encryption

A researcher has found a major bug with Thunderbolt port technology that could undermine major security measures on multiple computer systems. There's a big mitigating factor though: an attacker would need extended physical access to the computer in ... order to carry out the exploit. Thunderbolt is a technology that is similar in concept to USB, but adds fiber optic to the usual copper wires. Compared to USB, Thunderbolt has high speed and capacity. Common uses include super-fast device charging (including laptops), 4K video, and extremely quick data transfers. Originally Thunderbolt was only ... (view more)

Tue
21
Apr
John Lister's picture

Android Store Hacked; Up to 40M Accounts Leaked

A third-party Android app store has been hit by a big data breach. Aptoide users who registered between 21 July 2016 and 28 January 2018 may be affected. Aptoide works in a same way as Google's own Play app store, but isn't subject to its content ... regulations or security vettings. As with all third-party stores, users must confirm they accept security risks when installing apps from it. A hacker has published data from 20 million users and claims to have details of another 19 million users altogether. That's a big chunk of the 150 million people Aptoide claims have used its service at some ... (view more)

Tue
03
Mar
John Lister's picture

Unsafe VPN Android Apps Threaten Privacy

Some of the most popular VPN apps for Android are dangerous to use, according to a leading review site. The VPN apps, which are supposed to protect privacy, actually expose users to attacks according to VPN Pro. A VPN, or virtual private network, is ... meant to be a way to boost privacy online. It works by re-routing traffic through a middle-man server to make it appear that your IP is in another location. When configured properly, the VPN effectively creates a secure online connection that means even though data is going through the Internet, it can't be read by anyone other than the sender and ... (view more)

Wed
22
Jan
John Lister's picture

Apple Drops Plan to Tighten iCloud Encryption

Reports suggest that Apple has been pressured by the FBI to drop plans to improve the security of its customer backups. The plan was to better encrypt backups on the iCloud service. iCloud serves two purposes: it's a way for Apple users to store ... data and documents online and access them from anywhere (from any Apple device) with a password; it's also a way to automatically backup the contents of iPads and iPhones. Data from the iCloud is stored on Apple servers in an encrypted format, which means that if somebody gained access to the files (either through a remote hack, or a physical breach ... (view more)

Tue
31
Dec
John Lister's picture

Wyze Camera, Customer Database Leaked

A "smart" security camera maker has suffered a significant data breach. No video footage was leaked, but email addresses and details of some home gadgets were exposed. Manufacture Wyze hasn't revealed full details of how the breach happened, but ... denied that the leak was due to using cloud computing in China. According to Wyze, the exposed data covered 2.4 million customers and included "customer emails along with camera nicknames, WiFi SSIDs, Wyze device information, body metrics for a small number of product beta testers, and limited tokens associated with Alexa integrations. ... (view more)

Pages

Subscribe to RSS - data