software

Fri
08
Oct
Dennis Faas's picture

12 Must-have Utilities for Marketing Beginners

New to marketing? Short on time? Need to boost your time management and organizational skills? Look no further! It's a fact: marketing specialists heavily rely on the web and Internet-centric apps to collect, analyze, categorize, and interpret data ... based on thousands of different indicators. These utilities help with content marketing and also to plan, schedule, and communicate - especially if working with a team. If you are new to Internet marketing, it's easy to become overwhelmed because there are so many options online. But fear not: we've got a list of 12 of the best tools that will help ... (view more)

Tue
18
Aug
John Lister's picture

Microsoft and Kaspersky Top List in Security Test

An independent test found tools from most leading security software companies failed to detect all threats - though it was one of the best set of overall results ever. The SE Labs test used simulated attacks based on real threats that are particular ... problems right now. The tests ran between April and June this year and involves anti-malware products aimed at the general public from 14 companies. Though SE Labs runs such tests regularly, it changes the simulated threats each time to reflect what's actually happening in the cyber security world. (Source: selabs.uk ) In many cases, the simulated ... (view more)

Wed
15
Jul
John Lister's picture

Windows 10 May Get Key Security Boost

Microsoft is testing a new Windows 10 security measure that could neutralize a malware technique. It's called Kernel Data Protection and will protect part of a computer's memory from tampering. The idea is to protect two key software parts of a ... computer: the operating system kernel and drivers. The kernel is the most central part of a system and acts a little like a central command point, deciding what the computer does at any precise moment. Meanwhile, drivers control the way the operating system communicates and interacts with hardware devices. Within the computer's memory, the kernel is ... (view more)

Wed
15
Jan
John Lister's picture

Critical Windows 10 Bug Needs Immediate Fix

The National Security Agency (NSA) has told Microsoft about a major Windows 10 bug which also affects Windows Server 2016 and 2019. A patch is already available and is a must install. For the NSA to tell Microsoft about a Windows vulnerability and ... then discuss it publicly is relatively rare. In the past, the NSA has used such security flaws to take advantage of potential suspects, as part of its surveillance program. In this case, the bug was so serious the NSA seems to have concluded any benefits it could gain itself would be more than wiped out by the threat to the general public (and US ... (view more)

Thu
26
Dec
John Lister's picture

Report: Most Facial Recognition Software 'Racist'

Facial recognition software may be less accurate when dealing with non-Caucasian faces, according to a new study. The National Institute of Standards and Technology (NIST) noted the problem was likely the data used to "train" algorithms. The NIST ... examined 189 algorithms from 99 different developers, which it says is a majority of all commercially available systems. (Source: bbc.co.uk ) In the testing, it looked at two tasks. Specifically, they looks to see if two specific photographs are of the same person. In one example, it was to verify identity in order to unlock a phone or check a ... (view more)

Wed
15
May
John Lister's picture

Researchers: Android Bloatware a Security Risk

Unwanted pre-installed software on Android devices often poses privacy and security risks according to a new study. That's because the so-called "bloatware" often by-passes Google's vetting process. One of the key selling points, or big drawbacks - ... depending on your perspective - of the Android operating system is that phone and tablet makers can customize their own devices, through the user interface and the apps that appear when a new device is first powered on. That's different from systems such as Apple, where both the hardware and software are controlled by the same company . The study ... (view more)

Thu
21
Feb
John Lister's picture

Symantec: Popular Microsoft Apps Hijack PCs

At least eight apps in the official Microsoft Store were secretly designed to use a computer's resources without permission. It undermines Microsoft's efforts to promote the store as a "safe source of software." In the past few years, Microsoft has ... heavily pushed the idea of Windows users getting software from an app store - similar to the way mobile devices work - rather than the more traditional method of getting programs from a third-party sources and installing them directly to the PC or smartphone / tablet. There's even a special 'S' mode for Windows 10 that only allows the ... (view more)

Tue
20
Nov
John Lister's picture

Windows 10 October Update Breaks iCloud, F5 VPN

Some users of Apple's iCloud software will be unable to get the latest Windows 10 update right now. It's an example of Microsoft blocking the update rather than causing problems with specific applications. iCloud is the online backup and sync tool ... for Apple devices such as iPhones and iPads. It's aimed at people who have iOS mobile devices but also use a Windows PC. iCloud lets users access Apple services and data such as their email, photos and calendar on both the mobile device and computer. Unfortunately iCloud is the victim of yet another glitch in the October update of Windows 10, one of ... (view more)

Wed
31
Oct
John Lister's picture

Windows Defender Gets 'Sandbox' Protection

Microsoft is beefing up Windows Defender, the built-in antivirus and antimalware security tool in Windows 10. It's now using the same sandbox technology that's used in other tools, including some major web browsers. The concept of a sandbox is taken ... from the child's play area of the same name. It's a metaphor about the way the child has an area to play in freely and do what they like, but also has clearly defined boundaries. Fortunately, computer code tends to follow instructions better than a child told to stay in the sandbox. In computing terms, the sandbox is a concept about access that ... (view more)

Mon
30
Jul
Dennis Faas's picture

Best Anti Ransomware Software Free - 5 Steps

Infopackets Reader Kevin L. writes: " Dear Dennis, I have been researching the best anti ransomware software for 2018 and came across your website. I was wondering if you had any recommendations? While searching for the best anti ransomware software ... (free), many websites have their own opinion on what anti ransomware software is the best, but most require a paid subscription. What is your opinion on the best anti ransomware software for PCs? " My response: I've answered this question in depth before (in a round about way) with my guide on How to Prevent Ransomware in 2018 - 10 Steps . This ... (view more)

Pages

Subscribe to RSS - software