Archives by date

You are browsing the site archives by date.

Twitter used 2FA phone numbers for ad targeting

Social networking site Twitter disclosed today that it used phone numbers users provided for two-factor authentication (2FA), along with email addresses, to show targeted ads. Twitter now joins Facebook, which was caught doing the exact same thing last year by a group of academics from Northeastern University and Princeton University. What went wrong When users and companies promote sponsored tweets… Read more →

Hackers breach Volusion and start collecting card details from thousands of sites

Hackers have breached the infrastructure of Volusion, a provider of cloud-hosted online stores, and are delivering malicious code that records and steals payment card details entered by users in online forms. More than 6,500 stores are impacted, but the number could be even higher. In a press release published last month, Volusion claimed it had more than 20,000 customers. The… Read more →

The best cheap web hosting services: How to find the right provider

Getty Images/iStockphoto Can you really buy a month’s worth of quality web hosting for less than the price of a Starbucks Grande cappuccino? Indeed you can, as we discovered when researching the web hosting services in this buyer’s guide. The average advertised monthly price for the 10 hosting providers we looked at is a low, low $3.19 — just add… Read more →

SAP readies bevy of HANA Cloud Services

SAP HANA Cloud Services Credit: SAP SAP, at its TechEd EMEA event, which kicked off in Barcelona today, announced the general availability of HANA Cloud and Data Warehouse Cloud. Both services are available in standalone form, or as extensions to SAP customers’ on-premises environments. Philip On (SAP’s global vice president of product marketing for platform and technologies) and Neil McGovern… Read more →

Arm enables SoC makers to create custom instructions for embedded CPUs

Arm on Tuesday announced it’s opening the doors for SoC (system on chip) designers to add unique, application-specific features to Cortex-M CPUs, without risking software fragmentation. The new Custom Instructions feature for the Armv8-M architecture should make it easier to co-design hardware and software for specific embedded and IoT use cases. “A world of a trillion secure intelligent devices will… Read more →

Workplace by Facebook adds bevy of features, passes 3 million paid users, eyes frontline workers

Employee experience software likely to see boomlet, then consolidated There are a bevy of companies looking to improve employee engagement and experiences in a tight labor market. The big question is what part of the enterprise will make the buying decisions? Read more: https://zd.net/2WXLNKj Workplace by Facebook now has three million paid users, up one million in the past eight… Read more →

Run your business at the speed of thought

Want to be more effective? Then be less busy Tonya Hall talks to Jason Fried, founder and CEO of Basecamp, about ways that enterprises and individuals can be more efficient. Are you ready? Join Forrester at the second annual Data Strategy & Insights Forum on November 5–6 in Austin. Whether you model your data and analytics practice around an insights-driven strategy or… Read more →

Microsoft’s unified Office Mobile app: What it is and why it matters

Credit: Microsoft Now that Microsoft is poised to become an Android phone maker, it’s a good time to look at what’s happening with Office on Android. While Microsoft has developed versions of Word, Excel, PowerPoint, OneNote, Outlook and more productivity apps for Android and made them available in the Google Play Store, sometimes these apps can be overkill in terms… Read more →

France warns of cyberattacks against service providers and engineering offices

Image: Getty Images/iStockphoto Special feature Special report: A winning strategy for cybersecurity (free PDF) This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. Read More France’s cyber-security agency has published an alert about cyber-espionage campaigns targeting the infrastructure of service providers and engineering… Read more →

76 percent of US businesses have experienced a cyberattack in the past year

What is Black Hat and why is it so important? CBS’ Dan Patterson is at Black Hat in Las Vegas. He breaks down why it is a must-see for hackers and cybersecurity professionals, plus the most interesting things happening at this year’s conference. Small and medium-sized businesses in the United States have become the global favorite for cyberattackers to target,… Read more →

Samsung updates Chromebook lineup with two new models

Samsung Chromebook 4 The last time Samsung fully refreshed its core Chromebook models was all the way back in 2016, but the electronics giant has finally gotten around to moving from the Chromebook 3 to the Chromebook 4. While the new notebook retains the same 11.6-inch form factor as its predecessor, a new Chromebook 4+ model with a larger 15.6-inch… Read more →

California takes on deepfakes in porn and politics

Facebook offers $10 million in research grants for tech to detect deepfake videos Facebook will create its own deepfake videos to help build a system that can detect them. The state of California has signed a set of laws to crack down on the use of deepfake technologies in political discourse and pornographic content.  The term ‘deepfake’ is relatively new,… Read more →