RSS feeds use a standard XML file format to publish frequently updated information such as blog entries and news headlines. The RSS feeds here provide timely updates from good sources of technology news.
Some advertisements are served on this page because they are embedded in the RSS feeds. TechByter Worldwide has no conrol over what appears and derives no income from the advertisements.
The left column is primarily security update information and updates about operating systems and manufacturers are in the right column. In the center column, you'll find more general news from sources such as Wired, TechCruch, Computerworld, and such.
If there's a news source you'd like to see here, please let me know.
Top Stories from Wired
SANTA CLARA, Calif. - Innovation drives the tech industry, but nothing happens without investors. That's why the Churchill Club's annual Top Tech Trends event here in Silicon Valley always sells out -- to find out where the folks with money are placing their bets.
Every year, a panel of leading venture capitalists delivers 10 predictions and defends the trends they think will have a big impact in the next five years. Panelists (and audience members) vote up or down each one -- and offer critiques based on the merits or whether a prediction is so obvious it's not really a prediction.
This is the 19th year the Trends event has taken place and this year included a diverse set of predictions involving food production, anti-plague remedies, artificial intelligence, new forms of education, a new type of investing, big advances in voice technology and the expectation that Amazon.com will be hit with a major anti-trust lawsuit.
Microsoft offers a number of free anti-malware tools. Windows 10 and 8.1 users have Windows Defender. Windows 7 users can chose between the full-featured Microsoft Security Essentials (MSE) or the limited Windows Defender. But all Windows users have access to the Malicious Software Removal Tool (MSRT) even though they may not be aware of it.
MSRT is part of the monthly patch Tuesday bug fixes. Windows Update downloads a new version of MSRT and runs a scan with it as part of its normal processing. The last patch Tuesday was May 9th and Microsoft dutifully issued a new version of MSRT.
I mention this because on May 23rd someone contacted me to ask why MSRT had just been updated. He had seen a new version appear in Windows Update on a 32 bit Windows 7 machine that had been dutifully updated on the 9th.
Google on Tuesday rolled out an enterprise bundle that packages Chrome, management templates and an add-on for dealing with legacy sites and apps, building on the chokehold its browser has on the web.
The collection -- prosaically dubbed "enterprise bundle" -- includes a Chrome installer (in .msi format), the Legacy Browser Support (LBS) add-on, and a set of templates for applying group policies to Chrome within the company. It was essentially a convenience, since all its components have been available separately.[ More reading: Microsoft Word vs. Google Docs: Which is better for business? ]
"The new bundle includes multiple tools in a single download that IT admins need for a simple, managed deployment," boasted Matt Blumberg, a Chrome product manager on Google's enterprise and education team, in a post to a company blog.
BOSTON -- Retired Gen. Michael Hayden held nothing back when speaking to cybersecurity pros today at the ZertoCon business continuity conference.
It's been more than a decade since he led the National Security Agency (NSA), but that didn't stop Hayden from asserting that the Russians were involved in last year's U.S. presidential election. His view: Only two presidents doubt that the Russians were involved in the 2016 election -- Donald Trump and Vladimir Putin.
"They [the Russians] had an affect on the election, there is no question that this happened," Hayden said. "The question is if there was collaboration with the campaign."
Every company has workaholics who can’t leave their duties behind when heading out on vacation. They're kind of worker who, if the hotel doesn’t have Wi-Fi, will rush to the closest coffee shop or eatery to stay connected, check email and jump onto a video conference call.
Those are the kinds of insecure wireless networks that make IT security managers nervous.
And for good reason. Public Wi-Fi networks at cafes and coffee shops are open to, and can be accessed by, anyone, according to mobile security vendor iPass. They require neither security keys and passphrases nor firewall protection. That leaves employees vulnerable to man-in-the-middle attacks.
Tech Republic Small-Medium Businesses