Microsoft rolls out end-to-end encryption for Teams video calls

Microsoft is giving its collaboration platform Teams new features for end-to-end encryption. Full encryption currently only applies to one-on-one Teams video calls. Group conversations cannot use the security functionality for the time being. End-to-end encryption is not set by default for every end user, but must be assigned to users by administrators within companies. After […]

Microsoft rolls out end-to-end encryption for Teams video calls Read More »

UK watchdog concerned about Apple and Google duopoly

Apple and Google have too much market share in operating systems, app stores and browsers in the UK. That implies the national market authority following a new investigation. “An iron grip on mobile devices,” says the Competition and Markets Authority (CMA) about the position of the tech giants. Earlier this year, the authority launched an

UK watchdog concerned about Apple and Google duopoly Read More »

Bloomberg: Game BioShock creator doesn’t get off the ground

Development of the first game from BioShock creator Ken Levine’s studio founded in 2014 is in “development hell,” according to Bloomberg. After seven years, the game would have been completely scrapped several times and turned in a different direction. The problems of the project, according to many employees of Levine’s studio, called Ghost Story, lie

Bloomberg: Game BioShock creator doesn’t get off the ground Read More »

Windows 11 runs on PC with antique single-core Intel Pentium 4 CPU

Although the system requirements of Windows 11 caused quite a stir by excluding even relatively modern PCs, the operating system appears to run fine on a computer with a single core Intel Pentium 4 (Cedar Mill) processor that is 15 years old. This astonishing feat was accomplished by “Carlos SM,” who tweeted about it and

Windows 11 runs on PC with antique single-core Intel Pentium 4 CPU Read More »

VMware warns of vulnerable two-factor authentication Verify

VMware is warning customers of a vulnerability in its Verify two-factor authentication solution. Hackers appear to be able to intercept the ‘second factor’. VMware states in its warning that it concerns a security problem in its Workspace ONE Access product. VMware Verify takes care of the two-factor authentication. The vulnerability found allows hackers to intercept

VMware warns of vulnerable two-factor authentication Verify Read More »

Samsung delivers new TVs with remote control that can charge via radio waves

Samsung shows a new version of its Eco Remote. In addition to a solar cell, the new remote control is equipped with technology that can extract energy from radio waves from routers. The built-in battery can also be charged via USB-C. Samsung has not yet released technical details about its new Eco Remote, but told

Samsung delivers new TVs with remote control that can charge via radio waves Read More »

Log4j 2.16 vulnerable to DoS attacks, urgent patch 2.17 recommended

The impact of the infamous vulnerability in Java library Log4j drags on. Although the biggest problem was solved with urgent patch 2.16, this version also appears to be susceptible to abuse. Security researchers found an entrance for Denial of Service (DoS) attacks. Log4j 2.17 has been published to close the entry. Apache, developer of the

Log4j 2.16 vulnerable to DoS attacks, urgent patch 2.17 recommended Read More »

Mercedes-Benz shows electric Vision EQXX concept car with ‘1000km range’

Mercedes-Benz has unveiled its Vision EQXX concept car. According to the manufacturer, it is the most efficient car Mercedes has produced to date. The automaker claims that the car can reach a range of 1000 km based on its own tests. Mercedes-Benz is showing the Vision EQXX at the CES electronics fair. During that fair,

Mercedes-Benz shows electric Vision EQXX concept car with ‘1000km range’ Read More »