Random Post

Wednesday, February 18, 2015
no image
We do it all day. Let us teach you what we've learned. Learn how the experts market their startups. Grab the free ebook.
From our sponsors
 

 

New Technology News

Induction charger: and if it was time to put?
2/18/2015 12:00:00 AM

Induction charger: and if it was time to put? If one cannot yet speak of democratization, smartphones charger induction begins to dig his hole. Whether it's via the multiplication of docking stations on which to file its smartphone or one compatible shells, the Qi standard is more and more widespread and seems to take precedence over all other reloading wireless standards. These two letters, is also pronounced 'chi', hides the technology of charging by induction that can be found in a growing number of terminals. Natively compatible smartphones are increasingly likely to join those already signed by Nokia, Samsung, HTC LG, while others may become using some manipulations or a special shell. Reload of a smartphone is always well often daily despite the technological advances, annual do by simply filing its terminal without worrying the son must necessarily interest a large number of users. Manufacturers of smartphones are increasingly likely to follow Microsoft (Nokia) or even LG and houses solutions which are generally compatible with other brands. On the side of the third-party manufacturers, the offer is also bloated and that is why we selected two products in particular Nillkin. Nillkin Magic Disk II Nillkin Magic Disk 2 the simplest, Nillkin Magic Disk II, is as its name indicates a single disc (10 cm in diameter for 10.4 mm thick) on which place his phone. It is compatible with terminals technology signed Qi LG (Nexus) or even Nokia (Lumia), but also with other products equipped with receivers or special hulls (Samsung Galaxy and Note, iPhone, HTC One... etc.). It is available in black on our shop at 29.95 euros. Nillkin Phantom NILLKIN Phantom: Bedside lamp led with charger without wire Induction universal IQ integrated more expensive, but also more complete and design, Nillkin Phantom acts also LED lamp. Natively compatible with Lumia 1520 and Nexus 5, this object can also work with the Samsung Galaxy with a receiver or the iPhone equipped with compatible shells. Find the Phantom on our shop at 49.95 euros.

 

You are receiving this email because you subscribed to this feed at feedmyinbox.com

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

10:28 AM

Advertising is hard We do it all day. Let us teach you what we've learned. Learn how the experts market their startups. Grab the free eb...

Read more »
Tuesday, February 17, 2015
no image


In its last Patch Tuesday, Microsoft has added new bugs for users of PowerPoint on Windows RT. Yesterday, Google announced that it would become a softer hair with regard to the policy of full disclosure of Project Zero. Mountain View has indeed consented to a small extension to the 90 days he leaves competition developers to correct the faults in their services until Big G doesn't disclose them to the general public. It may be that Google reverse its decision with the new ball in the footer just to pull Microsoft following its last Patch Tuesday. The patch Made in Microsoft which adds bugs Windows users have now used, the second Tuesday of every month marks the arrival of the patches to correct the bugs encountered on the OS from Redmond. Except that in recent months, Microsoft has taken the annoying habit of adding nearly as many problems it corrects each update! Things do not better happened during last Patch Tuesday since this time, one of the proposed patches generated new bugs on PowerPoint. Unusable PowerPoint since the last Patch Tuesday this time, this is the KB2920732 patch which poses problem on devices Windows RT. Surface RT and Surface 2 users are unable to launch the PowerPoint application because this hotfix. The evil tongues say that given the success of tablets ARM of Microsoft, only two or three people are likely to be impacted in the world! But the recurrence in the faulty patch output starts to become worrying on the part of Redmond. Microsoft responded quickly by removing the problematic patch from the Microsoft Download Center. Redmond calls for a restoration of their device to the users concerned and has released a new patch to replace the KB2920732.

5:19 PM

Patch Tuesday: Microsoft adds bugs with its updates 2/17/2015 12:00:00 AM In its last Patch Tuesday, Micro...

Read more »
no image


Kaspersky ,society has discovered a group of pirates using sophisticated malware , who settled in the heart of the hard drives. Their activities were related to the American intelligence agency.

For at least fourteen years, a group of hackers has managed to conduct hundreds oflarge-scale attacks in 30 countries, without ever being disturbed. Named "Equation",this group was outed by computer security firm Kaspersky, in a survey publishedTuesday. Revealed suggests that these pirates were related to the NSA, theAmerican intelligence agency who designed program PRISM of surveillance of theNet.
Kaspersky never named the NSA in its report. The approximation equation is thenature of the weapons usedOne of the viruses developed by the group in 2008,called Fanny, uses the same faults of safeties that Stuxnet, a spyware program thatwas spying on Iranian nuclear infrastructure"Use similar same faults on two differentviruses in a close time, indicates that the Group Equation and the developers ofStuxnet are the same people or work closely together," says the reportThe faultswere even used in Fanny before Stuxnet. However, according to the revelations ofthe alerts Launcher Edward Snowden, the NSA and Israel have co-authored Stuxnet.Another clue malicious software from Equation included in their code the same namea NSA tool unveiled by The Intercept last March, underlines the ArsTechnica website.

Undetectable malware:

More than 500 infected computers have been detected by Kaspersky, in 42countries whose many monitored by the United States: Iran, Pakistan, Syria, etc. TheFrance would have been affected to a lesser extent. The first Equation operationdates back to 2001, "perhaps even 1996" says the report. The targets ranged fromGovernments to the antennae diplomatic, military, media, Islamic organizations orsectors of telecoms, hydrocarbons, nuclear energy, nanotechnology, finance.
Fanny and Stuxnet aimed both computers "air-gapped", i.e. not connected to theInternet. Fanny could hide in an invisible part of a USB key, when the key wasconnected to a non-connected computer it analyzed its data. One of the othermodes of contamination through damaged Web pagesKaspersky cites the case offorums of discussions djihadites or advertisements on popular sites in the Middle East.
The malicious software infected a specific part of the hard drive, its internalsoftware, and remained invisibleTo achieve this feat, the creators of the programhad to know the source code of the target computer's hard diskFormer agentscontacted by the Reuters news agency confirmed that the NSA was able to hidespyware in many major manufacturers, such as Western Digital or Toshiba harddrivesMany of these manufacturers have denied to Reuters have knowledge ofspyware of EquationWestern Digital said that the company was not communicatingthe source code of its hard drives to governmental agencies.
 "The star of the death of the Galaxy of malware.:
Kaspersky portrayed Equation as one of the most experienced hackers in the world.It "transcends all that is known in terms of complexity and sophistication of the techniques' and 'single in almost all aspects of its activities 'Never to run out ofsuperlatives, he nicknamed same Equation "star of the death of the Galaxy ofmalware.
Kaspersky takes the bulk of its revenue from computer sales of antivirus andprotection. It's best interest to present his discoveries and the threats that it revealsas a major. MondayFebruary 16, the company unveiled a suite of hackings of banksthat led to the flight of 300 million dollars from 2013"It is probably the mostsophisticated attack in the world in terms of tactics and methods", stated the leaderAmerica of North of Kaspersky, Chris Doggett told the New York Times.
Several of the vulnerabilities exploited by Equation were nicknamed 'zero-day',security vulnerabilities which have not yet been discovered or used, and whichrequire a high level of expertise. These faults are in the crosshairs of all largecompanies. This summer, Google launched Project Zero, a former pirates teamassembled to track down and repair faults 'zero-day '.

11:29 AM

Kaspersky ,society has discovered a group of pirates using sophisticated malware , who settled in the heart of the hard drives. Their a...

Read more »
 
Google Analytics Alternative