Random Post

Thursday, July 24, 2014
no image
A patent awarded on Tuesday to Apple may be a tip-off of what the company is planning for the smartwatch it's widely expected to introduce this fall. The patent for something Apple referenced in its application as "iTime" is for an electronic wristband that contains a recessed area for an electronic device, such as a watch body. After Apple introduced its diminutive media player -- the nano -- similar wristbands appeared in the market for that device. However, the iTime band would be bristling with more power.


7:06 AM

A patent awarded on Tuesday to Apple may be a tip-off of what the company is planning for the smartwatch it's widely expected to intro...

Read more »
Wednesday, July 23, 2014
no image
If you do not mind having a free non-open source Microsoft product on your Linux computer, the latest Skype for Linux release catches up to the Windows and Mac versions, providing most of the features they've had for some time. Microsoft rolled out Skype version 4.3.0.37 in mid June. The catch-up release has an updated user interface, some additional features, and lots of bug fixes. The latest Skype for Linux version also got rid of Alsa audio API support. Instead, it supports only Pulse Audio.


7:06 PM

If you do not mind having a free non-open source Microsoft product on your Linux computer, the latest Skype for Linux release catches up t...

Read more »
no image
Early reviews for Amazon's first foray into the smartphone market are mixed, with a general sense that the device is a good phone overlaid with some flashy features. Amazon announced the Fire Phone last month, trumpeting its 3D display, which uses facial recognition and front-facing cameras to shift perspective, depending on where the user's head is; a personal assistant called "Firefly"; and Amazon's live, interactive support service, Mayday. The Fire Phone is slated for release on Thursday.


12:48 PM

Early reviews for Amazon's first foray into the smartphone market are mixed, with a general sense that the device is a good phone over...

Read more »
no image
A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizations to reduce the risk of cyberattacks on their systems. That was one of the findings last week in a study conducted by the Ponemon Institute and sponsored by Websense. Thirty-one percent of the nearly 5,000 respondents surveyed for the study said their cybersecurity team never met with the executive team about cybersecurity.


7:33 AM

A failure to communicate between security pros and company brass may be contributing to the inability of a significant number of organizat...

Read more »
Tuesday, July 22, 2014
no image
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk, entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget," would have demonstrated a way to unmask users of Tor, the privacy-minded Web browsing software. Carnegie Mellon University researcher Alexander Volynkin was to deliver the briefing.


4:18 PM

The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month...

Read more »
no image
Nvidia is expanding its Shield line of gaming products with the launch of a gaming tablet and accompanying wireless controller. Designed for high performance, the tablet is powered by Nvidia's Tegra K1 processor, which includes 192 graphics processing unit cores. It will be frequently updated with software updates designed to draw stronger performance and additional capabilities from the hardware. The tablet follows on from the release last year of the Shield Portable handheld device.


1:01 PM

Nvidia is expanding its Shield line of gaming products with the launch of a gaming tablet and accompanying wireless controller. Designed f...

Read more »
no image
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. He unveiled a host of iOS vulnerabilities, the scope of which was staggering: undocumented services that bypass backup encryption and can be accessed both via USB and wirelessly; a means to access all data encrypted with data protection if the device has not been rebooted since the user's PIN was last entered; and a packet sniffer that can be monitored remotely over WiFi.


11:55 AM

The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Z...

Read more »
 
Google Analytics Alternative