This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Welcome in TH3 professional security

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Wednesday, July 25, 2012

T-Mobile could get HTC One X+ this September

T-Mobile customers may lack 4G LTE, but if the latest rumors are right, it'll be the first U.S. carrier to offer its customers a quad-core smartphone.
Related stories
HTC One X review
HTC One S review
HTC One V review

The HTC One X+, suggests TMoNews, will carry Nvidia's Tegra 3 quad-core processor, the same chipset used in international versions of the HTC One.

The U.S. versions of the HTC One family of phone -- which includes T-Mobile's HTC One S, AT&T's HTC One X, Sprint's HTC Evo 4G LTE, and U.S. Cellular's HTC One V -- come with Qualcomm's Snapdragon S4 dual-core processor, it's fastest yet, in part because the chip incorporates an LTE radio out of the box.

T-Mobile's HSPA+ network doesn't use 4G LTE technology yet, though the carrier is planning to add LTE alongside its HSPA+ network.

The HTC One X+ would likely carry the One X's 4.7-inch 1280x720 pixel HD display, 8-megapixel camera with 1080p HD playback and capture, and 16GB internal memory. Fingers crossed it comes with an expandable microSD card slot as well.

Researcher uses NFC to attack Android, Nokia smartphones

LAS VEGAS -- Security specialist Charlie Miller demonstrated at the Black Hat security conference today a way to hijack an Android smartphone via the Near Field Communication (NFC) technology that's turned on by default on the device, and said he's found problems with NFC implementations on Nokia as well.

NFC tags have built-in antennas and are found in stickers and smart cards that are designed to transfer data to NFC readers, to send specific phone numbers and Web addresses to smartphones and other benign purposes. They require close proximity, a few centimeters or so, for data to be transmitted.

Attacks using NFC typically involve someone using a hidden reader to surreptitiously snag data from an NFC-enabled card in someone's pocket by swiping a reader very close to the card. But in this case, the risk is a tag sending a smartphone to a malicious Web site via the Android Beam feature without the user's consent.

In his talk, entitled "Don't Stand So Close to Me: An Analysis of the NFC Attack Surface," Miller showed how he could direct a phone to automatically visit a malicious Web site. He also was able to download to the device malware that exploited a browser bug that would give an attacker the ability to read cookies and watch the Web browsing done on a victim's device and eventually take control of the phone. "I can get to the browser with no user interaction," Miller said.

Related stories
Android Beam in action: Ice Cream Sandwich's flashy NFC feature
How to program an NFC tag with your Android device
Is NFC killing Google Wallet?
Miller, a principal security consultant at Accuvant, speculated about various attack scenarios, including one in which an attacker replaces a tag on a movie poster that sends viewers to a film preview with a tag that instead directs to a Web site hosting malware that can compromise the phone. An attacker could also replace tags used on point-of-sale payment terminals, he said.


The smartphones should not be allowed to directly take action based on an NFC communication, but should instead warn the user that the device is being directed to a particular Web site and prompt for permission, he said.

Miller also said he found bugs in the way NFC parsing code was written on Android Nexus S and a Galaxy Nexus from Samsung, but he did not try to exploit the holes. At least one of the problems has been fixed in the most recent version of the Android operating system, Ice Cream Sandwich, but Gingerbread is still vulnerable, he said.

Miller didn't just pick on Android. He also found some problems with the Nokia N9 phone running the MeeGo Linux-based operating system, which accepts NFC requests without user permission if NFC is enabled. If the default settings are unchanged, MeeGo allows another device to pair with it via Bluetooth over the NFC reader, even if Bluetooth is turned off. This feature can be used for interoperation with NFC-enabled devices like speakers, so a user can easily play music from the device. But this puts the phone and its data at risk via any ordinary Bluetooth attack, allowing someone else to make phone calls, send text messages, and download data, he said.

Miller also discussed a second attack using NFC on Nokia N9 in which an attacker could send the phone a malicious Word document that exploits a bug in the way documents are viewed on the device. "If an attacker gets close he can make the phone open up and render a document and exploit that," he said.

Devices are protected when the screen is off, because the NFC chip is off then, and if the phone is locked, according to Miller. And the smartphones have to come within a few centimeters of the tag for an attack to work, further limiting the threat, he said.

Miller said he had sent his research to Google and Nokia and they acknowledged receiving it but have not discussed the issues with him.

The iPhone does not have NFC capability at this time, though it's rumored to come in a future version, according to Miller.

Hacking, the card game, debuts at Black Hat

LAS VEGAS -- There's much more to hacking than just the Hollywood portrayal of a speed typing contest, say the computer security professionals who've developed a new hacking-themed card game called Control-Alt-Hack at Black Hat 2012.

Control-Alt-Hack is based on Steve Jackson Games' Ninja Burger, but from the characters to the mission cards to entropy cards, the demystification of white hat computer security is the name of this game. Game co-designer, security researcher, and University of Washington Computer Security and Privacy Research Lab honorary member Adam Shostack said that when it comes to teaching ethical hacking, also known as white hat hacking, not enough educators "use carrots, not sticks."

"Humor creates an open atmosphere," that helps break down the shyness of learning, he said during the conference session about the game. He explained that people are more likely to ask questions about things that they think they should've already learned if it's part of a game.

Games, he noted, have a spectrum from being as easy to learn as Go or dice games, all the way through Dungeons and Dragons or Settlers of Catan. Choosing a game to base Control-Alt-Hack on that involved humor and a bit of complexity would help keep the subject matter interesting for the target audience of teens and young adults.

In Control-Alt-Hack, you work as a researcher for a computer security company that gets hired to stress-test other companies. The deck of 156 cards includes 16 "person" cards to give you an identity during the game. The characters were given realistic traits, so there's no stereotypes of the obese, unkempt researcher covered in potato chip debris and pizza grease. Instead, you can play as one of eight men or eight women who have interests as varied as martial arts or rock climbing, and all are snazzily dressed in their artwork.
Getting Steve Jackson Games to agree to license Ninja Burger to them was a strategic move, explained Tammy Denning, who co-designed the game with her fellow University of Washington researcher Yoshi Kohno. Denning said. "We didn't have to playtest the game mechanics, since we mapped the Ninja Burger content to Control-Alt-Hack."

Steve Jackson Games also has a history with computer security, as an incident in 1990 that nearly destroyed the company played a major role in the creation of the Electronic Frontier Foundation


The game is currently in production, and not expected to reach store shelves until the fall. That didn't stop Denning, Kohno, and Shostack from simulating the game as they explained how it worked. Each time they reached a point where they had to roll the dice, they would throw blue fuzzy dice out into the audience. Those lucky enough to catch one will get the game for free when it's ready for distribution.

Another factor of being based off of Ninja Burger's gameplay is that the game is about having fun. "It's a fun game with educational content," explained Kohno. "It's not for teaching fractions."

Despite the emphasis on fun, the game goes to great lengths to be accurate. The learning objectives, obfuscated behind cute pop culture references like, "I find your lack of encryption disturbing," include promoting the accessibility of computer science and computer security; teaching that there's more to computer security than antivirus and the Web; and accurately depicting a diverse range of attack techniques and attacker goals.

SCADA and medical device hacking are more likely to show up than ransomware, and the techniques you can use include disinformation, exploiting weak passwords and unpatched software, and cross-correlating data sources, all in the name of the good guys.

Control-Alt-Hack isn't easy to hack, as it appears there's no "blank" card to draft your own mission on to. However, it does contain a nod to the cryptography-minded: one card is written entirely in code.

Monday, July 23, 2012

Sources: HTC did not meet financial obligations to Beats

HTC's abrupt change in course on Beats Electronics is more about HTC's internal troubles than anything involving the audio company, sources close to the negotiations told CNET.

Last August, Beats, a maker of popular headphones that was co-founded by rapper Dr. Dre and music impresario Jimmy Iovine, sold 50.1 percent of the company to the Taiwanese manufacturer of smartphones and tablets for $300 million. On Saturday, HTC said in a prepared statement that it was selling half of that stake back for $150 million.

Related stories
More HTC handsets with Beats headphones? Probably not
Beats Pro High-Performance review (White)
HTC to acquire majority stake in Dr. Dre's Beats
Beats finally announces deal to acquire MOG
Beats Electronics has a plan and it's much bigger than Mog


But in the year since taking majority control of the company, HTC has seen a management shakeup, dwindling market share, and a falling stock price. During the same period, HTC also wasn't meeting all of the financial commitments it had made to Beats as part of the acquisition deal, multiple sources close to the companies said.

It was against this backdrop that executives from both companies decided a partial Beats buyback of the company was the best way to proceed, the sources said. Beats Electronics now owns roughly 75 percent of the company and HTC 25 percent.

On Saturday, HTC said the reason for the sale was "to provide Beats with operational flexibility for global expansion." A representative of the handset maker declined to provide any additional comment for this story. A Beats spokeswoman also declined to comment.

Leading up to the deal with HTC, Beats was on a role. The company was searching looking for investment to help it fund expansion into new markets and product categories. But Beats locked arms with a partner that was headed for trouble.

The Taipai Times wrote today that Goldman Sachs expects "HTC's shipments to drop by 68 percent from last year to 6.7 million units in North America and by 38 percent to 5.8 million units in Europe." For 2012, analysts estimate that HTC will see a 28 percent drop in total shipments.

In April, Winston Yung, the HTC executive who was credited with pushing the acquisition of Beats, was moved out as chief financial officer. HTC struggled initially making the most of Beats but that was the least of Yung's troubles.

During Yung's year-long tenure as CFO, the company's revenue went from trending up to spiraling down. When Yung was replaced as CFO, HTC CEO Peter Chou said the move was not related to the Beats investment. Chou also said that HTC remained committed to Beats.

One of the ways HTC bungled the Beats integration into HTC was an attempt to bundle Beats headphones with some of the HTC's handsets, including the Rezound and Sensation XL. The reception by the public was at best tepid.

"An accessory like the headphone doesn't factor in when someone is buying a smartphone," Martin Fichter, an HTC product executive, told CNET in April. "If they want a Beats headphone, they'll buy it directly."

But Beats remains a cultural force and the company has big plans.

Iovine and other Beats execs the company's goal is to provide a premium music listening experience in the digital era, pushing the Beats branded audio equipment in cars, mobile devices, home-stereo speakers and of course headphones.

The Los Angeles-based company just recently acquired online subscription music service MOG. According to music industry sources, Beats intends to use MOG to sell music as well as a host of other products.

According to NPD, Beats make up 28.7 of the overall headphone category and among headphones that cost $100 or more, Beats owns a 54 percent market share.

App Store hacker says the 'game is over'

The creator of an exploit that let users purchase digital goods inside of iOS apps without actually paying for them said today that Apple's fix puts the hack out of business.

"Currently we have no way to bypass [the] updated APIs," creator Alexei Borodin wrote in a post on his development blog. "It's a good news for everyone, we have updated security in iOS, developers have their air-money."

Borodin says that the exploit, which requires the use of third-party servers and specially-installed security certificates, will continue to be up and running until Apple releases iOS 6. Last week, Apple said that software -- which is due in the next few months -- will patch the exploit. In the interim, the company provided updated APIs that validate each digital purchase.

"By examining last Apple's statement about in-app purchases in iOS 6, I can say, that currently game is over," Borodin added.

According to an interview with the enterprising programmer last week, the exploit allowed more than 8.4 million purchases of in-app content to be made. With a minimum price of 99 cents per in-app purchase item, that represents a total of $5.82 million developers might have received, with another $2.49 million Apple would have earned based on the App Store's 70/30 revenue split. However that tally could be considerably higher given that purchases within iOS applications can go well beyond the 99 cent minimum.

Despite the temporary security win for Apple on the iOS front, Borodin says a modified version of the hack targeted at Apple's Mac App Store is still up and running. "We [are] still waiting for Apple's reaction," he said in the same post. "We have some cards in the hand."

The exploit remains one of the few high-profile efforts to target Apple's digital storefronts from inside of apps. Separate efforts have targeted individual user accounts, and the copy protection on applications.

Friday, July 20, 2012

Google+ trends: 'The Dark Knight Rises' reviews, Nexus 7

Google+ers in the US are returning home from midnight showings of The Dark Knight Rises and posting their micro-reviews of the film on the social networking site.

They say, “Just saw The Dark Knight Rises. Truly an awesome film...though not as awesome as The Dark Knight. Overall, I'd give it a 9 out of 10. Still freakin' amazing! I already want to see it again,” “Just saw The Dark Knight Rises, it was epic!” and “Wow. Way to squander the awesome-ness that was The Dark Knight. Dark Knight Rises was way too long and way too... boring.”

The Friday photo themes #FidoFriday and #FloralFriday are back in the trending topics as Plussers post beautiful and funny pictures of flowers and dogs on their feed.

Owners of Google’s Nexus 7 tablet are sharing photos of their newly arrived device and posting tips, reviews and first experiences with the tablet.

“Just got my #Nexus7 cannot wait to play with it,” read posts, “Finally Nexus 7 in my possession.”

The top 5 most talked about topics on Google+ on July 20 at 7:30 AM GMT are:

The Dark Knight Rises
#FidoFriday
#FloralFriday
#Nexus7
#Oppo+

No room for error in Facebook's debut quarter

SAN FRANCISCO (Reuters) - Facebook Inc faces immense pressure to beat Wall Street's financial targets when its delivers its inaugural quarterly earnings report next week, hoping to wash away the bad taste left with investors from a soured IPO.

The No. 1 social networking company's second-quarter report on July 26 will be scrutinized by investors looking for clues on the health of its business, which is experiencing a sharp slowdown in revenue growth and mounting questions about its advertising sales.

With a rich multiple that gave Facebook the distinction of being the first U.S. company to go public with a valuation of more than $100 billion, the company headed by 28-year-old Mark Zuckerberg has little room for error.

"If they miss, it would be catastrophic for the stock," said Michael Binger, a portfolio manager with Gradient Investments.

"This is a very important earnings quarter for them. It will establish in people's minds how they think of the company," said Binger, whose firm does have a position in Facebook.

The bar has been lowered since Facebook warned that a shift in users to mobile devices - where its ability to earn revenue is still nascent - will hinder growth in the short run.

Analysts, on average, expect revenue in the second quarter to grow 28 percent to $1.15 billion. During the same period a year ago, Facebook more than doubled its revenue.

With Facebook's stock still trading at three-quarters its $38 IPO price, executives need to address a litany of concerns about the business, such as the efficacy of its online ads and the company's nascent efforts in mobile advertising.

Investors say Facebook is unlikely to be able to deliver the sort of numbers that can propel its stock back to debut levels, but the risk of triggering a slide if the company disappoints Wall Street is high. Facebook's stock still trades at a rich 57 times forward earnings, compared with Apple Inc's 13 times and Google Inc's 14 times.

"Facebook is probably going to come up with one or two revolutionary streams that are going to bump up its revenue," said Bill Lee, an angel investor who backed companies, including electric carmaker Tesla Motors Inc and social media site Posterous, which was recently acquired by Twitter. But "all the magic they can continue to deliver is already priced in."

SLOWING GROWTH

More than half of the 36 financial analysts now covering Facebook rate the company a Hold, Underperform or Sell - disproportionately high given that Wall Street analysts historically favor Buy ratings.

The three lead underwriters of the IPO - Morgan Stanley, Goldman Sachs and JPMorgan - forecast second-quarter earnings per share of between 10 cents and 11 cents, lower than the Street average of 12 cents, minus IPO-related stock compensation charges, according to Thomson Reuters I/B/E/S.

Thomson Reuters StarMine's SmartEstimates suggests that Facebook will post adjusted earnings of 10.4 cents per share.

"It gets back to 'How predictable are these companies' results going to be when I'm forecasting out pretty significant growth to be able to justify the valuation?'" said Ryan Jacob, chairman and chief investment officer of Jacob Funds, who does not own Facebook shares.

Facebook, which generated more than four-fifths of its revenue from advertising in 2011, has stepped up efforts to rebuild its revenue momentum, rolling out a raft of new advertising features and providing more details about the effectiveness of its ads.

TBG Digital, which helps marketers advertise on Facebook, released a study this week that found the average price of Facebook ads had jumped 58 percent since last year. That is partially due to recently released mobile formats, it found.

"Our clients aren't spending 75 percent of their budgets on Facebook," said David Jones, Global CEO of advertising agency Havas. But he noted that "there are very few clients who we are talking to who are negative on Facebook."

GUIDANCE QUESTION

With over 900 million users, Facebook is the world's largest social networking company, challenging established Web companies for consumers' online time and for advertising revenue.

For Facebook, the first date with Wall Street will mark an important test for the company's top brass to try to dispel some of the skepticism. Investors will want to hear from Zuckerberg - who wields majority control - but the company has not said if he will take questions on the day.

"A miss is a miss and it wouldn't be good either way, especially for your first quarter out of the gate," said Colin Sebastian, an analyst with Robert W. Baird.

But the context will be key.

"If it's related to shift in mobile, but the mobile monetization is improving, that's different than just a miss because advertisers are leaving Facebook."

And he said that many investors will be particularly interested in the trends the company is seeing as marketers take advantage of Facebook's mobile and other advertising features.

While most expect Facebook to follow the lead of Google and Amazon.com Inc and abstain from offering financial forecasts every quarter, it may address the current concerns about its business by providing additional color and outlook.

"This first time out, I think they have to give some sort of guidance," said Robert Bacarella, manager of the Monetta Fund, which does not own Facebook shares. "You pacify the near term and say 'Here's where we're going.' But then you set the table up to say: 'We're thinking about whether or not it's wise give guidance going forward."

For all Facebook's efforts to woo Wall Street, the company's biggest job remains building its relationship with advertisers, such as San Francisco's Public Bikes.

"Whenever we have a new bike shop selling our bikes in a particular city, I'll run a targeted Facebook campaign" in that city, said Dan Nguyen-Tan, Public Bikes' vice president of sales and marketing.

The ability to reach specific groups of Facebook users based on where they live and their interests - such as healthy lifestyles or environmental interests - is an important advantage of Facebook's advertising system, Nguyen-Tan said.

But he acknowledged that Public Bikes spends more money advertising with Google, where it is easier for the company to reach people interested in buying a bicycle.

Sunday, July 15, 2012

Windows 8 on your computer soon


   If you are from, who had the opportunity to experience Windows 8 on your computer, or just you who follow the developments in the Windows system 8, nor dared to experience only when it is the final version stable, then know that he is no longer in front of you much time for waiting, it was announced that the finance director for Microsoft since the days of date of the issuance of a few final version of Windows 8 is expected.


   For a copy of the 
RTMBmusenai own computers and operating system mechanisms Vsttoffer starting from the beginning of October, in preparation for the launch of computers that run Windows the new version with the limits for the month of October as the date Satzam with the descent Version RetailFor all users (see this link for more information on the  The difference between the versions). We expect leaks to copy the RTM, As usual for a copy Previous windows, the thing that will enable us to take a more accurate idea of the final version of the work undertaken by Microsoft since the issuance of the Release Preview.

   As for the price Microsoft has identified both eighth upgrade from Windows XP, Vista or 7 at 29.99 euros for the upgrade via the Internet, but for for an upgrade via CD-ROM you have to pay shall be approximately 59.99 euros. If you are of those who Aqtnoa their computer after the date of Conqueror of June you will get the price of preferential 14.99 euros.  

Facebook examine your conversations were aimed at the prison

Be careful what you type in the chat window on the social networking site "Vsepok" you are an observer, and all what you write will be reviewed to keep track of any use contrary to law. Not the source of this talk, as we used to specialize in the protection nothing to do with the site, but here comes the statement " Joe Sullivan"Active social protection chief.
b
ut do not worry, it seems that it was a "Olchoreetm" is used by Facebook, is to follow any conversation include the exchange of personal information, language or obscene language, and even some cases, where chatting between two persons belonging to two age groups in two different, something that can be protect certain minors from the hand of any aggressor to get them. The program can also identify the sound of people in the history of criminal operations, and also depends on his research and examine some of the sentences and phrases used in the past by some of the perpetrators.

   When this information is collected questionable, is sent to one of those responsible for the protection of the site, which is determined by its role in taking the appropriate decision of the Police Report or not, a procedure that can be confirmed from Facebook to its users that it is not one of the Btaatbahm. We have little information with respect to the subject, but we know that this monitoring has enabled the authorities to arrest a child sex abusers in the past.

The discovery of a loophole enabling purchase of content for free from apple store apps

It is possible to store applications  Apple and buy applications and content for free is easy after the Russian developer discovered a way to circumvent the payment mechanism within the application "any AWS" for users on devices able
 Alngrh by the developer easy to implement and does not require any technical experience and can be applied to all devices that work with all Apple operating system began to copy any of the AWS AWS 3.0 to 6.0 any
Has launched a special website explaining how to exploit the gap ZonD80 explorer who calls himself a name
http://www.in-appstore.com/


Sunday, July 8, 2012

Lit Motors thinks we're just driving around in too much car.


So Lit Motors is developing what looks a lot like a motorcycle, but with several traits from a car: You don't have to balance and you don't get wet. They call this model the C-1 and the full-size running prototype is, admittedly, in a very basic state. But here we see the sort of thinking that is perhaps just this side of too radical, while performing drastic surgery on what of the last great areas of waste in our daily lives: The amount of car we lug around for no particular reason.


CNET Conversations is part of a CBS Interactive special reporting project.


I like Daniel Kim, he wants to change things but isn't up "there" in a world of intangibles. He began his career as a Land Rover mechanic and, like Steve Jobs, did a little coursework at Reed College in Oregon before moving on (probably bored with the routine progression of college.) He's assembled a team of about a dozen people in a old warehouse in San Francisco that looks like a poster child for urban renewal.

The C-1 is up against some long odds to be sure: Aside from printing "motorcycle" (which will do it few favors in the U.S. market), I also came to realize there's a significant mental hurdle to trusting a two-wheeled vehicle to keep itself upright with you in it. By unseen magic. In traffic. But change has to start somewhere and what Lit's working on is at least part of the new attitude toward everyday vehicles we need to embrace, two wheels, three or four.

Apple bows out of program for environment-minded products

Apple has decided to stop participating in a major program devoted to the production of environmentally friendly products, reportedly saying that its design direction is no longer in line with the program's requirements.

Late last month, Apple told the nonprofit EPEAT group that the company would no longer submit its products for green certification from EPEAT and that it was pulling its currently certified products from the group's registry.
(Credit: Apple graphics)

According to The Wall Street Journal's CIO Journal site, 39 of Apple's products had received EPEAT's green stamp of approval, including laptops such as the MacBook Pro and the MacBook Air.

EPEAT, or the Electronic Product Environmental Assessment Tool, receives funding from the Environmental Protection Agency and calls itself "the leading global environmental rating system for electronic products, connecting purchasers to environmentally preferable choices and benefiting producers who demonstrate environmental responsibility and innovation."

The U.S. government requires that 95 percent of its electronics bear the EPEAT seal of approval; large companies such as Ford and Kaiser Permanente require their CIOs to buy from EPEAT-certified firms; and many of the largest universities in the U.S. prefer to buy EPEAT-friendly gear, CIO Journal reports.

Apple "said their design direction was no longer consistent with the EPEAT requirements," CIO Journal quotes EPEAT CEO Robert Frisbee as saying. "They were important supporters and we are disappointed that they don't want their products measured by this standard anymore."

Among other things, the EPEAT requirements hold that electronics must be easy to disassemble, so their components can be recycled. The iPhone, the iPad, and the new MacBook Pro with Retina display don't pass muster because of things like batteries and glass displays that are glued to casings and backings. Apple may soon introduce an alternate green standard to apply to its products, CIO Journal reports.

We've contacted Apple for comment and will update this post if and when we hear back. CIO Journal said Apple had declined to comment but had referred the site to the Environment section of Apple's Web site.

The Verge points out that Apple had touted an EPEAT Gold rating for its iMac computer (see screenshot of the relevant page on Apple's site below).

Two-armed robot takes on risky lab work

We've seen robot pharmacists before. Here's a robot lab technician whose speed might make "CSI" plots a little more believable.

Developed by automation giant Yaskawa and Japan's National Institute of Advanced Industrial Science and Technology (AIST), co-creator of the HRP series of humanoid robots, Mahoro is a two-armed droid that looks like a modified Yaskawa Motoman assembly robot.

Unlike most assembly robots, its arms have seven joints, allowing it to use human tools and to perform humanlike motions easily.
Related stories
Robo-pharmacist readies 350,000 doses perfectly
Microrobot swims through eyes to deliver drugs
Humanoid plant workers wow crowds at iRex

It automates lab work and can do tasks such as culturing more quickly and accurately than human lab techs, DigInfo News tells us in the vid below.

It can work on things like flu testing as well as handle biohazards, keeping human technicians out of harm's way, according to AIST's Tohru Natsume.

The droid can be easily taught what to do by using a virtual lab bench created with CAD software. The system also lets programmers set up the tools in the most efficient arrangement for maximum speed.

Recently shown off at the Interphex pharmaceutical trade show in Tokyo, Mahoro is being used by drug companies and universities.

AIST wants to improve it so humans can work alongside the robo-tech. I think that might just improve the acting on "CSI," too.

Galaxy Nexus reappears in Google Play store

The harried Galaxy Nexus smartphone is again available for purchase in the Google Play store.


iPhone, left, Google phone, right.

On June 29, a judge in a lower court granted Apple's request for a pretrial injunction against U.S. sales of the Samsung-made, Android-running smartphone while the court determines whether the device infringes the patents Apple claims it does. Samsung appealed, and the appeals court temporarily lifted the ban yesterday, while it deliberates on whether to dump the ban altogether.

Apple, however, may be able to convince the court to reinstate the injunction while the legal proceedings roll on; it has until Thursday to submit its arguments on that score. How long it will take the court to mull over those arguments of Apple's is unknown.

In the meantime, Google had yanked the phone from the Google Play store, saying it would reappear shortly, running the latest version of Android -- 4.1 or "Jelly Bean" -- which Google says doesn't infringe the Apple intellectual property.

The Google Play listing says the Galaxy Nexus will have Jelly Bean "soon." So it may be the temporary lifting of the ban that's responsible for the smartphone's reappearance in the store. In any case, the listing says the phone won't ship for two to three weeks, by which time it may have Jelly Bean installed.

Saturday, July 7, 2012

More than 300,000 device threatened to prevention of access to the Internet the next day Monday

In the news recently published by the professionals of protection for the emergence of Trojan on the Internet and named "Baldi S. The Sound System" and which has infected more than 4 million computers around the world
Trojan, which works to change the value of the domain name in the computer and thus exposure of thousands of computers around the world to the loss of internet connection
The work of the Federal Bureau of Investigation to close the loop responsible for the dissemination of malicious program by placing the servers mission transform infected machines to tracks correctly to avoid servers counterfeit is that the biggest problem arises now is an announcement of the FBI for this turn off the servers to help us on monday next due the cost of expensive and therefore will not be able up of 300,000 people from accessing the Internet in the next monday
DNS CHANGER to check if your device is infected with malicious SOFTWARE

Please visit the following link http://www.dns-ok.fr/

Severe shortage in the number of fan pages on Facebook most of

Perhaps most managers Facebook pages have noticed after midnight yesterday a rapid fall in the number of fans on Facebook at page time and reduce the company did not authorize any details on this topic. Is it a technical problem experienced by social network or is a new step within the policy of Facebook
And may spread some rumors about the management of Facebook accounts by deleting all non-activated phone numbers explains the gradual decrease in the number of all fans Facebook pages, but none of this remains true even emphasizes the social networking nature of the problem formally

Here are some letters that reached by some users of Facebook

Chinese hackers overthrow the leadership system of the Indian Navy

Hackers from China has hacked the Indian Navy leadership. Through the employment of my virus was able to collect all the IP addresses of sensitive Indian Navy command center. And sent to China
  The virus after injection of the same computer create files hidden in the system as a first step before the second step in gathering information about files and documents on the basis of specific words of certain keys has been programmed by virus
. In advance

The susceptibility virus to disguise strong, can move to the Keys Alasepe and disguise it when you insert the key in one of the computers driving the Indian Navy, separated completely from the Internet for security reasons, but that after the transfer of key Allaisba to any another computer connected to the Web virus sends the data collected from the computers driving the Indian Navy to Chinese hackers.
  Has been suspended 8 to the limits of time immediately after the discovery of virus officers, suspected of having a close relationship with a hack who got it but did not specify the charges against them after

Tuesday, July 3, 2012

RiskRanker a new technique for the detection of malware

Explore the Center for Research on NQ security smart phones in collaboration with the University of North Carolina, a new technique for the detection of security threats in smart phones

At present the malware to damage the devices immediately download able, and can not be detected only after speaking to major damage, while the protection programs for mobile smart ineffective because they rely on samples of malicious programs known and can not identify the malware that can not There is a definition in the program database protection
RiskRanker is a system analysis is unique, it can auto-detection of any suspicious behavior to play programs, and is distinct from the rest of the security tools that set a limit to the applications that behave suspicious while in the App Store and before it is installed on the smartphone, and in run a pilot for the RiskRanker which examined more than a hundred thousand stores in the application of different electronic applications offer Android, enabling the discovery of 718 RiskRanker application contains malicious programs

Laptop stolen displays 30 thousand infected with cancer risk

Cause a laptop stolen from a staff in a hospital in Houston, Texas of cancer in the exposed 30 thousand infected with cancer at risk of identity theft
Where the Centre issued a MD of cancer at the University of Texas issued a statement yesterday shows that he was stolen laptop is encrypted from the home of a medical center and that the doctor gave a tip to the police about the theft and had the police started to investigate the incident, the laptop contains information patients personal and numbers security social as well as numbers to medical records, hospital officials they said that there is no reason to believe that he paid was stolen laptop for information stored on it

Tuesday, June 26, 2012

Facebook just switched your default e-mail address



Whether you've noticed or not, you have a new primary e-mail address listed as your Facebook contact, and most likely it's an address you've never used.

The social-networking site has quietly replaced your default e-mail addresses such as Gmail and Yahoo! with your @Facebook.com address, an e-mail service option the company launched a few years ago and synced with Timeline in April.

"As we announced back in April, we've been updating addresses on Facebook to make them consistent across our site," a Facebook spokesperson told Mashable. "In addition to everyone receiving an address, we're also rolling out a new setting that gives people the choice to decide which addresses they want to show on their Timelines."

Mashable.com: Facebook quietly tests shareable ad units

First spotted on Saturday by blogger Gervase Markham, the e-mail address you once listed as your point of contact is now hidden in the site's database and your assigned @Facebook.com address is highlighted for friends to see.
Former Facebook prez talks IPO mess
Can Facebook make money from ads?
Facebook: Is now the right time to buy?
Former Facebook prez talks IPO mess
Can Facebook make money from ads?
Facebook: Is now the right time to buy?

If you ever changed your Facebook vanity URL, that serves as the prefix of your Facebook e-mail address (i.e. Facebook.com/John.Smith would be John.Smith@Facebook.com). For those that never added a vanity URL, Facebook has assigned numbers to serve as your email account name.

Mashable.com: Facebook's facial-recognition acquisition raises privacy concerns

When users send an e-mail to your Facebook.com address, it pops up in your Facebook inbox. However, some users have experienced issues with receiving messages through Facebook, since some of them end up in an "Other Messages" folder that few people know about.

Although members have been slow to embrace their Facebook email address, the move may be a part of an effort to remind and encourage users to use it more.

If you want to switch your e-mail contact information back to what it was, it's easy to do. Visit your Timeline or profile page and select "About" under your contact information. You can then hide your Facebook email address from the contact page and elect to highlight another e-mail address.

Mashable.com: Friendthem plans to sue Facebook for 'find friends nearby' feature

"Ever since the launch of Timeline, people have had the ability to control what posts they want to show or hide on their own Timelines, and today we're extending that to other information they post, starting with the Facebook address," the Facebook spokesperson added.

What do you think of your Facebook e-mail address? Will you use it? Let us know your thoughts in the comments.

You lied and said he discovered the hack through the system.ini file

In several forums and popular sites usually draws my attention a very strange subject, a detection device is infiltrated
Even more bizarre in the subject find many of those who believe and it is shown through system.ini file by
  The reaction of visitors to this subject. The flaw lies in the spread of this topic among the pioneers of social networking such as the spread like wildfire, making the number of the pioneers of the Internet in real danger, Flaeugd thing as a hack discovered by the discovery of some of the values ​​added to the file in question, Yes we can during the year 2006 or Trojan virus adds some values ​​to this file but american it does not apply to every Trojan
There are many of the Trojans and that of this file, and therefore your trust in such topics to make you a real danger. It also does not have such thing as the discovery of viruses or Trojan programs without all these things are the things that have no basis of knowledge. Yes it can be applied to a kind of Trojan or virus, but how many Trojans and viruses around the world? If that's the case why there are programs to protect tallk constantly? But why there are companies that spend big dollars Malayer to protect their networks from attack Petrojanat, if it was simple to this degree? The strange thing is that you find many of the sites circulating topic with confidence. No defect in the movement of the object and try drafting your way, but the disadvantage is borne only understand what

The arrest of a Russian hacker 22 years old managed to penetrate a computer 6000000

The Russian police arrested a young man at the age of 22 years, managed to configure the network botnets and wide, with 6 million computers could this hacker penetrated by Trojan of its programming. Trojan from which the user was able to steal more than $ 4.5 million dollars from various bank accounts and credit cards managed by Alasala breakthrough for the duration of these computers, which are mostly residents of the cities of the Russian
The police managed to arrest the young man after the track to its effects on the Internet for a long time before determining the place of residence, and attack him for throwing. Captured and directed to a fair trial

Friday, June 22, 2012

Trojan aimed at printers and fall ill, go mad

Company Symantec found trojan cause 'mad printers "and it is full of printed pages  force until the amount of paper in the printing, the company monitored the activity of this Trojan in countries of the world, but countries that were most affected are the United States and India
Experts Symantec rated the Trojan as a kind of Milicenso, a Trojan sneak to the device through the implementation of an attack back door backdoor, as they said that there are several ways to hit this type of Trojan, may be by opening the compressed files contain this Trojan and be attached with the mail random Web, or download the software fake video codecs

MasterCard denies penetration Reckz0r data customers

A few days before we had we published the news of penetration of 79 bank by hacker Rakazhor, which in turn confirmed that he had hacked data clients both MasterCard and also visa Card, New in the case that the company MasterCard has denied that he had received a violation of its informational, and that the data published by the not contain any data related to payment information. According to this reporter one site, "Bessie World," that after contact with some of the victims found that the data published by the hacker is finished

Validity of 7 years. It is also after the research has been detected that the data published by this hacker found published a week ago by another group, which said it had looted this data from a data center Israeli (see photo) Thus, the hypothesis of a breakthrough Rakazhor company MasterCard has become fade, especially after the verification the identity of the hacker. To be placed again that the probability of hacker Rakazhor only child hacker knew very well how to bring the spotlight to him

Pirates UGNazi group claims responsibility for Twitter stopped yesterday

Suffered many of the surfers Twitter yesterday from the cessation of the site for more than 50 minutes, where the subject of a number of sites news sites yesterday, but it is after the company twitter fixes the problem, confirmed that the damage caused by a technical fault led to a halt destruction of the site, which is impossible with him browsing and access to Twitter. However, the hacker group called the
Confirmed responsibility for the attack blocking service on Twitter yesterday, although a spokesman denied UGNazi
. The name of a company Twitter, stressing that the site was stopped for output only a technical fault and not attack blocking service
Of the strongest groups hacker managed to penetrate where a number of groups are classified UGNazi
Sites of interest as a U.S. Intelligence and the location of the famous Cold Flair

9500 malicious site is discovered every day by google

Doubt that the Web has become full of sites harmful threat to the security of Internet users and is growing day by day the Google announced that through the analysis of the data collected over the past five years thanks to the service "net Brows" provided to identify malicious sites have been able to discover about 9,500 malicious Web site every day
He said one of the speakers in the name of the security team for Google that these sites are either a for spreading malware, viruses, or as sites dedicated to the application of phishing attacks as sites "phishing



The collapse of the government websites and Israeli security today

Servers were all government websites and security both day to complete paralysis, led to the stoppage of the work of these sites for a period of time of not too many, making browsing  not access the sites mentioned.
According to the website "News One", which included this stop, mossad site as well as the Israeli army site added to the site of the General Security Service
While the announcement issued by the office of Israeli Prime Minister suggesting that the sites that stopped, due to a technical fault has not been announced for details. He also did not declare any group of any hackers adopt electronic attack can be a result of the stop e-government Web sites and Israeli security

Penetration site of the Ministry usa of Defense by a group wikiboat

A few weeks ago a group hacker wiki bot itself to the world through the overthrow of several popular sites, and today the group has the location of the overthrow of the U.S. Defense Department and the Pentagon, one of the sites believing strongly in the virtual world. Where deliberately
The group immediately after penetration of the site database published several phone numbers and names, addresses and e-mail to several employees. So be a wiki bot may view the world's attention to it in the second carried out by a blow from the group of the month, which was established in March

Monday, June 18, 2012

Try Page 360 FREE on Sun's iPad app

This summary is not available. Please click here to view the post.

Dial M for money The phone app that withdraws cash hits UK





FORGETTING your wallet on a big night out need never be a problem again.



Related Stories

Roaming phone price cut joy

BRITS abroad to avoid web mobile phone ‘bill shock’ thanks to price war
Pay in High St on your mobile
Dad launches app to help find missing children
Bird ‘saved from death by app’
Thieves: You’re under iRest
Facebook app spies on texts


From today The Royal Bank of Scotland is letting customers withdraw money from a cash machine — using their mobile phone rather than a card.

All you need is the bank’s GetCash app and you can take out up to £100 of your money at a time.

It’s a first for any UK bank and RBS hope the innovation will be the first step towards cardless ATMs.

The 2.4million customers who already have the RBS banking app on their phone will be able to use the GetCash option from today.

They can access their money at 8,000 RBS, NatWest and Tesco ATMs around the country — after requesting and receiving a secret six-digit pin which is only valid for three hours.

The GetCash app can also be used to give money to a friend or relative — by sending a secure text containing a pin.

They can then use this to withdraw money from a participating cash point.

Ben Green, head of mobile at NatWest and RBS, said: “This has never been done anywhere in the UK, and yet it’s a really simple and secure way to help our customers get cash whenever and wherever they need it.

“We’ve heard countless stories from customers who have left their wallet behind or parents who need a quick way to send money to their children immediately.”

NatWest, part of RBS Group, say they are certain the app is not open to abuse by fraudsters.

A spokesman said: “We have spent loads of time making sure the security on this is very, very tight.

“To get on the banking app itself you have to have a six-digit pincode.

“If you put in the pin wrong a number of times it will lock you out. If you don’t use the banking app for a period of time it will time out and can’t be accessed.

“If there are any cases of fraud — just as with going to an ATM if someone gets hold of your card — then we refund.”

The app can be accessed using iPhones and iPads plus Android and BlackBerry smartphones.

It can also be used to check balances, transfer money and to find your nearest ATM.

                                             How it works
App-y to help ... banking app works on a range of phones


 1. Log on to the RBS banking app using your PIN.                                  

2. Choose the GetCash option. Type in amount you wish to withdraw.

3. You will be sent a unique six-digit pin.

4. Go to one of 8,000 participating cash points.

5. Press “Enter” on ATM.

6. Follow the prompts for “Emergency cash” and enter cash code and the amount you requested.

7. If the details are correct the money will be issued – up to £100 a time.

8. Use GetCash as many times as you want – so long as you don’t go over your daily withdrawal limit.

Warning of a security loophole on the new Hotmail Protect yourself now

Protection professionals warn of a new wrinkle on hotmail, but did spend some few months to detect more than a gap in the e-mail alternative. The gap the new present in hotmail located this time in profile user hotmail on Windows for live Messenger, this warns professionals protection profiles open, and then you immediately shut your profile on Windows for live fully to protect against this vulnerability the new, which did not spread on the face of widely among hackers that it's still privat
How close the profile on Windows Messenger live?
The first thing after you are logged on profile click on the top right of the page


Then thrown fresh center of the page and click on Method marked in red


Then select a special, and so you have to protect yourself from the gap on the new hotmail









Friday, June 15, 2012

Google now can warn you in the event of an attack on a government-backed electronic mail Gmail

Google says that now that they can warn users when you feel an attack Google's systems supported by governments through its intelligent and able to differentiate between attacks and regular attacks by a group or groups backed by the government, through Adhar warning users to calculate the

The deputy chief engineer of information security Google's Eric Gross, it is possible for users to ask how do we know whether some of the cyber attacks against users of Gmail state-backed or not, but we can not disclose accurate information about it, fearing it could be use it by the attackers, but we rely as well as reports on the victims of the hack.
  Google and keep this new system, you may have jumped a big step forward with respect to the mail service Gmail, especially the security aspect and proov once again it's the first company par excellence

Programmer to launch an electronic attack South Korea and North Korea's government was involved in the matter

The police recently arrested games programmer from North Korea, the programming of games built with Spaaoir, the latter used by the accused in stolen personal information of more than 100,000 scope of southern South Korea. Add to that the bomber had managed to form a network of victims of a wide use in launching denial of service attacks on a number of government positions and economic development of South Korea, most recently South Korea Airport site.
Where after interrogation the accused de 39 years old, was discovered he was working with a cell programmers urges the direct supervision of the Office of General of the Republic of surveys of North Korea.
This is not the first time discovers the involvement of the North Korean government to launch cyber attacks on South Korea, where in 2008, was the victim of an attack email targeted military command to South Korea, in 2009, launched a North Korean attack blocking service violently targeted government websites to South Korea ...
While said security expert from South Korea, said such attacks that target strong and South Korea by North Korea is in the development of advanced and durable backed attack on both Russia and America

Penetration leads to leakage of information users of Twitter

Was leaked about 10 thousand username Twitter by a team of penetration is not known, continue to Altndeim World Anonymous, that was in last Saturday where it was published a file on the site Pastebin contains 10 thousand user name of Mgrdan on Twitter who use the application TweetGif, while said a spokesperson for the company that Twitter passwords are still secure and that the hack happened to TweetGif application has nothing to do Bonizthm

Samsung plans to launch its own Facebook

Plans Samsung to launch social networking of their own, competition and similar service Facebook, the service will be available on all electronic devices that support Internet access, has launched the Samsung on the project name Samsung Facebook, one of the officials at Samsung confirmed to the Korea Times that the service will be available in the first quarter of next year, and added that it comes in order to expand services, the Samsung in the field of social media across different electronic devices

Wednesday, June 13, 2012

New web domains could include .sex, .app and .pizza

Move over .com -- it might have to compete with suffixes such as .sex, .app and .fail and after the body in charge of website domain names unveiled some 2,000 applications for new ones Wednesday.

The US-based Internet Corporation for Assigned Names and Numbers (ICANN) revealed details of 1,930 requests for new web address endings, ranging from the general (.shop) to the highly specialised (.motorcycles).

Many of the requests are from large companies such as Apple, Mitsubishi and IBM -- with Internet giant Google alone applying for over 100, including .google, .YouTube, and .lol -- Internet slang for "laugh out loud".

"This is an historic day for the Internet and the two billion people around the world that depend on it," ICANN president and CEO Rod Beckstrom said at a press conference in London unveiling the list.

California-based ICANN says the huge expansion of the Internet, with around two billion users around the world, half of them in Asia, means new names are essential.

There are currently just 22 generic Top-Level Domains, or gTLDs, in use, including .com.

Beckstrom said ICANN hoped the first of the new suffixes to be live by the first quarter of 2013, but warned that evaluating all of the applications could take around 20 months.

"We're standing at the cusp of a new era of online innovation -- innovation that means new businesses, new marketing tools, new jobs, new ways to link communities and share information," Beckstrom said.

"But let me stress that these are just applications. They are not yet approved, and some of them may not be. None of them will enter the Internet until they've undergone a rigorous, objective and independent evaluation."

A total of 911 organisations from North America paid the $185,000 (150,000 euro) fee to lodge an application, along with 675 from Europe and 303 from the Asia-Pacific region.

Just 17 applications for new suffixes were received from African applicants, while 24 requests came from Latin America and the Caribbean.

ICANN said 66 of the proposals were linked to geographical locations -- such as .nyc, .miami and .paris -- while others relate to industries, such as .insurance.

The sought after suffix is .app, with 13 applicants including Google and Amazon.

In cases where several organisations have applied for the same domain, so-called "community-based applications" -- those from bodies representing several groups, such as trade associations -- will take precedence.

Where no community-based application is involved, ICANN will encourage applicants to "come to some kind of teaming arrangement", Beckstrom said.

Failing this, the domain name will be auctioned off -- which could lead to a bidding war in cases where big companies such as Google and Amazon are vying for the same domain, such as .books and .blog.

The Vatican has applied for .catholic, while a Turkish company has requested .islam.

Four firms have applied for for .pizza, six for .baby and three for .basketball.

ICANN, which began taking applications in January, also revealed that 116 of the claims are for what it termed "internationalised domain names" -- addresses that are not in the Latin alphabet.

On top of the registration fees, maintaining a suffix will cost $25,000 annually. ICANN has raised $352 million in application fees -- which Beckstrom defended, saying they only just allowed the company to break even.

ICM Registry, which runs the freshly established domain .xxx, hopes to add other online red-light districts ending in .sex, .porn or .adult.

Dubai-based web hosting firm Directi, meanwhile, has spent around $30 million applying for new domains, including .law, .bank and .doctor.

kjl/dk/txw

Amazon on Tuesday released its music player app for iPhone and iPod touch, a move that expands the reach of the Internet retail giant for Apple users.

The Cloud Player app allows customers to stream or download music stored in Amazon accounts to the iPhone or iPod touch, play music that is already stored on their device, and manage or create playlists.

Amazon, a big rival to Apple's iTunes, will not be selling music through the app but will allow its customers to manage and listen on Apple hardware.

"Customers tell us that they want access to all of their music, wherever they are, and on all of the devices they use," said Steve Boom, vice president of digital music for Amazon.

"By bringing Cloud Player to iPhone and iPod touch, we now have the most widely compatible cloud playback solution available, giving our customers the ability to buy once and enjoy their music everywhere."

Amazon is also selling its own tablet computer, the Kindle Fire, in a challenge to the market-leading iPad from Apple. But Kindle sales are believed to be slipping after a sales surge last year, according to analysts. Amazon does not provide sales data for the Kindle.

Some reports say Amazon is readying an expansion of its app store to more international markets and the Android platform in a more direct challenge to Apple and Google.

Friday, June 8, 2012

Production of larger OLED display flexible full-color

Announced the center of the display flex (FDC) at Arizona State University that he manufactures the largest OLED display flexible full-color, with a Screen Size 7.4 inches and has manufactured using transistors of thin oxide, according to the makers of the screen, the choice of material industry makes it viable for commercial production, because the manufacturers can be used as lines of current production for the production of these screens instead of purchasing new production equipment, is worth mentioning that the center of the display flex at the University of Arizona work side by side with scientists in the laboratories of military research in this project for the production of the screen, so that the soldiers were wearing on their sleeves in what can be be called the computer forearm