This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Wednesday, July 25, 2012

T-Mobile could get HTC One X+ this September

T-Mobile customers may lack 4G LTE, but if the latest rumors are right, it'll be the first U.S. carrier to offer its customers a quad-core smartphone. Related storiesHTC One X reviewHTC One S reviewHTC One V reviewThe HTC One X+, suggests TMoNews, will carry Nvidia's Tegra 3 quad-core processor, the same chipset used in international versions of the HTC One.The U.S. versions...

Researcher uses NFC to attack Android, Nokia smartphones

LAS VEGAS -- Security specialist Charlie Miller demonstrated at the Black Hat security conference today a way to hijack an Android smartphone via the Near Field Communication (NFC) technology that's turned on by default on the device, and said he's found problems with NFC implementations on Nokia as well. NFC tags have built-in antennas and are found in stickers and smart...

Hacking, the card game, debuts at Black Hat

LAS VEGAS -- There's much more to hacking than just the Hollywood portrayal of a speed typing contest, say the computer security professionals who've developed a new hacking-themed card game called Control-Alt-Hack at Black Hat 2012. Control-Alt-Hack is based on Steve Jackson Games' Ninja Burger, but from the characters to the mission cards to entropy cards, the demystification...

Monday, July 23, 2012

Sources: HTC did not meet financial obligations to Beats

HTC's abrupt change in course on Beats Electronics is more about HTC's internal troubles than anything involving the audio company, sources close to the negotiations told CNET. Last August, Beats, a maker of popular headphones that was co-founded by rapper Dr. Dre and music impresario Jimmy Iovine, sold 50.1 percent of the company to the Taiwanese manufacturer of smartphones...

App Store hacker says the 'game is over'

The creator of an exploit that let users purchase digital goods inside of iOS apps without actually paying for them said today that Apple's fix puts the hack out of business. "Currently we have no way to bypass [the] updated APIs," creator Alexei Borodin wrote in a post on his development blog. "It's a good news for everyone, we have updated security in iOS, developers have...

Friday, July 20, 2012

Google+ trends: 'The Dark Knight Rises' reviews, Nexus 7

Google+ers in the US are returning home from midnight showings of The Dark Knight Rises and posting their micro-reviews of the film on the social networking site.They say, “Just saw The Dark Knight Rises. Truly an awesome film...though not as awesome as The Dark Knight. Overall, I'd give it a 9 out of 10. Still freakin' amazing! I already want to see it again,” “Just saw...

No room for error in Facebook's debut quarter

SAN FRANCISCO (Reuters) - Facebook Inc faces immense pressure to beat Wall Street's financial targets when its delivers its inaugural quarterly earnings report next week, hoping to wash away the bad taste left with investors from a soured IPO. The No. 1 social networking company's second-quarter report on July 26 will be scrutinized by investors looking for clues on the...

Sunday, July 15, 2012

Windows 8 on your computer soon

   If you are from, who had the opportunity to experience Windows 8 on your computer, or just you who follow the developments in the Windows system 8, nor dared to experience only when it is the final version stable, then know that he is no longer in front of you much time for waiting, it was announced that the finance director for Microsoft since the days of date...

Facebook examine your conversations were aimed at the prison

Be careful what you type in the chat window on the social networking site "Vsepok" you are an observer, and all what you write will be reviewed to keep track of any use contrary to law. Not the source of this talk, as we used to specialize in the protection nothing to do with the site, but here comes the statement " Joe Sullivan"Active social protection chief. b ut...

The discovery of a loophole enabling purchase of content for free from apple store apps

It is possible to store applications  Apple and buy applications and content for free is easy after the Russian developer discovered a way to circumvent the payment mechanism within the application "any AWS" for users on devices able  Alngrh by the developer easy to implement and does not require any technical experience and can be applied to all devices that work...

Sunday, July 8, 2012

Lit Motors thinks we're just driving around in too much car.

So Lit Motors is developing what looks a lot like a motorcycle, but with several traits from a car: You don't have to balance and you don't get wet. They call this model the C-1 and the full-size running prototype is, admittedly, in a very basic state. But here we see the sort of thinking that is perhaps just this side of too radical, while performing drastic surgery...

Apple bows out of program for environment-minded products

Apple has decided to stop participating in a major program devoted to the production of environmentally friendly products, reportedly saying that its design direction is no longer in line with the program's requirements. Late last month, Apple told the nonprofit EPEAT group that the company would no longer submit its products for green certification from EPEAT and that...

Two-armed robot takes on risky lab work

We've seen robot pharmacists before. Here's a robot lab technician whose speed might make "CSI" plots a little more believable. Developed by automation giant Yaskawa and Japan's National Institute of Advanced Industrial Science and Technology (AIST), co-creator of the HRP series of humanoid robots, Mahoro is a two-armed droid that looks like a modified Yaskawa Motoman assembly...

Galaxy Nexus reappears in Google Play store

The harried Galaxy Nexus smartphone is again available for purchase in the Google Play store. iPhone, left, Google phone, right. On June 29, a judge in a lower court granted Apple's request for a pretrial injunction against U.S. sales of the Samsung-made, Android-running smartphone while the court determines whether the device infringes the patents Apple claims it does....

Saturday, July 7, 2012

More than 300,000 device threatened to prevention of access to the Internet the next day Monday

In the news recently published by the professionals of protection for the emergence of Trojan on the Internet and named "Baldi S. The Sound System" and which has infected more than 4 million computers around the world Trojan, which works to change the value of the domain name in the computer and thus exposure of thousands of computers around the world to the loss of internet...

Severe shortage in the number of fan pages on Facebook most of

Perhaps most managers Facebook pages have noticed after midnight yesterday a rapid fall in the number of fans on Facebook at page time and reduce the company did not authorize any details on this topic. Is it a technical problem experienced by social network or is a new step within the policy of Facebook And may spread some rumors about the management of Facebook accounts...

Chinese hackers overthrow the leadership system of the Indian Navy

Hackers from China has hacked the Indian Navy leadership. Through the employment of my virus was able to collect all the IP addresses of sensitive Indian Navy command center. And sent to China  The virus after injection of the same computer create files hidden in the system as a first step before the second step in gathering information about files and documents on the...

Tuesday, July 3, 2012

RiskRanker a new technique for the detection of malware

Explore the Center for Research on NQ security smart phones in collaboration with the University of North Carolina, a new technique for the detection of security threats in smart phonesAt present the malware to damage the devices immediately download able, and can not be detected only after speaking to major damage, while the protection programs for mobile smart ineffective...

Laptop stolen displays 30 thousand infected with cancer risk

Cause a laptop stolen from a staff in a hospital in Houston, Texas of cancer in the exposed 30 thousand infected with cancer at risk of identity theft Where the Centre issued a MD of cancer at the University of Texas issued a statement yesterday shows that he was stolen laptop is encrypted from the home of a medical center and that the doctor gave a tip to the police about...

Tuesday, June 26, 2012

Facebook just switched your default e-mail address

Whether you've noticed or not, you have a new primary e-mail address listed as your Facebook contact, and most likely it's an address you've never used.The social-networking site has quietly replaced your default e-mail addresses such as Gmail and Yahoo! with your @Facebook.com address, an e-mail service option the company launched a few years ago and synced with Timeline...

You lied and said he discovered the hack through the system.ini file

In several forums and popular sites usually draws my attention a very strange subject, a detection device is infiltrated Even more bizarre in the subject find many of those who believe and it is shown through system.ini file by  The reaction of visitors to this subject. The flaw lies in the spread of this topic among the pioneers of social networking such as the spread...

The arrest of a Russian hacker 22 years old managed to penetrate a computer 6000000

The Russian police arrested a young man at the age of 22 years, managed to configure the network botnets and wide, with 6 million computers could this hacker penetrated by Trojan of its programming. Trojan from which the user was able to steal more than $ 4.5 million dollars from various bank accounts and credit cards managed by Alasala breakthrough for the duration of these...

Friday, June 22, 2012

Trojan aimed at printers and fall ill, go mad

Company Symantec found trojan cause 'mad printers "and it is full of printed pages  force until the amount of paper in the printing, the company monitored the activity of this Trojan in countries of the world, but countries that were most affected are the United States and India Experts Symantec rated the Trojan as a kind of Milicenso, a Trojan sneak to the device through...

MasterCard denies penetration Reckz0r data customers

A few days before we had we published the news of penetration of 79 bank by hacker Rakazhor, which in turn confirmed that he had hacked data clients both MasterCard and also visa Card, New in the case that the company MasterCard has denied that he had received a violation of its informational, and that the data published by the not contain any data related to payment information....

Pirates UGNazi group claims responsibility for Twitter stopped yesterday

Suffered many of the surfers Twitter yesterday from the cessation of the site for more than 50 minutes, where the subject of a number of sites news sites yesterday, but it is after the company twitter fixes the problem, confirmed that the damage caused by a technical fault led to a halt destruction of the site, which is impossible with him browsing and access to Twitter. However,...

9500 malicious site is discovered every day by google

Doubt that the Web has become full of sites harmful threat to the security of Internet users and is growing day by day the Google announced that through the analysis of the data collected over the past five years thanks to the service "net Brows" provided to identify malicious sites have been able to discover about 9,500 malicious Web site every day He said one of the speakers...

The collapse of the government websites and Israeli security today

Servers were all government websites and security both day to complete paralysis, led to the stoppage of the work of these sites for a period of time of not too many, making browsing  not access the sites mentioned.According to the website "News One", which included this stop, mossad site as well as the Israeli army site added to the site of the General Security Service While...

Penetration site of the Ministry usa of Defense by a group wikiboat

A few weeks ago a group hacker wiki bot itself to the world through the overthrow of several popular sites, and today the group has the location of the overthrow of the U.S. Defense Department and the Pentagon, one of the sites believing strongly in the virtual world. Where deliberately The group immediately after penetration of the site database published several phone...

Monday, June 18, 2012

Try Page 360 FREE on Sun's iPad app

This summary is not available. Please click here to view the po...

Dial M for money The phone app that withdraws cash hits UK

FORGETTING your wallet on a big night out need never be a problem again. Related Stories Roaming phone price cut joy BRITS abroad to avoid web mobile phone ‘bill shock’ thanks to price war Pay in High St on your mobile Dad launches app to help find missing children Bird ‘saved from death by app’ Thieves: You’re under iRest Facebook app spies on texts From...

Warning of a security loophole on the new Hotmail Protect yourself now

Protection professionals warn of a new wrinkle on hotmail, but did spend some few months to detect more than a gap in the e-mail alternative. The gap the new present in hotmail located this time in profile user hotmail on Windows for live Messenger, this warns professionals protection profiles open, and then you immediately shut your profile on Windows for live fully to...

Friday, June 15, 2012

Google now can warn you in the event of an attack on a government-backed electronic mail Gmail

Google says that now that they can warn users when you feel an attack Google's systems supported by governments through its intelligent and able to differentiate between attacks and regular attacks by a group or groups backed by the government, through Adhar warning users to calculate the The deputy chief engineer of information security Google's Eric Gross, it is possible...

Programmer to launch an electronic attack South Korea and North Korea's government was involved in the matter

The police recently arrested games programmer from North Korea, the programming of games built with Spaaoir, the latter used by the accused in stolen personal information of more than 100,000 scope of southern South Korea. Add to that the bomber had managed to form a network of victims of a wide use in launching denial of service attacks on a number of government positions...

Penetration leads to leakage of information users of Twitter

Was leaked about 10 thousand username Twitter by a team of penetration is not known, continue to Altndeim World Anonymous, that was in last Saturday where it was published a file on the site Pastebin contains 10 thousand user name of Mgrdan on Twitter who use the application TweetGif, while said a spokesperson for the company that Twitter passwords are still secure and that...

Samsung plans to launch its own Facebook

Plans Samsung to launch social networking of their own, competition and similar service Facebook, the service will be available on all electronic devices that support Internet access, has launched the Samsung on the project name Samsung Facebook, one of the officials at Samsung confirmed to the Korea Times that the service will be available in the first quarter of next year,...

Wednesday, June 13, 2012

New web domains could include .sex, .app and .pizza

Move over .com -- it might have to compete with suffixes such as .sex, .app and .fail and after the body in charge of website domain names unveiled some 2,000 applications for new ones Wednesday.The US-based Internet Corporation for Assigned Names and Numbers (ICANN) revealed details of 1,930 requests for new web address endings, ranging from the general (.shop) to the highly...

Amazon on Tuesday released its music player app for iPhone and iPod touch, a move that expands the reach of the Internet retail giant for Apple users.The Cloud Player app allows customers to stream or download music stored in Amazon accounts to the iPhone or iPod touch, play music that is already stored on their device, and manage or create playlists.Amazon, a big rival...

Friday, June 8, 2012

Production of larger OLED display flexible full-color

Announced the center of the display flex (FDC) at Arizona State University that he manufactures the largest OLED display flexible full-color, with a Screen Size 7.4 inches and has manufactured using transistors of thin oxide, according to the makers of the screen, the choice of material industry makes it viable for commercial production, because the manufacturers can be...