This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Welcome in TH3 professional security

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Wednesday, July 25, 2012

T-Mobile could get HTC One X+ this September

T-Mobile customers may lack 4G LTE, but if the latest rumors are right, it'll be the first U.S. carrier to offer its customers a quad-core smartphone.
Related stories
HTC One X review
HTC One S review
HTC One V review

The HTC One X+, suggests TMoNews, will carry Nvidia's Tegra 3 quad-core processor, the same chipset used in international versions of the HTC One.

The U.S. versions of the HTC One family of phone -- which includes T-Mobile's HTC One S, AT&T's HTC One X, Sprint's HTC Evo 4G LTE, and U.S. Cellular's HTC One V -- come with Qualcomm's Snapdragon S4 dual-core processor, it's fastest yet, in part because the chip incorporates an LTE radio out of the box.

T-Mobile's HSPA+ network doesn't use 4G LTE technology yet, though the carrier is planning to add LTE alongside its HSPA+ network.

The HTC One X+ would likely carry the One X's 4.7-inch 1280x720 pixel HD display, 8-megapixel camera with 1080p HD playback and capture, and 16GB internal memory. Fingers crossed it comes with an expandable microSD card slot as well.

Researcher uses NFC to attack Android, Nokia smartphones

LAS VEGAS -- Security specialist Charlie Miller demonstrated at the Black Hat security conference today a way to hijack an Android smartphone via the Near Field Communication (NFC) technology that's turned on by default on the device, and said he's found problems with NFC implementations on Nokia as well.

NFC tags have built-in antennas and are found in stickers and smart cards that are designed to transfer data to NFC readers, to send specific phone numbers and Web addresses to smartphones and other benign purposes. They require close proximity, a few centimeters or so, for data to be transmitted.

Attacks using NFC typically involve someone using a hidden reader to surreptitiously snag data from an NFC-enabled card in someone's pocket by swiping a reader very close to the card. But in this case, the risk is a tag sending a smartphone to a malicious Web site via the Android Beam feature without the user's consent.

In his talk, entitled "Don't Stand So Close to Me: An Analysis of the NFC Attack Surface," Miller showed how he could direct a phone to automatically visit a malicious Web site. He also was able to download to the device malware that exploited a browser bug that would give an attacker the ability to read cookies and watch the Web browsing done on a victim's device and eventually take control of the phone. "I can get to the browser with no user interaction," Miller said.

Related stories
Android Beam in action: Ice Cream Sandwich's flashy NFC feature
How to program an NFC tag with your Android device
Is NFC killing Google Wallet?
Miller, a principal security consultant at Accuvant, speculated about various attack scenarios, including one in which an attacker replaces a tag on a movie poster that sends viewers to a film preview with a tag that instead directs to a Web site hosting malware that can compromise the phone. An attacker could also replace tags used on point-of-sale payment terminals, he said.


The smartphones should not be allowed to directly take action based on an NFC communication, but should instead warn the user that the device is being directed to a particular Web site and prompt for permission, he said.

Miller also said he found bugs in the way NFC parsing code was written on Android Nexus S and a Galaxy Nexus from Samsung, but he did not try to exploit the holes. At least one of the problems has been fixed in the most recent version of the Android operating system, Ice Cream Sandwich, but Gingerbread is still vulnerable, he said.

Miller didn't just pick on Android. He also found some problems with the Nokia N9 phone running the MeeGo Linux-based operating system, which accepts NFC requests without user permission if NFC is enabled. If the default settings are unchanged, MeeGo allows another device to pair with it via Bluetooth over the NFC reader, even if Bluetooth is turned off. This feature can be used for interoperation with NFC-enabled devices like speakers, so a user can easily play music from the device. But this puts the phone and its data at risk via any ordinary Bluetooth attack, allowing someone else to make phone calls, send text messages, and download data, he said.

Miller also discussed a second attack using NFC on Nokia N9 in which an attacker could send the phone a malicious Word document that exploits a bug in the way documents are viewed on the device. "If an attacker gets close he can make the phone open up and render a document and exploit that," he said.

Devices are protected when the screen is off, because the NFC chip is off then, and if the phone is locked, according to Miller. And the smartphones have to come within a few centimeters of the tag for an attack to work, further limiting the threat, he said.

Miller said he had sent his research to Google and Nokia and they acknowledged receiving it but have not discussed the issues with him.

The iPhone does not have NFC capability at this time, though it's rumored to come in a future version, according to Miller.

Hacking, the card game, debuts at Black Hat

LAS VEGAS -- There's much more to hacking than just the Hollywood portrayal of a speed typing contest, say the computer security professionals who've developed a new hacking-themed card game called Control-Alt-Hack at Black Hat 2012.

Control-Alt-Hack is based on Steve Jackson Games' Ninja Burger, but from the characters to the mission cards to entropy cards, the demystification of white hat computer security is the name of this game. Game co-designer, security researcher, and University of Washington Computer Security and Privacy Research Lab honorary member Adam Shostack said that when it comes to teaching ethical hacking, also known as white hat hacking, not enough educators "use carrots, not sticks."

"Humor creates an open atmosphere," that helps break down the shyness of learning, he said during the conference session about the game. He explained that people are more likely to ask questions about things that they think they should've already learned if it's part of a game.

Games, he noted, have a spectrum from being as easy to learn as Go or dice games, all the way through Dungeons and Dragons or Settlers of Catan. Choosing a game to base Control-Alt-Hack on that involved humor and a bit of complexity would help keep the subject matter interesting for the target audience of teens and young adults.

In Control-Alt-Hack, you work as a researcher for a computer security company that gets hired to stress-test other companies. The deck of 156 cards includes 16 "person" cards to give you an identity during the game. The characters were given realistic traits, so there's no stereotypes of the obese, unkempt researcher covered in potato chip debris and pizza grease. Instead, you can play as one of eight men or eight women who have interests as varied as martial arts or rock climbing, and all are snazzily dressed in their artwork.
Getting Steve Jackson Games to agree to license Ninja Burger to them was a strategic move, explained Tammy Denning, who co-designed the game with her fellow University of Washington researcher Yoshi Kohno. Denning said. "We didn't have to playtest the game mechanics, since we mapped the Ninja Burger content to Control-Alt-Hack."

Steve Jackson Games also has a history with computer security, as an incident in 1990 that nearly destroyed the company played a major role in the creation of the Electronic Frontier Foundation


The game is currently in production, and not expected to reach store shelves until the fall. That didn't stop Denning, Kohno, and Shostack from simulating the game as they explained how it worked. Each time they reached a point where they had to roll the dice, they would throw blue fuzzy dice out into the audience. Those lucky enough to catch one will get the game for free when it's ready for distribution.

Another factor of being based off of Ninja Burger's gameplay is that the game is about having fun. "It's a fun game with educational content," explained Kohno. "It's not for teaching fractions."

Despite the emphasis on fun, the game goes to great lengths to be accurate. The learning objectives, obfuscated behind cute pop culture references like, "I find your lack of encryption disturbing," include promoting the accessibility of computer science and computer security; teaching that there's more to computer security than antivirus and the Web; and accurately depicting a diverse range of attack techniques and attacker goals.

SCADA and medical device hacking are more likely to show up than ransomware, and the techniques you can use include disinformation, exploiting weak passwords and unpatched software, and cross-correlating data sources, all in the name of the good guys.

Control-Alt-Hack isn't easy to hack, as it appears there's no "blank" card to draft your own mission on to. However, it does contain a nod to the cryptography-minded: one card is written entirely in code.

Monday, July 23, 2012

Sources: HTC did not meet financial obligations to Beats

HTC's abrupt change in course on Beats Electronics is more about HTC's internal troubles than anything involving the audio company, sources close to the negotiations told CNET.

Last August, Beats, a maker of popular headphones that was co-founded by rapper Dr. Dre and music impresario Jimmy Iovine, sold 50.1 percent of the company to the Taiwanese manufacturer of smartphones and tablets for $300 million. On Saturday, HTC said in a prepared statement that it was selling half of that stake back for $150 million.

Related stories
More HTC handsets with Beats headphones? Probably not
Beats Pro High-Performance review (White)
HTC to acquire majority stake in Dr. Dre's Beats
Beats finally announces deal to acquire MOG
Beats Electronics has a plan and it's much bigger than Mog


But in the year since taking majority control of the company, HTC has seen a management shakeup, dwindling market share, and a falling stock price. During the same period, HTC also wasn't meeting all of the financial commitments it had made to Beats as part of the acquisition deal, multiple sources close to the companies said.

It was against this backdrop that executives from both companies decided a partial Beats buyback of the company was the best way to proceed, the sources said. Beats Electronics now owns roughly 75 percent of the company and HTC 25 percent.

On Saturday, HTC said the reason for the sale was "to provide Beats with operational flexibility for global expansion." A representative of the handset maker declined to provide any additional comment for this story. A Beats spokeswoman also declined to comment.

Leading up to the deal with HTC, Beats was on a role. The company was searching looking for investment to help it fund expansion into new markets and product categories. But Beats locked arms with a partner that was headed for trouble.

The Taipai Times wrote today that Goldman Sachs expects "HTC's shipments to drop by 68 percent from last year to 6.7 million units in North America and by 38 percent to 5.8 million units in Europe." For 2012, analysts estimate that HTC will see a 28 percent drop in total shipments.

In April, Winston Yung, the HTC executive who was credited with pushing the acquisition of Beats, was moved out as chief financial officer. HTC struggled initially making the most of Beats but that was the least of Yung's troubles.

During Yung's year-long tenure as CFO, the company's revenue went from trending up to spiraling down. When Yung was replaced as CFO, HTC CEO Peter Chou said the move was not related to the Beats investment. Chou also said that HTC remained committed to Beats.

One of the ways HTC bungled the Beats integration into HTC was an attempt to bundle Beats headphones with some of the HTC's handsets, including the Rezound and Sensation XL. The reception by the public was at best tepid.

"An accessory like the headphone doesn't factor in when someone is buying a smartphone," Martin Fichter, an HTC product executive, told CNET in April. "If they want a Beats headphone, they'll buy it directly."

But Beats remains a cultural force and the company has big plans.

Iovine and other Beats execs the company's goal is to provide a premium music listening experience in the digital era, pushing the Beats branded audio equipment in cars, mobile devices, home-stereo speakers and of course headphones.

The Los Angeles-based company just recently acquired online subscription music service MOG. According to music industry sources, Beats intends to use MOG to sell music as well as a host of other products.

According to NPD, Beats make up 28.7 of the overall headphone category and among headphones that cost $100 or more, Beats owns a 54 percent market share.

App Store hacker says the 'game is over'

The creator of an exploit that let users purchase digital goods inside of iOS apps without actually paying for them said today that Apple's fix puts the hack out of business.

"Currently we have no way to bypass [the] updated APIs," creator Alexei Borodin wrote in a post on his development blog. "It's a good news for everyone, we have updated security in iOS, developers have their air-money."

Borodin says that the exploit, which requires the use of third-party servers and specially-installed security certificates, will continue to be up and running until Apple releases iOS 6. Last week, Apple said that software -- which is due in the next few months -- will patch the exploit. In the interim, the company provided updated APIs that validate each digital purchase.

"By examining last Apple's statement about in-app purchases in iOS 6, I can say, that currently game is over," Borodin added.

According to an interview with the enterprising programmer last week, the exploit allowed more than 8.4 million purchases of in-app content to be made. With a minimum price of 99 cents per in-app purchase item, that represents a total of $5.82 million developers might have received, with another $2.49 million Apple would have earned based on the App Store's 70/30 revenue split. However that tally could be considerably higher given that purchases within iOS applications can go well beyond the 99 cent minimum.

Despite the temporary security win for Apple on the iOS front, Borodin says a modified version of the hack targeted at Apple's Mac App Store is still up and running. "We [are] still waiting for Apple's reaction," he said in the same post. "We have some cards in the hand."

The exploit remains one of the few high-profile efforts to target Apple's digital storefronts from inside of apps. Separate efforts have targeted individual user accounts, and the copy protection on applications.

Friday, July 20, 2012

Google+ trends: 'The Dark Knight Rises' reviews, Nexus 7

Google+ers in the US are returning home from midnight showings of The Dark Knight Rises and posting their micro-reviews of the film on the social networking site.

They say, “Just saw The Dark Knight Rises. Truly an awesome film...though not as awesome as The Dark Knight. Overall, I'd give it a 9 out of 10. Still freakin' amazing! I already want to see it again,” “Just saw The Dark Knight Rises, it was epic!” and “Wow. Way to squander the awesome-ness that was The Dark Knight. Dark Knight Rises was way too long and way too... boring.”

The Friday photo themes #FidoFriday and #FloralFriday are back in the trending topics as Plussers post beautiful and funny pictures of flowers and dogs on their feed.

Owners of Google’s Nexus 7 tablet are sharing photos of their newly arrived device and posting tips, reviews and first experiences with the tablet.

“Just got my #Nexus7 cannot wait to play with it,” read posts, “Finally Nexus 7 in my possession.”

The top 5 most talked about topics on Google+ on July 20 at 7:30 AM GMT are:

The Dark Knight Rises
#FidoFriday
#FloralFriday
#Nexus7
#Oppo+

No room for error in Facebook's debut quarter

SAN FRANCISCO (Reuters) - Facebook Inc faces immense pressure to beat Wall Street's financial targets when its delivers its inaugural quarterly earnings report next week, hoping to wash away the bad taste left with investors from a soured IPO.

The No. 1 social networking company's second-quarter report on July 26 will be scrutinized by investors looking for clues on the health of its business, which is experiencing a sharp slowdown in revenue growth and mounting questions about its advertising sales.

With a rich multiple that gave Facebook the distinction of being the first U.S. company to go public with a valuation of more than $100 billion, the company headed by 28-year-old Mark Zuckerberg has little room for error.

"If they miss, it would be catastrophic for the stock," said Michael Binger, a portfolio manager with Gradient Investments.

"This is a very important earnings quarter for them. It will establish in people's minds how they think of the company," said Binger, whose firm does have a position in Facebook.

The bar has been lowered since Facebook warned that a shift in users to mobile devices - where its ability to earn revenue is still nascent - will hinder growth in the short run.

Analysts, on average, expect revenue in the second quarter to grow 28 percent to $1.15 billion. During the same period a year ago, Facebook more than doubled its revenue.

With Facebook's stock still trading at three-quarters its $38 IPO price, executives need to address a litany of concerns about the business, such as the efficacy of its online ads and the company's nascent efforts in mobile advertising.

Investors say Facebook is unlikely to be able to deliver the sort of numbers that can propel its stock back to debut levels, but the risk of triggering a slide if the company disappoints Wall Street is high. Facebook's stock still trades at a rich 57 times forward earnings, compared with Apple Inc's 13 times and Google Inc's 14 times.

"Facebook is probably going to come up with one or two revolutionary streams that are going to bump up its revenue," said Bill Lee, an angel investor who backed companies, including electric carmaker Tesla Motors Inc and social media site Posterous, which was recently acquired by Twitter. But "all the magic they can continue to deliver is already priced in."

SLOWING GROWTH

More than half of the 36 financial analysts now covering Facebook rate the company a Hold, Underperform or Sell - disproportionately high given that Wall Street analysts historically favor Buy ratings.

The three lead underwriters of the IPO - Morgan Stanley, Goldman Sachs and JPMorgan - forecast second-quarter earnings per share of between 10 cents and 11 cents, lower than the Street average of 12 cents, minus IPO-related stock compensation charges, according to Thomson Reuters I/B/E/S.

Thomson Reuters StarMine's SmartEstimates suggests that Facebook will post adjusted earnings of 10.4 cents per share.

"It gets back to 'How predictable are these companies' results going to be when I'm forecasting out pretty significant growth to be able to justify the valuation?'" said Ryan Jacob, chairman and chief investment officer of Jacob Funds, who does not own Facebook shares.

Facebook, which generated more than four-fifths of its revenue from advertising in 2011, has stepped up efforts to rebuild its revenue momentum, rolling out a raft of new advertising features and providing more details about the effectiveness of its ads.

TBG Digital, which helps marketers advertise on Facebook, released a study this week that found the average price of Facebook ads had jumped 58 percent since last year. That is partially due to recently released mobile formats, it found.

"Our clients aren't spending 75 percent of their budgets on Facebook," said David Jones, Global CEO of advertising agency Havas. But he noted that "there are very few clients who we are talking to who are negative on Facebook."

GUIDANCE QUESTION

With over 900 million users, Facebook is the world's largest social networking company, challenging established Web companies for consumers' online time and for advertising revenue.

For Facebook, the first date with Wall Street will mark an important test for the company's top brass to try to dispel some of the skepticism. Investors will want to hear from Zuckerberg - who wields majority control - but the company has not said if he will take questions on the day.

"A miss is a miss and it wouldn't be good either way, especially for your first quarter out of the gate," said Colin Sebastian, an analyst with Robert W. Baird.

But the context will be key.

"If it's related to shift in mobile, but the mobile monetization is improving, that's different than just a miss because advertisers are leaving Facebook."

And he said that many investors will be particularly interested in the trends the company is seeing as marketers take advantage of Facebook's mobile and other advertising features.

While most expect Facebook to follow the lead of Google and Amazon.com Inc and abstain from offering financial forecasts every quarter, it may address the current concerns about its business by providing additional color and outlook.

"This first time out, I think they have to give some sort of guidance," said Robert Bacarella, manager of the Monetta Fund, which does not own Facebook shares. "You pacify the near term and say 'Here's where we're going.' But then you set the table up to say: 'We're thinking about whether or not it's wise give guidance going forward."

For all Facebook's efforts to woo Wall Street, the company's biggest job remains building its relationship with advertisers, such as San Francisco's Public Bikes.

"Whenever we have a new bike shop selling our bikes in a particular city, I'll run a targeted Facebook campaign" in that city, said Dan Nguyen-Tan, Public Bikes' vice president of sales and marketing.

The ability to reach specific groups of Facebook users based on where they live and their interests - such as healthy lifestyles or environmental interests - is an important advantage of Facebook's advertising system, Nguyen-Tan said.

But he acknowledged that Public Bikes spends more money advertising with Google, where it is easier for the company to reach people interested in buying a bicycle.

Sunday, July 15, 2012

Windows 8 on your computer soon


   If you are from, who had the opportunity to experience Windows 8 on your computer, or just you who follow the developments in the Windows system 8, nor dared to experience only when it is the final version stable, then know that he is no longer in front of you much time for waiting, it was announced that the finance director for Microsoft since the days of date of the issuance of a few final version of Windows 8 is expected.


   For a copy of the 
RTMBmusenai own computers and operating system mechanisms Vsttoffer starting from the beginning of October, in preparation for the launch of computers that run Windows the new version with the limits for the month of October as the date Satzam with the descent Version RetailFor all users (see this link for more information on the  The difference between the versions). We expect leaks to copy the RTM, As usual for a copy Previous windows, the thing that will enable us to take a more accurate idea of the final version of the work undertaken by Microsoft since the issuance of the Release Preview.

   As for the price Microsoft has identified both eighth upgrade from Windows XP, Vista or 7 at 29.99 euros for the upgrade via the Internet, but for for an upgrade via CD-ROM you have to pay shall be approximately 59.99 euros. If you are of those who Aqtnoa their computer after the date of Conqueror of June you will get the price of preferential 14.99 euros.  

Facebook examine your conversations were aimed at the prison

Be careful what you type in the chat window on the social networking site "Vsepok" you are an observer, and all what you write will be reviewed to keep track of any use contrary to law. Not the source of this talk, as we used to specialize in the protection nothing to do with the site, but here comes the statement " Joe Sullivan"Active social protection chief.
b
ut do not worry, it seems that it was a "Olchoreetm" is used by Facebook, is to follow any conversation include the exchange of personal information, language or obscene language, and even some cases, where chatting between two persons belonging to two age groups in two different, something that can be protect certain minors from the hand of any aggressor to get them. The program can also identify the sound of people in the history of criminal operations, and also depends on his research and examine some of the sentences and phrases used in the past by some of the perpetrators.

   When this information is collected questionable, is sent to one of those responsible for the protection of the site, which is determined by its role in taking the appropriate decision of the Police Report or not, a procedure that can be confirmed from Facebook to its users that it is not one of the Btaatbahm. We have little information with respect to the subject, but we know that this monitoring has enabled the authorities to arrest a child sex abusers in the past.

The discovery of a loophole enabling purchase of content for free from apple store apps

It is possible to store applications  Apple and buy applications and content for free is easy after the Russian developer discovered a way to circumvent the payment mechanism within the application "any AWS" for users on devices able
 Alngrh by the developer easy to implement and does not require any technical experience and can be applied to all devices that work with all Apple operating system began to copy any of the AWS AWS 3.0 to 6.0 any
Has launched a special website explaining how to exploit the gap ZonD80 explorer who calls himself a name
http://www.in-appstore.com/


Sunday, July 8, 2012

Lit Motors thinks we're just driving around in too much car.


So Lit Motors is developing what looks a lot like a motorcycle, but with several traits from a car: You don't have to balance and you don't get wet. They call this model the C-1 and the full-size running prototype is, admittedly, in a very basic state. But here we see the sort of thinking that is perhaps just this side of too radical, while performing drastic surgery on what of the last great areas of waste in our daily lives: The amount of car we lug around for no particular reason.


CNET Conversations is part of a CBS Interactive special reporting project.


I like Daniel Kim, he wants to change things but isn't up "there" in a world of intangibles. He began his career as a Land Rover mechanic and, like Steve Jobs, did a little coursework at Reed College in Oregon before moving on (probably bored with the routine progression of college.) He's assembled a team of about a dozen people in a old warehouse in San Francisco that looks like a poster child for urban renewal.

The C-1 is up against some long odds to be sure: Aside from printing "motorcycle" (which will do it few favors in the U.S. market), I also came to realize there's a significant mental hurdle to trusting a two-wheeled vehicle to keep itself upright with you in it. By unseen magic. In traffic. But change has to start somewhere and what Lit's working on is at least part of the new attitude toward everyday vehicles we need to embrace, two wheels, three or four.

Apple bows out of program for environment-minded products

Apple has decided to stop participating in a major program devoted to the production of environmentally friendly products, reportedly saying that its design direction is no longer in line with the program's requirements.

Late last month, Apple told the nonprofit EPEAT group that the company would no longer submit its products for green certification from EPEAT and that it was pulling its currently certified products from the group's registry.
(Credit: Apple graphics)

According to The Wall Street Journal's CIO Journal site, 39 of Apple's products had received EPEAT's green stamp of approval, including laptops such as the MacBook Pro and the MacBook Air.

EPEAT, or the Electronic Product Environmental Assessment Tool, receives funding from the Environmental Protection Agency and calls itself "the leading global environmental rating system for electronic products, connecting purchasers to environmentally preferable choices and benefiting producers who demonstrate environmental responsibility and innovation."

The U.S. government requires that 95 percent of its electronics bear the EPEAT seal of approval; large companies such as Ford and Kaiser Permanente require their CIOs to buy from EPEAT-certified firms; and many of the largest universities in the U.S. prefer to buy EPEAT-friendly gear, CIO Journal reports.

Apple "said their design direction was no longer consistent with the EPEAT requirements," CIO Journal quotes EPEAT CEO Robert Frisbee as saying. "They were important supporters and we are disappointed that they don't want their products measured by this standard anymore."

Among other things, the EPEAT requirements hold that electronics must be easy to disassemble, so their components can be recycled. The iPhone, the iPad, and the new MacBook Pro with Retina display don't pass muster because of things like batteries and glass displays that are glued to casings and backings. Apple may soon introduce an alternate green standard to apply to its products, CIO Journal reports.

We've contacted Apple for comment and will update this post if and when we hear back. CIO Journal said Apple had declined to comment but had referred the site to the Environment section of Apple's Web site.

The Verge points out that Apple had touted an EPEAT Gold rating for its iMac computer (see screenshot of the relevant page on Apple's site below).

Two-armed robot takes on risky lab work

We've seen robot pharmacists before. Here's a robot lab technician whose speed might make "CSI" plots a little more believable.

Developed by automation giant Yaskawa and Japan's National Institute of Advanced Industrial Science and Technology (AIST), co-creator of the HRP series of humanoid robots, Mahoro is a two-armed droid that looks like a modified Yaskawa Motoman assembly robot.

Unlike most assembly robots, its arms have seven joints, allowing it to use human tools and to perform humanlike motions easily.
Related stories
Robo-pharmacist readies 350,000 doses perfectly
Microrobot swims through eyes to deliver drugs
Humanoid plant workers wow crowds at iRex

It automates lab work and can do tasks such as culturing more quickly and accurately than human lab techs, DigInfo News tells us in the vid below.

It can work on things like flu testing as well as handle biohazards, keeping human technicians out of harm's way, according to AIST's Tohru Natsume.

The droid can be easily taught what to do by using a virtual lab bench created with CAD software. The system also lets programmers set up the tools in the most efficient arrangement for maximum speed.

Recently shown off at the Interphex pharmaceutical trade show in Tokyo, Mahoro is being used by drug companies and universities.

AIST wants to improve it so humans can work alongside the robo-tech. I think that might just improve the acting on "CSI," too.

Galaxy Nexus reappears in Google Play store

The harried Galaxy Nexus smartphone is again available for purchase in the Google Play store.


iPhone, left, Google phone, right.

On June 29, a judge in a lower court granted Apple's request for a pretrial injunction against U.S. sales of the Samsung-made, Android-running smartphone while the court determines whether the device infringes the patents Apple claims it does. Samsung appealed, and the appeals court temporarily lifted the ban yesterday, while it deliberates on whether to dump the ban altogether.

Apple, however, may be able to convince the court to reinstate the injunction while the legal proceedings roll on; it has until Thursday to submit its arguments on that score. How long it will take the court to mull over those arguments of Apple's is unknown.

In the meantime, Google had yanked the phone from the Google Play store, saying it would reappear shortly, running the latest version of Android -- 4.1 or "Jelly Bean" -- which Google says doesn't infringe the Apple intellectual property.

The Google Play listing says the Galaxy Nexus will have Jelly Bean "soon." So it may be the temporary lifting of the ban that's responsible for the smartphone's reappearance in the store. In any case, the listing says the phone won't ship for two to three weeks, by which time it may have Jelly Bean installed.

Saturday, July 7, 2012

More than 300,000 device threatened to prevention of access to the Internet the next day Monday

In the news recently published by the professionals of protection for the emergence of Trojan on the Internet and named "Baldi S. The Sound System" and which has infected more than 4 million computers around the world
Trojan, which works to change the value of the domain name in the computer and thus exposure of thousands of computers around the world to the loss of internet connection
The work of the Federal Bureau of Investigation to close the loop responsible for the dissemination of malicious program by placing the servers mission transform infected machines to tracks correctly to avoid servers counterfeit is that the biggest problem arises now is an announcement of the FBI for this turn off the servers to help us on monday next due the cost of expensive and therefore will not be able up of 300,000 people from accessing the Internet in the next monday
DNS CHANGER to check if your device is infected with malicious SOFTWARE

Please visit the following link http://www.dns-ok.fr/

Severe shortage in the number of fan pages on Facebook most of

Perhaps most managers Facebook pages have noticed after midnight yesterday a rapid fall in the number of fans on Facebook at page time and reduce the company did not authorize any details on this topic. Is it a technical problem experienced by social network or is a new step within the policy of Facebook
And may spread some rumors about the management of Facebook accounts by deleting all non-activated phone numbers explains the gradual decrease in the number of all fans Facebook pages, but none of this remains true even emphasizes the social networking nature of the problem formally

Here are some letters that reached by some users of Facebook

Chinese hackers overthrow the leadership system of the Indian Navy

Hackers from China has hacked the Indian Navy leadership. Through the employment of my virus was able to collect all the IP addresses of sensitive Indian Navy command center. And sent to China
  The virus after injection of the same computer create files hidden in the system as a first step before the second step in gathering information about files and documents on the basis of specific words of certain keys has been programmed by virus
. In advance

The susceptibility virus to disguise strong, can move to the Keys Alasepe and disguise it when you insert the key in one of the computers driving the Indian Navy, separated completely from the Internet for security reasons, but that after the transfer of key Allaisba to any another computer connected to the Web virus sends the data collected from the computers driving the Indian Navy to Chinese hackers.
  Has been suspended 8 to the limits of time immediately after the discovery of virus officers, suspected of having a close relationship with a hack who got it but did not specify the charges against them after

Tuesday, July 3, 2012

RiskRanker a new technique for the detection of malware

Explore the Center for Research on NQ security smart phones in collaboration with the University of North Carolina, a new technique for the detection of security threats in smart phones

At present the malware to damage the devices immediately download able, and can not be detected only after speaking to major damage, while the protection programs for mobile smart ineffective because they rely on samples of malicious programs known and can not identify the malware that can not There is a definition in the program database protection
RiskRanker is a system analysis is unique, it can auto-detection of any suspicious behavior to play programs, and is distinct from the rest of the security tools that set a limit to the applications that behave suspicious while in the App Store and before it is installed on the smartphone, and in run a pilot for the RiskRanker which examined more than a hundred thousand stores in the application of different electronic applications offer Android, enabling the discovery of 718 RiskRanker application contains malicious programs

Laptop stolen displays 30 thousand infected with cancer risk

Cause a laptop stolen from a staff in a hospital in Houston, Texas of cancer in the exposed 30 thousand infected with cancer at risk of identity theft
Where the Centre issued a MD of cancer at the University of Texas issued a statement yesterday shows that he was stolen laptop is encrypted from the home of a medical center and that the doctor gave a tip to the police about the theft and had the police started to investigate the incident, the laptop contains information patients personal and numbers security social as well as numbers to medical records, hospital officials they said that there is no reason to believe that he paid was stolen laptop for information stored on it