Ads 468x60px

Labels

Saturday, March 2, 2013

Microsoft Hotmail Officially Becomes Outlook.com

Out with the old and in with the new, as Microsoft closes it’s doors on Hotmail. Dropping its well known email provider after establishing its user base for 15 years may sound like risky business, but Microsoft is planning to make it up to it’s faithful Hotmail users as it leads them through a painless transition to Outlook.com. More Privacy, Less Junk Some of the best aspects of Outlook are the privacy tools and junk mail filters. Though it may initially take a little time to familiarize yourself with the  tools and personalize your privacy settings, Outlook will begin to automatically sort your mail into it’s known category. For example, mail from contacts would be auto-sent to a contacts folder, and notifications from a Facebook friends be sent its own separate folder, creating a tidy and easily maneuverable page. Also, Outlook won’t share your information or read your emails and then bombard you with corresponding ads and junk mail. Instead of adding to the clutter, Outlook provides the user with a tool called Sweep, which will weed out unwanted emails like unread newsletters and daily deals, or even those dreaded messages from the mother-in-law. It’s up to you, as you [...]

The post Microsoft Hotmail Officially Becomes Outlook.com appeared first on TechBeat.

]]>

View the Original article

Unofficial App Released for Craigslist

When it comes to online classifieds, Craigslist ranks there with the best. The website has a huge following and using it costs virtually nothing. Being so popular, one would expect the website to have its own app which people can use to access it through their mobile devices. However, this wasn’t the case until recently. This doesn’t mean that they have launched an official app for their service but there is an unofficial, yet completely legal, Craigslist app you can download and use on your smartphone or tablet. In fact, there isn’t one but several apps through which you can use Craigslist on your phones but none of them was sanctioned or licensed by the brand itself. Hence, using it means accessing the website illegally. That scenario has changed with a new app designed for the website by Mokriya. Mokriya is known for developing the products created by other companies so it is a bit surprising that they came up with an app for Craigslist. Titled aptly, the Mokriya Craigslist app is available for download through both the App Store and the Play Store. The company has made sure that the app reaches a wide audience by making it compatible [...]

The post Unofficial App Released for Craigslist appeared first on TechBeat.

]]>

View the Original article

Firefox OS: A New Alternative for Smartphones

The new Firefox OS was able to capture some of the spotlight at this year’s Mobile World Congress.  Mozilla held a press conference highlighting its Firefox OS and also outlining their vision for the future. The question is whether a Firefox OS, or any other for that matter, would be able to compete with mobile giants iOS and Android. At first look, Firefox OS is similar to both Android and iOS. The user first views multiple apps on a screen. You can slide right or left to view other apps. The bottom of each page also has four permanent apps, including the phone, a messaging app, the camera app, and of course, the Firefox browser.  Perhaps most interestingly, Mozilla has touted their platform’s flexibility, which will allow different carriers to easily tailor the interface and develop localized services. There is clearly interest in the concept of what a new OS could bring to the market.  The talk of new mobile operating systems at Mobile World Congress has already generated a lot of interest.  Firefox OS appears to be uniquely poised to tackle the emerging markets. They already have global partners with Deutsche Telekom, Telenor, Telefonica, and China Mobile.  Mozilla announced [...]

The post Firefox OS: A New Alternative for Smartphones appeared first on TechBeat.

]]>

View the Original article

No Native Instagram App for BlackBerry Users

Not too long ago, Blackberry was put on the soon-to-be-deadpooled list of many tech experts, but this company has the tenacity of a an old boxer who wants to keep the championship belt in his corner. End January, Blackberry went the celebrity endorser route by naming Alicia Keys as its Global Creative Director. Although we don’t know exactly what the role entails – some details were mentioned, but who really knows? – the mere fact that such a personality is publicly associated with the brand says something. Additionally, the release of the BlackBerry Z10 and the new OS seems to be doing the company good, at least in certain parts of the world such as Canada, where the unit is reported to be outselling Samsung and the iPhone. Good news for Blackberry, indeed. However, if you’re hot on certain apps, and you are considering switching or going back to Blackberry, your decision might be hindered by the fact that native apps aren’t always available for the platform, Instagram being one of them. Not everyone has an affinity for Instagram, but the 100 million-user strong platform is definitely a force to reckon with. Say what you want to say about filters covering [...]

The post No Native Instagram App for BlackBerry Users appeared first on TechBeat.

]]>

View the Original article

FrostWire 5.5.5

FrostWire, a BitTorrent client (formerly a Gnutella client), is a collaborative effort from many Open Source and freelance developers located from all around the world.

View the Original article

Camfrog Video Chat 6.4.257

Camfrog Video Chat is a modern chat client that allows real time video, audio and text chats with up to thousands of participants. The tool enables seeing, speaking and writing to other chat room members simultaneously. Not all video chats require yo...

View the Original article

Comodo Dragon Internet Browser 25.0

Comodo Dragon is a Chromium technology-based Browser that offers you all of Chrome's features PLUS the unparalleled level of security and privacy you only get from Comodo. Including a greater level of privacy than Chromium technology offers.

View the Original article

Friday, March 1, 2013

The Various Problems Inside Computers

There are various types of problems that can be found inside your computer. Some of them can be detectable while others can be secretive in nature. Most users have no idea about the many dangerous things that are lurking inside their computer.

View the Original article

Dell releases privileged access suite for Unix

At RSA Conference 2013 in San Francisco, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation technologies with a single...

View the Original article

Radware launches cloud-based DDoS attack mitigation system

At RSA Conference 2013 in San Francisco, Radware announced DefensePipe, an integrated and comprehensive solution to help mitigate volumetric DDoS attacks which threaten to saturate a customer's Intern...

View the Original article

Smart Grid: The Future of Home Appliances

With all of the technological and energy saving advancements of today, home appliances are next in line for automation. If you are looking for a way to make your home’s appliances run with ease and more energy efficiency, you shouldn’t have to wait much longer. Currently, there is a shifting in home appliance technology in which many dishwashers, washers, dryers, ovens, refrigerators, and even heating and air conditioning systems, are becoming more computer based.  This technology was on display recently at this year’s Consumer Electronics Show. Manage all of your home’s appliances from your phone These self-automations will work in conjunction with smartphone apps to make an entire household manageable with the touch of a button, which will lend convenience when using your appliances both from inside and outside your house. This computerized evolution, referred to as a Smart Grid, can also be set to  run certain appliances during non-peak electrical time which can save consumers money on their utility bills and help decrease electrical demand from power companies during peak hours.  Also, by having a home appliance system synched into one platform system, many areas’ electrical usage can be prioritized, which can decrease immediate peak electrical demand. Challenging aspects of [...]

The post Smart Grid: The Future of Home Appliances appeared first on TechBeat.

]]>

View the Original article

New Java 0-day exploited in ongoing attacks

FireEye has detected yet another Java zero-day vulnerability being exploited in attacks in the wild. Affected updates are Java v1.6 Update 41 and Java v1.7 Update 15 (released on February 19), and ...

View the Original article

IT complexity and change auditing

Robert Bobel is the Director of Product Management at NetWrix. In this interview he talks about change auditing trends, enterprise security issues, increasing IT complexity and the NetWrix Change Repo...

View the Original article

Apple iTunes U Content Passes 1 Billion Downloads

Apple’s education based iTunes platform iTunes U has topped the one billion downloads milestone. iTunes U is one of the world’s largest collections of free educational content from some of the country’s top schools and well-known libraries, museums and various other organizations. iTunes U offers lectures, assignments, books, quizzes and other documents that can be downloaded and viewed free of charge by iOS users. Speaking of Apple’s platform Eddy Cue, Apple’s senior vice president of Internet Software and Services, notes: “It’s inspiring to see what educators and students of all types are doing with iTunes U. With the incredible content offered on iTunes U, students can learn like never before―there are now iTunes U courses with more than 250,000 students enrolled in them, which is a phenomenal shift in the way we teach and learn.” The Apple iTunes program has been so successful that more than 1,200 universities and colleges around the country have enrolled more than 100,000 students in single iTunes U courses. According to a press release from Apple: “Stanford University and The Open University have each surpassed 60 million content downloads. The Ohio State University’s Matthew “Dr. Fus” Stoltzfus’ General Chemistry course enrolled over 100,000 iTunes U students in [...]

The post Apple iTunes U Content Passes 1 Billion Downloads appeared first on TechBeat.

]]>

View the Original article

Scammers use Google glasses as lure

The great interest that the upcoming release of Google glasses has generated in the public is being actively exploited by cyber scammers, warns Trend Micro. Counting on the fact that users will be ...

View the Original article

Linux Experts in High Demand

After reporting that Linux professionals are in line for higher salaries as compared to others, a recent survey has shown that entrepreneurs are seeking more Linux experts. The report clearly shows that the demand for Linux experts is going to remain high throughout the year. Linux talent is in short supply and there are many companies who want to employ their services. Little wonder that they are being remunerated handsomely for their work. This is the best time to be a Linux professional. People may be raving about the ‘cool’ work environments at Google and Apple but if you want to make good money and enhance your skills, learning Linux is the best thing to do right now. The statistics are there for all to see. The numbers speak for themselves. Over 3,400 employers and Linux professionals were a part of the survey so you don’t need to doubt its authenticity at all. The results are pretty much accurate. And it is not as if this is the first time that employers are looking to hire Linux experts. Even last year, the employers had responded enthusiastically to the survey, with 89% of them expressing the desire to have a Linux [...]

The post Linux Experts in High Demand appeared first on TechBeat.

]]>

View the Original article

Myo: The Armband Remote Control

The Canadian startup, Thalmic Labs is nearing its release of Myo, an innovative new concept for the controlling of your smart devices. Feel the virtual power of telekinesis as you wave your hand around, universally controlling your computer, tablet, smartphone, television, and more. What it does Unlike hi-tech game controllers, Myo doesn’t use camera-based gesture control. Instead, this rather simple looking armband, powered by a tiny ARM processor, can detect your muscle’s electrical activity, and gives you the power to control computers by using hand gestures. The wearable controller syncs with Android, iOs, PC and Mac through Bluetooth. There are numerous tasks you can gesture control with MYO, like net browsing, gaming, giving presentations and can even control some tech toys toys and robotics. Some of the many gestures that will generate response from MYO include moving your hand up and down for scrolling, swiping with two fingers to turn pages, making a fist to stop playing your tune, pointing a finger and mock-shooting to attach your video game’s target. Developer Friendly Do you think the creators of the device left something out? Thalmic Labs realize that there are developers and super-geeks that could expand on and better the design [...]

The post Myo: The Armband Remote Control appeared first on TechBeat.

]]>

View the Original article

Portable USB 3.0 SSD With Suite B hardware encryption

At RSA Conference 2013 in San Francisco, Spyrus announced PocketVault 3X, a portable USB 3.0 Encrypting SSD featuring the same high-assurance hardware encrypting security designed into their Windows T...

View the Original article

Firewall management now concentrated on secure application connectivity

Tufin Technologies announced the results of its annual Firewall Management Survey at RSA Conference 2013 in San Francisco. 200 network security professionals reported that 93.6 percent of all firew...

View the Original article

Alternatives to Google Search

The majority of internet users frequent one of the three major search engines, Bing, Yahoo, and Google. But do these sites really give you the best available results? Google has many strong suits and numerous benefits for the user. However, it does have some shortcomings, mainly user privacy. If you’ve seen Microsoft’s recent Scroogled ads, and you value your email’s privacy, you might be rethinking your search engine choice. Whether you are concerned about privacy, or desire more tailored results from your search engine, here are some alternative options you may not have heard of. Duck Duck Go This search engine boasts of real privacy and never tracks its customers. This allows them to pop the filter bubble that is used to decipher what a typical search engine “thinks” you want to see, based on the tracking of your searches, likes, comments and even emails. The filter bubble is sometimes helpful in finding the things you like, however in time it can cause your searches to become cluttered with repetitive junk. An interesting feature of Duck Duck Go is their Goodies, which are specialized search queries that contribute instantly to your top results. Wolfram|Alpha This internet searcher deems itself not [...]

The post Alternatives to Google Search appeared first on TechBeat.

]]>

View the Original article

This is Where Your Unloved Facebook Photos Will Go

How many photos (or photo albums) have you uploaded to Facebook? As I was writing this article, I decided to take a look at my own stash. Boy, was I in for a surprise! I have always been aware of my tendency to upload tons of photos without being very selective, thus earning the ire of some of my friends from time to time, but I didn’t think that I had shared so many photos over the years. More than 5,000 photos in 125 albums! I understand that there people who have more than those figures, but the fact remains that Facebook users in general do not access all of those photos on a regular basis. Of those Facebook photos of mine, I believe that I barely look at around 90% of them anymore. After first few days of uploading, I tend to forget them – until a specific reason arises. The thing is, 350 million photos are uploaded to Facebook every single day. And if we consider that majority of users do not use most  of their Facebook photos on a regular basis, that amounts to hundreds of millions of photos that are unloved. In fact, Facebook says that [...]

The post This is Where Your Unloved Facebook Photos Will Go appeared first on TechBeat.

]]>

View the Original article

Mobile World Congress: Phablets the Way Forward?

At this year’s Mobile World Congress, the annual wireless industry trade show, the spotlight was focused on the trend toward big phones. As Apple did not participate with this show, the Android phones were the major smartphone platform at the show. The trend toward larger phones began more than a year ago with the Samsung Galaxy Note, which had a screen that measured at 5.3 inches. This phone started the half phone half tablet “phablet” craze. Subsequent editions proved that there was a market for even larger screens. Samsung continued to push the envelope with a 5.5 inch screen in their Galaxy Note II. There is clearly a shift in the market toward bigger devices. Samsung has reported that in the month following its release, 3 million Note IIs were sold. Although Samsung may have started it all, other companies were quick to follow suit. Lenovo offers a 5.5 inch screen with their K900 phone, and LG also offers a screen of that size with their Optimus G Pro. For those looking for something even bigger, the ZTE Grand Memo phone has a span of 5.7 inches.  Even larger is the Ascen Mate from Huawei.  It features an impressive 6.1 [...]

The post Mobile World Congress: Phablets the Way Forward? appeared first on TechBeat.

]]>

View the Original article

Download Accelerator Plus 10.0.5.2

DAP is a consumer application that accelerates your downloads using SPEEDbit's patented multi-channel technology. While you download, DAP ensures your computer is using maximum bandwidth by downloading from parallel mirror sites.

View the Original article

F-Secure launches one-stop, multi-device security

A one-stop-shop for multi-device security is here, answering to the growing need for converged security across multiple devices. F-Secure�s Safe Avenue allows consumers to easily manage the security o...

View the Original article

Tips to minimize the risk and impact of identity fraud

Last week, a Javelin Strategy & Research report found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 seconds. They recommend that co...

View the Original article

Fortinet adds cloud-based sandboxing and IP reputation services

At RSA Conference 2013 in San Francisco, Fortinet announced that the company�s FortiGuard Labs has launched new cloud-based sandboxing and IP reputation services that are designed to help protect agai...

View the Original article

VirtualBox 4.2.8.83876

VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.

View the Original article

Avast! Free Antivirus 8.0.1482

avast! Free Antivirus represents the best free antivirus protection currently available on the market. This edition is FREE OF CHARGE for non-commercial & home use. Its features include:

View the Original article

SetPoint 6.52.74

Logitech SetPoint is the software used to install and control Logitech mice and keyboards in Windows XP and 2003. It contains drivers and software enabling you to take full advantage of your mouse and keyboard.

View the Original article

Thursday, February 28, 2013

Dell's New Color Printer Provides Excellent Alternative to Pricier Units

Dell's C1660w color printer is an inexpensive unit that allows users to perform basic printing functions. The printer is ideal for home or office use.

View the Original article

Avast 8 generates detection of entire malware families

At RSA Conference 2013 in San Francisco, Avast Software introduced a new version of its consumer security software line, with a number of new technologies and improvements to deliver proactive detecti...

View the Original article

More (circumstantial) findings reinforce Mandiant's APT1 claims

The release of Mandiant's APT1 report has created quite a stir in security and international political circles. The majority saw it as a confirmation of the long held belief that the Chinese gover...

View the Original article

Yubico launches smart card that combats spying malware

Yubico announced that the Yubikey NEO aggressively defends against malware aimed at smart cards. Successfully piloted by leading enterprises, the new product eliminates the risk of card and PIN be...

View the Original article

Endpoint manager with panoramic, touch screen display

At RSA Conference 2013 in San Francisco, Comodo announced their latest solution for centralized administration of security, including anti-virus protection of endpoints: Comodo Endpoint Security Manag...

View the Original article

Yahoo Says No to Working From Home

Yahoo’s new CEO, Marissa Mayer, has issued a new directive for the company that has created a media firestorm. The new ban on telecommuting for Yahoo employees has garnered headlines from major media outlets as well as swift responses from telecommuting advocates.   The details of the new rule for Yahoo employees were made public in a leaked human resources memo.  Many have issued statements of surprise over the rule that seems to be counterintuitive to the culture of most technology companies. However, others see the new ban as more of a reflection of how many of the big tech players such as Apple, Facebook, and Google, are doing business, and view the policy change as an effort on Yahoo’s behalf to emulate the workplace dynamic of those tech giants. In the leaked memo, it was indicated that Mayer believed that productivity was often hindered by telecommuting. Many telecommuting advocates would argue that the reverse is true, and that workers can be more productive when allowed to work at their own pace.  Regardless of which side may be correct on that matter, Yahoo has stated that they are simply doing what is best for their company.  In response to the leaked [...]

The post Yahoo Says No to Working From Home appeared first on TechBeat.

]]>

View the Original article

Nvidia Also Goes for Sophisticated Headquarters’ Design

Nvidia may be going the same route as Apple for the design of its new headquarters. The graphics processing unit (GPU) has been in operation for just over two decades and is now trying to set itself apart from the other companies in the industry. Choosing a sophisticated and unique design for its headquarters enables the company to appear different and establish a solid corporate identity through architecture. Apple is planning to do the same with its spaceship-like design for the new headquarters. Originally envisioned and planned by founder Steve Jobs, the company is trying to get the project completed as soon as possible. It will be a couple of years before Apple shifts base and moves into their new headquarters. For Nvidia, the time required for completing the construction of the headquarters and the subsequent transition might take more time. Apple might get there first. The success of Nvidia has been nothing short of exceptional. The company originally started off with a three-man team. Slowly and gradually, they have grown in stature and now provide their products and services across the globe. They have an 8000-strong workforce while operating at over 40 locations. Some of the cities the company [...]

The post Nvidia Also Goes for Sophisticated Headquarters’ Design appeared first on TechBeat.

]]>

View the Original article

Bank of America says leaked data did not come from their systems

Bank of America has confirmed that some of the data included in the massive leak by Anonymous-affiliated group "Par:AnoIA" does belong to them, but that it didn't come from their owns systems, but tho...

View the Original article

Microsoft’s Surface RT Tablet Faces Low Demand in China

It hasn’t been long since Microsoft unveiled its new line of tablets, the Surface. Since its release, the Surface Pro and other versions have been hogging their fair share of the market this side of the Atlantic. However, the same can’t be said of China, touted to be the largest growing market for smartphones and tablets. The Microsoft Surface RT tablet has been struggling to find a firm footing in the Chinese market and demand remains low even with Microsoft’s promotional and marketing efforts to boost sales. Initially, Microsoft didn’t expect high sales of the Surface RT tablet in China hence they shipped only 30,000 units. However, for a major company to be so hesitant about selling a prime product in a growing market is something unprecedented. The way Microsoft had been working on building the hype regarding the device, it is surprising to find out that they weren’t enthused about its prospects in a market where iOS and Android devices have succeeded. Nearly a million units of the Microsoft Surface RT tablet have been sold the world over. Yet, the number in China only stands at 30,000. This means only 3% of the total sales of the device have [...]

The post Microsoft’s Surface RT Tablet Faces Low Demand in China appeared first on TechBeat.

]]>

View the Original article

Coinstar Getting More Love from PayPal

When we think of counting coins PayPal isn’t the first thing that comes to mind. Yet PayPal and Coinstar continue to strengthen their relationship, announcing on Wednesday the expansion of PayPal supported Coinstar machines. If you are unfamiliar with Coinstar the platform has traditionally worked by counting a customers coins and then printing a receipt which can be exchanged for cash at a stores register. Now the company is testing machines in Texas, Northern California, and Ohio which turns that money into PayPal cash. Not only can customers add money to their PayPal account, they can also withdrawal cash already held in their PayPal account. The new Coinstar machines also allow PayPal users to send the money they deposit via spare change to other PayPal users. PayPal over the last year has been desperately attempting to expand its system outside of the internet. PayPal Here allows business operators to accept payments from mobile devices and the company’s payment platform is even offered at Home Depot, Jamba Juice and other major US retailers. In early testing in the Dallas metro area PayPal and Coinstar claim that 40 percent of users who try the PayPal feature use it more than one time. [...]

The post Coinstar Getting More Love from PayPal appeared first on TechBeat.

]]>

View the Original article

Bay View: Google’s New Global Headquarters

Google has recently revealed a watercolor painting created by the architects at nbbj architecture firm. The picture portrays Google’s future headquarters which will be called Bay View. The campus-like headquarters is to be located in Mountain View, California, just across town, just across town from the current “Googleplex” headquarters. Bay View’s details The HQ’s 1.1 million square feet will stretch over 42 acres and will be designed to cater to it’s employee’s daily needs. Many of the rooftops will be grass covered and provide areas for relaxing, working outdoors, and fitness activities such as yoga, biking and jogging. Employees can also ride scooters on the rooftop or even pitch a tent in the camping area. The Design Google is putting a lot of thought into the new Bay View’s design by studying the daily patterns and interactions of it’s workforce. The company wants to provide its employees with a comfortable facility that will ensure happiness, creativity and productivity. The group of architects from nbbj embrace their vision, “To shape a future that enhances life and inspires human potential and spirit through design.“ To apply this vision to Google’s project, they aspire to design a work environment that will encourage social [...]

The post Bay View: Google’s New Global Headquarters appeared first on TechBeat.

]]>

View the Original article

MTV’s Twitter Hacking Prank Misfires

Burger King got things rolling. Then it was Jeep. Hackers made merry on the Twitter pages of the leading brands, sending out weird messages and changing the design and layout of the profile. They also used the platform to spread rumors. Well apparently the hacking worked out well for Burger King. They now have 30,000 more followers on their Twitter page than before it was hacked. The latest to join the hacked brigade was MTV. Their Twitter page was hacked by……. MTV! Believe it or not, the music channel decided to pull a prank on its followers and the Twitterati in general. The hack was evident as several strange and outrageous tweets were made from their account, some quite notorious in nature. Well, it was later revealed that it was all a major prank by MTV itself to have a little fun. The celebs offended by the messages they saw posted about them on MTV’s Twitter feed would not see the fun in that for sure. In the end, it turned out to be a major publicity stunt. Clearly, Microsoft was impressed by the fact that Burger King gained 30,000 followers after being hacked and thought they would try the [...]

The post MTV’s Twitter Hacking Prank Misfires appeared first on TechBeat.

]]>

View the Original article

Firefox 19.0.1

The Web is all about innovation, and Firefox sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all.

View the Original article

Co3 Systems delivers security incident response

Co3 Systems announced an expansion to its SaaS-based incident response platform. The new Security module provides automated, single-pane incident management in a secure, isolated environment for gener...

View the Original article

Juniper adds global attacker intelligence service to its products

At RSA Conference 2013, Juniper Networks unveiled its next-generation security products for protecting data center environments, fortified by the Junos Spotlight Secure global attacker intelligence se...

View the Original article

Watch Out Salesforce – Bitrix24 Social Intranet is Here

The demand for social intranet has exploded.  According to recently released numbers from Bitrix, small businesses are increasingly embracing cloud computing and affordable social intranet. Bitrix 24 offers businesses the ability to set up their own social intranet at a low cost, thereby providing the social networking tools that are often needed for today’s workplace. Businesses use the service for a variety of activities, including instant messaging, document storage, project management, scheduling, CRM, work reports, and business processes. Eight percent of Bitrix users were able to stop using other services or software because of what was available in the social intranet package. The recently released numbers reveal that the Bitrix24 has become a must-have for many small businesses. While some businesses remain skeptical about the use of social intranets and believe that they will be misused and prefer a classic intranet concept, the majority, 87 percent, believe that the social aspect actually works to increase employee productivity. Seventy percent of their users prefer cloud-based services for collaboration, with only 30 percent of users choosing a box version due to privacy and security concerns. Due to the increasingly mobile workforce, social intranet use has continuously expanded, with 18 percent of users [...]

The post Watch Out Salesforce – Bitrix24 Social Intranet is Here appeared first on TechBeat.

]]>

View the Original article

New Anti-Piracy System Comes to the US

A controversial new anti-piracy program has now come to the United States. The Copyright Alert System has been adopted by five of the major Internet service providers. The partipating providers, including Cablevision, AT&T, Time Warner, Comcast, and Verizon,  are all expected to launch the program. So what is it? The new copyright enforcement system has the power to force U.S. Internet users to complete educational programs, or to even slow down their Internet speeds. It was designed to combat “casual” piracy in the United States.  Essentially, when an Internet user is flagged as someone practicing piracy, then the enforcement system will kick in.  At that time, the user will have to complete “education.”  Repeat offenders will have their internet speeds slowed down.  After multiple offenses, internet speed will slow to a crawl. Some view it as a less severe form of the types of enforcement practiced in other countries such as France or New Zealand, where Internet Service Providers routinely cut off the Internet access of repeat offenders. However, many have criticized the Copyright Alert System as only a means for corporations to protect their interests, possibly at the expense of the average internet user. People opposed to the new [...]

The post New Anti-Piracy System Comes to the US appeared first on TechBeat.

]]>

View the Original article

Multi-layered authentication appliance from HID Global

HID Global announced its new ActivID Appliance solution for strong authentication at RSA Conference 2013. Enabling organizations to protect corporate data against unauthorized access, ActivID App...

View the Original article

FIPS certified cryptography for embedded systems

At RSA Conference 2013 in San Francisco, Allegro announced the addition of the FIPS 140-2 compliant Allegro Cryptography Engine (ACE) to the RomPager suite of embedded internet toolkits. Specifica...

View the Original article

3 out of 4 infosec pros unsure they would spot a breach

LogRhythm announced the results of its 2nd Annual Cyber Threat Readiness Survey of 150 IT security professionals on their organizations� readiness to address advanced cyber security threats. The go...

View the Original article

Test malware handling capabilities of network security devices

At RSA Conference 2013 in San Francisco, Spirent Communications announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its custom...

View the Original article

Security breaches remain undiscovered and unresolved for months

At RSA Conference 2013 in San Francisco, Solera Networks announced the results of the Ponemon Institute�s 2013 report, "The Post Breach Boom," which revealed that organizations are unprepared to detec...

View the Original article

Wondershare Video Editor 3.1.1

Thanks to its intuitive UI, Wondershare Video Editor makes creating movies from videos taken via mobile phone, digital camera or camcorder an easy undertaking. After launching the program, the user can choose between two aspect ratios - 16:9 and 4:3....

View the Original article

Windows 7 Codecs 4.0.4

All the codecs you need for Windows 7 to play AVIs, DVDs and more!

View the Original article

Trillian 5.3.0.15

Trillian is a fully featured, stand-alone, skinnable chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC. It provides capabilities not possible with original network clients, while supporting standard features such as audio chat, file t...

View the Original article

TeamViewer 8.0.17292

TeamViewer is the All-In-One Solution for

View the Original article

Wednesday, February 27, 2013

IT Services Management Implementation To Meet Business Budget Better

Despite sounding highly technical and intimidating, the term IT service management, can help improve customer service and bottom lines, helping a small business stick to their budgets better.

View the Original article

Selecting the best broadband deal can be a challenging task

Forgotten are the times when the internet was a luxury or an element of remote necessity.

View the Original article

Fake Flash Player download pages pushing malware

As you may already heard, Adobe has pushed out an update for Flash Player that fixes vulnerabilities discovered to be currently exploited in the wild in targeted attacks. If you haven't set up auto...

View the Original article

A walk through the expo at RSA Conference 2013, part two

The RSA Conference 2013 expo continues to draw large crowds each day. Here's another look at the show floor, with more interesting booths. For up-to-date conference news and photos check out our de...

View the Original article

FireEye delivers threat protection platform

At RSA Conference 2013, FireEye announced its threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defenses, such ...

View the Original article

Qualys and Verizon join forces for new IT security and compliance solutions

Qualys and Verizon announced an agreement to expand their relationship to deliver new advanced cloud-based IT security and compliance management services to organizations around the world. Verizon...

View the Original article

Survey Shows Microsoft Cooler than Before

Microsoft may be one of the leading technological companies in the world but they have often been criticized for not being innovative and creative enough with their products. For many years, Microsoft’s products followed the same patterns and designs. Hence, they lost considerable market share to ‘hip’ and ‘cool’ brands like Apple. In a bid to change the perception, Microsoft has been working hard on its new product line, upgrading it to a level where they can compete with Apple and the likes. For now, it seems like they haves succeeded in their quest. In a recent survey, nearly 50% of the participants were of the opinion that Microsoft is cooler than before. The survey targeted the most important demographic in gadgets and computing devices: 18 to 29-year olds. According to the survey, changes brought about by Microsoft over the past couple of years have made it cooler than it was. The company would be excited about the fact that they appeal to the youth in a better way now. While Microsoft managed to get a 50% score on the survey, a couple of social networks fared worse. Quite unexpectedly, the response to Facebook was underwhelming to say the least. [...]

The post Survey Shows Microsoft Cooler than Before appeared first on TechBeat.

]]>

View the Original article

Helping ISPs defend customers against bot infections

At RSA Conference 2013 Kindsight announced the Kindsight Botnet Security service to help Internet service providers detect botnet activity in the network and protect subscribers against bot infections...

View the Original article

End of 2012 saw five-fold increase of Android malware

Android malware levels increased more than five-fold between September and December 2012, according to the February 2013 Internet Threats Trend Report issued by Commtouch at RSA Conference 2013 in San...

View the Original article

Video: RSA Conference 2013 showcase

The world�s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2013. Here's a closer look at the show. For up-to-date conference news and p...

View the Original article

Big Data cloud solutions powered by open source analytics database

At RSA Conference 2013 in San Francisco, Virtustream announced it has partnered with Metamarkets and Skilled Analysts to offer big data solutions in the cloud. There is a significant and growing...

View the Original article

Users confused about safe use of mobile devices

One in four average mobile users store intimate photos or videos on a smartphone or tablet, but despite the obvious risks to personal privacy if a device is lost or compromised, some 70 percent of con...

View the Original article

Chrome App Launcher Comes to Windows

Windows OS users can download apps for the Google Chrome browser as well as other Web apps. In a move to make using Chrome apps convenient for desktop users, Google has released a Chrome app launcher. Now, users would be able to start up the apps without having to first open the Google Chrome browser on their desktop PCs. They can simply open up the app launcher from the taskbar and fire up the apps they want to use. The launcher runs on Chrome OS, which is an operating system designed by Google to enhance the user experience for their Chrome browser. They don’t need to start up the browser every time they want to use the apps they have downloaded to their computers. The app launcher is displayed on the taskbar along with the browsers and other programs. You need only click on it to see the collection of apps which you can access directly from your desktop. All the Chrome apps you have downloaded on your computer are grouped under the icon providing you easy access. This also removes the need for full-fledged applications on your desktop. You can simply use the app launcher to start any app [...]

The post Chrome App Launcher Comes to Windows appeared first on TechBeat.

]]>

View the Original article

Robots To Blame For Foxconn Hiring Freeze Not iPhone 5

Apple has always had more than its fair share of critics, and even when their sales were in the millions, we still heard analysts saying they failed for not reaching expectations. After the iPhone 5 came out, speculations about how the iPhone business has lagged were rife. Whether or not you hold with the critics, the fact remains that the iPhone is a pretty darned good phone! Then came the talk about Foxconn freezing hiring. As can be expected, critics jumped on this, blaming the slow iPhone 5 sales. As if that were not enough, there have also been reports that Foxconn has put a stop to its plans to build a new factory. That idea obviously bothered some people – those that matter in the financial sense – resulting in Apple’s shares being adversely affected again. But is the iPhone 5 really to blame for the Foxconn hiring freeze? If you want things to be easy for your brain and don’t really feel like thinking much, then yeah, why not? It’s not really like the news affects you personally, does it? Then again, there are some factors that may be related to the Foxconn hiring freeze, factors worth looking at. One, [...]

The post Robots To Blame For Foxconn Hiring Freeze Not iPhone 5 appeared first on TechBeat.

]]>

View the Original article

Tuesday, February 26, 2013

Zendesk hack endangers Tumblr, Twitter and Pinterest users

Popular customer service software provider Zendesk has announced that they have been hacked. "We�ve become aware that a hacker accessed our system this week. As soon as we learned of the attack, we...

View the Original article

OAuth flaw allowed researcher full access to any Facebook account

A flaw in Facebook's OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain full control of any Facebook acco...

View the Original article

Mobile phishing geared towards online banking users

When it comes to deploying phishing sites designed to trick mobile users, the great majority of cyber criminals opts for targeting those who engage in e-banking and e-commerce via their mobile devices...

View the Original article

Week in review: Facebook, Apple hacks, APT1, and mobile phishing

Here's an overview of some of last week's most interesting news, reviews and articles: Facebook employees ambushed by zero-day exploit Facebook has admitted that they have been targeted with a "...

View the Original article

A framework for building privacy-oriented apps

At the RSA Conference 2013 in San Francisco, SpiderOak announced it is launching privacy into the mainstream with the unveiling of Crypton, a "zero-knowledge" application framework for building crypt...

View the Original article

Pwn Pad: A tablet for penetration testers

At the RSA Conference 2013 in San Francisco, Pwnie Express released the Pwn Pad, a tablet loaded with wired and wireless pentesting tools. The Pwn Pad contains bleeding edge tools for enterprise ...

View the Original article

Qualys executives and researchers at RSA Conference 2013

Here's a complete list of what Qualys executives and researchers will present during RSA Conference 2013, taking place this week in San Francisco. The Hyperconnected World of Intelligent Devices:...

View the Original article

Enterprise account manager with double safekeeping feature

Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process requires the involvement of ...

View the Original article

Shortage of infosec pros equals frequent and costly data breaches

(ISC)2 released the results of its sixth Global Information Security Workforce Study (GISWS). The study of more than 12,000 information security professionals worldwide (3,229 from the Europe/Middle E...

View the Original article

Secunia unveils cloud-based patch management for small business

At the RSA Conference 2013 in San Francisco, Secunia announced the availability of Secunia SmallBusiness (public beta) - a cloud-based patch management solution for up to 50 PCs. For the small bus...

View the Original article

Connect securely to the cloud using JSON and XMPP

At the RSA Conference 2013 in San Francisco, Express Logic and Cypherbridge Systems announced the integration of the Cypherbridge embedded secure Cloud Device Kit for Express Logic platforms. This int...

View the Original article

Centrify offers multi-application SSO for mobile and web apps

At the RSA Conference 2013 in San Francisco, Centrify announced that Samsung Electronics has selected Centrify to provide key enabling technology for Samsung�s next generation mobile enterprise soluti...

View the Original article

The security threat of evasive malware

Lastline has released a new report that looks at how malware authors are able to exploit the limited visibility of automated malware analysis systems (sandboxes) and ensure that targeted attacks and z...

View the Original article

Qualys enhances its free cloud service BrowserCheck Business Edition

Qualys announced at RSA Conference 2013 that Qualys BrowserCheck Business Edition, the company�s free cloud service, now gives organizations end-to-end automation for continuously monitoring which bro...

View the Original article

QualysGuard WAS 3.0 adds customers automation, accuracy and ease-of-use

At RSA Conference 2013, Qualys announced the release of QualysGuard WAS 3.0, adding malware detection and attack proxy support to provide customers and consultants with comprehensive web application s...

View the Original article

HTC agrees to fix vulnerabilities found in millions of its devices

HTC America has agreed to settle Federal Trade Commission charges that the company failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introdu...

View the Original article

Microsoft also victim of recent watering hole attack

Microsoft has followed in the steps of Twitter, Facebook and Apple, and has confirmed on Friday that it has recently experienced a security intrusion. "During our investigation, we found a small ...

View the Original article

Big Data capabilities crucial for effective cyber defense, says study

A study from a top cybersecurity analyst firm confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, released by Teradata Corp...

View the Original article

Mandiant equips security teams to find and stop APTs faster

Mandiant announced the launch of its newest product, Mandiant for Security Operations, at the RSA Conference 2013 in San Francisco. The new release enables security teams to detect, analyze and res...

View the Original article

Google 2-step login verification flaw allows account hijacking

Duo Security researchers have found an easy way to bypass Google�s two-step login verification by capturing a user�s application-specific password. "To make 2-step verification usable for all of ...

View the Original article

Qualys brings vulnerability management to Amazon EC2 and VPC

At RSA Conference 2013 in San Francisco, Qualys announced powerful new vulnerability management capabilities for Amazon EC2 and VPC customers using a QualysGuard connector leveraging Amazon APIs. ...

View the Original article

AhnLab offers dynamic disruption of active security breaches

At the RSA Conference 2013 in San Francisco, AhnLab announced the AhnLab Malware Defense System (MDS), an enterprise strength security system that combines local and cloud-based analytics to stop adva...

View the Original article

Centralized security management for physical, virtual and mobile endpoints

At the RSA Conference 2013 in San Francisco, Bitdefender announced GravityZone, a centralized security management system for physical, virtual and mobile endpoints. Using cloud computing architecture,...

View the Original article

Investors demand more transparency about corporate cyberattacks

More than 70 percent of American investors are interested in reviewing public company cybersecurity practices and nearly 80 percent would not likely consider investing in a company with a history of c...

View the Original article

Enterprise-class mobility with integrated app SSO from Centrify

At the RSA Conference 2013 in San Francisco, Centrify Corporation announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of integrated capabilities enabled by...

View the Original article

Worst global cyber threats of 2012

The Nominum security team analyzed DNS data across the globe to identify the worst malicious bots of 2012 and ranked them according to breadth and repercussions of infection. The team found that...

View the Original article

McAfee turns to sandboxing, �signature-less� threat detection

At RSA Conference 2013 in San Francisco, McAfee announced that it has acquired the ValidEdge sandboxing technology that provides advanced threat detection by running suspected malware in a �sandbox� a...

View the Original article

Qualys FreeScan service expanded with vulnerability scanning and configuration auditing

At RSA Conference 2013, Qualys has expanded its popular FreeScan service to support scanning internal and external systems and web applications and also added new security and compliance audits for Pa...

View the Original article

Encryption no longer seen as just an IT issue

There has been a steady increase in the deployment of encryption solutions used by organizations over the past eight years. The percentage of overall IT security spending dedicated to encryption has a...

View the Original article

Separating single sign-on myths from fact

Single Sign On (SSO), the ability to authenticate only once and have automatic access to many systems, has many potential benefits ranging from lower IT overhead costs to increased end user convenienc...

View the Original article

Twitter Responds to Burger King Hacking

Something fishy has been over at Twitter. The accounts of some leading businesses have been hacked over the past few week, none more sensationally than Burger King. Not only was someone able to breach Burger King’s account, but make it appear like a McDonald’s page. In fact, the description read that the failure of the Whopper had led to the sale of Burger King to Mickey D’s. The problem has been solved but question marks arose over the password security on Twitter. Apart from Burger King, Jeep was the other brand to suffer the same fate as its account got hacked. Given the fact that these are two major brands worth billions, this creates a potentially grave situation for the average user. How can a person expect his/her Twitter account to remain safe and private? To diffuse the situation, Twitter has offered some tips for its users to protect their passwords in a better way. According to them, this would prevent your account from getting hacked. However, this still doesn’t show what the company is doing to offer better security and protection to its users. The result of this might be many users discontinuing their Twitter accounts. Somewhat mysteriously, the [...]

The post Twitter Responds to Burger King Hacking appeared first on TechBeat.

]]>

View the Original article

BioShock Infinite: A New Direction

Irrational games is nearly ready to reveal the third game in the BioShock franchise. BioShock Infinite, which resembles the preceding games very little, is set to be released on March 26th. While BioShock Infinite does share some similar gameplay concept with the previous games, the setting and storyline are entirely different. Bioshock Infinite is ready to take the player on a whole new adventure in the sky.   Though Infinite couldn’t really be considered a sequel or prequel to the original Bioshock games, the time setting is earlier, landing the player in 1912. Like the previous games, it is also a mature rated hack and slash game with a high dose of morality, giving the player the option to spare lives instead of just taking them. Columbia, the sky-city No longer will the player venture through the underwater city of Rapture. The game setting takes place on a floating city that travels the sky by balloons and blimps. The city was originally designed to be a flying World’s Fair and was intended by the U.S. government as an example of exceptionalism. However, the massive airship city became a law unto itself and somewhat of an elusive pirate ship in the [...]

The post BioShock Infinite: A New Direction appeared first on TechBeat.

]]>

View the Original article

Microsoft Warns About Pitfalls of Pirated Software

Aside from the fact that Microsoft loses money each time you purchase unlicensed software, there seems to be a pretty good argument against doing so. Not that you should need some convincing, right? After all, anyone who considers himself an upstanding citizen does not buy pirated software. Even if it’s Microsoft. Or maybe especially if it’s Microsoft. Of course, what happens in the shadow does not always coincide with publicly made statements, and based on a study done by Microsoft, in Southeast Asia, the use of pirated software is still rampant. Worse, unlicensed software even comes with newly purchased computers. The study uncovered alarming details, not the least of which is that there are 5,601 types of malware to be found in laptops that come pre-installed with pirated Windows operating systems! (Source) If you think that purchasing a branded laptop or desktop computer gives you an edge in terms of malware, don’t be so sure about that. Keshav Dhakad, Regional Director for Intellectual Property of Microsoft Asia Pacific and Japan, said in announcement: “Many people assume that buying a name-brand PC is all that’s required to guarantee a good and safe computing experience. They don’t think about the software sold with [...]

The post Microsoft Warns About Pitfalls of Pirated Software appeared first on TechBeat.

]]>

View the Original article

PlayStation App to Be Released For iOS

Sony recently announced the launch of the next generation of their PlayStation gaming console, the PlayStation 4. While gaming fans are eagerly awaiting its release, the company also went ahead and explained that people using smartphones and tablets would also be able to play the games available on the platform. How? You would have to download the PlayStation app and you would get access to a wide range of games you can play on PS4. The news was made public at the Future of PlayStation conference. It has been a while since Sony had come out with PlayStation 3 and fans were awaiting the release of the next version. Well, that wait is almost over with the announcement that PlayStation 4 would be available for sale soon. The surprising thing is that almost concurrently, Sony revealed the app for their gaming console. Some industry insiders suspect that the app might actually have a negative impact on the sales of PlayStation 4. However, this is not the case as explained by Sony. The handheld devices would only work as a second screen for users. They would still have to play the game on the console. The app would enable them to [...]

The post PlayStation App to Be Released For iOS appeared first on TechBeat.

]]>

View the Original article

Customize Your News with Google’s New App

Google has thought of a customizable new way for its users to keep up with what’s going on in the world. While the site is complex and extensive, it’s very easy to use, and quite simply named, News. The app is Free on Google+ via Android.AppStore. Once you’ve launched the app, News will first display its top stories by providing headlines and photos accompanied by a small bit of the article which will link you to its original news site. The app will also give you several options for other related articles in it’s expandable story boxes. The story box is a button with a down arrow on it, which will provide you with all sides of the story from multiple sources. Located on the left of the screen under the Top Stories are several more individual news feeds. These feeds cover all kinds of news topics like World, U.S. Business, Technology, Entertainment, Sports, Science and Health and also a personally local tab naming the users home state. Personalize your News As if these option aren’t sufficient, Google News has made its site extremely customizable. First of all, if the preset news topics are not your preference, News also offers [...]

The post Customize Your News with Google’s New App appeared first on TechBeat.

]]>

View the Original article

Windows 7 Rules PC Market in the UK

Microsoft has been trying its best to get people to buy the Windows 8 and let go off the previous versions of the operating system they have been using. In this regard, they have announced that 60 million copies of Windows 8 have already been sold since its release. The good news is that most of them have been sold with OEMs. The true success of an operating system gets a boost when it is sold with hardware rather than as a software upgrade on its own. However, this is not the case in the UK. Reports suggest that Microsoft has failed to promote Windows 8 in the UK to a level where people would be convinced to buy it. In the UK, Windows 7 remains the operating system of choice for PC users. Even people who are buying brand new PCs off the shelf want to use Windows 7 rather than opting for the newer version of the OS. The reports contradict what Microsoft has been trying to project and might prove to be the undoing of Windows 8 in the UK at least. According to the report, several PC vendors and makers in the UK have said that [...]

The post Windows 7 Rules PC Market in the UK appeared first on TechBeat.

]]>

View the Original article

Reinventing the Lightbulb

Kickstarter, the huge fundraising platform for innovative ideas and creativity, is now generating consumer excitement about their latest project, Nanolight. The geometrically shaped light bulb not only has a one of a kind  look, but is said to be the most energy efficient LED bulb in the world. The Campaign The Kickstarter Campaign has over exceeded it’s original goal of $20,000, already gaining more than $230,000 in pledges and 4837 backers. The brains behind the remarkable light bulb is scientist and engineer, Tom Rodinger,who partnered with Christian Yan and product developer, Jimmy Chu. The company’s goal is to decrease carbon footprints, increase energy efficiency and maintain an ecological value in all of it’s products Lessen the load of your power  bill Though Nanolight is far from the first company to create a more energy efficient light bulb, Nanolight is taking this idea to a much higher level. This ingenious light bulb uses only 12 watts of energy,  nearly half of the energy use of other LED bulbs. Just to give you a taste of the savings that will come with the Nanolight, take a look at other bulbs comparatively. Based on an energy rate of $.14/ kWh for a of [...]

The post Reinventing the Lightbulb appeared first on TechBeat.

]]>

View the Original article

The Flip Side of Getting Hacked

Hacking seems to be the buzzword of 2013 so far as another week goes by in which more high-profile companies fall victim to cyber-attacks. Despite the major breach of two mainstream US brands’ Twitter accounts, both Burger King and Jeep responded on Twitter with upbeat comments – perhaps the thousands of new followers gained as a result, were worth the social media mayhem?   Bizarre and at times offensive tweets popped up on the Twitter feeds of global fast-food chain Burger King last week after it was hacked.  But despite the palaver caused, the US-founded company gained more than 25,000 new followers. As word quickly spread through the micro-blogging site that someone had allegedly guessed the ‘whopper 123’ password, I, like so many others, hopped onto the feed and naturally hit ‘follow’ to keep on track of what all the fuss was about. Hacked and Rebranded The background of Burger King’s Twitter page had been changed to an image advertising ‘McDonalds’ and tweets stated that McDonalds had bought Burger King. Further comments were riddled with slang and at one point even a racist reference appeared. Picture tweets also featured an unappetising looking burger and a photo of an apparent ‘employee’ [...]

The post The Flip Side of Getting Hacked appeared first on TechBeat.

]]>

View the Original article

Google’s War Against Email Hijackers

Google is working to keep unwanted messages out of your inbox.  In a recent post on their blog, Google has explained how they work to keep spammers out of your account.  Spammers used to be able to send you massive quantities of email.  Google explained that through better spam filters, they are now able to prevent the majority of spam emails from even making it into your inbox.  Currently, less than 1 percent of spam makes it through the filter.  As such, spammers have changed the way they work.  As of 2010, spammers started hacking accounts and sending fraudulent mail from other people’s Google accounts. As a result, the Google security team has developed new ways to prevent fraud and protect your account, as well as reduce the amount of spam.  Google explains that these account hijackers work by stealing passwords.  Essentially, they hack into websites to steal passwords.  The thieves then sell the stolen passwords to other criminals.  As many people use the same passwords over and over again for multiple accounts, one password can be very valuable to a criminal. Therefore, Google has put in measures to try to prevent this type of crime.  Google has a program [...]

The post Google’s War Against Email Hijackers appeared first on TechBeat.

]]>

View the Original article

Asus Fonepad Debuts At MWC, $249 For US Customers

Phones the size of tablets are a growing trend at this years Mobile World Congress in Barcelona, Spain. First Samsung announced the Galaxy Tab 8.0 and that announcement was followed by the Asus Fonepad. A long-rumored product by Asus, the Fonepad is a 7-inch Android tablet that is also capable of making phone calls. The Fonepad as rumored features an Intel Atom Z2420 processor and is powered on 1GB RAM. The device also features 3G wireless capabilities and its display pushes out 1,280 x 800 pixels of resolution. The Fonepad’s screen is helped along by a PowerVR SGX540 GPU. Running on a largely untouched Google Android 4.1 OS the Fonepad delivers all of the games, apps and other software we have come to expect from the mobile/tablet-based OS. Asus has also thrown in 16GB of built-in storage alongside a microSD card reader that supports 32GB cards. The phone-ready tablet also includes a 3-megapixel rear camera and a conference ready 1.2-megapixel front camera. Asus didn’t list the running time for the Fonepad at MWC but the devices 4,270mAH should provide a decent amount of use before a recharge is required. Asus has managed to do a good job in terms of pricing the [...]

The post Asus Fonepad Debuts At MWC, $249 For US Customers appeared first on TechBeat.

]]>

View the Original article

MediaInfo 0.7.62

MediaInfo provides you with a quick access to the inner values of your audio and video files. Whether you want to glance at the set-up of tracks included in a file or you want to know all the precise details about the codecs used, MediaInfo will offe...

View the Original article

dBpowerAMP Music Converter 14.4

Audio conversion perfected, effortlessly convert between formats. dBpoweramp Music Converter̢㢠has become 'the standard' tool for audio conversions, over 20 million users worldwide rely on dBpoweramp:

View the Original article

Debut Video Capture 1.72 Beta

Capture video files directly on a PC from webcam, external devices or record your

View the Original article

LibreOffice 4.0.1 RC 1

LibreOffice is the free power-packed Open Source personal productivity suite for Windows, Macintosh and Linux, that gives you six feature-rich applications for all your document production and data processing needs.

View the Original article

CDBurnerXP 4.5.1.3868

CDBurnerXP is a free application to burn CDs and DVDs, including Blu-Ray and HD-DVDs. It also includes the feature to burn and create ISOs, as well as a multilanguage interface. Everyone, even companies, can use it for free. It does not include adwar...

View the Original article

Ruby 2.0.0

Ruby is a dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write.

View the Original article

Maxthon Cloud Browser 4.0.3.6000

Maxthon Internet Browser software is a powerful tabbed browser with a highly customizable interface. It is based on the Internet Explorer browser engine (your most likely current web browser) which means that what works in the IE browser will work th...

View the Original article

Origin 9.1.13.89

Origin lets you purchase and play EA games - any time and any place you want. With the in-game overlay, you can browse the web while playing select games.

View the Original article

CCleaner 3.28.1913

CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Int...

View the Original article

SyncBack 6.3.13.0

SyncBack has established itself as world-class in the field of backup and synchronization software. Whether you're a beginner or advanced user, at home or work, SyncBack ensures your most valuable asset, data, remains protected.

View the Original article
 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text