Ads 468x60px

Labels

Wednesday, March 6, 2013

Identity theft on the rise this tax season

The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, such as a Social Secur...

View the Original article

Bogus Delta receipt confirmation leads to malware

Once again, Delta Air Lines customers are being targeted with spoofed emails supposedly carrying their eTicket, and are urged to download and open the attached PDF file purportedly containing it, or t...

View the Original article

NBC’s Website Hacked and Infected

NBC became the latest victim of a hack as some experts flagged the website and other related web pages. According to the reports, the website had not only been hacked but infected with malware. The technicians at the website were able to rectify the situation without too much damage being caused. People who were trying to visit NBC.com were redirected to different websites each of which had malware. Accessing the website downloaded the malware to the user’s computer. The internet browsers were also quick to react to the situation and they blocked the website as well as other pages promptly. Due to their prompt reaction to the problem, no user information or data was compromised or breached. Google Chrome was the first to do so and they cleared the website soon after. Facebook also took the same action, blocking NBC.com. Related websites that remained unaffected by the hack included NBCNews.com and TODAY.com. According to software experts, the malware affecting the NBC website and its related properties was Citadel Trojan. This was found to be the malware present on the official website of the network as well as on the website for The Late Night with Jimmy Fallon among others. Thankfully, [...]

The post NBC’s Website Hacked and Infected appeared first on TechBeat.

]]>

View the Original article

More Teachers Use Mobile Devices In The Classroom

Recent studies by Pew Research Center have shown that over 73% of teachers use cell phones/smart phones for the classroom environment. Additionally, 45% of the surveyed teachers use e-readers and 43% use tablets as teaching tools. The study also covered the differences between mobile use of teachers with lower, middle and upper- class students. This revealed that teachers with students from high- income families are more likely to be able to connect to their students by tablets and cellphones, since the students are more likely to own a device. Teachers become tech savvy The use of these new electronic mediums in the classroom is inevitable.  With instant connectivity and an endless amount of education materials, many teachers are embracing the benefits of mobile computing devices. Smart phones, tablets and other computing devices can allow an individual or groups of users’ instant access to videos, websites and academic journals that pertain to that particular course. This is becoming more and more prevalent in the Elementary and Intermediate grade levels.  Association and familiarity with electronics in a classroom setting is reaching children at a younger and younger age. Connecting educators and students Teachers can also share experiences and unique methods of teaching [...]

The post More Teachers Use Mobile Devices In The Classroom appeared first on TechBeat.

]]>

View the Original article

Gowex Blankets NYC With Free WiFi

The next time you are walking the streets of New York City you’ll find yourself able to connect online via free city-wide WiFi. The service was announced on Tuesday courtesy of Wi-Fi provider Gowex. Available to residents and tourists alike the service covers a large swatch of the city including Brooklyn, the Bronx, Manhattan, Queens, and Staten Island. To offer such a massive option Gowex installed 1,953-hotspot data points throughout the city, allow for 1-megabit connections via mobile devices. Using the free Gowex network requires users to download a free Wi-Fi app for Google Android or iOS devices. The app allows users to download quicker connections, find alternative hotpots, and even to look up municipal information. To earn money from its free service Gowex will serve ads and offer cellular networks the ability to offload their data through the Gowex backbone. If you are willing to pay a fee Gowex can also provide faster speeds over its 1-megabit connection rate. While the company has launched only in New York City officials are already looking to expand the service into other metropolitan areas in the months ahead. New York City has become quite the testing ground for free Wi-Fi networks that rely [...]

The post Gowex Blankets NYC With Free WiFi appeared first on TechBeat.

]]>

View the Original article

Sony PlayStation 4 Social and Remote Features

Sony finally announced that the PlayStation 4 would hit the markets later this year. It has been a while since the third generation gaming console was launched and fans have been waiting for the next one. The wait is not quite over yet as PlayStation 4 would go on sale during the holiday season, which is some time away. At the official launch, the company also unveiled several of the features which have been included on the gaming console this time round but they didn’t show how it looks. A Launch without the Actual Device It was unusual that Sony held the official launch of the latest model of their flagship gaming console but didn’t reveal to the attendees what it looks like. They did show how the games would appear. Some of the presenters at the event played the games on stage for the audience to see. The games were projected on to a large screen but the actual devices were not shown. The consoles were kept backstage throughout the duration of the event which lasted over 2 hours. The only details about the look and feel of the PlayStation 4 were revealed by Jack Tretton, CEO of Sony [...]

The post Sony PlayStation 4 Social and Remote Features appeared first on TechBeat.

]]>

View the Original article

Are Teens Losing Interest in Facebook?

Currently at 900 million users, Facebook is unquestionably the most visited online social networking site. But for how long? Facebook has no real worries of losing its loyal adult users. In fact according to research firm Nielsen, users in the 50-64 age group made up nearly 1/4th of the sites users in March. But the same cannot be said for the younger generation. Of today’s middle and high schoolers, most of them do have a Facebook account; however, many of Facebook’s young users are spending much less time on the site. Instead they check in with Facebook quite infrequently and are turning their attentions to other trending online attractions like Instagram, Twitter and Face Chat. Though researchers say there’s no real evidence that Facebook is losing all of its teen users, their current lack of interest in the site is an obvious cause for concern. As former social sites like Myspace have shown, young fans are the driving force and longevity of social networks, and without their  interest and support the site will eventually fail. One aspect of Facebook that has become a teenager deterrent is its lack of privacy. Using your real name and posting personal stuff for the [...]

The post Are Teens Losing Interest in Facebook? appeared first on TechBeat.

]]>

View the Original article

Static analysis tool for examining binaries

GrammaTech announced a static-analysis tool for analyzing binary libraries and executables. CodeSonar for Binaries enables users to examine software for security vulnerabilities and malicious code, wi...

View the Original article

The Chinese time bomb

At Seculert, when we analyze a targeted attack, we are trying to help our customers understand the intention of the attackers, as we look how the attack evolves over time. In some cases, understanding...

View the Original article

Google Chrome 25.0.1364.152

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

View the Original article

MetroTwit 1.1.0

MetroTwit is a slick Twitter client for Windows.

View the Original article

Wuala (Strasbourg)

Have you ever emailed files to yourself or forgotten your memory stick on the go? Do you want to access your files from anywhere? Want to share documents, pictures or large media files with your friends or family? If you've answered one question wit...

View the Original article

DC++ 0.811

DC++ is an open source client for Windows for the Direct Connect network. Direct Connect allows you to share files over the Internet without restrictions or limits. The client is completely free of advertisements and has a nice, easy to use interface...

View the Original article

UltraVNC 1.1.8.3

UltraVNC is a powerful, easy to use and free software that can display the screen of another computer (via internet or network) on your own screen. The program allows you to use your mouse and keyboard to control the other PC remotely. It means that ...

View the Original article

WinPatrol 27.0.2013.0

WinPatrol alerts you to hijackings, malware attacks and critical changes made to your computer without your permission. As a multipurpose support utility, WinPatrol replaces multiple system utilities with its enhanced functionality.

View the Original article

Norton AntiVirus 20.3.0.36

Norton Antivirus stops viruses, worms, spyware, bots, and more - Keeps your system protected against all types of malicious threats. Norton Insight delivers innovative intelligence-driven technology for faster, fewer, shorter scans. Rapid pulse updat...

View the Original article

Tuesday, March 5, 2013

Enterprise security for businesses addressing privacy obstacles

Protegrity announced deeper enterprise security for global businesses addressing privacy obstacles such as cross-border data transfer and industry specific regulatory compliance. Ever-changing priv...

View the Original article

Dell SecureWorks expands incident response services

Dell SecureWorks is expanding its incident response (IR) services to counter the growing severity and frequency of breaches. Many organizations aren�t equipped internally to plan for and respond to to...

View the Original article

Auditing of Web apps with analytics dashboard for compliance

SaaSID has launched Cloud Application Manager 2.0 (CAM), the latest version of its browser-based authentication, management and auditing solution. CAM 2.0's audit report is now displayed in CAM A...

View the Original article

VASCO launches new card reader for transaction signing and PKI applications

VASCO launched DIGIPASS 870, a USB connectable card reader which can be used in both connected and unconnected mode. In connected mode DIGIPASS 870 can be used for a number of PKI-based, e-banking ...

View the Original article

Half of companies have lost a device with important data

Half of companies have lost a device with important company data on it, causing security implications for over a fifth of organizations, according to Varonis. 57% of employees believe that BYOD put...

View the Original article

Dangerous beans: Oracle deep in the storm

Last week security researchers from FireEye discovered a new Java exploit that works against the latest versions of Java (version 6 update 41 and version 7 updated 15) making this a zero-day. The flaw...

View the Original article

Open standards are key for security in the cloud

The current divide between proprietary and open approaches to enterprise cloud computing has implications beyond the obvious. More than just issues of cloud interoperability and data portability, open...

View the Original article

Safe iOS web surfing for kids

Net Nanny for iOS brings safe web browsing and surfing for kids of all ages to iPod Touch, iPhone and iPad using iOS 5.0 or later. Available from the App Store for $4.99, Net Nanny for iOS is a c...

View the Original article

Oracle releases emergency patch to fix exploited Java flaw

Oracle has released an out-of-band Java patch to fix the CVE-2013-1493 vulnerability that is currently being exploited in attacks in the wild. The security alert accompanying the release says tha...

View the Original article

Conflicting views on cloud security responsibility

CA and the Ponemon Institute released a study that shows companies have improved their practices around cloud computing security compared to a previous study from 2010. Still, the responses raise q...

View the Original article

Gang arrested for hacking and stealing from exchange companies

The Dubai police has arrested three people allegedly belonging to a crime gang that managed to steal nearly $2 million from Dubai exchange companies with the help of hackers. The hackers have broke...

View the Original article

Older MiniDuke strain found, raises questions about its origins

A version of MiniDuke - the cyberspy malware aimed at governments and agencies in Europe and elsewhere - has been operating for at least 21 months, internet security firm Bitdefender has discovered. ...

View the Original article

New exploit kit concentrates on Java flaws

Webroot's Dancho Danchev is known for combing through the wilds of the Internet for places where cyber criminals congregate and reporting back with interesting news about tools and services offered fo...

View the Original article

Longline phishing attacks rely on mass customization

Proofpoint released a wide-ranging study that identified a new class of sophisticated and effective, large-scale phishing attack dubbed "longlining". Longlining, which is named after the industrial fi...

View the Original article

New Google Site Shows How Search Works

Most of you use a major search engine like Bing, Yahoo or Google, everyday. And some of you have never given any thought to where those answers come from, like Google is just some all-knowing genie in the “cloud”. Those of you who are tech savvy know that the search engines use algorithms to answer questions, but how much of the actual process do you understand? If you would like a more indepth look at how Google’s algorithms turn your questions into answers, the company will explain it all to you on it’s new site How Search Works. Google launched the site on Friday to help explain the magnitude of the engines search process to its loyal users. Explaining the process Upon entering the site you are prompted to scroll down through an unfolding, animated presentation that follows the entire path of a search query. Google explains how they search through over 30 trillion pages by crawling, sorting, indexing, using algorithms and writing formulas and programs to deliver its users with the most relevant results. The site also gives you a broader view of algorithms and lists the numerous aspects of the search such as user context, site and page [...]

The post New Google Site Shows How Search Works appeared first on TechBeat.

]]>

View the Original article

Apple iWatch To Run Full iOS Platform

The Apple iWatch will not leave iOS users wanting. A new rumor suggests that the Cupertino-based company is hard at work on developing its first generation watch with a full version of its popular mobile device platform. In the new report it is suggested that Apple is planning to launch the new watch by the end of the year, but only if Apple can tackle the battery problem. A source tells The Verge that the watch currently gets about two days on a single charge and Apple is shooting for a four to five day charge window.  That time frame would make sense since the Pebble, the iWatch’s most likely competitor, currently lasts that long on a single charge. Moving towards iOS instead of a scaled down OS version as the company did with its Nano product actually makes a lot of sense. First, users will have better cross-platform compatibility and second the company will only have one base-line of code to work with, thus improvements will be streamlined and arrive faster for all of Apple’s mobile OS-based devices. There is the very real possibility that Apple may release the Apple iWatch, examine user reactions to a full iOS and then modify the [...]

The post Apple iWatch To Run Full iOS Platform appeared first on TechBeat.

]]>

View the Original article

Contributions to Technology from Women

To honor Women’s History Month this March, let’s pay tribute to all of the brilliant women who have been a necessary part of defining and advancing technology. While according to the U.S. Department of Commerce, America’s STEM workforce (citizens with careers in science, technology, engineering or mathematics), has only consisted of 25% women consistently for the last decade, this fact cannot discredit the mark women have left on technology throughout the years. Obtaining a STEM degree is not a common first choice among the ladies and many of those who do earn tech degrees later decide to work outside their studied field such as education and healthcare. None the less women have been making quite notable contributions to technology since the 1800s. Innovative Women Ada Lovelace was likely the first female techie, and has been referred to as “The Enchantress of Numbers” by author Betty A. Toole, in her book of letters from the British Countess of the 1800s. The educated daughter of poet Lord Byron was one of World’s the first computer programmers, who worked alongside computer pioneer, Charles Babbage and wrote programmes for his analytical engines. Grace Hopper, along with receiving her Ph.D. from Yale and her naval [...]

The post Contributions to Technology from Women appeared first on TechBeat.

]]>

View the Original article

IBM MobileFirst Launched for Enterprise Customers

Businesses have found a new solution to using mobile devices for enhancing their operations: the IBM MobileFirst platform. IBM has launched the platform for enterprise customers that encompass a number of features which cover the scope of using mobile devices in businesses. It enables companies to control and manage the way in which the employees use mobile devices. Also, businesses will be able to develop and create a new custom app for themselves. IBM the Ideal Company for Offering Mobile Solutions There are few technology companies more capable of providing mobile solutions than IBM. The company has a wealth of experience in helping enterprises go mobile. As of now, they have over a thousand enterprises as customers which have enabled them to polish their solutions and ensure they are top of the line. As a result, they have enhanced the quality of their services considerably which has culminated in the IBM MobileFirst platform being launched. Despite having been present in the industry for quite some time, IBM has kept mum about their prowess in offering mobile solutions. They haven’t created any hype or hoopla about their services but the quality of services is undeniable. It is the first time they [...]

The post IBM MobileFirst Launched for Enterprise Customers appeared first on TechBeat.

]]>

View the Original article

Passboard: A Password You Can Wear

There is a hugely growing market for password management.  For many, the increasing amount of options for managing passwords has come as a welcome relief, as many people must rely on multiple variations of passwords for each online service. Keeping track of all of your passwords can be a huge task.  Now, a new mobile security startup is trying to simplify things even further.  PassBan keeps mobile devices secure by offering different authentication options.  You can even wear a wristband authenticator, making passwords a thing of the past, and allowing you to simply gesture when you want to access your device.   With the free Android app called Passboard, you can secure any of your individual apps on your smartphone.  The wristband is just one of the possible verification techniques from which the user can choose. Options include voice identification, facial recognition, location, or the aforementioned wristband. The wristband works to unlock your phone or tablet when the user either makes a gesture or simply has proximity to the device. You can choose which method you want to use, and it is registered and transmitted via Bluetooth to your handset.  The technology essentially works by intercepting the launch of any [...]

The post Passboard: A Password You Can Wear appeared first on TechBeat.

]]>

View the Original article

Quantum Cures: Idle Computer Time Can Help Cure Diseases

How often do you turn your computer off at night when you go to sleep? If you’re anything like me, you leave your computer on most of the time. With the way those devices are set up, you don’t really have to worry about power consumption anyway. The thing is, unless the device is doing some important tasks, there really is no point in leaving it on, is there? Unless you devote your idle computing power to a bigger cause. You probably have an idea what I’m talking about. After all, using the idle computer time of people all over the world is not a new concept. We’ve all heard of projects such as SETI@home (Berkeley) and Folding@home (Stanford). The former is basically a scientific experiment that makes use of people’s idle computer time to search for extraterrestrial intelligence (SETI), while the latter helps find cures for diseases. There is a newcomer to the scene: Quantum Cures. The entity was founded only in January, with the goal of designing drug molecules that will prevent, or cure, certain diseases such as the following:  Congenital toxoplasmosis Hodgkin Lymphoma Isolated spina bifida Noonan syndrome Familial melanoma So how is Quantum Cures different from Folding@home? [...]

The post Quantum Cures: Idle Computer Time Can Help Cure Diseases appeared first on TechBeat.

]]>

View the Original article

Apple is Still the Most Admired Company

It’s probably no surprise that Apple has once again snagged the top position in Fortune’s recently released list of the Top 50 World’s Most Admired Companies.  This is the sixth year in a row that Apple has managed to grab the top honor.  They managed to top both Google and Amazon, which came in second and third, respectively. The decision is voted on by a group of  3,800 executives and directors. Apple was the clear choice for the number one position, despite experiencing its share of problems this year, including the failure of its Maps feature and problems with its stock price. Apple’s successes far outweighed any problems they may have weathered. Fortune called the company a “financial juggernaut” and reported that they posted $13 billion in net income last quarter, which made it the most profitable company in the world during that period. They also stated that, “The company has its fanatical customer base, and it still refuses to compete on price, making the iconic iPhone and iPad products that are still widely seen as prestige devices.” Although the list is an international list of companies, American companies hold the top 13 positions.  Other companies in the top five [...]

The post Apple is Still the Most Admired Company appeared first on TechBeat.

]]>

View the Original article

New Version of Telenav Scout Released for iPhone

Telenav Scout is a navigation service that allows you to find your way around any city you are in. The new Scout app has been launched for iPhone that offers new features and more comprehensive navigation capabilities. In the previous version, the usability was limited to getting directions and viewing maps. However, Telenav has upgraded the app to make it easy to share with your friends and family and send out notifications to people you know. The great thing about the new app is that multiple users can follow the same route and directions if they are to reach the same destination. It makes it easier for you to organize get-together events and parties without having to give directions to any of the invitees. On the other hand, if you are going to an event, you can let the host know about your time of arrival using the app as you will know approximately when you are going to reach there. The update has been made exclusively to the iOS app for Telenav Scout. Even though the service is available on Android as well, there is no word yet on whether the updated app would be made available for that [...]

The post New Version of Telenav Scout Released for iPhone appeared first on TechBeat.

]]>

View the Original article

RAMDisk 4.0.5 RC 0

RAMDisk is the right product for you if you have a disk I/O bound application that is small enough to fit in main memory. RAMDisk is also great for storing frequently accessed data such as temp files, page files and database index files. RAMDisk is f...

View the Original article

FastPictureViewer 1.9 Build 292 (32-bit)

FastPictureViewer, an image viewer designed for photographers. Now with powerful workflow tools helping to automate file management duties like copy, move, delete, save-for-web and more.

View the Original article

Java Runtime Environment 1.7.0.17 (32-bit)

Java software allows you to run applications called "applets" that are written in the Java programming language. These applets allow you to have a much richer experience online than simply interacting with static HTML pages.

View the Original article

TeamSpeak Client 3.0.10 (32-bit)

TeamSpeak is flexible, powerful, scalable software which enables people to speak with one another over the Internet. TeamSpeak consists of both client and server software. The server acts as a host to multiple client connections, capable of handling ...

View the Original article

TeamSpeak Server 3.0.7 (32-bit)

TeamSpeak is flexible, powerful, scalable software which enables people to speak with one another over the Internet. TeamSpeak consists of both client and server software. The server acts as a host to multiple client connections, capable of handling ...

View the Original article

Freemake Video Converter 3.2.1.8

Freemake offers free program for video converting - developed as alternative to popular paid software. “Free, easy and of high quality” are the fundamental principles of Freemake.

View the Original article

Monday, March 4, 2013

Blackhole outfitted with exploit for recently patched Java flaw

The exploit for the recently patched CVE-2013-0431 Java vulnerability has been added to the Blackhole exploit kit, Trend Micro researchers report. The fact was discovered through the analysis of th...

View the Original article

Safari now blocks all but latest version of Flash plugin

With all the Flash Player and Java zero-day vulnerabilities lately getting exploited in attacks, browser vendors are trying to come up with solutions to protect their users without antagonizing them w...

View the Original article

Security is changing, organizations are unprepared

F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. Respondents were RSA attend...

View the Original article

Review: Wide Open Privacy: Strategies For The Digital Life

Authors: J.R. Smith and Siobhan MacDermott Pages: 190 Publisher: IT-Harvest Press ISBN: 0985460733 Introduction We live in a digital age where it's become normal to see people post photos...

View the Original article

Evernote breached, forces service-wide password reset

The popular notetaking and archiving service Evernote has notified its 50+ million users that the service's internal network has been breached by attackers and that they are forcing a password reset f...

View the Original article

Jailed British hacker hacks own prison's mainframe

A UK cyber criminal jailed in a maximum security prison has managed to hack into the institution's mainframe after having been allowed to participate in IT lessons, the Daily Mail reports. The in...

View the Original article

Warning from "Mark Zurckerberg" leads to account hijacking

If you get an email sent by "Mark Zurckerberg", saying your Facebook account might be permanently suspended because of violations of the social network's Terms of Service, fight the urge to follow th...

View the Original article

Kaspersky PURE 3.0 Total Security released

Kaspersky Lab released Kaspersky PURE 3.0 Total Security, which offers protection for users to secure their online activities and digital assets across their home network of PCs. Here are some of ...

View the Original article

Russian YotaPhone to Be Manufactured In Singapore

Russian phone maker Yota Devices is on a high with the recent release of its smartphone, the YotaPhone. The Android-based device was launched in December 2012 and was noted for its dual-screen design. The company has now decided that the phones would no longer be made in Russia but in Singapore. In a deal with Singapore Hi-P, Yota Devices has agreed to have the YotaPhones manufactured in Singapore from now on. The YotaPhone: A Sophisticated, Advanced Device Even though the YotaPhone originates from Russia, it has some features which make it stand out from the plethora of smartphones on the market. It boasts of a dual-screen which even Apple and Samsung have not yet brought to the market. This way, a person can use the phone from either side, although the displays are quite different. This is the reason why the production of the device requires special supervision and careful monitoring. For people used to seeing iPhones and Android-based smartphones around all the time, the YotaPhone can appear a bit weird at first. However, some market experts have commented on the fact that one gets used to it over time. Yota Devices are confident about the future of their smartphone [...]

The post Russian YotaPhone to Be Manufactured In Singapore appeared first on TechBeat.

]]>

View the Original article

AntiVir Personal 13.0.0.3185

Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action execu...

View the Original article

UltraDefrag 6.0.0 (32-bit)

UltraDefrag is a powerful disk defragmentation tool for Windows. It is the first open source defragmenter with full support of system locked files defragmentation. Actually all files including registry hives and paging file can be processed by UltraD...

View the Original article

Macrium Reflect 5.1.5732

A complete disaster recovery solution for your home and office. Protect your personal documents, photos, music and emails. Upgrade your hard disk or try new operating systems in the safe knowledge that everything is securely saved in an easily recove...

View the Original article

Sandra Lite 2013 SP2 (19.35)

SiSoftware Sandra (the System ANalyser, Diagnostic and Reporting Assistant) is an information & diagnostic utility. It should provide most of the information (including undocumented) you need to know about your hardware, software and other devices wh...

View the Original article

Evernote 4.6.3.8096

Evernote allows you to easily capture information in any environment using whatever device or platform you find most convenient, and makes this information accessible and searchable at any time, from anywhere.

View the Original article

Keynotes announced for Hack In The Box 2013 Amsterdam

Edward Schwartz, Chief Information Security Officer at global information security giant, RSA, will be delivering his keynote address on "Embracing the Uncertainty of Advanced Attacks with Big Data An...

View the Original article

AVAST 8 features new technologies for proactive detection

AVAST introduced a new version of its consumer security software line. Version 8 brings a number of new technologies and improvements to deliver proactive detection, vulnerability prevention, and user...

View the Original article

Visa and Samsung Make Paying for Purchases Easier

How would you like to be able to use your phone as your credit card? What at one time seemed only like a futuristic dream, will soon be a reality for Samsung users.  It has now been announced that Visa and Samsung will be partnering to allow users to make mobile payments.  Visa’s NFC payment system will now be built into all future Samsung smartphones. This is not only a big step for Visa and Samsung, but it also lends to the viability and credibility of NFC payments. Essentially the way that it works, is that Visa will provide the secure element that will allow payment processors to communicate with banks.  As such, multiple payment processors and banks will be able to use this element within Samsung phones, allowing for a full variety of apps and wallets to be developed for the various processors and banks.  In many ways, Visa has won this battle for control over NFC payments.  Moreover, it is a huge setback for Google Wallet.  Google has had difficulty getting carriers to adopt its NFC. Samsung’s decision to go with Visa will further complicate Google’s aspirations to put their payment system into mobile users’ hands. Visa is [...]

The post Visa and Samsung Make Paying for Purchases Easier appeared first on TechBeat.

]]>

View the Original article

Wozniak Has Some Words of Advice for Apple

It is no secret that Apple is the largest technology company in the world. They hold great power over the market and dominate the consumer electronics industry like no other company. However, they have been losing ground to other companies like Samsung and Nokia in the mobile devices’ market. Still, Apple’s stature is such that it can map out the future course of the industry. This is why the company’s co-founder Steve Wozniak believes. He also offers some words of the advice for the company. Wozniak had founded Apple with Steve Jobs back in 1976 but parted ways with the company a few years later. Though Jobs returned to the fold in the 90s, Wozniak has never been a part of the company since leaving. In a recent interview, Wozniak said that despite the increasing competition, Apple is the company to determine the future of the mobile devices’ market. He attributes this power to the core group of loyal customers Apple has built over the years by constantly offering high quality products. However, the company has been finding it tough to sustain its growth rate after founder Steve Jobs’ death at the end of 2011. Since then, the stocks have [...]

The post Wozniak Has Some Words of Advice for Apple appeared first on TechBeat.

]]>

View the Original article

Dust 514: A New Kind of Strategic Game

Two great games collide as CCP brings forth it’s latest game, Dust 514, and blends it with the player driven, intergalactic MMORPG world of EVE.  This console game is a strategic, first-person shooter, hybrid MMO that will be exclusively for PS3 and Vita. A Gaming Mash-up CCP is innovatively exploring new gaming territory by being the first to attempt combining a massive online PC game with a completely separate console game. Dust 514 is not really an expansion of EVE, but  rather an entirely new game that resides inside of the vast expanse of EVE’s cosmic world. Not only do the games have corresponding storylines and share the same maps, but players will even battle across games and share the same server. But while EVE players take on the role elite starship pilots and participate in high-speed sky battles, Dust 154 players are immortal mercenaries that shoot it out in ground battles. Gameplay Dust 514 gives its players plenty of choices for customizing their character and its abilities. First of all, you can pick from 4 character races, Caldari, Gallente, Amarr, and Minmatar. Each of the races has 3 of its own character bloodlines which will further individualize your avatar. [...]

The post Dust 514: A New Kind of Strategic Game appeared first on TechBeat.

]]>

View the Original article

PlayStation 4 Privacy Settings: Real Names Might Be Required

The PlayStation 4 announcement day has come and gone, and what have we gotten from it? More anticipation for the next generation console, if nothing else. We have high hopes that the PlayStation 4 will be affordable. We know it’s going to be much more powerful, and we know it’s going to blow our minds in more ways than one. But did you catch what lead architect Mark Cerny said during the announcement? Kotaku was very quick to pick up on the detail that we might have to do away with “fake” identities on the PlayStation Network when the PlayStation 4 comes out. Quoting Cerny: “[With the] PlayStation 4 we are transitioning to a friends network based on real world friends. We’ll keep around the alias and icon used in today’s multiplayer matches. These are great to have when anonymity is important. But most of the new social dimension to PS4 will be interacting with friends using real names and profile pictures most likely seeded from your existing social network.” At first glance, perhaps, it sounds great, and it might very well be for some people. For those who prefer using aliases when playing on PSN, though, there some pretty [...]

The post PlayStation 4 Privacy Settings: Real Names Might Be Required appeared first on TechBeat.

]]>

View the Original article

Evernote Users Lash Out Following ‘Disturbing’ Hack

American note-taking software company Evernote has announced ‘disturbing’ news that it has been hacked. The company has become the latest high-profile victim of a cyber attack and as a ‘precaution’, has implemented a password reset for all users. After ‘suspicious activity’, in which the hacker(s) were able to gain access to Evernote user information, including usernames, email addresses associated with Evernote accounts and encrypted passwords, an estimated 50 million people were forced to reset their passwords. Angry Users Despite the notice on its website, plenty of irate users took to the company’s site to air their frustration, as many felt they should have been emailed about the compulsory password change. One user said it was ‘inexcusable’ that no email was sent to users and another said the unexplained password reset actually prompted hacking fears. A user nicknamed b737officeview, said: “This is really disturbing. I just signed up for Evernote and Evernote Premium just yesterday, after months of considering the best way to go paperless. “It seems my fears were warranted as I didn’t even last 24 hours on Evernote without having my password reset and a leak of data occur.” User Dave Yuhas added:”Evernote couldn’t have emailed this notice? I [...]

The post Evernote Users Lash Out Following ‘Disturbing’ Hack appeared first on TechBeat.

]]>

View the Original article

Getting your DVDs to Data with a Plasmon Jukebox

The world of data is changing, and has been for a while. We went from Video Cassettes to DVDs to Blu-ray. And it's annoying when you have to buy your favorite songs or movies over and over as the world of technology changes and improves. Now, the entertainment technology is moving to stored data. Netflix is mostly streaming now, movies are available to download on iTunes, and even your TV will play shows that it has saved or streamed. So do we have to once again go buy our entire library?

View the Original article

The Different Types of Spy Software Programs

In reality, there are various types of programs that can be used for spying purposes. Spy software is very common in the internet today. We can see millions of them found in freeware websites and forums.

View the Original article

Importance Of Online Backup Services For Computer

In today's rapidly growing digital world, most of the people store and preserve hundreds and thousands of digital files on the computer. From business records to family albums, music and video files to personal contacts, your hard drive is most likely to be occupied by unique data.

View the Original article

Sunday, March 3, 2013

Why Invest on Computer Accessories?

This article discusses on the importance of computer accessories in our lives and why we need to invest in these items.

View the Original article

Week in review: New Java 0-day, Stuxnet's earliest known version analyzed, and old school malware used for spying on European govts

Here's an overview of some of last week's most interesting news, videos, interviews and articles: HTC agrees to fix vulnerabilities found in millions of its devices HTC America has agreed to set...

View the Original article

Shift Your Innovation Game Through Mobile And Social

Have you done a shift on your innovation game this 2013? Don't let the world leave you behind. There is one area that could be an added catalyst to your efforts. Patrick Meyer, a mobile innovations expert, introduces Business 3.0, which includes innovating through mobile, social, and e-tail.

View the Original article

ASUS Transformer Book Available for Pre-Ordering

Would you like to buy a notebook that becomes a tablet? If yes, the ASUS Transformer Book Windows 8 Hybrid might just be the device for you. ASUS had announced they were working on a device which would enable users to enjoy the features of both a notebook and a tablet. They have come up with the ASUS Transformer Book which functions as a tablet but can become a notebook by adding a keyboard docking station. Hence, you get two devices for the price of one. The ASUS Transformer Book is going to be launched soon and the company has put it up for pre-ordering if you want to get your hands on one from the first batch. There is no doubt that the unique design of the device is attractive and the usability excellent, what with getting to use two different devices. If you are interested in getting the Transformer Book for yourself, you can place an order for it right away. There are several things going in favor of the device apart from the two in one design. First of all, it gives you the chance to use Windows 8 and all the apps which come with it [...]

The post ASUS Transformer Book Available for Pre-Ordering appeared first on TechBeat.

]]>

View the Original article

SpywareBlaster 5.0

Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today. By simply browsing to a web page, you could find your computer to be the brand-new host of one of these unwanted fiends!

View the Original article

Internet Download Manager 6.15 Build 5

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network pr...

View the Original article

Google Earth 7.0.3.8542

Google Earth lets you fly anywhere on Earth to view satellite imagery, maps, terrain, 3D buildings, from galaxies in outer space to the canyons of the ocean. You can explore rich geographical content, save your toured places, and share with others.

View the Original article

Office 2013 Licensing Issues Clarified By Microsoft

Controversy erupted recently regarding Office 2013. According to Microsoft, users can only install Office 2013 on one PC and that is it. If they want to use it on another PC, they wouldn’t be able to do so. This was the first time that such restrictions were imposed by Microsoft on their Office suite. There was considerable confusion among the people regarding whether or not they would be able to use Office 2013 on more than one computer. Ultimately, Microsoft had to come out and clarify the situation. The bad news is that the issue which caused the controversy ultimately proved to be true. Microsoft has indeed restricted the use of Office 2013 to one device.  This is a marked change from the company’s approach to previous version of Office. You could easily install Office on multiple devices and it was all legal. However, this isn’t the case if you have upgraded to Office 2013. On top of that, Microsoft didn’t even make this point public. The licensing guidelines are available with your copy of Office 2013 but hardly anyone bothers to read. Well, thankfully someone did and brought this issue to light. It would have been better if the [...]

The post Office 2013 Licensing Issues Clarified By Microsoft appeared first on TechBeat.

]]>

View the Original article

Facebook Not for Users Over 100 Years Old

A new glitch has been uncovered in the social networking website Facebook which is causing problems in particular for one user. Marguerite Joseph is a resident of Grosse Pointe, Michigan and has been using Facebook for the past three years. Joseph was born in 1908 which makes her 104 years old at present. It is unlikely that the website has any other user with an age in the triple-digits. However, Facebook is preventing Joseph from showing her true age on her profile. Joseph has stated that she wants to let the people know her real age but when she enters the year as 1908, it automatically changes to 1928. It does seem as though Facebook designers thought the website wouldn’t be used by someone over a hundred years old but that has occurred now. Due to this technical problem, Joseph’s age on the website is shown as 99 and has been that way since 2010. Now that this issue has been brought to light, maybe Facebook would find a solution. This may be the first case in reported history when a woman doesn’t want to hide her age but is being forced to. After all, it is not rare for [...]

The post Facebook Not for Users Over 100 Years Old appeared first on TechBeat.

]]>

View the Original article

iPad Controlled Car Developed In UK

A team at researchers from Oxford University have developed an iPad app that turns a Nissan Leaf electric car into an autonomous vehicle. Researchers mounted an iPad in the dashboard of the Leaf and the program allows the driver to give the iPad permission to take over driving responsibilities in certain areas. The system works through mounted cameras and lasers that are integrated into the body of the vehicle. Those peripherals are then linked to a computer that is housed in the trunk of the vehicle. At the moment the system only works in frequently driven areas and is personalized based on the driver. Should the person behind the wheel need to take over driving responsibilities they simply tap the brake pedal and manual controls are restored. According to Professor Paul Newman of the Oxford University Department of Engineering Science: “Our approach is made possible because of advances in 3D laser mapping that enable an affordable car-based robotic system to rapidly build up a detailed picture of its surroundings.” Professor Newman adds: “Because our cities don’t change very quickly, robotic vehicles will know and look out for familiar structures as they pass by so that they can ask a human driver ‘I know this [...]

The post iPad Controlled Car Developed In UK appeared first on TechBeat.

]]>

View the Original article
 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text