Search
Media
Travel
Didactica
Money
Venture
eMarket
Chats
Mail
News
Schlagzeilen |
Samstag, 28. Juli 2012 00:00:00 Technik News
Aktualisiert: Vor 3 Min.
1|2|3|4|5  

Supporters of the British Team can get a special edition of the newest Samsung smartphone emblazoned with UK colors and theme.

Security firm Intego says the Trojan is actually espionage malware that spies on victims using instant messaging clients, browsers, and Skype.

Each audience member waved a ten-inch paddle outfitted with nine full-color LCD squares to work together to broadcast images.

Hotel locks, iris scans, GooglePlay and other "secure" technologies are cracked in demonstrations at the security conference.

Analysis: Take my Twitter account -- please! Employers' policies are often unclear when it comes to social media account ownership.

Domino's Pizza has revealed that its e-commerce function has helped deliver a 11 percent increase in its total sales for the first half of 2012.

Hackers can help educate people who don't understand cybersecurity as well as they do, and protect help networks, civil liberties, and privacy, the NSA chief said.

A Japanese invention scans and recognizes different items by shape, color and pattern, providing instant information.

Take a look at some of our favorite videos made with the SFM so far.

Most analysts believe the new iPhone will house a Qualcomm chip that lets the phone connect with several flavors of 3G GSM and 4G LTE service.

Call for business to 'step up' in fight against cyber attacks sparks discussion of proper private, public roles.

Here's some guidance for podcasts, smart playlists, streaming audio, and what happens to your iTunes Store content when you're gone.

Favs works with several social services: Facebook, Twitter, YouTube, Instapaper, Delicious, Google Reader, Instagram, Pinboard, and Vimeo, to name a few.

Inside, the Saxby has a semi-rigid, padded laptop sleeve that fits a 15-inch MacBook Pro perfectly.

This National Geographic offering is a worthwhile tool for planning your next visit to a national park, particularly if you're willing to download the individual guides for each park, though its scope is limited.

Chirp uses sound to transmit words, pictures and URLs from one phone to another, and it gets its name because its data transmission sounds like a robotic bird.

Apple and Samsung Electronics won't be able to keep certain pieces of information from the public during their high-profile jury trial that begins on Monday.

'Ethical' hackers at Black Hat conference question the need to do so.

Miss the old mixtapes? This upgraded, 3D-printed version from MakerBot looks just like the real thing, but holds your favorite MP3 playlist instead.

While earnings from marquee-name tech companies such as Apple and Facebook disappointed this week, sales of mobile devices and enterprise software showed signs...

As the 2012 Olympics kick off today, don't rely solely on the TV broadcasts to enjoy the festivities: Thanks to social media, there are plenty of alternatives.

Or: How I learned to stop worrying and tolerate Microsoft's mail client/information manager.

A concept device could let you take pictures and capture the smell on a postcard.

A widespread spam attack linking to malware has broken out on Twitter, according to the security firm Sophos.

A U.S. judge should permanently dismiss a U.S. Department of Justice criminal case against file-sharing and storage website Megaupload, the company's attorney requested Friday.

Google Talk, a desktop and mobile text and voice chat service used by many Google Gmail customers, suffered a widespread outage Thursday morning that the company says affected "a majority of users."

Ultrabooks and convertible tablets will soon have everything from compasses and gyroscopes to GPS and accelerometers.

OnLive has announced its streaming game service will be available on the anticipated Ouya console.

Google disclosed Friday in an email to the U.K. Information Commissioner's Office that it had not yet deleted all user data collected by its Street View...

Facebook has taken delivery of the first set of innovative server racks it helped design, technology that the company hopes other organizations with large data...

More than 85 percent of all Firefox users have at least one add-on installed, Mozilla says.

UC Berkeley researchers restore sight to genetically blind mice with a single chemical injection, and it may work on humans too.

The social network site isn't likely to enter the hardware business -- right now, anyway, its CEO insists.

We need stronger security for mobile devices as we begin to make payments by smartphone, or connect on the go to the company network.

A new Trojan dubbed 'OSX/Crisis' has been discovered which takes sneaky to a whole new level for infecting Mac OS X systems.

Part of the Ouya marketing campaign evokes the pioneer spirit of early Apple IIe game developers. John Romero shares his thoughts on the topic during KansasFest 2012.

What would a rebuilt Internet look like? This group is trying answer that question.

Google now supports handwriting on touchscreens to input text in search queries on smartphones and tablets.

A presentation at the Black Hat security conference featured an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets.

The software giant recognizes its challenges in phones, tablets, and luring developers to write apps for its platforms.

UPDATE: Fiber broadband service will cost $70 per month for 1Gbps Internet access and $120 per month including TV.

UPDATE: In its first quarter as a publicly traded company, Facebook had revenues of $1.18 billion and lost $157 million, topping analysts' expectations slightly.

In a deal that should help Apple boost its enterprise security offerings, the iPhone maker is planning to buy mobile security company AuthenTec.

Doodle celebrating sports points to information on the Games, which are opening this weekend.

This week’s round up of free games sees you fighting off an alien invasion and pulling off high-stakes robberies.

IT managers in businesses and governments are taking steps to ensure that the Summer Olympics do not bust networks or budgets.

Court documents have revealed "highly confidential" photographs of early iPad and iPhone prototypes, and even hint of next-generation characteristics.

Security researcher and Columbia University PhD student Vasilis Pappas was announced the winner of the Microsoft BlueHat Prize contest for an exploit mitigation...

Delays are plaguing Google's Nexus 7 tablet with 16GB of storage as some stores have stopped taking orders or delayed shipments of the product.

The sale of Motorola's Android devices that infringe on a Microsoft patent was banned in Germany on Friday after a ruling of the lower regional Mannheim court, a...

astroengine writes "Yes, it's the moment we've all (secretly) been waiting for: Fish In Space! But before you go getting too excited and start asking the big questions — like: if there's a bubble in a microgravity aquarium, what happens if the fish falls into it? Let's ponder that for a minute... — it's worth pointing out that the fish aren't actually in space right now (their habitat has just been delivered to the space station by the unmanned Japanese H-II Transfer Vehicle 'Kounotori 3') and this fishy experiment isn't just to see how fish enjoy swimming upside down, there's some serious science behind it."

An anonymous reader writes "Researchers reporting online on July 26 in Current Biology have for the first time shown that they can control the behavior of monkeys by using pulses of blue light to very specifically activate particular brain cells (abstract). The findings represent a key advance for optogenetics, a state-of-the-art method for making causal connections between brain activity and behavior. Based on the discovery, the researchers say that similar light-based mind control could likely also be made to work in humans for therapeutic ends."

theodp writes "'What's the point of a mobile device,' asks WSJ reporter and iPad-beatdown-victim Rolfe Winkler, 'if people don't feel safe using it while they're mobile?' A lucrative secondhand market for today's electronics devices — a used iPad or iPhone can fetch $400+ — has produced an explosion in 'Apple picking' by thieves. So, how big is the iCrime wave? In New York City alone, there were more than 26,000 incidents of electronics theft in the first 10 months of 2011 — 81% involving mobile phones — according to an internal NYPD document. And plenty of the crimes are violent. The best way to deter theft is to reduce the value of stolen device — the wireless industry is moving to adopt a national registry that would deny service to such devices. A remote kill switch has been discussed as another approach. For its part, Apple says the company 'has led the industry in helping customers protect their lost or stolen devices,' although some are unimpressed."

An anonymous reader writes "Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the integrity or privacy of Facebook user data, and then responsibly disclose them to the company. Still, when the social network's security team received a tip from a researcher about a vulnerability in the company's own network which would allow attackers to eavesdrop on internal communications, they made an unprecedented choice by broadened the scope of the bug bounty program and inviting researchers to search for other holes in the corporate network. Nobody expects malicious attackers to have a change of heart and hand over information about a vulnerability for a few thousand dollars when they could sell the stole information for much more. It should, therefore, come as no surprise that Ryan McGeehan, the manager of Facebook's security-incident response unit, stated that if there's a million-dollar bug, they will pay it out."

Hugh Pickens writes "Reuters reports that Apple will buy fingerprint sensor technology developer AuthenTec for about $356 million, striking a deal that could help Apple bring fingerprint technology, already used in mobile phones in Japan for authentication of mobile payments, to markets such as the United States, where mobile-wallet services have been slow to catch on. Some analysts expect the iPhone 5 to include some form of mobile payments technology. 'In the past 5 years, the growth of iPhone and Android smartphones has made mobile data security essential, not just a "nice-to-have" feature,' says Ben Yu, Managing Director of Sierra Ventures, one of the early investors in AuthenTec. 'People have their whole lives on the phones.' AuthenTec's embedded fingerprint scanners and other identity-related software is particularly useful now that Near Field Communications, or NFC-enabled, phones have begun to appear in the market. Analyst Colin Gillis says AuthenTec technology could potentially also help Apple combat problems such as theft of its more portable products such as iPhones. 'If they could have a way where they could tie the phone to a user more tightly, that would make sense for them,' says Gillis. The price tag for AuthenTec is a drop in the bucket of Apple's cash pile of $117.2 billion. 'We'll see if it's a one-off or if Tim Cook will start to level his cash balance and acquire talent,' adds Gillis."

McGruber writes "The Federal Times has the stunning (but not surprising) news that a new audit found six Defense Department modernization projects to be a combined $8 billion — or 110 percent — over budget. The projects are also suffering from years-long schedule delays. In 1998, work began on the Army's Logistics Modernization Program (LMP). In April 2010, the General Accounting Office issued a report titled 'Actions Needed to Improve Implementation of the Army Logistics Modernization Program' about the status of LMP. LMP is now scheduled to be fully deployed in September 2016, 12 years later than originally scheduled, and 18 years after development first began! (Development of the oft-maligned Duke Nukem Forever only took 15 years.)"

New submitter zixxt writes "GTK+ Developer Benjamin Otte talks about the stagnation and decline of the Gnome Project. He describes how core developers are leaving GNOME development, how GNOME is understaffed, why GNOME is a Red Hat project and why GNOME is losing market and mind share. Is the Gnome project on its deathbed? Quoting: 'I first noticed this in 2005 when Jeff Waugh gave his 10×10 talk. Back then, the GNOME project had essentially achieved what it set out to do: a working Free desktop environment. Since then, nobody has managed to set new goals for the project. In fact, these days GNOME describes itself as a “community that makes great software”, which is as nondescript as you can get for software development. The biggest problem with having no goals is that you can’t measure yourself. Nobody can say if GNOME 3 is better or worse than GNOME 2. There is no recognized metric anywhere. This also leads to frustration in lots of places.'"