Android 5.0 будет доступен для устройств серий Sony Xperia Z2 и Z3 в начале 2015 года
В прошлом месяце Sony открыла бета-тестирование Android 5.0 для Xperia Z3 и Xperia Z3 Compact. …
В прошлом месяце Sony открыла бета-тестирование Android 5.0 для Xperia Z3 и Xperia Z3 Compact. …
На международной выставке CES, которая пройдёт в Лас-Вегасе с 6 по 9 января 2015 года, компания LG представит набор моделей телевизоров Smart TV на базе новейшей операционной системы webOS 2.0. …
Компания Nokia сосредоточится на разработке приложений HERE для Android и iOS, а поддержка этого сервиса на платформе Windows Phone будет передана специалистам Microsoft. Об этом сообщает финский сайт DigiToday со ссылкой на директора продакт-маркетинга HERE Удо Сзабо. …
The data breach at the Staples office-supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores, the company said Friday. The affected stores cover 35 states from California to Connecticut, according to a list Staples released Friday. The chain has …
NASA signaled the beginning of a much safer era of space travel, Wednesday, emailing the design of a socket wrench to astronauts so they could print it out in orbit. The immediate implication for NASA and passengers on its risky ride is that, properly trained and equipped, the crew of …
A federal judge on Friday questioned the strength of a key lawsuit challenging the constitutionality of the government’s Internet surveillance program known as “upstream” data collection. Judge Jeffrey White heard oral arguments by attorneys from the Electronic Frontier Foundation, which filed the suit, and the government, during a hearing in …
Once upon a time, life in the enterprise IT shop was fairly simple, at least conceptually speaking. IT issued computers and laptops to employees, and maintained enterprise software, databases and servers that supported the company, which were mostly run in-house. These days, IT’s basic firmament is giving way to a …
Security is rising to the top of the list of issues that the Internet Society (iSoc) is tackling in Africa, joining its efforts to develop infrastructure and promote an inclusive “bottom-up” governance model for the Web. “We are going to support the deployment of security technologies,” said Dawit Bekele, director …
North Korea seemingly wasted no time this week trumpeting Sony Pictures’ decision to cancel the opening of The Interview, a comedy that portrayed an assassination plot against the country’s dictator, Kim Jung-un. “Heroes force Japanese cinema bandits to bow before indomitable fist of Korean people,” tweeted the Korean Central News …
Google may be planning to launch a version of Android Auto for vehicle infotainment centers — also known as head units — that will eliminate the need for a smartphone to be connected, giving native access to the Internet and mobile applications. Today, Apple’s CarPlay, or open source standards such …
Intel is trying to ease the transition to the cloud for anyone who picked up a Chromebook this season. The chipmaker has launched a free “Easy Migration” tool for Chromebooks with Intel processors inside. With a few clicks, users can move their contacts, files, photos, and bookmarks to a Google …
A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies, Inc. “They have a lot of resources,” said Rod Soto, principal security researcher in the company’s business security unit. For example, they were able …
As 2014 winds down, the breach of Sony Pictures Entertainment is clearly the biggest data breach of the year and among the most devastating to any corporation ever. Attackers broke in and took whatever they wanted, exfiltrating gigabytes and gigabytes of documents, emails and even entire movies, apparently at will …
The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country. But now what? “This could embolden future attackers,” Johannes Ullrich, dean of research for the SANS Technology Institute and the head …
T-Mobile US will pay at least $90 million to settle a Federal Communications Commission suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn’t want. The settlement is the second largest ever for so-called “cramming,” following one that the FCC reached with …
President Obama believes Sony made a mistake in canceling release of “The Interview” following a major cyberattack and said the U.S. is prepared to respond to the attack, but he wouldn’t say when or how. “We cannot have a society in which some dictator someplace can start imposing censorship here …
To read this article in full or to leave a comment, please click here
For years, people in marketing or HR have been sneaking their apps and data onto the cloud, totally bypassing IT’s approval or help. Buckle up, IT. Those days are coming to an end as more enterprises look into moving critical applications and information to the cloud. IT shops are being …
Case, or no case? The great case debate: Though it’s a shame to cover up your shiny, pretty new iPhone, the downside is that you risk dropping it or getting it all scratched up if you leave it bare. So, if you have to put a case on it, might …
Setting the stage for 2015 Apple had a blockbuster year. New iPhones, new iPads, a mobile payment solution that might actually change the way we pay, and an entirely new product category in Apple Watch. That’s not to say there weren’t missteps: iOS 8.0.1, anyone? We recap the year in …
Well that stinks, doesn’t it? Sony Pictures goes and scrubs the launch of a $44 million movie after being hacked, potentially by North Korea. Almost reads more like a James Bond plot than a news story, but there it is. And this time, it doesn’t seem likely that Bond, James …
Maybe I should be outraged by Sony’s decision not to distribute the movie The Interview, but I am merely saddened by it. I am saddened that a hacking incident with all the hallmarks of a simple case of extortion has been distorted so it looks like a terrorist threat. Taking …
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn. The new threat, dubbed Chthonic, is based on ZeusVM, a Trojan program discovered in February that is itself a modification of the …
The European Commission is gearing up to solve some longstanding problems with outdated copyright and data protection laws and move ahead on new rules for roaming charges and net neutrality. During the past week, the Commission made public its work agenda for 2015, and high on the list is the …
Parsix GNU/Linux 7.0 review Debian is the great-granddaddy of many Linux distributions, and Parsix is definitely one of its grandchildren. Parsix uses Debian as its base, but builds on it to provide a very desktop-oriented distribution. Parsix has reached version 7.0 and this release ships with GNOME 3.12 as the …
U.S. Army Research Labs Artist illustration: Research Ron Polcawich presenting micro-robot fly project with autonomous prototype flying in the upper right corner. Researchers at the U.S. Army are taking advantage of an unusually unclassified approach to military systems development to ask for help turning a clever robotic fly into an …