<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7409257323887408129</atom:id><lastBuildDate>Fri, 08 Nov 2024 15:26:26 +0000</lastBuildDate><category>Security</category><category>Science</category><category>Webmaster</category><category>Technology and Gadgets</category><category>Microsoft</category><category>Software</category><category>Linux</category><category>Games</category><category>Apple</category><category>Life and Style</category><category>Reviews</category><category>Telecoms</category><category>Facebook</category><category>Computing</category><category>PC-Tips</category><category>Wireless</category><category>Editorials</category><category>Other</category><title>SOFTeNEWS</title><description></description><link>http://softenews.blogspot.com/</link><managingEditor>noreply@blogger.com (NEWS)</managingEditor><generator>Blogger</generator><openSearch:totalResults>333</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-1324825142174819694</guid><pubDate>Mon, 30 May 2011 08:47:00 +0000</pubDate><atom:updated>2011-05-30T01:47:05.573-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple</category><title>Samsung Requests to See Apple’s iPhone 5 and iPad 3</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Samsung-Requests-to-See-Apple-s-iPhone-5-and-iPad-3-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Samsung-Requests-to-See-Apple-s-iPhone-5-and-iPad-3-2.jpg" border="0" height="150" src="http://i1-news.softpedia-static.com/images/news2/Samsung-Requests-to-See-Apple-s-iPhone-5-and-iPad-3-2.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Samsung’s legal department is demanding to see the unreleased iPhone 5 and iPad 3, following Apple’s own request to have a look at some of the Korean company’s unreleased products, sources inform.&lt;br /&gt;
&lt;br /&gt;
People with knowledge of the matter say Samsung is not backing off in its spat with Apple in which the latter is citing major similarities between their products and Samsung’s.&lt;br /&gt;
&lt;br /&gt;
The judge presiding the case already granted Apple access to the Samsung devices, but many of these had already been made public.&lt;br /&gt;
&lt;br /&gt;
By contrast, the next-generation iPhone and iPad are under the Apple-branded veil of secrecy.&lt;br /&gt;
&lt;br /&gt;
Still, the Cupertino tech giant will have no choice but to show them to Samsung’s lawyers, should the judge grant the motion.&lt;br /&gt;
&lt;br /&gt;
A screenshot depicting Samsung’s reciprocal discovery requests to Apple reveals that the Korean electronics manufacturer is asking to see:&lt;br /&gt;
&lt;br /&gt;
a) a sample of the final, commercial version of the next generation iPhone that Apple will release, whether that product will be known as the “iPhone 4S”, “iPhone 5,” or some other name, along with the final version of the packaging in which this product will be delivered to retail customers and a final version of the insert(s) that will be included within such packaging; and&lt;br /&gt;
&lt;br /&gt;
b) a sample of the final, commercial version of the next generation iPad that Apple will release, whether that product will be known as the “iPad 3,” “Third Generation iPad,” or some other name, along with the final version of the packaging in which this product will be delivered to retail customers and a final version of the insert(s) that will be included within such packaging.&lt;br /&gt;
&lt;br /&gt;
Needless to point out, if Samsung is granted its motion to see Apple’s next-gen portables, it will be only the legal department that gets to analyze them to determine the veracity of Apple’s claims for their part.&lt;br /&gt;
&lt;br /&gt;
Should any substantial leak occur around this time, Apple would have yet another reason to point fingers at Samsung in court.&lt;br /&gt;
&lt;br /&gt;
It is worth noting that Samsung is the manufacturer of the A4 and A5 chips found in Apple's iPhones and iPads.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/samsung-requests-to-see-apples-iphone-5.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-817859204269563299</guid><pubDate>Mon, 30 May 2011 08:46:00 +0000</pubDate><atom:updated>2011-05-30T01:46:11.960-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple</category><title>Apple Confirms OS X 10.7 Lion Download via Mac App Store</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Apple-Confirms-OS-X-10-7-Lion-Download-via-Mac-App-Store-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Apple-Confirms-OS-X-10-7-Lion-Download-via-Mac-App-Store-2.jpg" border="0" height="200" src="http://i1-news.softpedia-static.com/images/news2/Apple-Confirms-OS-X-10-7-Lion-Download-via-Mac-App-Store-2.jpg" width="200" /&gt;&lt;/a&gt;The seed note accompanying Mac OS X 10.6.8 10K531 - the third beta build of Apple’s next maintenance update to Snow Leopard - provides the first real confirmation that Apple will be distributing copies of OS X Lion as digital downloads through the Mac App Store.&lt;br /&gt;
&lt;br /&gt;
The fact that Apple distributes Lion betas to developers through the Mac App Store makes it easily deductible that the next major version of the Mac OS will arrive not only on retail disc and thumb USB drive, but via Apple's digital storefront for Mac software as well.&lt;br /&gt;
&lt;br /&gt;
Currently, Apple sells Mac OS X 10.6 (Snow Leopard) copies on DVD.&lt;br /&gt;
&lt;br /&gt;
The Cupertino, California company also distributes the software on USB stick, boxed next to the latest generation of MacBook Air laptops that lack an optical drive.&lt;br /&gt;
&lt;br /&gt;
The seed note for Mac OS X 10.6.8 Build 10K531 (as revealed in a screenshot posted at fscklog.com) is reproduced below:&lt;br /&gt;
&lt;br /&gt;
The 10.6.8 update is recommended for all users running Mac OS X Snow Leopard and includes general operating system fixes that enhance the stability, compatibility, and security of your Mac, including fixes that:&lt;br /&gt;
&lt;br /&gt;
- Enhance the Mac App Store to get your Mac ready to upgrade to Mac OS X Lion&lt;br /&gt;
- Resolve an issue that may cause Preview to unexpectedly quit&lt;br /&gt;
- Improve support for IPv6&lt;br /&gt;
- Improve VPN reliability&lt;br /&gt;
- Identify and remove known variants of Mac Defender.&lt;br /&gt;
&lt;br /&gt;
Notably, Apple also plans to use Mac OS X 10.6.8 to patch the widely-publicized Mac Defender threat.&lt;br /&gt;
&lt;br /&gt;
In a Support document dated May 24, Apple pledged to address Mac Defender in a matter of ‘days’ via software update.&lt;br /&gt;
&lt;br /&gt;
It is unclear whether OS X 10.6.8 will be that update, or whether there will be some other release specifically aimed at the malware.&lt;br /&gt;
&lt;br /&gt;
With WWDC 2011 knocking on our doors with the promise of a final unveiling of Lion, it may just as well be this last Snow Leopard system update.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/apple-confirms-os-x-107-lion-download.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-9018388584035404805</guid><pubDate>Mon, 30 May 2011 08:44:00 +0000</pubDate><atom:updated>2011-05-30T01:44:42.538-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Microsoft Winner of the Best Multinational Workplaces 2011 in Europe Award</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Microsoft is the European king of the best workplaces on the continent, according to the Great Place to Work Institute.&lt;br /&gt;
&lt;br /&gt;
The inaugural winner of the Best Multinational Workplaces 2011 in Europe award is just the latest accolade that the software giant received from the Great Place to Work Institute, although the organization has little to do with the laurels other than surveying the company’s employees.&lt;br /&gt;
&lt;br /&gt;
According to the Redmond giant, in excess of 12,000 of its workers in various markets across the pond participated in the survey.&lt;br /&gt;
&lt;br /&gt;
Still, Microsoft is no stranger to offering Europeans great places to work, since this is not exactly the company’s first award from the Great Place to Work Institute.&lt;br /&gt;
&lt;br /&gt;
"Being named Best Place to Work in Europe for the fourth year in a row is a great honor for us, especially because it's an employee-driven award," revealed Jean-Philippe Courtois, president, Microsoft International.&lt;br /&gt;
&lt;br /&gt;
"We believe the combination of our mission, our people and constantly finding new ways to use technology to help employees communicate and collaborate across cities, borders and around the world, are vital ingredients for attracting, retaining and motivating Europe's best talent."&lt;br /&gt;
&lt;br /&gt;
The Great Place to Work Institute surveyed over than 1.5 million employees across Europe, with Microsoft ending up besting 1,380 companies.&lt;br /&gt;
&lt;br /&gt;
In previous years, the software giant was awarded the Best Large Workplace in Europe accolade three years standing.&lt;br /&gt;
&lt;br /&gt;
“Winning the top spot on our new European Best Multinational Workplaces list, on the back of several national awards, reflects Microsoft’s continued success in creating a working environment where people can thrive,” added José Tolovi Jr, Global CEO for the Great Place to Work Institute.&lt;br /&gt;
&lt;br /&gt;
“The new list recognizes companies that create great workplaces across country borders, as well as cultural and language differences. Operating successfully in multiple countries is a complex job and Microsoft has shown how to create a great workplace in multiple countries through a combination of leadership and smart use of technology.”&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/microsoft-winner-of-best-multinational.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-3957163311652560918</guid><pubDate>Mon, 30 May 2011 08:43:00 +0000</pubDate><atom:updated>2011-05-30T01:43:45.044-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><title>Windows 8 NUI Gaming</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Windows-8-NUI-Gaming-2.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Windows-8-NUI-Gaming-2.png" border="0" src="http://i1-news.softpedia-static.com/images/news2/Windows-8-NUI-Gaming-2.png" /&gt;&lt;/a&gt;Will Windows 8 usher in the era of NUI gaming for computers? Windows 7 certainly didn’t manage to do it, but the potential for marrying natural user interfaces with next generation gaming experiences is there, and is bound to become only more comprehensive with Windows vNext.&lt;br /&gt;
&lt;br /&gt;
Over the weekend, I could not help thinking back to the Touch Pack that Microsoft released a few months after Windows 7 RTM.&lt;br /&gt;
&lt;br /&gt;
The Touch Pack consisted of six titles, three casual games and just as many applications ported from Microsoft Surface to Windows 7. All of them NUI-enabled.&lt;br /&gt;
&lt;br /&gt;
The Touch Pack revealed what kind of NUI experiences Windows 7 was already capable of supporting. I’ve had the chance to play with the Touch Pack’s NUI apps and games most recently in the fall of 2010, on a next generation monitor.&lt;br /&gt;
&lt;br /&gt;
I was joined by a friend who pointed out a range of caveats, including the performance impairment on what was a high end machine, but also obvious interaction limitations. As much as I felt as a kid in a candy store, he was indeed right; Microsoft still had a lot of work to do before NUI gaming on Windows would become reality.&lt;br /&gt;
&lt;br /&gt;
I do see a possibility that Windows 8 will introduce a new level in terms of NUI capabilities, and I do hope that it will be on part with what the Xbox 360 plus Kinect can already do today.&lt;br /&gt;
&lt;br /&gt;
Having done a bit of digging, I can now say that it’s not as simple as just plugging in a Kinect sensor into a Windows 8 machine, and start using it.&lt;br /&gt;
&lt;br /&gt;
Sure, the software giant is already flirting with the idea, with the Kinect for Windows software development kit that the company announced.&lt;br /&gt;
&lt;br /&gt;
The truth is that the Kinect for Windows SDK is simply not enough. There are NUI scenarios which require the most basic of interaction, such as entertainment experiences, but there are also those which will require extremely complex interaction, such as games.&lt;br /&gt;
&lt;br /&gt;
The current Windows 7 gestures API is quite limited in this regard, with support for a little over a handful of gestures, and limitations on just how many of those gestures the users can perform simultaneously.&lt;br /&gt;
&lt;br /&gt;
Windows 8 needs to change this. But in order for this to happen, the Redmond company must make the next version of Windows as appealing as possible to game developers. So more tools are required, code samples, controls, new Application Programming Interfaces (APIs), Visual Studio vNext enhancements, etc.&lt;br /&gt;
&lt;br /&gt;
Since we’ve already seen Windows 8 enhancements such as facial recognition and human presence detection, I’d dare to say that Microsoft is on the right track to supporting NUI gaming with Windows 8. But this is just speculation on my part, and should be taken as such. &lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/windows-8-nui-gaming.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-1417842366038142907</guid><pubDate>Mon, 30 May 2011 08:42:00 +0000</pubDate><atom:updated>2011-05-30T01:42:35.808-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology and Gadgets</category><title>EVGA Prepares GTX 570 HD Classified Graphics Card</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/EVGA-Prepares-GTX-570-HD-Classified-Graphics-Card-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/EVGA-Prepares-GTX-570-HD-Classified-Graphics-Card-2.jpg" border="0" height="172" src="http://i1-news.softpedia-static.com/images/news2/EVGA-Prepares-GTX-570-HD-Classified-Graphics-Card-2.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;EVGA is getting ready to update its product portfolio with a new graphics card built on the GTX 570 design that is targeting overclockers and extreme enthusiasts. The card is called the EVGA GTX 570 Classified and is expected to debut at Computex 2011.&lt;br /&gt;
&lt;br /&gt;
Judging by the preliminary information that is available at this point, the GTX 570 Classified will feature a cooling assembly that looks remarkably similar with the Nvidia reference design.&lt;br /&gt;
&lt;br /&gt;
However, this has been tweaked in order to cope with the increased amount of heat produced by overclocking and EVGA has even redesigned the card's printed circuit board.&lt;br /&gt;
&lt;br /&gt;
Compared to the standard PCB, this now features a 10-layer design, an advanced 6-phase digital GPU VRM, which EVGA states that it can improve overclocking headroom, as well as dedicated voltage readout points.&lt;br /&gt;
&lt;br /&gt;
Additional modifications were also brought to the power delivery systems, as the card now carries a 6+8 pin PCI-Express power connector.&lt;br /&gt;
&lt;br /&gt;
Finally, the HD designation comes from the fact that EVGA's GTX 570 Classified houses a full-sized HDMI 1.4 connector as well as a DisplayPort output, next to the usual pair of dual-link DVI connectors.&lt;br /&gt;
&lt;br /&gt;
Sadly, EVGA hasn't made public the operating frequencies of its graphics card yet, but this is expected to come higher clocked than the Nvidia reference design.&lt;br /&gt;
&lt;br /&gt;
The stock version of the GTX 570 has its core running at 732MHz, while the memory works at 950MHz (3800MHz data rate).&lt;br /&gt;
&lt;br /&gt;
Nvidia's GeForce GTX 570 is based on the company's GF110 GPU and it packs 480 stream processors, 60 texture units, 40 ROP units and a 320-bit wide memory bus that is connected to 1.25GB of GDDR5 video buffer.&lt;br /&gt;
&lt;br /&gt;
As mentioned earlier, the EVGA GTX 570 Classified is expected to make its debut at Computex 2011. No details regarding pricing are available at this time. &lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/evga-prepares-gtx-570-hd-classified.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-1793734091130329990</guid><pubDate>Mon, 30 May 2011 08:41:00 +0000</pubDate><atom:updated>2011-05-30T01:41:39.698-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology and Gadgets</category><title>ViewSonic Also Provides a 24-Inch Smart Monitor</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/ViewSonic-Also-Provides-a-24-Inch-Smart-Monitor-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/ViewSonic-Also-Provides-a-24-Inch-Smart-Monitor-2.jpg" border="0" height="200" src="http://i1-news.softpedia-static.com/images/news2/ViewSonic-Also-Provides-a-24-Inch-Smart-Monitor-2.jpg" width="200" /&gt;&lt;/a&gt;With the folks over at Computex now getting ready to get the show on the road, ViewSonic, like so many others, has prepared a whole collection of items to show off, one of which is an LCD smart monitor.&lt;br /&gt;
&lt;br /&gt;
On a market where performance is already so high that variation in it can go by unnoticed, companies have started to expand their horizons.&lt;br /&gt;
&lt;br /&gt;
To be more specific, the image quality and overall performance of today's displays is no longer the only feature that prospective buyers look for.&lt;br /&gt;
&lt;br /&gt;
Power efficiency is one asset that is getting attention, but it looks like monitors and HDTVs that have extras like web connectivity and such are favored, to some extent.&lt;br /&gt;
&lt;br /&gt;
That said, ViewSonic developed a 24-inch LED-backlit monitor that has all the performance anyone could hope for, down to 3D support.&lt;br /&gt;
&lt;br /&gt;
The widescreen aspect ratio (16:9) makes a nice pair with the Full HD support (resolution of 1,920 x 1,080 pixels).&lt;br /&gt;
&lt;br /&gt;
Also, the newcomer has a very good response time (2ms), plus a contrast ratio of 20,000,000:1 and a refresh rate of 120 Hz (3D demands no less).&lt;br /&gt;
&lt;br /&gt;
All in all, the V3D245wm-LED should be able to show off high picture detail and color accuracy, while the SRS Premium Surround sound and HDMI 1.4 support complete the feature set.&lt;br /&gt;
&lt;br /&gt;
“We have continued to invest in our strategic partnerships with Microsoft and Google,” said Alan Chang, ViewSonic Managing Director of Europe and Asia-Pacific.&lt;br /&gt;
&lt;br /&gt;
“At Computex, you will see that ViewSonic is not content with standing still and are continuing to innovate with 'display solutions', ranging from small as three inch ultra mobile devices to large 300 inch professional display solutions, all brought to the user with the ViewSonic attention to quality and service."&lt;br /&gt;
&lt;br /&gt;
In addition to this product and the 10-inch ViewPad 10Pro, the outfit also prepared a pico projector and a digital photo frame, plus a series of camcorders. &lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/viewsonic-also-provides-24-inch-smart.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-6881816343738814503</guid><pubDate>Mon, 30 May 2011 08:40:00 +0000</pubDate><atom:updated>2011-05-30T01:40:22.290-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Webmaster</category><title>Twitter Reveals Anonymous British Twitter User to Court</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Twitter-Reveals-Anonymous-British-Twitter-User-to-Court-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Twitter-Reveals-Anonymous-British-Twitter-User-to-Court-2.jpg" border="0" height="200" src="http://i1-news.softpedia-static.com/images/news2/Twitter-Reveals-Anonymous-British-Twitter-User-to-Court-2.jpg" width="200" /&gt;&lt;/a&gt;A lawsuit involving Twitter is causing a lot of fuss in the UK and elsewhere, since Twitter revealed account details and private data of a Twitter account holder to the authorities. The main concerns is that this puts a dampen on free speech online, however, Twitter acted in full compliance of the law and, like in the past, notified the account holder and gave him time to respond and fight the claim.&lt;br /&gt;
&lt;br /&gt;
The city council of South Tyneside, in the UK, accused an anonymous blogger and Twitter user going by the name Mr Monkey of libeling council members.&lt;br /&gt;
&lt;br /&gt;
The council asked a California court for details about the user so that charges could be brought against him.&lt;br /&gt;
&lt;br /&gt;
Twitter was ordered to supply all of the relevant info, but notified the user in question, Ahmed Khan, a South Tyneside councilor, that a court asked for his details.&lt;br /&gt;
&lt;br /&gt;
The user had the opportunity to challenge the claim, while remaining anonymous. However, he declined to do so, not being familiar with the US legal system and being afraid of the legal costs associated with fighting a lawsuit abroad.&lt;br /&gt;
&lt;br /&gt;
Twitter then proceeded to hand over the requested data, as it is required by law. Khan also received a copy of all of the data revealed. Khan denies being the author of the libelous accounts.&lt;br /&gt;
&lt;br /&gt;
Twitter revealed the data for five accounts, only two of which Khan says are his. While he denies being involved, he does say he has been critical of the council in the past and believes the council is spending too much money with the lawsuit.&lt;br /&gt;
&lt;br /&gt;
He also claims he doesn't need anonymity to express his views on the council members or their politics. Rather, he says he fears that whistleblowers which may have contacted him over Twitter may be revealed as a consequence of the lawsuit.&lt;br /&gt;
&lt;br /&gt;
The main concern about the lawsuit is that it is the first time, at least in the UK, where a California court was used successfully to retrieve information on Twitter users. However, Twitter did all that it could legally do to ensure that the users are protected. &lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/twitter-reveals-anonymous-british.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-4405064528501619433</guid><pubDate>Mon, 30 May 2011 08:34:00 +0000</pubDate><atom:updated>2011-05-30T01:34:17.721-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Networking Equipment Manufacturer Exposes Secret Password Recovery Procedures</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Networking-Equipment-Manufacturer-Exposes-Secret-Password-Recovery-Procedures-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Networking-Equipment-Manufacturer-Exposes-Secret-Password-Recovery-Procedures-2.jpg" border="0" height="248" src="http://i1-news.softpedia-static.com/images/news2/Networking-Equipment-Manufacturer-Exposes-Secret-Password-Recovery-Procedures-2.jpg" width="320" /&gt;&lt;/a&gt;Networking equipment manufacturer Allied Telesis has accidentally leaked an internal support document describing backdoors into its devices.&lt;br /&gt;
&lt;br /&gt;
The document, which was labeled as "INTERNAL ONLY," was inadvertently made public on its website and subsequently indexed by Google.&lt;br /&gt;
&lt;br /&gt;
The question answered in it was "How do I obtain a backdoor password for my Allied Telesis device" and contained solutions for different types of network switches.&lt;br /&gt;
&lt;br /&gt;
"Depending on the device that you are locked out of, there is either a built in Backdoor function, or a way to generate a password, based on the MAC address of the device," the support entry read.&lt;br /&gt;
&lt;br /&gt;
In addition, it had several files attached, including default password lists, a password generator program and special instructions.&lt;br /&gt;
&lt;br /&gt;
The content was copied and posted on file sharing websites before the company had a chance to remove it from public access.&lt;br /&gt;
&lt;br /&gt;
"The Backdoor Passwords listed here are INTERNAL ONLY. Do not give this information freely to any customer as this can compromise a network," a note on the document reads.&lt;br /&gt;
&lt;br /&gt;
This warning has sparked fears that attackers can use the information to attack network switches, however, these procedures require physical access to the devices.&lt;br /&gt;
&lt;br /&gt;
The manufacturer claims they are industry standard password recovery features and says the use of the term "backdoor" was unfortunate.&lt;br /&gt;
&lt;br /&gt;
"All documentation describing this password recovery process as a proprietary 'backdoor' feature is incorrect, and has been removed from the website," Allied Telesis said, according to threatpost.&lt;br /&gt;
&lt;br /&gt;
"By definition this is not a 'backdoor' feature; it is a standard password recovery process for a person who has physical access to the device," it added.&lt;br /&gt;
&lt;br /&gt;
Nevertheless, security experts have argued that the use of MAC addresses to generate backup administrative passwords is not secure because they can be easily determined.&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal, chief technology officer at Veracode, said that vendors could use cryptographic methods to sign the password reset commands and have the devices verify them.&lt;br /&gt;
&lt;br /&gt;
Allied is now working on removing the information from websites that posted it and they have also informed their support personnel about the leak.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/networking-equipment-manufacturer.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-5440974017196403960</guid><pubDate>Mon, 30 May 2011 08:33:00 +0000</pubDate><atom:updated>2011-05-30T01:33:08.140-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>DNSSEC Adoption Endangered by Controversial US Anti-Piracy Bill</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/DNSSEC-Adoption-Endangered-by-Controversial-US-Anti-Piracy-Bill-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/DNSSEC-Adoption-Endangered-by-Controversial-US-Anti-Piracy-Bill-2.jpg" border="0" src="http://i1-news.softpedia-static.com/images/news2/DNSSEC-Adoption-Endangered-by-Controversial-US-Anti-Piracy-Bill-2.jpg" /&gt;&lt;/a&gt;A group of renowed experts have released a technical paper warning members of the US Senate that DNS-related provisions of a new anti-piracy bill endangers DNSSEC deployment and the security of the Internet infrastructure.&lt;br /&gt;
&lt;br /&gt;
The controversial PROTECT (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act) IP Act proposes some very aggressive anti-piracy measures, some of which rely on DNS servers to blacklist domains that participate in copyright infringement.&lt;br /&gt;
&lt;br /&gt;
The group of DNS experts, which includes Dan Kaminsky, the researcher who discovered a critical DNS flaw that pushed forward the adoption of DNSSEC, Steve Crocker, vice chair of the board of ICANN, Damballa co-founder David Dagon, VeriSign chief security officer Danny McPherson, and Paul Vixie, chairman, chief scientist and founder of Internet Systems Consortium, claim the PROTECT IP provisions are contrary to the US government's commitment to Internet security.&lt;br /&gt;
&lt;br /&gt;
Domain Name System Security Extensions (DNSSEC) are a suite of specifications meant to secure DNS, one of the critical components of the Internet infrastructure.&lt;br /&gt;
&lt;br /&gt;
With DNSSEC, the requests between DNS resolvers and authoritative servers are signed, which ensures the integrity and authenticity of responses. This prevents DNS cache poisoning and other attacks.&lt;br /&gt;
&lt;br /&gt;
"DNS filters would be evaded easily, and would likely prove ineffective at reducing online infringement. Further, widespread circumvention would threaten the security and stability of the global DNS," the experts write in their paper. [pdf]&lt;br /&gt;
&lt;br /&gt;
"The DNS provisions would undermine the universality of domain names, which has been one of the key enablers of the innovation, economic growth, and improvements in communications and information access unleashed by the global Internet," they add.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the PROTECT IP provisions encourage migration away from ISP-provided DNS servers. This is a problem because many ISPs use DNS data to detect security threats on their networks and improve performance.&lt;br /&gt;
&lt;br /&gt;
The group of experts feel that the goals of the bill can be reached through other means, like international cooperation on prosecutions, without endangering DNS security and stability.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/dnssec-adoption-endangered-by.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-80870988966962801</guid><pubDate>Sat, 28 May 2011 02:50:00 +0000</pubDate><atom:updated>2011-05-27T19:50:14.012-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Telecoms</category><title>Android Market Grows, Downloads Remain Behind</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Android-Market-Grows-Downloads-Remain-Behind-3.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Android-Market-Grows-Downloads-Remain-Behind-3.png" border="0" height="254" src="http://i1-news.softpedia-static.com/images/news2/Android-Market-Grows-Downloads-Remain-Behind-3.png" width="320" /&gt;&lt;/a&gt;Google's Android Market, the portal through which all users of devices running under the platform can download and install applications, is growing fast, with some of the latest predictions on the area suggesting that it would be able to outpace the Apple App store this summer.&lt;br /&gt;
&lt;br /&gt;
However, while the number of applications available for download from the storefront is on the rise, things are a little different when it comes to users' habits of downloading them. &lt;br /&gt;
&lt;br /&gt;
&lt;span id="intelliTxt"&gt;Out of hundreds of thousands of applications available through the software portal, only 96 of them have been downloaded over 5 million times, a recent report (&lt;a href="http://distimo.cmail3.com/t/r/l/jdbttk/khuitlili/r/" rel="nofollow" target="_blank"&gt;PDF&lt;/a&gt;) from Distimo shows. &lt;br /&gt;
&lt;br /&gt;
Moreover, there is only one application that topped the 50 million downloads mark, the Google Maps, which makes it the most popular software in the storefront. &lt;br /&gt;
&lt;br /&gt;
Further more, things are not looking good at all for around 20 percent of the free applications available through the Android Market, as they were downloaded less than 100 times until now. &lt;br /&gt;
&lt;br /&gt;
The said report also shows that 80 percent of all paid &lt;strong&gt;applications&lt;/strong&gt; were downloaded less than 100 times all around the world as well. &lt;br /&gt;
&lt;br /&gt;
When compared to the Apple App Store, the Android Market clearly poses some more challenges to application developers than Apple's portal does. &lt;br /&gt;
&lt;br /&gt;
“The refresh rate of top application charts is significantly higher in the Apple App Store for iPhone than in the Google Android Market,” Distimo explains. &lt;br /&gt;
&lt;br /&gt;
“During the month of April, there were 94 distinct applications with a top 10 (free or paid) position in the Apple App Store for iPhone in the US; there were only 26 distinct applications that reached a top 10 position in the Google Android Market.”&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;span id="intelliTxt"&gt;When it comes to games, things are looking bad for Android as well, since only five games in the Market have over 250,000 downloads around the world, while the App Store had ten of them topping that mark in the US alone in the last two months. &lt;br /&gt;
&lt;br /&gt;
Have a look at the graphs attached to this article to see the total downloads of all applications in the &lt;strong&gt;Android Market&lt;/strong&gt; between April 1 – May 19 in the United States. &lt;br /&gt;
&lt;br /&gt;
“The download tiers above show the proportion of applications that were downloaded worldwide between these intervals. The figures reveal that the majority (51.8%) of free applications have been downloaded less than 1,000 times to date,” the report shows. &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/android-market-grows-downloads-remain.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-2030257689889476009</guid><pubDate>Sat, 28 May 2011 02:47:00 +0000</pubDate><atom:updated>2011-05-27T19:47:24.816-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Telecoms</category><title>Nokia to Release New Devices Faster than Before</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Nokia-to-Release-New-Devices-Faster-that-Before-2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Nokia Windows Phone concept" border="0" height="138" onload="if(this.width&amp;gt;1290){ document.getElementById('imgfgf').innerHTML = '&amp;lt;img src=/_img/generic/warning_16.gif align=absmiddle /&amp;gt; &amp;lt;b&amp;gt;The image below has been resized. Click on it to enlarge.&amp;lt;/b&amp;gt;'; document.getElementById('imgfgf').style.display = 'block'; this.width=810; }" src="http://i1-news.softpedia-static.com/images/news2/Nokia-to-Release-New-Devices-Faster-that-Before-2.jpg" style="border: 1px solid rgb(238, 238, 238); padding: 5px;" title="Nokia Windows Phone concept" width="200" /&gt;&lt;/a&gt;Finnish mobile phone maker Nokia is gearing up for the release of its first handsets powered by Microsoft's Windows Phone operating system, which would bring a change in the frequency at which it brings to the market new devices.&lt;span id="intelliTxt"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Apparently, along with its Windows Phone handsets, Nokia is also expected to put in place a faster device release schedule, so that more Nokia smartphones are available for purchase, faster. &lt;br /&gt;
&lt;br /&gt;
“We should be launching new devices in a rhythm that might be every couple of months, every three months, something like that,” Nokia's executive vice president of smart devices, Jo Harlow, stated recently.&lt;br /&gt;
&lt;br /&gt;
With Nokia bringing to the market handsets based on Windows Phone, the adoption of the platform is expected to rise among end users.&lt;br /&gt;
&lt;br /&gt;
Apparently, the fact that Nokia adopted Windows phone as its primary OS is of great importance, for the future of both the platform and of the handset vendor.&lt;br /&gt;
&lt;br /&gt;
According to Jo Harlow, while other companies see Windows Phone as their secondary OS, Nokia would mark a change in that, and Microsoft's software would gain more market share.&lt;br /&gt;
&lt;br /&gt;
“We're going to keep coming with new devices in order to have something to talk about,” Harlow reportedly stated.&lt;br /&gt;
&lt;br /&gt;
This year, Nokia should bring to the market a small number of handsets running under Windows Phone Mango, she confirmed, adding that more of them should be released in 2012.&lt;br /&gt;
&lt;br /&gt;
Previous reports also suggested that Nokia might be set to launch its first dual-core Windows Phone device next year, with a ST-Ericsson chip inside.&lt;br /&gt;
&lt;br /&gt;
However, that would happen only towards the end of the next year, and the focus at the moment would be on releasing phones that would prove good options for more users out there.&lt;br /&gt;
&lt;br /&gt;
With Nokia in its team, and newly added partners, Microsoft would be able to make the platform available at more price points, in more markets that before.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/nokia-to-release-new-devices-faster.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-3422957613658174397</guid><pubDate>Sat, 28 May 2011 02:45:00 +0000</pubDate><atom:updated>2011-05-27T19:45:23.809-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Telecoms</category><title>Personify Mobile App for Android Phones Now Available for Download</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-2.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-2.png" border="0" height="200" src="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-2.png" width="200" /&gt;&lt;/a&gt;Personify Mobile is a powerful business tool and one of the first platform solutions for associations, professional societies, fundraising organizations and other non-profits.&lt;br /&gt;
&lt;br /&gt;
Developed by TMA Resources, a company focusing on providing association management software (AMS), Personify Mobile is fully integrated with the Personify association management software system, allowing staff and authorized members to perform a wide range of information, commerce and self-service functions.&lt;br /&gt;
&lt;br /&gt;
Initially available for Apple's iPhone, the application has now been ported on Android devices to provide rich functionality and access to key features, even when the Internet is not available.&lt;br /&gt;
&lt;br /&gt;
The application is built using CircleBack platform, formally known as Powered by DUB or DubMeNow.&lt;br /&gt;
&lt;br /&gt;
“Many organizations have settled for iPhone only applications or single use applications based on an individual event. Personify Mobile goes further and provides members with much of the functionality that they find on their association’s Web site. Using their phone, members can manage conference schedules, update profiles, donate to worthy causes, and even purchase products,” said George Breeden, TMA Resources senior director, Product Marketing.&lt;br /&gt;
&lt;br /&gt;
According to TMA Resources, support for the Blackberry platform will be available in the near future.&lt;br /&gt;
&lt;br /&gt;
A fully functional demo of Personify Mobile can be downloaded from the Android Market as well as the iPhone App store.&lt;br /&gt;
&lt;br /&gt;
Some of the key features of the Personify Mobile include: Android, BlackBerry and iPhone devices compatibility, staff management of members records, profile management, customer self-service notifications, member directory, contact exchange in-person or using email, featured products and events, searchable event calendar and detailed conference information, industry news feeds, and offline support.&lt;br /&gt;
&lt;br /&gt;
However, the demo seems to be only available for authorized users that want to evaluate the Android version of Personify Mobile.&lt;br /&gt;
&lt;br /&gt;
The application is compatible with all devices running Android OS 2.1 or newer and requires 2.6MB storage space.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-3.jpg" src="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-3.jpg" /&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-4.jpg" src="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-4.jpg" /&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-5.jpg" src="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-5.jpg" /&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-6.jpg" src="http://i1-news.softpedia-static.com/images/news2/Personify-Mobile-App-for-Android-Phones-Now-Available-for-Download-6.jpg" /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/personify-mobile-app-for-android-phones.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-1579168095903460764</guid><pubDate>Sat, 28 May 2011 02:42:00 +0000</pubDate><atom:updated>2011-05-27T19:42:40.076-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Reviews</category><title>Hide, Lock, Encrypt, Wipe Folders – Free and Portable App</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://i1-news.softpedia-static.com/images/news2/Portable-Secure-Folder-Review-2.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/Portable-Secure-Folder-Review-2.png" border="0" height="320" src="http://i1-news.softpedia-static.com/images/news2/Portable-Secure-Folder-Review-2.png" width="275" /&gt;&lt;/a&gt;Secure Folder has been designed with the purpose to keep your files safe from prying eyes. It locks your data using 256-bit AES Rijndael algorithm and can also hide the items from view.&lt;br /&gt;
&lt;br /&gt;
Keeping information safe these days is not quite easy to achieve, despite the plethora of apps promising strong protection. In many case easy workarounds can open the door to your data. There are few programs that can indeed withstand cunning attacks.&lt;br /&gt;
&lt;br /&gt;
But sometimes the easies solutions are the best. Secure Folder is a nifty little freebie geared up with plenty of protective features for your files. Besides encrypting your data it can also hide it from view. Moreover, you can use it to map a folder to a drive for easier access to that location; its functionality also includes a secure deletion component and a system cleaner.&lt;br /&gt;
&lt;br /&gt;
The application comes both as a desktop installation as well as a portable download. If you go with the second there is no need to install, just unzip the contents and use.&lt;br /&gt;
&lt;br /&gt;
Regardless how you decide to bring the program on your system you’ll face one of the simplest interfaces. All the options are condensed in the upper part of the window and most of the space is reserved for the folders you add and want to protect.&lt;br /&gt;
&lt;br /&gt;
Secure Folder is protected by a countersign (“password”) from the very first moment you launch it. You are advised to change it for better protection, as this is the only key that can remove the security measures you enforce upon your data.&lt;br /&gt;
&lt;br /&gt;
Support for drag and drop makes it easy to load up the directories you want to protect. A set of three options is at your disposal: lock the item, hide it or encrypt it. Of course, you can choose all of them to ensure maximum protection.&lt;br /&gt;
&lt;br /&gt;
However, if locking and encrypting the folder work like a charm, hiding it does not really throw the invisibility cloak on them. We were able to bring it to surface by simply instructing Windows Explorer to display protected operating system files. Also, we noticed that the hiding occurs regardless of the security measure you impose in the software.&lt;br /&gt;
&lt;br /&gt;
On the other hand locking and encrypting really did the job. The folder affected by these security measures showed zero size and we could not breach them.&lt;br /&gt;
&lt;br /&gt;
An important aspect is that you always know which folders are protected and the protection measures enforced just by simply taking a gander at the main application window. Right near the secured folder you will see the protection modes currently on keeping it safe: “L” stands for Lock,” H” stands for Hide and “E” stands for Encrypt.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/hide-lock-encrypt-wipe-folders-free-and.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-2505780504458726361</guid><pubDate>Sat, 28 May 2011 02:40:00 +0000</pubDate><atom:updated>2011-05-27T19:40:56.690-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Reviews</category><title>Drag &amp; Drop to Upload to Box.net</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;It is getting easier by the day to upload date into an online storage account. With SimpleShare from Box.net this procedure reaches the utmost simplicity level as dragging and dropping the data into its interface is all it takes to get them into your upload folder of your Box account.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="http://i1-news.softpedia-static.com/images/news2/SimpleShare-Review-2.png" src="http://i1-news.softpedia-static.com/images/news2/SimpleShare-Review-2.png" /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The application is not exactly a desktop client for the online service, but rather an upload manager, designed to facilitate uploading data to your account to the maximum.&lt;br /&gt;
&lt;br /&gt;
SimpleShare is a 10.2MB download and it does not take great computer skills to put on your system. Installation procedure is actually a click-through process, which can be handled by beginner users as well, with no effort at all.&lt;br /&gt;
&lt;br /&gt;
The freebie obviously addresses Box.net users, but if you want to benefit from its advantages creating an account takes less than a minute. If you opt for the free, personal plan you get 5GB of web storage, easy sharing of data and access to your account from a mobile device. On the downside, you cannot upload files larger than 25MB.&lt;br /&gt;
&lt;br /&gt;
There isn’t much investment in the looks of the application as these are plain and simple, with the application window composed of two tabs: one is for viewing the basic details of your Box.net account and access the online upload folder while the other offers the configuration options.&lt;br /&gt;
&lt;br /&gt;
As far as details about your account are concerned, you will be provided only with the current quota state of the web storage. This is presented in percent but you also have the cold numbers.&lt;br /&gt;
&lt;br /&gt;
All the data you upload in your online account is stored in a specific folder which is created the moment your account becomes active. With SimpleShare you can easily access the contents of this directory, but, more importantly you can upload files there by simply dragging and dropping the items in its interface.&lt;br /&gt;
&lt;br /&gt;
On the downside, there is no obvious hint to betray the fact that an upload job is in progress. Only if you look closely at the system tray icon you will notice it filling up; also, when the task completes a message pops up informing you that the file has been uploaded. But apart from this, which is quite difficult to spot, there isn’t any other indication.&lt;br /&gt;
&lt;br /&gt;
A progress bar in the interface of the program would have been a neat solution, or at least display the progress in percentage upon moving the mouse over the icon.&lt;br /&gt;
&lt;br /&gt;
Uploading items when dropping them in the interface is not the only trick SimpleShare has been conferred. The app also gives you the possibility to take screenshots of specific areas of your desktop or the entire screen and automatically upload them.&lt;br /&gt;
&lt;br /&gt;
A more important screen recording solution, though, is capturing video of your work on the computer. Video recording job is triggered by a keyboard shortcut, Shift+Alt+5, which you can change to something more convenient. Just select the region you want to capture and everything will be caught on “tape”. The “stop” button is present in the lower right corner of the captured region. Once you click it, SimpleShare automatically starts uploading the newly created FLV file.&lt;br /&gt;
&lt;br /&gt;
The configuration screen of the application is nothing complicated and all the options are shown in a clear manner, with no room for confusion. The list of settings includes the possibility to delete data once it is uploaded, disable automatic uploads or enable SimpleShare to start with Windows.&lt;br /&gt;
&lt;br /&gt;
A very useful option is copying the URL of the uploaded when it is online. Since Box.net can be used for sharing data and collaborative tasks, this feature comes in very handy as it allows you to securely send the link to anyone you want.&lt;br /&gt;
&lt;br /&gt;
“Preferences” screen is also the place to change the default shortcuts for taking a snapshot of the desktop, a specific area or defining the section for the screencast.&lt;br /&gt;
&lt;br /&gt;
The same options available in the application window of SimpleShare are also available in the context menu of the app’s tray icon. Here you can even see a list of the data that has already been uploaded and access it online.&lt;br /&gt;
&lt;br /&gt;
The Good&lt;br /&gt;
&lt;br /&gt;
Getting data from your desktop to your Box.net account was already an easy job, but SimpleShare made it even easier. You just have to drop it in the interface and the upload process begins in an instant.&lt;br /&gt;
&lt;br /&gt;
At the end of the transfer the link to the file is automatically placed in Windows Clipboard, so you can share it with others. You can take screenshots of your desktop and even video clips and get them online.&lt;br /&gt;
&lt;br /&gt;
The Bad&lt;br /&gt;
&lt;br /&gt;
Though the application is simple, it still lacks several features that would make its usage more comfortable. Making the transfer progress more visible and displaying the details of the job would be most welcomed in a future version of the product. A warning in the case of files exceeding the supported limit of a free account before starting the upload would also work well.&lt;br /&gt;
&lt;br /&gt;
The Truth&lt;br /&gt;
&lt;br /&gt;
All the problems SimpleShare seems to have are related to the lack of the proper features. It is the easiest upload managers we’ve seen. Further development should include at least minor adjustments to view the transfer progress.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/drag-drop-to-upload-to-boxnet.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-5881422713731627643</guid><pubDate>Sat, 28 May 2011 02:32:00 +0000</pubDate><atom:updated>2011-05-27T19:32:28.434-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>'Dislike' Button Scam Rapidly Propagating on Facebook</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Security researchers at the security firm Sophos have lately revealed that, Facebook scammers are scamming users into pasting rogue code into their web browser's address bars to get a Dislike button added to their options.&lt;br /&gt;
&lt;br /&gt;
The spam messages published by victims say "Facebook now has a dislike button! Click 'Enable Dislike Button' to turn on the new feature!"&lt;br /&gt;
&lt;br /&gt;
The scammers are making use of a hoax to substitute the Share link that is visible under the message with an "Enable Dislike Button" one. If anybody clicks the link, spam message will be shared from the user's account to all their contacts and friends. However, it also runs malicious code on their systems.&lt;br /&gt;
&lt;br /&gt;
Cautioning the netizens, Graham Cluley, Senior Technology Consultant at Sophos stated that, as they had explained earlier, there is no formal or authorized dislike button offered by Facebook and wasn't ever probable to be. He further added that, however it remains something that several Facebook users would like, and thus scammers generally utilized the offer of a 'Dislike button' to scam the innocent netizens, as reported by Global Tvbc on May 18, 2011.&lt;br /&gt;
&lt;br /&gt;
Another scam utilizing the Dislike button attraction is circulating by prompting users to paste malicious JavaScript code into their web browser's address bar.&lt;br /&gt;
&lt;br /&gt;
This tactic is low-tech and should create a whole lot of doubt, but still, numerous users are falling prey to this scam.&lt;br /&gt;
&lt;br /&gt;
Commenting on the above mentioned spam campaigns, which are circulating rogue code in the procedure of their execution, Fred Wolens, Spokesman, Facebook stated that, the spammers have redrafted their actions or activities so that it evades Facebook's scam identification system," as reported by ebrandz on May 18, 2011.&lt;br /&gt;
&lt;br /&gt;
Fred further added that, netizens should be cautious and spread awareness. Users must ensure that their friends should be careful of the messages and alerts posted on their walls. He stated that, if someone receives such kind of messages, then he should immediately hide it or mark as spam. Marking the message as spam might be a better option as users can then help Facebook enhance its security from the future prospects.&lt;br /&gt;
&lt;br /&gt;
Conclusively, Wolens stated that, Facebook is learning and enhancing the situation with every single new spam campaign and repetition of its defenses.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/dislike-button-scam-rapidly-propagating.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-8675252173367070927</guid><pubDate>Sat, 28 May 2011 02:31:00 +0000</pubDate><atom:updated>2011-05-27T19:31:57.832-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>UK Student Hacker Gets Suspended Jail Sentence Over Malware Scam</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;A 22 year old student of the UK University, Paul McLoughlin, has been released with a suspended prison sentence after being arrested for utilizing malware to steal users' login credentials for websites related to, as reported by PC World on May 18, 2011.&lt;br /&gt;
&lt;br /&gt;
The Metropolitan Police central e-crime Unit (PCeU) stated that, McLoughlin was held responsible for compromising passwords from around 100 users and 20 user accounts, including one from his own, Salford University, as reported by PC World on May 18, 2011.&lt;br /&gt;
&lt;br /&gt;
The offender scammed preys into installing what was supposed to be a software solution to avoid game licensing which had concealed within it the simply-available and effectual Windows password compromising utility called iStealer.&lt;br /&gt;
&lt;br /&gt;
If downloaded, this tool can search an extensive array of passwords on the computer, comprising even those for e-mail, web browsers, quick messaging, social networking websites, login credentials and his deliberate target, gaming websites and services.&lt;br /&gt;
&lt;br /&gt;
Crimes of McLoughlin came into limelight after a US citizen and iStealer prey got in touch with the Salford University, which further communicated the matter to the police.&lt;br /&gt;
&lt;br /&gt;
On investigating the matter, Police ultimately traced the attack to a software pretending as a gaming utility that had been installed by McLouglin onto the file-sharing networks. Police, working in a close association with the security vendor McAfee and the University of Salford, recognized the encrypted aspects of an FTP server inserted within the malware, a finding that acknowledged McLouglin as a key offender in this instance.&lt;br /&gt;
&lt;br /&gt;
Investigators think that the offender was encouraged by a wish to access free gaming facilities instead of making money through the trick, as he (McLoughlin) got an 8 months sentence - suspended for 12 months.&lt;br /&gt;
&lt;br /&gt;
Commenting on the whole matter, Colin Wetherill, Detective Inspector of the Police Central eCrime Unit stated that, a trial for this specific crime is exceptional and comes under section 3A of the Computer Misuse Act 1990. He added that, in their attempts to maintain the Internet as a secure place, they will dynamically examine and impeach cyber criminals utilizing these tactics, while putting into practice the experience attained to their investigations into those engaged in more grave and planned kinds of cybercrime," as reported by The Register on May 18, 2011.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/uk-student-hacker-gets-suspended-jail.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-1923443649395825550</guid><pubDate>Thu, 26 May 2011 14:34:00 +0000</pubDate><atom:updated>2011-05-26T07:34:04.222-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Novel Version of Alureon Malware Identified</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;A novel variant of Alureon Trojan (also recognized as TDSS, TDL, and Tidserv) has been identified lately by Microsoft researchers, as reported by HELP NET SECURITY on May 17, 2011.&lt;br /&gt;
&lt;br /&gt;
The Alureon Trojan has been in existence since 2007, and it's task comprise primarily in enabling the criminal to interrupt inward and outward Internet traffic so that he can gather private information and data, such as login details and credit/debit card details, but also to enable him to compromise the hacked machine with extra amount of malware.&lt;br /&gt;
&lt;br /&gt;
Furthermore, Alureon is a famous and usually researched malware family that has few rootkit-like abilities in few of its variations. The latest version of the malware displays some behavior that researchers haven't observed earlier and which make it more troublesome for anti-malware software to find it and for experts to segment down its parts.&lt;br /&gt;
&lt;br /&gt;
With the passage of time, the Alureon family of Trojans has been altered and directed to access rootkit abilities and utilized numerous tactics to stay concealed from the PC's user as well as AV solutions.&lt;br /&gt;
&lt;br /&gt;
Microsoft took aside the latest version of Alureon and discovered that the malware presently utilizes what is basically a brute-force attack to decrypt its own encrypted parts.&lt;br /&gt;
&lt;br /&gt;
Commenting on the matter, Dennis Fisher, Researcher at Microsoft, stated that, a specific set of files was consuming more than usual time to display malicious behavior than others. The researchers began finding out reason for all this, and concluded with a link from the past. He further stated that, at this point and situation the malware was utilizing Win32/Crypto-style decryption to avoid anti-virus solutions, as reported by Threat Post on May 16, 2011.&lt;br /&gt;
&lt;br /&gt;
He further added that, the decryption feature or task maintains a documentation of all earlier attempted keys to evade using the similar key again and so running for an extraordinarily long time on a user's computer. He said that, this indicates that, the function will attempt a maximum 255 times prior to successfully finding the key. This magic value utilized during the final decryption step was earlier recovered from the header of the encrypted file.&lt;br /&gt;
&lt;br /&gt;
The researchers further added that, however, that's not just the obfuscation and avoidance tactics this novel variant utilizes. Besides, it distributes the encrypted data all through the code, data, as well as resources, additionally obscuring the stagnant retrieval of the encrypted file.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/novel-version-of-alureon-malware.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-5985058011237234217</guid><pubDate>Thu, 26 May 2011 14:33:00 +0000</pubDate><atom:updated>2011-05-26T07:33:01.643-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Ratio of Malicious Downloading: Microsoft</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Microsoft stated on Tuesday (May 17, 2011) that one out of every 14 programs downloaded by Windows users displays the presence of malicious software.&lt;br /&gt;
&lt;br /&gt;
Although modern browsers are well equipped with security features that are designed to caution users and bar them from unsafe software, about 5% of these users generally ignore these alarms and ends up downloading spiteful Trojan horse programs.&lt;br /&gt;
&lt;br /&gt;
Even till the past five years, it was quite effortless on the part of hackers to steal away or decode information from computers. Innumerable browser bugs were present and a lot of users were not even good at patching. But, at present, browsers have turned out to be more secure and software developers can easily take away patches, in case of any problem.&lt;br /&gt;
&lt;br /&gt;
Additionally, instead of decoding the browsers, hackers utilize a method called social engineering. For instance, this method is utilized in spreading spam among users through social network Facebook. In the disguise of presenting important and spicy news, users were being attracted to click on a malicious program.&lt;br /&gt;
&lt;br /&gt;
According to Alex Stamos, a founding partner with Isec Partners, a security consultancy, attackers are quite acquainted with the fact that users cannot be easily fooled around in downloading Trojans, as reported by COMPUTERWORLD on May 17, 2011.&lt;br /&gt;
&lt;br /&gt;
These sort of social-engineering hackers also instigate into infecting victims by hacking into several web pages and exploding fake antivirus warnings that seems like messages from the operating system, "Download these and you're infected."&lt;br /&gt;
&lt;br /&gt;
Enterprises are also prospective victims to a kind of social-engineering technique called spear phishing. In this technique, criminals take time to find out about their victims and create a special crafted program or a malevolent document to be enough attractive to the victims.&lt;br /&gt;
&lt;br /&gt;
According to Joshua Talbot, a manager with Symantec Security Response, attackers are quite intelligent and take the full advantage of any event that may turn down or attract people's attention. On tracking down 50 most popular malicious program during 2010, Symantec revealed that 56% of the attacks contained Trojan horse programs, as reported by COMPUTERWORLD on May 17, 2011.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/ratio-of-malicious-downloading.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-195862468139701553</guid><pubDate>Thu, 26 May 2011 14:32:00 +0000</pubDate><atom:updated>2011-05-26T07:32:31.827-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Spammers Didn’t Switch their Tactics during Q1-2011</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;As per the Kaspersky Labs' first quarterly report for 2011,cybercriminals did not much make use of new techniques for spam circulation and used the same conventional tactics during the first quarter of 2011.&lt;br /&gt;
&lt;br /&gt;
One of the most well admired techniques, as per Kaspersky, was to dispatch links to a video clip promoting spammer services, another tactic observed was dispatching e-mails that says "Stop sending me spam" supposedly authored by an annoyed receiver of spam. The e-mail was actually a spam in itself with a video link directing the reader to a spammer's website.&lt;br /&gt;
&lt;br /&gt;
Spammers also exploited the Japanese earthquake and tsunami disaster to dispatch spam e-mails capitalizing on these events and persuading victims to pay cash for false donations and fake relief funds.&lt;br /&gt;
&lt;br /&gt;
Besides spam, the latest report notifies regarding malware. During Q1- 2011, Trojan-Spy.HTML.Fraud.gen sustained its top rank in the Top 10 list of malicious programs circulated through e-mail traffic. This Trojan makes use of spoofing technology and emerges in the appearance of an HTML webpage. The report highlights that, it appears with a phishing e-mail including a video link to a bogus website similar to that of a famous bank or e-pay system, where the user is requested to furnish a login as well as a password.&lt;br /&gt;
&lt;br /&gt;
The report further stated that, the other leading entry in the Top 10 most malicious programs was an e-mail worm family that collects e-mail ids and circulate them through e-mail traffic.&lt;br /&gt;
&lt;br /&gt;
Finally, Kaspersky's recent report also highlighted phishing statistics observed by the company during the first quarter of 2011. The amount of phishing e-mails was quite small and accounted for just 0.03% of the total e-mail traffic. The firm highlighted that, PayPal and eBay remained in the objectionable position of being the companies most regularly attacked by the phishers.&lt;br /&gt;
&lt;br /&gt;
Commenting on the matter, Maria Namestnikova, Senior Spam Analyst at Kaspersky Lab, stated that, remarkably during Q1-2011 Google services, such as Google Checkout and Google AdWords were less taregted. The phishers shifted their focus to the extremely famous Brazilian social networking website, Orkut ( owned by Google), as reported by Techzone360 on May 13, 2011. She further stated that, it is worth pointing out that accounts of the users related to Google's services, including Orkut, are interlinked. Therefore, having got credentials for any one of these accounts, a phisher can avail any Google service registered with the similar user.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/spammers-didnt-switch-their-tactics.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-2455043959356829876</guid><pubDate>Thu, 26 May 2011 14:31:00 +0000</pubDate><atom:updated>2011-05-26T07:31:58.013-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Andy Dolich Victimized by an E-mail Scam</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Exactly 1,398 of Andy Dolich's best friends or contacts got the same spam e-mail on April 13 (2011) that Andy was in some kind of problem and he badly needed their assistance, as reported by Mercury News on May 19, 2011.&lt;br /&gt;
&lt;br /&gt;
Remarkably, Andy Dolich is an American sports executive, and presently runs a sports consultancy, Dolich &amp;amp; Associates, in Los Altos, California.&lt;br /&gt;
&lt;br /&gt;
The alleged e-mail notified readers that Dolich was in London, where his passport and credit cards were stolen, and he was looking out for some "quick funds" to return to his home.&lt;br /&gt;
&lt;br /&gt;
To send him financial help, which he guaranteed to pay back, he could be contacted at his listed e-mail id or at a cited phone number at the "hotel's help desk."&lt;br /&gt;
&lt;br /&gt;
Commenting on the matter, Dolich stated that, he had a friend in London who believed this (e-mail) was sent from London, and who attempted to find him said that, he will help him. He further stated that, his 2 other affluent friends, not the kind to be influenced, were about to send financial help, but didn't. He further highlighted that, he was quite sure that few people must have sent money, as reported by Mercury News on May 19, 2011.&lt;br /&gt;
&lt;br /&gt;
Dolich later found out that his Google account has been compromised by cyber criminals.&lt;br /&gt;
&lt;br /&gt;
Unluckily, the scam that targeted several of Dolich's friends and contacts was the 419 scam or the notorious Nigerian scam.&lt;br /&gt;
&lt;br /&gt;
There are diverse variations, but majority of them have the similar technique. A web-based e-mail account is compromised (similar to that of Dolich in the above mentioned instance). Then the cybercriminal imitates the victim (as Dolich in above mentioned instance), dispatching an emergency help to the victim's all the contacts and friends. Further, the security experts highlighted that, the message generally has few variation on getting attacked or robbed and urges the recipient of the e-mail to send money to a location the criminal can access.&lt;br /&gt;
&lt;br /&gt;
Due to the maliciousness related to the scams of the above mentioned kind, security experts suggest users that, if they are actually concerned regarding a friend being troubled abroad, then they should firstly try to confirm the incidence through phone to check if they left the nation in the first place. Additionally, always keep in mind that, if a friend is in some overseas location, all foreign nations host embassies and consulates of other nations will help travelers who are trapped abroad.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/andy-dolich-victimized-by-e-mail-scam.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-7179776562485617728</guid><pubDate>Thu, 26 May 2011 14:31:00 +0000</pubDate><atom:updated>2011-05-26T07:31:26.370-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>HM Treasury Regularly Witnesses 'hostile' Cyber Attacks</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Recently, the Google's Zeitgeist conference was held on 16 May 2011. George Osborne, UK's Chancellor of the Exchequer, highlighted during the conference that, during 2010 "hostile intelligence agencies" were accountable for several grave and pre-planned efforts to compromise the Treasury's computer and access personal and financial information. He stated that, these were element of a vast number of cyber attacks on government networks, which overall got over 20,000 malicious e-mails monthly, as reported by Guardian on May 17, 2011.&lt;br /&gt;
&lt;br /&gt;
Previously during 2011, UK Home Secretary William Hague declared that attackers had effectively compromised government networks with the Zeus trojan or "Zbot", as reported by Naked Security on May 16, 2011.&lt;br /&gt;
&lt;br /&gt;
Certainly, majority of the attacks believed to be targeting the UK government are targeting other organizations and businesses across the globe also. Governments and companies equally face the challenge of protecting their systems, as well as their private information from the cybercrooks.&lt;br /&gt;
&lt;br /&gt;
The chancellor notified the Google Zeitgeist conference regarding an e-mail dispatched to the Treasury and its international collaborators during 2010. The e-mail was attached with a document. After few minutes, the similar e-mail appeared to have been again sent to the same distribution list.&lt;br /&gt;
&lt;br /&gt;
Mr. Osborne stated that, as a matter of fact, in the second e-mail, the genuine attachment was exchanged with a file including malicious code. He added that, it would have simply appeared to the receiver of the e-mail that the attachment had been dispatched twice, as reported by FT on May 16, 2011.&lt;br /&gt;
&lt;br /&gt;
The probable intent, as with nearly all cyber attacks on state IT systems, was to gain access to few of the several market information that the Treasury holds, making it one of the most famous targets for such strikes.&lt;br /&gt;
&lt;br /&gt;
During early 2011, UK Home Secretary William Hague announced that attackers had effectively compromised government networks with Zeus Trojan, as reported by Naked Security on May 16, 2011.&lt;br /&gt;
&lt;br /&gt;
Mr. Osborne stated that, during February 2011, William Hague, Foreign Secretary elaborated a series of efforts by foreign intelligence agency to access market sensitive information from British systems, as reported by THE WALL STREET JOURNAL on May 16, 2011.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/hm-treasury-regularly-witnesses-hostile.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-7427080433806040346</guid><pubDate>Tue, 24 May 2011 02:30:00 +0000</pubDate><atom:updated>2011-05-23T19:30:16.449-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology and Gadgets</category><title>Step back in time in San Francisco with Time Shutter iPhone app</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/318/original.jpg?1306160397" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="right" height="315" src="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/318/original.jpg?1306160397" width="210" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;I traveled to San Francisco earlier this month to run the 100th Bay to Breakers 12K, so while I was making personal history I decided to brush up on my San Francisco history, too. While wandering the hilly streets of the Bay City, I equipped my iPhone with app Time Shutter — San Francisco Deluxe (it's also available for iPod Touch), which provides hundreds of historic city images and their present-day counterparts.&lt;br /&gt;
&lt;br /&gt;
My hotel was on Union Square — a perfect jumping-off point for the more than 240 images provided in Time Shutter. Within the app, users are treated to a slideshow (it will run automatically or at your swiping speed, whichever your preference) of historical, fully captioned images of San Francisco landmarks. Immediately after each rendering, you'll see the present version of the location. Double tapping the screen will transition the images so you can quickly morph between the present and past.&lt;br /&gt;
&lt;br /&gt;
Many of the included sites have been preserved, so the Flood Building looks similar to its 1908 version (minus the Gap, of course). Other sites didn't make it through history as successfully, though — the Orpheum Theatre-turned-parking-garage was a bit depressing. The app developers clearly made an effort take present-day photos as close to the angle and perspective as shown in the historic rendering. All of the locations included in Time Shutter are also denoted (and numbered) on a geo-coded map, which I found useful to create my own walking tour.&lt;br /&gt;
&lt;br /&gt;
You don't have to be within city limits to enjoy Time Shutter — San Francisco Deluxe, but if you are standing on, say, Geary between Powell and Stockton streets, you can snap your own image of Union Square to create your own photo album. An overlay of the rendering will appear in your viewer so you can match it with your current view as closely as possible.&lt;br /&gt;
&lt;br /&gt;
Time Shutter — San Francisco Deluxe is $1.99, but a free version of the app (with 100 fewer photos) is also available. I found the app to me more than worth its price, and I hope the developers consider launching the product in other cities.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://www.appolicious.com/finance/apps/130040-appolicious-appolicious"&gt;Download the free Appolicious iPhone app&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/step-back-in-time-in-san-francisco-with.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-6480069333240250688</guid><pubDate>Tue, 24 May 2011 02:28:00 +0000</pubDate><atom:updated>2011-05-23T19:28:59.334-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology and Gadgets</category><title>Square processing $3 million in mobile payments every day</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/336/original.jpg?1306178486" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="right" height="315" src="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/336/original.jpg?1306178486" width="210" /&gt;&lt;/a&gt;Mobile payment service Square seems to be exploding in popularity.&lt;br /&gt;
&lt;br /&gt;
The startup hasn’t been around for too long, but it has recently picked up some steam with the release of a credit card reader for Apple’s (AAPL) iOS devices. Using the little device that plugs into iPhones and iPads, users can actually scan credit cards and process payments using Square’s mobile app.&lt;br /&gt;
&lt;br /&gt;
Apparently, that service is pretty great, because Square has shipped 500,000 of those little credit card readers. It also has processed 1 million transactions so far in May and is clearing $3 million in payments every single day, according to TechCrunch. Apple has even endorsed Square by selling the $9.95 credit card reader in its stores.&lt;br /&gt;
&lt;br /&gt;
Square recently pulled in $27.5 million in funding and investments from Visa (V), as well, and did $66 million in payment volume in the first quarter of 2011. At this rate, Square is on pace to do $1 billion in payment volume within the year. It’s also planning to add new services and expand its usefulness, starting with updates to its mobile apps.&lt;br /&gt;
&lt;br /&gt;
Already, Square offers apps for iPhone, iPad and Android that are compatible with its credit card reader, which plugs into the headphone jack of those devices. Basically, that service allows businesses to accept credit card payments, even if they don’t have the traditional terminals necessary to do so. The iPad app has been revamped recently to offer better ways of organizing sale items for retailers and ways of inputting variations on those items, and a refined user experience.&lt;br /&gt;
&lt;br /&gt;
Square is also rolling out a new service called Square Register, according to TechCrunch. The service will allow retailers to basically replace their cash registers altogether by using iPads in point-of-sale transactions. Register carries all the same functionality that used to come with Square – namely, the ability to accept credit card payments for businesses by just using a mobile device – but Register also has a companion app that helps increase communication between retailers and their customers.&lt;br /&gt;
&lt;br /&gt;
With the older version of Square, once a transaction was complete, retailers could send along receipts to their customers either by email or SMS message. Register allows business owners to send a link to download an app to their customers as well, called Square Card Case, which basically stores loyalty cards for the businesses that use Square. That encourages users to become repeat customers, showing information about the businesses, other businesses that accept Square, and what customers are buying at those businesses, on top of all the useful info like orders and receipts.&lt;br /&gt;
&lt;br /&gt;
Square Card Case also has one other cool function for repeat customers: those users will actually be able to put forward transactions as they’re heading out to a store, using a “use tab” function that lets Square basically skip using their credit card altogether. Square prepares the information when you’re within two blocks of the business, allowing you to just tell the retailer you buy from frequently your name, and leaving Square to do the rest of the work. Since you’re a repeat customer, your info is all on file with Square anyway – the merchant processes the transaction using your name and info and you receive a push notification when your credit card is charged. Meanwhile, Square Register and Square Card Case provide all kinds of analytics-type information to retailers, letting them know purchase habits so they can make smart business decisions.&lt;br /&gt;
&lt;br /&gt;
Square Card Case will only be available for the iPhone, and it’s not yet available to the general public. About 50 retailers are using the service right now, but Square expects Register to become the norm for its users pretty quickly. Judging by how many transactions the company is processing right now, that seems entirely likely.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/square-processing-3-million-in-mobile.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-3917212124610042852</guid><pubDate>Tue, 24 May 2011 02:27:00 +0000</pubDate><atom:updated>2011-05-23T19:28:12.497-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technology and Gadgets</category><title>Android tablets won’t take off without any killer apps</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/337/original.jpg?1306180553" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="right" height="300" src="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/337/original.jpg?1306180553" width="196" /&gt;&lt;/a&gt;Earthquakes. PlayStation hacks. Call it a double whammy -- and it's wreaking havoc on Sony's expected earnings. In a year when Sony thought it would perform strong, the Japanese consumer electronics maker is suddenly facing losses.&lt;br /&gt;
&lt;br /&gt;
Sony on Monday revised its consolidated results forecast for the fiscal year ended March 31. The good news is that Sony expects sales, operating revenue, and operating income to be in line with its February forecast despite the impact of the earthquake in Japan. The bad news is that Sony will bleed $3.2 billion of operating profit and miss its annual earnings forecast in the wake of the earthquake.&lt;br /&gt;
&lt;br /&gt;
"The earnings drop preannouncement seems oversized and really highlights the exposure that cloud services have to hacker proclivities," said Al Hilwa, a program manager at IDC. "We have seen that viruses in the past have seriously impacted licensed software, but the impact on revenues is typically long-term and much less acute compared to these network outages."&lt;br /&gt;
&lt;br /&gt;
Supply-Chain Interruptions&lt;br /&gt;
&lt;br /&gt;
Sony also expects to take a hit on incremental expenses related to the earthquake, including restoration costs for sites damaged by the disaster. Sony figures it will spend 11 billion yen, or $134 million, to fix buildings, machinery and equipment as well as inventories. However, insurance should cover most of those costs.&lt;br /&gt;
&lt;br /&gt;
"Our supply chain was significantly damaged by the earthquake and tsunami. In addition to direct damages, component-procurement conditions and power outages are also affecting our operation," said Masaru Kato, executive vice president and CFO of Sony.&lt;br /&gt;
&lt;br /&gt;
"We have spent the time until last week investigating the conditions of recovery from this damage and reviewing our business plan whilst taking our new forecast into account, which has resulted in today's announcement. It has taken some time to reevaluate our business plan to include the impact of the earthquake, and this is one of the reasons that has caused a two-week delay in the normal timing of our year-end earnings announcement."&lt;br /&gt;
&lt;br /&gt;
Remembering 1995&lt;br /&gt;
&lt;br /&gt;
On April 19, Sony fell prey to another type of earthquake -- the largest data theft ever -- when hackers broken into Sony servers and stole the personal information of more than 100 million consumers. When the dust settled, the Internet activist group Anonymous disclosed logs that showed security holes in Sony's servers.&lt;br /&gt;
&lt;br /&gt;
Sony's losses are the largest the company has seen in 16 years. Not ironically, it was also a combination of unfortunate factors that led to those losses. In 1995, a devastating earthquake in Kobe and challenges to Sony's movie business negatively impacted earnings. The news also means that Sony, which was expected to rebound under the leadership of CEO Howard Stringer, could post three straight years of losses.&lt;br /&gt;
&lt;br /&gt;
Despite the disruption, Sony moved ahead with the news of its Sony Tablet with Android 3.0, which differentiates itself in the market with dual touchscreens. The device is supposed to launch this fall, perhaps too little and too late to make up for the losses related to the PlayStation Network hacking.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Google’s body of work&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/338/original.jpg?1306180563" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="right" height="180" src="http://c1345842.cdn.cloudfiles.rackspacecloud.com/assets/cdn_files/assets/000/002/338/original.jpg?1306180563" width="300" /&gt;&lt;/a&gt;Google seems to be stepping in the right direction, however. Google Earth is a better experience on an Android tablet since its latest update, offering photo-realistic 3D building views that had previously only been accessible with the desktop version. Google Body, an interactive 3D anatomy app, also shows some great potential for what could be done with education apps in the future.&lt;br /&gt;
&lt;br /&gt;
A lot of the time, however, such tablet apps are merely incremental improvements to their smartphone relatives, not game changers. It’s up to developers to create killer apps, and Android isn’t the only one at fault here: the iPad, too, suffers from a lot of half-assed tablet conversions that don’t really offer much. Developers continue to think about converting a smartphone or PC experience onto a tablet, instead of designing uniquely for the tablet itself. It’ll take some time, but once tablets become less ‘foreign’ and a standard experience that everyone can enjoy (rather like smartphones now) I think that the innovation will arrive.&lt;br /&gt;
&lt;br /&gt;
Trouble is, even with all the brains at Google and all the pushing of Honeycomb-based tablets upon us, we’re still not that close to seeing truly innovative Android tablet apps yet. It’ll happen for sure, but Google could get left behind in the tablet wars if it doesn’t start to convince us that it’s the apps themselves that make an Android tablet truly worth purchasing, not just some fancy hardware specs and a good-looking OS.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/android-tablets-wont-take-off-without.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7409257323887408129.post-4616184842375240560</guid><pubDate>Tue, 24 May 2011 02:24:00 +0000</pubDate><atom:updated>2011-05-23T19:24:05.555-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Games</category><title>Earthquake and PSN Hacking Will Cost Sony Dearly</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Earthquakes. PlayStation hacks. Call it a double whammy -- and it's wreaking havoc on Sony's expected earnings. In a year when Sony thought it would perform strong, the Japanese consumer electronics maker is suddenly facing losses.&lt;br /&gt;
&lt;br /&gt;
Sony on Monday revised its consolidated results forecast for the fiscal year ended March 31. The good news is that Sony expects sales, operating revenue, and operating income to be in line with its February forecast despite the impact of the earthquake in Japan. The bad news is that Sony will bleed $3.2 billion of operating profit and miss its annual earnings forecast in the wake of the earthquake.&lt;br /&gt;
&lt;br /&gt;
"The earnings drop preannouncement seems oversized and really highlights the exposure that cloud services have to hacker proclivities," said Al Hilwa, a program manager at IDC. "We have seen that viruses in the past have seriously impacted licensed software, but the impact on revenues is typically long-term and much less acute compared to these network outages."&lt;br /&gt;
&lt;br /&gt;
Supply-Chain Interruptions&lt;br /&gt;
&lt;br /&gt;
Sony also expects to take a hit on incremental expenses related to the earthquake, including restoration costs for sites damaged by the disaster. Sony figures it will spend 11 billion yen, or $134 million, to fix buildings, machinery and equipment as well as inventories. However, insurance should cover most of those costs.&lt;br /&gt;
&lt;br /&gt;
"Our supply chain was significantly damaged by the earthquake and tsunami. In addition to direct damages, component-procurement conditions and power outages are also affecting our operation," said Masaru Kato, executive vice president and CFO of Sony.&lt;br /&gt;
&lt;br /&gt;
"We have spent the time until last week investigating the conditions of recovery from this damage and reviewing our business plan whilst taking our new forecast into account, which has resulted in today's announcement. It has taken some time to reevaluate our business plan to include the impact of the earthquake, and this is one of the reasons that has caused a two-week delay in the normal timing of our year-end earnings announcement."&lt;br /&gt;
&lt;br /&gt;
Remembering 1995&lt;br /&gt;
&lt;br /&gt;
On April 19, Sony fell prey to another type of earthquake -- the largest data theft ever -- when hackers broken into Sony servers and stole the personal information of more than 100 million consumers. When the dust settled, the Internet activist group Anonymous disclosed logs that showed security holes in Sony's servers.&lt;br /&gt;
&lt;br /&gt;
Sony's losses are the largest the company has seen in 16 years. Not ironically, it was also a combination of unfortunate factors that led to those losses. In 1995, a devastating earthquake in Kobe and challenges to Sony's movie business negatively impacted earnings. The news also means that Sony, which was expected to rebound under the leadership of CEO Howard Stringer, could post three straight years of losses.&lt;br /&gt;
&lt;br /&gt;
Despite the disruption, Sony moved ahead with the news of its Sony Tablet with Android 3.0, which differentiates itself in the market with dual touchscreens. The device is supposed to launch this fall, perhaps too little and too late to make up for the losses related to the PlayStation Network hacking.&lt;/div&gt;&lt;/div&gt;</description><link>http://softenews.blogspot.com/2011/05/earthquake-and-psn-hacking-will-cost.html</link><author>noreply@blogger.com (NEWS)</author><thr:total>0</thr:total></item></channel></rss>