Thursday, December 30, 2010

New Trojans appeared Android

New Trojans appeared Android

Mobile Security startup Lookout Wednesday (12/29) said that there is a locking device Trojans Android in the Chinese market, Lookout named the Trojans Geinimi, and claim that this is the most complex malware Android, not only will Android device to steal information, and the first zombie networks with similar capabilities Android malware.


Tuesday, December 28, 2010

Harvard Study: DDoS is a weapon as a threat to freedom of expression

Harvard Study: DDoS is a weapon as a threat to freedom of expression

Harvard Law School's Berkman Center for Internet and Society (Berkman Center for Internet and Society) recently published a site subjected to independent media and human rights, denial of service attack (DDoS) reports that this year from last September to 8 months, a total of 280 sites by the 140 attacks.



Saturday, December 25, 2010

IBM revealed the next five years, predicted 3D hologram phone technology into the column

IBM revealed the next five years, predicted 3D hologram phone technology into the column

IBM has announced a project called "Five in Five" technology forecasting, revealed in 2015, five of which people have an important technical progress lifestyle, including the caller will be projected holographic images (holographic) Phone and can a new generation of air-powered battery, the details may refer to YouTube videos .


Friday, December 24, 2010

Microsoft zero-day vulnerabilities affecting IE warning for all IE versions

Microsoft zero-day vulnerabilities affecting IE warning for all IE versions

Microsoft on Wednesday (12/22) released a security bulletin that contains the IE browser, a serious vulnerability that can lead to remote code attack.


Wednesday, December 22, 2010

NEC new blade: single chassis can accommodate UPS, tape backup

NEC new blade: single chassis can accommodate UPS, tape backup
NEC Japan launched new products Express5800/SIGMABLADE blade server, specifically for the company has eight small and medium enterprises under the server launch, strengthen the power, space, and centralized device functions.


Apple removed the application WikiLeaks

Apple removed the application WikiLeaks

WikiLeaks storm caused not only made the Amazon, Paypal, Visa and MasterCard have suspended services at the station, now even Apple have removed the WikiLeaks App Store applications.



Tuesday, December 21, 2010

AT & T to 1.9 billion U.S. dollars to buy Qualcomm's wireless spectrum

AT & T to 1.9 billion U.S. dollars to buy Qualcomm's wireless spectrum

AT & T on Monday (12/20) announced that it has agreed with Qualcomm (Qualcomm) an agreement, the amount of $ 1,925,000,000 will be buying the Lower 700 MHz band licenses in order to strengthen AT & T to provide advanced 4G mobile broadband capabilities.

Monday, December 20, 2010

882 Novell patents: Apple, EMC and Oracle has seen

882 Novell patents: Apple, EMC and Oracle has seen


According to the German Bundeskartellamt federal antitrust authorities in the December 9 to documents revealed by the acquisition of Novell 882 patents CPTN Holdings LLC not only the company behind Microsoft, including Apple (Apple), EMC, and Oracle ( Oracle).

Sunday, December 19, 2010

Apple closed the API iOS escape detection

Apple closed the API iOS escape detection

According to foreign media reports, program developers find iOS 4.2.1 jailbreak has been detected off (jailbreak) behavior-related API, Apple did not explain the reason outside.