Microsoft Announces Windows 10 BlackBerry Launches Passport in India for Rs. 49,990 The World's Slimmest SmartPhone : Gionee Elife S5.1 iOS 8 Has Finally Arrived Apple Unveils iPhone 6 and iPhone 6 Plus

Archive for November 2011

Top 10 World’s Most Powerful Computers

The 38th edition of the top 500 list of the world’s most powerful supercomputers has just been outed highlighting the top 10 supercomputers ranking. Ultimately there’s no considerable changes on the top 10 list but some of listed powerful computers have improved its performance. The Japanese K Computer still tops the list with improved performance boasting almost 4 times faster than its nearest competitor with a performance of 10.51 Petaflops, notably it’s the first computer to surpass 10 petaflops performance level. China’s supercomputer Tianhe-1A immediately follows with 2.57 Petaflops performance. We got the full top ten supercomputers list after the break, check it out.

Here Are The TOP 10 Supercomputers In The World:

1. K Computer – SPARC64 VIIIfx 2.0GHz, Tofu interconnect (Fujitsu)

 

Details:

System Name: K computer
System Family: Fujitsu Cluster
System Model: K computer
Computer: K computer, SPARC64 VIIIfx 2.0GHz, Tofu interconnect
Vendor: Fujitsu
Application Area: Research
Main Memory: 1410048 GB
Installation Year: 2011
Operating System: Linux
Processor: SPARC64 VIIIfx 2000 MHz (16 GFlops)
Cores: 705024
Rmax(GFlops): 10510000
Rpeak(GFlops): 11280384


2. Tianhe-1A – NUDT YH MPP, X5670 2.93Ghz 6C(NUDT)

 

Details:

System Name: Tianhe-1A
System Family: NUDT MPP
System Model: NUDT YH MPP
Computer: NUDT YH MPP, X5670 2.93Ghz 6C, NVIDIA GPU, FT-1000 8C
Vendor: NUDT
Application Area: Research
Main Memory: 229376 GB
Installation Year: 2010
Operating System: Linux
Memory: 229376 GB
Processor: Intel EM64T Xeon X56xx (Westmere-EP) 2930 MHz (11.72 GFlops)
Cores: 186368
Rmax(GFlops): 2566000
Rpeak(GFlops): 4701000


3. Jaguar – Cray XT5-HE Opteron 6-core 2.6 GHz(Cray Inc.)

 

Details:

System Name: Jaguar
System Family: Cray XT
System Model: Cray XT5-HE
Computer: Cray XT5-HE Opteron 6-core 2.6 GHz
Vendor: Cray Inc.
Application Area: Not Specified
Installation Year: 2009
Operating System: Linux
Processor: AMD x86_64 Opteron Six Core 2600 MHz (10.4 GFlops)
Cores: 224162
Rmax(GFlops): 1759000
Rpeak(GFlops): 2331000


4. Nebulae – Dawning TC3600 Blade, Intel X5650(Dawning)

 

Details:

System Name: Nebulae
System Family: Dawning Cluster
System Model: Dawning TC3600 Blade System
Computer: Dawning TC3600 Blade, Intel X5650, NVidia Tesla C2050 GPU
Vendor: Dawning
Application Area: Research
Installation Year: 2010
Operating System: Linux
Processor: Intel EM64T Xeon X56xx (Westmere-EP) 2660 MHz (10.64 GFlops)
Cores: 120640
Rmax(GFlops): 1271000
Rpeak(GFlops): 2984300

5. TSUBAME 2.0 – HP ProLiant SL390s G7 Xeon 6C X5670(NEC/HP)

 

Details:

System Name: TSUBAME 2.0
System Family: HP Cluster Platform 3000SL
System Model: Cluster Platform SL390s G7
Computer: HP ProLiant SL390s G7 Xeon 6C X5670, Nvidia GPU, Linux/Windows
Vendor: NEC/HP
Application Area: Research
Installation Year: 2010
Operating System: Linux
Processor: Intel EM64T Xeon X56xx (Westmere-EP) 2930 MHz (11.72 GFlops)
Cores: 73278
Rmax(GFlops): 1192000
Rpeak(GFlops): 2287630

6. Cielo – Cray XE6 8-core 2.4 GHz(Cray Inc.)

Details:

System Name: Cielo
System Family: Cray XE
System Model: Cray XE6
Computer: Cray XE6 8-core 2.4 GHz
Vendor: Cray Inc.
Application Area: Not Specified
Installation Year: 2011
Operating System: Linux
Processor: AMD x86_64 Opteron 8 Core 2400 MHz (9.6 GFlop)
Cores: 142272
Rmax(GFlops): 1110000
Rpeak(GFlops): 1365811.2

7. Pleiades – SGI Altix ICE 8400EX 2.93 Ghz (SGI)

 

Details:

System Name: Pleiades
System Family: SGI Altix
System Model: SGI Altix ICE 8200EX/8400EX
Computer: SGI Altix ICE 8200EX/8400EX, Xeon HT QC 3.0/Xeon 5570/5670 2.93 Ghz, Infiniband
Vendor: SGI
Application Area: Aerospace
Installation Year: 2011
Operating System: Linux
Processor: Intel EM64T Xeon E54xx (Harpertown) 3000 MHz (12 GFlops)
Cores: 111104
Rmax(GFlops): 1088000
Rpeak(GFlops): 1315328

8. Hopper – Cray XE6 12-core 2.1 GHz(Cray Inc.)

 

Details:

System Name: Hopper
System Family: Cray XE
System Model: Cray XE6
Computer: Cray XE6 12-core 2.1 GHz
Vendor: Cray Inc.
Application Area: Research
Installation Year: 2010
Operating System: Linux
Processor: AMD x86_64 Opteron 12 Core 2100 MHz (8.4 GFlops)
Cores: 153408
Rmax(GFlops): 1054000
Rpeak(GFlops): 1288627.2

9. Tera-100 – Bull bullx super-node S6010/S6030(Bull SA)

 

Details:

System Name: Tera-100
System Family: Bull Bullx
System Model: bullx super-node S6010/S6030
Computer: Bull bullx super-node S6010/S6030
Vendor: Bull SA
Application Area: Defense
Installation Year: 2010
Operating System: Linux
Cores: 138368
Rmax(GFlops): 1050000
Rpeak(GFlops): 1254550

10. Roadrunner – BladeCenter QS22/LS21 Cluster(IBM)

 

Details:

System Name: Roadrunner
System Family: IBM Cluster
System Model: BladeCenter QS22 Cluster
Computer: BladeCenter QS22/LS21 Cluster, PowerXCell 8i 3.2 Ghz / Opteron DC 1.8 GHz, Voltaire Infiniband
Vendor: IBM
Application Area: Not Specified
Installation Year: 2009
Operating System: Linux
Processor: PowerXCell 8i 3200 MHz (12.8 GFlops)
Cores: 122400
Rmax(GFlops): 1042000
Rpeak(GFlops): 1375776
Wednesday, 30 November 2011
Posted by Cyber Freak

Bitdefender Releases Mobile Security App For Android


After five months of beta testing, Bitdefender’s Mobile Security app for Android devices is officially ready for download. And it couldn’t come at a better time; according to a number of recent reports, malware makers have been flooding the Android Market left and right, making it increasingly dangerous for unsuspecting users.
Originally launched in June, Mobile Security has been receiving tweaks and upgrades almost constantly, but now the company says the app is ready for the big leagues, offering both a free version and a paid version, which costs $9.95, and comes with a number of additional protections for Android users. 

With the free version, you’ll get:

• Malware scanner: This feature will automatically scan any new app you download to see if it could ruin your life. You can also initiate an on-demand scan anytime you like. Your device’s SD card will be scanned, as well as the on-board storage.

• Application audit: This feature checks to see what kinds of permissions the apps on your device allow, and tells you if any of them are suspicious. The audit includes checking whether apps require access to the Internet; whether they require access to personal information, like contacts, messages or photo gallery; and whether any apps will cost you money by automatically sending out messages, or initiating phone calls.

• Remote geolocation: Enables users to track the location of their device on Google Maps, in real-time. (Note: GPS must be enabled for this feature to work, of course.)


The paid version includes all the features listed above, and adds the following features:

• Web security: Scans any website requested by the default browser on the device to see if it points to any known phishing or fraudulent URLs, or if the site contains malware or other types of viruses. Those pages are then temporarily blocked, or an alert is shown.

• Remote lock: Lock your device via your online Bitdefender account.

• Remote wipe: Delete all the data from your device from your Bitdefender account. Note: This even deletes the Mobile Security app, so use this one only as a last resort.

• Message/sound alert: Display a message or play a sound on your device via your Bitdefender account.
We must note that, even if you have the Mobile Security app, or a similar app, installed, it’s always important to be discerning when installing any app on your device. Check the permissions an app requires before downloading; if it seems strange that a particular app needs a certain permission, don’t download it. 

Bitdefender’s Mobile Security app is available from the Android Market here. Anyone who has already installed Mobile Security can simply update their app to receive the final version.
Posted by Cyber Freak

Data of 13 Million South Korean Online Game Subscribers Hacked

South Korea's communications regulator said on Saturday that personal information of more than 13 million subscribers of a popular online game of Nexon Korea Corp, a leading game developer in the country, had been leaked in a hacking attack. The Korea Communications Commission (KCC) said in a statement Nexon reported to the commission late Friday afternoon that the company on Thursday discovered the leakage of personal data of its online game Maple Story's 13.2 million subscribers.

The information was leaked weeks before the unlisted company's planned initial public offering of its Japanese affiliate on the Tokyo Stock Exchange on December 14. Nexon aims to raise more than 95 billion yen ($1.2 billion) through the IPO, which would be the largest on the Tokyo bourse this year.

KCC said it, jointly with police and computer security experts, is investigating the hacking case. The leaked data included user IDs, names, resident registration numbers and passwords, it added. A Nexon official said the leaked data neither covered no information on financial transactions and bank account numbers. And it did not affect overseas subscribers of the online game. The company has asked game subscribers to change passwords to prevent additional damage, although the leaked resident registration numbers and passwords were encrypted. The entire subscription membership of Maple Story is about 18 million, the company official said.

Nexon, which has gained a global reputation through Maple Story and online game Kart Rider, is one of the two leading online game developers in South Korea, along with NCsoft Corp. The incident is the largest such security breach case since late July when information of up to 35 million users of an Internet portal and blogging site operated by SK Comms was attacked by hackers from China, exposing the vulnerabilities of networks in the world's most wired country.

Accusations against China over hacking incidents have mounted this year, with allegations it intruded into the networks of Lockheed Martin and other U.S. military contractors and tried to gain access to the Google email accounts of U.S. officials and Chinese human rights advocates. South Korea has drawn up a cyber security master plan after a wave of hacking attacks against global agencies, companies and its own financial firms.
Monday, 28 November 2011
Posted by Cyber Freak

Spotify Hits 2.5 Million Paying Subscribers


Swedish online music star Spotify said Wednesday ahead of a mystery announcement next week that it has reached 2.5 million paying subscribers. "Fanfare! Drum roll! Yes, we're excited to announce that we've now welcomed 2.5 million paying subscribers to the service," Spotify said in a blog post.

Spotify, which launched in Europe in 2008 and expanded to the United States in July, did not provide a country-by-country breakdown for subscribers to the music streaming service. Spotify had 1.6 million paying subscribers in June and much of its recent growth appears to have come from its availability in the United States and an integration with Facebook in September.

Spotify, which boasts a catalog of more than 15 million songs for listening on computers or mobile phones, has more than 10 million registered users. Spotify has invited reporters to attend a press conference in New York on November 30 with chief executive and co-founder Daniel Ek.

"What's next for Spotify?" the invitation teased without providing further details. Last week, Spotify expanded to Austria, Belgium and Switzerland. Spotify offers three services: a free, ad-supported streaming service, an ad-free $4.99 a month plan for computer listening, and a $9.99 a month plan allowing subscribers to download as many songs as they want to a mobile phone.
Friday, 25 November 2011
Posted by Cyber Freak

Google Music Vs. iTunes


Google on Wednesday began selling digital music in a direct challenge to Apple's iTunes and Amazon's online shop. "Today we are happy to announce you can buy millions of songs right from Android Market," Google product manager Paul Joyce said at a press event in Los Angeles. The Internet search giant also announced that its Google Music service was coming out of test mode and is available free of charge to US residents.

Digital songs were available immediately for purchase online at the Android Market and the service will be rolled out to Android-powered smartphones and tablet computers in coming days, Google said.
"Doing a deal with Google for the sale of our repertoire is groundbreaking on a number of levels," said Robert Wells, president of global digital business at Universal Music. 

"We expect this to be a rich new revenue stream for our artists," Wells added while joining music industry peers on-stage at the event. Google signed three of the four major record labels -- Universal, EMI, and Sony Music -- with the holdout being Warner Music, home to Madonna and other artists. Coldplay, Shakira, and the Rolling Stones teamed with Google to celebrate the music store launch by making free or exclusive tracks available. One perk of the new service is the ability to share songs bought at the Android music shop with friends on the Google+ social network for one-time listening.

Google also designed the Music Store to allow independent musicians to be able to sell songs at prices of their choosing. Google in May launched a test version of Google Music, which allows users to store personal collections in the Internet "cloud" for streaming to smartphones, tablet computers or other gadgets.
Google avoided having to cut deals with music labels at the time by letting people store digital versions of songs they already own in online "lockers" which they can access using gadgets linked to the Internet.

As many as 20,000 songs can be stored at Google Music, which was pitched as "a completely legal" service akin to a person storing music collections on home computer hard drives. Google Music takes aim at a similar service launched in March by Internet retail powerhouse Amazon.com and is a long-coming step toward taking on Apple's iTunes digital content shop. With Amazon Cloud Drive and Cloud Player, users can upload digital music, photos, videos and documents to Amazon servers and access the files through Web browsers or phones and tablet computers running Google's Android software.
Monday, 21 November 2011
Posted by Cyber Freak

Hewlett-Packard Unveils Its First Business Laptop "ULTRABOOK"


Hewlett-Packard (HP) on Wednesday unveiled a lightweight laptop computer to take on Apple's MacBook Air in the hot "Ultrabook" arena. The HP Folio will be priced at $900 when it hits the market on December 7, less than two months after the California-based technology titan scuttled plans to abandon making personal computers.

HP tailored the Folio for business, making it thin and light with a battery life of as long as nine hours.
The Folio weighs 3.3 pounds (1.5 kilograms) and features solid state drives along with 13.3-inch (33.8-centimeter) high-definition screens.

"This category of product breaks new ground and will be a likely choice for businesses to offer to employees looking for a more consumer-centric experience," said IDC chief research officer Crawford Del Prete.
"We expect Ultrabooks will re-ignite interest in the small form factor PC category, and by 2015 expect 95 million Ultrabooks will be shipping worldwide annually," the industry analyst said. Folio laptops will be powered by Windows 7 operating systems, which promise to appeal to the broad array of businesses that rely on Microsoft software. A model of Folio will be available with a built-in security chip to encrypt and protect email and stored data, according to HP.

HP's new chief executive Meg Whitman, the former chief executive of online auction giant eBay, said in October that the company will keep its PC division and also resume making tablets.

Whitman's announcements were a dramatic repudiation of strategic decisions which led to the ouster of her predecessor, Leo Apotheker, after less than a year at the helm of the world's biggest computer maker.
Apotheker, who was fired by HP's board in September, had proposed spinning off the PC unit and stopped production of the TouchPad, HP's rival to Apple's iPad, in a shift towards software and services for businesses.
Posted by Cyber Freak

Amazon Sells $199 Tablet At A Loss


Amazon.com Inc.'s Kindle Fire tablet, which started shipping this week, costs $201.70 to make, a research firm said Friday. That's $2.70 more than Amazon charges for it.

The analysis by IHS indicates that Amazon is, at least initially, selling the tablet at a loss that it hopes to cover through sales of books and movies for the device. The manufacturing cost of a new gadget usually comes down over time as chips become cheaper.

Amazon CEO Jeff Bezos told The Associated Press in September that the company's goal was to make a small profit from the hardware, but as a retail company, Amazon was willing to live with a smaller margin than most electronics companies would. "We want the hardware device to be profitable and the content to be profitable. We really don't want to subsidize one with the other," Bezos said.

IHS's estimate includes the cost of components and assembly, but not the costs of development, marketing or packaging. The most expensive part of the Kindle Fire is the 7-inch (17-centimeter) color touch screen, which costs $87. Amazon kept the cost of the tablet low compared to Apple Inc.'s iPad and similar tablets by making it smaller — the screen is half the size of that for the iPad — keeping the amount of memory low and excluding a camera and microphone.

But the difference in manufacturing cost is much smaller than the difference in retail price: IHS puts the cost of the basic iPad 2 model at just under $300, while Apple sells it for $499.
Sunday, 20 November 2011
Posted by Cyber Freak

Best Android Apps

Saturday, 19 November 2011
Posted by Cyber Freak

Kindle Fire vs. Nook Tablet: Which Should You Buy?


Some people want a tablet but don't want to shell out big bucks for it. For those frugal shoppers, this week was special, as it marked the release of the $200 Amazon Kindle Fire and the $250 Barnes & Noble Nook Tablet. Which is a better buy? I tried both for a wide range of tasks--reading books, buying and watching movies, listening to music, browsing the Web and answering email--and found that each has its own strengths and weaknesses. As a result, the right one for you may depend on what you want to do with it. (I pick my favorite for each task below.)


If you're in the market for a color e-reader, the Nook Tablet has the clear advantage, with its superior layouts and more readable, less glary display. But if you're committed to buying and renting media from Amazon, the Kindle Fire may be what you're looking for, despite its shortcomings.

To bring their tablets in at a relatively low price, Amazon and Barnes & Noble had to make sacrifices. As a result, neither tablet matches the versatility of the Apple iPad 2, or even the capabilities of a well-appointed Android 3.2 Honeycomb tablet, such as the Samsung Galaxy Tab 7.0 Plus.

Though the Nook Tablet has slightly better specs than the Kindle Fire (including 1GB of memory versus 512MB), they didn't deliver dramatically different performance, and both have their share of glitches.
But a tablet's overall performance may not be as important as itd ability to do what you want it to do well. Here's my take on which tablet is better at various tasks.


Winner: Nook Tablet
Posted by Cyber Freak

Google Debuts US Music Store

The much anticipated unveiling of Google's digital music store in Los Angeles, Wednesday, Nov. 16, 2011.










Posted by Cyber Freak

Apple Releases iPhone Battery Drain Software Fix


Apple Inc on Thursday released a software update for its iOS 5 operating system to fix complaints on the performance of the new iPhone 4S battery.


Apple, after facing a rash of complaints on the new phone's short battery life, had promised earlier to release an update to address the issue.

The software update also addresses some security issues, including a flaw in the operating system that may allow hackers to build apps that secretly install programs to steal data.
Monday, 14 November 2011
Posted by Cyber Freak

Steve Jobs Is Most Used Name In Media (2011)


"Arab Spring" and "Royal Wedding" were on Wednesday deemed the top phrases of 2011, while late Apple co-founder Steve Jobs is the year's top name, according to a global survey of the English language.
"Occupy" -- be it Iraq or Wall Street -- and "deficit" were the two single top words of the year in a list that reflected global turmoil, the Texas-based Global Language Monitor said.

"Our selections this year to a large extent reflect the ongoing political and economic uncertainty that seems to be affecting much of the developed world -- with notable exceptions such as the British royal wedding and the continuing rise of China," said Paul JJ Payack, president of Global Language Monitor.

Citations for Jobs, who died in October at the age of 56, after an eight-year battle with pancreatic cancer, topped those for the slain al Qaeda leader Osama bin Laden by more than 30 percent, Payack said.
The words and phrases were compiled using a computer algorithm to track the top 75,000 print and electronic media around the globe, as well as the Internet and social networking websites.

The top five phrases of 2011 were rounded out by "anger and rage", characterizing the mood of the global electorate, "climate change", and "the great recession", although it is technically over in the United States.
Posted by Cyber Freak

Internet Keeps Government Honest: Google Chief


Broader adoption of the Internet will keep governments on their toes as wired-up citizens exercise their newfound power to check rights abuses, Google chief Eric Schmidt said on Saturday.  "In nations and communities around the world, citizens are turning to online tools to keep their governments honest," he told business leaders on the sidelines of the Asia-Pacific Economic Cooperation (APEC) forum in Honolulu.

"Whistleblowing has never been so easy," he said. Schmidt cited demonstrations that toppled the leaders of Tunisia and Egypt in which activists used Facebook to schedule protests, Twitter to coordinate them and YouTube to broadcast the events to the world.

"Online citizens can find like-minded allies, they can find like-minded diasporas from a country," he said.
With 52 percent of the global population under the age of 30, the youth can have a bigger say on issues because they are the most prolific users of the Internet.

"They are the ones who are online, that's how you reach them, that's how they talk to each other. They share applications and proxy and circumvention tools and help magnify each others' causes," he said.
But while governments should not ignore online protests, Schmidt also warned that they could be exaggerated. "It's easy in the online world to create the impression of a revolution in the form of noise. It's important to understand what is a legitimate protest and whether it's just people trying to create some noise... some excitement."

Greater adoption of the Internet will lead to the creation of two global systems -- the physical sphere where the government has power over its people and a virtual world where people can have more influence, he said.
Posted by Cyber Freak

10th Anniversary of The iPod

Nov. 10 is the 10th anniversary of the Apple iPod going on sale in U.S. By the start of this year Apple had sold over 300 million iPod units.










Wednesday, 9 November 2011
Posted by Cyber Freak

iPhone 4S Gets Thumbs Up From Consumer Reports


Consumer Reports, the influential magazine for product reviews, gave a thumbs up to Apple's new iPhone on Tuesday after declining to recommend the previous model because of reception problems.
"Apple's newest smartphone (the iPhone 4S) performed very well in our tests, and while it closely resembles the iPhone 4 in appearance, it doesn't suffer the reception problem we found in its predecessor," Consumer Reports said.
"In special reception tests of the iPhone 4S that duplicated those we did on the iPhone 4, the newer phone did not display the same reception flaw," it said in a post on its website. Consumer Reports said the iPhone 4 continues to lose signal strength when a spot is touched on the device's lower left side while in an area with a weak signal. "Because of the flaw, we continue to omit the iPhone 4 from our list of recommended models, despite its otherwise fine performance," Consumer Reports said.

Apple has received some complaints about battery problems with the iPhone 4S but Consumer Reports said the phone "did very well in our standard tests of battery life." "The iPhone 4S and new samples of the iPhone 4 have displayed no notable battery problems in additional special tests we carried out," it said.
Apple said last week it was working to squash software bugs that have caused some iPhone 4S owners to report lower than expected battery life.

"Apple said it would release a software update to address the bugs in a few weeks."
Posted by Cyber Freak

Mozilla Updates Firefox With Twitter Search & Many More


The Windows, Mac and Linux versions of Mozilla’s popular Firefox web browser have been freshened up with new Twitter search options and better control over third-party add-ons.
There’s also a new version of Firefox for Android that gives mobile and tablet users better control over their saved usernames and passwords so no one can access their private details should their device be stolen.

The major new version of Mozilla’s browser, Firefox 8, includes the addition of Twitter to the search bar for the first time. Users can quickly and easily search the microblog for anything that is typed in the search.

"Twitter search is currently available in English, Portuguese, Slovenian and Japanese versions of Firefox, with more languages to come in future releases," reveals Mozilla in a November 8 blog post.

Additional features in Firefox 8 include on-demand tab loading when you restore windows with many tabs (a feature that can be toggled on and off in "Preferences"), automatic third-party add-ons disabling and additional support for web standards such as WebGL, CORS and HTML5.

Master Password is the most notable feature in the latest version of Firefox for Android users.

"With Firefox Master Password, you can protect all your saved usernames and passwords. This will help your private info stay private if you ever share or lose your Android device," explains Mozilla.
According to StatCounter, Firefox was the second most used browser in the world in October with a 26 percent market share. Microsoft’s IE is first with a 40 percent share and Google’s Chrome is gaining ground with 25 percent of the global web browser market.
Posted by Cyber Freak

Adobe Stops Flash For Mobile



When Apple launched the iPhone in 2007, haters declared what would become the world’s most popular phone dead in the water because it didn’t (and still doesn’t) support Adobe Flash. Everyone laughed at Apple. How stupid and arrogant could Steve Jobs really be? Countless forums and jibes at Apple’s expense followed. Fans of other operating systems touted their superiority


Now, just four years later, not even Adobe will support Flash for mobile devices anymore. 
According to an Adobe memo to analysts, uncovered by Jason Perlow at ZDNet, Adobe plans to stop development of Flash for mobile browsers and refocus its efforts on HTML5, which allows browsers to display basically the same kind of content as Flash, but without relying on Adobe’s proprietary technology — i.e. no annoying plugins.

“Our future work with Flash on mobile devices will be focused on enabling Flash developers to package native apps with Adobe AIR for all the major app stores,” reads the memo. “We will no longer adapt Flash Player for mobile devices to new browser, OS version or device configurations. Some of our source code licensees may opt to continue working on and releasing their own implementations. We will continue to support the current Android and PlayBook configurations with critical bug fixes and security updates.”
Of course, the logical question to ask is whether or not Flash will survive on the PC. Apple, which owns 5 percent of the world’s PC market share, does not include Flash as a default install on its computers. And just recently, Microsoft announced that it too will abandon Flash as a default in its upcoming Windows 8 operating system. 

“New open standards created in the mobile era, such as HTML5, will win on mobile devices (and PCs too),” wrote Jobs in an infamous “Thoughts on Flash” post from April 2010. “Perhaps Adobe should focus more on creating great HTML5 tools for the future, and less on criticizing Apple for leaving the past behind.”
Posted by Cyber Freak

Above 600,000 Facebook Accounts Get Hacked Daily

Facebook could be the largest social networking site in the planet right now, that’s why obviously it’ll be the main target for hackers and spammers. It’s quite alarming that more than 600,000 Facebook accounts get hacked daily. So do you think Facebook is doing enough to eradicate these security issues?


According to security firm Sophos, there’s “about 0.06% of a billion logins are compromised each and about 0.5% of facebook users get spammed on a single day.” The firm highlights these numbers while discussing the new features introduced by Facebook. The social networking giant unveiled the “trusted friends” and “App Passwords” to somehow limit users security vulnerabilities. “Trusted Friends” lets user to tag three or four trustworthy friends which in case of lockout will receive security code to retrieve your account back. “App Passwords” is an application which will automatically generate different passwords on your behalf without the burden of remembering them.

These attacks seemed to be contagious and it grows everyday, Facebook isn’t the only one facing this problem. As social networking sites have been fixing this issues, the users should be smart enough to be not a victim. Think before you click.
Wednesday, 2 November 2011
Posted by Cyber Freak

Nokia N9 Reviews

Finally after a long wait for Nokia’s ultimate flagship phone, N9 have gone out officially running the last breath of Meego. And what makes this Nokia flagship really interesting is that it represents the company’s last high-end device as an independent player. The N9 as we look could be the gravestone for Meego, as future flagship from Nokia will utilize Windows Phone and Microsoft’s related services.


Engadget reviews : Interestingly cited that the Nokia N9 “puts any lingering doubts about Nokia’s engineering chops to rest.” As, “N9 delivers a double punch with gorgeous hardware and brilliant software. It’s arguably the first competitive flagship phone to come out of Espoo since the launch of the original iPhone — a stunning feat when you consider how far behind the company was even just a year ago.” Check out here the full review of Nokia N9.

Slashgear also told same story, which highlights; “Nokia has delivered a double-punch of compelling software and beautiful hardware: a device that earned curious, envious glances while we played with it in public, and a platform that was both instantly usable and consistently slick.” And they’re very certain too, of what might have N9 and Meego “could have been” in the mobile market.

To end PhoneArena, even highlight some questions quickly answers on their review, “Is MeeGo a viable OS? Is the Nokia N9 design up to scratch? Is the new camera good enough? The resounding answer is yes, bittersweet though it may be.” Accordingly, they’ve ended up rather ” before we can celebrate, we must commemorate.”

It could be Nokia turns to surprise us with N9 and Meego, and a categorical yes to reclaim its crown, but we can’t blame Nokia for the direction the company has chosen, looking optimistic, –carrying the design of N9 running Windows Phone, they could have a chance –a future.
Posted by Cyber Freak

Google+ Gets New Photo Editing Tool


Google has added a built-in photo editing Creative Kit to its burgeoning social network Google+ and is encouraging its users to try out the new features with a Halloween-themed photo competition.
The new set of editing tools adds support for Instagram-like vintage filters (found under the “Effects” tab), text editing and basic photo manipulation tools such as sharpen, crop, rotate, exposure and resize.

“Of course: we also think photo editing should be lots of fun. So we’ve added some limited-edition Halloween effects to the Creative Kit, and we’re inviting everyone on Google+ to join a ghoulish (and good-spirited) photo competition,” said Vic Gundotra, Senior Vice President of Engineering at Google.

“If you want to make your own Halloween picture (or just have fun embellishing them) try the new photo editing tool in G+. Just click "Edit" when viewing any of your photos, then 'Creative Kit'. Dead simple...” explained Google Senior Vice President of Operations Urs Hoelzle in a Google+ post.

If Google+ is not your thing, there is a myriad of free photo editors to be found online including Photoshop, Aviary, Dr.pic, FotoFlexer, LoonaPix and (Google's recent acquisition) Picknik.

To submit your Halloween picture into the competition simply share it publicly on Google+ along with the hashtag #gplushalloween before November 3.
Tuesday, 1 November 2011
Posted by Cyber Freak

SECURITY ISSUE: Hackers Hit Chemical Companies


Cyber attacks traced to China targeted at least 48 chemical and military-related companies in an effort to steal technical secrets, a U.S. computer security company said Tuesday, adding to complaints about pervasive Internet crime linked to this country. The targets included 29 chemical companies and 19 others that make advanced materials used by the military, California-based Symantec Corp. said in a report. It said the group included multiple Fortune 100 companies but did not identify them or say where they were located. "The purpose of the attacks appears to be industrial espionage, collecting intellectual property for competitive advantage," said the report.

Security experts say China is a center for Internet crime. Attacks against governments, companies and human rights groups have been traced to this country, though finding the precise source is nearly impossible. China's military is a leader in cyberwarfare research but the government has rejected allegations of cyberspying and says it also is a target.

The latest attacks occurred between late July and September and used e-mails sent to companies to plant software dubbed "PoisonIvy" in their computers, Symantec said. It said the same hackers also were involved in attacks earlier this year on human rights groups and auto companies.

Symantec said it traced the attacks to a computer system owned by a Chinese man in his 20s in the central province of Hebei. It said that when contacted, the man provided a contact who would perform "hacking for hire."  Symantec said it could not determine whether the Chinese man was a lone attacker, whether he had a direct or indirect role or whether he hacked the targets for someone else. It called him Covert Grove based on a translation of his Chinese name. The U.S. and Chinese governments have accused each other of being involved in industrial espionage.

Security consultants say the high skill level of earlier attacks traced to China suggests its military or other government agencies might be stealing technology and trade secrets to help state companies.
The chairman of the U.S. House of Representatives Intelligence Committee, Rep. Mike Rogers, said last month that Chinese efforts to steal U.S. technology over the Internet had reached an "intolerable level." He called on the U.S. and other governments to pressure Beijing to stop.

Another security firm, McAfee Inc., said in August it had found a five-year-long hacking campaign that it called Operation Shady Rat against more than 70 governments, international institutions, corporations and think tanks. In February, McAfee said hackers operating from China stole information from oil companies in the United States, Taiwan, Greece and Kazakhstan about operations, financing and bidding for oil fields.
Thousands of Chinese computer enthusiasts belong to hacker clubs and experts say some are supported by the military to develop a pool of possible recruits. Experts say military-trained civilians also might work as contractors for companies that want to steal technology or business secrets from rivals.

China has the world's biggest population of Internet users, with more than 450 million people online, and the government promotes Web use for business and education. But experts say security for many computers in China is so poor that they are vulnerable to being taken over and used to hide the source of attacks from elsewhere.
Posted by Cyber Freak

Categories

Designed by Cyber Freak

News Flash


Blog Archive

Powered by Blogger.

Copyright © Cyber Era News. All rights reserved.- Powered by Eravations - Designed by Shantanu Chauhan -