Top


Blackberry Phishing Flaw Fixed

October 1, 2009 by · Leave a Comment 

Computers and cellphones alike having security holes here and there. There’s always some way to exploit the user. You just have to have someone who is familiar with the software and such they are trying to crack and they’re in. There’s a loophole for everything really.

The Blackberry had a flaw in its software that allowed phishers to target the users. The attacker would trick the Blackberry into thinking it’s being sent to a trusted website, when in reality the certificate does not actually match the website.

The now updated Blackberry can now detect when a site does not match its certificate. It finds the characters that are creating the problem, and notes when the information doesn’t match. Now, it will not let you go to the untrusted site.

To read even more about this, visit: Information Week: RIM Patches BlackBerry Phishing Flaw

iLike MySpace

August 20, 2009 by · Leave a Comment 

MySpace very recently acquired iLike, a “music recommendation engine” for a hush-hush amount of money.

MySpace has been dropping in popularity for a while now, with Twitter and Facebook leaping ahead. MySpace’s acquisition of iLike will enable them to utilize its technology, and create new applications for the MySpace user. They want music, videos and games to be accessible – nearly all artist media.

If you’re a big fan of iLike, fear not, as MySpace will not be destroying the team that is already there. The services offered by iLike aren’t going anywhere, it is simply becoming a bigger company, with more possibilities for more great services. It certainly sounds like this is a smart move for MySpace. Only the test of time will tell on this one!

Apple Patent Applications Predict New iPhone Possibilities

July 9, 2009 by · Leave a Comment 

The sad thing about new technology is how quickly it gets old. This is good news for the iPhone, which is getting better, one patent at a time. Currently, Apple engineers are in the development stages for some features that render the iPhone 3GS rather old school. As UnwiredView and Engadget closely watch the rollout of Apple’s patent applications, these interesting features come to the fore.

iPhoneThe “What is it?” App
Using an environment-sensitive basis, new iPhones may have the ability to recognize physical objects, barcodes, and RFID tags. Merely by aiming the phone toward any given object, say in a store or in a museum, users can instantly gain real-time information on the object, whether it’s history, prices, or latest news.

And Your Name Is?
If you’ve used the latest version of iPhoto, you may have played with the face-recognition feature of the software. Imagine having the same feature built in to pictures that you take on your iPhone. It could be possible through Apple’s proposed “personal computing device control using face detection and recognition.” Just don’t point your camera at the guy whose name you just can’t remember. That could be rude.

Tighter Text Messages
Just want teens want: more parental control. Apple also proposes a new “text message filtering” feature that could scan every message that comes in, whether in an e-mail or text message, that would eliminate or alert to text messages containing preset keywords or other objectionable elements. It’s more than just a no-no filter, though. It’s a learning tool, too. The new feature could actually stipulate that a certain phone send messages only in Spanish (at certain times), force correct spelling, punctuation, or vocabulary. And if not…the application would alert the parents to the problem.

Intelligent Phone Conversations
Have you ever called or e-mailed someone without realizing that they left you a message that you haven’t listened to? A new feature could prevent this problem. Before you send a message or make a call, the phone can screen your unread messages or e-mails to make sure you have all the info you need before making the call. In fact, even when writing about certain topics, the phone can inform you (based on the keywords in your message) that you may have an unopened e-mail or voice message about that very topic.

Voice Changing
Apple thinks of everything. Chances are, you’ve never been too concerned about changing the sound of the voice in an audio book that you’re listening to, or a podcast you subscribe to. Would it be interesting to hear what Paul McCartney would sound like if he read War and Peace? You might be able to do just that. Audio playback could come equipped with a “different voice” option that gives you a variety of choices for voices—yours, celebrities, and the retinue of stock models.

Apple Releases New Snow Leopard Beta Build

April 27, 2009 by · Leave a Comment 

Apple has released a new beta of its upcoming Snow Leopard version of Mac OS X, Ars Technica reports.

Snow Leopard — version 10.6 — was announced as a quieter update than other recent versions of Apple’s flagship operating system. The company touted under the hood performance tuning this time around, rather than a host of slam-bang new features.

Ars notes that there have been few changes in this most recent update, as the company is drawing closer to the expected release this summer around the time of the Worldwide Developer’s Conference. Apple is encouraging developers to test 64-bit kernel extensions in the latest build, and there are some crashing problems with QuickTime X and Rosetta. There is no mention of the rumored UI enhancements coming with Snow Leopard. Apple is likely saving those for a dramatic unveiling at WWDC.

Apple is also working on an update to Leopard. Ars reports that the company is still testing Mac OS X 10.5.7, which should be released any day now.

Tethered iPhones

March 19, 2009 by · Leave a Comment 

Will They Be Too Much To Handle?

Internet tethering is the process of connecting your cell phone to your computer, and using the phone as a modem. Once your phone is tethered to your computer, you then utilize the wireless 3G network to browse the internet at your leisure. This sounds like a fantastic idea, however it presents a couple of issues.

First off, the iPhone is not meant to tether. There are no straight-forward ways to allow it to tether, though someone managed to find them. Steve Troughton-Smith tweeted about how he managed to hack the tethering features, but doesn’t quite know how he did it.

Apple has brought up the idea of tethering made into a feature in the new iPhone 3.0, however it brings some memories to mind, on whether AT&T’s 3G network could even handle iPhones being used in this way.

At the South By Southwest Festival (SXSW), the iPhones overwhelmed AT&T’s 3G network from all of the browsing. Can you imagine what a bunch of computers using all of that data will do to their network? iPhone’s popularity is great news, especially with the use of all of their media plans, but is it becoming too much for their network to handle?

It looks like both AT&T and Apple are going to have to assess the capabilities of what they’re offering to people, before their whole network fails from overload. If that happened, there would be a lot more unhappy cell phone users running around.

Next Page »

Bottom