KDDI fx0: Firefox smartphone with transparent body

[ad#ad-2]

fKDDI fx0: Firefox smartphone with transparent body:

Here is an interesting model for you guys out there who look for differences. The Japanese provider KDDI is now offering the “fx0” on – a smartphone with Firefox OS and special package. As fx0 is definitely an eye-catcher: Unlike other models, the smartphone components namely stuck with this device in a transparent housing. The Firefox mobile phone is made from LG; Similarities with the LG G3 are therefore not entirely coincidental.

Technically very innovative

With the transparent case the fx0 would attract attention. But Technically it holds no surprises. It is driven by a smartphone Snapdragon 400 processor from Qualcomm, which is clocked at 1.2 GHz. Installed continue to be a 2370-mAh battery, 16 gigabytes of data memory, 1.5 GB RAM, as well as NFC and LTE. For the resolution of the display and Mozilla KDDI did not have any information. Do it with the “Firefox OS” developed by the Mozilla Foundation.

f2

 

Price and availability

The KDDI fx0 comes for the equivalent of around 400 euros in the trade and will initially be released only in Japan. Since it is a mobile phone that is produced for a local provider, a sale is unlikely in this country.

There is a lot of expectation around this model throughout the globe despite its limited release. So if the model do well in terms of performance, it will enable the model to establish in many places.Keep visiting the site to know about further updates. Good day…!! 🙂

[ad#ad-2-1]

s

Skype: listening function discovered in Android app?

[ad#ad-2]

s

Skype: listening function discovered in Android app?:

Eavesdropping on Skype? Due to a security vulnerability in the chat app is Android phones to make spy camera and a microphone. we investigated.

The no disturbing scenario: Your Android phone indicates an incoming Skype call, but the ringing ends abruptly. No problem, the caller may have placed no more or simply network suddenly. According to recent reports and rumors on the net but you can hear you at this very moment from you. If an error in the Skype system torn a vulnerability?

Accidentally discovered

A user of the technology blogs Reddit happens to come across this “bug” feature and describes how easily this can be exploited: The caller must ensure only on two arbitrary devices into the instant messaging service log and the alleged victim on an Android Call via Skype device. When the phone rings, the caller disconnects the network connection of the apparatus used and then you have probably just have to wait yet. So the called Android device registers the connection is aborted and tried to call back the caller on the second, likewise logged-in Skype device. Critical: This happens automatically – and the callee might remembers nothing about it. The display should not be recognizable that – still run microphone and camera, the record hardworking. The attentive Skype users, who discovered the supposed vulnerability in itself, has already asked for feedback from other Skype and Android users. These confirm the Bug function but only partially, as the comments in the blog entry is read.That sums thing up perhaps to a limit.

s3

Not (yet) confirmed

We wanted to know what is going on with the listening function and tried to recreate tested it with many Android devices – without success! Interception error could not be confirmed. Once the connection was cut off, and the device of the called party terminated the ring. An automatic callback was made in any of the test runs. But beware: The error is still not ruled out. Well, what we recommends: To ensure that you do not become a victim of such an attack in the near future, please do not initially on the phone function by Skype or limit the chats on Skype trusted contacts. Stay tuned and prompts you if there are updates to the supposed vulnerability.Hope you guys got an idea on the same.If any doubt pops up onto your mind- don’t mind letting us know by making your queries in the comment section.Keep visiting the site.

[ad#ad-2-1]

A

Apple OS X update fixes security hole

[ad#ad-2]

Apple Mac OS X

Apple OS X update fixes security hole:

 
Apple has released a software patch that closes down a vulnerability in Mac OS X. This affects OS X Yosemite, Mavericks and Mountain Lion.

Apple has released a new security update. It appears that there has been a weak point in the integration of the Network Time Protocol (NTP). It affects Mac users with OS X Yosemite , Mavericks and Mountain Lion . The update is available via the Software Update.

Mac OS X 1

NTP: hackers had an easy time

The NTP is a standard interface over which, inter alia, the time can be synchronized.Apple indicates that there was an error in the previous implementation: Hacker probably had the opportunity to execute malicious software. The update stuffs this vulnerability. The current versions are: Yosemite version 92.5.1, 88.1.1 Mavericks, Mountain Lion 77.1.1. Check the status of your operating system from the terminal by entering the following line of code: what / usr / sbin / ntpd .

At the end of the day, Apple does make an effort to make things cool as far as their products are concerned.Keep visiting the site for more updates.

[ad#ad-2-1]

a

Disabling Facebook’s Auto Photo Enhance Feature

[ad#ad-2-1]

a

Disabling Facebook’s Auto Photo Enhance Feature

Now, c. Essentially it uses the same picture improvement filters that were already in the app, but now they’re automatically applied for you, based on what Facebook thinks makes a decent photograph.

The auto photo enhance feature is enabled by default and if you trust in your own photography skills you can disable the auto enhance feature by following some simple steps.

Step 1: To start, open the Facebook app from your iOS device.

Step 2: Select the “More” tab from the lower right corner of the app.

Step 3: Scroll down to the Settings section and select “Settings”, then tap on the “Videos and Photos” option.

Step 4: Now you can see the “Enhance automatically” option. By default the option will be enabled, so go ahead and tap it once to disable it.

a

Now Facebook will not be automatically enforcing brightness and contrast enhancements on the photos that you upload. Anyway, the auto enhance magic wand icon will still appear in the corner of your pictures should you want to enable it on a photo-by-photo basis.

You can easily again enable the auto enhance feature by default by simply following the above mentioned steps. Tapping again on the button “Enhance automatically” will enable it.

Hope you understand what we meant.For more detailed clarification about the same don’t mind making your queries in the comment section. Have a pretty good day..!! 🙂

[ad#ad-2]

a

Google Android One to Nepal, Sri Lanka and Bangladesh

[ad#ad-2]
a

Google Android One to Nepal, Sri Lanka and Bangladesh:

After the successful launch of Android One in India three months ago, Google introduces the Android One program to other Asian countries including Nepal, Sri Lanka and Bangladesh. The Android One initiative aims to make high quality smart phones accessible to as many people as possible and they were a grant success in Indian market due to its lower price range.

s

They said,

“We’re taking another step toward reaching the next five billion people: in the coming weeks, the Android One devices will start to go on sale in India’s neighbouring countries of Bangladesh, Nepal, and Sri Lanka.”

The first three Android One devices came from Karbonn, Micromax and Spice. They shared the same basic specs: a 4.5 inch display, a quad-core Cortex-A7 processor, dual SIM cards, a replaceable battery and a built-in FM radio. Karbonn are also working to release second generation Android One phones for Q1 2015. The same three devices will be available in these markets for now – Micromax Canvas A1, Karbonn Sparkle V, and Spice Dream UNO.

s

Besides Micromax, Karbonn and Spice from India, Bangladeshi manufacturer Symphony will also begin retailing Android One devices, beginning with its Road A50.

All devices will be budget-oriented in nature, but with quality controls meant to ensure that the experience is on par with more expensive competitors. Google Senior VP Sundar Pichai claimed to have been using an Android One phone as his daily driver for some time when the program launched and was pleased with it.

Google will be expanding to more markets with more devices in 2015. Keep visiting the site for further updates. Good day..!! 🙂

[ad#ad-2-1]

n

Samsung Galaxy Note 4 skips Android 5.0

[ad#ad-2]

nSamsung Galaxy Note 4 skips Android 5.0:

 

Samsung has maintained a name on the international market for all these years and they keep on coming with products which rises to the expectations.If you own a Samsung Galaxy Note Samsung Galaxy Note 4 or Edge, then you probably already waiting quite impatiently for the notification that announces Android 5.0 lollipop as you update. So it looks like you have to you but still a little wait.

n

Because currently it is known that Samsung is planning to skip the first update to 5.0 and instead wants to deliver the same Android 5.0.1. This has the advantage that you can skip the initial bugs of Android 5.0, the disadvantage is of course obvious: The update will take a little longer. So currently available sometime in January in the room.

n

Of course annoying for all owners of grade 4 and grade of the Edge. As an early adopter you want to the latest hardware, of course, have to fit the latest software as soon as possible and elapsed since each week is a pain. However, the step from Samsung is quite understandable and I am eager to know when we officially get to see the update.And obviously we are expecting further updates linked with the models in the coming days itself.keep visiting the site for  getting updated.

[ad#ad-2-1]

a

Apple plans to expand TouchID

[ad#ad-2]

a

Apple plans to expand TouchID:

Apple has always been a brand that is looked upon by the masses by  various measures due to the quality of products they come up with.So everyone is so keen on the updation and changes in the form of innovation that they bring  into their products which has always maintained International standards which is something so great . And here is an interesting news from Apple brand.TouchID is a fine thing and incredibly convenient because it just goes from your hand (or the finger) and is intuitive. However, this form of unlocking safety has some drawbacks, is made to the blog scene too fond of attention. However, a newly filed patent opens up the possibility to extend TouchID and make it safer.

a

a

How does it work? The patent states that you, as usual placed his finger on the scanner, but then appears a combination lock and one clockwise and counter-clockwise to enter a code with a slight twisting motion. It is also possible to provide a further input option. This would indeed restrict the comfort powerful, but would be doubly safe on the road.For further updates keep visiting the site.

[ad#ad-2-1]

s

Flown Windows Phone apps from the Store: Snapchat

[ad#ad-2]

s

Flown Windows Phone apps from the Store: Snapchat:

Snapchat is an app for smartphones, with which you can send self shot pictures for a few seconds to other contacts. After the indicated time they disappear permanently and can not be viewed. Officially offers Snapchat apps on iOS and Android. Not officially but there are also third party who use the API of the service and thus have access to the Snapchat features and Windows Phone users.

This, however, did not seem to like the company, because since yesterday all third-apps from the Windows Phone Store have suddenly disappeared. Huynh – a developer of such an app – make a statement on Twitter:

“6snap has disappeared as well as all Snapchat apps on store. I will work closely with Microsoft now to convince Snapchat to change its mind”

s

An official statement by Microsoft or Snapchat there is currently not yet. Although warned Snapchat a few months ago, may be those apps as dangerous, but they had not yet announced more so far. That the action, however, probably originating from the app itself and not from Microsoft, tell users which of Snapchat due to the use of a third-party app has been locked .

One possible reason should either missing features such as avoiding screenshots or planning an official Windows Phone app be. Personally, I suspect the latter, eventually Windows Phone has long been a serious operating system.Keep visiting the site to get more updates regarding the news.

[ad#ad-2-1]

t

Trojans Torrent Locker strikes in Europe

[ad#ad-2]

 t

Trojans Torrent Locker strikes in Europe:

Experts warn there is a Trojan Torrent Locker: It forces data on infected PCs hostage and demands over a thousand euro ransom in the online currency Bitcoin.

Since this spring drive first versions of this Trojan encryption world mischief. A new variant of ransomware “Torrent Locker” has now apart according to the manufacturer’s protection programs ESET virus researchers to users in Europe.In the past few months have been infected by the malware over 40000 systems.In Italy, the experts discovered 4500 cases with 53,761,689 encrypted by the Trojan files.In Austria Torrent Locker suggested already in 1504 to time, Germany is ranked 240 incidents still in the lower middle.However, the researchers warn: The Trojan is in Europe on the rise!

t

Torrent Locker travels by email

The distribution of the pest is via spam e-mail, which appends a file that is disguised as payment requests, transport persecutions packages or unpaid parking tickets and users should thus encourage them to click. On infected PCs Trojan encrypts documents, pictures and other files, and demands a ransom for their decryption. The ransom demand the blackmailer in the online currency Bitcoin. And their demand is quite steep: While other Trojans settle for this type of payments between 100 and 300 Euro, require the criminals behind Torrent Locker, a whopping 4,081 Bitcoins! This roughly corresponds to a sum of 1,100 euros. According to the ESET experts already have 570 victims paid the ransom and the racketeers Played over 467,000 euros in the hands. The code analysis of the pest also led researchers but on a hot track: “We expect that the actors behind Torrent Lockers are the same as those behind the banking Trojan” Hesperbot “stuck,” said Marc-Etienne M. LĂ©veillĂ© ESET researchers from Canada. The Trojan will constantly adjusted by the criminals. So they had responded to the previous reporting and adjusts the encryption method used for seizure of files, so LĂ©veillĂ©. Was because until recently victims taken hostage data could free himself nor as a method for extracting the key stream, which is part of the Trojan code, was released. Which is now no longer possible. The best protection against such digital extortion are regular backups of important files and a constantly updated held anti-virus program. Should pay to the demanded ransom certainly did not. Because even then it is not certain that you then again gains access to encrypted files. The money is irretrievably but flutes with certainty.

t

We are expecting to get more news connected with it in the coming days,so keep track of the site to get updated.Good day…!! 🙂

[ad#ad-2-1]

wickr messenger

Wickr- Crypto Messenger now available for PC and Mac

[ad#ad-2]

wickr messenger
Good encrypted messenger so far mostly found on smartphones and tablets. With Wickr there is such a program now available for PC and Mac.Die provider of the popular WhatsApp Messenger can be celebrated profusely for at least currently have equipped the Android version with end-to-end encryption. But for Crypto Messenger as Wickr and Threema years are tap-proof texts, Delivery of audio, video and photo documents already standard. Here are treacherous meta-data, such as information about the time and place for photos that were shot with a smartphone, the app automatically removed before shipment. What the users such encrypted messenger was missing was the bridge to the PC or Apple computer. But now there is Wickr for these systems such as Linux.

w

Free High-level safety

So far, the encrypted communication (AES 256 bit encryption standard with ECDH521 and Perfect Forward Secrecy) was only possible from app to app. The promise of security of the makers of Wickr not to cache the message claims to be on servers is now extended to the PC level. For new applications for Windows, Apple and Linux (32-bit / 64-bit) subject to the same security and encryption standards.

wWickr- Crypto Messenger now available for PC and Mac:

As for the apps for iOS and Android can now also on stationary devices and notebooks encrypted messages sent with a time expiry date provided. After this time news and data will be overwritten irretrievably to military DoD erase standard and thus cleaned from the device. Currently, the maximum term of messages is still six days. The new Wickr versions also allow encrypted group chats with up to ten people. All versions are available on the website of Wickr for free download .

For more updates regarding the same,keep visiting our site. Have a nice day..!! 🙂

[ad#ad-2-1]

u

Security vulnerabilities in the UMTS network Spotted

[ad#ad-2]

u

Security vulnerabilities in the UMTS network:

 

IT experts have managed to bypass the encryption in the UMTS network.So here is an interesting news related with UTMS network and that seems so cool in whole.

Team Nohl cracks UMTS network

Wie the WDR, the ARD evening news and the SĂĽddeutsche Zeitung consistently report, a team led by the Berlin IT security expert Karsten Nohl, overturn the UMTS network of Deutsche Telekom. So they could read along SMS traffic of members of parliament among others. Even the reading of mail and data generated in mobile online banking, is possible. However, the experts point out that there is a provider-cross-cutting issue and Telekom is not affected alone.

Gap in the SS7 protocol

Cause of the safety problem is, according to Nohl called the SS7 protocol encryption. It is used by the network providers for network with other providers, such as roaming partners. Also, it is sometimes necessary to exchange the data encryption for calls from a central office to the next, such as a phone call to continue even if one travels long distances. Nohl the team managed to gain access to the SS7 network abroad by posing as foreign exchange. So they came among others to the SMS of the deputies.

Privacy advocates are alarmed

The Schleswig-Holstein Data Protection Officer Thilo Weichert speaks on tagesschau.de of a “huge risk” and criticized that the system operator “absolutely irresponsible” to deal with the phone secret. Brisant is especially the fact that bank customers channeled their business over the supposedly safe UMTS network.

Telekom attack scenario is no longer possible

The Telekom stressed in a statement that the gap is known and we are dealing with a problem that all network operators would struggle worldwide. However, the company requires, the described scenario abuse requires a high expertise and criminal activity in the reaction. It was important to stay close to the subscriber, have a special receiver that is not available on the market and to gain access to the internal signaling network of mobile operator.

The company claims to have taken in recent months several measures to attacks against their customers within the SS7 problem. Based on the new information, the company now took additional security measures to prevent unauthorized requests to the encryption parameters. Thus, claims the Telekom, was no longer the attack scenario presented possible.

For further updates,keep visiting the site.Have a nice day…!! 🙂
[ad#ad-2-1]

a

Smart Watch from TAG Heuer hits next year 2015

[ad#ad-2]

 a

Smart Watch from TAG Heuer hits next year 2015:

 

As per reliable sources,TAG Heuer is working on a modern SmartWatch, which will appear in the course of next year. In contrast to Apple Watch it should not look feminine.

. Jean-Claude Biver, CEO of TAG Heuer , now confirmed via press conference the work on its own SmartWatch. The hitherto nameless Wearable thus appears in the course of next year. Man stuck in development for four months; apparently are Intel and Google as partners already on board. Additional acquisitions to Biver not. He takes the opportunity to rant against the probably most important Wearable 2015: the Apple Watch . Which was designed by a student and look out feminine. Accordingly, and consistent with previous reports TAG Heuer continues to be classic watch design with dial and hands – and apparently without touchscreen.

Known concept

The concept of Smart Watch from TAG Heuer is according to Business Insider that of the middle of this year featured Withings Active resemble that looks at first glance like a classic clock, but within a variety of fitness functions provides for people who’s really into fitness and even take anabolic steroid for better results. Thus, the Withings Active monitors not only the steps and calories burned the wearer, but also monitors your sleep. In addition, the timer can be used as an alarm clock thanks to the integrated vibration motor. More details about the functions of the TAG Heuer SmartWatch not call the report. It is only known that TAG Heuer continues with its intelligent timer on an Intel processor described in detail.

a

Response to LG, Samsung & Co.

While electronics companies such as LG, Samsung & Co. are fully caught on SmartWatch train and dominate the market to date, the producers of traditional clocks stopped far back mostly. But that could soon be an end: When to introduce more traditional companies smartwatches by TAG Heuer, which certainly stirs up the market. Who also worked in Switzerland watchmaker Swatch has similar plans in July this year announced.

Well,the product when it hit the market is expected to do wonders in the market for sure.For further updates regarding the same keep visiting the site.Good day…!! 🙂

 

 

[ad#ad-2-1]