Android 4.0: The Ultimate Guide (Plus Cheat Sheet) – In the world of mobile technology, things change fast — and there’s no better example than Google’s Android operating system. In the span of three and a half years, Android has evolved from a rough and limited newcomer into a sleek and polished platform that dominates the smartphone market.
Protect yourself from online security breaches – If your online identify or information has been hacked, you’re not alone. In fact, it’s become increasingly common. CNET’s Sumi Das tells you how you can protect yourself in CNET’s online security series.
Facebook finally gets around to deleting your deleted photos – Social network says it has resolved an issue that allowed photos to continue to be stored on servers sometimes years after they were deleted from users’ profiles.
iPad Kit for Students – Head back to school with total confidence that your iPad is indeed a serious study machine by bringing along the right apps, accessories, and case.
Turn your Android phone into a speedometer with SpeedView – Tracking your car’s trip data can be fun and interesting, but not all cars come with an advanced trip computer. Using your Android phone’s GPS sensor, SpeedView can act as a speedometer with some additional data functions.
Laptops for Back-to-School: How to Make the Right Choice – It’s back-to-school time, and retailers are inundating everyone with back-to-school specials, ads, email promos, and even direct-mail offers, all promising the best possible computer deal for your student. The problem is that many of these deals focus on some generic student, failing to address the needs or wants of individual students. Sure, the bargains often look attractive, but before you whip out your credit card, you should spend a little time with your student to figure out what they need.
App.net: The social network that Facebook and Twitter made possible – Newly funded App.net may be in its infancy, but it’s already attracting a slew of developers vexed by Facebook and Twitter. The platform risk developers take by relying on those companies is “not acceptable,” App.net co-founder Dalton Caldwell says.
Samsung Galaxy Note 10.1 Launches: 10 Features That Make It a Winner – Samsung has officially introduced the Galaxy Note 10.1, a device that, for all intents and purposes, can be considered a true counterpart to both Samsung’s own Galaxy Tab 10.1 and Apple’s iPad. As one might expect, given the name, the device comes with a 10.1-inch screen and delivers Wi-Fi connectivity. It’s the successor to the 5.3-inch Galaxy Note. Still, the Galaxy Note 10.1 is new. And some folks are still trying to figure out if it’s as good as it looks on paper. Simply put, it is.
Federal Judge: Your Location is No More Private Than the Color of Your Car – A court of appeals has ruled that the cops can legally trace the location of your cell phone on public roads — no warrant required. Can you say Big Brother?
Amazon to let U.K. customers pick up orders from local shops – The e-commerce giant begins a trial scheme to give U.K. consumers more shopping options by delivering parcels to small retail stores around the country.
Protect yourself from smishing (video) – It’s the latest high-tech attack and it’s coming to cell phones everywhere. Here’s the lowdown on smishing and what you can do about it.
World’s largest oil company Saudi Aramco hit by malware – Saudi Aramco, the national oil company of Saudi Arabia, reported a serious security breach which may have caused major disruptions in their network. A piece of malware caused a large infection within their network – the consequences are still unknown.
Australian accounts hacked in $25m splurge – Eastern European hackers have stolen half a million credit card numbers from Australians and racked up $25 million in fraudulent transactions, federal police have revealed. SC Magazine, which specialises in business intelligence, has reported that the same hacker group is believed to have been responsible for a hack of US Subway restaurants, which resulted in four Romanian nationals being charged over millions of dollars in credit card fraud affecting about 80,000 customers. The magazine said the syndicate found its victims by scanning the internet for vulnerable point of sale terminals. (recommended by Mal C.)
Destructive Shamoon attack targets energy sector – A new spear-phishing attack targeting a number of specific companies in a few industries including the energy sector has been spotted by several security companies. Dubbed “Shamoon” due to a string of a folder name within the malware executable, the attack ends up with delivering destructive malware on the targeted computers that ends up making them unusable.
Judge Questions Whether Apple Lawyer Is ‘Smoking Crack’ – Judge Lucy Koh asked Apple lawyer Bill Lee if he was “smoking crack” after Cupertino filed a 75-page witness briefing.
Microsoft Visual Studio 2012, .NET 4.5 Released to the Web – Microsoft has released Visual Studio 2012 and .NET 4.5 to the Web. Visual Studio 2012 and .NET 4.5 are the tools that form the backbone for developing on Windows 8, and Microsoft has released them more than two months ahead of the Oct. 26 planned release of Windows 8 to give developers a head start on building apps for the platform.
Red Hat OpenStack Enterprise Preview Released – The preview release is the first milestone on the path to what will become Red Hat’s Enterprise OpenStack commercially supported release at some point in 2013. OpenStack is one of the leading open source cloud platforms and has the support of major IT vendors including Dell, HP, IBM, Cisco, AT&T and Rackspace.
TiVo to Sell Four-Tuner TiVo Premiere 4 – TiVo is introducing a new multi-tuner DVR to its lineup in the form of the TiVo Premiere 4. Like its name implies, it’s a four-tuner DVR that can record multiple high-definition channels at once.
Verizon’s $3.6B Purchase of Cable Spectrum Approved With Conditions – The Department of Justice announced that it will approve Verizon Wireless’s $3.6 billion purchase of spectrum from three cable firms provided the companies adhere to several conditions.
Hit-and-run Post – In online forums and other online discussion spaces, a hit-and-run post is the term used to describe users who register for the service, post one message, then never return. In most cases these single posts contains information not related to the forum topic or the post may contain a single URL that is posted for the purpose of advertising.
Off Topic (Sort of):
Ten Surefire Ways to Get Promoted – Do you feel like you’ve hit the proverbial glass ceiling, promotion-wise? The reality is that advancing in an organization involves far more than just being extremely competent at your job. Politics will play a role, of course, but you’ll gain an even more advantageous position by finding ways to make yourself more well-rounded and valuable to your entire company—as opposed to just being the resident tech whiz.
10+ most dangerous species of help desk callers – IT veteran Jeff Dray takes a lighthearted look at the types of people who call the help desk. We originally published Jeff’s list back in 2001, but we’ve updated it a few times since then. And, I decided to pick a few photos the illustrate Jeff’s great descriptions.
A British ante-invasion: “Telstar,” 17 August 1962 – Many describe the 1964 arrival of the Beatles in New York as the beginning of the “British Invasion,” but UK rock and pop had begun culturally infiltrating our consciousness much earlier. Indeed, a London instrumental group topped American charts in the fall of 1962 with a recording that celebrated the first telecommunications satellite. Launched from Cape Canaveral on 10 July, Telstar initiated transatlantic telephone, television, and image transmissions by relaying beamed signals. The pace of multidirectional globalization in popular music increased almost immediately. (recommended by Michael F.)
Five ways manufacturers make devices hard to fix – Bill Detwiler shows you five ways manufactures are making our gadgets harder to fix and gives you tips on working around these self-repair roadblocks.
Assange Granted Political Asylum in Ecuador – Officials in Ecuador have granted political asylum to WikiLeaks founder Julian Assange, but the U.K. isn’t giving up on the man too easily. Assange took refuge at London’s Ecuadorean embassy following the loss of his second U.K. extradition appeal in June.
Guns and 3D printing? A dud but the message still hits home – Reports that you can download and print off a gun from the internet turn out to be wide of the mark. But they nevertheless draw a bead on a worrying issue.
Infographic: Smartphone shoppers don’t close the deal – This Statista infographic by Monetate shows that smartphone users do more window shopping than making actual purchases.
“I have made this letter longer, because I have not had the time to make it shorter.”
– Blaise Pascal
Today’s Free Downloads:
Format Factory – There are file converters for all kinds of different files, whether you’re converting between different video, audio, or image formats. This might be the first time, however, that we’ve encountered a program that does all of the above. FormatFactory is an ambitious program that’s capable of converting images, videos, and audio files between a number of different formats.
Comodo Cleaning Essentials – Comodo Cleaning Essentials (CCE) is a set of powerful security tools designed to help users identify and remove malware and unsafe processes from Windows computers. Designed as a portable application, the software requires no installation and can be run directly from removable media such as a USB key.