Search This Blog | Web


Tuesday, July 2, 2013

Scientist infects himself with computer virus

Mark Gasson
(Credit: University of Reading)
A senior research fellow in the U.K. says he has become the first person in the world to be infected by a computer virus.
Technically, the chip Mark Gasson inserted into his hand is infected, which one could argue keeps the virus limited to the domain of the chip even though it lives inside the man.

But Gasson, of the University of Reading's School of Systems Engineering, suggests this argument is immaterial because he is demonstrating that increasingly sophisticated medical implants will become vulnerable to computer viruses. Which means that those implants that are vital to a human's health and survival could, if corrupted, compromise the health--and potentially the survival--of the carrier.

Thursday, January 26, 2012

Why Sharing Passwords With Your Girlfriend/Boyfriend Is A Spectacularly Bad Idea

This is fine. Sharing Password isn't.

The New York Times reports today on the naughtiest thing that teenagers in love are doing behind closed doors: swapping passwords for their Facebook and email accounts.
It has become fashionable for young people to express their affection for each other by sharing their passwords to e-mail, Facebook and other accounts. Boyfriends and girlfriends sometimes even create identical passwords, and let each other read their private e-mails and texts.
They say they know such digital entanglements are risky, because a souring relationship can lead to people using online secrets against each other. But that, they say, is part of what makes the symbolism of the shared password so powerful.
“It’s a sign of trust,” Tiffany Carandang, a high school senior in San Francisco, said of the decision she and her boyfriend made several months ago to share passwords for e-mail and Facebook. “I have nothing to hide from him, and he has nothing to hide from me.”

Tuesday, December 6, 2011

Samsung NC215S Solar Netbook

Samsung NC215S Solar Netbook

The US model features a 10.1 inch, 1024 x 600 pixel matte display, 1GB of RAM, and a 1.66 GHz Intel Atom N570 dual core processor. The key feature that sets this netbook apart from the crowd though are the solar cells built into the lid.
  • You should be able to get an hour of battery life for every two hours of charging time. Under ideal conditions
  • You should also be able to squeeze about 14 hours of battery life out of the netbook.

 No Power failure.

Tuesday, November 29, 2011

iPhone 4 Explodes Midflight on Australian Airline!

Apple’s iPhones are always among the hottest gadgets of  any holiday shopping season, but for one passenger on an Australian flight, the phone was too hot to handle — literally.
While on Australian flight Regional Express ZL319 Friday, a passenger’s iPhone 4 (not the iPhone 4S, which is Apple’s latest model) suddenly started “emitting a significant amount of dense smoke, accompanied by a red glow,” according to a Regional Express statement.

Bah! Humbug! The 12 Scams Of Christmas.

Cyber Scams: 'Tis The Season To Be Cautious

During the holiday season, cybercriminals are the Grinches of the tech world, trying to wreck everyone's holiday cheer with cyber scams. This year, security vendor McAfee says scammers will be working overtime to trap online gift buyers. What follows is McAfee's prediction for the 12 scams of Christmas.



Mobile Malware

Malware has recently been discovered that targets QR codes, a digital barcode consumers can scan with their smartphones to learn about products or find deals on Black Friday and Cyber Monday. More than half of U.S. consumers are expected to use their phones for holiday-shopping activities this year, according to the National Retail Federation.



Malicious Mobile Applications

Downloading smartphone apps from unfamiliar sites can land a user into trouble. Malicious Websites will offer mobile apps designed to steal information from smartphones or to send out expensive text messages without a user's consent. Such apps are usually offered for free and masquerade as games.


Phony Facebook Promotions And Contests

Facebook has become a favorite of cyberscammers. Using phony promotions and contests as lures, scammers ask users to fill out forms with personal information. A recent scam advertised free airline tickets to trap victims.

Oracle Database Appliance: Perfect Timing For Sun-Oracle Offspring.

If you thought the last ten years brought forth an explosion of data – particularly of use to small and mid-sized businesses – just wait for the next ten years.
With the ubiquity of mobile devices including tablets and smart phones each becoming incredibly powerful data collection devices, and with social media, new use patterns and more and more powerful processing, database technologies would appear to face a mountain of challenges.

Wednesday, November 16, 2011

Printer Buying Guide: Specs You Need To Know.

Printer specifications can go on forever. This week, Consumers Advocate guides you through them and shows you what’s important to consider before buying any printer.

Below are the Specifications and Technical things you need to know, before purchasing a  Printer.
Related Posts Plugin for WordPress, Blogger...