Google takes the wraps off Nexus 6, Nexus 9 [Update]

Google Nexus 6

It is estimated that one in three smartphones shipped in 2018 will be a phablet, which is more than double their projected share for 2014. For Google -- with Android still likely to run on the majority of phablets -- helping developers to properly optimize their apps for larger screens has become a top priority. Ensuring that Android phablets provide a great user experience is paramount; otherwise, users may jump ship to Apple's iPhones or Microsoft's Windows Phones.

So, today, Google takes the wraps off its first phablet, Nexus 6. It is the embodiment of all the great features we have come to expect out of a phablet from late-2014: super high-resolution screen, super fast processor, solid cameras, very thin bezels and a huge battery. As expected, Google also announced a new tablet, the first one to come since July 2013, called Nexus 9. It does not disappoint either. Of course, both run the new Android 5.0 Lollipop, which is shipping in the next few weeks.

Continue reading

Why the government needs access to your data

IMG_20141014_101200_contentfullwidth

We are in Brussels at the 27th annual Information Security Solutions Europe Conference (ISSE), one of Europe's largest gatherings of cyber security experts.

Troels Oerting of the Danish police gave a fascinating opening keynote defending the right of the police to use surveillance over the Internet. It certainly ruffled some feathers in Brussels, but here are some of the highlights so you can make up your own mind.

Continue reading

Cut the cord -- HBO will offer standalone streaming service in 2015

Cable providers see the writing on the wall. They will eventually become internet services and nothing more, but for now each is fighting this future. The battle took a turn against those TV services recently. HBO has dealt the latest blow.

For the moment, the HBO app requires the user to verify a subscription by adding information for a cable or satellite provider. That's bad for cord-cutters -- it means they simply can't get the HBO service. However, that requirement will be changing in 2015.

Continue reading

Cloud-based security and why it's here to stay

cloud security

As the popularity of cloud services has grown, so have concerns over the security of the data that's stored on them. This has led security vendors to adapt and develop solutions for the new environment.

A new report by security company NSS Labs looks at the rise of cloud security solutions and at the business demands driving their adoption, as well as the limitations and potential hidden costs in their use and recommendations for enterprises.

Continue reading

Ireland in tax clampdown targeting Microsoft, Apple, Google, and more

Ireland in tax clampdown targeting Microsoft, Apple, Google, and more

The Irish government is phasing out the so-called 'Double Irish' finance scheme that currently enables companies such as Google and Apple to slash millions (or even billions) of dollars from their tax bills. The scheme works by companies, regardless of where they may be operating in the world, collecting their profits through an Irish office (where tax is already low), and then funneling the money through a subsidiary company located in another tax haven by means of royalty payments.

Companies, like individuals, are understandably keen to keep their tax bills down as much as possible, and will jump through lots of hoops to reduce the amount of tax they have to pay. Offshore bank accounts, subsidiary companies and the like might sound like the makings of something illegal -- which it can be -- but it's a legitimate way to reduce costs. But the fact that something is legitimate doesn't mean that it's popular. At least it's not something that is popular with governments.

Continue reading

Thinking unconventionally is how you protect an entity the size of Google

stephan-somogyi_800_contentfullwidth

We are at the 27th annual Information Security Solutions Europe Conference (ISSE), one of Europe's largest gatherings of cyber security experts.

Stephen Somogyi of Google Safe Browsing gave an amazing keynote speech about how Google goes about protecting its billions of users around the world. Here are some of the highlights:

Continue reading

Bitcoin will do nicely -- the state of Russian cyber crime

Russia flag magnifier

Banking fraud is down, mobile threats are up and cryptocurrency is the preferred payment method in the world of Russian cyber criminals.

Fraud prevention and cyber crime investigation specialist Group-IB has released a report on the Russian high-tech crime market in 2014. The report provides detailed assessments of the who, what, where and how of high-tech crime, who is behind what crimes, where they originate and who they target.

Continue reading

Samsung's 5G is now 25 times faster than 4G

speed road fast

Samsung has made good progress on its 5G cellular technology, increasing transfer speeds to a whopping 7.5 Gbps from a tad over 1 Gbps in April 2013. To put things into perspective, the next-generation cellular networks are now more than 25 times faster than the fastest 4G (LTE Advanced) networks in use today.

The 7.5 Gbps transfer speed represents a new record for 5G cellular networks; it was achieved during the first successful outdoor test. Samsung says that stable transfer speeds of 1.2 Gbps were registered while traveling at 100 kph (62 mph), which is a more accurate representation of how fast the current 5G technology is in actual practice.

Continue reading

How Apple's iPhone language has evolved over the years

apple_store_800_contentfullwidth_contentfullwidth

Over the years, Apple has become well known for its tight control of the message in new product launches. Increasingly, one word or concept has become a signature that is carefully woven throughout the keynote, press and marketing material.

Here is a look at some of the language used for each iPhone launch since 2007 and how we can learn from what Apple is really good at; controlling the message.

Continue reading

Tracking and tackling Ebola using mobile phone surveillance

Tracking and tackling Ebola using mobile phone surveillance

Mention web or mobile surveillance, and you're sure to raise a few hackles. But the current Ebola outbreak is showing that the data collected from handsets can be extremely useful. The idea of tackling a disease with 'big data' gathered from mobile phones might seem a little odd, but it's actually an incredibly valuable source of information. Telecom firms such as Orange have been working with data scientists, using anonymized data gathered from phones to track population movement in regions affected by Ebola.

The BBC points out that even in relatively poor countries in Africa, mobile phone ownership is still high. Experts have been able to use this data to determine the best places to set up treatment centers, and it's an idea that has been pounced upon by the CDC.

Continue reading

Why Google needs a bigger Nexus phone and phablet-optimized Android L

nexus

The point of the Nexus line is ambiguous now. Is it a developer line? Does it showcase what Google wants in an Android phone? Does it showcase the cutting edge of Android? Maybe in the beginning the purpose was clear, but now I don’t think even Google knows. The one thing I am certain of is that the forthcoming Nexus phone will not be just another phone.

The Nexus line so far has helped to give developers a pure experience of Android to work on. One where the OS followed and fostered an environment that placed emphasis on the guidelines set forth by Google, such as on-screen buttons and leveraging full screen mode. A developer using a Nexus would get a very different impression of Android than one using Samsung's TouchWiz on a Galaxy phone -- which would reflect in the app produced.

Continue reading

Mozilla will make Firefox 34 immune to POODLE, releases fix for older versions

Security Lock

Google yesterday disclosed a major security vulnerability it has found in the SSL 3.0 encryption protocol, that is still employed by many sites across the web, despite long being superseded. Dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), it allows attackers to steal private data, like cookies, and, possibly, use it to access user accounts on vulnerable sites. The search giant says its Chrome browser should be safe, but warns that others may be vulnerable.

Firefox is one of the vulnerable ones. To address this issue, Mozilla reveals that the upcoming version -- Firefox 34, to be exact -- will feature code which makes it immune to the POODLE attack. For those who use lesser versions of the open-source browser -- most users, basically -- the organization provides an optional fix.

Continue reading

Intronis ECHOshare brings simple, secure file sharing to SMBs

File sharing

Sharing files among employees can be difficult for any business, but particularly for smaller ones which often end up adopting solutions like emailing attachments or using public cloud services.

These approaches can put data at risk and also cause problems for support staff. Backup and disaster recovery specialist Intronis has a new solution to help businesses share files safely in the form of ECHOshare.

Continue reading

WYSIWYG Web Builder 10 adds responsive web design, including mobile-specific design tools

wysiwyg10-200x175

Pablo Software Solutions has released WYSIWYG Web Builder 10, a major new version of its DTP-style web building tool for Windows users.

Version 10 adds support for responsive web design, allowing users to create different variants of pages optimized for a wide number of devices. Part of this includes integrated support for designing mobile-friendly web pages.

Continue reading

Don't overlook the most important cloud storage feature: Security

cloud_security_header_contentfullwidth

The craze in the world of cloud storage today seems to be rolling out lists of additional features that match the features of every competitor out there, and presenting them as new and improved. Every company strives to be appear as the best possible cloud option on the market by continually adding "new" features right alongside competitors, and in all of the competition it can be a simple mistake to overlook what these features actually mean.

Before you let these lists of newly-added features dazzle you into choosing one specific cloud storage option over another, do a little research into what these features actually do. You might be surprised to find that many aren’t precisely new ideas, and they don’t increase the most important cloud storage aspect of all: secure file storage.

Continue reading

Load More Articles