Google has officially announced Android L (henceforth known as Lollipop). While we heard a bit about it back at Google I/O, there’s plenty more to hear about. This is what’s coming in Google’s latest. Read more…
Remember Coin, the card that promised to put all your credit cards on one handy chunk of plastic , and then suffered from substantial setbacks that may make it useless by the time it comes out ? Well now it has a competitor. This is Plastc , another upcoming supercard with some seriously big promises that will be even harder to keep. Read more…
Continue reading here:
This Supercard Wants to Replace All of Your Credit Cards and Then Some
Microsoft unveiled its newest version of Windows last week. While the company was more than happy to tell us about a bunch of new features , naturally they left a few out. Here are some of the best things we found while poking around with the new OS. Read more…
Read More:
The Coolest Windows 10 Features Microsoft Didn’t Announce
We’re no strangers to unwanted toolbars and browser-hijacking malware. Neither is Google. The company has released a tool that helps combat the problem by scanning for bad software and (optionally) resetting your browser if it’s misbehaving. Read more…
Excerpt from:
Google’s Software Removal Tool Removes Crapware, Resets Your Browser
The iPhone comes with a bunch of apps you never use. Some of them are poorly implemented. Others are lacking important features. Fortunately, there’s a whole world of developers offering some very viable third-party alternatives. You still can’t delete the apps your iPhone comes with, but here are some alternatives that will free you from their boring grips. Read more…
Taken from:
The Best Alternative for Every Pre-Loaded iPhone App
An anonymous reader writes If you use Twitch don’t click on any suspicious links in the video streaming platform’s chat feature. Twitch Support’s official Twitter account issued a security warning telling users not to click the “csgoprize” link in chat. According to f-secure, the link leads to a Java program that asks for your name and email. If you provide the info it will install a file on your computer that’s able to take out any money you have in your Steam wallet, as well as sell or trade items in your inventory. “This malware, which we call Eskimo, is able to wipe your Steam wallet, armory, and inventory dry, ” says F-Secure. “It even dumps your items for a discount in the Steam Community Market. Previous variants were selling items with a 12 percent discount, but a recent sample showed that they changed it to 35 percent discount. Perhaps to be able to sell the items faster.” Read more of this story at Slashdot.
More here:
Malware Distributed Through Twitch Chat Is Hijacking Steam Accounts
Looks like Microsoft has removed the 2GB size limit for uploading files to OneDrive. You can now upload files of pretty much any size. “It’s an old limit that we’ve been working to remove for a long time now, ” a Microsoft manager told The Next Web . Good for us. [ The Next Web ] Read more…
Read this article:
Looks like Microsoft has removed the 2GB size limit for uploading files to OneDrive.
Underneath every picture of a dog in a beekeeping suit and ice-bucket challenge video you see on the internet, there’s a complex framework of code. Soon, that framework will get a tiny tune-up that will make surfing the web on your phone faster than it’s ever been . Read more…
Follow this link:
New HTML Is About To Make Your Phone Way Better at Using the Internet
Some of the mystery behind Apple’s app rejection decisions has been solved. Now, the powers-that-be behind the App Store have finally revealed why software is so often rejected. You might be surprised by how mundane its reason are. Read more…
See the original post:
The Top Ten Reasons Why Apple Rejects Apps
New submitter onproton writes: Citizen Lab released new research today on a targeted exploitation technique used by state actors involving “network injection appliances” installed at ISPs. These devices can target and intercept unencrypted YouTube traffic and replace it with malicious code that gives the operator control over the system or installs a surveillance backdoor. One of the researchers writes, “many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites…many of these commonly held beliefs are not necessarily true.” This technique is largely designed for targeted attacks, so it’s likely most of us will be safe for now — but just one more reminder to use https. Read more of this story at Slashdot.
Originally posted here:
Watch a Cat Video, Get Hacked: the Death of Clear-Text