Sony unveils thinnest 10.1″ tablet ever—the Xperia Tablet Z

The Sony Xperia Tablet Z, one of the hardiest and most svelte tablets we’ve seen. Sony Sony is unveiling a new Android tablet, the Xperia Tablet Z, at Mobile World Congress in Barcelona Monday. Sony claims the tablet is not only the “world’s thinnest 10.1-inch tablet” at 6.9 millimeters, but it’s apparently waterproof in up to three feet of water for 30 minutes. Inside, the Xperia Tablet Z has a quad-core 1.5GHz Qualcomm Snapdragon S4 Pro processor, 2GB of RAM, and a 1920×1200 display running Android 4.1 Jelly Bean. (Sony has gone scouts-honor that the tablet will be updated to 4.2 “after launch.”) The tablet weighs 495 grams (1.05 pounds) and it has an 8-megapixel rear and 2-megapixel front camera, plus 16GB/32GB storage configurations with a microSD slot than can take up to a 64GB card. The tablet also contains an IR blaster that works with a special version of an app Sony has created called TV SideView. TV SideView integrates with a user’s cable provider and allows users to browse the program guide as well as currently airing content. Read 2 remaining paragraphs | Comments

Read the original post:
Sony unveils thinnest 10.1″ tablet ever—the Xperia Tablet Z

Reports: Microsoft planning to unveil Xbox successor at April event

With Sony jump-starting the next-generation console hype train with its PlayStation 4 reveal this week , it seems Microsoft might not be willing to wait for June’s Electronic Entertainment Expo (E3) to unveil its follow-up to the Xbox. Computer & Video Games is reporting that Microsoft is planning a “one-off media event” to show off its new system in early April, based on information from unnamed sources inside and outside of Microsoft. VG247 has corroborated CVG’s information , saying it has “also received word of the April event,” and National Alliance Securities analyst Mike Hickey has previously said he expected Microsoft to announce its console successor in April. Internet sleuths on gaming forum NeoGAF have noted that the company that helped organize Microsoft’s E3 2012 media briefing registered the domain XboxEvent.com just yesterday , suggesting that, um, an Xbox event might be in the works. Practically the entire professional game industry will be gathered together in San Francisco at the end of March for the Game Developers Conference, which would also seem like a natural time for Microsoft to reveal its next-gen plans to an interested audience. Then again, Microsoft could use GDC as a sort of pre-tease tease, letting slip certain small, developer-centric details before a fuller April event. Read 1 remaining paragraphs | Comments

Original post:
Reports: Microsoft planning to unveil Xbox successor at April event

Google shows the world its official Android 4.2.2 changelog

When Android 4.2.2 quietly debuted last week , most users were left guessing about what exactly had been included in the software update. Helpful community sites like AndroidPolice had put together a thorough listing of some of the new features in Android 4.2.2, but any official listing of updates had yet to be made. Today, Google published its official changelog for its Android 4.2.2 update, as well as everything else that comes as a part of the Jelly Bean package. Many of the bullet points marked as “new” actually identify features that have been included in Android 4.2 since its initial launch and have since been  thoroughly  discussed. However, the changelog does include some of the minor features not previously touched on, like networking changes that were made to improve Wi-Fi Direct support and faster captive portal detection. Updates also include minor features, like the fact that TalkBack can now be accessed right from the power menu. You can also view the entirety of the Google Cards updates that have been made in Android 4.2. If you’re curious, you can view the official changelog at Google’s official Android site, then try out some of the features you may not have known existed on your Android 4.2 device. Read on Ars Technica | Comments

See more here:
Google shows the world its official Android 4.2.2 changelog

Cellular data traffic keeps doubling every year

Florence Ion Worldwide mobile data traffic doubled over the past year and is expected to continue growing at a similar rate due to expanding smartphone sales and video traffic, telecom equipment maker Ericsson said in research released today. By the end of 2012, global data traffic on mobile networks (not including Wi-Fi) hit around 1,300 petabytes per month, twice as much as in the previous year, Ericsson said. Ericsson The chart shows an approximate doubling each year for the past few years. We’ve asked Ericsson for the raw data behind the report and will provide that if we get it. Ericsson’s measurements come from “a large base of commercial networks that together cover all regions of the world,” the report states. “They form a representative base for calculating world total traffic in mobile networks.” Read 10 remaining paragraphs | Comments

More here:
Cellular data traffic keeps doubling every year

Sexy scammers entice men into stripping on webcam, then blackmail them

Police in Singapore have issued an alert citing a dramatic rise in the number of “cyber blackmail” cases being reported. But unlike many cases that target women or teenagers , this latest rash of crimes targets men through social media sites. The Singapore Police Force reports that there have been more than 50 reported cases in the last year where “foreign” women have lured men through invitations on social networks, such as Facebook and Tagged.com, into video sex sessions that are recorded for blackmail purposes. The women “initiate cybersex” with the men over video chat, stripping for them and then encouraging them to do the same. The men are told to perform sex acts on camera for the women, and the video feeds are recorded. The men are then contacted later and told that the videos will be posted in public if the victims don’t wire money to the scammers. Read 4 remaining paragraphs | Comments

More:
Sexy scammers entice men into stripping on webcam, then blackmail them

Laser intended for Mars used to detect “honey laundering”

Matthew T. Rader A laser tool funded by the European Space Agency to measure carbon on Mars has been reappropriated to detect fake honey. The counterfeit goods trade might more commonly be associated with handbags and watches, but it turns out that the world of honey trading is also a murky one, riddled with smuggling and fakery. According to a Food Safety News investigation , more than a third of honey consumed in the US has been smuggled from China and may be tainted with illegal antibiotics and heavy metals. To make matters worse, some honey brokers create counterfeit honey using a small amount of real honey, bulked up with sugar, malt sweeteners, corn or rice syrup, jaggery (a type of unrefined sugar) and other additives—known as honey laundering. This honey is often mislabeled and sold on as legitimate, unadulterated honey in places such as Europe and the US. Read 10 remaining paragraphs | Comments

Read the original post:
Laser intended for Mars used to detect “honey laundering”

Skype calls now equivalent to one-third of global phone traffic

TeleGeography New research (PDF) from TeleGeography, a telecom market analysis firm, shows that worldwide Skype usage is now equivalent to over one-third of all international phone traffic—a record level. The firm’s new data, released Wednesday , shows that “international telephone traffic grew 5 percent in 2012, to 490 billion minutes.” At the same time, “cross-border Skype-to-Skype voice and video traffic grew 44 percent in 2012, to 167 billion minutes. This increase of nearly 51 billion minutes is more than twice that achieved by all international carriers in the world, combined.” While that doesn’t mean that telcos are going to go out of business anytime soon, it does mean that they are certainly continuing to feel the heat. Read 3 remaining paragraphs | Comments

Read the original:
Skype calls now equivalent to one-third of global phone traffic

A world of hurt after McAfee mistakenly revokes key for signing Mac apps

Travis Nep Smith A McAfee administrator accidentally revoked the digital key used to certify desktop applications that run on Apple’s OS X platform, creating headaches for customers who want to install or upgrade Mac antivirus products. A certificate revocation list  [CRL] hosted by Apple Worldwide developer servers lists the reason for the cancellation as a “key compromise,” but McAfee officials said they never lost control of the sensitive certificate which is used to prove applications are legitimate releases. The revocation date shows as February 6, meaning that for seven days now, customers have had no means to validate McAfee applications they want to install on Macs. “We were told that as a workaround, we should just allow untrusted certificates until they figure it out,” an IT administrator at a large organization, who asked that he not be identified, told Ars. “They’re telling us to trust untrusted certs, and that definitely puts us at risk.” Read 6 remaining paragraphs | Comments

View the original here:
A world of hurt after McAfee mistakenly revokes key for signing Mac apps

How we built a DIY book scanner with speeds of 150 pages per minute

Bookshelves today are simply not as appealing as they used to be, and there’s no shortage of people looking to digitize their own book collections. Fortunately, we now have easy and relatively inexpensive ways to digitize those books. You don’t have to slave away at your copier or scanner, either—we’re talking about building a book scanner of your very own. We’re not talking about the numerous book scanning services that have popped up in the last few years, offering book digitization at the cost of only a few cents per page. Nor are we talking about chopping off the binding of your book and feeding the pages into a copier or scanner, or purchasing a commercial book scanner for upwards of $10,000 (that just isn’t going to happen for most). No, we’re talking toolbelts, paint cans, bike brakes, and digital cameras—doing it yourself. For two law students interested in the legal and policy discussions surrounding copyright and technology, deciding to build a DIY Book Scanner was never just a project to digitize our own textbooks (however practical that might be). Instead, it gave us the opportunity to experience these issues first hand. Plus, we wanted to see what it would take to build one. Read 31 remaining paragraphs | Comments

Read More:
How we built a DIY book scanner with speeds of 150 pages per minute

Thanks, Adobe. Protection for critical zero-day exploit not on by default

dimland.blogspot.com The recently discovered zero-day attacks targeting critical vulnerabilities in Adobe’s ubiquitous Reader application are able to bypass recently added security defenses unless end users manually make changes to default settings, company officials said. According to an advisory Adobe published Wednesday night , the “protected view” feature prevents the current attacks from working—but only if it’s manually enabled. To turn it on, access Preferences > Security (Enhanced) and then check the “Files from potentially unsafe locations,” or even the “All files” option. Then click OK. There’s also a way for administrators to enable protected view on Windows machines across their organization. The revelation is significant because it means users aren’t protected when using the default version of the widely used document reader. The limitation came to light following the discovery of in-the-wild attacks against current versions of Reader, which are being exploited to surreptitiously install malware on end-user computers. The exploit is also noteworthy because its intricate code base bypasses several additional protections added just four months ago with the goal thwarting malware attacks. Read 6 remaining paragraphs | Comments

Link:
Thanks, Adobe. Protection for critical zero-day exploit not on by default