Schlagzeilen |
Sonntag, 29. Dezember 2013 00:00:00 Technik News
Aktualisiert: Vor 2 Min.
1|2|3|4|5  

Sie wollen Ihre Fotos, Dias, Zeugnisse oder andere wichtige Dokumente digital sichern und verwalten, haben aber kein Scanner oder Multifunktionsdrucker? Wir stellen Ihnen jeweils ein Top-Gerät vor, mit denen Sie all dies schnell und einfach erledigen.

Like a juggler walking away with dozens of objects suspended in the air, Steve Ballmer is leaving his successor at Microsoft not only a tough act to follow but an even tougher act to continue. During his last months at the company, Ballmer has set in place a string of changes that won’t be anywhere near completion when he goes, even if his replacement doesn’t come on board until next August, the That means has to come up to speed fast and have the talent to implement Ballmer’s plans or to change them mid-course without having things fall apart. Here is a look at some of what Ballmer leaves and how it might affect the products and services Microsoft sells.

Browser problems are the most common complaints of and Fire HDX tablet owners, an online community of troubleshooters said. San Mateo, California-based Fixya mined 10,000 user-generated reports related to Apple’s iPad Air and Retina-equipped the second-generation tablet that replaced the poorly-received Surface RT of 2012, to come up with its conclusions. Browser gripes topped the charts of the iPad Air and the 8.9-inch said Fixya, while the surfing app tied for second on the iPad Mini’s top-five-beef list. Nearly a third—30 percent—of the reported problems with the Air and 25 percent of those with the Fire stemmed from the tablets’ bundled browsers, Safari and Silk, respectively. On the Retina iPad Mini, 20 percent of complaints targeted Safari, the same percentage as aimed ire at the paucity of storage space on the least expensive model.

Cybercriminals are using third-party app sites to peddle reverse-engineered versions—essentially counterfeit or pirated—of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered. The firm uncovered this parallel app universe in a similar piece of research last year and . Looking at a total of 230 apps—the top 100 paid apps and top 15 free apps for Android and iOS—Arxan found that 100 percent of the top paid apps on Android and 56 percent on iOS were being impersonated in a compromised form on grey markets. For free apps, the analysis found that 73 percent of Android apps in the top 15 existed in a bogus form on third-party stores, slightly worse than the 53 percent for iOS. Arxan also looked at popular financial apps, 20 from each platform, finding that a half of the Android samples existed as hacked versions with a quarter for Android.

Bosch, a company best known as a maker appliances, including stoves, dishwashers, washing machines, and coffee makers, is increasing its focus on the Internet of Things. Germany-based Bosch has created a new firm, Bosch Connected Devices and Solutions, “for the Internet of things and services.” The Internet of Things will at a time. Sensor-rich devices monitoring Web-enabled apps can put the worried homeowner at ease. "Did I remember to turn the stove off before leaving the house? Is the refrigerator door open?" The Internet of Things will provide the answer.

Some have suggested that Microsoft sell off its Xbox franchise as a way to cut losses and eliminate a distraction from more important things, but the video game console is an important part of the company’s overall plan going forward. Xbox is one of four devices named by CEO Steve Ballmer as part of ”Interactivity takes engagement and makes things serious; it really requires differentiated hardware, apps and services,” he says in a outlining Microsoft’s mission. But one estimate puts Xbox losses at $2 billion, and an analysis of the hardware costs indicate on a razor thin margin. Profitability is hard to gauge given that Xbox results are lumped in on the balance sheet with Android phone royalties, Skype, and Windows Phone.

In the daily deluge of email, it's all too easy to send a message and never get a response (and, on the other end, receive an email and forget to respond). This Gmail script makes it easy to find the emails you've sent to someone who could use a little nudging or reminder. The , written by Jonathan Kim, combs through your emails that are between 5 and 14 days old where you were the last person to respond. It labels those emails "No Response" so you can easily check if any of those require a polite followup email. E.g., "Hi Joe, Just checking in to see what you think about this. Let me know if you have any questions." (Note to PR folk: Not "Did you get my email??" times ten.) To use the script, paste Kim's code into a new Google Script and set it to run on a daily schedule. (I love these cron job-like scripts for Gmail.) You can add the "No Response" label to your inbox section for top-of-mind prompting. One of the few reasons you might want to use this instead of, say, a service like Boomerang, is the labels are applied to email threads you've already sent. It pretty much just works automatically. Yes, you have to still check the No Response label, but short of getting a personal assistant to handle your email for you and follow up on all the loose threads, this is as good as it gets for now.

Even as Microsoft promised to speed up work on a re-release for a flawed firmware update, customers continued to damn the company for the fiasco. earlier this month, about a week after it shipped the non-security fixes on December 10. Surface Pro 2 owners had complained that the update reduced their tablets’ battery life and spontaneously changed how the devices went into or out of the power-saving sleep mode. Originally, Microsoft said that it would re-release the firmware update “after the holidays,” which the company confirmed should be interpreted as some point after New Years Day, or January 1, 2014. However, this week the Redmond, Washington company revised its timeline. “We are working to release an alternative update package as soon as possible,” a spokeswoman said via email on Thursday. She declined to be more specific about the re-release’s availability, reiterating only that it would be ASAP.

The Blackhole Exploit kit was good, so good in fact that criminals are having trouble finding anything with the capabilities to take its place, security firm Websense has noticed. According to the , phishing campaigns sent via the important Cutwail bot that once made extensive use of the kit have been forced to experiment with a mixture of conventional Zip attachment spam and an alternative exploit kit, Magnitude. The change happened in October, within days of the dubbed "Paunch." Since then, the gangs have been forced to chop and change new attack strategies, achieving mixed levels of success, Websense said. It turns out that attachment spam is still effective when it gets past filters as are old-style phishing attacks using traditional lures such as "work at home" and dieting. Often tactics are what distinguishes one gang form another on Cutwail, for instance the prominent "Zeus GameOver" operation that specialises in collecting bank logins.

Nokia says iOS 7 has harmed the user experience of its mapping app, but the company has show little appetite for keeping Here Maps up to date since its iOS debut more than a year ago.

When International CES opens in Las Vegas in early January, a flood of wearable computing devices, including smartwatches, will be on display. The fledgling is tiny compared to that for smartphones, or even wearable devices like Google Glass or smart bands that cater to fitness and health-monitoring needs. Still, the smartwatch phenomenon promises to blossom in 2014 as experts sometime in the fall. Even Microsoft is reportedly working on one. To achieve any degree of greatness, though, these major tech innovators and their smaller competitors must overcome some significant hurdles.

Police in San Francisco have arrested a 16-year old resident of the city on suspicion of murder and attempted robbery after a cellphone theft apparently went wrong earlier this month. The suspect, who was not named because he is a juvenile, was one of a group who approached someone using a cellphone in the street at around 11pm on Saturday, December 14, according to the San Francisco Police Department. One of the suspects demanded the cellphone and another suspect produced a handgun while others were going through the victim’s possessions, the police said. ”The victim offered no resistance and was complying with the robbery suspects demands when the armed suspect shot the robbery victim,” San Francisco police said in a statement. “The shot glanced off the victims face and struck one of the robbery suspects, killing him.”

The techniques used by hackers to shoppers suggests that the cyber crooks have found a troubling new way to stay ahead of the latest fraud detection processes. Security blogger , who first reported the Target data breach news earlier this month, said that compromised cards are being marketed online with information on the state, city, and ZIP code of the Target store where they were used. Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. “This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder’s immediate geographic region,” he said. This is believed to be the first time that security experts have observed hyper-localized selling of stolen credit and debit card information following a retail breach.

From an inside look at the technology used at a Major League Baseball game to a detailed breakdown of how you’re likely upsetting your Facebook friends, we put together a lot of videos in 2013. Here are some of our favorite videos to appear on the site. Our . But our favorite part of that video series was easily this look at how technology is used to maintain security inside the ballpark.

It’s a pretty fair bet that, today, many of you are playing with (wearing, riding, or at least enjoying) some toy you got earlier this week. Since I know a few people for whom those toys are video games, this seems like a good time to suggest that—though those games have over the years for being addictive, teaching violence, and leading to a nation of layabouts—they also teach skills necessary to working in high tech. I’m not just making this up as an excuse to Science supports the idea that not only do video games teach worthwhile skills but that they do it as well as other ways of learning things. And, when I say video games, I’m not talking about only learning or “sandbox” games. First-person shooters teach good stuff, too. Studies support gaming skills According to , video games strengthen cognitive skills such as spatial navigation, reasoning, memory, and perception. And this is particularly true for first-person shooters. According to the study's authors, a 2013 meta-analysis found that playing commercially available shooter video games improved a player’s capacity to think about objects in three dimensions better than other kinds of games and just as well as academic courses to enhance these same skills. “Previous research has established the power of spatial skills for achievement in science, technology, engineering, and mathematics,” says Isabela Granic, one of the study’s authors and PhD, of Radboud University Nijmegen in The Netherlands.

Trust in the security industry has taken a blow with that RSA was paid by the U.S. National Security Agency to provide a way to crack its encryption. RSA denies the Reuters published Friday that said the NSA paid RSA $10 million to use a flawed encryption formula. The agency-developed Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG) was used in RSA’s BSAFE product. The report shook up the security industry, because of RSA’s influence. The company’s annual user conference in San Francisco is one of the largest security events of the year. On Monday, Mikko Hypponen, a widely know security expert, sent a letter to RSA for the 2014 RSA Conference, because of RSA’s dealings with the NSA. In a statement released last week, RSA said, “We categorically deny this allegation.”

The president of the United States says he’s not “allowed” to own an iPhone, which is why he’s . It’s a politically sensitive subject because the founder and CEO Steve Jobs. He’d love to pander to buy-America voters. (Obama is also probably not “allowed” to have an Android phone.) Of course, neither the president nor the Secret Service is willing to say exactly is the unpredictable nature of both iPhone and Android apps. Sure, there’s a lot of flat-out malware flying around online, most of which looks like regular, legitimate apps but in fact are either malware or they compromise privacy or security in some way.

From .

No need to dig through that dusty closet and find your Atari 2600. Play Pacman, Space Invaders, Donkey Kong and more, all from the comfort of your browser.

A federal judge has ruled that the U.S. National Security Agency’s bulk phone record metadata collection efforts are legal, turning aside a lawsuit the American Civil Liberties Union brought against the agency. While the collection program “vacuums up information about virtually every call to, from, or within the United States,” it also allows the NSA to “detect relationship so attenuated and ephemeral they would otherwise escape notice,” Judge William Pauley III wrote in his 54-page decision filed Friday in U.S. District Court for the Southern District of New York. Overall, the metadata collection serves as the U.S. government’s “counter-punch: connecting fragmented and fleeting communications to re-construct and eliminate Al-Qaeda’s terror network,” Pauley wrote. There also is “no evidence that the Government has used any of the bulk telephony metadata it collected for any purpose other than investigating and disrupting terrorist attacks,” he added. “While there have been unintentional violations of guidelines, those appear to stem from human error and the incredibly complex computer programs that support this vital tool.”

Here's a little secret: I can't stand taking my hands off the keyboard. Mice and trackpads are great tools, but they aren't always an ideal (or speedy) solution for navigating the Web. That's where keyboard shortcuts come in. Of course, memorizing a list of keyboard commands can be just as painful as repeatedly shifting your hands from your keyboard to your mouse and back again. So what's a smart PC user to do? My suggestion: Use a small number of keyboard shortcuts and only those that make life easier. Two useful keyboard shortcuts can be yours courtesy of , a browser extension for Chrome that lets you control most of your web browsing from the keyboard. Vimium was inspired by 'vi,' an arcane text editor created at a time when the mouse didn't exist and the only way to navigate a document was with your keyboard. The first thing you'll need to do is download and install Vimium from the .) Once you're all set, open CNN.com or any other website and check out the following shortcuts:

With these games on your phone, you can easily ignore your obnoxious in-laws!