Software vulnerabilities have existed for as long as there has been software. Organizations and their developers have been locked in a cat-and-mouse game with the legion of hackers looking to steal data. Every time one breach is fixed, another is exploited, and ‘round and ‘round it goes. So, after Julian Assange and WikiLeaks, Edward Snowden, … continue reading
AMD has announced an updated version of its tool suite designed to generate detailed information about the real-world performance of AMD’s CPUs, APUs and GPUs. CodeXL 1.6 aims to speed up applications running on the company’s processors. The latest version features GPU profiling capabilities, API-level debugging for OpenCL 2.0 apps, and a new tool that … continue reading
Android Action Launcher 3 is coming soon, and will be released as a paid upgrade. Android developer Chris Lacy announced the impending release in a Google+ post, explaining that Google is charging for it because it is an entirely new, redesigned version of the app. According to Lacy, when version 3 is released, Action Launcher … continue reading
Google has released reCAPTCHA, a free service to protect websites from spam and automated malware breaches. reCAPTCHA uses a risk-analysis engine and adaptive CAPTCHAs to recognize when a human user or a bot is attempting to access a site, and it learns as CAPTCHAs are solved to digitize text, annotate images and build machine-learning datasets. … continue reading
A new Kickstarter project wants to help mold the next generation of innovators. DynePods is a wearable, educational, programmable and connected toy that is designed to teach fundamental concepts of customization, programming, engineering and socialization. “I am thrilled to be in the toy business,” said Krissa Watry, president and CEO of Dynepic, which developers DynePods. … continue reading
Many of our businesses store information about our customers. Perhaps customers set up accounts for e-commerce or for information access. Perhaps we install cookies and track their movements across our websites. Perhaps we gather demographics and create profiles of those individuals. And perhaps our customers upload and store data (such as photos or videos) that … continue reading
The Department of Homeland Security’s United States Computer Emergency Readiness Team (US-CERT) has issued a warning about a vulnerability affecting Unix-based operating systems. The vulnerability, dubbed Shellshock, was discovered in the Bourne-Again Shell, also known as Bash. Bash is a popular Linux and Unix shell, and according to security researchers, the newly revealed bug could … continue reading
Apple’s Touch ID vulnerable to attack Lookout security researcher Marc Rogers warned that the fingerprint reader on the iPhone 6 is vulnerable to attack, just as the iPhone 5s was. “When the iPhone 6 came out, the first thing I wanted to find out was whether or not there had been any changes to the … continue reading
Microsoft releases Visual Studio and TFS 2013 Update 4 CTP 1 Keeping up its accelerated update pace, Microsoft has released the first community technology preview of Update 4 for Visual Studio 2013 and Team Foundation Server 2013. Microsoft TFS product unit manager Brian Harry announced Update 4 CTP 1 in a blog post, detailing primarily … continue reading
Just when you thought public opinion of the NSA couldn’t get any worse, the United States is implicated in another massive government surveillance program. Community members of the open-source GNU Project have unearthed evidence of HACIENDA, a government surveillance program used to map servers in 27 countries. Discovered by security researchers Julian Kirsch, Christian Grothoff, … continue reading
Nokia enters post-device future with Nokia Z Android Launcher The Nokia Z Android Launcher, a home screen replacement for Android phones that learns and evolves based on usage patterns, has released its first major update and opened its pre-beta to download and test the launcher. Developed by the Nokia Technologies Group, a separate entity from … continue reading