By NICOLE PERLROTH
Hackers have figured out how to lock people out of their Android devices and demand money in exchange for letting them back in.
Published: August 22, 2014 at 12:00AM
from NYT Technology http://ift.tt/1mvlIF6
via IFTTT
By NICOLE PERLROTH
Hackers have figured out how to lock people out of their Android devices and demand money in exchange for letting them back in.
Published: August 22, 2014 at 12:00AM
from NYT Technology http://ift.tt/1mvlIF6
via IFTTT
El gasto será imputado a Divulgación de Políticas del Estado
from El Universal: Computación http://ift.tt/1mvZRxn
via IFTTT
Exclusive: Apple iPhone 6 screen snag leaves supply chain scrambling
Suppliers to Apple are scrambling to get enough screens ready for the new iPhone 6 smartphone as the need to redesign a key component disrupted panel production ahead of next month’s expected launch, supply chain sources said.
August 22, 2014 at 1:06PM
via Digg http://ift.tt/1oXRznA
La compañía FLIR es una especialista en cámaras térmicas que incluso se atreve con carcasas especiales para el iPhone. Pero la empresa quiere seguir sorprendiéndonos con más efectos y tomas espectaculares, y la última realizada en el circuito…
from Engadget en español – RSS Feed http://ift.tt/1BKR18M
via IFTTT
Stealing encryption keys through the power of touch
Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.
August 22, 2014 at 11:45AM
via Digg http://ift.tt/1sYlj5i
New York Times Releases Crossword App That You Can Actually Finish
There’s nothing more daunting than the New York Times crossword puzzle. Who actually knows what a three letter word is for the “Queen of Thebes, in myth”? Kim Kardashian is a queen, we guess. But now there’s a crossword for the masses.
August 22, 2014 at 11:45AM
via Digg http://ift.tt/1toda8X
La identificación de contenido pirata en la red se lleva a cabo gracias a la colaboración de los propios afectados y usuarios
from El Universal: Computación http://ift.tt/1saNvOn
via IFTTT
El internet de las cosas es el futuro de nuestra vida cotidiana, sin embargo, tampoco tiene que ser como hasta ahora nos lo han presentado. Estimote de hecho propone que no tengamos que disponer de aparatos tan caros a la hora de conectar nuestras…
from Engadget en español – RSS Feed http://ift.tt/1tsFW7t
via IFTTT
Además de teléfonos, Xiaomi tiene en su catálogo televisores y equipos multimedia, sin embargo, parece que no terminan de alcanzar el nivel de éxito que ha permitido a sus smartphones hacerse con un gran cuota de mercado en China. Pero en las…
from Engadget en español – RSS Feed http://ift.tt/1sZLY1P
via IFTTT
Your Anonymous Posts to Secret Aren’t Anonymous After All
White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. “Is that you?” he asks. A few minutes ago I gave Caudill my personal e-mail address, and that was all he needed to discover my secret in the middle of a Palo Alto diner, while eating a BLT.
August 22, 2014 at 9:35AM
via Digg http://ift.tt/1q4o6q1