Yesterday Apple unveiled the new iPhone 6 smartphones and the upcoming Apple Watch. The new iPhones will be available soon, but even before they hit the street, the latest version of Apple’s mobile operating system, iOS 8, will roll out.
Of the many new and updated features in iOS 8, two in particular will help people be more efficient: the new Spotlight search, and Notification Center. Both help you find what you need to find, and do what you need to more simply, and with fewer swipes and taps.
This is a preview of
The new, more productive iOS 8: Spotlight and Notification upgrades make it well worth downloading
.
Read the full post (107 words, estimated 26 secs reading time) Categories: General.
Tags: downloading, More, Notification, productive, spotlight, Upgrades, Well, Worth
By IPHere —
September 12, 2014 at 1:13 am It’s hard to imagine that we are already three-fourths of the way through 2014—at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
Yes. Internet Explorer. Once again Microsoft’s web browser takes center stage as the most crucial of the Patch Tuesday security bulletins. Microsoft resolved a grand total of 42 separate vulnerabilities this month, but 37 of those 42 are addressed in MS14-052—the cumulative update for Internet Explorer. One of the flaws fixed by MS14-052 is publicly known and actively under attack in the wild, which is why this security bulletin is Critical.
This is a preview of
Internet Explorer steals the Patch Tuesday spotlight again
.
Read the full post (128 words, estimated 31 secs reading time) Categories: General.
Tags: Again, Explorer, Internet, Patch, spotlight, Steals, Tuesday
By IPHere —
September 10, 2014 at 1:13 am Over the Labor Day weekend, hackers leaked nude images of a number of celebrities including “Hunger Games” star Jennifer Lawrence. The images appear to have been acquired from Apple’s iCloud. So, iCloud is obviously insecure and everyone should stop using it—right?
Let’s just cool our jets. Yes, iCloud appears to have played a role in at least some of the hacked nude celebrity images, but details are still too sketchy to start connecting dots that indict the entire Apple cloud storage service.
This is a preview of
Don’t blame iCloud yet for hacked celebrity nudes
.
Read the full post (152 words, estimated 36 secs reading time) Categories: General.
Tags: Blame, celebrity, Don't, Hacked, iCloud, nudes
By IPHere —
September 5, 2014 at 7:14 pm If you’ve ever watched a horror movie, you know the trope where the hero seemingly kills the monster, but as soon as he turns his back to walk away the monster regains consciousness and attacks again with renewed vigor. According to the latest report from F-Secure, that’s the sort of scenario we might be looking at with the Gameover Zeus botnet.
This is a preview of
The game is not yet over for Gameover Zeus botnet
.
Read the full post (149 words, estimated 36 secs reading time) Categories: General.
Tags: botnet, Game, Gameover, Over, Zeus
By IPHere —
September 5, 2014 at 1:13 pm In an ideal world, a tablet would be an extension of the PC—a device that is more portable, yet still enables users to continue work done while on the go. Tablets like the iPad and Samsung Galaxy Tab do work in that capacity to an extent, but not seamlessly. Citrix is changing things, though, with the launch of Citrix ShareConnect, which it calls a remote access innovation that extends the promise of mobile workspaces on any device.
This is a preview of
Citrix ShareConnect extends the power of your PC to your tablet
.
Read the full post (131 words, estimated 31 secs reading time) Categories: General.
Tags: Citrix, Extends, Power, ShareConnect, Tablet
By IPHere —
September 5, 2014 at 7:13 am Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported.
Kaspersky Lab surveyed nearly 4,000 IT professionals regarding mobile device security concerns. The results illustrate the challenges facing IT managers and an apparent disregard among users for securing mobile devices or protecting business data.
This is a preview of
Report: Businesses at risk from unreported mobile device theft
.
Read the full post (175 words, estimated 42 secs reading time) Categories: General.
Tags: Businesses, Device, from, Mobile, Report, Risk, Theft, unreported
By IPHere —
September 4, 2014 at 7:13 am There are a number of smaller Windows tablets hitting the shelves now from Microsoft OEM partners and more on the horizon. At face value it seems like a late attempt by the Windows ecosystem to get in on the mobile device game. The reality, though, is that Microsoft can still capture a respectable—possibly dominant—stake of the tablet market.
This is a preview of
5 reasons a small Windows tablet might be in your future
.
Read the full post (212 words, estimated 51 secs reading time) Categories: General.
Tags: Future, Might, Reasons, Small, Tablet, Windows
By IPHere —
August 29, 2014 at 1:13 pm Apple is reportedly planning to launch a 12.9-inch version of the iconic iPad tablet sometime in early 2015. A larger iPad could be a more effective tool for mobile business users, but only if Apple also addresses a few other issues.
A bigger iPad makes sense on a few levels. Samsung, Apple’s chief rival in mobile devices, already offers a larger tablet. And Microsoft recently bumped its Surface Pro tablet from 9.7 inches to 12.2 inches. Smaller tablets like the iPad Mini or the Google Nexus 7 fill a need, but when it comes to real-world productivity, bigger is better.
This is a preview of
Rumored 12.9-inch iPad could be better for business productivity
.
Read the full post (118 words, estimated 28 secs reading time) Categories: General.
Tags: 12.9inch, Better, Business, Could, iPad, Productivity, Rumored
By IPHere —
August 27, 2014 at 1:15 am Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don’t miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new consumer survey from Kaspersky Labs, I am not alone.
This is a preview of
Report: Consumers concerned about online threats but do little to protect themselves
.
Read the full post (162 words, estimated 39 secs reading time) Categories: General.
Tags: About, concerned, Consumers, Little, Online, Protect, Report, themselves, Threats
By IPHere —
August 25, 2014 at 1:13 pm At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances—the household technologies that make up the Internet of Things—can be compromised. When you look beyond the demo’s hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, “How vulnearable is IoT?”
To find out, David Jacoby, a security researcher with Kaspersky Lab, hacked his own living room.
This is a preview of
Your living room is vulnerable to cyber attacks
.
Read the full post (99 words, estimated 24 secs reading time) Categories: General.
Tags: Attacks, Cyber, Living, room, Vulnerable
By IPHere —
August 22, 2014 at 7:12 pm