Showing posts with label Latest Technolgoy. Show all posts
Showing posts with label Latest Technolgoy. Show all posts

Tuesday, October 11, 2011

Brain waves to track sleep quality with a new app use !!

TOKYO, Oct 10 (coolblognews.com | Latest news update 24x7) - A new app that aims to improve both the quantity & quality of sleep uses brainwaves to track the amount of time spent in different stages of sleep.

Called Sleep Manager, the app synchronizes with a headset that measures brain activity, eye movement & other signals in light, deep & REM (rapid eye movement) sleep.

"The thing about sleep is that it's not just about how much you get - it's about the quality of your sleep," said Ben Rubin, co-founder of Zeo, which makes the app.

"In general, you want to optimize to get as much REM & deep sleep as possible."

A soft-sensor headband measures brainwave activity, muscle tone & eye movements, the same signals that would be taken by a professional sleep lab, but at a consumer level.

The signals are relayed through Bluetooth to the user's iPhone, iPad, or Android smartphone & uploaded to Zeo's website.

Rubin said that sleep tracking is only the beginning. After benchmarking sleep quality, Zeo uses this information to coach the user's sleep habits.

Studies have shown that when people wake up during the light sleep phase they are more refreshed, so the app has the ability to rouse users while in this state.

It also syncs with other apps such as RunKeeper, a running application, & DailyBurn, a nutrition planning app, to allow users to see how their sleep quality relates to their fitness & diets.

But not everyone is convinced that Zeo can provide accurate sleep data.

Rubin agrees there are limitations to the measurements that can be done but he said the app comes close to replicating a sleep lab.

"If you have two experts in a sleep lab scoring the same record, they agree with each other about 83 percent of the time," said Rubin. "Zeo agrees with those guys about 75 percent of the time. So we're about 7/8th as accurate as a full sleep lab," he added.

The company has an in-house sleep expert on their team, as well as an advisory board made up of sleep experts from Harvard University & the University of Colorado Bolder.

coolblognews.com | Latest news update 24x7

Saturday, October 8, 2011

The last week of Steve Jobs

With time running out, Jobs was choosy about who he'd see to say goodbye.
Jobs Managed His Farewells !!

Over the last few months, a steady stream of visitors to Palo Alto, Calif., called an old friend’s home number & asked if he was well enough to entertain visitors, perhaps for the last time.

In February, Steven P. Jobs had learned that, after years of fighting cancer, his time was becoming shorter. He quietly told a few acquaintances, & they, in turn, whispered to others. & so a pilgrimage began.

The calls trickled in at first. Just a few, then dozens, & in recent weeks, a nearly endless stream of people who wanted a few moments to say goodbye, according to people close to Mr. Jobs. Most were intercepted by his wife, Laurene. She would apologetically explain that he was too tired to receive many visitors. In his final weeks, he became so weak that it was hard for him to walk up the stairs of his own home anymore, she confided to one caller.

Some asked if they might try again tomorrow.

Sorry, she replied. He had only so much energy for farewells. The man who valued his privacy almost as much as his ability to leave his mark on the world had decided whom he most needed to see before he left.

Mr. Jobs spent his final weeks — as he had spent most of his life — in tight control of his choices. He invited a close friend, the physician Dean Ornish, a preventive health advocate, to join him for sushi at one of his favorite restaurants, Jin Sho in Palo Alto. He said goodbye to longtime colleagues including the venture capitalist John Doerr, the Apple board member Bill Campbell & the Disney chief executive Robert A. Iger. He offered Apple’s executives advice on unveiling the iPhone 4S, which occurred on Tuesday. He spoke to his biographer, Walter Isaacson. He started a new drug regime, & told some friends that there was reason for hope.

But, mostly, he spent time with his wife & children — who will now oversee a fortune of at least $6.5 billion, and, in addition to their grief, take on responsibility for tending to the legacy of someone who was as much a symbol as a man.

“Steve made choices,” Dr. Ornish said. “I once asked him if he was glad that he had kids, & he said, ‘It’s 10,000 times better than anything I’ve ever done.’ ”

“But for Steve, it was all about living life on his own terms & not wasting a moment with things he didn’t think were important. He was aware that his time on earth was limited. He wanted control of what he did with the choices that were left.”

In his final months, Mr. Jobs’s home — a large & comfortable but relatively modest brick house in a residential neighborhood — was surrounded by security guards. His driveway’s gate was flanked by two black S.U.V.’s.

On Thursday, as online eulogies multiplied & the walls of Apple stores in Taiwan, New York, Shanghai & Frankfurt were papered with hand-drawn cards, the S.U.V.’s were removed & the sidewalk at his home became a garland of bouquets, candles & a pile of apples, each with one bite carefully removed.

“Everyone always wanted a piece of Steve,” said one acquaintance who, in Mr. Jobs’s final weeks, was rebuffed when he sought an opportunity to say goodbye. “He created all these layers to protect himself from the fan boys & other peoples’ expectations & the distractions that have destroyed so many other companies.

“But once you’re gone, you belong to the world.”

Mr. Jobs’s biographer, Mr. Isaacson, whose book will be published in two weeks, asked him why so private a man had consented to the questions of someone writing a book. “I wanted my kids to know me,” Mr. Jobs replied, Mr. Isaacson wrote Thursday in an essay on Time.com. “I wasn’t always there for them, & I wanted them to know why & to understand what I did.”

Because of that privacy, little is known yet of what Mr. Jobs’s heirs will do with his wealth. Unlike many prominent business people, he has never disclosed plans to give large amounts to charity. His shares in Disney, which Mr. Jobs acquired when the entertainment company purchased his animated film company, Pixar, are worth about $4.4 billion. That is double the $2.1 billion value of his shares in Apple, perhaps surprising given that he is best known for the computer company he founded.

Mr. Jobs’s emphasis on secrecy, say acquaintances, led him to shy away from large public donations. At one point, Mr. Jobs was asked by the Microsoft founder Bill Gates to give a majority of his wealth to philanthropy alongside a number of prominent executives like Mr. Gates & Warren E. Buffett. But Mr. Jobs declined, according to a person with direct knowledge of Mr. Jobs’s decision.

Now that Mr. Jobs is gone, many people expect that attention will focus on his wife, Laurene Powell Jobs, who has largely avoided the spotlight, but is expected to oversee Mr. Jobs’s fortune. A graduate of the University of Pennsylvania & the Stanford Graduate School of Business, Mrs. Powell Jobs worked in investment banking before founding a natural foods company. She then founded College Track, a program that pairs disadvantaged students with mentors who help them earn college degrees. That has led to some speculation in the philanthropic community that any large charitable contributions might go to education, though no one outside Mr. Jobs’s inner circle is thought to know of the plans.

Mr. Jobs himself never got a college degree. Despite leaving Reed College after six months, he was asked to give the 2005 commencement speech at Stanford.

In that address, delivered after Mr. Jobs was told he had cancer but before it was clear that it would ultimately claim his life, Mr. Jobs told his audience that “death is very likely the single best invention of life. It is life’s change agent.”

The benefit of death, he said, is you know not to waste life living someone else’s choices.

“Don’t let the noise of others’ opinions drown out your own inner voice. & most important, have the courage to follow your heart & intuition.”

In his final months, Mr. Jobs became even more dedicated to such sentiments. “Steve’s concerns these last few weeks were for people who depended on him: the people who worked for him at Apple & his four children & his wife,” said Mona Simpson, Mr. Jobs’s sister. “His tone was tenderly apologetic at the end. He felt terrible that he would have to leave us.”

As news of the seriousness of his illness became more widely known, Mr. Jobs was asked to attend farewell dinners & to accept various awards.

He turned down the offers. On the days that he was well enough to go to Apple’s offices, all he wanted afterward was to return home & have dinner with his family. When one acquaintance became too insistent on trying to send a gift to thank Mr. Jobs for his friendship, he was asked to stop calling. Mr. Jobs had other things to do before time ran out.

“He was very human,” Dr. Ornish said. “He was so much more of a real person than most people know. That’s what made him so great.”

Reporting was contributed by Julie Bosman, Quentin Hardy, Claire Cain Miller & Evelyn M. Rusli.

iPhone 5 release date

Apparently all those frustrated by Apple’s failure to announce an iPhone 5 this week are punishing Apple by crashing its website with a flood of iPhone 4S preorders. Even with the specter of the iPhone 5 scoring a release date anywhere from four to twelve months from now, buyers went wild last night at the start of the iPhone 4S pre-order cycle, lighting up Apple.com to the point that the online store was overwhelmed with traffic. Users reported the same difficulty when they attempted to score the new iPhone through the official websites for iPhone 4S carriers AT&T, Verizon, & newcomer Sprint as well. In other words the iPhone 4S broke four of the world’s larger eCommerce sites just a few days after the death of Apple co-founder Steve Jobs broke Twitter as the news broke the world’s heart. Even as Apple users paid tribute to Jobs across the internet & at Apple retail stores worldwide, iPhone 4S presales began at a more frenzied pace than the public’s initially dour reaction to the “seen that before” iPhone 4S on the day of its introduction earlier this week, with AT&T now reporting that it saw two hundred thousand preorders the first night (that’s not counting Verizon & Sprint, who have their own preorders), making the iPhone 4S already more popular on the carrier than the iPhone 4 was when it went into initial preorder mode last year. That’s even as others continue to stick with their initial stance that they’ll be waiting for the iPhone 5.

The rise of the iPhone 4S dictates that the iPhone 5 release date won’t be in 2011. Not on new favorite son Sprint. Not on uneasy recent partner Verizon. & not on old frenemy AT&T. But rest easy, it won’t be in 2012 either. The fate of the iPhone 5 now comes down to Apple’s strategy as much as whatever manufacturing or component issues which held it up in the first place, as Tim Cook & the company must not only contend with the passing of Steve Jobs a mere one day after the 4S unveiling, but also the fact that it can’t very well turn around & launch the iPhone 5 a few weeks from now even if it is ready; backlash from 4S buyers would off the charts. So while Apple hasn’t said a word about the iPhone 5 or even so much as spoken the words “iPhone 5″ at any point, here’s a look at what logic, circumstance, & common sense dictate are the practical iPhone 5 release date scenarios. Listed by date, & handicapped by the odds of each happening:

January whiplash>> This sees the iPhone 5 ready to go by January and, realizing that the iPhone 4S didn’t overwhelm anyone & opting to waste no time, holds a press event in mid January & gives the iPhone 5 a late January release date. Those who skipped the 4S will be thrilled, those who bought it in October will be more than a little ticked that their new iPhone just became obsolete three months later, particularly in light of stringent cell carrier upgrade pricing schemes. The iPhone 4S would also stick around as a bargain model, & would see a price cut of at least $100 as of the iPhone 5 arrival, leaving 4S buyers feeling not just disappointed but ripped off.

iPhone 5 sees five release date scenarios from rosy summer to 2012 fail

As the cadre of would-be iPhone 5 buyers turned to Steve Jobs for answers on its release date, he simply shrugged & talked about how great its software features are going to be once it shows up. His hype-fest merely served to ratchet up expectations & thus excitement for the next generation iPhone 5 while failing to give any real hint as to when it’s coming. As such, the question we get asked most often, “When is the iPhone 5 release date?”, is being asked even more frequently than when the week began. The answer: we don’t know. & neither does anyone else outside of Apple’s innermost posse. But here are five scenarios for its release, along with the realistic odds of each & the corresponding impact.

Very soon. The theory: Apple didn’t unveil the iPhone 5 this week because it wanted iOS 5 & the iCloud to get all the attention. Apple will hold a press conference next week & announce the iPhone 5 on its own. The reality: Not bloody likely. Why would Apple do something so strange?

August. The theory: iOS 5 needs beta testing & developer lead time, & Apple doesn’t want to roll out the iPhone 5 until iOS 5 is ready. Announcing the iPhone 5 this week would have hurt iPhone 4 & 3GS sales in the mean time, so it decided to hold off.

September. The theory: see the above scenario, except Apple decides to use its traditional early September iPress Conference to launch the iPhone 5. The reality: Feels like the most likely scenario.

Just before the holidays. The theory: Something about the iPhone 5 and/or iOS 5 is running late, & we mean late. But Apple is determined to get it to market before the holidays, so it’ll surface sometime not too long before November’s Black Friday shopping season launch. The reality: You’re getting colder. If Apple really were going to need to leave the iPhone 5 hanging for that long, it likely would have done some sort of interstitial model in the mean time.

Doomsday 2012. The theory: Apple decides to leave the iPhone 4 as the current model for more than a year & a half, unleashing the iPhone 5 in February of 2012 or so. The reality: aside from fouling up the iPad 3 launch, waiting this long for the iPhone 5 would be too poor of an idea for Apple to even be considering, particularly in light of the fact that it just unveiled iOS 5 which will apparently be ready for public release within months. Do you really see a scenario in which Apple either A) releases iOS 5 this year for the iPhone 4 but with no iPhone 5 in tow, or B) has unveiled iOS 5 now but with no intention to release it until the iPhone 5 is ready next year? Either scenario evokes the phrase “epic fail.” These are both nonsensical, which is why we expect to see the iPhone 5 this year. & because Apple almost never releases major new hardware any later in the year than early September, we’re betting on that scenario above. Here’s more on the iPhone 5.

What Are We Expecting from the iPhone 5

After Apple announced a media event with the slogan [Let’s talk iPhone], it is certain that the iPhone 5 launch is coming. There is a huge buzz surrounding the new iPhone & what will be included. Here are some things you should expect with the iPhone 5:

A New Design

At first, many people thought that Apple was going to keep the design of the iPhone 5 identical or extremely close to the iPhone 4. However, numerous pictures of new iPhone cases have been released, which in no way could hold the previous versions of the iPhone. Therefore, it is safe to say the iPhone 5 has been redesigned.

Faster Performance

To keep up with competitors, Apple most likely will be upgrading the RAM on the iPhone 5. We rely on smartphones extensively so it only makes sense that Apple would have upgraded the speed & performance of the new iPhone.

Better Camera

While Apple did improve the camera with the iPhone 4, it is expected that the camera on the iPhone 5 will be upgraded further. Many experts believe the screen will be larger, the camera will be 8 megapixels instead of 5, & the iPhone 5 will allow for full 1080p recording.

4G?

It is still unknown whether or not Apple will include 4G capabilities on the iPhone 5. However, if 4G is included, expect the iPhone to be larger. 4G requires a large amount of battery power & Apple has always been careful about battery life. While many people do want 4G on the iPhone, we will have to wait until the meeting to see whether or not Apple has included it.

Addition of New Carriers

Apple has slowly been extending its’ reach to new carriers. There is some speculation that Apple will include new carriers for the iPhone 5. Some rumors have indicated T-Mobile will be included, especially with AT&T trying to buy them. Sprint will likely be offering the iPhone 5 with an unlimited data plan, which AT&T / Verizon no longer offer.

iOS 5

Apple will definitely be launching the iPhone 5 with it’s new operating system giving us over 200 new features. You can see exactly what’s included on the Official Apple iOS5 page.

Voice Recognition

Apple acquired a voiced-based personal assistant service Siri last year & has not used it much at all, at least that we know of. Apple may be integrating this service on the new iPhone to allow for voice recognition.

If anything is certain, the new iPhone 5 should be much improved & better then previous models. Apple always seems to one-up themselves with each version & hopefully the iPhone 5 is no different.

Latest Car | Luxurious New Car

In this article is all about Latest and Luxurious New Car Pictures and some sort information. But we know that this article is not enough to present from perfect but at least you'll get what you are looking for on this topic. So good luck happy reading and look around, Do not forget your comments and suggestions.

This is very latest and future car design

 Latest Cars For Future

New Cars in 2011 [Land Rover]

[USA] new latest cars

 Latest And Luxury Cars

Billion Horsepower Car With Sexy design

[Jaguar] latest car so shine design

[Dodge reveals Charger Pursuit police vehicle]
Dodge automaker has recently reveal their fastest police car: Charger Pursuit Police Vehicle that has swept Michigan State Police’s Vehicle Evaluation Test.

[ Toyota reveals Pixis Space in Japan ]
Toyota automaker has recently reveal their Pixis Space in Japan that features 660cc engine which is available in both naturally-aspirated and turbocharged guise.

[ Fiat automaker has recently reveal their 500 Pink Ribbon Edition ] to support Breast Cancer Research Foundation in United States.

The Fiat 500 Pink Ribbon Edition Pricing starts at $22,500 (€16,538) & Fiat will donate $1,000 (€735) to the BCRF for every Pink Ribbon edition sold. 250 units will be available, but Fiat has confirmed plans to make a $50,000 (€68,025) minimum contribution if there aren’t enough buyers.

Check out the press release for additional information & full performance data on Fiat 500 Pink Ribbon Edition for Breast Cancer Research Foundation.

Thursday, October 6, 2011

New innovation is coming up: The Particular Brain Fold That Helps People Distinguish between Imagination and Reality

Did you actually open the refrigerator a few minutes ago, or were you just thinking about it & imagined that you did? If you can remember correctly, you might have an extra fold in your brain.

A fold in the front brain called the paracingulate sulcus, or PCS, can apparently help people more accurately remember whether something was imagined or really happened, or which person actually said something. It's one of the final structural folds to develop before birth, & its size varies greatly in the general population, according to researchers at the University of Cambridge. People with the fold were significantly better at memory tasks than people without the fold, the researchers say.

The study, which was published in the Journal of Neuroscience, involved 53 healthy adult volunteers with no reported history of cognitive difficulties, according to a Cambridge news release. & everyone thought they had a good memory before the tests.

Participants were chosen based on MRI scans that showed a clear presence or absence of the PCS fold. Then they were presented with word pairs & half-pairs — like “Laurel & Hardy” or “Laurel & ?” In the second test, they were asked to imagine the other word, & then either they or the study leader actually said the word aloud.

Then they had a memory test, where they tried to remember whether they had actually seen the second word or just imagined it, & which person said the word out loud, Cambridge says. People with a PCS remembered correctly a lot more often.

This work has implications for some mental disorders like schizophrenia, in which the line between reality & imagination is unclear to the patient. In other studies, schizophrenic patients reportedly have had reduced PCS areas, according to Jon Simons of Cambridge’s Experimental Psychology department & Behavioural & Clinical Neuroscience Institute.

What to do about this isn’t clear — because the fold happens so shortly before birth, it’s not something that can be physically changed. But understanding the PCS’ role in memory & reality perception could have some impact on drug treatments for mental disorders.

A Florida School District is Taking Attendance by Scanning Students' Fingers

Roll call is going high-tech in Washington County, Fla. Rather than the usual name calling & response, students are now checking into class with finger scanning devices. & to keep better track of students from the minute they come under district supervision until they are delivered safely home again, the scanners are now moving from the school building to the school bus.

The systems have been active inside Washington County schools for roughly two months, but since most of the students in the district ride the bus anyhow, officials have decided the best place for the scanners is on the buses themselves. In the next week, a handful of buses will get the scanners. If the system proves worthwhile, all buses will have them by semester’s end.

At $30 per student per year, the system isn’t necessarily cheap. But considering the uptick in attendance (which means more money from the state in many districts) & the inherent increase in accountability & student safety, it may well be worth the cost. & naturally, parents who don’t want their children fingerprinted coming to & from school for whatever reason can opt to have their kids check in with their teachers in a more analog fashion.

Get your own free virtual mobile phone number to receive & send sms.

Do you want a free virtual phone number from where you can send free sms & even receive sms? Mostly this feature is needed for business purpose but we might also need virtual phone number to receive & send sms in some personal matter also. Below is given how you can get free virtual mobile number from where you can send sms & even can receive sms.

There is a company named “LLEIDANETWORKS SERVEIS TELEMATICS” from Spain, From this website you can get a free virtual phone number of Spain in the format +3497******* from which you can send free sms & can even receive sms on-line. Even if we need credit (Account balance) to send sms & we need to buy credit they give 3 credits for free to new users & sending each sms takes an average of 0.30 credits from your account (but may vary according to the country you send sms to) so each account you sign up with will give you about 10 free sms to send. & you can receive unlimited sms for free. You can also forward the sms you receive in your virtual phone number to your actual number but for doing so you will be charged a credit equal to the credit charged to send sms to your real number. Also they provide you a free online phone book in your account for storing your contacts safely & send sms to those numbers faster.

So to get this service you need to click on “Free Account” At the side bar. You then will see a form, just fill out this form with correct details & click send. After you click send within 2-5 minutes you will receive an email on the email address you provided to them.
Within the email will be your username & password to access your account & a virtual phone number for you where your friends can sms to you & you can check those sms from your account.

After you receive your username, password & virtual phone number you can login to your account by two ways one by websms by going to another by downloading a software to your computer & logging in from there VirtualHandset.exe

Your account will be active for 6 months even if you don’t use your account to buy credits & just use it to receive & send sms. & if you want to buy credits to send more sms from your virtual number you can just login to websms link given above & click on “Recharge”, you will be able to buy credits using your credit cards which will cost you from 0.09 to 0.1202 euro dollars which depends on the volume of credits you buy.

Or if you don’t want to invest money then you can just sign up again with another email address & receive 3 free credits & a new virtual mobile number.


Popular Searches:

virtual mobile number
virtual mobile number for sms receiving
virtual sms number
virtual mobile phone
online phone number for receiving texts
free virtual sms
free virtual mobile number
online phone number to receive texts
free virtual number
virtual cell phone
fake phone number to receive texts
free mobile number
free online mobile number
virtual number for sms
free virtual sms number
virtual cell phone number
virtual phone number sms
free sms number receive
fake mobile number
virtual mobile number sms
virtual mobile number free
free number to receive sms
Virtual Mobile Numbers
free virtual phone number
receive free text message number
virtual phone number for sms
get free sms number
Fake Phone Number to receive text
virtual mobile phone number
virtual sms number free

Monday, October 3, 2011

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

IBM Vs Microsoft in tech giants ranking...!!!

For the first time since 1996 IBM's market value has exceeded Microsoft's.

IBM's closing price on 29 September was $214bn (£137.4bn) while Microsoft's was a shade behind at $213.2bn (£136.8bn).

The values cap a sustained period in which IBM's share price has moved steadily upward as Microsoft's has generally been in decline.

The growth means IBM is now the second largest technology company by market value. Apple still holds the top slot with a value of $362bn (£232bn).

Since the beginning of 2011, IBM's share price has made steady gains & is now 22% higher than at the start of the year, according to Bloomberg figures. By contrast, Microsoft's value has dropped 8.8% over the same time period.

Analysts put the switch in the number two slot down to a decision IBM made in 2005 to sell off its PC business to Chinese manufacturer Lenovo to concentrate on software & services.

"IBM went beyond technology," Ted Schadler, a Forrester Research analyst told Bloomberg. "They were early to recognise that computing was moving way beyond these boxes on our desks."

By contrast much of Microsoft's revenue comes from sales of Windows & Office software used on PCs. Also, Microsoft is between releases of Windows which can mean a fallow period for its revenues.

Windows 7 was released in 2009 & Windows 8 is not expected to be released until late 2012 at the earliest.

Many have also claimed that the rise of the web, mobile computing & tablets spells the end of the PC era. In early August, Dr Mark Dean, one of the designers of the original IBM PC, declared that the centre of the computing world had shifted away from the humble desktop.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Criminals target mobile devices & social networks !

Smartphones & social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

Users of Facebook, Twitter & Google's mobile operating system, Android, are said to be particularly vulnerable.

However, the number of attacks remains small compared to other online crimes such as e-mail phishing.

According to Symantec, known vulnerabilities in mobile operating systems rose from 115 in 2009 to 163 in 2010.

In several cases, the security holes were exploited & used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area .

At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

"It is something we have started to see happen, albeit on a small level," said Orla Cox, security operations manager at Symantec.

"It allows people to do a variety of things from intercepting SMS messages to dialling toll numbers. They have opened up the possibility of what is there."

Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Rogue applications

On Facebook & Twitter, Symantec's analysis highlighted several different types of threat.

Among the most prevalent were web links that encourage users to click through to other sites containing malware & rogue applications, designed to collect personal information.

The company estimates that one in six links posted on Facebook pages are connected to malicious software.

User information is said to be particularly valuable in "social engineering" attacks, where criminals use knowledge of an individual to trick them into scams that appear to relate to them personally.

Attack toolkits

Symantec makes its money selling internet security software & services to individuals & corporations

Its annual Internet Security Threat Report - based on data supplied by users around the world - is generally regarded as a reliable measure of changing trends in cyber crime.

Globally, the company recorded a 93% increase in the volume of web-based attacks between 2009 & 2010.

The dramatic rise was largely attributed to the widespread availability of "attack toolkits" - software packages that allow users with relatively little skill to design their own malicious software.

Toolkits are available to buy online for as little as a few pounds & as much as several thousand for the latest versions.

The most popular attack kit was Phoenix, which exploits vulnerabilities in the Java programming language - commonly used for web-based applications.

Symantec's report also notes a rise in the number of targeted attacks, where specific companies, organisations or individuals are singled out.

The most sensational targeted attack of 2010 was undoubtedly Stuxnet. The software worm was designed to take control of mechanical systems used in Iran's nuclear plants.

It has been widely speculated that the USA or Israel may have played a role in its creation.

Despite Stuxnet's headline-grabbing nature, Orla Cox believes that it may not be indicative of things to come.

"It was interesting to see that it is possible to attack physical systems. I think it unlikely that we will see a whole slew of attacks of that nature," she said.

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Samaritans Help Troubled Facebook Users......!!!

The Samaritans & Facebook are teaming up to allow users to get help for friends they think might be having serious problems.

Facebook has 30 million users in the UK & anyone concerned about people struggling to cope or with possible suicidal thoughts will be able to get help through the Help Centre.

The feature enables users to report specific content, like status updates or wall posts.

For instance, typing the word "worried" into the help centre search engine will bring up a list of places to find advice as well as the option to report suicidal content.

Once a report about suicidal content has been processed, the distressed person will be sent a message with information on how they can contact the Samaritans if they need help.

Samaritans cheif executive Catherine Johnstone said: "We want to remind people that if a friend says that life isn't worth living, they should always be taken seriously.

"Facebook is a part of daily life for so many of us & we must make sure that people online have support when they need it."
By - Lulu

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Bad spelling opens up security loopholes...

Facebook has paid $5000 to those who found the biggest security holes in its site. & has spent $40,000 (£25,000) in the first 21 days of a program that rewards the discovery of security bugs.

The bug bounty program aims to encourage security researchers to help harden Facebook against attack.

One security researcher has been rewarded with more than $7,000 for finding six serious bugs in the social networking site.

The program runs alongside Facebook's efforts to police the code it creates that keeps the social site running.

A blog post by Facebook chief security officer Joe Sullivan revealed some information about the early days of the bug bounty program.

He said the program had made Facebook more secure by introducing the networking site to "novel attack vectors, & helping us improve lots of corners in our code".

The minimum amount paid for a bug is $500, said Mr Sullivan, up to a maximum of $5000 for the most serious loopholes. The maximum bounty has already been paid once, he said.

Many cyber criminals & vandals have targeted Facebook in many different ways to extract useful information from people, promote spam or fake goods.
Continue reading the main story
“Start Quote

It's hardly surprising that the service is riddled with rogue apps & viral scams”

Graham Cluley Sophos

Mr Sullivan said Facebook had internal bug-hunting teams, used external auditors to vet its code & ran "bug-a-thons" to hunt out mistakes but it regularly received reports about glitches from independent security researchers.

Facebook set up a system to handle these reports in 2010 which promised not to take legal action against those that find bugs & gave it chance to assess them.

Paying those that report problems was the logical next step for the disclosure system, he said.

Graham Cluley, senior technology consultant at Sophos, said many other firms, including Google & Mozilla, run similar schemes that have proved useful in rooting out bugs.

However, he said, many criminally-minded bug spotters might get more for what they find if they sell the knowledge on an underground market.

He added that the bug bounty scheme might be missing the biggest source of security problems on Facebook.

"They're specifically not going to reward people for identifying rogue third party Facebook apps, clickjacking scams & the like," he said. "It's those sorts of problems which are much more commonly encountered by Facebook users & have arguably impacted more people."

Facebook should consider setting up a "walled garden" that only allowed vetted applications from approved developers to connect to the social networking site, he said.

"Facebook claims there are over one million developers on the Facebook platform, so it's hardly surprising that the service is riddled with rogue apps & viral scams," he said.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Warning to Facebook users for over personal data

Computer security experts are warning that Facebook users divulge too much personal information which can potentially be accessed by criminals.

Cyber criminals can use this information to steal people's identities and commit fraud in their name.

IT security consultant Rob Vaughan, who spoke about cyber crime at the University of Glamorgan in Pontypridd on Tuesday, said people should think twice before adding details like their address and date of birth to their Facebook page.

"You can change your privacy settings but people put far, far too much personal information into Facebook and other social networking sites," he said.

"If you just stop and think about what you are doing... ask yourself if you really need to put that level of information in there.

"Also, you don't necessarily know all your [Facebook] friends on there that well."
Continue reading the main story
“Start Quote

You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things”

Det Sgt Andrea Barnard e-Crime Wales police manager

Mr Vaughan, who has just helped set up Electric Cat Cymru which helps businesses and domestic users with IT security, said criminals may use various websites to gather information on an individual, a process known as aggregation.

"I would say if you were looking at trying to pinch somebody's ID or glean as much information about someone, or if you are profiling somebody, you will find a lot of information out there in the public domain," he said.

"Organised crime is using the internet as an easy target."

Facebook, which has more than 750m active users with 50% logging on in any given day, said users were in "complete control" of what they shared, who they shared it with and how much they shared.

Its privacy settings "allow users to easily restrict access to any content that they post, as they post, according to their own comfort level", said a spokesperson.
Continue reading the main story
Facebook safety tips

Block and report anyone who sends you unwanted messages
Beware of suspicious links
Keep your computer's software up to date to beat cyber criminals
Visit the Facebook safety page
Use different passwords for your different online accounts - and keep them secret
Spend a little time reviewing your privacy settings
Be careful when accepting or sending friend requests
Before you post, stop and think about who might see it
Be careful when accessing or sending information over an unsecured public wireless network
Learn how to use tools that allow you to report things that make you feel uncomfortable

"We've made that process even simpler over the last week by introducing smart friend lists.

"Lists have existed for several years but we've made them even easier to use by rolling out smart lists which create themselves and stay up-to-date based on profile info your friends have in common with you - like your work, school, family and city."

Recent figures from a Freedom of Information request to South Wales Police showed that the number of crimes involving Facebook were on the increase.

Det Sgt Andrea Barnard, e-Crime Wales police manager, said: "I collate statistics every month on a pan-Wales basis and I can certainly say crimes on Facebook are always top of the list every month.

"You are looking at things like identity theft, harassment, bullying, sexual harassment - all sorts of things.

"It's all because people are putting up too much information about themselves."

She said businesses also needed to be careful about social networking sites as, for example, viruses and malware (malicious software) could be accidentally downloaded by employees using them during a break.

"If that's happening in the workplace it's very expensive to sort the problem out and you are potentially exposing very important company data," she said.

She said she would always advise businesses to implement an 'acceptable use policy' for social networking sites.
Extract data

Jaime Hindle, business liaison officer at the University of Glamorgan, said more and more businesses were now using social networking sites for commercial purposes, which presented potential pitfalls.

"If you don't take a savvy attitude to your page, you could be compromised," he said.

"It could be personal protection or commercial sabotage from viruses to phishing to spam to hacking into data."

He said cyber crime as a whole was becoming more prevalent as criminals turned away from more high-risk illegal activities.

"The old crimes of mugging and ram raiding, we don't hear of them any more because criminals are looking at less risky and more profitable enterprises like cyber crime," he said.

The University of Glamorgan hosted Tuesday's seminar on cyber crime as part of the Software Alliance Wales project, which promotes Wales' ICT and software sector.

Facebook will check every links for viruses

Facebook will check every web link its users click on for computer viruses & other dangers as part of efforts to improve the security of the world's largest social network.

From today, hundreds of millions of outbound links every day will be passed through a system provided by the web security firm Websense.

It will effectively visit pages on users' behalf, & apply a series of tests for Trojans, phishing attempts, botnets & other threats.

If the system does not detect a problem with a link, the user will be allowed to visit the page as normal, without any sign that it has been checked. When a threat is detected, however, Facebook will present a warning with links to more information. If the user wants to proceed anyway, they will be allowed.

"Facebook is a big target for criminals online," said Spencer Parker of Websense.

"We'll be protecting all 750 million of its users."

Facebook will check every links for viruses

Facebook will check every web link its users click on for computer viruses & other dangers as part of efforts to improve the security of the world's largest social network.

From today, hundreds of millions of outbound links every day will be passed through a system provided by the web security firm Websense.

It will effectively visit pages on users' behalf, & apply a series of tests for Trojans, phishing attempts, botnets & other threats.

If the system does not detect a problem with a link, the user will be allowed to visit the page as normal, without any sign that it has been checked. When a threat is detected, however, Facebook will present a warning with links to more information. If the user wants to proceed anyway, they will be allowed.

"Facebook is a big target for criminals online," said Spencer Parker of Websense.

"We'll be protecting all 750 million of its users."

 
Develop by SEO Booster Tips | Estates For Sales | Expert Zone