Thursday, February 21, 2013

ESET NOD32 Mobile Security


This solution provides a safe working with files, email, and other data that are on devices equipped with mobile platforms such as Windows Mobile and Symbian.

In addition to proactive protection, this product is capable of filter incoming messages and block unwanted spam-SMS/MMS. If modern computer memory consumption Antivirus is becoming less critical, mobile this question is still relevant. In this connection, NOD32 Mobile Security from the company ESET, whose products have always been known for its low system requirements, will be an effective solution to protect your device.

All suspicious files Mobile Security quarantines, where they can be repaired or removed by the user. In addition, the program provides comprehensive monitoring system and provides information about free space, battery level, running processes, Bluetooth-connected devices, etc. Built-in firewall scans all incoming and outgoing traffic, which makes safe operation on the Internet.

Tuesday, February 19, 2013

Release mobile platform Tizen 2.0


Saw the light of the second stable release of the mobile platform Tizen, which continues to develop systems MeeGo and LiMO, but differs in the use of Web API and web-based technologies (HTML5/JavaScript/CSS) to create mobile applications.

Tizen platform developed under the auspices of the Linux Foundation, with the participation of LiMo Foundation, Intel and Samsung. The platform is universal and suitable for use on various types of mobile devices, including smartphones, tablets, netbooks, TVs and in-vehicle infotainment systems.

The release is only available in source form, on which you can prepare yourself for the assembly of various devices. To facilitate the formation of assemblies supported repository of binary packages, as well as a reference assembly to run in the emulator. As standard equipment for which checks the work platform used Samsung Galaxy S2 HD and Samsung Galaxy S3. Simultaneously for mobile application developers released Tizen SDK package 2, which includes a development environment based on Eclipse, phone emulator based on QEMU, documentation, sample applications, tools and components for building software. SDK available for the platforms Linux (Ubuntu), Windows and Mac OS X.

Monday, February 18, 2013

Malicious mobile software hunts for user data


Danger to users are not only malicious programs for mobile operating systems, but also legitimate applications that access data stored on smartphones.

According to the expert of the research group Team Cymru Steve Santorelli mobile users are now very vulnerable to cyber threats. The fact that they are not anti-virus software installed on their devices and shift the responsibility on Internet service providers and software vendors.

According to the expert, the use of the Internet via mobile phones - a "time bomb", and the rapid growth of the global network through gadgets only confirms this. According to the expert, with the December 2012 to use the Internet through smartphones has 20% more people.

Saturday, February 16, 2013

Mobile threats - the main trend in 2012


Segement threats to mobile devices have become the fastest growing this year, and, of course, is the main trend of the year.

According to global statistics in 2012, the number of unique malware detected only for the Android OS has grown by 17 times (!) Compared with 2011. Everyone knows that the Android because of its openness and high incidence of the most fertile ground for attacks and malicious users more interested in other mobile platforms. We have documented that the most active regions on the prevalence of such threats are Russia, China and Iran.

Threats by Android, is generally carried out the theft of various information from the device or sending paid SMS (signed by paid services). A new way to use steel attackers - transmission control device in their hands by placing it in a botnet, that is, get full access to the device (zombie device). This kind of threat ranking leaders who sign the user on the paid services (TrojanSMS.Agent and TrojanSMS.Boxer). In second place threat, whose purpose is to transfer the unit under full control intruders that can be installed on a new malware, data theft exercise, change device settings, use the contact list to send spam organization (DroidKungFu).

Friday, February 15, 2013

Vulnerability in iOS 6.1 allows to compromise iPhone via the blocking screen


By manipulating a few emergency calls and the power button, the user can gain access to the interface of the phone.

One of the users of the service under the name videosdebarraquito YouTube posted a video instruction Bypass lock screen on iPhone 5 running iOS versions 6.1, 6.0.2 and 6.0.1. As follows from the record, the vulnerability allows access to applications, contacts, voice mail, and photos (via the attached photo to a contact).

According to published step by step instructions, operation is to implement a lock screen emergency call and then cancel it, after which you must hold down the power button.

Thursday, February 14, 2013

Mobile virus writers still prefer simple attacks


Despite concerns about the emergence of complex and multi-platform threats, hackers often use primitive methods of attack.

According to the study of anti-virus company Blue Coat, to date, the vast majority of virus writers, specializing in the creation of malicious software for mobile platforms, give their preference to use primitive methods of attack. Thus, the researchers believe, to messages about the appearance of new and more sophisticated mobile threats should be treated with less concern.

As found out in Blue Coat, are the most common viruses that can fulfill the demand dial premium-rate number, and conduct phishing attacks on the owners of compromised devices. The use of social engineering techniques, usually indicates that hackers are trying to steal a variety of user credentials or make various services to their subscribers with premium, the fee for which is transferred to the account of virus writers.

Tuesday, February 12, 2013

Apple has released iOS 6.1.1 update


Operating System Apple iOS 6.1.1 came to the users of mobile products before the products considered by many fans of Apple. However, this release is not available to all users of mobile gadgets California company, but only to users of smartphones iPhone 4S.

Note that the first beta release of version 6.1.1 there was a resource for developers Apple just last week and today the company has submitted the final version of the product. As follows from the description of 86-megabyte update package fixes a number of issues that could affect their performance in some 3G-networks. Initially the company ottestiruet update on real 3G-network operators around the world. It is unclear why the release update was in such a hurry.

Monday, February 11, 2013

mSpy fully supports iOS 6.1+ and iPhone 5


mSpy - the most popular spyware application for smartphones in 2012


We are glad to announce that now mSpy fully supports iOS 6.1+ and iPhone 5.

Be the first to grab iPhone 5 users, as it was impossible to use any spy product on those devices before.

Product-spy application for smartphones. Spy software for mobile has a wide audience and are a great solution for parents, employers, or for yourself to duplicate important information and phone calls, or to control the second half.

mSpy a digital surveillance software application that is installed directly on the smartphone, for which you want to watch. From any web-browser, you have access to text messages, call history, email subscriber, you can learn about its location.

Saturday, February 9, 2013

Android Tweaker - fine-tuning and optimization of the Android-devices


Hosts smartphones and tablets based OC Android offers useful app called Android Tweaker. This easy to use tool designed to fine-tune a mobile OS, optimization of portable devices, as well as a fast and secure installation modification.

Attractive and functional interface allows to activate the different "modes" and interact with the different components of the system. For easier access key tools and functions are grouped into separate tabs (performance, battery, network, audio, images, GPS, kernel, tools and miscellaneous). Switching between tabs, you can ensure a more productive operation of the device by turning off unnecessary features, adjust the sensitivity of the touch screen to adjust the quality of display images and change other important parameters. Developers separately emphasize that using the proposed tool, users can optimize the modules GPS, provide a higher quality signal reception networks WiFi and 3G, as well as use Google DNS service to access the services and sites blocked in your country.

Thursday, February 7, 2013

Penultimate - create handwritten notes on the iPad screen


Developers of service Evernote announced a new version of the app Penultimate for iPad.

With the help of this very useful tool for owners of portable devices will be able to create handwritten notes and use all features Evernote to store notes in the "offline", and synchronize them across multiple devices and over the Internet. Users should be particularly pleased with the fact that the program, previously available in the online store iTunes App Store for 99 cents, you can now download for free.

According to Evernote CEO Phil Libin (Phil Libin), the decision to move into the category of Penultimate free applications can be considered trivial. Up until recently, the utility enjoyed strong demand and brought the owners a good income. However, this move is in line implemented the policy of the company. Recall that management considers to Evernote, basic applications must be distributed free of charge, as opposed to supporting tools and Premium-functions.

Wednesday, February 6, 2013

New Jailbreak for iOS 6.1 makes the records of popularity


The new jailbreak, aimed at all the latest iOS-devices has been gaining popularity among users.

Released on Monday evasi0n tool capable of "breaking" all iOS6.1-devices including iPhone 5, iPad 4 and the fifth generation iPod Touch, also in comparison with the previously released jailbreak, use evasi0n easily enough.

As a result of these factors, for the first six hours of placement in the open catalog jailbreak Cydia application of its downloads exceeded 800 000. As of Tuesday evening, the number of downloads exceeded 1.7 million, according to Jay Freeman, manager Cydia, in the coming days the number of downloads to exceed 4 million copies.

According to David Wong, one of the developers of jailbreak their product relies on five unique bugs in the code of Apple iOS, so it can get to the core of iOS. With access to the core operating system, bypassing security systems become technical.

Android-antivirus from AVG learned to block calls and SMS


AVG AntiVirus for Android Update Adds Call and Text Message Blocker.

The company AVG Mobile Technologies announced the release of an updated version of its mobile antivirus AVG Antivirus for Android-devices. The new version has several new features that are sure to be useful to end users.

The main novelty AVG AntiVirus 3.1 for Android has enhanced ability to protect users from spammers, cyber criminals and fraudsters. This additional protection is provided by a new feature to block calls and text messages. Blocker module warns you about suspicious text messages, and then offers to enable filtering or complete blocking unwanted messages and calls.

Tuesday, February 5, 2013

Sophos has released update version Mobile Control 3.0


Antiviruses company Sophos unveiled a new version of its mobile device management (MDM) - Sophos Mobile Control 3.0, which has an installation and cloud options.

This version includes support for devices with Samsung SAFE, providing greater control over their use and making it easier to identify and implement policies BYOD (use of personal devices employees). The decision also implemented integration with the software package Sophos Mobile Security 2.0, which protects smartphones and tablets running Android.

The latest version of Sophos Mobile Control is integrated with Sophos Mobile Security, which provides increased protection devices running Android. Thanks to Sophos Mobile Control, the organization will be able to safely use Android - all applications and external storage devices are scanned for malware, reports of all detected problems are sent to a central server, and the corrective action to run automatically according to the company exposed settings.

Friday, February 1, 2013

The Apple will turn the owner of the smartphone into "the walking ATM"


Apple has developed one of the most courageous of algorithms to convert all smartphone users in the "walking ATM machine". This algorithm is already in the pending patent, allows anyone to get cash from other, more affluent users nearby.

So, imagine a situation - you want to eat, and the nearest cafe, where you threw a table his mortal body, does not accept the card. ATM nearby can not see - what to do? Apple engineers offer out under difficult name «ad-hoc cash-dispensing network» (self-organizing network of cash). All you need is to run a custom application, and enter the desired amount of cash. On the next point, the application distributes the request to other users in the vicinity (using location information of the first user).

When someone close to you from the user agrees to give you cash out of your wallet, you tell him your exact location to meet and get your bill. It is also proposed to use the card, where your future lenders will be displayed as asterisks (if the request for extradition made of money), or in the form of question marks (if you have not received a request), or a cross (if refused to comply with your request.)

New Android preparing to leave


According to data published in Internet roadmap of Qualcomm, the announcement of the operating system Android 5.0 - Key Lime Pie (key lime pie) - is scheduled for II quarter of 2013. Indicated and the probable date - May 15 (the day kicks off annual conference Google I / O).

It is also reported that by the end of this year, will present the first Qualcomm chips that are optimized to work with Android 5.0. Probably, it is a 4-core 2.3 GHz chip with Adreno 420 graphics.

It is not known what kind of innovation is preparing this version of Google's mobile operating system. It is expected that one of the first, shortly after the official announcement, the device will update the line Nexus, and new devices running Android 5.0 can be expected in the III quarter of 2013.