Mobile Software News. Read the latest stories about software from Mobile Industry Today.
Friday, October 19, 2012
Zoner AntiVirus Free for Android Tablet
Zoner AntiVirus Free Tablet - Mobile Anti-Virus and Anti-Theft for protecting the Android-tablet, with the remote control, filtering calls and SMS / MMS messages, strong encryption of outgoing messages.
Zoner AntiVirus Free Tablet is an advanced mobile security solution and anti-virus solution for your Android-tablet.
Anti-Virus protects your tablet from viruses, dialers, Trojans, worms, spyware, adware and other malicious programs. Zoner also provides messaging security encryption and filtering phone calls.
Remote Shot - Remote Control built-in camera phones
Owners a couple of smartphones based on operating system Android or iOS will enjoy a free application called Remote Shot. With this tool, you can use one of the available devices for remote camera control in the second portable device. Remote Shot program offers a range of interesting features, including switches between cameras on the front and rear of the smartphone supports capture video and still images, offers a self-timer, and more.
The application can be useful in many situations. For example, you can turn one of the smartphones in the hidden camera and use it to watch it happen in the next room. Remote Shot also allows amateur photographers to attend the group shots.
Preparing to take a few seconds of operation. First make sure that the application Remote Shot shove on both smartphones. You will also need to activate the Bluetooth module on each device (detection nearby multiple tablets or smart phones with Bluetooth enabled, users can select the desired device from the list.)
In the world counted billion smartphones
The number used in the world of smartphones in the third quarter of 2012 for the first time exceeded one billion. This was reported by Bloomberg on October 17, with reference to research company Strategy Analytics.
As noted in the study, only in the last year the number of active smartphones increased by 47 percent - from 706 million to 1 billion 38 million devices.
Strategy Analytics experts suggest that the mark of two billion smartphones will be passed in 2015. First, as noted, it will come from the emerging markets of China, India and African countries, the prevalence of smartphones in which at the moment is relatively low.
The authors also expressed the view that over the next five years to continue to dominate the smartphone devices based on Android and Apple iOS, but to them can significantly closer Windows Phone from Microsoft, which currently does not occupy a large market share.
Media appointed announcement of iPad mini on 23 October
Apple has sent out invitations to journalists on the next presentation, which will take place on October 23, reports blog Gizmodo.
At the invitation shows white apple on a colorful background. Under the illustration is the phrase "We've got a little more to show you". The event will be held in San Jose, Calif., and will start at 10:00 local time. In Moscow, this time will be 21 hours.
Media suggest that the presentation will show a smaller version of Apple iPad tablet called iPad mini. Expect that the device will cost less than the "big" iPad, get a screen diagonal of 8.7 inches and can not connect to cellular networks.
It is possible that the iPad mini will not be the only device demonstrated at the presentation. Blog 9to5Mac citing anonymous sources, reported on October 14 that the Apple iPad mini simultaneously show 13-inch MacBook Pro with a screen Retina.
Monday, October 15, 2012
noozy studio 3.0 - functional media player for the Android platform
Developers from DogsBark announced a new version of its popular product noozy studio 3.0. This versatile media player for Android mobile platform combines an impressive array of features with stylish and functional user interface.
The application can be used to play audio and video stored on the hard drive, as well as an online multimedia content. In the tab "Live" users will find an impressive list of several thousand Internet radio stations and will be able to instantly set up your smartphone to the desired "wave." If you liked the repertoire specific station, you can add it in one motion to the list of "favorites" for faster access later. In addition to music and video new version noozy studio 3 can play voice recording - "podcasts" - and offers handy tools for processing new subscriptions.
Saturday, October 13, 2012
Smartphone-alarm Best Phone Security came on Windows Phone

RV Appstudios company released a new version of its utility named Best Phone Security for smartphones running Windows Phone mobile operating system version 7.5 or later. Previously, the utility has already gained widespread popularity on platforms iOS and Android, and is now available for users of Windows-smartphones. The function of this tool is to literally grab the hand of curious friends and members of the household who are trying to view on your machine some very personal information.
User utilities Best Phone Security is enough to switch your device security mode and wait until the alarm will usher in an attempt to dig into your data. It is particularly interesting that when you try to enter the wrong password utility captures the place where someone was trying to open an interesting data on your smartphone. To draw attention to the person who wrongfully trying to unlock and explore the contents of your smartphone, the utility Best Phone Security uses the built-signal device.
Wednesday, October 10, 2012
Leakage of personal data 760 000 users

Failure of mobile service led to the leakage of personal data 760 000 users
Popular in Japan, the application collects information from the user's address book, which was in the public domain.According to Kyodo News, due to an unknown error applications for mobile platforms have been abducted by the data from the address book of about 760 000 people in Japan.
App Zenkoku Denwacho, the latest version is widely used in devices based on Android, allowing users to search the global directory of contacts, create a corporation Nippon Telegraph and Telephone.
Monday, October 8, 2012
CSA Mobile: list of the major threats to the security of mobile devices
The experts provided a list of the major threats to the security of mobile devices.
Data loss, insecure Wi-Fi-connection and NFC leads in the list of the main threats to the security of mobile devices.
According to a study by CSA Mobile, 81% of respondents believe that today one of the major threats to the security of mobile devices are unsecured Wi-Fi-connection and unprotected access point to the Internet.
Data loss, insecure Wi-Fi-connection and NFC leads in the list of the main threats to the security of mobile devices.
According to a study by CSA Mobile, 81% of respondents believe that today one of the major threats to the security of mobile devices are unsecured Wi-Fi-connection and unprotected access point to the Internet.
Thursday, October 4, 2012
Wondershare Dr.Fone – Data Recovery from your iPhone, iPad or iPod Touch

You can directly scan and recover data from iOS devices, even when you encounter White Apple Logo Screen of Death, inaccessible system, broken device, or forget screen lock password.
Wondershare Dr.Fone is a desktop app for Windows PCs. Just install it, then launch the program and connect your iOS device to your computer. From there, you can search for deleted photos, text messages, videos, contacts and more with ease. You can use this iPhone data recovery software to retrieve 12 kinds of data.
Tuesday, October 2, 2012
Spyware for BlackBerry, iPhone, Android, Windows Mobile or Symbian OS

Retina-X Mobile Spy - Spyware for BlackBerry, iPhone, Android, Windows Mobile or Symbian OS. With Mobile Spy you can securely monitor your smartphone in real time.
This development is a spyware that allows the background to capture all emails sent from this mobile device, get data about the sites on which the user was, and view other data stored on the device. According to the Retina-X Studios, Mobile Spy can be used as a solution for parents, employers, as well as the decision to replicate critical data.
Subscribe to:
Posts (Atom)