Today at Mobile World Congress we are not simply announcing the existence of Windows Phone 7 Series – we are proud to show you our design results after more than a year of talking to real people, testing out various designs and thinking deeply about how to bring together the web, your data, and applications. For the first time ever, we are bringing together Xbox LIVE games and the Zune music and video experience to phones.Just about a year ago we took a hard look at the state of the smartphone industry – particularly at design.
When looking at what kind of phones people are buying nowadays,we can narrow it down to primarily five types of devices: High-end smartphones, advanced QWERTY phones, simple QWERTY phones, simple touchscreen phones and prepaid phones.
When Microsoft announced Windows Phone 7, it immediately became clear that WP7 will be powering high-end smartphones in the future. When Microsoft announced Kin, they announced two simple QWERTY phones along with it, simple in the way that they aim to do a few things very well.
The mobile phone market is undergoing exciting changes of epic proportions. Phones are shifting dramatically towards more empowered and more capable devices. At the same time, they need to be re-invented to meet consumers’ higher expectations of what a phone should be. Today’s phones need to cater to texters, gamers, music lovers, and socializers as much as business users. And people are no longer satisfied with just being connected. They want be in touch – in a personal and engaged way - to share their experiences, to create experiences.
Nicholas Negroponte, head of MIT’s Media Lab, observed that the information age is fast replacing atoms with bits; movies on film with packets on the Internet; print media with digital media; and wires with digital radio waves.
Negroponte does not apply the bits-for-atoms principle to warfare, but Bruce Berkowitz, in The New Face of War, does. According to Berkowitz, a senior analyst at RAND and a former intelligence officer, future wars will not be won by having more atoms (troops, weapons, territory) than an opponent, but by having more bits . . . of information.
McAfee study says;China leads the world in hacked computers
More private computers were commandeered by hackers for malicious purposes in China in the last quarter of 2009 than in any other country, including the United States, according to a new study by an Internet security company.
Dot com. Dot gov. Dot net. Dot org. Dot edu. Dot mil. Dot tv.
The Internet has spawned a whole new lexicon and brought the world to your living room, 24/7/365. And while the opportunities online for consumers are almost endless, there are some challenges, too. As in dot con.
Dot con? Dot con.
The TippingPoint Zero Day Initiative (ZDI) is proud to announce that the annual Pwn2Own contest is back again this year at the CanSecWest security conference held in Vancouver, BC on March 24th 2010. As the contest name implies, if you successfully exploit a target you get to keep it along with a ZDI cash prize and related benefits.
In the early days of VoIP, there was no big concern about security issues related to its use.People were mostly concerned with its cost, functionality and reliability.Now that VoIP is gaining wide acceptance and becoming one of the mainstream communication technologies,security has become a major issue.The security threats cause even more concern when we think that VoIP is in fact replacing the oldest and most secure communication system the world ever known POTS (Plain Old Telephone System).
Priority One: Client-side software that remains unpatched.
Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have Internet access. Those same client-side vulnerabilities are exploited by attackers when users visit infected web sites. (See Priority Two below for how they compromise the web sites). Because the visitors feel safe downloading documents from the trusted sites, they are easily fooled into opening documents and music and video that exploit client-side vulnerabilities. Some exploits do not even require the user to open documents. Simply accessing an infected website is all that is needed to compromise the client software. The victims' infected computers are then used to propagate the infection and compromise other internal computers and sensitive servers incorrectly thought to be protected from unauthorized access by external entities. In many cases, the ultimate goal of the attacker is to steal data from the target organizations and also to install back doors through which the attackers can return for further exploitation. On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk.