Posted by A Ocean on August 11, 2010 ·
Android
A Trojan horse began appearing on phones running Google’s Android software in Russia. The malware was detected by security firm Kaspersky, who reported the file is named “Trojan-SMS.AndroidOS.FakePlayer.a” and is downloaded as a .APK Android app. This is the first known Android specific trojan.
Once the file is installed the Trojan horse begins sending text messages to premium-rate [...]
Posted by A Ocean on August 9, 2010 ·
One of the most wished application on iPhone is Adobe Flash, If you fancy having Flash up and running on your iPhone 4, it is now possible, thanks to Comex, the person behind JailbreakMe tools for iOS devices. Comex’s version of Adobe Flash 10.1 which is known as Frash is still in its infancy stage with an alpha build.
The hack can only be applied to a Jailbroken iPhone 4, though the [...]
Posted by A Ocean on August 9, 2010 ·
source : JustinAngel Twitpic
According to a tweet image by Justin Angel who is former Microsoft program manager with access to the Windows Phone 7 Marketplace, Microsoft has already started to populated the yet unreleased Windows Phone 7 Marketplace with a couple of third party applications along with in house apps.
The images reveals that there are at least placeholders for a variety of games [...]
Posted by A Ocean on August 9, 2010 ·
Tablet PC
Rumor mills have been working overtime about Blackberry maker RIM( Research In Motion) plans to introduce its tablet PC which will take on Apple’s iPad. Adding credence to the rumors is report by Bloomberg News ( citing two people familiar with the company’s plans) which says that RIM is expected to launch a touchscreen tablet computer in November, which will work closely [...]
Posted by A Ocean on August 6, 2010 ·
App Store
Apple’s App Store just opened up a “Try Before You Buy” to lets users test drive a limited selection of apps before buying them.
The new section could be accessed from under Features, go to features and select Free on the App Store, the new section serves only to highlight the free edition of apps which only contains the freemium, “lite” or ad-supported versions of apps [...]
Posted by A Ocean on August 5, 2010 ·
Google Wave
Last year at Google I/O, Google has launched Google Wave, a web app for real time communication and collaboration, it set a high bar for what was possible in a web browser (character-by-character live typing, and the ability to drag-and-drop files from the desktop). Google said yesterday that they “don’t plan to continue developing Wave as a standalone product,” though the code [...]
Posted by A Ocean on August 5, 2010 ·
Give way, iPhones and BlackBerrys, smartphone customers in U.S. have voted with their wallets and picked Android as their favorite in the second quarter of this year according to NPD , a market research company. Earlier NPD survey has shown Android-based smart phones outselling the iPhone in the U.S. in the first quarter of 2010.
NPD concluding that 33 percent of phones sold during the [...]
Posted by A Ocean on August 5, 2010 ·
Amazon Store
Amazon has announced this morning the launch of its UK Kindle Store. The online store will stock over 400,000 books including 84 of the 100 Nielsen UK Bestsellers.
On 29th July, Amazon UK started taking pre-orders for the all-new Kindle featuring a new electronic-ink screen , a new sleek design with a smaller body while still keeping the same 6-inch-size reading area. The all-new [...]
Posted by A Ocean on August 4, 2010 ·
iOS 4.1 Beta 3
Apple’s iPhone Developer Program has released iOS 4.1 Beta 3 to developers signed on Apple’s developer program. As usual, users should not be downloading and installing iOS 4.1 Beta 3 if they are not developers. Jailbreakers and unlockers should stay away if they want to keep their jailbreak ability in the future.
iOS 4.1 Beta 2 was made available just over two [...]
Posted by A Ocean on August 4, 2010 ·
iPhone
Jailbreakme.com app is a boon to apple device users looking to break the shackles of Apple’s stringent sofware restrictions. Hacking a phone OS is usually done through exploiting a weakness to get unsigned code onto a device.
If the good folks could open up our phones for us than any other hacker, with nefarious intentions , could use that same exploit to mess with your phone. Think [...]