The first Android 8.0 O preview has landed, so here's everything you need to know, including the best features, latest release date news, name rumours, and how to download the beta, plus which phones are likely to get Android O first. The ...
Google has posted a blog entry detailing what will be coming with the next update (over the next several weeks) of its Google Chrome web browser—one the main highlights is the implementation of voice activated, hands-free searching. ...
An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
One developer's posting this week about Chrome has drawn a bunch of headlines from tech sites launching into reports on the developer's headline post: "Chrome Bugs Allow Sites to Listen to Your Private Conversations." Tal Ater, who ...
Tags: Consumer Electronics, Electronics
North Carolina is famous for its high-tech Research Triangle, but lately it seems that state government IT projects are bound for IT's equivalent of the Bermuda Triangle. As you may remember from an earlier Risk Factor story on state ...
Tags: Consumer Electronics, Electronics
A new specification focused on a charger that can work on notebook computers from different manufacturers was announced on Monday. The IEC Technical Specification 62700: DC Power supply for notebook computer will be available in early 2014. ...
Tags: Consumer Electronics, Electronics
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products. Unlike other bug bounty programmes, the ...
Tags: security, researcher, laud, Microsoft, Facebook, bounty
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. The program aims to “improve the security of key third-party software ...
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs. The ...
Tags: Adobe, Flash Player
Both sets of technologies recognize the growing use of the browser for richer interactions between users and services, over and above the viewing of static Web pages. “We still use the browser language, although most of what people ...
The Pirate Bay has introduced its own browser that can be used to circumvent censorship and blockades. The PirateBrowser is a simple, one-click, pre-configured Firefox browser that makes The Pirate Bay and other blocked sites instantly ...
Tags: Pirate Bay, Web Browser
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer. The data is being incorporated into the company's biannual transparency ...
Tags: Google, Malware, Transparency, Web safer
Google today patched 12 vulnerabilities in Chrome, including one of the few labeled "critical" that it has fixed in the five-year history of its browser. Tuesday's update to the "stable" build channel -- analogous to a production version ...
Today at Google I/O, Magisto, the automatic video editing solution that turns everyday videos and photos into movie magic, announced several new points of integration with Google, including launching on Google Chrome's Packaged App ...
Tags: Magisto, Google, App Platform
SAP today announced the release of SAP Fiori, a set of 25 easy-to-use applications for the most frequently used transactions, available across a broad range of devices, to be published on Google Chrome. SAP Fiori is available through SAP ...
Tags: SAP, Google, Chrome, Computer Products