Reuters: Technology News
last updated: Wed, 03 Sep 2014 05:18:34 GMT

United Internet to buy KKR's stake in Versatel for $769 mln
FRANKFURT (Reuters) - German internet service provider United Internet said on Wednesday it had agreed to acquire buyout group KKR's 74.9 percent stake in cable group Versatel for about 586 million euros ($769 million) in cash.

full story

BBC News - Technology
last updated: Tue, 02 Sep 2014 10:57:12 GMT

Celebrity leaks 'no breach' - Apple
The leaking of intimate photos of celebrities from iCloud accounts was due to a theft of log-in information, not a security breach, says Apple.

full story

PC World - News RSS feed
last updated: Wed, 03 Sep 2014 11:29:06 +1000

Lenovo ups features in low-cost Android tablets with $199 Tab S8
Lenovo wants to pack better features in low-cost Android tablets with the Tab S8 tablet, which will start selling this month for US$199.

full story

Tech News Headlines - Yahoo News
last updated: Wed, 03 Sep 2014 02:30:21 -0400

Google starts quantum computing research project

A Google logo is seen at the garage where the company was founded on Google's 15th anniversary in Menlo Park, California(Reuters) - Google Inc said a research team led by physicist John Martinis from the University of California Santa Barbara will join the company to start a project to build new quantum information processors based on superconducting electronics. The Quantum Artificial Intelligence Lab is a collaboration between Google, NASA Ames Research Center and the Universities Space Research Association (USRA) to study the application of quantum optimization related to artificial intelligence. (http://bit. ...


full story

CNET News.com
last updated: Fri, 21 Mar 2014 18:41:00 PDT

Mom tries to Facebook-shame daughter, gets pizza on face
A mother makes her daughter pose for a picture to prove that it will travel far and wide on the Web. She ends up getting prank calls, pizza deliveries, and a lesson for herself.

full story

BuzzFeed - Geeky
last updated: Fri, 29 Aug 2014 10:41:44 -0400

16 Everyday Problems That Would Not Exist If You Were A Wizard

First World Problems? There’s a spell for that.

You'd never have to break the bank hiring movers.

You'd never have to break the bank hiring movers.

Apatow Productions / Via giphy.com

Because you could sit back and let "Wingardium Leviosa" do all the dirty work for you.

Because you could sit back and let "Wingardium Leviosa" do all the dirty work for you.

Warner Bros. / Via gifboom.com

When you go out for drinks and realize you forgot your ID at home.

When you go out for drinks and realize you forgot your ID at home.

Pixar / Via gifmambo.com

You'd just keep calm and "Accio" dat shit.

You'd just keep calm and "Accio" dat shit.

ACCIO DRIVERS LICENSE!

Warner Bros. / Via legiaodosherois.virgula.uol.com.br


View Entire List ›

full story

Apple Says Systems Weren’t Hacked in Nude Pics Grab
The hackers targeted users, not Apple's systems

Apple said Tuesday that hackers who posted hundreds of nude images of celebrities over the weekend didn’t penetrate its systems, but rather got access to the pictures through a “very targeted attack on user names, passwords and security questions.”

That type of attack, which ensnared celebrities including Jennifer Lawrence and Kate Upton, is known as a “brute-force attack,” in which hackers simply try a wide variety of username and password combinations in an attempt to gain access to a target’s account. It’s much simpler—and often less effective—than more complex attacks, but it can be effective if the targeted service doesn’t put a limit on the number of times a user can try to log in before it locks them out. In a brute-force attack, hackers often employ software specially written to come up with random combinations of usernames and passwords, vastly speeding up the process.

“None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone,” Apple said, meaning the attack targeted individual users rather than Apple’s systems as a whole. “We are continuing to work with law enforcement to help identify the criminals involved.”

Apple also advised users to turn on what’s called Two-Step Verification, which adds an extra layer of protection to online accounts. Essentially, two-step verification means that after users enter their memorized password, the service to which they’re logging in text-messages them a secondary, randomly-generated code. Users gain access to their account only after that secondary code is entered.

Two-step verification can foil a brute-force attack because it’s nearly impossible for hackers to gain access to targets’ phones.

full story

Twitter / liamalexander
last updated: Mon, 08 Oct 2012 07:22:42 +0000

liamalexander: My daily stats: 12 new followers, 9 new unfollowers via http://t.co/hROlspGI
liamalexander: My daily stats: 12 new followers, 9 new unfollowers via http://t.co/hROlspGI

full story

Twitter / Favorites from liamalexander
last updated: Mon, 25 Apr 2011 22:44:57 +0000

alanjonesUK: RT @PopSci: Scientists finally have some answers about the mysterious "dark matter" in the human genome: http://t.co/Gm4Fh0B6
alanjonesUK: RT @PopSci: Scientists finally have some answers about the mysterious "dark matter" in the human genome: http://t.co/Gm4Fh0B6

full story

Ask the Guru
last updated:

Captain marketing phone number - We are a SEO, SEM, and online advertising firm based in Los Angeles. Our experts specialize in search engine optimization, Intern

full story

Stumble
last updated: Fri, 25 Feb 2011 22:09:15 +0000