Tuesday, March 31, 2015

Updated Gmail app for the Android operating system – Banker


             With the new software updates Gmail for mobile devices with the Android operating system, users will be able to check at the same time messages from all your e-mail accounts – announced the company Google.
           

 

“Starting from today, you will be able to browse at the same time messages, regardless of which account they come with option + Inbox (All Inboxes) +. This way, you can read all messages and provide answers without the need to switch between accounts “- said Google in a statement.

 

Portal TechRadar notes that such a solution is targeted primarily for business customers who have multiple accounts and need to keep track of them on a regular basis. Gmail supports e-mail, among others, from Yahoo or Outlook.

 

Google announced that the updated program also has other facilities, including the ability to save files to Google Drive (data storage service called. Cloud) with one click. Developers also improved the auto-complete feature that helps you find interesting member of news information.


 

The application is available on Google Play Store. (PAP)

 

lm / abr /

LikeTweet

Monday, March 30, 2015

Lollipop Android 5.0 for Xperia devices Z3 Polish Now Available – PCLab.pl

Sony officially announced on his blog about availability of Android 5.0 for Xperia Lollipop Z3, Z3 Xperia and Xperia Z3 Compact Compact Tablet. We have also learned that in the next few days the new software will also on the device Xperia and Xperia Z2 Z2 Tablet. In addition, the company announced plans to update for Xperia smartphones Xperia T2 Ultra and C3, which, according to earlier reports, did not have to upgrade to get a lollipop.

Sony finally seriously took up a software update of its Xperia line of devices. On the official blog revealed that just started the process of updating the Android version 5.0 Lollipop Xperia devices Z3, Z3 Xperia and Xperia Z3 Compact Compact Tablet (our test). To run an update will be required to have a minimum of 1.2 GB of free space, and the whole process can take about 25 minutes (depending on the Internet connection).

 Xperia and Xperia Z3 Z3 Compact

At the same time, we learned that already next week, the new system will also receive Xperia Z2 and Z2 Xperia Tablet. In the following days will be updated more products in the series Xperia Z. Interestingly, Sony also announced that Android 5.0 will finally Lollipop Xperia and Xperia T2 Ultra C3. The Japanese apparently changed their minds because of the company’s previous position had to get new software family structures only Xperia Z. Moreover, the company says that there are no decisions were made on other models, so it is possible that the list will be launched.

Sony explains the delay in updating the desire to eliminate all the problems that have been encountered in the standard Android 5.0. This is not the first time that a manufacturer of mobile devices mentions varying quality system prepared by Google – similar sentences were representatives of Motorola. Furthermore, we learned that Sony has begun work on Android 5.1 update, which, however, are still in a very early stage. Plans for the next update to be provided as soon as possible.

LikeTweet

Android 5.0 Lollipop already for Polish Xperia Z3! – Computer World

Sony recently moved to the process of upgrading to Android 5.0
 Lollipop for Xperia, but initially the system was available
 a limited number of countries (including the Nordic countries). Now
 Sony Poland announced that software available
 country
. Lollipop is available for the following devices:
  Xperia Z3, Z3 Xperia and Xperia Z3 Compact Tablet
 Compact
. In next week’s update has hit the
 Z2 and Xperia Xperia Tablet Z2 and, eventually, the first Xperia
 Z.

Sony mentions on the blog with the following enhancements that
 brings a new system:

  • The refreshed look, based on the “Material Design” Google,
     enriched with minimalist and consistent interface Sony
     Mobile.
  •  
     

  • The new look of the lock screen notifications and – fully
     personalized for the user.
  •  
     

  • Profiles and guest – useful when the
     device is used by more than one person.
  •  
     

  • Better control of resources and memory – users can from
     Now move applications to the memory card.
  •  

Lolipop-f02f7767ade3e40ed36a73f88e8f96b6.jpg Android 5.0 at the end of the Polish
 Xperia

If you want to upgrade you must have at least
 1.2 GB of free space. In addition, Sony Poland confirmed that
  lollipop over time has also hit Xperia T2 Ultra and
 C3 Xperia
(
 yet!).

Sony has also begun work on Android 5.1, but these are
 at a very early stage and we do not know when the new
 lollipop hit the Xperia.

“Read also:
  Smartphone – Buyer’s Guide

Source: Sony

LikeTweet

Sunday, March 29, 2015

Alarm that can fit in a handbag. The innovative application … – TVN24 Business and the World

innovative, mobile alarm system as Secureo One developed by the company from Gdynia. The system uses the appropriate software, the detector (detector) traffic and smartphone. Configure the system takes ten minutes, installation and dismantling – minute.

The solution was developed in the company trineo, located in the Pomeranian Science and Technology Park in Gdynia. One of the co-owners and the company’s president trineo, PAP Piotr Orzechowski said that the solution presents a completely different type of alarm from those in common use today.

– The whole system is housed in a handbag; able to work a long time without power from the network is mobile, so one set can be used in different places; assembly, arming and disarming takes very little time, no need to remember PIN numbers – he explained.

He said the alarm system consists of: the appropriate software, the detector (detector) motion, smartphone and special cards that allow for arm and disarm the alarm.

Alarm for Android

He said Secureo One is an application running under Android that you can install on your smartphone transforms it into fully functional, anti-theft alarm system. The software works with developed and produced by the motion detector called Blue IR, which provides information on when motion is detected in the protected space for phone software using radio waves. The company says that Blue IR is probably the first in the market, professional detector (detector) traffic intended for use in alarm systems, equipped with a radio technology that allows direct Auth & oacute; DLO: Facebook / Husarion The device allows people with basic programming knowledge to create a simple robot over from several minutes to several hours

Krakowski start-up technology Husarion presented crowdfunding website … see more »

communicate with the smartphone.

Orzechowski stressed the innovative system is that equip and disarmed him two, unusual for alarms ways: using a proximity card or card with a special QR code (both are included). Each user has a unique card.

When leaving the room, it arms the system user, and since then he is able to stand. As explained Orzechowski, when motion is detected by the detector Blue IR Secureo One takes a series of photos and send them simultaneously starts outside the protected object, so as to protect them from being destroyed by a potential burglar.



Photos burglar

– If the person who was in the room does not disarm the system correctly, an alarm is triggered and the report is sent to the designated persons including shots – he added.

He pointed out that even if the burglar would want to steal the phone used in the alarm system, the earlier it had already been done and sent to the addresses given image. It is believed that when the alarm was triggered by the fact burglar system user is more likely to get quick help police when you can say that he saw a stranger in his apartment, it can give a brief description and method of clothes than if he said he started his alarm system.

He pointed out that the system allows for immediate alarm verification, which is important in a situation where, as calculated in the world, more than 90 percent. emergency call is false, that is caused by something other than the actual burglary. – During the holiday departure we get notification that our traditional alarm system start up, you do not know what happened and we are nervous, and the only thing you need to check your email inbox and see that, for example. Entered one of the family and forgot to disarm your system -przekonuje .

Time for a patent

Orzechowski said that the system can be used by people who often move from place to place, living in rented apartments, as well as those who travel a lot, taking valuable equipment or instruments, for example. musicians, reporters and filmmakers. ZR & oacute; DLO Solaris Solaris presented sw & oacute; j tram in 2009

Solaris Poland on Thursday signed a framework agreement for the supply of 41 trams t … see more »

He pointed out that the system can also be permanently installed in your home or office with an area of ​​approx. 70 sq. He gave it to one of your smartphone, you can connect up to eight sensors.

Blue IR detector, in addition to its main function, that is, motion detection, plays the role of a thermometer and communicate the temperature of the room to the application Secureo One. The system can warn the user if the temperature rises or falls significantly. It also allows you to take pictures on demand, which allows the suspicion of what is happening in our apartment.

One Secureo alarm system and IR detector’s alarm trineo Blue premiered in March at the biggest consumer electronics fair in Europe – CeBIT 2015 in Hanover.

Orzechowski announced that it has filed a patent application already. Has already produced more than 200 sets of copies. – Clip-on matters relating to the online shop and probably for approx. Two weeks will be possible to sell on line – he added.

The price of one kit comprising a detector, two cards with codes, two proximity cards will cost approx. 400 zł gross ; more or less the same amount you need to spend on the purchase of a smartphone.

LikeTweet

Saturday, March 28, 2015

Hero Dungeon RPG – a simple dungeon crawler for iOS and Android – Tabletowo.pl

/

Dungeon Hero RPG is a game that at first glance gives the impression of a hastily skleconego hobby project in the context of training for the “serious” game development. You will not find here any plot because the artwork is composed mainly of finished models purchased in our online shop (judging by their quality – not too expensive).

But it is enough to spend this production a few minutes to discover that underneath all this very attractive shell hides a pretty addictive dungeon crawler handfuls which draws inspiration from the classics of the genre. Fans of the “old school” RPG will find so many character classes to choose from, a few dozen types of monsters to compaction, more than a thousand items to collect and, most importantly, a huge randomly generated to go underground. All this adds up and slightly archaic, but still quite playable gameplay mechanic reminiscent of what we have seen in the titles of the eighties and nineties. It is also worth noting that even though the game features micropayments, it all paid items can also be unlocked as you progress in the game. In short: Dungeon Hero RPG rather not have a chance to become a big hit, but certainly enough to while away the time people are eagerly waiting for the release of tabletowego incarnation of Legend of Grimrock.

RPG game Dungeon Hero is available to free download in the App Store and Google Play.




 
 

LikeTweet

Mortal Kombat X – PC World

Mortal Kombat X is the tenth edition of the popular fighting series from the studio Netherrealm.
 Her story is set about 25 years after the events of Mortal Kombat
 9.

Again, choose one of the many fantastic warriors to
 take part in the gruesome event, where participants compete on
 life and death. To combat the minions are the biggest fans of the Dragon
 Saga, as well as some brand new characters, such as
 eg. Erron Black. Return the most characteristic movements
 such as violent finish called Fatality and introduced
 the previous part of the X-Ray Moves. In addition, the authors modeled Injustice
 arenas have implemented the interactive elements.

The series also returned on a fukcjonujące Brutalities
 “Finisher” specific combinations of punches. Each character in the game
 has several unique for yourself Brutalities. Completely new
 Qutialities are activated for the moment when the network
 clashes with the other player your opponent out of the game.

In addition to the warriors of Mortal Kombat universe in the “top ten”
 we can fight two guest characters: Predator and
 Jason Voorhees.

The version of Moblin devices Mortal Kombat X funckjonuje as
 game free-to-play with elements karcianki. Control adapted to
 touch screens, and an integral part of the fight sequences Quick
 Time Event. In addition, portable and console version MKX with each other
 combined offering players all sorts of awards and “unlocks” for
 fun mobile version of the MKX.

LikeTweet

Friday, March 27, 2015

Dangerous hole in Android – Computerworld


 
 
 Google, Samsung and Amazon already made available the relevant amendments eliminating the threat, but close to 49.5% of users with Android devices is still susceptible to attacks based on this hole, although Google announces that it has not detected the attack attempts to exploit the vulnerability.

After that, when you install on a mobile device, a malicious application – that uses the vulnerability known as “Android Installer Hijacking” – a hacker gets full access to the device and has the ability to read from it confidential information such as user names and passwords.

See also:

The company Palo Alto Networks has developed two exploits that take advantage of the hole. Malware installed on the mobile device can modify and to swap only the applications installed on the mobile device that have been downloaded from independent software vendors. Therefore, experts advise to always just download the software from these sources, which we trust.

A malicious application downloaded from an independent software vendor pushes his APK installation files in unprotected storage-enabled mobile device, such as eg. The card SD. Comes into play when the system PackageInstaller program, which completes the installation. If your device is in a hole, APK file may be modified or replaced to another.

The attack might look like this: the user gets an application, and this is obtained from the Android permission to install. And that’s when it can be modified or replaced to another, because the software does not work PackageInstaller as it should and has no control over the operation. So after you click “Install” you do not realize that just installed a completely different, a malicious application.

After the discovery of this threat in January 2014 nearly 90% of all Android devices contain this vulnerability . Today it is better, but almost every other device further has not been patched and still contains this dangerous hole.

Palo Alto Networks announces that it is in the following versions of Android: 2.3, 4.0.3 and 4.0. 4, 4.1.xi 4.2.x. Android 4.4 is safe. Hole can also be present in some devices running on Android 4.3.

Google released a patch eliminating the gap here and Palo Alto Ntworks offers a tool that checks whether the Android device is vulnerable to such attacks.
 
 
 
 
 

LikeTweet

Thursday, March 26, 2015

Android threatened again! – EGospodarka

Cyber ​​criminals are attacking again. This time the targets users of Android. Should beware to have those who will receive an SMS with the delayed e-mail, redirect to the site of one of the popular file-sharing services. There, lying in wait for them at risk – Android.Titan.1 virus which, when installed takes over the phone. Sending text messages, make calls and swapping phone numbers in the phone book are some of his skills.

As reported by Dr. Web, a new Trojan for Android is fundamentally designed to attack South Korean mobile devices. Its distribution occurs through an SMS message containing information about the undelivered e-mail and a link to obtain information about this “problem”. The user who follow the instructions cybercriminals will be redirected to the page one of the popular file-sharing services, where he will receive the apk file a malicious application. The latter will automatically load on the mobile device. However zainnfekować operating system needs unwary Trojan conducting its installation.
Android.Titan.1 After successful installation creates a shortcut on the home screen of the mobile device and is expected to start by the user. After the first successful launch malicious application removes the previously created icon and continues to run in the background. At the same time removes the last conversation Trojan’s SMS stored in memory. In most cases, this conversation is a message type SMS SPAM, which ensured the Trojan access to the target device. From that moment Android.Titan.1 has been running without any user intervention, and runs by itself at boot time.
Android.Titan.1 is based on several malicious system services run by the Trojan during an operation. For example, one of these services is to check whether the default Android.Titan.1 SMS Manager, and if it is not, it tries to change the system settings.

The Trojan then waits for a connection to the Internet, connects to the server control and management, and loads on the details of the affected mobile device, including device model, operating system version, the network connection, MAC address, IMEI, IMSI, and as well as the victim’s mobile phone number.

In response to malware can be obtained from server, one of the commands used to:

  • Start-up services for the search and removing all the processes associated with the application com.kakao.talk
  • Start-swapping service phone numbers in the phone book
  • Change ringing device mode (silent, vibration, general), and set the ringer volume
  • Start-up service sending SMS messages with the parameters specified in the command
  • Start-ring service to certain numbers (when connected to the device’s screen remains inactive, the same as in standby mode)
  • Sending the server information (names and corresponding numbers) stored in your contacts list
  • Startup service that displays in the notification bar system specific text and accompanying images

With the ability to hide the phone calls and periodic monitoring of the activity of the infected device screen, Android.Titan.1 allows cybercriminals to commissioning Trojan communications, compiled when infected the unit for a long time is in standby mode. From that moment, just after the start of a telephone call, the screen is locked back, so you do not have a chance to gain suspicion and realize that cybercriminals just carry unwanted phone call.

Android.Titan.1 is able to monitor all incoming SMS and hide from the user the ones that meet the criteria of the virus creators. In addition, control and management server receives detailed information about all incoming SMS messages, including information about the sender, the date and time of message and its contents. It is also possible to send a message – a malicious program places the captured data in a special database, stored locally on the device and waits for a connection to the Internet to load the messages queued on the server.

In addition Android.Titan.1 has implemented another formidable functionality. Every minute Trojan checks if the user does not perform a phone call. If so, then the call is saved to a file amr (audio file), and it is stored in the working directory Trojan. Then this file in conjunction with the detailed information about the connections that are made by the user is loaded on the remote server, and if you are not currently connected to the Internet, it is queued, as in the case intercepted text messages. The Trojan can also block incoming or outgoing calls to certain numbers, answering calls and delete them from the system log.

The main feature of this Trojan is that the basic functions are implemented in a separate library Unix (detected as Android .Titan.2), while the majority of known malware for Android typically includes these features in a standard executable dex. For this reason, Android.Titan.1 dex file is used only as an auxiliary component containing a minimum of functions required to operate a Trojan. This technique of creating malware for Android is very rare, and for this reason, many anti-virus programs can not detect this malicious application.

Doctor Web security analysts believe that Android.Titan.1 is still able to development, because it contains a lot of mistakes, and some of its functionality is still unimplemented. For this reason, we can not exclude the possibility in the future much more functional version of this dangerous, malicious applications.


Doctor Web security analysts informed service technical support service file sharing service which may be the Trojan file and at the moment from which the page is not available it was collected. However, nothing prevents cybercriminals are hosting a Trojan on another similar server. Dr.Web for Android and Dr.Web for Android Light to successfully detect and remove Android.Titan.1, so users of Dr.Web for mobile devices are covered by the safe protection against this threat.

LikeTweet

Forge of Empires premiere on Android – gry-online.pl

The following message is the official press release producer / publisher / distributor of the game, and as such is not, or does not have to be an expression of opinions and positions editorial games-online. pl.

Studio InnoGames today announced the release of the highly anticipated mobile version of their popular strategy game Forge of Empires . Starting today, players can conquer new territories and expand their empires, not only in computer browsers and iOS, but also on devices with Android system. Furthermore, the holders of mobile devices running on Google you will not have to start play from the beginning, as the Forge of Empires is an application fully cross-platformer. This means that players can start a game on one platform and then continue on other devices without losing progress.


 

Studio InnoGames also made available a film in which Hassenkloever Lead Developer Tobias presents Forge of Empires in new mobile installment. The application supports all Android devices version 4 (Ice Cream Sandwich) or higher. Both smartphones and tablet offers the same full experience and the same functions. What’s more, the Android version will also be available all special events and era.


 

Forge of Empires is a browser strategy game in which players have as an objective the creation and development of a prosperous city. Conduct research into new technologies, an impressive rise buildings known from history books and develop its influence in the region, creating a powerful clans and competing with other players. Forge of Empires has been awarded as the best browser-based game of 2013, the German Computer Game Competition Award (Deutscher Computerspielpreis), and in 2014 the game was on the list of the top 5 best new strategy for the iOS. The game is currently available in 23 languages.


 

InnoGames is one of the leading online game developers whose titles can boast a crowd of 130 million registered players. Stir in Hamburg today employs 350 experts from 25 countries. The most popular games InnoGames are tribes , Grepolis and Forge of Empires .

LikeTweet

Wednesday, March 25, 2015

Every second Android device has a dangerous hole – Computerworld


 
 
 Google, Samsung and Amazon already made available the relevant amendments eliminating the threat, but close to 49.5% of users with Android devices is still susceptible to attacks based on this hole, although Google announces that it has not detected the attack attempts to exploit the vulnerability.

After that, when you install on a mobile device, a malicious application – that uses the vulnerability known as “Android Installer Hijacking” – a hacker gets full access to the device and has the ability to read from it confidential information such as user names and passwords.

See also:

The company Palo Alto Networks has developed two exploits that take advantage of the hole. Malware installed on the mobile device can modify and to swap only the applications installed on the mobile device that have been downloaded from independent software vendors. Therefore, experts advise to always just download the software from these sources, which we trust.

A malicious application downloaded from an independent software vendor pushes his APK installation files in unprotected storage-enabled mobile device, such as eg. The card SD. Comes into play when the system PackageInstaller program, which completes the installation. If your device is in a hole, APK file may be modified or replaced to another.

The attack might look like this: the user gets an application, and this is obtained from the Android permission to install. And that’s when it can be modified or replaced to another, because the software does not work PackageInstaller as it should and has no control over the operation. So after you click “Install” you do not realize that just installed a completely different, a malicious application.

After the discovery of this threat in January 2014 nearly 90% of all Android devices contain this vulnerability . Today it is better, but almost every other device further has not been patched and still contains this dangerous hole.

Palo Alto Networks announces that it is in the following versions of Android: 2.3, 4.0.3 and 4.0. 4, 4.1.xi 4.2.x. Android 4.4 is safe. Hole can also be present in some devices running on Android 4.3.

Google released a patch eliminating the gap here and Palo Alto Ntworks offers a tool that checks whether the Android device is vulnerable to such attacks.
 
 
 
 
 

LikeTweet

Every second Android device further comprises a dangerous hole – Computerworld


 
 
 Google, Samsung and Amazon already made available the relevant amendments eliminating the threat, but close to 49.5% of users with Android devices is still susceptible to attacks based on this hole, although Google announces that it has not detected the attack attempts to exploit the vulnerability.

After that, when you install on a mobile device, a malicious application – that uses the vulnerability known as “Android Installer Hijacking” – a hacker gets full access to the device and has the ability to read from it confidential information such as user names and passwords.

See also:

The company Palo Alto Networks has developed two exploits that take advantage of the hole. Malware installed on the mobile device can modify and to swap only the applications installed on the mobile device that have been downloaded from independent software vendors. Therefore, experts advise to always download applications only from those sources to which we trust.

Application collected from independent software vendor pushes his installation APK files in unprotected storage-enabled mobile device, such as, eg. SD card . Comes into play when PackageInstaller application system, which completes the installation. If your device is in a hole, APK file may be modified or replaced to another.

The attack might look like. The user downloads the application and obtains from the Android permission to install. And that’s when it can be modified or replaced to another, because the software does not work PackageInstaller as it should and has no control over the operation. So after you click “Install” you do not realize that just installed a completely different, a malicious application.

After the discovery of this threat in January 2014 nearly 90% of all Android devices contained described hole . Today it is better, but almost every other device further has not been patched and still contains this dangerous hole.

Palo Alto Networks announces that the hole is in the following versions of Android: 2.3, 4.0.3 and 4.0. 4, 4.1.xi 4.2.x. Android 4.4 is safe. Hole can also be present in some devices running on Android 4.3.

Google released a patch eliminating the hole here, and Palo Alto Ntworks offers a tool that checks whether the Android device is vulnerable to such attacks.
 
 
 
 
 

LikeTweet

Android Apps on Google Play will be manually checked – eGospodarka

Applications available for Android Google Play store were not always safe, which led to harsh criticism at the company. Assures Google, now all new applications before they go to the store, they are checked manually by experts. It is not known whether such a solution will protect users against possible threats, but no doubt this is a step in the right direction.

Until now, Google has been criticized for its approach to the application placed in the official store for Android. Some observers to describe the Google Play comparisons to disorderly used, contaminated thousands of fake phone application. They distort the browser settings, steal information from your phone or displayed the annoying and unwanted advertising.
In the late 2013 it was revealed that one of the games available in the store Google Play secretly gathered and tried to sell information on user interviews conducted by a WhatsApp application. Another case was the publication of fake anti-virus Bogus Anti-Virus, which not only got to the store, but he was also honored by the moderators store. During the promotion of 10 000 users have downloaded a paid application that did not do anything. Also fell victim of a scam than 100 000 people who have taken up a false overlay for Android BlackBerry BBM for Android, taken from the same store. After installing the application to display the information that the application will not start until June 27, and really our phone was beginning to make its software for developers, displaying the number of unsolicited advertising to us.

Android – Malicious applications

Google provides that for several months, all applications are manually checked for safety


> Many free app for Android allows you to collect more data than is needed for their operation, as shown by using technology Clueful study, conducted by Bitdefender.

At the time of the study analyzed 260 000 popular free applications available on Google Play and demonstrated that approximately 35.97% of applications can track the location of the user when they are running.
Approximately 13.46% of applications can retrieve a unique hardware identifier (UDID), which allows you to track the behavior under more than one application.

Applications that can read a list of contacts, are 9.14% and 9.91% may obtain a phone number then download it. The survey also showed that 6.43% of the analyzed application can retrieve e-mail, and 6.65% can read your browsing history.

Google Play declared that “a few months ago,” changed the approach aimed at improving the safety of users of Android.

A dozen or so months ago we began a review of the application before it is published on Google Play in order to strengthen the protection of our community and increase the quality of the application directory. This new process involves a group of experts, who are responsible for identifying the offending software developer distribution agreement in the earlier application life cycles. We appreciate the speed of innovation and iteration, which is unique to Google Play. We still want to put every effort to assist and support our developers so that their products appear after a few hours of application, than after a few days or weeks. In fact, developers should not feel the changes.


Google has previously worked on improving store operation. His time was used technology Bouncer (Bouncer), automatic protection system, which was designed to analyze and reject malicious applications dedicated to Android, before being published in the store.

The effectiveness Bouncer subject to discussion and criticism in the As increasing amounts of scammers and malware authors who managed to trick publish store their malicious programs. Analyses carried out by security gurus show where in there are errors that led to miss the entire sequence checking software.

Google also stated that it will change the approach to the developers explain why their programs have been rejected by the Google Play . Such changes will definitely make it easier for developers to improve the most minor offenses and conflicts associated with the principles of the store, not threatening to block the way lifelong opportunities for publishing in the store.

LikeTweet

From now on Android is a standard feature of Microsoft Office … – Spider’s Web

Microsoft has just announced that it has signed an agreement with 11 manufacturers of mobile devices. At his best on many outfits Android will be pre-installed applications such as Office suite, Skype and other services to the Redmond company.

These companies include Dell, Trekstor, JP Sa Couto, Datamatic, DEXP, Hipstreet, QMobile, Tecno, Casper and Pegatron. A lot of these companies could certainly have not heard and absolutely’m not surprised. The majority are in fact brands from around the world. It should be noted, however, that these are not the only players in the market who are willing to enter into friendly terms with Microsoft.

 Office on the iPad

To see this, just take the example of Samsung. Korean company to its flagship Samsung Galaxy S6 added services such as OneNote, OneDrive and Skype. Also admitted that it intends to pre-install Excel, PowerPoint, OneNote’a, OneDrive’a and Skype on select Android tablets that come up in the first half of this year. It is also worth noting that the holders of the above mentioned equipment manufacturers also receive 100 GB of cloud OneDrive.

As you can see, despite the efforts of Google, then Microsoft Office is still considered to be synonymous with the office suite, and the most popular instant messenger Skype to video calling. And although Microsoft in recent years did virtually everything to Google to leave the field in virtually every area in its entirety, he did not entirely lose its competitive advantage. Many users have a habit learned from PCs. We are happy they are using mobile counterparts programs they already know. Moreover, this process works both ways and fully explains the growing popularity of Chrome.

 skype for android

They note that also manufacture mobile devices. One suspects that the service will soon become Microsoft’s standard on most equipment with Android, Microsoft’s delight and despair Google. Microsoft noted fact that the design of Windows Phone is not the end of the work, but … it really does not mean anything and does not mean anything.

In the end, Microsoft earns not on mobile systems, and services that can be run completely everywhere. Also on devices competition. And even if the Redmond company fails to popularize its mobile operating system, it would still be present on the mobile market. And that is not on your platform? Ground that the gain is correct.

* Main photo from website Shutterstock.

LikeTweet

Tuesday, March 24, 2015

NOTE: The new Android trojan dangerous – resistant to … – PC World

Analysts security Doctor Web looked at
 new virus, which may become victims of all holders
 smartphones and tablets with Android. Attacks using
 Software called Android.Titan.1 reported so far
 primarily in South Korea, but is expected to be
 These occurred in other countries.

Android.Titan.1 can replace multiple numbers inter alia
 in the list of contacts smartphone, perform
 automatically connect
and send text messages while
 device screen is blank and pass on
 server
User incoming SMS, data on
 its mobile hardware and audio recording of all calls
 telephone
.

How is the infection? First
 smartphone holder receives a text message that informs him of overdue
 mail available at the link. When you tap the link is
 downloaded APK, which has yet to be installed by
 sacrifice. Only after the first run the application deletes each other
 most of the tracks and starts working out of hiding, including the
 together with the smartphone automatically.

trojan.jpg To the virus began to work, it must be
 installed by the user

As you can see Android.Titan.1 catch requires a lot of carelessness.
 Despite this, however, we are writing about it because it was built in such a
 unusual way that most androidowych tools
 virus protection can not cope with the
 detection
and does not identify him as a threat. Harmful
 Trojan functionality for it is implemented in
 separate library Unix
and running in the background
 Android.Titan.1 itself does not perform suspicious activities.

Note that not installed on your
 mobile devices any applications from unknown
 sources
. Android.Titan.1 is distributed in Korea through
 SMS messages, but there is nothing yet in the way of doing so,
 to someone put it on the example of pirated forum
 versions of programs and camouflaged it with the name of some popular
 the game.

“See also:
 Cyber ​​criminals send fake mBank customers
 emails!

Source: doctor web, photo. 123RF.com

LikeTweet

Android 5.1 for Moto X Lollipop – Onet.pl

Motorola recently accelerated the frequency of updating their smartphones and at the beginning of this month, Moto X of 2013 and the 2014 years in Android 5.0 equipped Lollipop. Now we are confronted with rumors that the company is already testing Android 5.1 Lollipop for Moto X 2014 years.

This is a version 1.23.28, which introduces several amendments to the operation of the equipment. Reduces including noisy images taken with the main camera in low light, as well as improves the operation of the front of the camera.

It also introduces a system Device Protection, which blocks access to unauthorized phone and protects it even if you perform a reset to factory settings. In addition, provide a few general improvements to the operation of the device.

LikeTweet