Tuesday, March 22, 2011

Amazon opens Appstore, Apple files suit.


Amazon began offering applications for mobile devices running Google's Android software on Tuesday as Apple seeks to prevent the online retail giant from calling it an "App Store."
The Seattle, Washington-based Amazon is offering free and paid programs for Android smartphones and tablet computers in its "Amazon Appstore for Android" at www.amazon.com/appstore.
In a lawsuit filed last week, Apple, which sells applications through its "App Store," urged a California court to bar Amazon from using a similar name.
Amazon's new Appstore gives the company a presence in the fast-growing market for applications for smartphones and tablet computers.
Google offers free and paid applications through its Android Market while Apple's App Store provides programs for its popular iPhones, iPods and iPad devices.
In the complaint filed against Amazon in US District Court for the northern district of California, Apple accused Amazon of "unauthorized use of Apple's App Store trademark."
Apple said it coined the term App Store with the July 2008 launch of the service and has spent "millions of dollars on print, television, and Internet advertising.
"The enormous public attention given the App Store service, and the success of the service, have cemented the public's identification of App Store as a trademark for Apple's service," Apple said.
It said the US Patent and Trademark Office had approved Apple's application to register App Store as a trademark -- a move opposed by Microsoft, which offers mobile applications for devices running its Windows Phone software.
The case is currently being heard by an appeals board.
Apple said it had contacted Amazon asking that it not use the name App Store but had received no substantive response.
The suit seeks unspecified damages and for the court to enjoin Amazon from using the phrase App Store.
Among the applications available in Amazon's new store are Angry Birds, Pac-Man, Doodle Jump Deluxe, Evernote, WeatherBug Elite and Zagat to Go.
Amazon said it will offer customers a paid application for free every day.
"The Android platform's openness provides a great opportunity to reach new customers," Mikael Hed, the chief executive of Rovio, the maker of Angry Birds, said in a statement.
The Amazon Appstore can be reached through a Web browser or from Android smartphones or tablets using the Amazon Appstore application.

Contextual Links

Wednesday, March 16, 2011

Death of the mouse: How eye-tracking technology could save the PC

Eye Tracking In the last few years, touch control has revolutionized the way we interact with mobile devices. The technology has been so popular on smartphones that Apple used its proven touch approach to reinvent the dead tablet market with the iPad. Thanks to the blooming growth of these devices, touch is taking off in a big way, taking on new form factors and posing a potential threat to our oldest friend: the PC.
With all of these motion-controlled interfaces for video game systems and touch interfaces for mobile devices, the PC with its keyboard and mouse, just feels, well, old. The keyboard is still the fastest and best way to enter large amounts of data and to author written content, but the mouse and touchpad are a step removed from the natural, direct feeling one gets when using the Wii, Xbox Kinect, or a touch tablet. Tobii hopes to rectify this imbalance.
Last Friday, I met up with Barbara Barclay, North American manager of Tobii Technologies (a Swedish company) to try out a completely new type of user interface built for consumer desktops and laptops. In a small office building in Manhattan, New York, she let me try out one of only 20 prototype Lenovo laptops, which each have built-in infrared sensors that track eye movement so precisely and quickly that it makes even the best mouse interfaces feel antiquated.

Here’s how it works

Lenovo-Tobii eye control PCBefore we began the demo, Barbara explained the technology. Tobii’s eye control works a bit like the Xbox Kinect (or a reverse Wii), but on a much closer scale. As you sit in front of the laptop, a row of two synced infrared sensors located under the screen scan your eyes. They do this about 30 to 40 times per second, examining the size and angle of your pupil, the glint in each of your eyes, and the distance between you and the laptop. Together, the two sensors create a stereoscopic 3D image of your eye for the computer to examine. Based on the angle and glint of your eye, Tobii’s technology calculates precisely which part of the screen you are looking at. It can even tell when you look away or close your eyes. To save power, the demo unit on hand darkened its screen when we looked away. After explaining how it works, Barbara calibrated the Lenovo-Tobii eye control PC for her eyes. The calibration process takes a few seconds. Basically, you look at a series of three to nine dots on the screen, which lets the computer know where your eyes are looking. Nintendo has used similar calibration tests on its Wii Motion Plus controllers and Wii Fit balance board software. The calibration is painless and shouldn’t have to be done very often. After calibration, the laptop will be able to save your “eye profile” and know how to calibrate when a familiar user logs on.

It actually works…really well

Next, we ran through several hand-crafted demos that show off some different use scenarios for eye control. Even after I tried it out myself, I had a hard time believing the demonstration wasn’t an elaborate ruse. However, after a few moments, I began to believe. Almost instantly, the computer began to pick up my eye movements and respond to whatever I looked at. When I looked at an item, it would highlight itself and come to the forefront. When I looked at a map, it knew exactly which area I was staring at, right down to the pixel. Much like how a novice with the Wii will wave the Wii Remote wildly, my first instinct was to move my entire head as I looked at different items on the screen. This worked well enough, but after a few moments, I learned that Tobii’s technology could pick up the subtlest of eye movements without the aid of my head moving. Somehow it could tell when I moved my eyes a half inch to the left or right or casually looked up or down, even a hair.

Lenovo-Tobii eye control PC
The fluidity of the experience reminded me of the first time I used the iPod Touch, and how natural it felt to swipe and touch precisely where I wanted. Before the Touch and iPhone, most touchscreens used resistive touch technology, which required you to actually press down on the screen. These screens demanded a stylus (pen-like device) to achieve precision, but Apple changed the game with its more natural interface that let you directly use your fingers. Tobii’s eye control technology is as direct as any touch interface. It feels like touch from afar.

Uses for eye control

The first portion of the demo (which you can watch below) simply shows where your eyes are looking on the screen. Looking at your own eyes isn’t particularly fun, but it shows you how fast the system reacts when you move or blink. However, after the intro screen and calibration, we got into some different use scenarios.
Reading: Out of all of the uses for eye control, reading demonstrates its value more than anything else. Everyone has their own technique and style for reading on a laptop or touch device. Personally, I tend to keep my text toward the top of the screen. Sometimes I use the mouse to highlight things I’ve already read and use the direction buttons to scroll down. Tobii’s eye control instantly makes all of these customized reading styles irrelevant. More natural than book reading, text automatically scrolls up, down, left, or right for you as your eyes pan around the screen. It’s amazing. Confused about a word? Well, if you stare at one word long enough its definition will pop up.
Playing media: Another demo Barbara showed me was a simple media player. A row of pictures and album covers  fill the bottom of the screen. Glancing at one of them highlights the choice and looking upward plays the music or maximizes the picture so you could get a better look. Done listening or viewing? Simply look at another item in the list. And when you looked at the arrows on the left or right for a second or so, the next page of results appear.
Zooming and panning: Eye control doesn’t mean there is no use for the keyboard. In a Google Maps-like demo, you can pan and zoom by looking and pressing/holding a button, which works well. A single button is assigned to zoom and another button is assigned to pan. To zoom, you simply look at what you wish to focus on and push the zoom button. Once zoomed, holding another button and looking left, right, up, or down lets you pan around your zoomed image. There are likely even more intuitive ways to perform complex tasks like this.
Multitasking: At CES this year, I complimented the BlackBerry PlayBook for its easy swiping method to switch between applications. With a WebOS-like interface (or perhaps WebOS itself) and Tobii’s eye control, multitasking between apps is as natural as looking to the left or right of the screen. Using Windows 7, which isn’t at all optimized for anything other than a mouse, Barbara swapped between windows by looking at them and pressing a button. She also moved a mouse pointer icon around the screen with ease.
Gaming: The last demo we played was a simple Asteroids-like game. Your mission is to protect the Earth from a barrage of doomsday-sized comets and asteroids headed your way. Looking at an asteroid triggers a laser that blows it up. There are a ton of touch-type games like this, which pit your reflexes against the computer, but eye control takes the speed and intensity of these games up a notch. I’m incredibly excited to see what kind of games can be made using the speed of the eye.
These are only a few of many new ways eye control would let you interact with a PC desktop or laptop. When you start thinking about how this technology could interact with voice recognition, the possibilities seem endless. In a few years, Minority Report may look dated.

It’s like Kinect for PCs

Lenovo-Tobii eye control PC
Microsoft has said that it will eventually release Kinect-like motion technology for PCs. Well, I hate to break it to them, but Tobii has done a lot of the hard work. Moving Kinect to a PC would mean shifting the focus from the body to the eyes and face, something Tobii has achieved with remarkable precision.
I’ve written a lot about Microsoft and the many challenges it faces with Windows 8. Currently, the company has a failing Phone platform and no tablet strategy. To forge ahead, Microsoft needs to generate excitement around its bread and butter, which is still traditional, keyboarded PCs. Tobii’s eye control is exactly the kind of innovative interface Microsoft could build a comprehensive new experience around. It could simplify the complexities of the Windows desktop OS while bridging some of the gaps between the PC and mobile touch platforms. If implemented properly, technology like this could reignite some buzz around the laptop market, especially combined with many of the ideas Microsoft has demonstrated on Windows Phone and Xbox Kinect.
Barbara informed me that Microsoft is already a client of Tobii’s for some of its larger research units, which the Redmond giant uses to study the effectiveness of its own application layouts and interfaces by tracking the eye movements of potential customers as they experience a new design. Microsoft, I’m looking at you. If you don’t try something like this, someone else will.
Regardless of who it is, one thing is clear: Tobii needs a strong partner that realizes the potential of its technology.

Eye control is coming, hopefully

Like any good technology, Tobii’s eye control is only as useful as the software developers who write for it. The company is in talks with a number of hardware, software, and platform makers to work toward implementing its technology in PCs as soon as two years from now, but it will be a tough road ahead. The technology still needs to be smaller, use less battery, and cost less. Without the vision of Apple, touch tablet devices stagnated in limbo for a decade. Lets hope that one of these platform makers recognizes the potential in eye control. The only loser here is the mouse, and I’m sorry my friend, I love ya, but your days are numbered.

10 Must-Have Free Downloads.


Some downloadable software is so good that you just have to grab it. Unfortunately, often you have to pay for it after you try it out. But every once in a while, a must-have program is totally free. Such indispensable, no-cost programs are the hardest kind to find.
We've saved you the time it takes to dig up such gems. Read on to learn about ten must-have programs that can keep your PC fast, fun to use, and safe. Some of the creators ask for a small donation if you like the application, and some of these downloads are older, "lite" versions of more full-featured software--but all are free to download, and free to use.

System Cleanup and Maintenance
CCleaner, the best free/donationware program you can find for cleaning a system and keeping it in tip-top shape. It deletes temporary and unneeded files, erases your browsing tracks, kills unwanted cookies, and zaps unnecessary files associated with various programs, including all the popular browsers. It even provides a Registry cleaner.
CCEnhancer (free/donationware), which powers up CCleaner by increasing the long list of cleanable programs. It tidies up the traces of more applications than CCleaner can do alone, adding favorites such as Ashampoo Burning Studio, LogMeIn, Microsoft Works, and many others. It integrates directly into CCleaner, so you have nothing new to learn.
LookInMyPC can help. It peers into your computer and gives you an exceptionally detailed report, including the PC's manufacturer, its serial number, the amount of RAM, the hard-disk space, and similar hardware info. Overall it offers far more than most users want to know, though the amount of detail is perfect for geeks; if you dig into it, you can see the part number of your RAM chips, all your installed printer drivers, the name and address of your ISP, lists of installed updates and patches, and plenty more.
Secunia PSI scans your PC, finds all the installed software, alerts you about which programs need updates, and then helps you do the updating. It also warns you about which of your out-of-date programs represent a security risk, and it can even automatically update your programs after a little configuration.
Media Tools
IrfanView, a superb graphics viewer and basic image editor. It's fast, it's simple to use, and it's free/donationware--what else could you want? It views just about any image file type in existence, and does so with lightning speed. You can also use it to convert between file types, crop images, add effects, and perform other basic editing chores. It can show files as slideshows and play multimedia files, too.
Photoscape. That a piece of software this powerful is free/donationware is remarkable; you'll be amazed at how much functionality is built in. For a start, it offers a photo editor, a file viewer, a slideshow creator, a batch editor, and a screen-capture program. And each component is packed with features. For example, you can combine multiple photos into a single frame, and can even convert RAW-format photos--used by many digital cameras--into .jpg files.
Ashampoo Burning Studio 6 Free. Contrary to what some people may believe, CDs and DVDs are not a thing of the past, and this free program is ideal for anyone who needs to rip, burn, or copy such discs. (The current commercial version, the $50 Ashampoo Burning Studio 10, adds editing, menu creation, and other features.) With Ashampoo Burning Studio 6 Free, you can copy entire discs, burn movies to a CD/DVD/Blu-ray Disc, create Video CDs, create .iso images from a CD or DVD, create a CD or DVD from an .iso image, and a lot more. Despite all those capabilities, the program is exceedingly easy to use.
Productivity Boosters
ClipX. This venerable clipboard enhancer powers up the anemic Windows Clipboard, keeping the last 25 Clipboard clips so that you can reuse them. It stores graphics as well as text, takes up barely any RAM, and is exceptionally easy to use. It also accepts plug-ins. Make sure to get the developer's own ClipX Stickies Plugin, which stores clips you frequently access--such as boilerplate text or corporate logos--so that you can pop them into any application. Note: ClipX isn't officially supported on Windows 7, but it worked fine on my Windows 7 test PC.
Hamster Free Zip Archiver. With this tool you can create and open archives with drag-and-drop ease. It handles all the popular compression formats--including .zip, .rar, and .7z--and gives you a host of useful capabilities, such as changing compression levels and splitting files.
Evernote. It's perfect for anyone who suffers from information overload and needs a way to store data of any kind and then find it quickly. The program captures information from the Web, e-mail, and even digital cameras, scanners, and microphones. You can manually enter notes yourself, too. You categorize the information, tag it, and annotate it so that it's easy to find and use. Since Evernote syncs the information to the Web and mobile devices, you have it wherever you go. I use this tool to research and write books and articles, plan vacations, and more. You'll likely find plenty of uses for it as well.

Friday, March 11, 2011

Hundreds killed in tsunami after 8.9 Japan quake.


TOKYO – A ferocious tsunami spawned by one of the largest earthquakes on record slammed Japan's eastern coast Friday, killing hundreds of people as it swept away ships, cars and homes while widespread fires burned out of control.
Hours later, the tsunami hit Hawaii but did not cause major damage. Warnings blanketed the Pacific, putting areas on alert as far away as South America, Canada, Alaska and the entire U.S. West coast. In northeastern Japan, the area around a nuclear power plant was evacuated after the reactor's cooling system failed.
Police said 200 to 300 bodies were found in the northeastern coastal city of Sendai, the city in Miyagi prefecture, or state, closest to the epicenter. Another 137 were confirmed killed, with 531 people missing. Police also said 627 people were injured.
The magnitude-8.9 offshore quake unleashed a 23-foot (seven-meter) tsunami and was followed for hours by more than 50 aftershocks, many of them of more than magnitude 6.0.
Dozens of cities and villages along a 1,300-mile (2,100-kilometer) stretch of coastline were shaken by violent tremors that reached as far away as Tokyo, hundreds of miles (kilometers) from the epicenter. A large section of Kesennuma, a town of 70,000 people in Miyagi, burned furiously into the night with no apparent hope of being extinguished, public broadcaster NHK said.
"The earthquake has caused major damage in broad areas in northern Japan," Prime Minister Naoto Kan said at a news conference.
The quake was nearly 8,000 times stronger than one that struck New Zealand late last month, devastating the city of Christchurch.
"The energy radiated by this quake is nearly equal to one month's worth of energy consumption" in the United States, U.S. Geological Survey Scientist Brian Atwater told The Associated Press.
The government ordered thousands of residents near a nuclear power plant in the city of Onahama to move back at least two miles (three kilometers) from the plant. The reactor was not leaking radiation but its core remained hot even after a shutdown. The plant is 170 miles (270 kilometers) northeast of Tokyo.
Trouble was reported at two other nuclear plants as well, but there was no radiation leak at either of them.
Japan's coast guard said it was searching for 80 dock workers on a ship that was swept away from a shipyard in Miyagi.
Even for a country used to earthquakes, this one was of horrific proportions because of the tsunami that crashed ashore, swallowing everything in its path as it surged several miles (kilometers) inland before retreating. The apocalyptic images on Japanese TV of powerful, debris-filled waves, uncontrolled fires and a ship caught in a massive whirlpool resembled scenes from a Hollywood disaster movie.
Large fishing boats and other vessels rode high waves ashore, slamming against overpasses or scraping under them and snapping power lines along the way. Upturned and partially submerged cars bobbed in the water. Ships anchored in ports crashed against each other.
The tsunami roared over embankments, washing anything in its path inland before reversing directions and carrying the cars, homes and other debris out to sea. Flames shot from some of the homes, probably because of burst gas pipes.
Waves of muddy waters flowed over farmland near Sendai, carrying buildings, some of them ablaze. Drivers attempted to flee. Sendai airport was inundated with thick, muddy debris that included cars, trucks, buses and even light planes.
Highways to the worst-hit coastal areas buckled. Telephone lines snapped. Train service in northeastern Japan and in Tokyo, which normally serve 10 million people a day, were suspended, leaving untold numbers stranded in stations or roaming the streets. Tokyo's Narita airport was closed indefinitely.
President Barack Obama said the U.S. "stands ready to help" Japan.
Jesse Johnson, a native of the U.S. state of Nevada who lives in Chiba, north of Tokyo, was eating at a sushi restaurant with his wife when the quake hit.
"At first it didn't feel unusual, but then it went on and on. So I got myself and my wife under the table," he told The Associated Press. "I've lived in Japan for 10 years, and I've never felt anything like this before. The aftershocks keep coming. It's gotten to the point where I don't know whether it's me shaking or an earthquake."
NHK said more than 4 million buildings were without power in Tokyo and its suburbs.
As night fell, Tokyo's streets were jammed with cars, buses and trucks trying to get around and out of the city. Pedestrians swarmed the sidewalks to walk home, or at least find a warm place to spend the night as the temperatures dropped.
Tomoko Suzuki and her elderly mother stood on a crowded downtown corner, unable to get to their 29th-floor condominium because the elevator wasn't working. They unsuccessfully tried to hail a taxi to a relative's house and couldn't find a hotel room.
"We are so cold," said Suzuki. "We really don't know what to do."
A large fire erupted at the Cosmo oil refinery in the city of Ichihara and burned out of control with 100-foot (30-meter) flames whipping into the sky.
"Our initial assessment indicates that there has already been enormous damage," Chief Cabinet Secretary Yukio Edano said. "We will make maximum relief effort based on that assessment."
He said the Defense Ministry was sending troops to the hardest-hit region. A utility aircraft and several helicopters were on the way.
Also in Miyagi prefecture, a fire broke out in a turbine building of a nuclear power plant, but it was later extinguished, said Tohoku Electric Power Co.
A reactor area of a nearby plant was leaking water, the company said. But it was unclear if the leak was caused by the tsunami or something else. There were no reports of radioactive leaks at any of Japan's nuclear plants.
Jefferies International Ltd., a global investment banking group, estimated overall losses of about $10 billion.
Hiroshi Sato, a disaster management official in northern Iwate prefecture, said officials were having trouble getting an overall picture of the destruction.
"We don't even know the extent of damage. Roads were badly damaged and cut off as tsunami washed away debris, cars and many other things," he said.
The U.S. Geological Survey said the 2:46 p.m. quake was magnitude 8.9, the biggest to hit Japan since record-keeping began in the late 1800s and one of the biggest ever recorded in the world.
The quake struck at a depth of six miles (10 kilometers), about 80 miles (125 kilometers) off the eastern coast, the agency said. The area is 240 miles (380 kilometers) northeast of Tokyo. Several quakes hit the same region in recent days, including one measured at magnitude 7.3 on Wednesday that caused no damage.
A tsunami warning was extended to a number of areas in the Pacific, Southeast Asia and Latin America, including Japan, Russia, Indonesia, New Zealand and Chile. In the Philippines, authorities ordered an evacuation of coastal communities, but no unusual waves were reported.
Thousands fled homes in Indonesia after officials warned of a tsunami up to 6 feet (2 meters) high, but waves of only 4 inches (10 centimeters) were measured. No big waves came to the Northern Mariana Islands, a U.S. territory, either.
The first waves hit Hawaii about 9 a.m. EST (1400 GMT). A tsunami about 7 feet (2.1 meters) high was recorded on Maui and a wave at least 3 feet (a meter) high was recorded on Oahu and Kauai. Officials warned that the waves would continue and could get larger.
Japan's worst previous quake was a magnitude 8.3 temblor in 1923 in Kanto that killed 143,000 people, according to USGS. A 7.2-magnitude quake in Kobe in 1996 killed 6,400 people.
Japan lies on the "Ring of Fire" — an arc of earthquake and volcanic zones stretching around the Pacific where about 90 percent of the world's quakes occur, including the one that triggered the Dec. 26, 2004, Indian Ocean tsunami that killed an estimated 230,000 people in 12 nations. A magnitude-8.8 temblor that shook central Chile in February 2010 also generated a tsunami and killed 524 people.

Saturday, March 5, 2011

Computer expert says US behind Stuxnet worm.


LONG BEACH, California (AFP) – A German computer security expert said Thursday he believes the United States and Israel's Mossad unleashed the malicious Stuxnet worm on Iran's nuclear program.
"My opinion is that the Mossad is involved," Ralph Langner said while discussing his in-depth Stuxnet analysis at a prestigious TED conference in the Southern California city of Long Beach.
"But, the leading source is not Israel... There is only one leading source, and that is the United States."
There has been widespread speculation Israel was behind the Stuxnet worm that has attacked computers in Iran, and Tehran has blamed the Jewish state and the United States for the killing of two nuclear scientists in November and January.
"The idea behind Stuxnet computer worm is really quite simple," Langner said. "We don't want Iran to get the bomb."
The malicious code was crafted to stealthily take control of valves and rotors at an Iranian nuclear plant, according to Langner.
"It was engineered by people who obviously had inside information," he explained. "They probably also knew the shoe size of the operator."
Stuxnet targets computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.
"The idea here is to circumvent digital data systems, so the human operator could not get there fast enough," Langner said.
"When digital safety systems are compromised, really bad things can happen -- your plant can blow up.
Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there. The worm was crafted to recognize the system it was to attack.
The New York Times reported in January that US and Israeli intelligence services collaborated to develop the computer worm to sabotage Iran's efforts to make a nuclear bomb.
Russia called on NATO in January to launch an investigation into the computer worm that targeted a Russian-built Iranian nuclear power plant, saying the incident could have triggered a new Chernobyl.
Russia's envoy to NATO in January said Stuxnet caused centrifuges producing enriched uranium at the Bushehr plant to spin out of control, which could have sparked a new "Chernobyl tragedy," the 1986 nuclear meltdown in Ukraine.
"The operators saw on their screens that the centrifuges were working normally when in fact they were out of control," Dmitry Rogozin told reporters after meeting with ambassadors from the 28-nation Western alliance.
Russia is helping Iran build a nuclear power plant in the southern city of Bushehr for civilian use.
Langner said the Stuxnet code was designed to trick human operators by showing them recorded readings indicating machinery is running normally while behind the scenes they are heading for destruction.
"It's definitely hard-core sabotage," Langner said of Stuxnet. "It's like in the movies where during a heist the security camera is running pre-recorded video showing nothing is wrong."
Iran's envoy to the International Atomic Energy Agency has denied that the Stuxnet attack effected the country's nuclear program, including Bushehr.
A terrifying aspect of Stuxnet, according to Langner, is that it is a generic attack that would work well in factories, power plants, or other operations plentiful in the United States.
"It's a cyber weapon of mass destruction," Langner said. "We'd better start preparing right now."
StuxNet Worm

Republican Lawmaker Promises New Online Privacy Legislation.


A senior Republican member of the U.S. House of Representatives will soon introduce legislation designed to give Web users more control of their personal data and to give the U.S. Federal Trade Commission power to enforce voluntary privacy standards developed with Internet companies, he said Friday.
Representative Cliff Stearns, a Florida Republican and senior member of the House Energy and Commerce Committee, said he plans to introduce online privacy legislation soon. The bill's focus will be on allowing Web users to know what personal information Internet companies are collecting about them and to control how it's used, said Stearns, co-author of past online privacy bills.
The bill would encourage Web-based companies to develop industry standards for privacy but would give the FTC some enforcement power, Stearns said during a speech at a Technology Policy Institute (TPI) forum on privacy.
Finding the right balance between privacy and online commerce is a "tough issue," but consumers are demanding more privacy protections. "We are at a tipping point where we have to come to grips with the information that's being collected," he said.
Still, Stearns suggested that online advertising could be hurt if regulations go too far. Online tracking to deliver behavioral, or targeted, ads is a legitimate practice if companies notify consumers what information is collected and allow them to turn off the collection, he said.
"Online advertising ... supports much of the commercial content, applications and services that are available today," he said. "We do not want to disrupt a well-established and successful business model."
Stearns' approach to online privacy would likely be different from a bill introduced in February by Representative Jackie Speier, a California Democrat. Speier's bill would direct the FTC to create standards for a nationwide do-not-track mechanism that would allow Web users to opt out of online tracking and the sharing of consumer data among online businesses.
The FTC, in a report released in December, called for the technology industry to create more do-not-track tools. Mozilla, Microsoft and Google all announced do-not-track features for their browsers shortly after the FTC report.
The U.S. Department of Commerce called for a privacy bill of rights for Web users in its own December privacy paper.
But William Kovacic, a Republican commissioner at the FTC, questioned what agencies would enforce new privacy standards and whether lawmakers and privacy advocates would stop pushing for more privacy protections if Internet companies met current demands. "Do you believe the promises of the regulators and others that if you do X, they will be satisfied?" he said at the TPI event. "Or is X a revise-and-resubmit process ... in which you never ultimately satisfy the referees?"
The FTC and Commerce reports, as well as some legislative proposals on online privacy, are "very fuzzy" on details on whether there should be strong regulations or voluntary compliance with industry privacy standards, he added.
Before new privacy regulations are created, lawmakers should look at the potential impact on Internet commerce, added Thomas Lenard, president at TPI, an antiregulation think tank. "More privacy generally means less information available" on the Internet, he said.
But Daniel Weitzner, associate administrator at the Department of Commerce's National Telecommunications and Information Administration (NTIA), disagreed, saying recent studies suggest that Internet-based companies that give users more control over their personal data can build loyalty and advertising click-through rates at the same time. Giving consumers greater control over their privacy doesn't necessarily mean that online companies will lose access to all that data, he said.
"We really see no evidence that there's some trade-off" between privacy and e-commerce, Weitzner said.
 Privacy Law

Intel Hopes to Boost Cloud Gaming With Ray Tracing.


A new technology from Intel called ray tracing could bring lifelike images and improved 3D effects to games on tablets and other mobile devices.
The chip maker is creating chips and rewriting games to use ray tracing, which generates accurate images by tracing paths of light and could lead to console-like gaming via the cloud, the company said in a podcast this week.
At some point in the future, after a new Intel chip is released, mobile device users will be able to play complex 3D games over the cloud using real-time ray tracing, which demands a lot of computing power, Intel said. Clusters of power servers with multiple CPUs and vector processing units could process tasks in parallel, with accurate images then being delivered to tablets and smartphones.
Tablets and smartphones are mostly used for casual gaming, but increasingly sophisticated hardware is making the devices capable of handling higher-resolution graphics. Apple's iPad 2 tablet, which was announced this week, has improved graphics capabilities compared to its predecessor, while LG's Optimus 2X smartphone can render 1080p video. A tablet using Nvidia's upcoming mobile chip called Kal-El was demonstrated playing an Xbox 360 game at last month's Mobile World Congress show.
Intel has rewritten the first-person shooter game "Wolfenstein," which looks more realistic with ray-tracing technology, said Daniel Pohl, an Intel researcher, in the podcast.
"We have a red car sitting at a courtyard, which has a very shiny reflective surface. That can be rendered very good ... because ray tracing can do very physically [accurate] modeling of reflections," Pohl said.
For example, ray tracing will let gamers use reflections off the car's surface as a mirror to see if snipers are approaching from the rear, Pohl said. Ray tracing could also add more visual detail such as shadows, which could help enhance 3D effects in a game.
Modern device screens employ millions of pixels and millions of rays are sent out for every pixel, which creates a challenge as a lot of processing power is needed, said John Owens, associate professor of Electrical and Computer Engineering at University of California at Davis, during the podcast.
Billions of rays may need to be continually bounced off objects to accurately sample the changing scenes in a game. Modeling becomes even more complex if a game has a lot of moving objects and changing scenes.
"The reason [ray tracing] isn't pursued in your normal graphics cards today or that most of your games aren't done through it is that actually doing that computation is very challenging," Owens said.
Intel is trying to address the challenge through an experimental server chip called Knights Ferry, which is based on the company's new MIC (many integrated core) architecture. The chip, which was announced in May at the International Supercomputing Conference, is designed for intensive graphics and high-performance computing.
The chip has 32 x86 cores with corresponding 512-bit vector processing units. The cores operate at a clock speed of 1.2GHz, and the chip supports OpenCL and Microsoft's DirectX, which are frameworks that include tools for parallel programming.
Knights Ferry also implements elements of the now defunct Larrabee chip, which was to be Intel's first graphics processor. The chip maker showed Larrabee's ray-tracing capabilities on-stage at the Intel Developer Forum in 2009 in a game titled "Enemy Territory: Quake Wars," but many audience members were underwhelmed by the limited scope of the demonstration.
The first commercial product based on MIC architecture will be a chip called Knights Corner, which the company said will include more than 50 cores. Intel will release the chip in the first half of next year, an Intel executive said on a podcast in late February. Use of ray tracing for mobile gaming hinges on that chip's release.
Cloud Gaming 

Roger Ebert’s Inspiring Digital Transformation.


With the help of his wife, two colleagues and the Alex-equipped MacBook that he uses to generate his computerized voice, famed film critic Roger Ebert delivered the final talk at the TED conference on Friday in Long Beach, California.
Prefacing his remarks with a scene from Stanley Kubrick’s 2001: A Space Odyssey, Ebert opened by telling the audience that he “became operational on June 18, 1942. [And] like HAL 9000, I also speak with a computerized voice” -- the same remarkably realistic computerized voice he shared with the world on Oprah last year.
From there, Ebert and friends took the audience on his inspiring journey, from the near-death experience in 2006 that left him without a voice to his search for the technology that creates Ebert-sounding text-to-speech to his present-day prolific use of social media for sharing his commentary on both movies and life with the world.
Ebert credited a life-long love affair with technology for giving him the inspiration to both find his “voice” and continue his career on the Internet. “I joined Compuserve when it had fewer users than I have followers on Twitter,” he joked.
“For me, the Internet began as a useful tool and now has become something I rely on for my actual daily existence... [if this had happened before], I’d be isolated as a hermit; I’d be trapped inside my head. Because of the digital revolution, I have a voice, and I do not have to scream.”

That's not to say Ebert's existence is not without significant physical and social struggle. In one of the more moving moments of his talk, Ebert's wife Chaz choked up while reading his words aloud, saying, "People talk loudly and slowly to me... sometimes they assume I am deaf. There are people that don’t want to make eye contact. It is human nature to look away from illness; we don’t enjoy a reminder of our own fragile mortality... that’s why writing on the Internet has been a life saver for me."
Meanwhile, the technology that enables Ebert to “speak” continues to see improvements -- for example, adding more realistic inflection for question marks and exclamation points. In a test of that, which Ebert called the “Ebert test” for computerized voices, the critic closed by telling the audience a joke, saying, "If the computer can successfully tell a joke as well as Henry Youngman, then that’s the voice I want.”
Judging by the laughter, tears and standing ovation from the crowd that followed as Ebert left the stage, it would seem that voice may have already arrived.
Read More. 

South Korean websites come under further attack.


SEOUL, South Korea – Unidentified attackers targeted more than two dozen South Korean government and private websites Saturday, a day after two waves of similar attacks, but officials reported no serious damage.
A total of 29 websites were hit Saturday in so-called "denial of service" attacks, in which large numbers of "zombie" computers try to connect to a site at the same time in an attempt to overwhelm the server, the Korea Communications Commission said.
Commission official Lee Sang-kug said the attacks were "so weak that no actual damage was detected so far." Lee said the commission would keep a close watch on the situation in coming days, but that the fallout was likely to remain limited because the government and computer security companies were well prepared.
Saturday's attacks on sites including South Korea's presidential office, the Foreign Ministry, the Defense Ministry, some financial institutions and U.S. Forces Korea followed two rounds Friday in which damage was also limited.
Lee said that 40 websites were originally targeted Friday, though only 29 came under actual attack. A total of 29 were targeted Saturday, he said.
The National Police Agency said the attacks originated from 30 servers in 18 foreign countries or territories including the United States, Israel, Russia, Hong Kong, Taiwan, Thailand, Japan, India, Brazil and Iran.
"We may find more servers behind this attack as it is only the beginning of the investigation," said Jung Suk-hwa, head of the agency's Cyber Terror Response Center. "Generally, there is someone else who controls all of these servers and we are working to figure out who it is."
In 2009, some government websites in South Korea and the U.S. were paralyzed by a similar type of attack that South Korean officials believed was conducted by North Korea. But U.S. officials have largely ruled out North Korea as the origin, according to cybersecurity experts.
South Korean media have previously reported that North Korea runs an Internet warfare unit aimed at hacking into U.S. and South Korean military networks to gather information and disrupt service.
Park Kun-woo, a spokesman for South Korean computer security company AhnLab, said Friday that China is also pointed to as a source of cyberattacks because a large amount of malware, or malicious software, originates from there.
Full Article 

Wednesday, March 2, 2011

SoftKinetic beats Microsoft to the punch, releases Kinect SDK first.


After a slew of crafty users took Kinect into their own hands shortly following the device’s launch, Microsoft finally relented and decided it would open up the SDK for its users. Before you go kissing the ground MS execs walk on and hailing them as supporting customer creativity, know that the allowance comes only after initially threatening legal action against hackers and then a quick save-face routine in which the company began praising the ingenuity of the developers.
But apparently, these developers didn’t want to wait for the Microsoft stamp of approval before letting everyone who wants to get their hands dirty with the 3D interface. Belgian-based firm SoftKinetic released its own SDK today, which offers development kits for all depth-sensing recording devices – included Kinect.
“We want to expand the community of developers to be able to access to our professional tools and technology. We believe that opening up our cross-platform, multi-camera software to a broader community will enhance productivity and creativity, and we cannot wait to see the incredibly innovations that emerge as a result,” the company’s chief strategy officer Eric Krzeslo says, according to Beta News.
According to SoftKinetic’s site, its license and tools will give users total and free access to “the world’s premier [sic] gesture recognition middleware and industry de facto standard, compatible with all 3D camera technologies on the market.” It does appear, however, that there are some requirements for using the kit. SoftKinectic will be accepting registered companies with a staff of at least three, as well as inventors and creative types working on a finite project or experiment, and of course those of the academic variety. In short, it sort of sounds like SoftKinectic is looking for serious and committed brainiacs to benefit from their hard work. But it’s sure to find them: A fair amount of the early Kinect hacks were from artistic types who were exploring how to incorporate the technology into their art. Then again, some were to make the most realistic appearance of a lightsaber to date. In our eyes, both are deserving of Kinect’s SDK.

Read More :- Kinect SDK.

How to Avoid Being the Victim of an Android Trojan.

 It is no secret that mobile platforms are ripe targets for malware. The explosion of smartphones and tablets, combined with the lack of security awareness or tools for mobile platforms makes them particularly attractive targets. Apparently, Android has caught the attention of mobile malware developers because the number of threats is on the rise.
One of the primary benefits of Android over its main rival--Apple's iOS--is its openness. While Apple exerts control over almost every aspect of the iPhone and iPad experience, and has stringent rules when it comes to the apps that are approved to work with iOS mobile devices, Android is open source and gives developers and users significantly more freedom to customize the platform to meet their needs.
That openness comes at a price, though. A Symantec spokesperson e-mailed me to point out that Symantec has recently noted a spike in malware targeting Android. A recent example is an Android Trojan dubbed Android.PJapps which is spread through compromised versions of legitimate apps that are hosted on unregulated alternatives to the official Android Market.
The Symantec representative described the Android Trojan. "Android.Pjapps masquerades as a popular "Steamy Window" app. The legitimate features of the original app are still present in the malicious version, but it also features additional functionality that allows an attacker to build a botnet. Among other things it is able to install applications, navigate to websites, add bookmarks to the user's browser, send text messages and block text message responses. It also sends sensitive user information back to the attacker."
Mobile malware is by no means unique to Android, but the open nature of the platform makes it an easier target. To avoid becoming a victim of Android malware, Symantec recommends:
Only use regulated Android marketplaces for downloading and installing Android apps.
 Adjust Android OS application settings to stop the installation of non-market apps.
 Review other users' comments on the marketplace to assist in determining if an app is safe.
 During the installation of Android apps, always check the access permissions being requested for installation; if they seem excessive for what the application is designed to do, it would be wise to not install the application.
• Utilize a mobile security solution on devices to ensure any downloaded apps are not malicious.
• Enterprises should consider implementing a mobile management solution to ensure all devices that connect to their networks are policy compliant and free of malware.

Read More :- Android Malware.

Intel completes McAfee acquisition.


WASHINGTON (AFP) – US computer chip giant Intel said Monday that it has completed its $7.68 billion acquisition of computer security firm McAfee.
Intel said that with the completion of the deal, McAfee becomes a wholly owned subsidiary of Intel. McAfee will continue to sell security products and services under its own brand.
The Santa Clara, California-based Intel, whose processors power nearly 80 percent of computers worldwide, announced its plan to purchase McAfee, one of the world's largest anti-virus software companies, in August.
The acquisition received the green light from the Federal Trade Commission in December and from European regulators in January.
"Intel has added security as a third pillar of what people demand from their experiences with personal computers and other connected devices," Intel senior vice president Renee James said in a statement.
"The acquisition of McAfee adds not only world-leading security products and technologies to Intel's computing portfolio, but also brings incredibly talented people focused on delivering products and services that help make connecting to the mobile Internet safer and more secure," James said.

Read More :- McAfee Intel

Morgan Stanley hit by China-based hackers.


NEW YORK (Reuters) – Morgan Stanley experienced a "very sensitive" break-in to its network by the same China-based hackers who attacked Google Inc's computers more than a year ago, Bloomberg reported, citing leaked emails from an Internet security company.
The emails from the Sacramento, California-based computer security firm HBGary Inc said that Morgan Stanley -- the first financial institution identified in the series of attacks -- considered details of the intrusion a closely guarded secret, the report said.
Bloomberg quoted Phil Wallisch, a senior security engineer at HBGary, as saying that he read an internal Morgan Stanley report detailing the so-called Aurora attacks.
The HBGary emails don't indicate what information may have been stolen from Morgan Stanley's databanks or which of the world's largest merger adviser's multinational operations were targeted, according to the report.
Representatives for HBGary were not immediately available for comment.
A Morgan Stanley spokeswoman declined to comment on whether the bank had been targeted in the Aurora attacks.
"Morgan Stanley invests significantly in IT security and manages a robust program to deal with malware and attempted computer compromises," spokeswoman Sandra Hernandez said in a statement emailed to Reuters.
Chinese Foreign Ministry spokeswoman Jiang Yu repeated that China opposed any kind of hacking.
"We often hear this kind of story. I don't know if related parties have reported this to the relevant authorities asking China to cooperate," Jiang told a regular news briefing.
"We ... will use the law to go after any kind of hacking or crime on the Internet," she added.

Read Full :- China Hackers.

Man Gets 7 Years for Forcing Modems to Call Premium Numbers.


A New Hampshire man who made US$8 million by installing unwanted dial-up software on computers and then forcing them to call expensive premium telephone numbers was handed down an 82-month sentence on Monday.
Prosecutors say that between 2003 and 2007, Asu Pala and others put together a lucrative business by setting up premium telephone numbers in Germany -- similar to the 1-900 numbers used in the U.S. -- and then infecting German PCs with software that would automatically dial the numbers for short periods of time.
"The victims were generally unaware that their computers' telephone modems were calling these numbers and charging them with expenses," the U.S. Department of Justice said in a press release.
These dialers were a major, but largely unreported, problem in Europe in the early part of the last decade. In 2006, two men were given stiff sentences by an Austrian court for running a scam that brought in €12 million ($16.5 million). And while dial-up modem usage has dwindled, shrinking the number of possible victims, this type of software is still in circulation in Europe.
Pala, a Turkish immigrant to the U.S., ran a small Massachusetts Internet service provider called Sakhmet when he was approached by others -- men he believed to be the brains of the operation -- and enticed into building the back-end infrastructure for dialer software that was then downloaded onto the German computers, his lawyer, Geoffrey Nathan, said in an interview Tuesday.
The money was good. Pala was caught after he was flagged by federal authorities after paying cash for his second Lamborghini sports car, Nathan said. By May 2009, Pala had begun cooperating with federal authorities and was training U.S. Federal Bureau of Investigation agents across the country on how the Trojan downloader scam worked. He was also secretly working on a sting, trying to nail the two men who had introduced him to the scam. But they couldn't be enticed into a meeting, and the feds ultimately pulled the plug on the operation.
At his sentencing, Pala was given a break for his cooperation with the government, but had the sting worked, it would have cut years more off his sentence, Nathan said. "The case reflects the pitfalls and the success of a cooperation agreement," he said.
The people Pala had been trying to turn in, however, are still running the scam, Nathan said. "Most regrettably, it turns out that the big fish got away with the crime and they remain in operation."
Pala pleaded guilty to fraud and tax evasion charges in U.S. District Court for the District of Massachusetts in April 2010. In addition to the 82-month sentence, he must pay a $7.9 million fine, along with $2.2 million in back taxes to the U.S. Internal Revenue Service.

Read More :- Forcing modems to call premium numbers.

Apple set to unveil new iPad, with or without Jobs.


SAN FRANCISCO (Reuters) – More than a year after igniting the tablet computing craze, Apple Inc prepares to unveil the second version of its blockbuster iPad on Wednesday -- possibly minus lead showman Steve Jobs.
Plenty has changed over the course of the year. The iPad became a bona fide smash, essentially creating the tablet category and triggering a wave of me-too products that are just starting to hit the market.
Now, as rivals Motorola and Research in Motion race to catch up, Apple itself is going through a transformation.
There is as much speculation about whether iconic Chief Executive Jobs will take the stage at Wednesday's event in San Francisco as there is about the new device.
Jobs traditionally launches major products with a pizzazz and style that reflect his eye for detail and design. But he took indefinite medical leave last month and Apple has not given details of the cancer survivor's medical condition.
His absence is bound to spark a fresh round of speculation on his condition. And his presence will be scrutinized equally closely for any signals on his health.
Many in Silicon Valley and on Wall Street doubt he will return to the company he co-founded in 1976.
In his absence, it is a good bet that Tim Cook, the company's operations chief and Jobs' heir apparent, or marketing head Phil Schiller, will lead Wednesday's show.
If Cook does appear, investors will scrutinize his performance. While Wall Street has grown comfortable with Cook's leadership, Wednesday would provide the first major test of his showmanship skills -- a key asset for marketing maestro Apple.
Regardless, the company is in little danger of losing its massive lead in the tablet market in the near term. With a big first-mover advantage, the company is rolling out the second-generation iPad just as most its rivals are bringing their first offerings to consumers.
IPAD, PART DEUX
The new model will sport the same 10-inch screen but should be lighter, thinner and faster, according to a plethora of analyst and blog reports. Apple is expected to add a camera to enable video chat using the FaceTime application.
Shares of some Taiwanese component makers rose in Asian trade on Wednesday ahead of the launch.
Camera module maker Genius Electronic Optical Co Ltd and lens manufacturer Largan Precision Co Ltd were starting new supply deals with Apple, two sources said in December, but neither could confirm for which product the modules were intended.
Genius jumped as much as 5.1 percent before ending 2.5 percent lower, while lens manufacturer Largan edged up 0.2 percent in a broader market down 1.2 percent. Hon Hai Precision, whose parent Foxconn manufactures Apple products, eased 1.8 percent.
"The launch of iPad2 should have been priced in, but any other new features released, for example more powerful hardware, could push relevant stocks into another round of growth," said Mike Fang, a fund manager at Paradigm Asset Management in Taipei.
Component makers generally do not know what the finished product will look like because they are only responsible for manufacturing one part before passing it on for assembly.
Some industry watchers believe the new model may also sport a chip that enables it to run on networks that use both GSM and CDMA technologies.
Consumer appetite for tablets seems sizable, and businesses are also piloting the devices for a variety of uses, including retail and healthcare. But Apple no longer has the tablet market to itself.
Motorola has just launched the well-reviewed Xoom. Research in Motion, which specializes in corporate customers with its BlackBerry, will begin selling the PlayBook. And Hewlett-Packard Co will bring the TouchPad this summer.
Companies such as Samsung Electronics and Dell Inc are already selling tablets, but neither seems to have slowed the iPad's momentum.
Apple set a high bar with the first iPad, so the company will have a harder time creating a "wow-factor" with the second iteration.
It sold nearly 15 million iPads in 2010 after an April launch, three or even four times as many as some analysts had predicted. The tablet added more than $9 billion in revenue for the company last year.
It became a must-have for the holiday season, embraced by taste arbiters such as Oprah Winfrey.
Analysts expect Apple to sell more than 30 million iPads this year, as the overall tablet market explodes to more than 50 million units.
Jobs' absence comes at a crucial time. Apple is engaged in a battle in the smartphone market with Google Inc, whose Android operating system was installed on more devices than Apple's for the first time in 2010. Its usually gravity-defying stock has fluctuated this year.
Shares in the world's most valuable technology company are up roughly 8.5 percent this year, but slid nearly 7 percent over three trading days from February 17 to 22.

Read Full Article Here :- Apple unveil new iPad

Android is virtually everywhere, from docks to clouds.

 

Motorola docks get smarter

Our smartphones are now as powerful as many of our computers, reiterating the trend towards interoperable devices. Motorola (MMI) is taking a literal approach with the Atrix, a laptop dock you can plug your phone into. Motorola CEO Sanjay Jha reportedly had good news for investors yesterday, saying the company will be bringing its Webtop apps and their corresponding docks to its high-end smartphone lineup in the second half of this year.
It’s good news for the dock concept, which is yet another manifestation of mobile-PC interoperability. Google (GOOG) may not have made a device specific for this, but its recent availability of mobile app management via the web adds multiple points of access. Apple (AAPL) has applied a similar tactic for iOS, ensuring a more fluid experience amongst devices. While these integrated platform offerings are free, Motorola’s docking bundle will run you about $500 with a two-year contract.

The mobile cloud takeover

The cloud is facilitating several ways to make our smartphones more functional, and Verizon’s (VZ) unified communications plans will turn your Android into a business desktop phone. Through a platform called Verizon Mobile UC, the desktop phone also features a mobile phone dock, connecting to the enterprise LAN via Ethernet. It’s designed as an enterprise solution, giving employees the ability to make calls without using precious daytime minutes.
Cloud services are also helping the enterprise from a security standpoint, developing separate profiles for Android devices so personal and professional content don’t overlap. Entreproid launched its Divide service at DEMO this week, providing a platform for corporate workers to maintain secure, work-related interactions on their mobile devices. Divide is currently available for Android, in private beta.

Read More :- Android Everywhere.

Google Acquires Reverse Engineering Company Zynamics.


Google has just acquired a small German software company called Zynamics. The company, which was founded in 2004, focuses on reverse engineering -- that is, analyzing software (malware in particular) for which no source code is available.
It's an incredibly interesting and complicated problem to try to solve, which makes the Zynamics team and product a perfect fit for Google, a company that's known for tackling interesting and complicated problems.
A Google rep said in an e-mail, "We’re delighted to have the Zynamics team aboard and hope their tools and skills in fighting malware will help us better protect Google’s users."
While we're not completely sure what the fate of the company will be, we do know that its goals and expertise line up particularly well with Google's aims in online security.
Currently, Zynamics's offerings focus on the needs of information security specialists and malware analysts. Its products are allegedly both innovative and time-saving.
The company's products include BinDiff, for analyzing executables; BinNavi, for analyzing binary code; PDF Dissector, for analyzing PDF malware; VxClass, for sorting malware into families; and BinCrowd, which is a central database for sharing reverse-engineered information.
In addition to these products, Google is also acquiring a brilliant and experienced team -- just the kind of engineers Google is renowned for hiring.
We'll see what the future holds for Zynamics, and we'll keep you updated as details about this deal emerge.

Read More :- Zynamics Reverse Engineering

Google Pulls 21 Apps In Android Malware Scare.


Google has just pulled 21 popular free apps from the Android Market. According to the company, the apps are malware aimed at getting root access to the user's device, gathering a wide range of available data, and downloading more code to it without the user's knowledge.
Although Google has swiftly removed the apps after being notified (by the ever-vigilant Android Police bloggers), the apps in question have already been downloaded by at least 50,000 Android users.
The apps are particularly insidious because they look just like knockoff versions of already popular apps. For example, there's an app called simply "Chess." The user would download what he'd assume to be a chess game, only to be presented with a very different sort of app.
These apps are all pirated versions of popular games and utilities -- an expeditious solution for busy hackers. Once downloaded, the apps root the user's device using a method like rageagainstthecage, then use an Android executable file (APK) to nab user and device data, such as your mobile provider and user ID. Finally, the app acts as a wide-open backdoor for your device to quietly download more malicious code.
Below is a complete list of the bad apps, all of which were made by an entity called Myournet. If you've downloaded one of these apps, it might be best to take your device to your carrier and exchange it for a new one, since you can't be sure that your device and user information is truly secure. Considering how much we do on our phones -- shopping and mobile banking included -- it's better to take precautions.

  • Falling Down
  • Super Guitar Solo
  • Super History Eraser
  • Photo Editor
  • Super Ringtone Maker
  • Super Sex Positions
  • Hot Sexy Videos
  • Chess
  • 下坠滚球_Falldown
  • Hilton Sex Sound
  • Screaming Sexy Japanese Girls
  • Falling Ball Dodge
  • Scientific Calculator
  • Dice Roller
  • 躲避弹球
  • Advanced Currency Converter
  • APP Uninstaller
  • 几何战机_PewPew
  • Funny Paint
  • Spider Man
  • 蜘蛛侠
Remember, the Android Market is open, which can be great and unfortunate in different circumstances. Always read user reviews before you download; and if you have any doubts, play it safe.
Read More :- Android Malware.