Wednesday, November 05, 2014

Dell's new Venue 11 Pro tablet is thin and light enough to take on the Surface Pro 3

Source: http://www.engadget.com/2014/11/05/dell-venue-11-pro-2014/

SONY DSC

Nope, that's not a Surface Pro up there. But it's close. Dell just refreshed its 10.8-inch Venue 11 Pro tablet, and, much like Microsoft's slate, it's gone on a bit of a diet. Whereas the original Venue 11 Pro ran on a traditional, laptop-grade Core i5 processor, this one uses one of Intel's new Core M chips, which allows it to be much thinner and lighter -- and fanless, too. All told, it now comes in at 1.62 pounds and measures 0.42 inch thick -- not bad for what's essentially an 11-inch laptop replacement. (It's even slightly lighter than the Surface Pro 3, though to be fair, Microsoft's tablet also has a bigger screen.)

As before, it'll be available with your choice of Core i3- and i5-series processors, a 1080p IPS screen and an optional Synaptics-made digitizer for pressure-sensitive pen input. Given that this is a lower-powered Core M processor, we wouldn't be surprised if the performance were slightly below last year's model, but even so, battery life is supposed to be longer: up to 10 hours on the tablet, plus another 10 if you add the optional Mobile Keyboard, which has its own 10-hour battery built in. Speaking of the sort, both of last year's keyboards, including the "Slim" folio, will work with this year's model as well. Good news for IT departments that already sprang for the accessories, and only want to upgrade the actual tablet. The Venue Pro 11 starts at $699 with the Slim keyboard included. Storage starts at 64GB, but there will also be 128GB and 256GB models available. Look for it this month, and in the meantime, enjoy the hands-on photos.

Filed under: ,

Comments

Read More...

If You Text From Your PC, Don't Use SMS for Two-Factor Authentication

Source: http://lifehacker.com/if-you-text-from-your-pc-dont-use-sms-for-two-factor-a-1654474481

If You Text From Your PC, Don't Use SMS for Two-Factor Authentication

We love two-factor authentication, and we love services that make our text messages accessible from our computers. However, if you don't want anyone—a snooping spouse, child, parent, or most importantly, a laptop thief—getting ahold of your private information, you might want to alter how you use two-factor authentication.

Two-factor authentication is one of the best forms of password security, but if you use services like Yosemite's new Text Message Forwarding with iOS 8.1 or MightyText on Android, you should make sure you're not using SMS as your second step in the authentication process. Anyone who has access to your computer will be able to see the second step—the verification code—from your computer, whether they have your phone or not. Instead, use a USB key or our favorite authentication app for Androidand iPhone, Authy, to generate a code from your phone, and disable SMS as your second step. Authy can even hide the codes behind a PIN for extra security.

Beware two-factor authentication using SMS forwarding | The Unofficial Apple Weblog

Photo by MIKI Yoshihito.

Read More...

Sharp's night vision camera records color even in total darkness

Source: http://www.engadget.com/2014/11/04/sharp-color-night-vision-camera/

Sharp's infrared color night vision camera

Say goodbye to the days of monochrome night vision footage, folks. Sharp recently unveiled an infrared security camera that captures color 720p video, even in absolute darkness. The trick is an imaging sensor that uses near-infrared for illumination; unlike virtually every other competitor, this camera doesn't have to resort to conventional lights (and thus give itself away) to get a vivid picture. The device will likely be limited to corporate and government customers when it goes on sale in late November, but it could have a big impact on your safety. Building managers will soon have an easier time identifying intruders, not just spotting them -- while the technology might not stop a break-in, it should increase the chances of catching thieves before they strike again.

Filed under:

Comments

Source: Sharp, CEATEC

Read More...

Tuesday, November 04, 2014

This Jumbo Jet Was Transformed Into A Beautiful Hotel รข And You Can Even Sleep In The Cockpit

Source: http://www.businessinsider.com/jumbo-stay-hostel-stockholm-sweden-2014-11

jumbo stay, jet hostel

If you're looking for somewhere a little "different" to stay for the holidays, you should check out the Jumbo Stay Hostel in Stockholm, Sweden.

Created inside of a Boeing 747 Jumbo Jet that used to fly for Pan Am, this cozy hotel features a redesigned interior and the opportunity to sleep in the airplane's cockpit.

With 27 rooms that can hold up to 76 people, this unique hotel is one worth checking out.

This is "Liv," the Boeing 747 that was turned into the hotel in 2008, named after the owner's daughter.



You enter the Jumbo Stay Hostel from the side, and yes, you can walk along the wings.



Inside, many of the seats have been removed for a bar and seating area.



See the rest of the story at Business Insider






Read More...

A White-hat Hacker Discovered A Dangerous Vulnerability In Three Apple Operating Systems (AAPL)

Source: http://www.businessinsider.com/white-hat-hacker-discovered-security-flaw-rootpipe-in-os-x-2014-11

man at computer

A Swedish white-hat hacker has discovered a serious vulnerability in OS X Yosemite that may extend to previous Mac operating systems as well, reports The Hacker News' Mohit Kumar.

The vulnerability, called "Rootpipe," appears to have been discovered by Emil Kvarnhammar, a consultant at IT security firm TrueSec.

Rootpipe allows outside users to gain administrator-level access to Macs running OS X Yosemite, Mavericks, or Mountain Lion without a password.

The security flaw gives attackers the opportunity to steal information, install malicious programs, or erase users' hard drives.

Kvarnhammar, for his part, appears to be waiting for Apple to patch Rootpipe before saying much about it:

Details on the #rootpipe exploit will be presented, but not now. Let's just give Apple some time to roll out a patch to affected users.

— Emil Kvarnhammar (@emilkvarnhammar) October 16, 2014

Rootpipe has probably been around since at least 2012, according to Swedish tabloid Aftonbladet.

Apple has not publically acknowledged the security flaw and is expected to patch it in mid-January 2015, reports ZDNet

We've reached out to Apple for comment and will update this post if we hear back.

SEE ALSO: Your Unsaved Files Are Automatically Stored On iCloud

Join the conversation about this story »








Read More...