Announcement:

The technology of the world heart beats here.

Sunday, July 28, 2013

Google Glass in a different way, was to test the

Wearable technology, is the most concrete examples of Google Glass, this time for a different purpose used. The device using the first porn movie.

Porn star James Dean and Andy San Dimas'in to play a movie on Youtube, was published.

Players during the shooting of the device by using some of the accessories and positions on the calls made.

However, to test those who by prolonged excessive warming of the smart glasses heating degree in a different way than was tested.
All rights reserved.

ConsumerLab Research 2013

The report of smartphone users 4G technology is also positive in approaching to reveal. In turkey, the users of at least 44 %in the near future 4G technology is presented to date, more than paying 4G data packets subscriber can and 4G device they can use, he says.

İbrahim Balic'ten Apple claim

Apple, last Thursday, the day lost access to the developer portal about the silence. The company, the portal is a hackers attack had been announced. On the other hand, the Turkish security researcher İbrahim Balic, the system finds vulnerabilities in Apple with the sharing of 4 hours, then the company's portal kapadigini claimed. Balic itself hacker who instead of to the company via Twitter 'to get love,' he said.

Next, the Web site, according to Apple's in the press release, a hacker portal to registered developers to information seize the purpose of cyber attack. The company, information infiltrate sizmadigi with the information did not.

Balic the portal, 13 vulnerability and found these vulnerabilities by using the users ' information achieves Apple proved that the claimed. Balic vulnerability fixes the help of an Apple with contact established, and the issue could prove to their own company, 73 user's information in the company that claimed. Additionally, the portal uses approximately 100 thousand people to the information that he was allowed to.

Apple's after that, the portal closes, who claimed to Balic he hacker, and not just in the system vulnerabilities and find the company to warn of this research, he said.

Balic, Apple's developers sends a hacker attacked by the end of explaining to e-mail the following tweet with my site.

ConsumerLab Research 2013

Ericsson this year, the fourth in its ConsumerLab Turkey Survey of 2013, the results shared.

Throughout turkey, the 15-69 age group at least once a week in the smart phone to the internet, through the use of a total of 1.124 (and 45%male, 55 % of the women) with the user of the research conducted, users out-of-pocket use of the internet for the duration of the mobile and fixed-network/networks about the lived experience of the mobile operators that of loyalty to the acting to the basic factors, which sheds light on.

Social media is caught

Manisa Turgutlu district, the theft of his work, the person using the computer, and the social networking site when caught.

Turan Quarter, the business when the shop-owners of a notice on the review started, the police, 5 workplace, 1 school and 1 house robbing the thief was a place where a computer uses.

A thief in the social networking site, to him belong the page opened in determining teams, page supheliyle information about the reached.

Surrounding security cameras are also investigating teams, in a short time and caught the suspect F.o'yu detained.

Millions of SIM card is in danger of facing'

A technology security specialist according to the phones attached to the SIM (Subscriber Identity Module) cards, a design error to millions of users gozetlenme and theft in danger of leaving.


Karsten Nohl, SIM cards and a message to be sent to the method of digital codes to access the method discovered in time. In itself, this practice of the people dinlenmesinde or to steal money can be used in the direction of such transactions and provide notice.

Mobile phone networks, and a sector of the companies representing the GSM Association (GSMA) said it was investigating claims. The association's spokesman, said, "Karsten'in these findings GSMA'yle early to share the preliminary analysis is to provide us with an opportunity," he said.

The spokesman said the description of the continued: "the Findings of the possible results of the review will be impacted by the network operators and the Sim suppliers to make the guidance we have had the opportunity. The old standards produced of Sim cards that can be influenced to be seen."

Nohl, associated with the vulnerability onincelemesini, the centre of Berlin, in the company of Security Research Labs on the web page of released.

Listened to the calls

A kind of security token to the SIM cards, the user information from a mobile phone network through confirms. The cards are also a short amount of the message and the telephone number of the store.

Nohl, phone, from a network message to the strain that is given to a message with the security codes of the emergence discovered in time. Thrown in the message of the network, fake digital signature contains. Nohl, the message is fraudulent, who realize that most of the phone's communication cut, but denediklerinin about a quarter of the answer to the SIM card security codes that contains the error message sent, he says.

Nohl, an attacker this information to achieve in the case of the Java programming language, written viruses Sim cards to install, it says. These security codes by hackers to send a message to the user's voicemail messages to listen to, and where they are to be able to follow it is to be used, he says.

In addition Nohl other equipment is also basvurulmasiyla the phone listening device that is able to transform such explains. The bbc said in a statement Nohl SIM-cards of all phone calls, text messages and internet traffic to encrypt the required security codes produces," he says and adds: "if such people to encrypted information can infer in the hands of the Sim card codes when the data in the password can solve."

"Operators, 3G or 4G phones talks dinlenemeyecegini says - but the Sim card when this is quite possible." Nohl also research on the basis of all the world's SIM cards that are about 8-to-1 of about 500 to 750 million of the device - this type of attack, " he says.
Itself, although this is the kind of question which of countries phones affect he did not tell the public in Africa as users more and more concern should be explained.

Nohl, "in Europe, Sim cards and phone calls and texting while in Africa, many people do mobile banking, too. Sim card playing the husband bank accounts can also be played," he says.

All rights reserved.

Copyright @ 2013 Technology. Designed by Template Coder | Love for The Globe Press