SOFTWARE

Google

Google clears Justice Dept. hurdle in ITA buy; FTC antitrust action in focus

The U.S. Justice Department approved Google's planned acquisition of online travel software firm ITA, but it made the technology giant agree to several conditions and concessions. Even as the Justice Department concluded its months-long review of Google's purchase of Massachusetts-based ITA, the focus now has turned to the possibility of the Federal Trade Commission (FTC) initiating an expansive antitrust investigation into Google to see if the company is stifling competition and getting i...
More news

Pandora for Android: Example of data-leaching flipside of apps

Mobile apps can can leach immeasurable amounts of data from personal smartphones and sell them to advertising platforms. The news about data pilfering apps is nothing new, but there is now fresh evidence that large quantum of data are passed on from smartphones to advertisers by some apps.
Apple iPhone

The underground iPhone: Million-dollar jailbreaking industry thrives on legal loophole

The iPhone lost its virginity when legendary teenage hacker George Hotz used a soldering iron to cut open Apple's defences and unravel the secrets of the iPhone. The exploit famously inspired hordes of geeks who tried to get the better of Apple by offering iOs jailbreaks and finally setting up underground app stores that made decent business.
IBTimes Logo

Dot Hill develops storage software for Apple's video editing

Data storage systems provider Dot Hill Systems Corp said it developed a new post-production storage software for editing applications, including Apple Inc's Final Cut Pro and Autodesk's Smoke, sending its shares up 20 percent on Wednesday. Shares of the company rose 55 cents to a day high of $3.27 in morning trade.
Stakes Are High for Microsoft on Windows 8

What are the leaked features of upcoming Microsoft Windows 8?

The tech world is awash with speculation over what will be the new, groundbreaking features in Microsoft Windows 8, which could likely see light of the day in 2012. Here is a glimpse into the fancied features of the Windows 8, according to various leaks and tech world ruminations:
IBTimes Logo

Twitter disables new version of website

Twitter experienced service disruptions on Tuesday, displaying an older version of the social networking website to some users and becoming completely inaccessible to others.
Goggle

Google to launch facial recognition mobile app

Technology giant Google is developing a facial recognition mobile app that would allow users to snap a picture of a friend or new acquaintance - and then access his or her Google Profile contact information, according to various media outlets.

Ten major routes a malicious code takes in targeted attack

The year 2010 witnessed significant targeted attacks like Hydraq (a.k.a. Aurora) and Stuxnet. While Stuxnet is a very complex threat, not all malicious code requires this level of complexity to breach an isolated network, Symantec said. It has listed out 10 propagation mechanisms of the malicious code employed in a targeted cyber attack.

Pages

IBT Spotlight

We Help Businesses Find B2B Service Providers They Can Trust.