A Solution to Skimpy Storage Is in Our Future


As we rely more on phones and tablets for our computing needs, it seems like we’re always running out of storage. Most mobile devices top out at 64GB, and while you might see a tablet with 128GB of 256GB of storage, that’s still a long way from the terabyte or more that you find on even the most basic laptops and desktops.

The problem lies with solid-state, or flash-based, storage, which is found in almost every phone and tablet. Flash storage is faster and more power-efficient than traditional hard drives, but it’s much more expensive, and as storage size increases, flash storage is more prone to breakdowns. What we really need is a breakthrough.

Fortunately, there are two of them on the horizon.

Samsung, the world’s largest maker of memory chips, has created a “3D Vertical NAND” flash chip that supposedly sidesteps the reliability issues of existing flash storage.


View original post 461 more words


Zeus: Bank Account Stealing Trojan Virus Spreading on Facebook

This happened to me, even with multiple layers of protection. Constant vigilance is necessary.


Be careful what links you click on Facebook. A gang of international cybercrooks has resurrected a six-year-old Trojan virus named Zeus, using it to harvest personal information and drain unsuspecting victims’ bank accounts.

It appears as if the virus threat is being distributed via Facebook groups, especially through spam advertisements offering discount merchandise, counterfeit designer wear, or some similar Facebook scam. The virus made its first reappearance in February of this year, with incidents of infection rapidly growing month-to-month.

Once Zeus infects your computer, the virus lays in wait until you use an online banking account. When you do, the malicious code stores your login and password, using it to empty your coffers. The virus can collect other personal information to sell, as well. According to Malloy Labs, this data eventually makes its way to a group known as the Russian Business Network, a gang of cybercriminals involved…

View original post 155 more words

This Apple-1 Is the Most Expensive Apple Computer Ever

Spend’m if you gottem.. Wish I were an Apple fan.


$671,400. It seems like rather a lot of money for any personal computer — and especially for one that is too out of date to run the latest software.

Except that the computer in question is an Apple-1, the bare-bones machine that Steve Wozniak designed and Steve Jobs marketed in 1976, shortly before they devised the groundbreaking and wildly popular Apple II. As the New York Times’ Steve Lohr reports, an auction house in Cologne, Germany, sold it today to an anonymous entrepreneur from the Far East.

The Apple-1 is a rare computer, no doubt: Wozniak and Jobs sold only a few hundred of them at most in the first place, at the famous list price of $666.66. But when I wrote an article on collectible PCs in 2007, the going rate for an Apple-1 was a relatively affordable $15,000 to $25,000. It’ll be interesting to see if…

View original post 131 more words

Apple May Be Able to Bypass Your iPhone’s Password, but There’s a Waiting List

Once again we lose fractions of our privacy at the hands of government, although for reasons for capturing intelligence involving criminal activity, but still invasive, and one step closer to a catalyst for legislation that involves agencies to access our information, legal or not. What did we do before we had to capture intel from a electronic device… Actual foot work to gather evidence? If they would only allow the access with extreme cases where probable cause exists, the idea might be tolerated, but for now I’ll never believe any government agency.


Break the law and Apple may follow up by breaking into your iPhone, reports CNET, though if you represent the long arm of the law asking Cupertino to give you a hand (or would the proper term be demanding?), it sounds like you’ll have to wait in line: up to seven weeks, in seems.

Why? Because requests from law enforcement officials to hack into someone’s iPhone have been so overwhelming that Apple’s had to create a waiting list to manage them all.

Using a highly secure password on your phone (think long and completely random) should keep just about everyone at bay — but not someone with backdoor access. You knew there were rumors of a backdoor on the iPhone, right? Still, even if those rumors haven’t been wildly exaggerated, it sounds like there’s a significant waiting period to enlist Apple’s help.

Cnet unearthed court documents revealing that an agent…

View original post 230 more words