Apple Offering 32-Inch 4K Sharp Displays in European Online Apple Stores

In its European Apple Online Stores, Apple has begun offering a 32-inch Sharp “4K” Ultra HD LED monitor. Retailing for £3,499.00 or approximately $5,700, the monitor has been available in the U.K. and other European countries since on or before November 30. 

The 32-inch IGZO display, which has a resolution of 3840 x 2160, is not available in the United States and it is not clear why Apple has decided to offer it solely in Europe for the time being...

Read the full story here... Source: Mac Rumours

Galaxy S3 Android 4.3 update resumes for international version

While Google is already releasing a major update for KitKat, Samsung is still busy bringing the latest version of Jelly Bean to some of its devices.

Specifically, Samsung has apparently resumed the Android 4.3 update for the international Galaxy S3 version (model number GT-I9300) after having stopped it in various markets not to long ago.

Galaxy S3 owners that installed the previous Android 4.3 version noticed several performance as well as battery issues with the handset following the update, complaining about it directly to Samsung, most notably on the company’s Facebook page in the UK...

Read the full story here... Source: Android Authority

T&T Launching New 'Mobile Share Value Plans' with Monthly Discount, 18-Month 'AT&T Next' Option

AT&T has announced that it will be introducing new “Mobile Share Value Plans“ on December 8, which includes an option for no annual contracts that brings a $15 monthly discount to shared data customers that meet one of four requirements. The requirements include getting a smartphone for no down payment with the "AT&T Next" early upgrade program, bringing a separate off-contract device, purchasing a smartphone at full retail price, or switching to a new plan after a phone is no longer under contract...

Read the full story here... Source: Mac Rumours

Some Users Unable to Log In to App Store Due to 'FATAL' Error

Some iTunes and App Store users are currently unable to log into their accounts using their Apple IDs, receiving a the following error when attempting to sign in: "FATAL::Unable to process your request. Please try again." 

The problem, which seems to have originated last night, is ongoing according to a thread on Apple's online Support Communities and multiple users on MacRumors' forums. The error occurs on both mobile devices and Macs and according to user reports, it is affecting the App Store, the Mac App Store, the iTunes Store, and the iBookstore...

Read the full story here... Source: Mac Rumours


GTI + Underworld -- Play the Road Official Video

Volkswagen Golf GTI + Underworld have collaborated on a project that synchronises driving and music in real time. Play the road generates music via a phone app that's connected to the GTI's onboard computer, reading the driver's location and movements to compose music live.



Subscribe to the Volkswagen UK channel:http://www.youtube.com/user/UKVolkswagen

Take an Odyssey through console gaming history

New online game celebrates the new console generation with a trip down memory lane

To celebrate the release of the next generation of consoles, tech brand Ebuyer has released Odyssey, a game that takes the player through the history of gaming.

Odyssey tells the story of a young protagonist who is offered the chance to playtest a virtual reality headset, but when a glitch causes the computer's AI to degenerate into primitive fragments it's up to the Player to collect pieces of its memory in the form of past games consoles.

The run-and-jump platformer features seven unlockable levels, each corresponding to a console generation, going from simple Atari aesthetics all the way to the lush hand-painted graphics of seventh generation games. Throughout the game the player will collect consoles, which will be added to an inventory where you can learn more about each one.

Odyssey features a total of 102 consoles to collect - including many you may not be familiar with, like the Action Max and Sega Pico - as well as all your favourites such as the NES, PlayStation and Xbox.

Stuart Carlisle, Managing Director from Ebuyer commented: "We're all gamers at heart and we all remember the amazing consoles from our childhood. At the same time, we're excited about the innovative new Xbox One and PS4, so we wanted to create something special to celebrate everything we love about console gaming. We want players to be able to have fun with Odyssey and at the same time learn more about the history of gaming."

"We've been having a lot of fun playing it around the office, and I have to say that we've got quite good at it. We're looking forward to seeing whether players around the world can match up to our skills and collect every console."

Play Odyssey here: http://www.ebuyer.com/odyssey

Moto X Cyber Monday deal on hold as MotoMaker website goes down

One of the most interesting Cyber Monday deals out there was the $349 off-contract Moto X offer announced by Motorola a few days ago, but interested customers were not able to complete their purchases as the company’s MotoMaker website caved under traffic pressure...

Read the full story here... Source: Android Authority 

Android Cyber Monday 2013 deals roundup

Today is Cyber Monday, the day when Americans return to their jobs after a few days of family time, overeating, football, and, of course, deals-fueled shopping.

And what better way to get back into working shape than with some more deals? That’s the gist of Cyber Monday, and we’re here to fuel your gadget deals addiction with some handpicked Android deals. We have tablets, smartphones, and apps...

Read the full story here... Source: Android Authority

24-Inch 4K Display from Dell Priced at $1399, 28-Inch 4K Model Coming at Under $1000

Following the initial revelation of some details on a new 24-inch 3840 x 2160 "4K" Ultra HD display from Dell yesterday, the company has now officially announced that the display launches today in the Americas with a $1399 price tag. A 32-inch model at the same resolution is also available for $3499, while Dell will be introducing a 28-inch 4K display in early 2014 with breakthrough pricing of under $1000...

Read the full story here... Source: Mac Rumours

Tips to Reduce Email Spam

Spam has now become synonymous with e-mail, as it once was with the tinned foodstuff. If you have an email account, chances are that you’ve got a spam problem. These days, spam filters in email inboxes are far more sophisticated than they used to be. For instance, if you already had an email address back in say, 2001, you’ll have noticed the change in the amount of unwanted emails in your inbox.

However, as you also may have noticed, there are more and more ways spammers have found to bypass your email security, getting their junk into your inbox. With the swift evolution of the internet over the last five years, it’s important to know how you can keep your inbox safe from the pernicious ways of spammers.

Don’t post your email address on your website

This is a critical error that, surprisingly, a lot of web users still make. You should never post your email address or give it out freely online unless you’re sure that the site you are submitting it to is totally secure. Spammers utilise software that scans the internet for wayward email addresses that are hovering around freely.

If you own a website and you want to have your e-mail address on it, it’s best to use a form that visitors can fill out and email you instead. Never reveal your email address to the sender. Alternatively, you could post a graphic of your email address, so it cannot be scanned and ‘read’ by spam software.

Don’t reply to suspicious emails from Gumtree or Craigslist 

Public online classifieds sites like Gumtree and Craigslist are rife with spammers wanting to infiltrate your inbox. These websites try to get around spammers by creating a temporary email address for you when you post an ad, which then forwards any replies you get to your actual email address.

Unfortunately, spammers collect these temporary email addresses that are created for you and mail them, hoping to get a reply. The idea is that you’ll open the email, thinking it’s from someone answering your ad. The moment you reply to them, they’ll have your real email address.

Be safe when you use the internet

Being wary of spammers getting hold of your email address is one thing, but unfortunately, their methods evolve with extreme frequency. They design viruses that infect your computer with the sole purpose of collecting your email address, or even use your email address to send out spam without your knowledge. They can even collect the email addresses that are stored in your contact list.

To protect yourself, you should run virus checks regularly - every day if necessary. Make sure you have a firewall set up, too. Alternatively you can look to an email cloud security provider  that can accomplish all security tasks for you, like Mimecast.

Fighting spam successfully often requires a degree of instinct which you will build up over time once you start becoming accustomed to the various schemes employed by spammers. Armed with instinct as well as anti-virus software and sophisticated spam filters, you won’t have to worry about falling victim to their plans.

Vulnerability Scanning: How it Works

Vulnerability scanning protects your networks and applications from outside attack and should be a major cornerstone in the online security protection of any organisation. IT security is not an issue that you can afford to take lightly, but with the right precautions in place you can ensure that any risk is effectively minimised.

How it works

Vulnerability scanning techniques vary from company to company, but the basic principles are the same: a scan depth and schedule appropriate to the networks and software involved is worked out and then set to run automatically at designated intervals — click here for a more detailed breakdown of how the process works.

There are typically four different elements involved: the scanning itself, the analysis of the contents of the scan, appropriate alerts and then detailed reports. Again, the alerts and reports can be customised as required, to suit the needs of the business. Low-risk threats may not set off an alert at all, for example, but will be mentioned in any reports.

Benefits

By taking a pro-active approach to threats from the web, vulnerability-scanning software is able to significantly reduce the risk of internal and external breaches of a network. Any unauthorised access can be spotted and dealt with at the earliest opportunity. Penetration testing alone is not enough.

Getting a dedicated provider on board to take care of vulnerability scanning services means that your costs can be substantially reduced, both in terms of money spent on IT monitoring and the time and effort required keeping watch for vulnerabilities manually. What's more, a regular scanning schedule means that infrastructure changes are also flagged up and reported at the earliest possible opportunity.

The reports generated by your scanning software package of choice can be invaluable in identifying potential problems and weaknesses in your existing applications. As time goes on, you can use them to build up a comprehensive picture of your own systems and networks, which means that you're better prepared for any attack from outside.

Peace of mind

With the correct, validated vulnerability scanning procedures in place, you can enjoy the peace of mind that comes from knowing that your systems have been secured against outside threats. Once the initial assessment has been carried out, the scanning tools themselves run automatically and require very little in the way of maintenance or fine-tuning.

The nature of the threats arriving from the Web is changing all the time and so it's important to install a vulnerability scanning system that can change and adapt too. By finding a security provider who understands your network and its applications, you can get a bespoke solution designed to fit your protection needs exactly. 

Vulnerability scanning deals with a very real and present danger, but as long as you have a competent and reliable security solution in place, it's not a threat that should keep you awake at night. When choosing a provider, look for one that combines both top-of-the-range software solutions with expert human engineers who can be on hand to deal quickly with any issues that may arise.