T&T Launching New 'Mobile Share Value Plans' with Monthly Discount, 18-Month 'AT&T Next' Option

AT&T has announced that it will be introducing new “Mobile Share Value Plans“ on December 8, which includes an option for no annual contracts that brings a $15 monthly discount to shared data customers that meet one of four requirements. The requirements include getting a smartphone for no down payment with the "AT&T Next" early upgrade program, bringing a separate off-contract device, purchasing a smartphone at full retail price, or switching to a new plan after a phone is no longer under contract...

Read the full story here... Source: Mac Rumours

Some Users Unable to Log In to App Store Due to 'FATAL' Error

Some iTunes and App Store users are currently unable to log into their accounts using their Apple IDs, receiving a the following error when attempting to sign in: "FATAL::Unable to process your request. Please try again." 

The problem, which seems to have originated last night, is ongoing according to a thread on Apple's online Support Communities and multiple users on MacRumors' forums. The error occurs on both mobile devices and Macs and according to user reports, it is affecting the App Store, the Mac App Store, the iTunes Store, and the iBookstore...

Read the full story here... Source: Mac Rumours


GTI + Underworld -- Play the Road Official Video

Volkswagen Golf GTI + Underworld have collaborated on a project that synchronises driving and music in real time. Play the road generates music via a phone app that's connected to the GTI's onboard computer, reading the driver's location and movements to compose music live.



Subscribe to the Volkswagen UK channel:http://www.youtube.com/user/UKVolkswagen

Take an Odyssey through console gaming history

New online game celebrates the new console generation with a trip down memory lane

To celebrate the release of the next generation of consoles, tech brand Ebuyer has released Odyssey, a game that takes the player through the history of gaming.

Odyssey tells the story of a young protagonist who is offered the chance to playtest a virtual reality headset, but when a glitch causes the computer's AI to degenerate into primitive fragments it's up to the Player to collect pieces of its memory in the form of past games consoles.

The run-and-jump platformer features seven unlockable levels, each corresponding to a console generation, going from simple Atari aesthetics all the way to the lush hand-painted graphics of seventh generation games. Throughout the game the player will collect consoles, which will be added to an inventory where you can learn more about each one.

Odyssey features a total of 102 consoles to collect - including many you may not be familiar with, like the Action Max and Sega Pico - as well as all your favourites such as the NES, PlayStation and Xbox.

Stuart Carlisle, Managing Director from Ebuyer commented: "We're all gamers at heart and we all remember the amazing consoles from our childhood. At the same time, we're excited about the innovative new Xbox One and PS4, so we wanted to create something special to celebrate everything we love about console gaming. We want players to be able to have fun with Odyssey and at the same time learn more about the history of gaming."

"We've been having a lot of fun playing it around the office, and I have to say that we've got quite good at it. We're looking forward to seeing whether players around the world can match up to our skills and collect every console."

Play Odyssey here: http://www.ebuyer.com/odyssey

Moto X Cyber Monday deal on hold as MotoMaker website goes down

One of the most interesting Cyber Monday deals out there was the $349 off-contract Moto X offer announced by Motorola a few days ago, but interested customers were not able to complete their purchases as the company’s MotoMaker website caved under traffic pressure...

Read the full story here... Source: Android Authority 

Android Cyber Monday 2013 deals roundup

Today is Cyber Monday, the day when Americans return to their jobs after a few days of family time, overeating, football, and, of course, deals-fueled shopping.

And what better way to get back into working shape than with some more deals? That’s the gist of Cyber Monday, and we’re here to fuel your gadget deals addiction with some handpicked Android deals. We have tablets, smartphones, and apps...

Read the full story here... Source: Android Authority

24-Inch 4K Display from Dell Priced at $1399, 28-Inch 4K Model Coming at Under $1000

Following the initial revelation of some details on a new 24-inch 3840 x 2160 "4K" Ultra HD display from Dell yesterday, the company has now officially announced that the display launches today in the Americas with a $1399 price tag. A 32-inch model at the same resolution is also available for $3499, while Dell will be introducing a 28-inch 4K display in early 2014 with breakthrough pricing of under $1000...

Read the full story here... Source: Mac Rumours

Tips to Reduce Email Spam

Spam has now become synonymous with e-mail, as it once was with the tinned foodstuff. If you have an email account, chances are that you’ve got a spam problem. These days, spam filters in email inboxes are far more sophisticated than they used to be. For instance, if you already had an email address back in say, 2001, you’ll have noticed the change in the amount of unwanted emails in your inbox.

However, as you also may have noticed, there are more and more ways spammers have found to bypass your email security, getting their junk into your inbox. With the swift evolution of the internet over the last five years, it’s important to know how you can keep your inbox safe from the pernicious ways of spammers.

Don’t post your email address on your website

This is a critical error that, surprisingly, a lot of web users still make. You should never post your email address or give it out freely online unless you’re sure that the site you are submitting it to is totally secure. Spammers utilise software that scans the internet for wayward email addresses that are hovering around freely.

If you own a website and you want to have your e-mail address on it, it’s best to use a form that visitors can fill out and email you instead. Never reveal your email address to the sender. Alternatively, you could post a graphic of your email address, so it cannot be scanned and ‘read’ by spam software.

Don’t reply to suspicious emails from Gumtree or Craigslist 

Public online classifieds sites like Gumtree and Craigslist are rife with spammers wanting to infiltrate your inbox. These websites try to get around spammers by creating a temporary email address for you when you post an ad, which then forwards any replies you get to your actual email address.

Unfortunately, spammers collect these temporary email addresses that are created for you and mail them, hoping to get a reply. The idea is that you’ll open the email, thinking it’s from someone answering your ad. The moment you reply to them, they’ll have your real email address.

Be safe when you use the internet

Being wary of spammers getting hold of your email address is one thing, but unfortunately, their methods evolve with extreme frequency. They design viruses that infect your computer with the sole purpose of collecting your email address, or even use your email address to send out spam without your knowledge. They can even collect the email addresses that are stored in your contact list.

To protect yourself, you should run virus checks regularly - every day if necessary. Make sure you have a firewall set up, too. Alternatively you can look to an email cloud security provider  that can accomplish all security tasks for you, like Mimecast.

Fighting spam successfully often requires a degree of instinct which you will build up over time once you start becoming accustomed to the various schemes employed by spammers. Armed with instinct as well as anti-virus software and sophisticated spam filters, you won’t have to worry about falling victim to their plans.

Vulnerability Scanning: How it Works

Vulnerability scanning protects your networks and applications from outside attack and should be a major cornerstone in the online security protection of any organisation. IT security is not an issue that you can afford to take lightly, but with the right precautions in place you can ensure that any risk is effectively minimised.

How it works

Vulnerability scanning techniques vary from company to company, but the basic principles are the same: a scan depth and schedule appropriate to the networks and software involved is worked out and then set to run automatically at designated intervals — click here for a more detailed breakdown of how the process works.

There are typically four different elements involved: the scanning itself, the analysis of the contents of the scan, appropriate alerts and then detailed reports. Again, the alerts and reports can be customised as required, to suit the needs of the business. Low-risk threats may not set off an alert at all, for example, but will be mentioned in any reports.

Benefits

By taking a pro-active approach to threats from the web, vulnerability-scanning software is able to significantly reduce the risk of internal and external breaches of a network. Any unauthorised access can be spotted and dealt with at the earliest opportunity. Penetration testing alone is not enough.

Getting a dedicated provider on board to take care of vulnerability scanning services means that your costs can be substantially reduced, both in terms of money spent on IT monitoring and the time and effort required keeping watch for vulnerabilities manually. What's more, a regular scanning schedule means that infrastructure changes are also flagged up and reported at the earliest possible opportunity.

The reports generated by your scanning software package of choice can be invaluable in identifying potential problems and weaknesses in your existing applications. As time goes on, you can use them to build up a comprehensive picture of your own systems and networks, which means that you're better prepared for any attack from outside.

Peace of mind

With the correct, validated vulnerability scanning procedures in place, you can enjoy the peace of mind that comes from knowing that your systems have been secured against outside threats. Once the initial assessment has been carried out, the scanning tools themselves run automatically and require very little in the way of maintenance or fine-tuning.

The nature of the threats arriving from the Web is changing all the time and so it's important to install a vulnerability scanning system that can change and adapt too. By finding a security provider who understands your network and its applications, you can get a bespoke solution designed to fit your protection needs exactly. 

Vulnerability scanning deals with a very real and present danger, but as long as you have a competent and reliable security solution in place, it's not a threat that should keep you awake at night. When choosing a provider, look for one that combines both top-of-the-range software solutions with expert human engineers who can be on hand to deal quickly with any issues that may arise.

HTC, Samsung release open source files for Google Play edition phones; KitKat OTAs should follow soon

Ten days ago, HTC announced it delivered the KitKat code for the HTC One Google Play edition, and that it was up to Google to push out the OTA release to users.

Now it appears that the OTA is on its way, as both HTC and Samsung have published the kernel source code and framework support files for the HTC One GPe and Galaxy S4 GPe, respectively. The files contain the open source component of the ROMs for the two devices, that HTC and Samsung have to release to the public, as per their GPL licensing....

Read the full story here... Source: Android Authority

Some Nexus 4 users running into issues after installing KitKat

Last week the Android 4.4 KitKat OTA update finally started rolling out to Nexus 4 users, after a fairly long wait. Now that the update has arrived, it seems that some unfortunate Nexus 4 owners are reportedly experiencing issues including problems with the lockscreen, a broken dialer, a non-working home button, quick setting issues and more.

Not all of these issues are necessarily experienced all at once, with some folks reporting just one issue and others being plagued by several problems. Those that have ran into issues seem to have one thing in common — they used the OTA upgrade to go from Jelly Bean JWR66Y over to KRT16S...

Read the full story here... Source: Android Authority