0 Members and 1 Guest are viewing this topic.
Available as a free download from the Apple iTunes App Store, Zoho Invoice ties into your (necessary, but free) Zoho online account. From your iPhone, you’re now able to create customer contacts, work estimates, sale items, service items and expenses with just a few clicks. A few more clicks, and the invoice or estimate is automatically synchronized with your account on Zoho’s servers, and you can immediately email a PDF version of what you’ve created to your customer.
Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The application not only logs details about incoming and outgoing phone calls, it also records those calls.
Beware of Juice-JackingYou’re out and about, and your smartphone’s battery is about to die. Maybe you’re at an airport, hotel, or shopping mall. You don’t have the power cable needed to charge the device, but you do have a USB cord that can supply the needed juice. Then you spot an oasis: A free charging kiosk. Do you hesitate before connecting your phone to this unknown device that could be configured to read most of the data on your phone, and perhaps even upload malware?
Web OS to be discontinued http://news.cnet.com/8301-1035_3-20094232-94/webos-goes-down-in-quiet-death/
Printing has remained one kludgey, undeveloped area in the tablet and smartphone space. There are too few apps available to enable printing from phones or tablets, even though they are the fastest-growing segment in the client computing space. But some manufacturers are beginning to bring better printing technology to the table in the mobile world, and Samsung has developed a truly simple-yet-elegant app that marries mobile devices to its lineup of wireless-enabled printers.
The demonstration was done at the Black Hat convention, which is a meeting of computer security professionals that takes places in Las Vegas. According to an article published by SC Magazine, Don Bailey and Matthew Solnik employed a technique they call “war texting,” which allowed them to setup a Global System for Mobile Communications (GSM) network that could intercept the messages being sent between the Subaru Outback test car and the server that controls its software updates and other remotely-transmitted information.
While security products that protect computers have been around for years, mobile security software products have just started to roll out. Less than one out of 20 mobile phone users worldwide have security software installed in them, according to Juniper Research. Companies that provide (security) software for computer threats are now recognizing that mobile apps and mobile technology is increasingly an environment open to risks.
Dropbox is one of the better-known, online storage services – along with Box.net and others – and among the reasons for its popularity is its drop-dead-easy setup and navigation. Begun as a browser-based service on the web, the iPhone app is just as simple.