Mobile accessories is more important than a smartphone itself, few times, specially when you out of data and there is no near WiFi and you need to send some files from you PC to your smartphone, you need a data cable. Reason why I always buy a separate pair of accessories for both my car and my home use.
Sunday, 2 April 2023
Mobile accessories is more important than a smartphone itself, few times, specially when you out of data and there is no near WiFi and you need to send some files from you PC to your smartphone, you need a data cable. Reason why I always buy a separate pair of accessories for both my car and my home use.
Tuesday, 26 June 2012
HTC Explorer: A low budget Android Smartphone, Running on Android 2.3.5 Gingerbread, having HTC Sense 3.5 and 3.2inch HVGA resolution Touch-Screen.

There is an option to move apps to SD Card, but apps like Facebook and Twitter causing a big trouble as they do not have a move to SD Card option and they are very big on memory also.
Performance-wise the HTC Explorer is superb, with 600MHz of processor it gives a much high-end output every time. But the problem is to choose apps, which will gently fits in HTC Explorer�s limited memory, to resist its low memory notification.
These three social networking apps will not effect too much on HTC Explorer�s memory as they can be easily move to SD Card to wipe up some additional internal storage.
1. Instagram

2. Flipboard

3. Plume for Twitter

To read more topics about HTC Explorer device, like our official page on Facebook.
copyright � 2012 www.pcinbox.com
Saturday, 2 June 2012
Google 2-steps verification gives you a total security on all Google apps & services like Gmail, YouTube, Google Play Store and many other services, by sending you a six digits verification code on your phone or on Google Authenticator app - available for Android, Apple and BlackBerry. This six digit code should be input whenever you log-in to your Google account for verification after you turned on the 2-steps verification.
Besides that, if you are going to log-in and you can�t receive a verification code or you don�t have any device � Google Authenticator app installed on: Google alternatively gives you 10 more backup verification codes � you can put them in your wallet or save them to a file on your computer. You can use them when you have no mobile coverage.
After turning on the 2-steps verification - you can use both ways either text messaging or Google Authenticator app to get a six digit verification code for logging into Google services.
Lets how to turn on the Google 2-steps verification on step by step:-
1. You must have a Google account � already verified by a text message or by a voice call with your cell phone or a landline number.
2. Go to www.google.com and Sign-in with your current Email address and Password.
3. After log-in to your Google account, on the upper right corner � click on your profile picture, and click Account, here you can see all your Account information on the that page.
4. Inside �Security� tab (showing on left side-bar) you will find �2-steps verification� text with an Edit button on the right side (as shown in the picture below) click on Edit. You will prompt for Password again, just type your Password and Sign-in again. Its only for verification this time.
5. Now here is the Setup starts. Click on Start Setup to go to next step.
6. The next step is to input your phone number you want to connect with Google services, and choose an option how you want to get a verification code for the next step (Step 7), and click Send Code (the Send Code button is not shown in this picture, but you can find it down the page).
7. A text message will be sent from Google to your cell or landline number (you entered in the Step 6) including a six digit verification code. Enter that verification code in the box (as shown below) and click Verify (as the Verify button not shown in the picture again, same like in Step 6).
8. On this step Google will ask you if you trust this computer? Trusted computers only asked for verification code once every 30 days. So if this is your single and Personal Computer, you can remain with ticked-mark on this option and click Next, incase this is not your Personal Computer, or you cannot trust on this computer, click in the check box to remove the tick-mark, an option will pop-pup for verification again, and select the option I don�t trust this computer and than click Confirm. All done you have successfully turned on the 2-steps verification for Google services, and from now every time you enter a password to log-in to any Google service, you will get a verification code on your phone number via text message.
In the next step (Step 9), see how to access your Google Account with Google Authenticator app.
9. All the previous steps were about to how to enable 2-steps verification on Google services? In this step we will show you how to download Google Authenticator app on your Android, Apple or BlackBerry device, and how to use it with Google 2-steps verification?
First of all download any barcode read for your device. Now download Google Authenticator app for your device from the links given below and install it on your device:
Google Authenticator for Android version 2.1 or later | Google Authenticator for Apple iPhone iOS 3.1.3 or later | **Google Authenticator for BlackBerry OS 4.5 - 6.0 |
**The Google Authenticator for BlackBerry Download link was not found the time we were publishing this article.
After installing the Google Authenticator app for your device, and completing the 2-steps verification process, its time to use Google Authenticator for log-in to Google account.
For Android Users Only:
10. The further steps are the same for all three platforms Android, iOS and BlackBerry. The only difference in-between is use of Google Authenticator app on your device. We will focus on Android app at the moment.
After completing the Step-8 you will referred to this page shown below. Here at the top you will see your phone number with a green tick mark on the left side, which means your phone number is successfully connected with Google services for 2-step verification.
To connect your account with Google Authenticator app � open the app on your device, and tap on Add Account. You will find two option to add an account to Google Authenticator, �Scan Barcode� and �Add account manually�, select �Scan Barcode� and the Barcode scanner app will starts. (we have tested ZXING TEAM Barcode Scanner for Android device).
To �manage application-specific passwords�, see the video clip below:
11. Now on your computer, click on Android (as shown in the image below), it will open another page includes a Barcode. Scan the barcode with your barcode scanner (which was turned on in previous step) and you will find your account in Google Authenticator app on your device, and a 6 digit verification code will appear on your device, put that code in that page down below (as shown in the image below), and click Verify.
Its all done and you successfully connect your Google Authenticator app with your Google account. I personally recommend that way to use Google more securely and personally.
This verification code is changing every 30 seconds on Google Authenticator app, which makes your Google account more and more secure. The amazing feature about Google Authenticator app is that its not required any internet connection to update the verification code online, and it totally works in offline mode. You can add more than one account in a single Google Authenticator app.
Share this article if you find it helpful for you. For any questions or feedback please feel free to write a comment below.
Thanks.
The PC Supporter Team.
Saturday, 26 May 2012
Stonking performance, a stunning screen and one of HTC�s best designs make this a new smartphone king.
PC Pro [Jul 2012]
Few of HTC�s offerings have threatened the smartphone industry�s top table of late, with its somewhat bland offerings largely overtaken by fancier phones from Samsung and Apple. But HTC�s latest flagship handset, the One X, looks set to take back lost ground.
It isn�t a phone we�d ever accuse of playing safe. The white rear, with its protruding silver camera lens, looks and feels superb, and we can�t fault HTC for build quality either. The One X is sturdy despite its 8.9mm-thick, 130g frame, and while there have been reports of the screen flexing when gripped tightly, that�s very fine indeed. The solid build can be put down to the construction, the One X is milled from a single block of polycarbonate, just like the Nokia Lumia 800.
It�s that screen that steals the show. It�s a 4.7in IPS panel with a resolution of 720 x 1280, that gives a pixel density of 312ppi not for behind the iPhone�s 330ppi and makes for consistently stunning experience. There�s plenty of space for full sized web pages, and text is pin sharp.
It isn�t only the increase in resolution; the quality is great, too. Its 490cd/m2 maximum brightness can�t math the iPhone�s 581cd/m2, but it�s far ahead of the Samsung Galaxy S II�s 300cd/m2, and it�s matched with a contrast ratio of 1138, lending images a real solidity and depth.
Processing power comes from Nvidia�s 1.5GHz quad-core Tegra 3 chip, partnered with 1GB of RAM. Is has 32GB of storage, of which 26GB can be used for data and apps, but there�s no microSD card slot to add more. For communications you get the choice of 3G, 802.11n WiFi and Bluetooth 4, and it has NFC.
The specification makes the One X the most powerful smartphone we�ve tested. Its Quadrant benchmark score of 4927 streaks ahead of the 3460 scored by the Galaxy S II, and it completed the SunSpider benchmark in 2071ms. that�s a third quicker than the Samsung, and just ahead of the iPhone 4S.
No game stretched the HTC�s GPU. High octane shooter Shadowgun ran flawlessly, 3D adventure title Dungeon Defenders was similarly slick, and Reckless Racing 2 also delivered rock solid frame rates. A word of warning, though: while things were fine away from the mains, running these games while charging saw the handset grow unbearably hot. That aside, battery life was decent, with 60% of the 1800mAh power pack left after the 24 hour rundown test. Just don�t expect such longevity when gaming: a 30 minutes sting during a train commute saw the bar fall by almost a third.
The One X comes with Android 4 onboard, partnered with the latest version of HTC�s Sense UI. HTC has ditched the curved graphics at the bottom of each homescreen, replacing them with square icons, but it looks and functions as well as ever, with the usual line up of handy widgets.
HTC doesn�t bundle Beats branded headphones with this device, but the Beats audio kit inside the One X serves up bass heavy, a good quality sound.
It isn�t all good news, though. The Notification drawer has vanished, and virtually every app has a separate menu button that takes up a 96 pixel chunk across the bottom of the screen.
These are small complaints, however, with the 8 megapixel camera more than making amends. Quality is excellent, with sharp detail and accurate colors, and a flash is included. Shots are taken almost instantly, and there are panorama and burst modes too; the latter takes up to 99 shots as quickly as possible, and even picks the �best� one out for you. The camera also shoots 1080p video and, again, quality is excellent, autofocus is quick to lock on, and detail is extremely sharp.
It�s a fine all round package, then, but it�s impossible to ignore the shadow of Samsung�s impending Galaxy S III, It�s also said to have a 4.7in, 720 x 1280 screen, a 1.5GHz quad-core processor and Ice Cream Sandwich. If past standards are any indication, it may be the phone to beat.
For now, though, no other phone can match the HTC One X. It offers stupendous speed, a stunning screen, and a strong, attractive design, all of which combine to make it the best smartphone on the block. After something of a barren patch it�s good to see HTC back.
Monday, 9 April 2012
PC Tech & Authority Magazine
Mobile World Congress was held in Barcelona this year from 27th February to 1st March 2012.
Sony Xperia U
Mobile World congress was all about big screens and even bigger handsets this year, which makes the compact 3.5in Sony Xperia U a breath of fresh air. Equipped with Sony�s xLoud volume enhancement engine, 3d surround sound and the ability to wirelessly stream music to DLNA equipped speakers, the Xperia U is aimed squarely at tiny-handed musos. It�s powered by a 1GHx dual-core processor and will run on Gingerbread at launch. An Android 4.0 upgrade is expected in the second half of 2012. It�s finished with a transparent Xperia stripe which changes color to match the photo you�re viewing.
Samsung Galaxy Beam
There was no shortage of eccentric phones at this year�s Mobile World Congress 2012. (Nokia 41-megapixel PureView with Symbian Belle OS, anyone?) Falling into this quirky category is the Samsung Galaxy Beam, an Android 2.3 smartphone with an inbuilt projector. The Galaxy Beam comes with its own 15 lumens projector which allows you to �beam� your phone�s media onto a nearby flat surface. It sounds like a gimmick (and it is) but the ability to project 50-inch movies has us intrigued nonetheless.
HTC One X
A biggest standout of the year 2012 at Mobile World Congress, the HTC One X highlights include a 1.5GHz Tegra 3 quad-core processor, 4.7-in Gorilla Glass display, 1GB RAM and a robust 32GB of inbuilt storage running on Android 4.0. The OS has also been given an extra spit-and-polish courtesy of HTC�s Sense UI. Measuring 9.3mm at its thickest point and finished in durable polycarbonate, it looks as premium as you�d expect.
Asus Padfone
Asus has evolved its Transformer concept into the Padfone, an intriguing phone/tablet/netbook hybrid that attempts to combine three devices in one. The smartphone which powers the rest of the devices, comes with a 4.3-in Super AMOLED display and 1.5GHz Snapdragon CPU running on Android 4.0. With its UX laptop styling.
Huawei Ascend D Quad
Chinese manufacturer Huawei has exploded out of the budget mobile space with a suite of high-end offerings. The Huawei Ascend D quad is its new flagship with a 4.2-in Android 4.2 Ice Cream Sandwich smartphone equipped with a quad-core 1.5GHz processor, 5.1 Dolby surround sound, an 8MP camera and Full HD video recording. The Ascend D quad eschews Tegra 3 silicon in favour of a custom-built K3V2 quad-core chip for a purported 30% energy saving. An XL version is also in the pipeline, which adds a beefier 2500mAh battery.
Tuesday, 28 February 2012
Have you ever wanted to transfer files between your Android phone or other mobile device and your computer without the hassle of cables? Consider Software Data Cable (for Android) a free app providing file transfers via Wi-Fi.
The app has downloaded from the Android Market and tested on a Droid 2. Installation was no-fuss and took a scant few seconds.
The app�s main display buttons are Start Service, Stop & Exit, and Settings. While the display does show ads, that�s to be expected in a free app. Once running, my mobile device was assigned an IP address doled out from my wireless network�s DHCP server. The app then tells you to input the address displayed (the IP address assigned to the mobile device) into your computer. Once I put the address into my browser, a page opened up, listing the entire file directory of my Android device. On my Android, I also noticed the app showed the total and available storage capacity of my Droid 2 handy for knowing how much data you can transfer.
I also was able to copy pictures from my phone to my laptop as easily as copying and pasting files between two folders in Windows.
Another great feature of this app is file and folder management on the device. I am not the most skilled at navigating my Droid�s data folders, always afraid it will accidentally delete something important. But Software Data Cable gives you a full graphical representation of all the files on a mobile device and option for copy, cut, and delete, as well as the ability to navigate to a parent directory and create new folders.
Software Data Cable is dead simple, and delivers great file management between a computer and Android device provided both can connect to the same wireless network. It�s an easy pick for a user spending more time on his Windows PC or Laptop while in home or in office because its simplicity and efficiently a great free app.
Thursday, 26 January 2012
You can be more efficient and boost your productivity with the help of some software designed to help you get your job done on a desktop, laptop or mobile (smartphone) device. By Jill Duffy

Today we will make an overview of 4 Top Handy Productive apps for Android and Apple devices.
For Android Devices
Smartr Contacts for Android
Smartr Contacts for Android (free), formerly called Xobni for Android, creates a comprehensive picture of your contacts. Xobni is the company that makes the app, and it has been a relatively big name in contact management. The free app, which requires a Xobni account (also free) gathers your contacts from Gmail or Outlook, and finds additional information about them, including headshots, from Linkdin, Facebook, and Twitter, and meetings or text messages. For keeping up with email from your Android phone, Smartr Contacts can increase your productivity by removing a lot of the legwork that can sometimes be involved in keeping in touch. It orders your connections by how often you communicate, rather than alphabetically. And it handily merges multiple emails, so if you have an outdated email address for someone, but she has uploaded the most recent one to another platform, Smartr can find it.
SugarSync for Android
Android users looking for a way to make their files and photos available from anywhere should definitely check out SugarSync. It�s similar to Dropbox, but you get more space, 5GB, with a free account (Dropbox gives you 2GB). When your files are available to you from everywhere and automatically synchronized, you never waste time trying to sort out which version of what file you put where. Some of SubarSync�s goodies are hard to find, and others are hard to use, but for Android users looking for a more full featured alternative to DropBox, SugarSync is a pretty sweet deal.
For Apple Devices
Keynote (for iPhone)
Apple�s PowerPoint equivalent for iPhone is one of those marvels of software design, allowing you to easily and powerfully create compelling presentations on a device that fits in your pocket. It�s a dream for frequent flyers, especially those who are typically headed to a place where they will have to give a presentation or speech.
iWork for iPad
(how to use guide here)
With Apple�s iWork for iPad suite of office applications, Pages for word processing, Numbers for spreadsheets, and Keybote for presentations, you can do real work on iPad. This tablet version offers only a basic subset of features and functions compared to the high-powered OSX Version of iWork. The iPad�s cramped on-screen keyboard can slow down productivity, so if you�re serious about using the iPad for work, pick the Apple iPad Keyboard Dock ($69 direct), too.
,
Wednesday, 4 January 2012
The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere�
Here are 5 most common questions about smartphones.
How is a Smarphone different from a standard cell phone?
There�s no official definition, but smartphones let you connect to the Internet, manage email, run software (called apps), and often have robust multimedia capabilities to play videos and music and let you take pictures and record video.
What is a �platform,� and why should I care?
A platform is the phone�s operating system (much like Windows is an operating system for PCs) and determines what features the phone has and what apps it runs. Apple�s iOS and Google�s Android are two examples. Because Apple controls both the operating system and production of the phones that use it, upgrading to the latest version of iOS is easy as long as your hardware is fast enough to support it. Android is different because each smartphone manufacturer using it can modify the core operating system and doesn�t always make updates of the latest version available to its customers.
What hardware specifications should I worry about?
The simple answer is to not get hung up on the specs and instead find a phone that does what you need it to do. Does it work with your email? Does it run the programs you want to use? Does it integrate with your existing services such as Netflix? Is it available from a carrier that provides great coverage in your area? Does it have adequate battery life for the type of things you plan to use it for? If the answer to any of those questions is no, it could be the fastest smartphone on the planet and be useless to you.
The said phones, with 1GB of RAM are nice because they can run multiple programs simultaneously more smoothly than can phones with less RAM. Also look for dual-core processors, as they can dramatically boost the speed of apps designed to take advantage of them. Finally, 16GB of memory is plenty for most users who don�t plan to haul enormous music or video libraries around with them, though 32GB or more is better if you plan to use a lot of apps, music, and video.
What�s the difference between 3G and 4G?
There refer to the speed of the cell carrier�s wireless data network. 3G stands for Third Generation standards and 4G for Fourth Generation standards. Each company implements these standards in different ways, so maximum speeds vary. In general, 4G networks let you download data at least 10 times faster than 3G networks do. This is great for nabbing large files or streaming high quality video, although battery life often takes a bit of a hit when 4G is activated.
Some smartphones will let me use the cloud for backup. What does that mean, and should I use that feature?
The cloud refers to storage at a remote site accessible from the Internet instead of locally on your computer. Backing up data to the cloud is convenient because you can access it from anywhere, and most companies employ encryption and backup redundancy to protect your data. If you don�t have an unlimited data plan, set up the cloud backup to only operate when the phone is connected to a Wi-Fi network. Otherwise, you risk blowing through your data plan without doing much of anything with the phone.
Wednesday, 28 December 2011

Best for Apps
Apple iPhone 4s | �499 approx.
Apple is renowned for its huge app store � far bigger than those for Android and Windows � and its latest feature is another iPhone exclusive.
Siri, the voice controlled assistant, can intelligently recognize your spoken requests and source information from the web, working with WiFi and 3G. You can also dictate messages or notes with a simple tap of the microphone button, while future upgrades should enable Siri to locate nearby businesses such as restaurants and more.
Best for Business
BlackBerry Bold 9900 | �420 approx.
A 71mm touchscreen and an easy-to-use Qwerty keyboard make this BlackBerry, powered by a 1.2GHz processor, essential kit for business. Its notifications are configured to keep you on top of your workload and with BlackBerry Desktop Manager software, you can easily restore all your vital contacts from a previous model. It also has a chip for contactless payments � common in the US and growing in the UK � making it perfect for lunchtime meetings on the move.
Best for Adventure
Motorola Defy+ | �244.99 approx.
Now upgraded to be faster and last longer, the Defy+ remains the stand-out choice for any adventurer. It can survive being immersed 3ft (91cm) in water and its Corning Gorilla Glass is scratch and dust-proof. To further support your outdoor experience it comes with a preloaded Cardio Trainer app to monitor your progress, and with Motorola Media Link you can stream workout playlists from your desktops at home or work to enjoy wherever your travels take you.
Best for Music
HTC Sensation XE | �465.95 approx.
HTC has collaborated with Beats Audio to set the standard in mobile phone sound quality. The Sensation XE comes with bespoke earphones, which, when plugged in, tailor the phone�s EQ settings to the optimum sound profile for the music that�s playing. The result is a deeper bass and sharper vocals. The noise-cancelling microphones also improve cal quality and a 32GB microSD card adds to the phone�s 4GB of storage for your music collection.
Best for Camera
Samsung Galaxy SII | �409.99 approx
With its vast 109mm touchscreen and lightning fast dual-core 1.2GHz processor, this handset gets the best out of its camera without compromising the rest of its impressive features.
It has full HD video-recording capability and an 8-Megapixel camera with LED flash, assisted by a touch-to-focus function and multiple scene modes. It even has Flash-supported web browsing, so you can watch your clips on YouTube. It�s available free on a Vodafone contract.
Friday, 16 December 2011
The future of Malware | News from �PCadvisor.com�
Security breaches look set to bet worse as hacker groups target smartphones and social media and release more information online. Jeff Vance reports.
Personal information leaked online is becoming an all too common occurrence. For example, Sony suffered a massive breach of its PlayStation Network earlier this year that led to the theft of names, addresses and possibly credit-card data belonging to 77 million users.
If you think the situation is bad now, just wait. Things will get worse as more information is dumped online by mischievous hacker groups such as Anonymous, and cybercriminals begin to target smartphones and social media.
In August, AntiSec (a collaboration between Anonymous and the disbanded LulzSec group) released more than 10GB of information from 70 US law-enforcement agencies. According to Todd Feinman, CEO of DLP vendor Identity Finder, AntiSec wasn�t motivated by money.
�AntiSec doesn�t like how various law-enforcement agencies operate and it�s trying to embarrass and discredit them,� he said.
But, he added, what it doesn�t realize is that when it publishers sensitive persona information, it�s helping low-skilled cybercriminals commit identity theft. Every week, another government department or business has its records breached � some 250,000 to 500,000 each year, estimated Feinman. Few details from those breaches are published online for all to see, however.
While certain high-profile attacks, such as the one on Sony, are intended to embarrass and spark change, the US law-enforcement breach could represent a shift in hacker thinking. AntiSec�s motivations appear to have a key difference, with the attackers consciously considering collateral damage as a strategic weapon. According to Feinman, AntiSec wrote online; �We don�t care about collateral damage. It will happen, and so be it.�
Social Networking
Experts say the future of malware is more about how potential victims will be targeted than how it will be engineered. Collateral damage won�t be limited to innocents compromised through no fault of their own.
Have you ever accepted a friend request on Facebook or connected to someone on Linkedin you don�t know? Perhaps you thought it was someone from school you�d forgotten about, or a former colleague whose name had slipped your mind. Not wanting to seem rude, you accepted them as a friend and quickly forgot about it. �When people make trust decisions with social networks, they don�t always understand the ramifications. Today, you are far more knowable by someone who doesn�t know you than ever,� said Kr Hugh Thompson, program chair of RSA Conferences.
We all know people who discuss everything they do on a social network or blog, from eating their breakfast to clipping their toenails. While most of us consider these people a nuisance and may hide their status updates, cybercriminals love them.
�Password-reset questions are easy to guess, and tolls such as Ancystry.com, while not created for this purpose, provided hackers with useful information,� said Thompson.
There are a few areas he believes the IT security industry needs to concentrate on: security for social media, ways to manage the information shared about you, and better methods for measuring evolving risks.
Enterprise Targets

Larsen outlined a recent attack attempt where hackers targeted executives of a major corporation through their spouses.
The chances were at least one of the businessmen would have a poorly secured home PC that he shared with his non-tech-savvy wife. This would provide the backdoor needed to gain access to the company.
�Whaling is definitely on the rise,� said Paul Wood, senior intelligence analyst for Symantec.cloud. �Just a couple years ago, we saw one or two of these sorts of attacks per day. Today, we catch as many as 80.�
According to Wood, social engineering is by far the most potent weapon in the cybercriminal�s toolbox (automated, widely available malware and hacking toolkits are number two). Combine that with the fact that many senior executives circumvent IT security because they want the latest and trendiest devices, and cybercriminals have many valuable, easy-to-hit targets in their sights.
�Attacks on small businesses are increasingly dramatic because they are usually the weakest link in a larger supply chain,� said Wood.
There�s no sure way to defend against this. Until companies start scrutinizing the cyber-security of their partners and suppliers, they can�t say with any certainty whether or not they themselves are secure. While it�s common for large firms to keep a close eye on their suppliers, with factory visits that result in the implementation of an array of �best practices�, companies aren�t doing this when it comes to cyber-security.
Smartphone Threats

Larsen believes that platform-agnostic, web-based worms represent the new frontier of malware. Platform-agnostic malware lets legitimate developers do same of the heavy lifting for malware writers. As developers re-engineer sites and apps to work on a variety of devices, hackers can then target the HTML, XML, Jpegs and so on that render on any device anywhere.
Mobile phones are serving as a second identity factor for all sorts of corporate authentication schemes. Businesses that used to rely on hard tokens, such as RSA SSecureID, are moving to soft tokens, which can reside on mobile phones roaming beyond the corporation as easily as on PCs ensconced within corporate walls.
�Two-factor authentication originally emerged because people couldn�t trust computers. Using mobile phones as an identity factor defeats two-factor authentication,� said Marc Maiffret, CTO of eEye Digital Security.
Today, Android is the big smartphone target, but don�t be surprised if attackers soon turn their attention to the iPhone � especially if third-party antivirus programs become more or less standard on Android devices. iPhone demographics are appealing to attackers, and security experts will tell you that Apple products are notoriously insecure.
Apple is reluctant to provide third-party security entities with the kind of platform access they need to improve the security of iPhones, iPads, MacBook Airs and so on. �Apple is very much on its own with security,� said Maiffret. �It almost mirrors late-90s Microsoft, and it�ll probably take a major incident or two to incite change.�
If we�ve learned anything about security in the past 20 years, it�s that another major incident is always looming just over the horizon. With the number of IP-connected devices climbing to anywhere from 50 billion to a Trillian in the next five to 10 years, tomorrow�s hackers could target anything from home alarms and air traffic-control systems to flood control in dams.
Related articles
- Know Your Browser's Security
- AntiSec hackers target Vanguard Defense exec
- AntiSec says it's behind police website attacks
Wednesday, 23 November 2011
If you are a long-time Android user,
Some of these apps will look familiar, although in a few cases, the best apps in a certain class aren�t necessarily the ones that have been most popular for a stretch of time. New comers are supplanting some tried and true favorites.
As Android apps grow, so will our list, so stay tuned for updates to the Blog. http://software-review2010.blogspot.com
Dolphin Browser HD | Download Now

Google Maps | Download Now

Wikidroid for Wikipedia | Download Now

LastPass Password Manager Premium | Download Now

Wheres My Droid | Download Now

Dropbox for Android | Download Now

Astrid Task [Todo List] | Download Now
![Astrid Task [Todo List] - PC Supporter Astrid Task [Todo List] - PC Supporter](http://lh4.ggpht.com/-vMo6QRZBnOY/Ts0ejY8V9EI/AAAAAAAABx8/XR1ar4tVezw/Astrid%252520Task%252520%25255BTodo%252520List%25255D%252520-%252520PC%252520Supporter_thumb%25255B2%25255D.jpg?imgmax=800)
Yelp for Android | Download Now

Facebook for Android | Download Now

Twitter for Android | Download Now

ooVoo Video Calls | Download Now

IMO Instant Messenger | Download Now

Movies App for Android from Flixter | Download Now

Angry Birds for Android | Download Now

Words with Friends Free | Download Now

Kindle for Android | Download Now

NOOK for Android by B&N | Download Now

Pandora Internet Radio for Android | Download Now

FxCamera App for Android | Download Now

ESPN Score Center for Android | Download Now

App�s reviewed by PC Mag � 2011
Selection and Published by PC Supporter � 2011