<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
	<channel>
		<title>PCWorld</title>
		<link>http://www.pcworld.com</link>
		<description></description>
		<language>en-us</language>
		<pubDate>Mon, 22 Dec 2014 10:13:39 -0800</pubDate>
		<lastBuildDate>Mon, 22 Dec 2014 10:13:39 -0800</lastBuildDate>
		
		
		

	
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>ChatOn shutdown highlights Samsung&#039;s software woes</title>
		
		<pubDate>Mon, 22 Dec 2014 10:09:00 -0800</pubDate>
		
		
		
		
		<author>Mikael Ricknäs</author>
		<dc:creator>Mikael Ricknäs</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Samsung Electronics continues to struggle to attract users to its own apps and services, forcing the company to focus on more on collaborating with other companies and stepping up efforts to offer better-looking devices.</p><p>Smartphone manufacturers develop apps and services to attract new buyers and convince old ones to remain faithful. However, with the exception of Apple, this has proven very difficult, even for a company with huge resources like Samsung.</p><p>Last week, Samsung announced it was <a href="http://www.greenbot.com/article/2861733/samsungs-chaton-messaging-service-will-be-turned-off-early-next-year.html">pulling the plug on its ChatOn messaging app</a>. The company also plans to shut down the WatchOn TV guide app in all countries except the U.S. and Korea on Dec. 31. Earlier this year, Samsung also gave up on its Hub line of services, including Books, Music, Video, and Media, which had failed to compete with Web-based offerings from the likes of Amazon, Spotify, and Netflix.</p><p class="jumpTag"><a href="/article/2862296/chaton-closure-highlights-samsungs-app-services-woes.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862296/chaton-closure-highlights-samsungs-app-services-woes.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt4.staticworld.net/images/article/2014/06/galaxys5-100261320-primary.idge-1-100313570-primary.idge.jpg"/>
			<media:content url="http://zapt4.staticworld.net/images/article/2014/06/galaxys5-100261320-primary.idge-1-100313570-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Apps</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Asus teases dual-camera Zenfone in cryptic new video</title>
		
		<pubDate>Mon, 22 Dec 2014 10:00:00 -0800</pubDate>
		
		
		
		
		<author>Derek Walter</author>
		<dc:creator>Derek Walter</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Asus is taking another stab at the American smartphone market, showing off a peculiar video that looks and sounds like a spy film trailer.</p><p>Asus’ Facebook page features a 10-second spot with glimpses of a new Zenfone that has some kind of dual-camera configuration on the back.</p><div id="fb-root"> </div>
<script type="text/javascript">// <![CDATA[
(function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
// ]]></script>
<div class="fb-post" data-href="https://www.facebook.com/video.php?v=820673304642736" data-width="466">
<div class="fb-xfbml-parse-ignore"><a href="https://www.facebook.com/video.php?v=820673304642736">Post</a> by <a href="https://www.facebook.com/ASUS">ASUS</a>.</div>
</div>
<p>Blink and you’ll miss it—it takes some quick reflexes just to pause on a spot where you can pick out any substantial details.</p><p class="jumpTag"><a href="/article/2862126/asus-teases-dual-camera-zenfone-in-cryptic-new-video.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862126/asus-teases-dual-camera-zenfone-in-cryptic-new-video.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt3.staticworld.net/images/article/2014/12/asus-zenfone-100537404-primary.idge.png"/>
			<media:content url="http://zapt3.staticworld.net/images/article/2014/12/asus-zenfone-100537404-primary.idge.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Phones</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Google Chrome considers marking all unencrypted websites as insecure</title>
		
		<pubDate>Mon, 22 Dec 2014 09:43:00 -0800</pubDate>
		
		
		
		
		<author>Gregg Keizer</author>
		<dc:creator>Gregg Keizer</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
Chrome security engineers have proposed that all websites that don’t encrypt traffic be marked as insecure by browsers.</p><p>
The proposal, which was floated earlier this month, would dramatically change the visual signals in a browser’s address bar, which now shows an indicator—a “lock” icon in some cases—when a website is encrypted with SSL (Secure Socket Layer) or TLS (Transport Security Layer), SSL’s replacement. Those sites’ domains are prefaced by <em>https</em> rather than the more common <em>http</em>.</p><p>
Unencrypted sites do not display any special visual sign.</p><p>
“We, the Chrome security team, propose that user agents (UAs) gradually change their UX to display non-secure origins as affirmatively non-secure,” the engineers said in messages spread across several discussion forums, including Google’s own <a href="https://www.chromium.org/Home/chromium-security/marking-http-as-non-secure">Chromimum project</a>. “The goal of this proposal is to more clearly display to users that HTTP provides no data security.”</p><p class="jumpTag"><a href="/article/2862146/google-chrome-considers-marking-all-unencrypted-websites-as-insecure.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862146/google-chrome-considers-marking-all-unencrypted-websites-as-insecure.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt2.staticworld.net/images/article/2014/04/ssl-lock-internet-100263533-medium.jpg"/>
			<media:content url="http://zapt2.staticworld.net/images/article/2014/04/ssl-lock-internet-100263533-medium.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Web &amp; social</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Sony says The Interview will still be released, but not necessarily on Crackle </title>
		
		<pubDate>Mon, 22 Dec 2014 09:29:00 -0800</pubDate>
		
		
		
		
		<author>Jared Newman</author>
		<dc:creator>Jared Newman</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
Sony still plans to release The Interview in some form after hackers pressured the studio and theater owners into dropping the film.</p><p>
The studio has <a href="http://www.wsj.com/articles/sony-aims-to-release-the-interview-but-how-1419206801">told the Wall Street Journal</a> and other news outlets that it's evaluating its options for the over-the-top comedy, which stars James Franco and Seth Rogen as two American journalists tasked with assassinating North Korean leader Kim Jong-un during an interview.</p><p>
Theaters originally planned to screen The Interview starting December 25, but abandoned those plans after Sony suffered a <a href="http://www.pcworld.com/article/2861192/sony-hit-with-second-employee-lawsuit-over-hack.html">devastating hack</a> that <a href="http://www.pcworld.com/article/2861752/fbi-concludes-north-korea-responsible-for-sony-hack.html">may</a> or <a href="http://www.pcworld.com/article/2861952/north-korea-wants-joint-probe-into-sony-hack-warns-of-consequences-if-not.html">may not</a> have involved North Korea. The hackers threatened violence if theaters showed the movie, prompting Sony to <a href="http://www.wsj.com/articles/sony-frees-theaters-to-skip-film-the-interview-amid-threats-1418757015">leave the decision up to theater operators</a>. They immediately caved, and the entire situation drew some scorn from President Barack Obama, who <a href="http://www.businessinsider.com/obama-may-have-just-forced-sony-to-release-the-interview-2014-12">said</a> canceling the release was “a mistake.”</p><p class="jumpTag"><a href="/article/2862027/sony-says-the-interview-will-still-be-released-but-not-necessarily-on-crackle.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862027/sony-says-the-interview-will-still-be-released-but-not-necessarily-on-crackle.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
			<media:content url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Simpler M2M connectivity promised as Sierra Wireless buys Swedish company</title>
		
		<pubDate>Mon, 22 Dec 2014 09:20:09 -0800</pubDate>
		
		
		
		
		<author>Mikael Ricknäs</author>
		<dc:creator>Mikael Ricknäs</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Sierra Wireless has acquired Swedish company Wireless Maingate to build a more complete machine-to-machine communications platform and better connect cars, industrial devices, smart meters and other sensors.</p><p>Together, the two companies will develop a platform that offers connectivity and device management from one user interface. Sierra currently offers a cloud-based application development platform and Maingate supplies wireless services in Europe.</p><p>The M2M, or Internet of things, sector continues to mature with operators and vendors working to offer more complete communications platforms, and Sierra is no different. The company is best known for its modems, but has also developed a device management tool and a platform for easing the development of connected M2M applications.</p><p class="jumpTag"><a href="/article/2862332/simpler-m2m-connectivity-promised-as-sierra-wireless-buys-swedish-company.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862332/simpler-m2m-connectivity-promised-as-sierra-wireless-buys-swedish-company.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Business</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Cybercrime group steals millions from Russian banks, targets US and European retailers</title>
		
		<pubDate>Mon, 22 Dec 2014 08:55:09 -0800</pubDate>
		
		
		
		
		<author>Lucian Constantin</author>
		<dc:creator>Lucian Constantin</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>A sophisticated group of cybercriminals has stolen over US$25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to U.S. and European retailers.</p><p>Researchers from Russian cybercrime investigations firm Group-IB and Dutch security firm Fox-IT have dubbed the cybercriminal group Anunak, after the primary malware program in its toolset.</p><p>Unlike most cybercrime operations where attackers target the customers of financial institutions, the Anunak group targeted the institutions themselves, compromising their internal networks, workstations and servers. This access allowed them to transfer funds to accounts under their control and in some cases even to compromise ATMs, which they then used to withdraw money fraudulently.</p><p class="jumpTag"><a href="/article/2862312/cybercrime-group-steals-millions-from-russian-banks-targets-us-and-european-retailers.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862312/cybercrime-group-steals-millions-from-russian-banks-targets-us-and-european-retailers.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Snapchat cracks down on Windows Phone imitator apps </title>
		
		<pubDate>Mon, 22 Dec 2014 08:17:00 -0800</pubDate>
		
		
		
		
		<author>Ian Paul</author>
		<dc:creator>Ian Paul</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
Snapchat doesn’t offer a Windows Phone app, and the popular messaging platform doesn’t want third parties building Windows Phone apps for its service either. At least for the time being.</p><p>
Over the weekend, a number of imitation Snapchat apps on the Windows Phone Store disappeared—apparently at Snapchat’s request.</p><p>
Unlike many popular online networks, Snapchat doesn’t yet offer a public application programming interface (API) to allow developers to build apps for the service. A third-party Twitter client, for example, uses Twitter’s API to provide your timeline, direct messages, and so on.</p><p>
Lacking a proper API, developers still figured out ways to access Snapchat data unofficially, but that technically violated Snapchat’s terms of service—a situation that Snapchat ignored until recently.</p><p class="jumpTag"><a href="/article/2862088/snapchat-cracks-down-on-windows-phone-imitator-apps.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862088/snapchat-cracks-down-on-windows-phone-imitator-apps.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt0.staticworld.net/images/article/2014/12/snapchatforever-100536862-medium.jpg"/>
			<media:content url="http://zapt0.staticworld.net/images/article/2014/12/snapchatforever-100536862-medium.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Web &amp; social</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Oracle hopes to better target online advertising with Datalogix acquisition</title>
		
		<pubDate>Mon, 22 Dec 2014 08:00:11 -0800</pubDate>
		
		
		
		
		<author>Peter Sayer</author>
		<dc:creator>Peter Sayer</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Half the money spent on advertising is wasted—the question is, which half? That’s the age-old question in adland. Now Oracle is hoping to help its customers answer that question with the acquisition of Datalogix, which collects offline consumer spending data in a bid to help online advertisers pick the right targets.</p><p>Many behavioral advertising targeting systems track only consumers’ online behavior—but, according to Oracle, that accounts for just 7 percent of consumer shopping: the other 93 percent is spent offline, and must be tracked in other ways.</p><p>Datalogix aggregates data from 1,500 partners on the US$2 trillion spent each year by 110 million households, and uses it to help its customers target advertising based on other purchases to improve their sales. Those partners provide it with information on 99 percent of U.S. automobile sales and a 20-year history of vehicle ownership, and it also tracks spending at 50 grocery chains and 1,400 other retailers.</p><p class="jumpTag"><a href="/article/2862292/oracle-hopes-to-better-target-online-advertising-with-datalogix-acquisition.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862292/oracle-hopes-to-better-target-online-advertising-with-datalogix-acquisition.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Web &amp; communication</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Business</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Google+ Photo app helps shaky, washed-out video with Auto Enhance </title>
		
		<pubDate>Mon, 22 Dec 2014 07:51:00 -0800</pubDate>
		
		
		
		
		<author>Jared Newman</author>
		<dc:creator>Jared Newman</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
The Google+ Photos app is giving users one more reason to store their memories in the cloud by extending one-click enhancements to video.</p><p>
With Auto Enhance turned on, Google will automatically scan any uploaded videos, looking for potential improvements to lighting, color and stability. Users can then compare the original and enhanced videos and choose which version to keep.</p><p>
It’s worth noting that Google doesn’t apply the improvements to video automatically, like it does with photos. Instead, users must select which videos to enhance through the Google+ Photos desktop Website.</p><p>
Google’s Tim St. Clair also <a href="https://plus.google.com/+TimStClair/posts/foJQfWaz5Tz">points out</a> that the comparison video will have a much lower resolution than the actual footage. That’s because Google is applying the effects in real time, and presumably uses lower quality to speed up the preview process. Once users decide to enhance a video, Google redoes the improvements at the video’s original quality. (You can see an example <a href="https://www.youtube.com/watch?v=SjDd0rkHAuA">on YouTube</a>: While the quality is low, the enhanced version shows deeper blues and considerably less shake than the original.)</p><p class="jumpTag"><a href="/article/2862256/google-photo-app-helps-shaky-washed-out-video-with-auto-enhance.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862256/google-photo-app-helps-shaky-washed-out-video-with-auto-enhance.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt4.staticworld.net/images/article/2014/12/googlevideoenhance-100537350-primary.idge.jpg"/>
			<media:content url="http://zapt4.staticworld.net/images/article/2014/12/googlevideoenhance-100537350-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>
		
		<title>Use third-party ink at your own risk</title>
		
		<pubDate>Mon, 22 Dec 2014 07:45:00 -0800</pubDate>
		
		
		
		
		<author>Lincoln Spector</author>
		<dc:creator>Lincoln Spector</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p><em>Norm Denard is using non-HP, third-party ink in his HP printer. “My  printing is interrupted by warnings and urging to buy their ink.” Should he switch to the safer but more expensive HP option?</em></p><p>Few items in this world are as pricey as printer ink. You can easily spend $20 or more for a small cartridge of colored liquid, whose chemical content and actual cost are closely guarded secrets.</p><p>There are other options, but they can be scary, as we found when we tried several options in our real-world “<a href="http://www.pcworld.com/article/225096/printer_ink_refills.html">Portrait of a Serial Refiller</a>” series a few years back. </p><p><strong>[Have a tech question? Ask PCWorld Contributing Editor Lincoln Spector. Send your query to </strong><a href="mailto:answer@pcworld.com"><strong>answer@pcworld.com</strong></a><strong>.]</strong></p><p class="jumpTag"><a href="/article/2847404/use-third-party-ink-at-your-own-risk.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2847404/use-third-party-ink-at-your-own-risk.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/02/inkjet-100025874-medium.jpg"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/02/inkjet-100025874-medium.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Printers</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Here&#039;s a wearable for couch potatoes: KipstR pauses or records TV for snoozers</title>
		
		<pubDate>Mon, 22 Dec 2014 07:16:00 -0800</pubDate>
		
		
		
		
		<author>Ian Paul</author>
		<dc:creator>Ian Paul</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
Virgin Media has teamed up with two teenagers to create a wearable that even Homer Simpson would love. Called KipstR, the 3D-printed wristband can tell your DVR to pause or record what you're watching if you happen to fall asleep in front of the TV.</p><p>
To figure out whether you're asleep or in a TV-induced coma, KipstR  ("kip" is british slang for nap) monitors you via a pulse oximeter. If the gadget determines you're asleep, the wearable can mimic a DVR remote to tell it to pause or record whatever you were watching.</p><p>
There's also a resume feature that presumably will switch the program back on if you wake up again. KipstR was designed to work with TiVo DVRs.</p><p class="jumpTag"><a href="/article/2862254/heres-a-wearable-for-couch-potatoes-kipstr-pauses-or-records-tv-for-snoozers.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862254/heres-a-wearable-for-couch-potatoes-kipstr-pauses-or-records-tv-for-snoozers.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt2.staticworld.net/images/article/2014/12/kipstr-100537343-primary.idge.jpg"/>
			<media:content url="http://zapt2.staticworld.net/images/article/2014/12/kipstr-100537343-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Gadgets</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Jawbone and Big Ass Fans harness the Internet of Things to give a better night&#039;s sleep </title>
		
		<pubDate>Mon, 22 Dec 2014 07:00:00 -0800</pubDate>
		
		
		
		
		<author>Chanelle Bessette</author>
		<dc:creator>Chanelle Bessette</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
The appeal of the Internet of Things is more than just being able to control gadgets and home appliances from the cloud. The bigger benefit comes when the devices interact and share information with each other. Today’s joint announcement from Jawbone and Big Ass Fans is a case in point.</p><p>
Jawbone manufactures wearable fitness trackers, and Big Ass Fans builds high-end ceiling fans. Jawbone’s <a href="http://www.techhive.com/article/2064872/jawbone-up24-review-best-fitness-tracker-for-horophiles.html">UP-series</a> fitness trackers have a built-in accelerometer that helps the wearer measure their quality of sleep. You can measure the amount of time you slept as well as how often you tossed and turned.</p><p class="jumpTag"><a href="/article/2861529/jawbone-and-big-ass-fans-harness-the-internet-of-things-to-help-you-get-a-better-nights-sleep.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861529/jawbone-and-big-ass-fans-harness-the-internet-of-things-to-help-you-get-a-better-nights-sleep.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt4.staticworld.net/images/article/2014/12/bigassjawbone2-100537253-medium.png"/>
			<media:content url="http://zapt4.staticworld.net/images/article/2014/12/bigassjawbone2-100537253-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>South Korea nuclear operator runs drill after alleged hacker threat</title>
		
		<pubDate>Mon, 22 Dec 2014 06:20:09 -0800</pubDate>
		
		
		
		
		<author>Yewon Kang</author>
		<dc:creator>Yewon Kang</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>South Korea’s state-run nuclear power plant operator said it started a two-day drill on Monday to prepare for a potential cyberattack, after a series of online document leaks caused increasing security concerns.</p><p>The stolen documents include blueprints of climate control systems, floor plans, software program manuals and personal information of employees. The leaked documents, however, do not have classified information and pose no threat to the safety of the nuclear plants, said Korea Hydro and Nuclear Power Co.</p><p>The leaks, posted online by the self-proclaimed “anti-nuclear reactor group,” included a statement that 100,000 more pages of documents will be posted and a “second round of destruction” will be launched if the government fails to close down three nuclear plants by Christmas.</p><p class="jumpTag"><a href="/article/2862272/south-korea-nuclear-operator-runs-drill-after-alleged-hacker-threat.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862272/south-korea-nuclear-operator-runs-drill-after-alleged-hacker-threat.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Business</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Exploits for dangerous network time protocol vulnerabilities can compromise systems</title>
		
		<pubDate>Mon, 22 Dec 2014 05:10:10 -0800</pubDate>
		
		
		
		
		<author>Lucian Constantin</author>
		<dc:creator>Lucian Constantin</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating systems.</p><p>The flaws, which can be exploited by sending specially crafted packets to machines running a vulnerable version of the NTP daemon (ntpd), pose a greater threat to systems where the service runs under a highly privileged user account such as root.</p><p>However, even if the ntpd user has limited privileges, attackers could leverage other privilege escalation flaws to gain root access after exploiting the NTP flaws.</p><p class="jumpTag"><a href="/article/2862232/exploits-for-dangerous-network-time-protocol-vulnerabilities-can-compromise-systems.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862232/exploits-for-dangerous-network-time-protocol-vulnerabilities-can-compromise-systems.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Windows</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Eliminate travel frustrations with these free Android apps</title>
		
		<pubDate>Mon, 22 Dec 2014 04:00:00 -0800</pubDate>
		
		
		
		
		<author>Andrew Hayward</author>
		<dc:creator>Andrew Hayward</dc:creator>
		
		
		
			
		<description>Whatever your itinerary, these resources can save time, money, and maybe even your sanity.</description>
		
		<link>http://www.greenbot.com/article/2857653/conquer-your-travel-frustrations-with-these-free-android-apps.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt0.staticworld.net/images/article/2014/12/apptravelkit-opener-100534720-primary.idge.jpg"/>
			<media:content url="http://zapt0.staticworld.net/images/article/2014/12/apptravelkit-opener-100534720-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Apps</category>
					
				
				
					
						<category>Travel</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>
		
		<title>Chromebooks rising, SteamOS stalling, Linux&#039;s civil war: The World Beyond Windows&#039; 10 biggest stories of the year</title>
		
		<pubDate>Mon, 22 Dec 2014 03:30:00 -0800</pubDate>
		
		
		
		
		<author>Chris Hoffman</author>
		<dc:creator>Chris Hoffman</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
This wasn’t the pined-for year of the Linux desktop, but 2014 was still huge for the anything-but-Windows PC universe.</p><p>
Chrome OS made massive strides in 2014, and so did more traditional Linux distributions. SteamOS remained in hibernation after a launch delay, but it’s getting ready for a big 2015. Heck, even Microsoft couldn’t resist getting in on the open-source action—or miming many of Linux’s killer features in Windows 10.</p><p>
Let’s get retrospective!</p><h2>SteamOS lags, but Steam Machines move forward</h2>
<p>
Valve’s SteamOS operating system—basically a specialized Linux distribution built around living-room gaming—and the accompanying Steam controller generated a ton of enthusiasm for a 2014 launch. And then, nothing: Both were <a href="http://www.pcworld.com/article/2207340/valve-delays-steam-controller-and-presumably-steam-machines-until-2015.html">delayed until 2015</a>. It feels like a long wait, but hey, gamers have been waiting for <em><a href="http://www.pcworld.com/article/2835538/a-gaggle-of-gabe-newells-begging-for-half-life-3-and-other-must-know-game-news.html"> Half-Life 3</a></em> for more than seven years.</p><p class="jumpTag"><a href="/article/2858332/chromebooks-rising-steamos-stalling-linuxs-civil-war-the-world-beyond-windows-10-biggest-stories-of.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2858332/chromebooks-rising-steamos-stalling-linuxs-civil-war-the-world-beyond-windows-10-biggest-stories-of.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2014/12/linux-android-ubuntu-100535060-primary.idge.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2014/12/linux-android-ubuntu-100535060-primary.idge.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Operating Systems</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>10 must-have Chromecast apps for streaming digital movies, video, and music</title>
		
		<pubDate>Mon, 22 Dec 2014 03:00:00 -0800</pubDate>
		
		
		
		
		<author>Derek Walter</author>
		<dc:creator>Derek Walter</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Google's Chromecast is the perfect gadget to have if you’re looking for the simplest way to stream movies, TV shows, YouTube (and other web videos), and music from your mobile device to a TV. Just plug the Chromecast into one of your TV's HDMI inputs, download the official app, and start streaming.</p><p>Whether you're new to the Chromecast party, or the device is a permanent part of how you watch content, you should have this collection of apps in your library. You can find even more by searching the <a href="https://play.google.com/store?hl=en">Google Play</a> store for titles that support "Google Cast" (the official name of Google's streaming technology).</p><p class="jumpTag"><a href="/article/2861407/10-must-have-chromecast-apps-for-streaming-digital-movies-video-and-music.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861407/10-must-have-chromecast-apps-for-streaming-digital-movies-video-and-music.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt3.staticworld.net/images/article/2014/12/chromecast-with-tv-100537226-medium.png"/>
			<media:content url="http://zapt3.staticworld.net/images/article/2014/12/chromecast-with-tv-100537226-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Microsoft’s close call, 2014: The 10 wins and 9 fails of a company racing to transform itself</title>
		
		<pubDate>Mon, 22 Dec 2014 03:00:00 -0800</pubDate>
		
		
		
		
		<author>Mark Hachman</author>
		<dc:creator>Mark Hachman</dc:creator>
		
		
		
			
		<description><![CDATA[<article class="slideshow"><figure class="slide"><figcaption>From Ballmer to Nadella</figcaption><img data-imageid="100535712" src="http://images.techhive.com/images/article/2014/12/satya-nadell-hoodie-100535712-gallery.jpg" data-thumb-src="http://images.techhive.com/images/article/2014/12/satya-nadell-hoodie-100535712-square.jpg" alt="satya nadella microsoft hoodie"/><p class="slideCredit">Image by <span class="slideCreditText">Microsoft</span></p><div class="slideBody"><p>That image of Microsoft chief executive Satya Nadella slouching casually in a hipster hoodie says so much about the company's aspirations. But inside it’s the same old Microsoft. Or is it?</p><p>Challenged to reinvent itself in the face of a new breed of mobile apps and services, Microsoft’s $2.5 billion purchase of Minecraft developer Mojang makes more sense. So does Microsoft’s Cortana. Or Sway. </p><p class="jumpTag"><a href="/article/2858898/microsofts-close-call-2014-the-10-wins-and-9-fails-of-a-company-racing-to-transform-itself.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2858898/microsofts-close-call-2014-the-10-wins-and-9-fails-of-a-company-racing-to-transform-itself.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt4.staticworld.net/images/article/2014/12/satya-nadell-hoodie-100535712-medium.jpg"/>
			<media:content url="http://zapt4.staticworld.net/images/article/2014/12/satya-nadell-hoodie-100535712-medium.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Business Issues</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Google Android One phones to sell in three more Asian countries</title>
		
		<pubDate>Mon, 22 Dec 2014 01:50:09 -0800</pubDate>
		
		
		
		
		<author>John Ribeiro</author>
		<dc:creator>John Ribeiro</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Google’s low-cost Android One smartphones will be selling in the coming weeks in Bangladesh, Sri Lanka and Nepal, three small but fast-growing markets, following a September worldwide debut of the devices in India.</p><p>The company said it had signed up a number of hardware and network partners in the three south Asian countries, which together have a population of over 200 million.</p><p>“All these devices will give people <a href="http://googleasiapacific.blogspot.in/2014/12/android-one-expands-to-bangladesh-nepal.html">a high quality mobile experience for an affordable price</a>, running stock-Android with updates from Google,” Caesar Sengupta, the company’s vice president for product management, wrote in a blog post Monday.</p><p class="jumpTag"><a href="/article/2862172/google-android-one-phones-to-sell-in-three-more-asian-countries.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862172/google-android-one-phones-to-sell-in-three-more-asian-countries.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Android</category>
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Tor warns of possible disruption of network through server seizures</title>
		
		<pubDate>Sun, 21 Dec 2014 22:35:09 -0800</pubDate>
		
		
		
		
		<author>John Ribeiro</author>
		<dc:creator>John Ribeiro</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>The Tor project said it could face attempts to incapacitate its network in the next few days through the seizure of specialized servers.</p><p>The project did not name the group or agency that may try to seize its directory authorities, which guide Tor users on the list of distributed relays on the network that bounce communications around.</p><p>“We are taking steps now to ensure the safety of our users, and our system is already built to be redundant so that users maintain anonymity even if the network is attacked. <a href="https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network">Tor remains safe to use</a>,” wrote “arma” in a post Friday on the Tor project blog. The “arma” developer handle is generally associated with project leader Roger Dingledine.</p><p class="jumpTag"><a href="/article/2862152/tor-warns-of-possible-disruption-of-network-through-server-seizures.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862152/tor-warns-of-possible-disruption-of-network-through-server-seizures.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
						<category>Privacy</category>
					
				
				
					
				
				
					
				
				
					
						<category>Cloud &amp; Services</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Web Apps</category>
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Sony hack was &#039;cyber vandalism,&#039; not act of war, says Obama</title>
		
		<pubDate>Sun, 21 Dec 2014 13:56:00 -0800</pubDate>
		
		
		
		
		<author>Martyn Williams</author>
		<dc:creator>Martyn Williams</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
The hack of Sony Pictures, <a href="http://www.computerworld.com/article/2861460/fbi-concludes-north-korea-was-responsible-for-sony-hack.html">blamed on North Korea by the FBI</a>, was not an act of war, President Obama said in an interview broadcast on Sunday.</p><p>
“I don’t think it was an act of war,” he told CNN’s “State of the Union with Candy Crowley” in an interview that was recorded on Friday. “I think it was an act of cyber vandalism that was very costly, very expensive. We take it very seriously. We will respond proportionately, as I said.”</p><p>
Obama’s remarks are important for framing what might come next.</p><p>
One of the possibilities, he said, was a return of North Korea to the U.S. <a href="http://www.state.gov/j/ct/list/c14151.htm">state sponsors of terrorism list</a>, which automatically imposes certain sanctions on the country and restrictions on interaction with U.S. organizations.</p><p class="jumpTag"><a href="/article/2862032/sony-hack-was-cyber-vandalism-not-act-of-war-says-obama.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862032/sony-hack-was-cyber-vandalism-not-act-of-war-says-obama.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
			<media:content url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Government</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Legal</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Business</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>&#039;OK Google&#039; could be coming soon to a Chromebook near you</title>
		
		<pubDate>Sun, 21 Dec 2014 13:00:00 -0800</pubDate>
		
		
		
		
		<author>Nick Mediati</author>
		<dc:creator>Nick Mediati</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Google’s software engineers are looking at bringing a little bit of Android to the Chromebook. François Beaufort, who works on Google’s Chromium open-source browser, <a href="https://plus.google.com/u/0/+FrancoisBeaufort/posts/c8v3TPc5tVZ">announced on Friday</a> that new developer builds of the Chromebook’s software let you ask it whatever you want using the “OK Google” voice commands.</p><p>According to Beaufort, the Chromebook’s support for “OK Google” queries is only included in Dev Channel builds and it’s “experimental” for now. </p><p>It’s also pretty well hidden. Beaufort describes:</p><blockquote>
<p>“Try out the experimental new version of the ‘Ok Google’ experience by toggling the chrome://flags/#enable-hotword-hardware flag. Restart your device, go to Chrome OS Settings and check ‘Enable “Ok Google’ to start a voice search” to train your device to respond to the sound of your voice by saying three times ‘Ok Google’.”</p><p class="jumpTag"><a href="/article/2862073/ok-google-could-be-coming-soon-to-a-chromebook-near-you.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862073/ok-google-could-be-coming-soon-to-a-chromebook-near-you.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt4.staticworld.net/images/article/2014/12/chromebook-hp-100536405-primary.idge.jpg"/>
			<media:content url="http://zapt4.staticworld.net/images/article/2014/12/chromebook-hp-100536405-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Chromebooks</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Sony looking for ways to distribute &#039;The Interview&#039; online</title>
		
		<pubDate>Sun, 21 Dec 2014 10:35:09 -0800</pubDate>
		
		
		
		
		<author>Martyn Williams</author>
		<dc:creator>Martyn Williams</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Sony Pictures says it hasn’t bowed to threats to pull “The Interview” and audiences will get a chance to see it—it’s just not sure how at present.</p><p>In the face of threats from hackers, Sony said last week said it was canceling theatrical release of the satirical movie about a plot to kill North Korean leader Kim Jong Un, scheduled for December 25, and “has no further plans” to release on DVD or video-on-demand platforms.</p><p>On Friday, President Obama publically called that decision a mistake and now both parties appear to be back-pedaling a little.</p><p>“Remember, Sony only delayed this,” David Boies, the company’s lead attorney, said in an interview on NBC’s “Meet The Press.” “Sony has been fighting to get this picture distributed. It will be distributed. How it’s going to be distributed, I don’t think anybody knows quite yet. But it’s going to be distributed.”</p><p class="jumpTag"><a href="/article/2862052/sony-looking-for-ways-to-distribute-the-interview-online.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2862052/sony-looking-for-ways-to-distribute-the-interview-online.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Legal</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Business</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Cloud &amp; Services</category>
					
				
				
					
				
				
					
						<category>Web Apps</category>
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>US rejects North Korea offer to investigate Sony hack, reaches out to China</title>
		
		<pubDate>Sat, 20 Dec 2014 16:30:08 -0800</pubDate>
		
		
		
		
		<author>Marc Ferranti</author>
		<dc:creator>Marc Ferranti</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>The U.S. has rejected North Korea’s proposal for a joint investigation of a devastating hack on Sony Pictures, and has reached out to China for help blocking future cyberattacks.</p><p>North Korea Saturday <a href="http://www.pcworld.com/article/2861952/north-korea-wants-joint-probe-into-sony-hack-warns-of-consequences-if-not.html">denied U.S. Federal Bureau of Investigation allegations</a> that it was responsible for the Sony hack, and proposed a joint investigation into the incident with the U.S. The U.S., however, is standing firm in its allegations.</p><p>“The government of North Korea has a long history of denying responsibility for destructive and provocative actions,” according to a statement from White House National Security Council spokesman Mark Stroh. “If the North Korean government wants to help, they can admit their culpability and compensate Sony for the damages this attack caused,” according to the statement, cited in published reports Saturday.</p><p class="jumpTag"><a href="/article/2861992/us-rejects-north-korea-offer-to-investigate-sony-hack-reaches-out-to-china.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861992/us-rejects-north-korea-offer-to-investigate-sony-hack-reaches-out-to-china.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Boeing, BlackBerry working on a smartphone that would &#039;self-destruct&#039;</title>
		
		<pubDate>Sat, 20 Dec 2014 12:28:00 -0800</pubDate>
		
		
		
		
		<author>Nick Mediati</author>
		<dc:creator>Nick Mediati</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>It seems like something out of an old episode of Mission Impossible or Inspector Gadget—an ultra-secure phone that self destructs. But such a phone might be close to reality, courtesy of Boeing and BlackBerry.</p><p><a href="http://recode.net/2014/12/19/blackberry-working-with-boeing-on-secure-phone-that-self-destructs/">According to Reuters (via Recode)</a>, Boeing and BlackBerry are currently jointly developing a super-secure smartphone geared toward governments and other groups or individuals who require high security standards. And if someone goes and tampers with the device, it'll render itself inoperable.</p><p>We're not talking about something that burns itself or explodes or anything like that, though; instead, <a href="http://www.slashgear.com/boeing-blackberry-working-together-on-self-destructing-smartphone-20360257/">Slashgear says</a> that "all data will be erased" from the phone "if the tamper-proof casing is taken apart." So it's not as dramatic as, say, something from spy movies, but it certainly sounds effective.</p><p class="jumpTag"><a href="/article/2861972/boeing-blackberry-working-on-a-smartphone-that-would-self-destruct.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861972/boeing-blackberry-working-on-a-smartphone-that-would-self-destruct.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt3.staticworld.net/images/article/2014/12/cybersecurity-100535646-medium.jpg"/>
			<media:content url="http://zapt3.staticworld.net/images/article/2014/12/cybersecurity-100535646-medium.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Phones</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Business security</category>
					
				
				
					
						<category>Government</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>North Korea wants joint probe into Sony hack, warns of consequences if not</title>
		
		<pubDate>Sat, 20 Dec 2014 11:10:00 -0800</pubDate>
		
		
		
		
		<author>Martyn Williams</author>
		<dc:creator>Martyn Williams</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>
Denying responsibility for a major hack on Sony Pictures, North Korea has proposed a joint investigation with the U.S. but promised “serious consequences” should its offer be rejected.</p><p>
On Friday, the FBI said it had concluded North Korean responsibility because of several similarities in the malware code, the computer control network used and the software tools used against Sony and that used in previous attacks in South Korea that had been blamed on North Korea.</p><p>
North Korea’s Ministry of Foreign Affairs, however, said in a statement Saturday that it needed to see “clear evidence” and said comparisons with previous cyberattacks were irrelevant to the Sony case.</p><p class="jumpTag"><a href="/article/2861952/north-korea-wants-joint-probe-into-sony-hack-warns-of-consequences-if-not.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861952/north-korea-wants-joint-probe-into-sony-hack-warns-of-consequences-if-not.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
			<media:content url="http://zapt2.staticworld.net/images/article/2014/12/sonypictureshack-100535654-orig-100536724-primary.idge.jpg"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Legal</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Government</category>
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Staples says hack may have compromised 1 million-plus payment cards</title>
		
		<pubDate>Fri, 19 Dec 2014 18:15:10 -0800</pubDate>
		
		
		
		
		<author>Zach Miners</author>
		<dc:creator>Zach Miners</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>The data breach at the Staples office-supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores, the company said Friday.</p><p>The affected stores cover 35 states from California to Connecticut, according to a <a href="http://staples.newshq.businesswire.com/sites/staples.newshq.businesswire.com/themes/staplesREDESIGN_newshq_businesswire_com_theme/pdf/List%20of%20Impacted%20Stores.pdf">list</a> Staples released Friday. The chain has more than 1,400 stores in the U.S.</p><p>The malware, which allowed the theft of debit and credit card data, was removed in mid-September upon detection, Staples said. The retailer had previously <a href="http://www.csoonline.com/article/2836294/data-breach/staples-confirms-data-breach-investigation.html">confirmed</a> the incident in October. A previous report from security researcher Brian Krebs around that time cited fraudulent transactions traced to cards that were used for purchases at Staples stores <a href="http://www.csoonline.com/article/2836294/data-breach/staples-confirms-data-breach-investigation.html">in the Northeastern U.S.</a>, but apparently the attack was much wider than that.</p><p class="jumpTag"><a href="/article/2861932/staples-says-hack-may-have-compromised-1-millionplus-payment-cards.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861932/staples-says-hack-may-have-compromised-1-millionplus-payment-cards.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Judge questions evidence on whether NSA spying is too broad</title>
		
		<pubDate>Fri, 19 Dec 2014 15:55:09 -0800</pubDate>
		
		
		
		
		<author>Zach Miners</author>
		<dc:creator>Zach Miners</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>A federal judge on Friday questioned the strength of a key lawsuit challenging the constitutionality of the government’s Internet surveillance program known as “upstream” data collection.</p><p>Judge Jeffrey White heard oral arguments by attorneys from the Electronic Frontier Foundation, which filed the suit, and the government, during a hearing in a federal district court in Oakland, California. The EFF says its suit is the first challenge in public court to the government’s upstream data program, which copies online data from the main cables connecting Internet networks around the world.</p><p>The EFF first filed <a href="https://www.eff.org/document/plaintiffs-jewel-knutzen-and-waltons-motion-partial-summary-judgment">its suit</a> in 2008 after an AT&amp;T technician provided evidence that the company routed copies of its Internet traffic records to the NSA.</p><p class="jumpTag"><a href="/article/2861912/judge-questions-evidence-on-whether-nsa-spying-is-too-broad.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861912/judge-questions-evidence-on-whether-nsa-spying-is-too-broad.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Legal</category>
					
				
				
					
				
				
					
						<category>Government</category>
					
				
				
					
						<category>Business</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
						<category>Privacy</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Three ways enterprise software is changing</title>
		
		<pubDate>Fri, 19 Dec 2014 13:25:11 -0800</pubDate>
		
		
		
		
		<author>Joab Jackson</author>
		<dc:creator>Joab Jackson</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Once upon a time, life in the enterprise IT shop was fairly simple, at least conceptually speaking.</p><p>IT issued computers and laptops to employees, and maintained enterprise software, databases and servers that supported the company, which were mostly run in-house.</p><p>These days, IT’s basic firmament is giving way to a more breathtaking geography that the IT pro must traverse, based on pay-as-you-go cloud computing, building applications and performing deep data analysis. Perhaps more fundamentally, IT operations are moving from merely supporting the business to driving the business itself, which requires agility and making the most of resources.</p><p class="jumpTag"><a href="/article/2861892/three-ways-enterprise-software-is-changing.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861892/three-ways-enterprise-software-is-changing.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Web Apps</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Development</category>
					
				
				
					
						<category>Software</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Cloud &amp; Services</category>
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
			
				
				
			











	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>
		
		<title>Support for security tech tops iSoc&#039;s Africa plan for 2015</title>
		
		<pubDate>Fri, 19 Dec 2014 13:20:10 -0800</pubDate>
		
		
		
		
		<author>Olusegun Abolaji Ogundeji</author>
		<dc:creator>Olusegun Abolaji Ogundeji</dc:creator>
		
		
		
			
		<description><![CDATA[<article>
	<section class="page">
<p>Security is rising to the top of the list of issues that the Internet Society (iSoc) is tackling in Africa, joining its efforts to develop infrastructure and promote an inclusive “bottom-up” governance model for the Web.</p><p>“We are going to support the deployment of security technologies,” said Dawit Bekele, director of the iSoc African Bureau, in a webinar this week.</p><p>ISoc is a nonprofit international organization that works to promote standards and inclusive Internet governance policies. The Internet Engineering Task Force (IETF), which works on Internet standards .</p><p>ISoc’s African bureau plans to measure interconnection and promote open standards in Africa. It also will continue to help develop traffic exchange and DNS programs in partnership with ICANN, and promote local success stories, Bekele said.</p><p class="jumpTag"><a href="/article/2861872/support-for-security-tech-tops-isocs-africa-plan-for-2015.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>
		
		<link>http://www.pcworld.com/article/2861872/support-for-security-tech-tops-isocs-africa-plan-for-2015.html#tk.rss_all</link>
		
		
		
			<media:thumbnail url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
			<media:content url="http://zapt1.staticworld.net/images/article/2013/11/pcworld-idgns-primaryimage-100154539-medium.png"/>
		
		
		
		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
		
	
	




	</channel>
</rss>
struct
Detail The element type "description" must be terminated by the matching end-tag "</description>".
ErrNumber 0
ExceptionMessage The element type "description" must be terminated by the matching end-tag "</description>".
Message An error occured while Parsing an XML document.
StackTrace coldfusion.xml.XmlProcessException: An error occured while Parsing an XML document. at coldfusion.xml.XmlProcessor.parse(XmlProcessor.java:183) at coldfusion.runtime.CFPage.XmlParse(CFPage.java:211) at cfrss2ecfc1441480960$funcGETXML.runFunction(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc:588) at coldfusion.runtime.UDFMethod.invoke(UDFMethod.java:418) at coldfusion.runtime.UDFMethod$ReturnTypeFilter.invoke(UDFMethod.java:360) at coldfusion.runtime.UDFMethod$ArgumentCollectionFilter.invoke(UDFMethod.java:324) at coldfusion.filter.FunctionAccessFilter.invoke(FunctionAccessFilter.java:59) at coldfusion.runtime.UDFMethod.runFilterChain(UDFMethod.java:277) at coldfusion.runtime.UDFMethod.invoke(UDFMethod.java:192) at coldfusion.runtime.CfJspPage._invokeUDF(CfJspPage.java:2471) at cfrss2ecfc1441480960$funcGETENTRIES.runFunction(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc:198) at coldfusion.runtime.UDFMethod.invoke(UDFMethod.java:418) at coldfusion.runtime.UDFMethod$ReturnTypeFilter.invoke(UDFMethod.java:360) at coldfusion.runtime.UDFMethod$ArgumentCollectionFilter.invoke(UDFMethod.java:324) at coldfusion.filter.FunctionAccessFilter.invoke(FunctionAccessFilter.java:59) at coldfusion.runtime.UDFMethod.runFilterChain(UDFMethod.java:277) at coldfusion.runtime.UDFMethod.invoke(UDFMethod.java:192) at coldfusion.runtime.TemplateProxy.invoke(TemplateProxy.java:448) at coldfusion.runtime.TemplateProxy.invoke(TemplateProxy.java:308) at coldfusion.runtime.CfJspPage._invoke(CfJspPage.java:2272) at cfresource2ecfm1365733708._factor0(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm:149) at cfresource2ecfm1365733708.runPage(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm:1) at coldfusion.runtime.CfJspPage.invoke(CfJspPage.java:196) at coldfusion.tagext.lang.IncludeTag.doStartTag(IncludeTag.java:370) at coldfusion.runtime.CfJspPage._emptyTcfTag(CfJspPage.java:2661) at cfindex2ecfm2110452437.runPage(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\e-books-readers\index.cfm:1) at coldfusion.runtime.CfJspPage.invoke(CfJspPage.java:196) at coldfusion.tagext.lang.IncludeTag.doStartTag(IncludeTag.java:370) at coldfusion.filter.CfincludeFilter.invoke(CfincludeFilter.java:65) at coldfusion.filter.ApplicationFilter.invoke(ApplicationFilter.java:279) at coldfusion.filter.RequestMonitorFilter.invoke(RequestMonitorFilter.java:48) at coldfusion.filter.MonitoringFilter.invoke(MonitoringFilter.java:40) at coldfusion.filter.PathFilter.invoke(PathFilter.java:86) at coldfusion.filter.ExceptionFilter.invoke(ExceptionFilter.java:70) at coldfusion.filter.ClientScopePersistenceFilter.invoke(ClientScopePersistenceFilter.java:28) at coldfusion.filter.BrowserFilter.invoke(BrowserFilter.java:38) at coldfusion.filter.NoCacheFilter.invoke(NoCacheFilter.java:46) at coldfusion.filter.GlobalsFilter.invoke(GlobalsFilter.java:38) at coldfusion.filter.DatasourceFilter.invoke(DatasourceFilter.java:22) at coldfusion.CfmServlet.service(CfmServlet.java:175) at coldfusion.bootstrap.BootstrapServlet.service(BootstrapServlet.java:89) at jrun.servlet.FilterChain.doFilter(FilterChain.java:86) at coldfusion.monitor.event.MonitoringServletFilter.doFilter(MonitoringServletFilter.java:42) at coldfusion.bootstrap.BootstrapFilter.doFilter(BootstrapFilter.java:46) at jrun.servlet.FilterChain.doFilter(FilterChain.java:94) at jrun.servlet.FilterChain.service(FilterChain.java:101) at jrun.servlet.ServletInvoker.invoke(ServletInvoker.java:106) at jrun.servlet.JRunInvokerChain.invokeNext(JRunInvokerChain.java:42) at jrun.servlet.JRunRequestDispatcher.invoke(JRunRequestDispatcher.java:286) at jrun.servlet.ServletEngineService.dispatch(ServletEngineService.java:543) at jrun.servlet.jrpp.JRunProxyService.invokeRunnable(JRunProxyService.java:203) at jrunx.scheduler.ThreadPool$DownstreamMetrics.invokeRunnable(ThreadPool.java:320) at jrunx.scheduler.ThreadPool$ThreadThrottle.invokeRunnable(ThreadPool.java:428) at jrunx.scheduler.ThreadPool$UpstreamMetrics.invokeRunnable(ThreadPool.java:266) at jrunx.scheduler.WorkerThread.run(WorkerThread.java:66)
TagContext
array
1
struct
COLUMN 0
ID CF_CFPAGE
LINE 588
RAW_TRACE at cfrss2ecfc1441480960$funcGETXML.runFunction(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc:588)
TEMPLATE C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc
TYPE CFML
2
struct
COLUMN 0
ID CF_UDFMETHOD
LINE 198
RAW_TRACE at cfrss2ecfc1441480960$funcGETENTRIES.runFunction(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc:198)
TEMPLATE C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\rss.cfc
TYPE CFML
3
struct
COLUMN 0
ID CF_TEMPLATEPROXY
LINE 149
RAW_TRACE at cfresource2ecfm1365733708._factor0(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm:149)
TEMPLATE C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm
TYPE CFML
4
struct
COLUMN 0
ID CF_RESOURCE
LINE 1
RAW_TRACE at cfresource2ecfm1365733708.runPage(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm:1)
TEMPLATE C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\resource.cfm
TYPE CFML
5
struct
COLUMN 0
ID CFINCLUDE
LINE 1
RAW_TRACE at cfindex2ecfm2110452437.runPage(C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\e-books-readers\index.cfm:1)
TEMPLATE C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\e-books-readers\index.cfm
TYPE CFML
Type Expression
proc Parsing
struct
AUTH_PASSWORD [empty string]
AUTH_TYPE [empty string]
AUTH_USER [empty string]
CERT_COOKIE [empty string]
CERT_FLAGS [empty string]
CERT_ISSUER [empty string]
CERT_KEYSIZE [empty string]
CERT_SECRETKEYSIZE [empty string]
CERT_SERIALNUMBER [empty string]
CERT_SERVER_ISSUER [empty string]
CERT_SERVER_SUBJECT [empty string]
CERT_SUBJECT [empty string]
CF_TEMPLATE_PATH C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\e-books-readers\index.cfm
CONTENT_LENGTH 0
CONTENT_TYPE [empty string]
CONTEXT_PATH [empty string]
GATEWAY_INTERFACE CGI/1.1
HTTPS off
HTTPS_KEYSIZE [empty string]
HTTPS_SECRETKEYSIZE [empty string]
HTTPS_SERVER_ISSUER [empty string]
HTTPS_SERVER_SUBJECT [empty string]
HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_ACCEPT_ENCODING x-gzip, gzip, deflate
HTTP_ACCEPT_LANGUAGE en-us,en-gb,en;q=0.7,*;q=0.3
HTTP_CONNECTION [empty string]
HTTP_COOKIE [empty string]
HTTP_HOST dorkwebsites.com
HTTP_REFERER [empty string]
HTTP_USER_AGENT CCBot/2.0 (http://commoncrawl.org/faq/)
PATH_INFO /eReadersdemo/e-books-readers/Index.cfm
PATH_TRANSLATED C:\inetpub\vhosts\dorkwebsites.com\httpdocs\eReadersdemo\e-books-readers\index.cfm
QUERY_STRING topic=e%20books%20readers
REMOTE_ADDR 54.166.105.24
REMOTE_HOST 54.166.105.24
REMOTE_USER [empty string]
REQUEST_METHOD GET
SCRIPT_NAME /eReadersdemo/e-books-readers/Index.cfm
SERVER_NAME dorkwebsites.com
SERVER_PORT 80
SERVER_PORT_SECURE 0
SERVER_PROTOCOL HTTP/1.0
SERVER_SOFTWARE Microsoft-IIS/7.5
WEB_SERVER_API [empty string]