Microsoft also reiterated that the corporate lifecycle of Windows 8.1 would remain the same.
Apple updates the iPads for schools
Apple used its education event in Chicago on Tuesday to unveil a host of new tools to allow teachers and students to make the most of their Apple devices, including the Everyone Can Create curriculum and Schoolwork app, as well as an expansion of the Classroom app.0 2065The changing face of ERP
With small and medium-sized businesses now looking to implement watered-down ERP solutions, and the ‘nexus of forces’ bearing down, CNME investigates what’s in store for the future of ERP.
Google Play store inundated with scam apps, Symantec says
A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.
Apple acknowledges developer portal hack
Apple on Sunday addressed a multi-day outage afflicting its developer site, acknowledging that its systems were hacked.
Motorola plans Moto X unveiling for August 1
In a few weeks, your wait for the Moto X will come to an end. Motorola plans to take the wraps off its most anticipated Android phone ever on August 1.
Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations.
New Android malware lowers the bar for cyber-criminals
The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.
Microsoft fills Office Mobile hole with iOS Outlook app
In an odd bit of doublespeak, Microsoft has released a version of its Outlook Web App (OWA) as a native application for the Apple iPhone and iPad.
Mobile malware, mainly aimed at Android devices, jumps 614% in a year
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks.
Researchers find another Android attack that can get past signature checks
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.