When we last saw the Honda CR-V, we were behind the wheel of the 2009 CR-V EX-L 4WD with navigation. A little over two years later, we found ourselves spending a week with the new 2011 CR-V EX-L 4WD with navigation. Not much has changed for Honda's little crossover. Aside from a refreshed front end, physically the CR-V is virtually unchanged. Under the hood, Honda's engineers have been able to coax about 20 more ponies out of the 2.4-liter engine, but you probably wouldn't notice that without back-to-back testing of the two generations. Most heinously, the … Read more
Many users are aware of some boot commands for Mac OS X that provide different functionality for your system. The following is a more comprehensive list of the keyboard commands you know and many you may not.
A recent tweet from @superfetz reminded me of several boot commands I've learned over the years, so I thought a more comprehensive list would be useful for MacFixIt readers.
While you cannot run any code from Terminal or otherwise to set an order of boot devices, you can easily control where your Mac boots via keyboard commands. The following key combinations can … Read more
Legitimate Android apps are being compromised by phony versions that masquerade as the real thing but deliver a payload of malware, according to a Symantec blog published yesterday.
Found on unregulated third-party Android markets, malicious versions of legitimate apps like Steamy Window are difficult to distinguish except for their tendency to request permissions that are more excessive than usual, says Symantec. But once installed, these apps carry a new piece of Android malware dubbed Android.Pjapps.
Even running the app doesn't raise a red flag to the user as the fakes closely look and act like the legitimate versions. … Read more
SAN FRANCISCO--The head of the National Security Agency said today that the U.S. military should have the authority to defend "critical networks" from malware and other disruptions.
Gen. Keith Alexander, who is also the head of the Pentagon's U.S. Cyber Command, said at the RSA Conference here that the NSA's "active defenses" designed to defend military networks should be extended to civilian government agencies, and then key private-sector networks as well.
"I believe we have the talent to build a cyber-secure capability that protects our civil liberties and our privacy," … Read more
Editor's note: This story originally ran in 2009. In the spirit of the holidays, we thought we'd run this touching piece again.
On a recent Christmas Eve, Jeff Martin found himself forced to explain to a Canadian general why, when Santa Claus passed through Toronto that night, Google Maps had placed the city in the United States.
Martin, then a senior marketing manager in Google's Geo group, was part of a huge team of people involved in the joint U.S.-Canada North American Aerospace Defense Command's annual NORAD Santa tracker program, a long-running effort to … Read more
IBM has been tapped by NATO to build a new cloud-based computing system designed to help the 28 member nations better use and share data.
Selected for the project by NATO's Allied Command Transformation (ACT), Big Blue will be called upon to design and demonstrate a cloud-computing environment that would help the North Atlantic Treaty Organization plan and implement critical tasks, such as intelligence gathering, surveillance, and reconnaissance.
The goal is to see if NATO members can use a collaborative cloud to access data faster and make decisions more quickly.
Though NATO's 28 countries share common goals, they … Read more
In patent documents released this week by the U.S. Patent and Trademark Office, Apple reveals plans to improve voice control on its iOS devices using contextually defined commands selected by users.
Apple purchased the iOS "personal assistant" app maker Siri earlier this year, suggesting it had plans to beef up the voice control functionality in iPhones, iPads, and iPod Touches. The patent seems to take aspects of the Siri interface and apply them to individually selected apps on a user's device.
Spam may be down but malware marches merrily on.
That's the message from the "November Threat Landscape Report" released yesterday by security vendor Fortinet.
Global spam levels ultimately fell 12 percent in November after Dutch authorities took down a large Bredolab network made up of 140 different servers. The Bredolab botnet was typically used by cybercriminals to send out spam selling fake drugs, according to Fortinet. Spam had actually fallen as much as 26 percent the week after the network was dismantled but was able to stage a bit of a recovery afterward.
Forget China or Al Qaeda. In a twist that would have been inconceivable even a few months ago, the WikiLeaks.org Web site is being proposed as the first public target for a U.S. government cyberattack.
After the shadowy, document-leaking organization distributed nearly 400,000 classified documents from the Iraq war on Friday, Washington officialdom responded with a torrent of denunciations alleging violations of national security and endangering U.S. military operations.
In a rare point of congruence, The Washington Post and The Washington Times both criticized the release, with the smaller paper arguing that WikiLeaks' offshore Web site … Read more
Along with a cavalcade of handsets, Motorola also announced three new Bluetooth accessories at CTIA Fall 2010. They are the Motorola Finiti and Motorola CommandOne Bluetooth headsets, plus the Motorola Roadster, a Bluetooth car kit/speakerphone.
The Motorola Finiti has three microphones, which combine to cancel out wind and surrounding noise. There's also a stealth mode that will help convert your vocal vibrations into speech, which promises to be useful in especially noisy environments. This utilizes the bone conduction technology we saw in the Motorola HX1. With a special MotoSpeak 2.0 app for Android, you can also listen … Read more