Microsoft today held a press event to announce the next major version of Windows, called Windows 10. To the surprise of many, the software giant skipped Windows 9 entirely, and went right to Windows 10 from Windows 8.
Windows Phone 8.1 Update Announced, Includes Siri-like Cortana Voice Assistant, Action Center, and More
Today at the Build 2014 conference, amidst a wide variety of exciting unveilings, Microsoft finally announced the long-awaited Windows Phone 8.1 update. But don’t be fooled by the update’s seemingly small version number; Windows Phone 8.1 is a huge update featuring Microsoft’s new digital assistant, Cortana, and many other exciting new features.
Microsoft was quite late in jumping on the mobile bandwagon, and that has caused a lot of problems for the company. In the holiday quarter, Apple sold more Macs, iPhones and iPads than PC manufacturers sold Windows PCs, highlighting how Microsoft has missed out on the growth in the smartphone and tablet market.
No computer is completely immune to attacks from malware or viruses. Whether you’re running things in a Mac environment or on a Windows PC, you need to take steps to protect your machine. When you’ve taken your Mac and added a Windows element to it – whether through an app like VMware Fusion, Parallels, or CrossOver – taking these steps not only becomes more crucial, but it can be more costly as well.
This iPhone Hacks Deals offer allows you to protect both sides of your dual-OS Mac with Bitdefender at a price that’s irresistible…just $40!
Apple seems to be on a roll. Hot on the heels of releasing iOS 6.1.2 to fix the Exchange Calendar bug and Java update to fix vulnerabilities along with the malware removal tool, they have released an update for iTunes.
Oracle has just released Java 7 Update 11 to address the vulnerability, which we reported on Friday.
The security vulnerability could allow the installation of malicious software and malware on machines that could increase the chance of identity theft, or the unauthorized participation in a botnet that could bring down networks or be used to carry out denial-of-service attacks against Web sites.