Microsoft upgrades Surface Pro 2 processor for performance boost

Microsoft has swapped over the processor fitted into its Surface Pro 2 for a faster chip just a few months after the latest Windows tablet launched, according to numerous reports.

Nvidia Tegra K1 offers leap in graphics power

The Tegra K1 features 192 GPU (graphics processing unit) cores, based on the same Kepler technology used in...

Samsung Smart Home aims to connect devices

It said one way the Smart Home service could be used would be to turn off a home's lights and TV if the owner said "going out" into a smartwatch app.

NSA building quantum computer to crack any encryption codes

The National Security Agency (NSA) has been working on a quantum computer that would enable it to crack almost any...

Alicia Keys to end Blackberry creative role

Alicia Keys will end her partnership with Blackberry at the end of January after a year as serving as its global creative director...

Monday, 6 January 2014

Root-Kit

What is a RootKit?

A rootkit is a programme, script or set of software tools that allows an attacker full access to your PC or network. By full access, we mean administrator-level access. A rootkit is really the technique for getting harmful things like Trojans, Spyware and Viruses on to a system.

Why are RootKits so dangerous?

The main form of an attack for a rootkit is stealth. They will hide away, deep in the recesses of your computer. Because they have administrator-level access they can do things like hijack your Windows searches and hide any information about the RootKit, control your Anti-Virus software and tell it to ignore the RootKit, hide from the list of active processess. And a whole lot more besides!
The most famous RootKit was one that was installed by some Sony audio CDs. Sony hid a RootKit on people's computer as part of its Digital Rights Managment strategy. This gave them effective control of a user's PC. A security expert called Mark Russinovich (of Sysinternals) discovered the Sony RootKit, and it made the news the world over. Sony had to issue a download so that people get the RootKit off their computers. They also recalled all the music CDs that had the RootKit software.
It's the fact that RootKits are so difficult to detect that makes them dangerous.


How do I know if I'm infected?

With great difficulty is the answer to this one! Don't expect your Anti-Virus software to help you out here. The very best RootKits can easily defeat Anti-Virus software, so you need a specialist tool for this job. There's a really good website that explains in more detail just what a RootKit is. They also have links to some free RootKit Detection tools.
We highly recommend you pop along to this website, and get your PC checked for RootKits.

Trojans

What is a Trojan?

A Trojan is small, malicious programme that is installed along with a more attractive one. For example, that great freeware programme you got from that dodgy website? It may well be the programme you wanted. But someone (usually a 3rd party) may well have attached a Trojan to it. The Trojan will be installed as well as the software you wanted.
Trojans are not viruses, in the sense that they don't replicate or send copies of themselves to others. They are just another programme that can be installed on your computer, albeit a nasty one!


What do Trojans do?

A Trojan can be very malicious indeed. Most of them are intent on controlling your PC. These are called Remote Access Trojans, or RATs for short. If someone has placed a Trojan on your computer, they'll be able to see everything that you can. Some of them can even controll your webcam. That means the attacker can see you! If you have speakers attached to the PC, they can even hear you!
If that weren't bad enough, the attacker will have access to your computer, enabling him to upload nasty things to your PC. After all, why should he store these things on his computer when he has access to yours?
Most Trojans these days, though, are placed on your computer by criminals. If you type your credit card details in to a website, for example, then the attacker can record what you type. If a criminal has controll of a lot of computer, he could also launch something called a Denial of Service attack. A DoS attack is when a lot of malicious computers attack a particular network or website. The network has so many request that it can't cope, so has to shut down. The criminals then blackmail the owner ("We'll let you have your site back if you give us money".) Many gambling sites have been hit by this type of attack.
A Trojan can also disable your security software, leaving you wide open on the internet.

How do trojans get on My Computer?

If you have an unpatched version of a Windows operating sytem (XP, ME, W98, etc) that is allowed on the internet then you have a very high chance of becoming infected. Install Service pack 2 as matter of urgency. And get all the other Windows updates. If you browse using Internet Explorer then be aware that it is notorius for being unsecure. (At one stage, it was known as the Swiss Cheese browser because it had so many holes in it!) even with all the latest patches, someone is always trying to find a new hole in Internet Explorer. If an attacker can guide you to a particular website, then your browser's security holes can be a way for them to load programmes onto your PC. A lot of people have switched to using a browser other than Internet Explorer, the most popular choice being Firefox.
But Trojans can get on to your PC many other ways: email attachments, software/music downloads, unsafe Instant Mesaage clients, IRC, Peer 2 peer downloads, open ports not protected by a firewall - the list is long!


If I have Anti-Virus software, does that mean I am protected?

You are not necassirly protected from Trojans, just because you have Anti-Virus software on your computer. If you have Norton or Mcafee please remember this: Most popular does NOT mean best! (See our Anti-Virus section for more details.) The problem faced by the makers of Anti-Virus software is that Trojans are easily adapted, and new versions come out all the time. Anti-Virus software makers are constantly playing catch-up. That's why it's important to update your Anti-Virus software on a regular basis. Besides, a really good trojan can disable your Anti-Virus.

How Can I Protect Myself?

The best defense against Trojans is a dedicated Trojan scanner. There is a free online Trojan scan you can do here:
Consider buying separate software just for Trojan protection. Not only will these detect the latest threat, but they will also rid your computer of any infection.
Trojans can be far more harmful than viruses, so it's well worth getting the right tool for the job. Don't skimp in this area!

Firewall

What is a firewall (and why you need one)?

A firewall is protective barrier between you and the rest of the computers you are connected to. When you go on to the internet you are visible to the outside world. (If you weren't, then there would be no way to get a web page to your browser!) You are visible through something called a port. A port is service available to you. There are many thousands of these ports (services), and each is given a number. The three ports (services) you use most often are the world wide web (port 80), Incoming email (typically port 110), and outgoing email (usually port 25). The idea of a firewall is to close off the ports (services) you're not using. If you don't, then your open ports are an invitation to others to raid your computer! If you only have one piece of security software on your computer then it has to be a firewall. Unless your computer is not connected to the outside world, this is a must-have.


What kind of things can happen if I don't have a firewall?

If you do a fresh install of Windows XP, and leave it unpatched, your computer will be attacked within minutes. You'll be attacked through your open ports, and bombarded with popup messages; Trojans, viruses and worms will be loaded behind your back; Spyware and Malware will clog up your browser. In fact, PC Format magazine recently (issue 194) ran this very experiment. Their unprotected PC was unusable after about 2 and half hours! Having a firewall in place would have prevented some of these attacks. (But not all - XP should have Service Packs 1 and 2 installed before it's allowed on the internet.)
Even if you have all of XP's service packs and updates, not having a firewall means somebody will eventually find an open port on your computer. If they can install a Trojan on to your PC, they'll be able to control it! (See our Trojan section for more details on this topic.)

How Firewalls help protect you

Most firewalls, like the one built into Windows XP, will alert you about suspicious incoming traffic. Anyone trying to gain access to your PC will hit the firewall first. The firewall deflects the attack, and gives you a warning about it. But a good firewall like ZoneAlarm will also warn you about suspicious outgoing traffic (XP's own firewall doesn't do this). So the best firewalls do both - tell you about incoming and outgoing traffic.

The Types of Firewall

For the general user, you can place firewalls into two simple categories: hardware and software. A hardware firewall can be a router that sits between your computer and the outside world. You can plug more computers into the router, and each will be protected by the firewall that's part of the router.
A software firewall is one like ZoneAlarm. You install it on your PC, and it will hide open ports, deflect incoming attacks, and warn you about suspicious outgoing traffic. For added protection, you can have a software firewall on each computer that sits behind the router. An attacker would have to be very determined to get through your router's firewall and your software firewall!

Which firewall should I get?

If you have something like a wireless router then you'll probably already have a firewall. You should check your router's configuration pages to make sure it's turned on. (Some of them are actually turned OFF by default!) Once your router's firewall is turned on, you can install a software firewall on each PC that's connected to the router, just for added protection.
If you're not behind a router, then you need a software firewall. If you have Internet Security software like Kaspersky then it will probably include a firewall as well. You should check, though. If you haven't got any Internet Security software then we highly recommend the free version of ZoneAlarm. This piece of software has been available from ZoneLabs for some time, and has a very good reputation.
Home and Learn Recommended Free Firewall: ZoneAlarm Basic
But to recap: If you don't have a firewall, and your computer is connected to the Internet, you NEED to get one!

Virus

What is a Virus?

A computer virus is a programme, or piece of code, that is written to interfere with, and harm, your machine. A virus can replicate itself, spread to other computers, and attack other programmes on your computer. (By attack, we mean change or delete files.) Computer experts distinguish between a virus, a worm, and a Trojan. Here's the differences:


Virus - Can replicate and spread to other computers. Also attacks other programmes
Worm - A special type of virus that can replicate and spread, but generally doesn't attack other programmes
Trojan - Doesn't replicate, but can spread. Doesn't attack other programmes. Usually just a way of recording and reporting what you do on your PC
Viruses are split into different categories, depending on what they do. Here are a few categories of viruses:
Boot Sector Virus
The Boot Sector of a PC is a part of your computer that gets accessed first when you turn it on. It tells Windows what to do and what to load. It's like a "Things To Do" list. The Boot Sector is also known as the Master Boot Record. A boot sector virus is designed to attack this, causing your PC to refuse to start at all!
File Virus
A file virus, as its name suggests, attacks files on your computer. Also attacks entire programmes, though.
Macro Virus
These types of virus are written specifically to infect Microsoft Office documents (Word, Excel PowerPoint, etc.) A Word document can contain a Macro Virus. You usually need to open a document in an Microsoft Office application before the virus can do any harm.
Multipartite Virus
A multipartite virus is designed to infect both the boot sector and files on your computer
Polymorphic Virus
This type of virus alter their own code when they infect another computer. They do this to try and avoid detection by anti-virus programmes.

How do Viruses get on my computer?

The most common way that a virus gets on your computer is by an email attachment. If you open the attachment, and your anti-virus programme doesn't detect it, then that is enough to infect your computer. Some people go so far as NOT opening attachments at all, but simply deleting the entire message as soon as it comes in. While this approach will greatly reduce your chances of becoming infected, it may offend those relatives of yours who have just sent you the latest pictures of little Johnny!
You can also get viruses by downloading programmes from the internet. That great piece of freeware you spotted from an obscure site may not be so great after all. It could well be infecting your PC as the main programme is installing. And if you or your children download software from peer to peer networks (like Kazaa, Morpheus, Shareaza) then you could be downloading more than you bargained for!
If your PC is running any version of Windows, and it hasn't got all the latest patches and updates, then your computer will be attacked a few minutes after going on the internet! (Non Windows users can go into smug mode!)

Could I be infected by a Virus?

If you are infected by a virus, your computer may exhibit some well-known symptoms. Here's a few signs that you may be infected:
  1. Your computer starts running more slowly than it usually does
  2. Your computer keep crashing
  3. Your computer keep crashing and then restarting
  4. Programmes you normally work with suddenly start behaving oddly
  5. You can't access your disk drives
Other symptoms to look out for are strange error messages, documents not printing correctly, and distorted menus and dialogue boxes. Try not to panic if your computer is exhibiting one or two items on the list.
The first thing to do is to scan your PC with your (up-to-date) anti virus software. If your anti-virus software fails to detect anything, then that doesn't mean you're NOT infected - it may just be poor anti-virus software. And remember, most popular doesn't mean most effective. While Norton and Mcafee are good, extensive tests in respected computer magazine show that they are not the best. Not being the best means that they may fail to detect the virus on your PC! Not only that, Norton and Mcafee are becoming really expensive to maintain!

Free Anti-Virus software

There are some good free anti-virus solutions out there. The most popular is AVG. This has gotten results that are as good as the market leaders. You can check it out here (this page also tells you what you DON'T get with the free edition):
Once installed, AVG will update itself on a regular, daily basis. It will also scan emails for viruses, and alert you if it finds anything. The interface is a bit old-fashioned but, hey, it's free and it does a quite a good job!
Another good solution is AntiVir from Avira. The classic edition is free, as well. Check out their website here:
AntiVir will also protect users of non Microsoft computers (Linux/FreeBSD/Solaris). It is, of course, debatable whether you need anti-virus protection if you don't have a Windows machine!
NOTE: If you're changing AV software, you MUST make sure that the old one has been completely uninstalled first. Norton and Mcafee can be difficult to uninstall, and you should consult their website BEFORE uninstalling - they may even have a special tool to do the job. Some people have said that trying to uninstall Norton or Mcafee was worse than getting a virus. (If you see an ad below for either of these two - it's not because we chose it!)

Spam



It's a rare computer user who hasn't been bothered by Spam at some stage. By Spam, we mean unsolicited emails that try to sell you things of a dubious nature that you certainly didn't ask for and, in all probability, don't need. Everybody hates spam. It can clog up your email box, threaten the security of your PC, try to trick you into opening dangerous attachments, and even render the mail box entirely unusable. Here at Home and Learn, we've had to close down many email addresses due to spam. (We've only ever met one person who liked spam. This was a pensioner, new to email, who complained that something was blocking her advertisments. She wanted to know how she could get them back!)

How do the spammers get hold of my email address?

Spam can come from a wide variety of sources, and the spammers have many techniques to get hold of your email address. Here's just a few:
> From a web page
If you have ever posted to an online, public forum, and left your email address on the page, then it will almost certainly end up in the hands of the spammers. If you have your own website, and include your email address in plain text, then that will also get stolen by the spammers. In fact, anywhere on the web where you leave your email address is a source for the spammers. If you can see it, so can they.
The way they get the address is by something called harvesting. This is done with a piece of software called a Spider. The sole job of the Spider is to trawl through website looking for email addresses. Once the spammer has enough addresses, he (they are usally "he's") can sell them to third parties, and other spammers.
> From an infected PC.
A lot of viruses these days contain code to trawl through your email address book. These will then be sent to the spammer. If you have sent an email to somebody who is infected, and that person has you in his/her address book, then your address will be sent to the spammer.
> From YOUR infected PC
If you have a virus, the chances are that it will contain code to control your email. It will then contact another computer and receive a list of instructions, and email addresses. These instruction say something like, "Send the following email to this list of addresses". Your PC won't be sending out thousands of emails, but just a few. This is because your PC is just one of many thousand that are controlled by the same spammer (called a botnet). If your computer sends out just, say, 100 emails a day, then 100 times 1000 computers that the spammer controls totals 100,000 emails a day. If the spammer controls 10,000 computers then that's a million emails a day he can send out!
> Trial and Error
if you have an email address based on your name, and if your name is quite a common one, then the spammer will simply send out email trying to guess the first part. For example, suppose the end of your email address was "smith.co.uk" And you added "John" to the start, your email address would be easy to guess, and you'd have a very busy inbox indeed! If it was "john12_KJ876@smith.co.uk", it's unlikely the spammers could guess the first part.


Worst case scenarios

If your computer is infected, there could be another nasty side-effect - YOU get banned! Because your computer has been indentifed as sending out spam, you may well receive a message from your service provider telling you that your account has been suspended. You then have to go to the trouble of contacting your service provider, telling them that you're not a spammer, and asking what to do to get off their "bad books".
A more likely scenario is that your email gets bounced back to you by someone like SpamCop. The email will identify your IP address, and let you know that you're on a blacklist. SpamCop will keep you on the blacklist until it receives no more spam from your IP address in a 24 hour period. (It may not be your IP address but the address of your email servers. In which case, there's nothing you can do about it but notify your service provider. Your service provider will then totally ignore your call, and heap the blame on you!)


How to Defeat Spam

You can defeat spam (well, most of it). Here's a few ways.
  • Don't post your email address on a web page, unless you're disguising it in some way. As an example, an email address in this format is very difficult for a Spider to read, but quite easy for a human:
firstBit @ co. uk. homeandlearn (re-arange the ending)
  • Be wary of giving your email address to websites. Ask yourself, is there a privacy statement anywhere on the site? (Ours is here Privacy Policy) Can you easily opt-out if they send an email or newsletter to you? Do you trust them?
  • Never reply to a email sent to you by a spammer. If you do, you're telling the spammer that the email address is live and active - the very thing that he was looking for! (Remember: the spammer probably bought his list off someone else, and has no idea whether an address is active or not.)
  • Careful when opening attachments. Save the attachment to your hard-drive first, scan with your (up-to-date) Anti Virus software, and only then consider opening it. If you weren't expecting an email with an attachment, it's safer to just delete the entire email!
  • Set your email software to view message as text and NOT as HTML. In Outlook Express you can do this by clicking Tools > Options from them menu bar. From the Options dialogue box, click the Read tab. Put a tick in the box "Read all messages in plain text". The reason you'd want to do this is because HTML emails can be very helpful to spammers. They insert an image that tells them the email has been read, and thus that it's a live email box.
  • Consider getting some Anti-Spam software. The best of these are very good at detecing spam from the genuine emails. Here's two that Computer Shopper recommended in a recent review. (Dec 2006)
These both got 5 stars out of 5 in the review. The second one is only for Outlook or Outlook Express users. (Mcafee anti-spam got 4 stars out of 5, incidentally, and Norton only got 2!)
A good free anti-spam solution is SpamPal. This got 4 out of 5 stars, but Computer Shopper noted that it was a bit "clunky to set up".
But we recommend you start with the free software first, and test it out. If it's not catching at least 90% of spam coming in, then uninstall it and try something else!

Spyware



Broadly speaking, Spyware is something that sneaks on to your computer, usually with the intentions of extracting money from you. At its worst, Spyware can take control of your computer, directing you to web pages you didn't want to go to, downloading other nasty stuff in the background, and even harvesting email address, passwords and your credit card details. But even a mild case of Spyware infection can be nuisance.
If you've ever been plagued by annoying pop-ups when your computer loads, or have strange new icons where your clock is (bottom right, called the System Tray), or if you're directed to a strange webpage when you try to go on to the internet, then you may well be infected.
Spyware, in the main, gathers information about you and your online habits, and sends that information to third party. And all without asking for your permission!


Where does Spyware come from?

Spyware can come from a whole host of different sources. But Spyware mainly gets on to your PC through deception. For example, suppose you receive this email:

You'd assume that this email was sent to you in error. Can you resist clicking on the link? After all, what harm can it do? Well, a lot actually! There well may be a joke on the site, but there's something less funny going on in the background - the web page is trying to sneak something on to your PC! You may also have seen a harmless-looking popup window asking you to click a button to proceed. You'll click it anyway, just to get rid of it. Clicking OK is what's infected your PC!
Other sources of Spyware infection are freeware or shareware software, an operating system that is un-patched and hasn't got the latest security software, downloading stuff from peer-to peer applications - the list is long!
And don't think your Anti-Virus software will protect you - it won't! Spyware is not considered to be a virus, so your Anti-Virus software won't spring in to action once an infection takes place - it will stay sleeping in the background, unaware that anything malicious is going on. The best tool for the job is a dedicated Spyware Detection system.

Beware of the Scam Merchants!

You may have come across a website that promises to check your PC for Spyware infection. All for free. All you need to do is to click a button to scan your PC. So you download, scan, and lo and behold - it's found something! Then up pops a message directing you to a website that lets you buy the software.
Except, it didn't really detect anything. Or if it did, it's what's know as a false positive (Something that sounds dangerous but isn't). The job of the scan is to scare you into buying their software.
If you type in "Spyware detection" into Google, most of the results that come back are for these types of programmes. According to Suzi Turner, writing on Zdnet , some of the most popular Spyware scams are these products:
  1. SpyAxe
  2. SpySheriff
  3. PSGuard
  4. WorldAntiSpy
  5. Spy Trooper
  6. Razespyware
  7. SpywareNo or SpyDemolisher
  8. WinAntiVirus or WinAntiSpyware 2005
  9. SlimShield tied with "Winhound Spyware Remover"
  10. Spyware Bomber (shut down by the FTC)
Hopefully, you haven't bought anything on the top ten list! Even if you haven't, check out the alarmingly long list of scam Spyware on spywarewarrior.com (Fortunately, they also have a good-software list!)
If you've bought any of the software on the bad list then the protection you have is at no protection at all. At worst, these pieces of software can be incredibly difficult to get rid of - Spyware themselves!

How to get Rid of Spyware

As a computer owner, you really need your wits about you in the Spyware detection game. So what are you to do if you can't even trust the very people who say they are going to help you clean your PC? Well, you can fight back! The best way to do that is with software from very reputable companies. The following are the most well-known (and free) anti-spyware solutions:
Ad-Aware is probably the easiest to use of the three. SpyBot is good, but a bit complex for beginners. Microsoft Windows Defender is well worth getting, too. However, it's not the easiest piece of software in the world to use. You do get some good tools with it, though. Check out the websites by clicking the links above (there's a tutorial on the Microsoft site for Windows Defender).
Once you download your chosen anti-spyware solution, you need to install it on to your PC. After you have installed it, start the software and do a full scan of your computer. (Ad-Aware has a nice big button that says "Scan"!)
Unlike anti-virus software, it IS recommended that you have more than one anti-spyware solution on your PC. This is because spyware can be very difficult to get rid of, and anti-spyware software will rarely find 100 percent of threats. By having more than one solution, what one piece of anti-spyware programme misses, the other should (hopefully) pick it up.

CES 2014: Parrot's latest app-driven toys jump and fly

A promotional video shows the Jumping Sumo leaping between kitchen objects

A two-wheeled "robot insect" that can launch itself into the air, and a "miniature" flying drone are the latest hi-tech toys to be unveiled by Parrot.
The French firm is showing off its latest products at the Consumer Electronics Show in Las Vegas.
Both can be controlled using a smartphone or tablet.
The firm already makes one of the bestselling consumer drones. But one gadget expert questioned the safety of one of its latest machines.
"The Jumping Sumo sounds fun, but it really gives itself a vigorous push to make itself jump," said Stuart Miles, founder of tech news site Pocket-lint.
"You can easily see someone getting smacked in the face or more likely it wiping out the contents of a coffee table or knocking over a vase - wives and mothers will go mental."
The price and release date for both toys have yet to be announced.
Budget drone
The Jumping Sumo runs around on two wheels and can make sharp 90 degrees turns because each wheel is independently controlled. But its key selling point will be its ability to jump 80cm (31.5in) into the air, allowing to leap over gaps or onto objects above it.

A promotional video shows the machine jumping between two kitchen surfaces and then onto shelves, scattering objects in its path.
It is controlled via wi-fi, features a camera that can stream video to the connected smart device and, according to a demo seen by Stuff Magazine, can last about 20 minutes between charges.
The MiniDrone can be fitted to two wheels that allow it to roll along surfaces
MiniDrone is a fraction of the size of the firm's best know flying contraption, the AR Drone 2. But like its larger sibling it has four plastic rotors to get airborne and then uses a gyroscope, speed and height sensors to hover in one spot, fly around or flip over itself in the air.
Three consequences of the machine's reduced size are that its battery can only keep it flying for up to eight minutes at a time; it connects to a smart device using Bluetooth 4.0 Low Energy rather than wi-fi, which reduces its range; and it cannot stream video from its camera.
It does, however, gain one ability: it can be clipped into a two wheels structure that allows it to roll around floors, ceilings and walls.
Another expected benefit is that it should be cheaper than the larger model, which costs about £300.
"If they can get it low enough that it's less than the remote controlled helicopters that you see in all the gadget shops then it could do really well because it will be classed as a fun toy rather than a luxury that you'd never buy," said Mr Miles.
Other exhibitors at CES with flying-themed electronics include:
  • PowerUp Toys, which is a showing a piece of kit featuring a small rotor and Bluetooth radio that attaches to a paper plane allowing a smartphone to control its speed and direction
  • Rotor Concept, which is showing off quadcopters that can support GoPro cams or larger DSLR cameras
  • DJI, a Chinese firm that recently launched Phantom 2 Vision, a quadcopter that allows its owner to take 14MP photos and 1080p high definition video from a distance of 300m (984ft)

CES 2014: Nvidia Tegra K1 offers leap in graphics power

Nvidia's chief executive said its new chip outperformed last-generation games consoles

Chip-maker Nvidia has announced a new processor destined for mobile devices that it says will offer better graphics than the Xbox 360 and PlayStation 3.
The Tegra K1 features 192 GPU (graphics processing unit) cores, based on the same Kepler technology used in the US firm's high-end PC components.
It showed the chip running Epic Games' Unreal Engine 4 at a Las Vegas event.
The advance is intended to help Nvidia compete against Qualcomm and Samsung for orders from manufacturers.
The company was beaten by rival AMD for the contract to make the graphics chips that power the recently released PlayStation 4 and Xbox One consoles.
Nvidia's current generation Tegra 4 mobile chips - which feature 72 GPU cores - are used by Microsoft's Surface 2 tablet, Asus's Transformer Pad Infinity hybrid, the Toshiba Excite Pro tablet and Xiaomi's Phone 3.
64-bit chip
California-based Nvidia's chief executive Jen-Hsun Huang described the Tegra K1 as offering next-generation graphics to mobile devices "for the first time" when he announced the news at the Consumer Electronics Show.He noted that while the chip outperformed the last-generation consoles, it required just 5% of their power.He added that it would be released in two variants: one with a quad-core Cortex A15 CPU (central processing unit) designed by the British firm ARM; the second with Nvidia's forthcoming dual-core Denver CPU, which is a customised version of ARM's more powerful 64-bit V8 architecture.
Offering a 64-bit CPU means the chip can theoretically be used in high-end mobile devices that require more than four gigabytes of RAM (random-access memory) - the upper limit that 32-bit chips can address.
Apple based the CPU of its recent A7 chip, which powers the iPhone 5S and iPad Air, on the same design.
However, Mr Huang claimed the GPU cores in its chip meant the Tegra K1 would be three times more powerful than the A7 according to the GFXBench 3.0 Manhattan test.
"It's a huge deal that Nvidia is finally putting its real talent in building high performance GPUs to use in mobile," Anand Shimpi, founder of influential component news site AnandTech, told the BBC.
"Nvidia definitely has an uphill battle when it comes to convincing device makers to pick its solutions over Qualcomm or others, but Tegra K1 is likely the best story it has ever had in mobile.
"If it can get the chips out on time and they are competitive in terms of power efficiency, they should do better than any previous Nvidia solution.
"The real impact of Tegra K1's GPU is that it raises the bar for what is expected in terms of graphics performance in mobile. And that's a very good thing."
Mr Huang told the press conference that the Tegra K1 would also be targeted at carmakers wishing to introduce processor-intensive self-drive facilities.
"You'll have a supercomputer in your car," he said.
The 32-bit version of the Tegra K1 is intended to appear in devices before mid-2014, and the 64-bit version by the end of the year.


Evernote to focus on fixing bugs after complaints

Evernote has promised to focus on tackling stability problems rather than adding new features after complaints about its record-keeping apps.
Founder Phil Libin acknowledged that the release of an app for Apple's iOS 7 had proved particularly "frustrating" after bugs had "disproportionally hit longer-term customers".
His comments were prompted by a post by tech writer Jason Kincaid.
The blogger had listed a series of faults including lost sound recordings.
"Instead of building a product that is secure, reliable, and fast, it has spread itself too thin, trying to build out its install base across as many platforms as possible in an attempt to fend off its inevitable competition," Mr Kincaid wrote.
Mr Libin responded: "Jason's article was a painful and frustrating experience because, in the big picture, he's right. We're going to fix this."
Evernote allows its 80 million users to record and tag notes, photos, sounds, webpages and other content. They can then be searched and viewed via a variety of apps that run on PCs, phones and tablets as well as via the firm's website.
The California-based company makes money by charging for premium features, including an increased storage allowance.
It competes with Microsoft's OneNote, Google's Keep and Springpad, another start-up.
Privacy flaw
Mr Kincaid is an influential US journalist with more than 28,000 Twitter followers, who previously worked for the news site Techcrunch.
On Friday he documented his frustrations after Evernote's tech support had failed to solve why some of his audio recordings were becoming corrupted and others vanishing altogether.

However, he appeared most concerned by a privacy issue that he only stumbled upon while raising the other issues.
In addition he complained that the firm's image editor Skitch had failed to synchronise captured pictures because he had not installed the latest version, while its browser extensions - used to take a copy of webpages - frequently crashed.
Evernote offers a "quick note" feature, available via the menu bar of Mac computers, that allows users to jot down messages without having to switch to its main app.
Mr Kincaid discovered that text written using the facility was copied into the app's Activity Log - data used by support staff to identify problems.
The writer discovered the flaw when he decided to double-check the contents of his Activity Log after Evernote's workers had asked to see it to help them study his sound recording problems.
He said it was only his "paranoia" that prevented him from sending over some "deeply embarrassing musings" about sex that he had written earlier.
"I am alarmed that Evernote seems to be playing fast and loose with the data entrusted to it," he exclaimed.
Mr Libin denied there was an "inherent privacy problem" with Evernote.
But he acknowledged there had been a menu bar bug, which had since been fixed. He added that users would now be warned that other personal information, such as the title of their notes and their notebook names, could still be transmitted if they emailed in their Activity Logs.
Mr Libin's company relies on being trusted to keep its users' information private
"Over the next few months, we'll be releasing new versions of all the apps that incorporate our many lessons learned about what does and doesn't work," he added.
"Our new philosophy is to find every spot in our products where we've been forced to make a trade-off between doing what's simple and doing what's powerful, then rethink it so that the simplest approach is also the most powerful."
Positive feedback
One company watcher commended his quick response.
"Many start-ups face similar issues when success comes quickly and is huge, and they have to support a lot of people on their service at the same time as trying to keep ahead of their competitors," said Carolina Milanesi, from the tech consultants Kantar Worldpanel.
"Obviously you can't go out and say 'we suck', but admitting that you have had problems and are fixing them can be very important to your customers."
Mr Kincaid also appears to be impressed by Mr Libin's post.
"@plibin your candour is encouraging - looking forward to the improvements," he tweeted.

Bitcoin crosses $1,000 on Zynga move

Zynga said it would allow users to make purchases in some games using Bitcoins

The value of Bitcoin has topped $1,000 (£610) again after social gaming firm Zynga said it would start accepting the virtual currency as a payment option.
Zynga is perhaps the most significant video games firm to accept bitcoins to date.
The virtual currency has been gaining in popularity but its value has been highly volatile in recent weeks.
It peaked at $1,250 in November last year, but fell sharply in December after China restricted trade.
According to the South China Morning Post, the value of a single Bitcoin fell to as low as 2,560 yuan ($421, £258) in December, after China's move.
On Monday, a single Bitcoin was trading close to $1,030 on MTGox, one of the virtual currency's major exchanges.
Zynga follows Ouya, the Android-based video games console-maker, which began accepting payments for its hardware in bitcoins last month.
The Humble Bundle - an organisation selling a changing selection of indie games - also began accepting bitcoins in 2013.
'Expanded payment options'
Supporters of Bitcoin, which is not backed by a central bank, have been pushing for its increased usage.
Its popularity and value surged last year after a US Senate committee described virtual currencies as a "legitimate financial service".
Zynga said it had tied up with BitPay, a Bitcoin payment service, to allow users to purchase virtual goods in some of its games using the facility.
"In response to Bitcoin's rise in popularity around the world, Zynga, with help from BitPay, is testing expanded payment options for players to make in-game purchases using Bitcoin," the firm said in a post on Reddit.
Concerns
Concerns over the use and risks associated the virtual currency have also grown.
Bitcoin became popular, in part, due to it being difficult to trace transactions that use it. The currency has been linked to illegal activity online.
Last month, the European Banking Authority (EBA) warned the public about the potential risks of using bitcoins.
"Currently, no specific regulatory protections exist in the European Union that would protect consumers from financial losses if a platform that exchanges or holds virtual currencies fails or goes out of business," the EBA said.
China, the world's second largest economy, has also banned its banks from handling Bitcoin transactions, saying they had no legal status and should not be used as a currency.
At the same time, there have been concerns that the rise in Bitcoin's value has been triggered by speculators looking to cash in on its popularity.
Alan Greenspan, former US Federal Reserve chairman, has called the rapid rise a "bubble".

CES 2014: Samsung Smart Home aims to connect devices

Samsung's CES booth will host a range of its connected home products
Samsung has announced a system to link together a household's various gadgets, appliances, and utility controls.
It said one way the Smart Home service could be used would be to turn off a home's lights and TV if the owner said "going out" into a smartwatch app.
Samsung said the service would initially be limited to its own products, but added it planned to support third parties' devices in time.
However, one expert doubted the firm's rivals would support the idea.
"Samsung is the most aggressive competitor that exists," said Martin Garner, who covers connected homes technologies for the consultancy CCS Insight.
"So, why would another manufacturer want to use its platform?"
The South Korean firm will show off the technology at its booth at the Consumer Electronics Show (CES) when it opens in Las Vegas on Tuesday,
Other companies are expected to demonstrate competing visions at the event.
Archos has already said it will show off an Android-powered Smart Home Tablet designed to control and access information from other connected devices.
LG will also show off its HomeChat system, announced last year, which allows owners to control devices by sending them SMS-based text messages.
'Grand vision'
Samsung said its new service would initially offer three features:
  • Device Control: Devices including air conditioners and lights can be turned on and off via a smart device app. This can be done whether the user is at home or elsewhere, and includes support for voice commands that can also be spoken into its new TV remote controls.
  • Home View: Cameras built into TVs and other appliances can be used to provide real-time video feeds to a user's smartphone, allowing them to keep an eye on their property when out.
  • Customer Service: Appliances will notify the app if a part needs to be cleaned or replaced, for example sending an alert if a fridge light burns out or if a washing machine filter is clogged.
The firm said its Smart Home app would initially run on selected Samsung TVs, smartphones, tablets and its Galaxy Gear smartwatch.
It will work by sending messages to remote computer servers that in turn send data to Samsung's range of internet connected air conditioners, refrigerators, washing machines, robot vacuum cleaners, LED lights and digital cameras.
The company added that it intended to expand the platform to support healthcare products, door locks and unspecified "eco-home applications" at a later date, and would also release a software protocol to enable other device-makers to link up their machines.
However, bearing in mind doubts over whether competitors would co-operate, CCS Insight suggested the firm would struggle to realise its goal.
"Samsung have had the same connected home vision for a while, but their implementation of it was a bit ragged," said Mr Garner.
"In the past they had different apps for different appliances and they didn't all join up. It sounds like they've tidied that up quite nicely now.
"But the thing we worry about is that brand loyalty across appliance categories isn't strong - research suggests if you buy a Samsung TV you don't become more likely to buy a Samsung fridge rather than one from another manufacturer.
"So, just having a grand vision like this doesn't mean people will go for it."

Archos unveils quad-core 4G Android smartphones from £189


Device maker Archos has announced a pair of quad-core Android smartphones with 4G LTE capability at a start price of £189, which are set to go on show at next week's CES technology trade show in Las Vegas.
Due to be available in the UK sometime later in the first quarter of 2014, the Archos 45 Helium 4G and Archos Helium 50 4G (pictured) are the first smartphones from the firm to support 4G LTE network capability and will be priced from £189 and £230, respectively.
For this price, buyers get a choice of a 4.5in 854x480 or a 5in 1280x720 HD display. Both handsets are based on a 1.4GHz quad-core Qualcomm processor and 1GB memory and come with the Android 4.3 Jelly Bean operating system, plus a micro SD slot for storage expansion.
The two handsets are visually almost identical, according to the firm, with the Archos Helium 50 4G basically being a larger screen version of the Archos 45 Helium 4G. However, they differ somewhat in specifications, with the smaller device having 4GB flash storage, 5MP rear camera and VGA front camera, while the larger model has 8GB flash, 8MP rear camera and 2MP front camera.
Archos said the new handsets are its first foray into the 4G LTE market, supporting data transfer speeds of up to 150Mbps, as well as the usual 3G, WiFi and Bluetooth connectivity.
With these specifications and pricing, the new Archos devices will be up against other value-priced smartphones, such as the much acclaimed Motorola Moto G.
Loïc Poirier, Archos chief executive, said that the new smartphones build on the company's success in the European mobile market.
"The Archos Helium 4G smartphones will once again change consumers' mindsets by making the best possible technology affordable," he said.
Both of the new handsets will be on display at the CES show next week. V3 will be providing coverage from CES next week so check back then for more on the latest products being unveiled.

Mobile, SaaS and big data will push global IT spend to $2.22tn in 2014

Worldwide IT spend will reach $2.22tn over 2014 led by the dominance of the US tech market, while the UK looks set to be pulling clear of the recession for IT spending, according to data from Forrester.
The biggest area of spending will be on software, at $568bn, while IT outsourcing will be $442bn. IT consulting will account for $421bn and computer equipment spending at $416bn. Communications equipment will account for $373bn.
Forrester said the US would be the dominant force for spending on IT services, rising six percent over the year and accounting for $877.2bn in spend. The biggest rise will be seen in China, with growth of 10.5 percent to $124.5bn.
Europe is also set to grow as the impact of the recession looks set to finally recede,according to report author and analyst Andrew Bartels, writing in a blog post.
"After no growth in 2012 and a small decline in 2013, a 2.9 percent increase in Western and Central European tech spending in 2014 in local currencies will feel like a boom,” he said.
Bartels said the UK would remain one of the biggest spenders in Europe, relative to its economy, with tech spending growing by 6.5 percent to pass $100bn for the year ahead.
Given this growth, the report urged IT leaders at businesses in the so-called ‘Tech Twelve’ nations – such as the UK, US and Nordic nations – to push hard on new projects if possible.
“Tech Twelve country CIOs can be more aggressive in their budget plans. Businesses and governments in these countries are eager to embrace new technologies and feel competitive pressure to do so given the pace of adoption by competitors in their own and similar countries,” the report said.
“With the prospects for better economic growth in these countries, CIOs need to stay actively engaged with their business partners and be prepared to move as aggressively as they do (subject to signals from the CFO that this is okay from a financial and budgetary perspective).”
The report also notes that spending on technology such as software as a service, mobile devices and tablets, and big data tools will grow in 2014, primarily in the Tech Twelve nations, as new ideas and ways of doing business present themselves to firms with renewed budgets.
Other nations face tougher times in 2014, but CIOs should remain nimble to any opportunities that present themselves.
"CIOs in continental Europe and Japan still have to worry about their countries sliding back into recession and have to plan for little or no growth in their tech budget," the report said.
"But even here the possibility of better-than-expected economic growth means that CIOs need to have contingency plans for where they would work with business to launch new tech projects if their economies improve."
One area that firms may well look to benefit from is the cloud and hosted applications, with IT leaders marking this as the biggest trend of 2013 in a V3 poll, and this may well continue through 2014.