Featured Articles

Intel refreshes CPU roadmap

Intel refreshes CPU roadmap

Intel has revealed an update to its CPU roadmap and some things have changed in 2015 and beyond. Let’s start with the…

More...
Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 24 May 2012 10:54

Yahoo! launches Axis browser

Written by Peter Scott


yahoo logo


Moves to invade Sudetenland, Ethiopia and Manchuria next

Yahoo is joining the browser race with its rather awkwardly named Axis browser.

The new browser is said to feature a novel approach to UI design and it should make browsing more intuitive and visual. Axis is available as a browser extension for Chrome, Safari and Firefox, as well as a standalone app for iOS. An Android app is also on the way.

Like the latest iterations of Google’s Chrome browser, Axis also enables users to share their tabs between various platforms. Social networking integration is also on board to make sharing easier.

Sounds promising, but there are also some issues. CNET reports that a blogger has uncovered a vulnerability in the Axis Chrome extension. Apparently the extension leaks private certificate info and allows hackers to counterfeit extensions, this capturing all web traffic, including passwords.

More here.


Last modified on Thursday, 24 May 2012 11:37

Peter Scott

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments