updated 12:40 pm EST, Thu February 22, 2007
In brief: Apple has filed for an "Objective-C" trademark, Google patched a vulnerability in its desktop search tool, Nova media has updated its iSync phone plug-ins, and SubRosaSoft has announced a free MacForensicsLab training CD. Apple's "Objective-C" trademark names the technology Apple used in the creation of Xcode 3.0 for Mac OS X Leopard. The trademark application (no. 77108817) is being filed under International Class 009 for computer software, and the documentation notes that the trademark was first used in commerce at least as early as December 1st of 1984. The technology, according to Apple, is now in use in such commerce as proven by a screenshot.
Google patches Google Desktop
Search giant Google has produced a patch for a serious vulnerability involving its Google Desktop that could allow attackers to steal personal information and potentially take control of a system from a remote location. The search tool was vulnerable to cross-site scripting attacks prior to the patch, enabling malicious users to hijack the Google Web interface to jump from the internet to the desktop Web environment.
iSync phone plug-ins
Nova media today released iSync phone plug-ins 3.3.7, featuring iSync support for Nokia E65 and 6300 phones as well as the Sony Ericsson V630i. iSync synchronizes data from Apple's Address Book and iCal to a mobile phone, and iSync phone plug-ins extend the number of mobile phones that are usable with iSync. The plug-ins -- priced at $14 -- require Mac OS X 10.4.7 or later and iSync 2.3 or newer.
Free MacForensicsLab training CD
SubRosaSoft is offering a free MacForensicsLab training CD, designed to teach users how to perform a forensic investigation using its digital forensic program. Users can locate and catalog credit card numbers, social security numbers, and child pornography while zeroing in on suspect data with a few clicks, according to the company. The tutorial offers insight into forensic investigation and walks users through an investigation step by step using MacForensicsLab.