Breaking News

Tuesday, August 25, 2015

Police want white hat hacker to catch Ashley Madison criminal

Police want white hat hacker to catch Ashley Madison criminal

In the USA have problem about hacking with victim public figure.Toronto police have appealed to the 'white hat' hacker community for help in tracking down Impact Team, the perpetrators of the Ashley Madison data breach, after revealing two people may have taken their own lives due to the leaks.

"Team Impact," Superintendent Bryce Evans said at a press conference, directly addressing the criminals behind the hack, "I want to make it very clear to you - your actions are illegal and will not be tolerated."

the people said the suicide reports were unconfirmed as yet, and it is unknown if it was members of the site or other persons who had been killed. But Toronto Police stressed the "enormous social and economic fallout" caused by the hackers, who published the usernames, real names, street addresses and partial credit card numbers of some 36 million dating site users.
Evans thanked the open source tech community for its help so far, and told journalists that Avid Life Media - owners of Ashley Madison and sister dating site Established Men - is offering a reward of $500,000 to anyone providing information that leads to the identification, arrest or prosecution of the person or people behind the hack. Although the Toronto Police is receiving help from Homeland Security in the US, the FBI, and other agencies around the globe, it has now also publicly appealed to the hacking community to offer its expertise.

"To the hacking community who engage in discussions on the dark web and no doubt have information that could assist this investigation, we are also appealing to you to do the right thing, to acknowledge that this is a unique situation that has caused enormous social and economic fallout," said Evans. "You know the Impact Team has crossed the line -- do the right thing and reach out to us."

Detective John Menard from the Toronto Police technical crime unit said: "We're looking at the white hat hackers operating in the dark web and areas we don't police on a daily basis." Although details of the crime could not be revealed, given it is still under investigation, Menerd called it "very sophisticated", while Evans suggested this was unlikely the work of a teenage hacker.

Although Toronto Police referred to the suicide reports as "unconfirmed", IBTimes in the UK says it has confirmed that a 25-year-old former City of San Antonio police officer took his life days after his work address was found among the leaks. There is no suggestion the two incidents are related, however.

Read more ...

Monday, August 24, 2015

Beware your Smartphone Password Pattern Easily Recognized

Beware your Smartphone Password Pattern Easily Recognized


OSLO - Password or password on the smartphone, to be one of the most important in securing your data. Did you know, if the password used Android users turned out to be easily identified.
Citing Phone Arena, Sunday (08/23/2015), a study conducted by scientists from the Norwegian University of Science and Technology, Marte Loge, answer it.
Researchers found that a lot of Android users who set up a password-based pattern (pattern) on their devices with simple forms known to others.
Loge findings, more than 77 percent of the pattern starts at one point from the four corners of the pattern, while 44 percent of the pattern is made from the top left corner.
Of course, the more nodes (node) that is made will be more difficult for someone to guess your password. Loge research shows, the average number of vertices used one to make the pattern is four and five.
By using a five-node only, the password you create will have the possibility to guess as much as 7152 times. If only made four vertices, has opened the possibility for random reached 1,624 times.
Loge continues, if there is create a password using nine node, then it is likely to be more complicated to guess which 140 thousand trials.
Loge how that is done for the purposes of his thesis was that asks respondents to participate by making three patterns of some of the purposes of the purposes of opening the banking application, the application shopping (shopping), and makes the smartphone.
Through that mechanism, Loge find a pattern consisting of four and five-node is the type most often used by both men and women. Moreover, Loge also see, as much as 10 percent of key patterns made by the letters of the alphabet.
Read more ...

Sunday, August 23, 2015

Your food porn could have a new home on Google Maps, it is good.

Your food porn could have a new home on Google Maps, it is good.
Today google company has a good inovation it is fusion in google maps. It seems like Google wants to know what you had for dinner. According to Android Police, the company is testing a new feature in its Maps app that will detect when photos are taken at restaurants and other places that serve food, and offer to attach them to the establishment's location. For now, the feature is reportedly only available to Local Guides at "level three and above" -meaning people who've contributed more than 50 reviews as part of Google's Local Guides program.

The company trialed a food photography service called Tablescape earlier this year, but close the app down in June, saying it would invest resources into other projects. In its last mail to Tablescape users, Google said the app's closure didn't mean the company was "giving up on food photography," and noted that "you may see the influence of Tablescape in future apps." While this new Maps option isn't a full-fledged app, Google's email to qualifying Local Guides calls for users to post photos of their "epic meals," suggesting that it will be a new home for pictures of your plate. We live in a world where no one can eat food at a restaurant without first taking photos of it -  it's about time someone found a use for them.
Read more ...

Saturday, August 22, 2015

The incredible cars of Pebble Beach's multimillion-dollar auctions

The incredible cars of Pebble Beach's multimillion-dollar auctions
Today in this news there is good idea enough good idea it is about The incredible cars of Pebble Beach's. For those who bleed motor oil, there's no week more legitimately exciting than that of the Pebble Beach Concours d'Elegance, an event where impossibly rare, cool, interesting, and expensive vehicles of all vintages come out by the hundreds. Some are there to race, some are just there to party, and others are there to trade hands - often to the tune of seven figures. Sometimes, it even stretches to eight.

Several major auction houses anchor big events around Pebble Beach, and I've compiled all of the results from two of the biggest - Gooding and RM Sotheby's - into a sortable and searchable table below. This was a particularly notable one, since RM Sotheby's had its vaunted Pinnacle Portfolio here - the most valuable single car collection ever to go up for auction, including a Ferrari Enzo that had been gifted to Pope John Paul II (it ended up fetching over $6 million). Prepare for your heart to stop as you peruse the list, particularly when you get toward the very top end where Ferraris are being sold for upwards of $16 million. this is fantastic, isn't it.
Read more ...

Asus is making a snazzy special edition of the ZenFone 2 with 256GB of storage,good news

Asus is making a snazzy special edition of the ZenFone 2 with 256GB of storage,good news

The Asus company will be making a snazzy special edition of the zenfone 2. The competitive $300 Android smartphone market is more about good performance than good design, and Asus' ZenFone 2 is not exception. But the company is trying to make progress on both fronts: today it announced the ZenFone 2 Deluxe Special Edition, which contains a whopping 256GB of internal storage and a trendy polygonal pattern on its backplate. (Well, it's at least trendy in the world of aggressive-looking computer peripherals.) The huge amount of storage is the real story here; for those keeping track, 256GB is exactly 15 times more than what Apple offers on an entry-level iPhone.

The special edition of the ZenFone 2 was introduced in Brazil, and there's no word yet about whether it will come to the US - though it would certainly be welcome here since the version introduced earlier this year received decent marks. We just hope Asus decides to free most of that crazy storage space from its heap of bloatware.
Read more ...

Gadget Ogling Swimming Aids, Drinks Fixers, and Sleep Rings

Gadget Ogling Swimming Aids, Drinks Fixers, and Sleep Rings
Welcome to technology of news, today it is news about Gadget Ogling Swimming Aids.

On the trail this week are a fitness tracker for swimmers, clever goggles to keep you on track, a Bluetooth stick for cocktails, and a ring that tracks sleep.

Butterfly Boost
As an occasional swimmer, I'd like a better way of monitoring how well I'm doing in the pool. It's not so easy to use a stopwatch on my phone as it is while out for a jog. So, Misfit is looking to bring wearables to the water with a new version of its Shine activity tracker, developed in collaboration with Speedo.

The Speedo Shine (pictured above) apparently can monitor your progress on laps across all types of strokes. It transmits its lap and distance data to your iOS or Android device. It also can track your other physical activity and sleep patterns. You won't have to worry too much about recharging, as the battery lasts for up to six months.

While I'm largely unconvinced about wearables for personal use, I like the Shine's ability to track activity both in and out of the pool. The alleged six-month battery life is attractive as well -- the lack of a screen helps conserve power -- so this is one fitness tracker I'm actually interested in trying. Just make sure I get out of the pool at some point before dark, please.

 Direct Route

Staying the course on aquatic wearables, OnCourse is a pair of goggles designed to help swimmers stay on track in open water.

Quick Mix 
once you're done with a long day at the pool or the lake, chances are you'll want to relax with a tasty beverage. If like me, your cocktail-mixing skills leave something to be desired, however, or you're too beat from all that working out to focus properly.

Sleep Tight 
it is a shame that at US$229 on the lowest Kickstarter reward tier, it seems too expensive.
Read more ...

The amazing Samsung courts iPhone switchers with $1 test drive

The amazing Samsung courts iPhone switchers with $1 test drive
Today in this hot news about technology. it is Samsung company is confident that iPhone owners will love the Galaxy Note 5 and S6 Edge. so confident that the company is letting them try the new phone out for just a dollar. As part of the company's Ultimate Test Drive initiative, folks with iPhones can test Samsung's latest handsets for a month, complete with a data plan and their existing phone number.

"In just a few hours, all of the kits earmarked for this program were reserved by customers looking to try our latest and greatest devices. We’re now working quickly on how to make the Ultimate Test Drive available to even more people,” said a Samsung spokesperson.

This trial program applies to Samsung's Galaxy Note 5, Galaxy S6 Edge Plus and Galaxy S6 Edge. You can register by using your iPhone to visit Samsung's Promotions website, where you'll have to pay a $1 processing fee in order to receive one of the phones. Regardless of which Galaxy you opt for, your trial device will come with a 30-day voice, text and data plan on your current carrier (T-Mobile, Verizon, AT&T and Sprint are all supported), as well as a transfer cable for bringing music and pictures to the new phone.

Don't get too attached to your loaner Galaxy, though; even if you've fallen in love with the new phone, you'll have to return it at the end of the month via a free box provided by Samsung. If you've decided that a Galaxy S6 Edge or Galaxy Note 5 is right for you, you'll simply have to buy a new one.


We called the Galaxy S6 Edge Plus nearly perfect in our review, thanks to its rich 5.7-inch display, excellent camera and a gorgeous curved design that makes the iPhone look vanilla by comparison. The phone's curved screen offers more functionality than that of the standard S6 Edge, including the ability to launch some of your favorite apps with a quick swipe.

Our full review of the Note 5 is still in the works, but based on our hands-on impressions, there should be plenty for power users to love about it. The 5.7-inch phablet's improved S Pen allows you to start taking notes even when the phone is asleep, and its beefy octa-core Exynos processor has plenty of power to handle the device's myriad multitasking features.

Even without a free trial, the latest Galaxy phones make a compelling case for iPhone owners to switch to a Samsung.
Read more ...

Intel, HP, or Apple aim for laptops that are more like smartphones

Intel, HP, Apple aim for laptops that are more like smartphones
This week Intel has highlighted a trend that signals the advent of laptops that behave increasingly like smartphones. in the world smartphone to become social life everyday in modern society.

At its annual Intel Developer Forum the chip giant discussed a technology that may signal more futuristic laptop designs like the impossibly-thin 12-inch MacBook and HP’s cutting-edge EliteBook Folio 1020.  The key to these innovative laptops is that inside they are less like traditional PCs and more like smartphones. 

Intel’s newest chip, Skylake (or officially, the 6th Generation Intel Core Processor) has some features in common  with smartphone processors from Qualcomm and Apple, according to EE Times, a publication that closely tracks Intel and the chip industry.  And an analysis of the new chip at Ars Technica also refers to the new chip’s increasing similarities to smartphone silicon.
there not wading into the weeds – which can get very deep very quickly with chip architecture – Intel’s principal goal is to make laptop processors more about saving power than about large jumps in performance. That of course has been the guiding principle for the Apple processors that power the iPhone.  In short, while incremental increases in an iPhone’s performance is always a goal, the overriding objective is to maintain long battery life. 

You might say that the mobile version of Skylake – due to arrive in laptops by the end of the year – is Intel’s attempt to keep pace with Apple.  As smartphones become the equivalent of the digital Swiss Army Knife – an analogy at one time applied to PCs – Intel needs to emulate the best things about the iPhone’s processor.  In addition to maintaining good battery life, that means focusing more on image and video processing (important for cameras) and less on traditional number-crunching.

New Trend In Extreme Laptop Design

While the traditional large laptop with a 15-inch screen and speedy Intel processors will always be around, a segment of the market is morphing into something that falls between a large smartphone and a traditional PC.

Apple got the ball rolling with the introduction of the 12-inch Retina MacBook earlier this year.  It’s a mere 2 pounds (only a bit heavier than the original iPad) and the emphasis is on portability rather than performance.  And like the original MacBook Air introduced in 2008, it has been criticized as being too slow, too thin for its own good (read: only one connector), and basically impractical.  Of course, as the MacBook Air evolved it went on to be one of Apple’s most popular laptops and changed laptop design forever.
 

But it’s not just Apple. I’ve been using one of HP’s most advanced laptops, the 12.5-inch EliteBook Folio 1020, for the last couple of months. Like the 12-inch MacBook, it's a candidate for a future Skylake chip, is extremely thin, uses a Core M processor, and is fanless (though smartphones are fanless, virtually all laptops to date have used fans to keep the processor cool).  
it’s fanless and uses a Core M chip, HP designed the 1020 to be as light as possible (depending on the model, the weight of the 1020 is as little as 2.2 pounds, similar to the 12-inch MacBook).  My experience with 1020 over the last couple of months has been very positive: it’s almost as light as a tablet but delivers the performance expected of a more traditional laptop.

But neither HP nor Apple want you to think of it as just another laptop.  By using processors that will increasingly adopt the characteristics of smartphone silicon, both companies want to push the laptop out the box it's been in for years.  Skylake should make that possible
Read more ...

Friday, August 21, 2015

wow Amazing, Mark Zuckerberg Youth World Richest

Mark Zuckerberg Youth World Richest

There have been many surveys that mentions how rich the founder and CEO of Facebook Mark Zuckerberg. The latest comes from Wealth-X call individuals aged under 35 years in the world's richest.
Wealth-X as reported by Economic Times, Friday (21/08/2015) reported that total personal wealth of the husband of Priscilla Chan is worth USD 41.6 billion.
Zuckerberg is the list of the richest people under the age of 35 years with a friend who is also a founder of Facebook, Dustin Moskovitz, in the second position with a net worth of USD 9.3 billion. There is also the other Facebook founder Eduardo Saverin - who recently married an Indonesian woman in fourth position - with a total net worth of USD 5.3 billion.
Besides the trio founder of Facebook, there Huiyan Yang, Vice Chairman of Chinese real estate developers, Country Garden Holdings. He became the richest woman in this list, with ranks third after Zuckerberg and Moskovitz with wealth of USD 5.9 billion.
Top ten richest individuals under the age of 35 years Wealth-X version of the row of positions 5-10 is Scott Duncan with a wealth of USD 5 billion, Elizabeth A Holmes USD 4.5 billion, USD 3 billion Blecharczyk Nathan, Brian Chesky USD 3 billion Joe Gebbia USD 3 billion and USD 2.7 billion Thomas Persson.
In the top 20 list, 11 of whom are US citizens, three from China and Switzerland. Although not in the top 10, CEO Evan Spiegel snapchat attract attention. He became the youngest. At the age of 25 years wealth of USD 1.9 billion.
Read more ...

Shortness iCloud? Try Method This Quick

Shortness iCloud? Try Method This Quick

Photographing and videotaping the activity that often do iPhone users. The problem for a lot of photos and videos produced quickly create storage space is full.

For those who use large-capacity iPhone certainly does not matter. But another story for those who have an iPhone with a capacity of 8 GB or 16 GB. The number of photos and videos will quickly crowd out of storage space.

But still, we can take advantage of iCloud. Indeed, Apple only provides a capacity of 5 GB for free. But we can make the most of the capacity to store photos or videos.

How to delete a file that was never used but stored in iCloud. One is the iPhone backup files.

Shortness iCloud? Try Method This Quick
 Sometimes the file is not used anymore but is still stored. Though its size is quite large, reaching gigabytes. So no one if delete it and leave only the latest file.

Go to Settings and then tap iCloud. Then press followed by Manage Storage Storage. From here we will see what data is stored in iCloud.

Furthermore, just delete the backup files or other data that are found to be used anymore. ICloud capacity will be relieved, and we can save a collection of photos and videos in it.
Read more ...

WhatsApp for Web finally works for iPhone users, This is good news day

WhatsApp for Web finally works for iPhone users

Well ,today there is good news form whatsApp company.WhatsApp has finally gotten around to launching an iOS-compatible Web version of its popular messaging app. When the client launched in January, Android users were fine, as were owners of Windows Phone, BlackBerry, and Nokia devices. However, due to what the startup described as “Apple platform limitations,” iPhone users were left out in the cold.

This week the Facebook-owned firm has finally sorted out the issue and let iOS users in the door. To get started, first update your app and confirm that “WhatsApp Web” appears in the app’s Settings. Next, visit web.whatsapp.com on your PC browser, tap on WhatsApp Web in the iPhone app and scan the QR code showing on your PC screen.
Facebook acquired WhatsApp for a colossal $19 billion back in February 2014. Free to download and free of ads, the cross-platform app still doesn’t generate a great deal of revenue, getting the bulk of it from the $1 fee it charges users after a year’s use. However, Facebook boss Mark Zuckerberg is in no apparent hurry having said he wants to first build up the service’s user base to at least a billion before considering how to monetize it.
At the current rate of expansion, the app is likely to hit the billion mark before the end of this year, so it shouldn’t be too long before Zuckerberg and WhatsApp founder Jan Koum unveil some money-making scheme, though it’d be surprising to see ads as part of the plan as Koum has always been against including them in the app.



Read more ...

Bumper Microsoft event with new Surface and Lumia hardware rumored for October, what is it ?

Bumper Microsoft event with new Surface and Lumia hardware rumored for October


Microsoft is rumored to be holding a bumper event in October, this issue will develop by microsoft company. so where it’ll reveal a whole new collection of hardware, including the long-expected new Lumia smartphones, the Surface Pro 4 tablet, and even a sequel to the Microsoft Band fitness wearable. What’s more, the rumors also say Microsoft has a few surprises in store. The news comes from Chinese website WPDang, and The Verge stated afterwards its own sources confirm the upcoming launch.

Following the introduction of Windows 10 and the expected arrival of the new mobile version, Microsoft is likely to concentrate on its Lumia and Surface hardware, which does mean we may not get to see anything other than more mid-range fare from the company at the IFA tech show in September.

We’ve been hearing rumors about a Lumia 950 and Lumia 950XL for a while, and specifications for both devices have been leaked, but the design is still a mystery. Microsoft hasn’t released any flagship Lumia-branded phones since taking over Nokia’s Devices Division, but has launched a stream of mid-range devices — including several at last year’s IFA show.

The Surface Pro 4 has also been mentioned in previous rumors, but not in much detail, although there have been reports production was gearing up for an October launch — adding weight to these latest stories. The mobile products may be joined by the Microsoft Band 2, the follow-up to the original Band, which didn’t attract the most positive reviews. There are no details on how the sequel may change.

How about those surprises? An intriguing rumor about a Surface smartphone seems to fit in well with the October event theme, and would make it a highly mobile-centric gathering. However, exactly how a Surface phone would sit alongside Microsoft’s Lumia-branded phones isn’t clear. There’s no doubt its arrival would be a surprise, though. Additionally, The Verge mentions the possibility of “additional Surface hardware” at the event, which also ties in with talk of the phone. Plus, although the project was cancelled by Microsoft last year, there’s an outside chance the Surface Mini tablet may rise from the dead.

There’s no date or official confirmation of the event yet, but we’ll keep you informed.
Read more ...

Thursday, August 20, 2015

ET deals: Dell 24-inch quad HD IPS monitor for $288, isn't it?


If you’re looking for an affordable monitor that look great no matter where you are sitting, take a look at this 24-inch IPS monitor from Dell. With plenty of ports, ultra-wide viewing angles, and an anti-glare coating, this high-res monitor will work well in nigh-on any setting without putting a hurting on your wallet.
  • Dell 24-inch quad HD IPS monitor for $287.99 with a $100 eGift card (List price: $369.99 — Coupon code: L92VM74?PXTML5)
Dell Monitor  So, what about the specs? The 24-inch P2416D monitor benefits from in-plane switching, an anti-glare coating, a 60Hz refresh rate, a 178 degree viewing angle (horizontal and vertical), a 1000-to-1 typical contrast ratio, an 8ms typical grey-to-grey response time, and a quad HD resolution of 2560×1440 — over 1.6 million more pixels than full HD.

And as for connectivity? This model has an HDMI 1.4 port, a VGA port, and DisplayPort 1.2. So, if your device only supports DVI or mini DisplayPort, you’re going to need an adaptor. Thankfully, Monoprice and Amazon sell adaptors at extremely low prices, so you’ll definitely be covered. And with the four USB 2.0 ports on the bottom, you can connect your keyboard, mouse, and other peripherals without digging around in the dark behind your PC.
Normally, this monitor retails for about $370, but Dell is currently selling it directly for just $319.99. When you use coupon code “L92VM74?PXTML5” during checkout, you’ll immediately save an additional 32 bucks. And thanks to the bonus $100 eGift card, you’ll be saving even more down the road.

Our commerce group sources the best deals and products for the ET Deals posts. We operate independently of Editorial and Advertising and may earn a percentage of the sale, if you buy something via a link on the post. If you are interested in promoting your deals, please contact us at commerce@ziffdavis.com.
For more great deals head over to TechBargains.
Read more ...

Is Apple finally making a 12.9-inch iPad Pro?


Apple is it company about amazing electronich product of design, now they will modified product this Is Apple finally making a 12.9-inch iPad Pro? As we know For as long as the iPad has existed, the rumor mill has been obsessed with Apple changing the screen size. While 2012 saw the release of the 7.9-inch iPad Mini to better compete against the 7-inch Android tablets, we’ve yet to see the iPad grow in size. But if the latest rumor is to be believed, that’s about to change in the next couple of weeks.
Yesterday, word started to spread that Ming-Chi Kuo, an analyst at KGI Securities, believes Apple will begin manufacturing a 12.9-inch iPad Pro model in the next two months. More interestingly, Kuo seems to think that Apple will be contracting with Cheng Uei to make styluses that work with the Force Touch technology seen in the Apple Watch. Say goodbye, Cintiq!

               Styluses
            Image credit: Cspurrier
Hot on the heels of yesterday’s rumor, Digitimes supposedly has details regarding the iPad Pro’s display as well. Sharp is lined up to make the displays, and a Foxconn subsidiary will handle both the touch sensors and the assembly process. Meanwhile, Samsung and TPK will serve as secondary component suppliers.
So far, rumors point to September or October for a full-scale production ramp-up with an estimated four-to-five million iPad Pros being made by the end of the year. As for the release window, the fourth quarter of 2015 is all we know. In the last couple of years, new iPads have shipped around late October or early November, so these estimates seem to make sense. Presumably, Apple would want to get all of its new models on shelves before Black Friday.

Earlier this year, Apple revealed that iOS 9 will allow for true side-by-side multitasking. While it’s still not as flexible as a full-fledged PC operating system, this move makes a lot of sense when you assume that Apple is trying to reach high-end users. With a potential for pressure sensitivity and a 2048×2732 resolution, the iPad Pro could easily become the standard for creative professionals. When I was in art school, our labs were stocked with Power Macs. In a few years, everyone just might be working on iPad Pros instead.
The iPad Pro would be made for the professional market — that’s the take-away here. If these rumors are true, this 12.9-inch iPad won’t be intended for browsing in bed like the other iPads. Undoubtedly, a high-end model like this supposed iPad Pro would be a pricey tool for designers, artists, and maybe the corporate types who only want the most expensive gadgets. The standard 9.7-inch and 7.9-inch iPads will most certainly continue to be produced and marketed for typical consumers.
As always, you need to treat this rumor with a mountain of skepticism. There’s no guarantee that we’ll ever see a 12.9-inch iPad, so don’t get excited until we hear official word from Tim Cook. After all, popular rumors often turn out to be completely wrong.
Read more ...

Wednesday, August 19, 2015

The amazing DDoS attacks hits record numbers in Q2 2015

The amazing DDoS attacks hits record numbers in Q2 2015
Data is someting of important in digital society. The number of distributed denial of service attacks in the second quarter of 2015 has hit record highs according to the latest State of the Internet report from Akamai. DDoS attacks grew seven percent since the last quarter and a staggering 132 percent compared to this time last year. In the quarter there were also 12 attacks that were categorized as "mega attacks," peaking at more than 1,000 gigabits per second (Gbps) and 50 million packets per second (Mpps).

Very few organizations can defend against these kinds of attacks, said the report. Mega attacks have become more frequent, increasing from last quarter's report but not as high the 17 recorded in Q3 2014.
The biggest DDoS attack recorded in the quarter lasted for over 13 hours at 240 Gbps a second. Attacks typically last about one to two hours.


One thing that has remained constant compared to the last report is China. The country is marked once again as the top source for producing DDoS attacks. The US and UK came in second and third as sources of attacks.

Online gaming networks have become the most frequent target for DDoS attacks and have been the number one target for over a year, added the report. They are the victims of 35 percent of DDoS attacks. Telecoms were another prime target.

"The threat posed by distributed denial of service (DDoS) and web application attacks continues to grow each quarter," said Akamai's John Summers, VP of the Cloud Security Business Unit, Akamai. "Malicious actors are continually changing the game by switching tactics, seeking out new vulnerabilities and even bringing back old techniques that were considered outdated."

DDoS attacks have become a common means for cybercriminals to distract a target's security, said Akamai's senior security advocate Martin McKeay. Most recently UK-based phone carrier Carphone Warehouse was targeted with DDoS attacks while hackers stole millions of customers' data.
Read more ...

Tuesday, August 18, 2015

Banning Encryption Won't Help Beat IS Threat,What to Do?


Banning Encryption Won't Help Beat IS Threat,What to Do?
Open, because they push their propaganda and highly produced videos out through very public channels: Twitter, YouTube and JustPaste.it The excellent investigation by Stuart Ramsay, Sky's chief correspondent, into Islamic State, shows their open and closed approach to technology. The group has a huge and co-ordinated social media presence, as Sky News first reported last summer. That raises the group's profile and fires the frustrated imaginations of young people previously unradicalised. Closed, because when that person decides to go a step further, they are invited off the open web, and on to encrypted messaging services.

From plain sight into dark corners. That creates a problem for security services, who say they can't track chats on encrypted messaging services. They include WhatsApp, the most popular messaging app in the world with more than 800 million users. David Cameron has asked: "In our country, do we want to allow a means of communication between people which we cannot read?" In another speech he added: "We just want to ensure that terrorists do not have a safe space in which to communicate." The so-called Snooper's Charter, or Investigatory Powers Bill, is due to be presented by Theresa May this autumn and is expected to address encryption.The problem is that encryption doesn't give just terrorists a safe space in which to communicate.

It gives us all a safe space to communicate. And communication includes things like our online banking and shopping, our personal details. Any attempt to weaken encryption makes us all a bit more unsafe, to hackers, fraudsters and identity thieves, and it would weaken our thriving digital economy.
The hack of the US Office of Personnel Management revealed the most intimate details of millions of US citizens. There's no reason to think equivalent UK systems are any safer. So what to do? A ban on encryption simply won't work: the genie is out of the bottle, and the technology widely available. It will hurt only law abiding citizens, not terrorists. Cybersecurity experts and the UN have all warned against banning or weakening encryption, on technical and on human rights grounds. Stuart's investigation points to a solution: months of painstaking work, skilled infiltration and forensic analysis yielded real, useful information.

Safe spaces can be made unsafe for terrorists by traditional spycraft and what intelligence agencies call 'computer network exploitation' – hacking, to you and me. The threat is real, as technology constantly evolves. So must the techniques of the security services. Banning encryption would instead be a step backwards.
Read more ...

How hackers hijack the net's phone books,What To Do?

How hackers hijack the net's phone books
Hackers in the world everywhere anytime to spy our activites do it,like that Online services that charge to kick people out of games or bombard websites with data have been put out of action by PayPal and security researchers.The payment firm and the experts worked together to identify the accounts used by so-called "booter" services,They are thought to carry out hundreds of thousands of attacks each year and charge up to $300 (£200) a month.
Research suggests the action cut the number of active booter services by about 90%.
The booting services use many different ways to batter sites with data but have joined with many other cyber criminals recently in abusing art of the net's net infrastructure - the Domain Name System (DNS).
This acts like a phone book and translates the website names people use into the numeric equivalents that computers are happy with.
So when you type bbc.co.uk, DNS translates that into 212.58.244.18 so your browser can find the page.
"DNS underlies everything you do on the internet," said Neil Cook, chief technology officer at security firm Cloudmark. It is used billions of times a day to make sure you reach the site you are looking for.
Its very usefulness has made it a tempting target for criminally-minded hackers, said Mr Cook, especially because few firms see it as a potential attack vector.
"Most people just see it as plumbing," he said. "They don't see it as a security hole."
A 'rogue' operator was using DNS as a way to cut the cost of using the web overseas
But it is, he said. An attacker that can subvert the DNS system has total control over the data emerging from a company, internet service provider (ISP), home or phone.
Cloudmark was alerted to its potential for trouble by one of it customer, a mobile operator that noticed a massive jump in the amount of data being sent to its DNS servers.
This was odd because the typical DNS query does not involve much data - a simple query and response. There was no good reason why, suddenly, far more data was being sent to those computers.
Closer inspection revealed the culprit. "It was a rogue operator," said Mr Cook. "It had installed software on user's handsets so it did not have to pay roaming charges."
The rogue was outside the UK and was funnelling customers data via DNS so it did not have to travel over the main mobile network and be paid for.
At its fastest, DNS can move data around at about 200 kilobits per second - much slower than most mobile networks. But, said Mr Cook, the fact that users paid nothing to browse the web overseas offset the inconvenience.

source: http://www.bbc.com/news/technology-31603930
Read more ...

The Amazing Of Bitcoin could split in debate over currency's future

The Amazing Of Bitcoin could split in debate over currency's future

A row over changing the software that produces bitcoins could split the virtual currency, core developers say.
Bitcoin XT, a new version, is currently being recommended by the currency's chief scientist, Gavin Andresen.
And its developer, Mike Hearn, says its adoption essential to ensure the currency can cope with growing demand.

But some, including a large number of bitcoin miners in China, are resisting XT because of how it might affect control over the currency. Bitcoin's blockchain - a digital ledger of all transactions made with the currency - is currently made up of 1MB blocks. Bitcoin XT would enable these blocks to grow to 8MB.
But this would mean XT was no longer compatible with existing Bitcoin software, creating, its detractors say, two separate currencies and eroding trust in both. Mr Hearn told the BBC the Bitcoin community's reaction to the release of the XT software at the weekend had been mixed, but there were some encouraging signs.
"We've gone from zero people running the software to 10% of the network in 72 hours, which is really good," he said

Consensus on consensus

But many are unhappy the core development team at Bitcoin is currently in disagreement over whether Bitcoin XT is right for the future of the currency. A pool of large Chinese mining groups, for example, have said they will not adopt the software unless it is unanimously adopted by the core team. Mr Hearn said he had decided to force the issue in order to overcome the stalemate. "If you look at the guys working on the Bitcoin core, they talk about consensus all the time - but if you ask them what they really mean, they can't tell you," he said.  "There is no consensus about what consensus means." Mr Hearn acknowledged, however, the reduced control developers had under XT would mean they would have to split the currency a second time if they were unhappy with future decisions. If we go off the rails and do things that aren't in the best interests of the community, then the solution is fork it again," he said. Dr Vili Lehdonvirta, at the Oxford Internet Institute, said the adoption of Bitcoin XT would mean "the community has much fewer guarantees of being listened to". "Those algorithms are made by humans and whoever writes them gets to have power over the system," he told the BBC. Dr Lehdonvirta added increasing block size could potentially make Bitcoin less accessible. "Downloading the whole blockchain is already such an effort that most people choose not to run Bitcoin on their computers," he said."This would put Bitcoin on a trajectory where that problem is exaggerated."
Read more ...

Google's modular Ara phone delayed,Why?

Google's modular Ara phone delayed
Google has delayed its plans to trial its modular smartphone concept, that is Google's modular Ara phone delayed, codenamed Project Ara. The first Project Ara hardware was due to be trialled in Puerto Rico this year, but has been pushed back to at least 2016. The trial will take place in a new location in the US, the Project Ara team said via a series of tweets. The team blamed "lots of iterations" in the design, which was first shown off in 2013, for the delay. Project Ara is Google's intriguing attempt at creating a smartphone that comes in bits. It means certain components can be added or taken away without the need for intricate alterations to the phone. It would potentially mean smashed screens or worn batteries would be less costly to replace - as well as allowing others to create bespoke hardware for specific tasks. Google had planned to offer around 20 to 30 different modules for the Puerto Rico trial. In a series of tweets, the team told followers that "#Project Ara isn't going anywhere", but said it had been set back by "Lots of iterations… more than we thought". 

 The first public demonstration of the technology, at Google's I/O developers conference in May, was well-received. Writing on a forum for developers interested in working on Project Ara, San Francisco based designer Garrett Kinsman said he felt a "sense of overwhelming sadness" at the delay.

 

Read more ...

Monday, August 17, 2015

Do video game make people violent??

Do video game make people violent?

More than 200 academics have signed an open letter criticising controversial new research  about video game make people violent, suggesting a link between violent video games and aggression. The findings were released by the American Psychological Association. It set up a taskforce that reviewed hundreds of studies and papers published between 2005 and 2013. The American Psychological Association concluded while there was "no single risk factor" to blame for aggression, violent video games did contribute. "The research demonstrates a consistent relation between violent video game use and increases in aggressive behaviour, aggressive cognitions and aggressive affect, and decreases in pro-social behaviour, empathy and sensitivity to aggression," said the report. "It is the accumulation of risk factors that tends to lead to aggressive or violent behaviour. The research reviewed here demonstrates that violent video game use is one such risk factor." However, a large group of academics said they felt the methodology of the research was deeply flawed as a significant part of material included in the study had not been subjected to peer review. "I fully acknowledge that exposure to repeated violence may have short-term effects - you would be a fool to deny that - but the long-term consequences of crime and actual violent behaviour, there is just no evidence linking violent video games with that," Dr Mark Coulson, associate professor of psychology at Middlesex University and one of the signatories of the letter told the BBC. "If you play three hours of Call of Duty you might feel a little bit pumped, but you are not going to go out and mug someone." The question about whether violent games inspire violent behaviour "in real life" is a subject that strongly divides opinion.
Read more ...

Sunday, August 16, 2015

Samsung Officially Launches Most Powerful Flip Phones

 Samsung Officially Launches Most Powerful Flip Phones
SEOUL - While public attention was drawn after the launch of the Samsung Galaxy S5 and S6 Edge +, Samsung quietly officially launched a new series of flip phones in China, the mobile phone with model number SM-G9198. The cell phone has passed the certification body of mobile phones in China, namely TENAA.
Citing Phone Arena on Saturday (08/15/2015), the latest Samsung flip phone comes with two screen Super AMOLED 3.9-inch resolution of 768 by 1280 pixels. The second screen is protected by Corning Gorilla Glass 4, the same as the Galaxy series Note5 or Galaxy S6. For the kitchen runway, the handset is powered by Qualcomm Snapdragon hexa-core processor 808 is paired with 2GB of RAM.
Powered by hexa-core Snapdragon processor makes the phone SM-G9198 lined up to be a flip phone with a most formidable current specifications.
Other specifications include 16 MP main camera with aperture f / 1.9, 5 MP secondary camera, internal memory of 16 GB which can still be expanded, 4G LTE connectivity internally, and a 2020mAh battery. On the software side, the phone SM-G9198. Samsung Lollipop running Android OS 5.1.1, the latest version of Android.
Officially launched in China, it is unclear whether the series of flip phones Samsung SM-G9198 will be launched also outside the region. Flip phone itself is still in great demand in many parts of Asia, namely Japan, in addition to Samsung, the other South Korean companies, namely LG also released a flip phone Wine.
Read more ...

The Jeans can for Smartphone Charger

The Jeans can for Smartphone Charger
CALIFORNIA - A company called Joe's Jeans producing The Jeans can for Smartphone Charger that allows users to charge their mobile phones through the jeans pocket.
Citing the page Cnet, Sunday (16/08/2015), which was given a jeans brand HELLO thin battery that has a pocket sewn on the back near the waist along with tambahahan smartphone pocket located on the right side back pocket. Joe's Jeans jeans hopes users will be able to walk around while charging their mobile phone without the need to bother.
For now HELLO jens only available for women only, it is because a bag or pocket jeans in women is considered more likely to keep the phone and battery. Jeans are expected to be favored by fashion fans who are also tech-addicated.
Each pair of jeans will be sold at a price that may be more expensive than pants in general.
HELLO jeans priced at USD189 or approximately 2.6 million. Make sure the phone's battery is also in accordance with the size of the pockets of jeans.
The battery can be charged via the mobile phone one of which is the iPhone battery measures 70 inches. Pants maker also provide the battery, and the user can purchase a USB iPhone battery along with the price of USD49.
Read more ...

Fingerprint System Android Smartphone Not be safe in Apple?

Fingerprint System Android Smartphone Not be safe in Apple
SEOUL - The annual conference called The Black Hat Security offers the opportunity for hackers to gather and share experiences on the series of smartphones which they are most vulnerable infiltrated. From there, it was revealed that the framework fingerprint turns Android potentially vulnerable to a myriad of hacking.
As reported Phone Arena, Thursday (08/06/2015), one of the most vulnerable Android system is the Android mobile payments using fingerprint authentication. Inversely with security features finger at Apple that Fingerprint System Android Smartphone Not be safe, the Apple's Touch ID, which is considered more secure.
The fingerprint scanner lately been used for the authentication of payment, the idea that a hacker could get into the system is certainly very scary. In addition, researchers from China, Tao Wei and Zhang Yulong, even called if an attack is much history on the fingerprint sensor on Android smartphones can be used by hackers to spy on and used to steal the actual fingerprint data.
In contrast to Android, Apple's Touch ID actually said to be more secure because it does not divulge vital information without key crypto fingerprint. So in this case the hacker does not have access to the Touch ID, important details remain locked users as they should.
However, Android users do not need to worry too much about it because the Original Equipment Manufacturer (OEM) has been noticed.
OEM aware of these defects and most immediately corrected by the update fixes without too much fanfare. So if the user keep up-to-date, meal will be protected from hacker attacks.
Read more ...

How to Avoid Attacks Hackers Steal of Data via SMS

 How to Avoid Attacks Hackers Steal of Data via SMS
CALIFORNIA - Some time ago the attention of a number of the issues about keep off Attacks Hackers taken up in the Android operating system vulnerable to hacker attacks. The threat is called Stagefright.
Hacker works by sending MMS via SMS text message to the client application the user had. The danger, if they succeed, automatically user data can be copied, deleted, and even mobile phone functions could be taken over.
How do I fix this? Quoting from Twilio, Wednesday (05/08/2015), you can turn off the feature retrieve MMS text messaging client features.
If you use Google Hangouts as an SMS client, then how to turn it off is to go to the settings menu and select SMS, then turn off the auto-retrieve.
However, if you use the default SMS application service smartphone (Samsung SMS app) or congenital Google messager service, the same steps can also be applied.
First, go to the settings menu on your SMS client application. Then select more settings and enter the multimedia messages. After that, turn off the auto-retreive.
Read more ...

Windows 10 Will Block Software Pirated


Windows 10 Will Block Software Pirated
CALIFORNIA - The latest update Windows 10 will block pirated software installed by the user. According to a report from PC Authority, the latest update of Windows 10 EULA (End User Licence Agreement) revealed that Microsoft can keep you from using pirated software (pirated).
Reported Itproportal, Saturday (08/15/2015), besides blocking the software, the company can also keep you from using unauthorized peripherial device. Thus, when a user wants to use Windows 10, then the user can not have pirated software or 'unauthorised hardware'.
"We automatically check the version of your software and download software updates or configuration changes, including preventing you from accessing the service, playing fake games, or using unauthorized hardware," Microsoft wrote.
Reportedly, the user also needs to update its software in order to still be able to use the services of Windows 10.
Microsoft officially announced the presence of Windows 10 in Indonesia. Indonesia including in the 190 countries that got free upgrade for users of PCs and tablets based on Windows 7 and Windows 8.1 original.
Claimed as Windows with the best security level, Windows 10 will continue to deliver security services and innovations that will continue to be updated automatically.
Windows 10 will be available for a variety of devices, ranging from PCs, tablets, smartphones, Raspberry Pi, Xbox One, Hololens, and much more.
Read more ...

Android name M will be revealed in a Time Near

Android name M will be revealed in a Time Near

Since Android name M was first exhibited in the title of Google I / O 2015 in May this year, Google has yet to name a 'decent' newest Android OS. Until now, they still refer to it as the new OS Android M.
But in the near future, Google is likely to soon change the name of Android M, like previous versions of Android, such as KitKat, Lollipop, Jelly Bean, and so on, as quoted from Phone Arena on Sunday (08/16/2015).
This news comes from a video released by Nat & Lo on YouTube. In the video it is said that Google will reveal the real name Android in August 2015 M's.
Nat & Lo is two Googlers - a reference to Google employees - who used to publish the activities at the headquarters of Google, which rarely revealed to the public on a regular basis, such as once a week.
And they upload a new video group contains the names of the previous version of Android, from Cupcake to Lollipop. They also wrote a number of names that will be possible with version 5.2 of Android is.
Marshmallows namely, milkshakes, muffins, Maple Syrup, Marzipan, macaroon, M & M, Moon Pie and others. Then it closes with the question, "So what is the name for the 'M'?" Perhaps this question will be answered when Nat & Lo upload video.


Read more ...

Saturday, August 15, 2015

Pentagon computer burglarized Russian Hacker

Pentagon computer burglarized Russian Hacker
the US government was forced to turn off the email system used in the Pentagon computer because hackers compromised network. Email system is used by the US Department of Defense joint staff with offices in the building.
Cyber ​​attacks that occurred on July 25 last and affecting some 4,000 people, both civilian and military, who worked at the Joint Chief of Staff. And since then the US Department of Defense was forced offline-right clicking the email system.
A source said that the cyber attacks were believed to come from Russia, and to use an automated system that suck up huge amounts of data from email systems. Then the data is distributed to thousands of other accounts in cyberspace.
The same source also mentions that the Russian hackers using social media to coordinate with each other. Although not clear whether the attack was carried out by the Russian government or individually.
But certainly, when seen from the massive attacks, the US government's unnamed alleged that the attack may be done by the government, quoted by CNBC, Monday (08/10/2015).
Fortunately burglarized email system was not used to transmit confidential data. And the US government call no confidential information is leaked in the attack.
Read more ...

Tuesday, August 11, 2015

what is it with Google spells out focus on future with Alphabet?

today in this of new news about Google spells out focus on future with Alphabet. As far as bids for immortality go, it must already be the most lucrative in history. Larry Page’s restructuring of Google under a new umbrella called Alphabet – in a way designed to ensure both its longevity and his own – delivered an instant $28bn boost to the company’s stock market value.
As Wall Street and Silicon Valley processed what was a genuine shock to an industry long accustomed to leaks, analysts and pundits grasped for deeper meaning in the dull details of a corporate reshuffle.
Even before they are told how much the company has been spending on drones and hi-tech contact lenses, shareholders effectively celebrated the prospect of having a better idea of what is going on at their company. Under Alphabet, businesses that were valued negatively as part of Google are worth closer to zero, according to Wall Street, so the shares jumped.
The move was announced to investors, in Google’s traditional style, as a fait accompli. But while Page and other senior executives exercised the special power their shares hold, the age of Alphabet will be seen in some quarters as a concession to the market.
Until recently, Google’s shares were flat-lining while the wider technology sector boomed. Disquiet on Wall Street at Page’s apparent focus on sci-fi projects was growing, as analysts and investors questioned how the company would remain at the heart of the consumer internet.
At the same time, the company was suffering a brain drain. Amid the sluggish share price performance, some of Google brightest minds were being tempted by start-ups.
Read more ...

Monday, August 10, 2015

police departments are using Pinterest, why??

Pinterest is mostly known for its audience of moms and hipsters

Pinterest is mostly known for its audience of moms and hipsters.

But the hub of great ideas like homemade oreos, strawberry santas and dog halloween costumes is attracting new crowds including police.The Dover Police Department launched a Pinterest page Monday. Currently, they have photographed and uploaded 33 pictures of lost and found items.As an overwhelming amount of property is recovered, Corporal Mark Hoffman, the public information officer at Dover, said that it gets harder to reach out to people. As people move in and out of towns, either for festivals and concerts or permanently, it proves difficult to track them down. Especially since most people use cell phones that are not listed.Their Pinterest page already has 333 followers but you do not need to have a Pinterest account to access the posts.
"One user followed our Facebook account. She went to our Pinterest page from our post, and spotted something her friend had lost. She then went back to the Facebook page and tagged her friend in a comment on the post saying 'Hey, I think they found your bag!'" Hoffman told CNNMoney. While claiming items, people will have to produce one of more of the following: government issued ID, proof of residency and proof of purchase of item receipt or serial number). For electronic items, people may have to log in to the device in front of a witness at the police department to reclaim it. To maintain privacy, the department blurs out personal informations in all forms of ID it displays with the recovered wallets. All 33 photos currently on the page took around half an hour to take photos of and another 20-30 minutes to edit combined.
"It seems like a lot of work but, to me, it's not. It's worth the effort to reunite people with their personal items," Dean Anderson, the evidence technician at the department, told CNNMoney. "You have personal IDs, kids' photographs, and you might find it personal and would like to have that stuff back." Anderson added that in just two days of active use, they had already managed to return two items to their rightful owners. The department is not following strict guidelines-- they plan to upload images as and when their jobs allow them to work on this additional feature. What happens when items are not claimed? According to the Dover Police's practices, they intend to destroy the items after a year if they remain unclaimed. Hoffman said the department chose Pinterest over other social media because of it's neat layout and it's easy to pin, unpin and delete items as they are claimed or disposed. Dover Police isn't the first to use Pinterest as a tool to advertise its lost and found items. Mountain View, California, Dallas and State College, Pennsylvania Police Departments are a few others who do the same.
Read more ...
Designed By Published.. Blogger Templates