Social Icons

twitter facebook google plus linkedin rss feed email

Featured Posts

10 Signs Your Computer Might Have a Malware Infection

Our computer is like a member of our family, when it doesn’t “feel good” or something is wrong with it, we can usually tell. We might not know exactly what is bothering it, but we have a feeling that something is wrong and we want to do everything we can to make them all better.

Who Is A Hacker? Mark Zuckerberg Explains In His Letter From The Past

The word hacker has been viewed with a bad filter that hackers always break into people’s computers. According to Facebook CEO Mark Zuckerberg, hacking is an approach to doing things quickly and testing their limits. Hacking is an active discipline, and one should focus on the quick implementation of ideas.

Sony Is Working On Mobile-to-Mobile Wireless Charging Technology

According to a recently published patent application, Sony is working on a new futuristic technique that enables wireless power exchange between various nearby consumer electronic devices, including smartphones, computers, microwave, washing machine, fridges, and TVs, without cords.

Pinterest is now blocked in China

China has blocked one of the few Western social media sites that had remained accessible to its population: Pinterest.

How To Remove User Account Password In Windows 10

Windows operating system allows you password protect your user account for obvious reasons. While we always recommend users to use a strong password for a user account, there are users who want to have a password-free user account.

Saturday, May 6, 2017

Is Wireless Technology Making Industries Safer?


We’ve been living wireless lives for a while now, with Wi-Fi now considered a necessity and cloud systems growing in popularity. While they’ve revolutionised our day-to-day lives, they’ve also made their mark on potentially dangerous environments.
Dust explosions occur in many industrial scenarios and involve the rapid combustion of fine particles. In an enclosed space, this combustion can cause major structural damage as a result of a build-up of pressure. If uncontrolled, the explosions could lead to injuries or, in the worst eventuality, death.
Before the advent of wireless technology, many companies would rely on wired explosion vent detection systems. Although these were effective, the systems needed to be hard-wired, which was often costly.
In response, rupture disc experts Elfab has designed and created GSM-Tel, a traditional explosion vent detection system with in-built GSM technology. This modern burst-detection system eliminates the need for a wired solution while still delivering instant notifications of remote explosion vent activation.
The system has been designed to interface with any of the brand’s explosion vent designs, including single, multi-layer, flat and domed constructions. The duel-channel, remote monitoring system is the first of its kind and specifically created for use in remote locations. Should an explosion occur, users will receive a customisable text message signifying panel rupture, notifying them of the incident without them needing to be adjacent to it.
Not only does GSM-Tel eliminate wiring costs, it has also resulted in reduced maintenance charges for companies. The alert system can be reused after explosion vent actuation, ensuring long-term reliability.
As technology continues to develop and we become more dependent on wireless activity across all areas of our lives, we can expect enhanced safety in the future. As you’ll agree, this is a wholly positive move for everyone connected to the sector.
Sources: techpatio

Wednesday, April 26, 2017

GHM — GNU Hackers' Meetings


Registration for the GNU Hackers Meeting 2017 is now open

The annual GNU Hackers meeting is a semi-formal meeting spanning three days and is open to all people interested in the GNU operating system. Typically, the format includes talks, seminars and discussions, as well as a chance for social interaction with maintainers, users and developers of GNU software.

GNU Hackers Meeting 2017

The 2017 GNU Hackers Meeting takes place in Germany from 25–27 August 2017.
Unlike previous years, GHM 2017 will be held away from the metropolis. Also in contrast to previous meetings, participants in 2017 need not worry about finding their own accommodation or meals. These will be arranged for you!
We shall been staying and meeting in the Knüllwald—a rural region in the centre of Germany. The environment is a low mountainous area with dense forests and relatively low population. The venue offers a typically German „gemütlichkeit“ and the seminar room all under one roof.
The programme is yet to be finalised. However we anticipate organised events to last until late afternoon. In the evening, there will be ample opportunity for impromptu talks, informal demonstrations, just chat or—if you want a break— take a walk in the forest. Many people will arrive on the evening before the first day of the meeting.

How to take part

If you want to attend GHM 2017, you need to register and pay the registration fee before the cutoff date. However, places are limited and once all have been taken, no more registrations will be accepted. The registration cost includes accommodation and all meals during the event. Any surplus goes towards subsidising future GHM events.
Attendees will be responsible for arranging their own travel to and from the venue.

How to help

The GNU Hackers meeting has a tradition of organisation by the participants, of the participants, for the participants. Currently, there are still tasks which need to be organised. In particular we need someone to:
  • Collect and review proposals for talks, and seminars.
  • Arrange the programme.
  • Introduce the speakers and their talks.
  • Organise car pooling and other travel assistance for those who need it.
  • Take care of audio/video recording of the talks.
If you would like to volunteer to take responsibility for any of these tasks, please write to ghm at gnu dot org.

About the GNU Hacker Meetings

The GNU hacker meeting is an annual event where developments in the GNU operating system are discussed and ideas exchanged. Unlike some larger events it has a friendly and welcoming atmosphere, and aims to make all participants feel at home.
Previous meetings have occurred in Bristol, Munich, Rennes, Paris and Dusseldorf.
Sources: gnu

Facebook Messenger hits 1.2 billion monthly users, up from 1B in July



Normally adding 200 million users in 8 months to a product that already has a billion would reduce the average engagement, but most apps don’t have Facebook Messenger’s network effect. Now with 1.2 billion monthly active users, “we increased engagement massively in terms of a number of messages sent per active user. We had double-digit growth percentage-wise” Facebook’s head of Messenger David Marcus tells me.
Despite its bots not living up to the hype, Messenger had another banner year. It grew just a bit slower, since last time it got from 800 million to 1 billion users in just six months. Its daily US iOS App Annie download rank is up from a year ago, though a little down from a high point in June. But Marcus says the chat app is transcending being where people “find their Facebook friends they don’t have a phone number for.” For some, it’s become “a primary communications channel.”
According to Sensor Tower, worldwide iOS and Android downloads of Facebook Messenger grew 5.66% from 145.3 million in Q1 2016 to 153.5M in Q1 2017.
Messenger’s iOS download rank is up from a year ago, but down a bit from June. It’s been fluctuating between #4 and #12 recently
Now Messenger is working to become more than just the most popular SMS replacement in the Western world.
One approach is copying what’s working elsewhere. Marcus says the app’s Snapchat Stories clone Messenger Day is off to a good start. “Usage with teens is much higher” than some might have expected, “which is cool,” Marcus says. “We’ve built a product that teens use on Messenger!” It’s very distributed. It’s going reasonably well. The participation rate is very good compared to our best Stories product” he notes, alluding to Instagram Stories.
Messenger Day has a big opportunity since its host app has twice as many people on it as 600 million-user Instagram. Yet at least amongst writers at TechCrunch, Messenger Day hasn’t quite taken off. Maybe we’re just old.
Messenger also added a Snapchat-esque camera with funky animated selfie masks and illustrated filters, as Facebook latches onto the visual communication trend. In the video, it launched copied Houseparty’s split-screen group video chat. “Group video calling is becoming a big thing with teens especially with masks and effects because it’s live” Marcus notes.
Meanwhile, Messenger is branching out beyond traditional person-to-person communication. Games have given people something to do while waiting for message replies, or a reason to start a conversation with a high score challenge. And now its opening up its artificial intelligence assistant M to provide users with suggestions of Messenger utility features they could use like location sharing, payments, stickers, reminders, and ride-hailing.
Now the question is how Messenger can make money via ads, not taking a cut of payments, without interrupting the experience. Marcus says structural changes to the app coming at F8 should provide it with new opportunities in this realm. It’s tested sponsored messages from companies you’ve already talked to, and a carousel of ads in the inbox. And it’s driving revenue back on Facebook with News Feed ads that start a Messenger conversation with a product sales rep or bot when clicked.
Yet even if Messenger doesn’t start churning out cash, it’s contributing massively to Facebook’s success by locking people into its ecosystem. At a time when chat has emerged as the center of the mobile universe, and Facebook’s biggest competitor Snapchat is rooted in private communication, Messenger has fortified the blue app kingdom.
Sources: Techcrunch

Tuesday, April 25, 2017

The godfather of ransomware returns: Locky is back and sneakier than ever


The ransomware that drove last year's boom in file-encrypting malware is back, and this time it's even harder to detect.
Ransomware cost its victims some $1bn during 2016, with Locky one of the most widespread variants, infecting organisations across the globe.
However, the start of 2017 saw a sudden decline in the distribution of Locky, to such an extent that another form of ransomware -- Cerber -- has usurped Locky's dominance.
But after being all but written off, Locky is staging a comeback. Cybersecurity researchers at Cisco Talos have observed a surge in emails distributing Locky, with over 35 thousand emails sent in just a few hours. This surge in distribution is being attributed to the Necurs botnet, which until recently focused on spamming pump-and-dump stockmarket scams.
This time, however, the Locky campaign is harnessing an infection technique associated with the Dridex botnet, in an effort to boost the chance of compromising targets.
As noted by cybersecurity researchers at PhishMe, this new form of Locky begins by using a familiar tactic -- a phishing email with an attached file the message claims is a document detailing a payment or scanned documents. But rather than the more common practice of attaching a compromised Office document, an infected-PDF is sent instead.

It's not the first time this technique has been used, with infected PDF documents commonly used to distribute the Dridex malware botnet. Cybersecurity researchers say Locky is leveraging PDF documents for one simple reason: more cyberattackers are exploiting Office macros to distribute malware, raising awareness of potential threats.
Upon opening the infected document, the victim is prompted to give the PDF reader permission to open a second file.


This second file is a Word document that asks for permission to run macros, which it uses to download the Locky ransomware. This two-step infection process is a simple evasion technique, but increases the chances of victims installing ransomware.
The Locky payload still operates much as it always has, seeking out and encrypting critical files on victims' machines and demanding a Bitcoin ransom in exchange for restoring the system.
One difference from previous Locky versions is that the ransomware asks victims to install the Tor browser in order to view the ransom payment site, which researchers suggest is down to Tor proxy services frequently being blocked and the burden of maintaining a dedicated Tor2Web proxy site.
Currently, this version of Locky is demanding a ransom of one Bitcoin, which equates to $1200, €1100 or £935. It's a much more ambitious ransom demand, but cybercriminals are aware that many organisations are willing to give in and pay to avoid losing business-critical files.
Ransomware has become one of the biggest menaces on the web. A ZDNet guide contains everything you need to know about it: how it started, why it's booming, how to protect against it, and what to do if your PC suffers an attack.
Sources: ZDnet

Google Play Awards 2017 Nominees Announced, Check out the Best of Play Store


Every year Google holds the Google I/O conference for the developers. At the event, the tech giant also recognises the contribution of developers to the apps platform. Google nominates the best apps in the Play Store, and it has already unleashed the nominees for Google Play Awards 2017. The winners shall be announced at the main event.
The apps have been selected by Googlers and are divided into 12 categories, right from the Best Android Wear Experience to the Best Multiplayer Game. Every category has its own eligibility criteria ranging from high star rating to overall technical performance. Another criterion is that whether the app has received a major update in the preceding year. Google states that nominees were chosen “much like last year by cross-functional teams throughout Google who work hand-in-hand with the relevant categories and product areas.”
Click here to access the nominations list and download the apps.
Other than grabbing top placement on the Play Store, the winning app developers will be getting a physical trophy from Google.
By announcing the nominees, Google also tells us about the apps that have performed outstandingly throughout the year. An excellent way to make users try out these apps in case they haven’t. Take a look at the list of nominees and install the apps that look interesting to you. These apps are supposed to be awesome, which is why they made it to the nominations, right?

Without further ado, we present to you the list of nominees for Google Play Awards 2017.

Google Play Awards 2017
Standout Indie
  • Causality
  • Kingdom: New Lands
  • Mars: Mars
  • Mushroom 11
  • Reigns
Standout Startup
  • CastBox
  • Digit
  • Discord
  • HOOKED
  • Simple Habit
Best Android Wear Experience
  • Bring!
  • Foursquare City Guide
  • Lifesum
  • Runtastic Running & Fitness
  • Seven
Best TV Experience
  • Abema TV
  • Haystack TV
  • KKBox
  • Netflix
  • Red Bull TV
Best VR Experience
  • Gunjack 2: End of Shift
  • Mekorama VR
  • The Arcslinger
  • The Turning Forest
  • Virtual Virtual Reality
Best AR Experience
  • Crayola Color Blaster
  • Dinosaurs Among Us
  • Holo
  • Wayfair View
  • WOORLD
Best App for Kids
  • Animal Jam – Play Wild!
  • Hot Wheels: Race Off
  • Teeny Titans
  • Think! Think!
  • Toca Life: Vacation
Best Multiplayer Game
  • Dawn of Titans
  • FIFA Mobile
  • Hearthstone
  • Lords Mobile
  • Modern Strike Online!
Best App
  • Citymapper
  • Fabulous
  • Memrise
  • Money Lover
  • Quik
Best Game
  • Choices
  • Fire Emblem Heroes
  • Lineage 2 Revolution
  • Pokémon Go
  • Transformers: Forged to Fight
Best accessibility Experience
  • A Blind Legend
  • Eye-D
  • IFTTT
  • Open Sesame
  • Swiftkey Symbols
Best Social Impact
  • Charity Miles
  • Peek Acuity
  • Prodeaf
  • Sea Hero Quest
  • ShareTheMeal
Click here to access the nominations list and download the apps.
Sources: wccftech
Related Posts Plugin for WordPress, Blogger...
 

Google Analystic