new Ads

Showing posts with label NEWS-TECH. Show all posts
Showing posts with label NEWS-TECH. Show all posts
Fileless Malware: Why You Should Care

Fileless Malware: Why You Should Care

https://www.technewsworld.com/article_images/story_graphics_xlarge/xl-2017-malware-1.jpg

It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? While that strategy might have worked well in the days of the Pony Express, attempting it in now would be out of touch and inefficient.
This is an intentionally extreme example to make a point: Criminals adapt to keep pace in the same way that organizations adapt. With a veritable renaissance in technology use under way, criminals have been advancing their methods of attack just like organizations have been advancing their methods for conducting business.
One of the more recent developments in attacker tradecraft is so-called "fileless malware." This trend -- which emerged a few years ago but gained significant prominence in late 2016 and throughout 2017 -- refers to malware that is designed specifically and architected to not require -- or in fact interact with at all -- the filesystem of the host on which it runs.
It is important for technology pros to be alert to this, because it impacts them in several different ways.
First, it alters what they should watch for when analyzing attacker activity. Because fileless malware has different characteristics from traditional malware, it requires looking for different indicators.
Second, it impacts how practitioners plan and execute their response to a malware situation. One of the reasons attackers employ this method is that it circumvents many of the techniques that typically are employed to mitigate attacks.
However, there are some things practitioners can and should do to keep their organizations protected.

What Is It?

Also sometimes referred to as "non-malware," fileless malware leverages on-system tools such as PowerShell, macros (e.g. in Word), Windows Management Instrumentation (i.e., the apparatus in Windows designed for telemetry gathering and operations management), or other on-system scripting functionality to propagate, execute and perform whatever tasks it was developed to perform.
Because these tools are so powerful and flexible on a modern operating system, malware that employs them can do most of what traditional malware can do -- from snooping on user behavior to data collection and exfiltration, to cryptocurrency mining, or pretty much anything else that an attacker might want to do to forward an infiltration campaign.
By design, an attacker employing this technique will refrain from writing information to the filesystem. Why? Because the primary defense strategy for detecting malicious code is file scanning.
Think about how a typical malware detection tool works: It will look through all files on the host -- or a subset of important files -- searching out malware signatures against a known list. By keeping clear of the filesystem, fileless malware leaves nothing to detect. That gives an attacker a potentially much longer "dwell time" in an environment before detection. It's an effective strategy.
Now, fileless malware is by no means entirely new. Folks might remember specific malware (e.g., the Melissa virus in 1999) that caused plenty of disruption while interacting only minimally, if at all, with the filesystem.
What is different now is that attackers specifically and deliberately employ these techniques as an evasion strategy. As one might expect, given its efficacy, use of fileless malware is on the rise.
Fileless attacks are more likely to be successful than file-based attacks by an order of magnitude (literally 10 times more likely), according to the 2017 "State of Endpoint Security Risk" report from Ponemon. The ratio of fileless to file-based attacks grew in 2017 and is forecasted to continue to do grow this year.

Prevention Strategies

There are a few direct impacts that organizations should account for as a result of this trend.
First, there is the impact on the methods used to detect malware. There is also, by extension, an impact on how organizations might collect and preserve evidence in an investigation context. Specifically, since there are no files to collect and preserve, it complicates the usual technique of capturing the contents of the filesystem and preserving them in "digital amber" for courtroom or law enforcement purposes.
Despite these complexities, organizations can take steps to insulate themselves from many fileless attacks.
First is patching and maintaining a hardened endpoint. Yes, this is frequently offered advice, but it is valuable not only to combat fileless malware attacks, but also for a host of other reasons -- my point being, it's important.
Another piece of commonly offered advice is to get the most from the malware detection and prevention software that already is in place. For example, many endpoint protection products have a behavior-based detection capability that can be enabled optionally. Turning it on is a useful starting point if you have not already done so.
Thinking more strategically, another useful item to put in the hopper is to take a systematic approach to locking down the mechanisms used by this malware and increasing visibility into its operation. For example, PowerShell 5 includes expanded and enhanced logging capabilities that can give the security team greater visibility into how it's being used.
In fact, "script block logging" keeps a record of what code is executed (i.e., executed commands), which can be used both to support detective capability and to maintain a record for use in subsequent analysis and investigation.
Of course, there are other avenues that an attacker might leverage beyond PowerShell -- but thinking it through ahead of time -- investing the time to know what you're up against and to plan accordingly -- is a good starting point.
Source : www.technewsworld.com
How to Back Up iPhone Data to an External Drive

How to Back Up iPhone Data to an External Drive


A recent incident reminded me of the importance of backing up one's phone regularly. Soon after carrying my recycling out to the curbside, I realized I had misplaced my 6-month-old iPhone. Cue brief panic, followed by deep concern that I'd somehow tossed my device into that transparent bag I'd left outside for the world to see.

That led me to yelling "Hey, Siri" a few times around my apartment until the familiar chime sounded, revealing my trusty phone was hiding on a stepladder underneath a coat. Phew.
I have no idea how or why I managed to leave my phone there, but had I not found it, the situation could have been much worse: It had been months since I'd backed up my data. I was lucky to escape what could have been a potential disaster caused by my absent-minded tendencies.

Save Main Drive Space

I bought my current laptop a little over a year ago and actually had some trouble managing backups at first. My partner and I use the same computer for backing up our phones, but with ever-increasing device storage capacities and solid-state hard drives still somewhat expensive, despite featuring in more and more systems, space is at a premium.
Apple demands a lot of storage for its backups, especially since it often stores multiple versions. A 256-GB hard drive to run one's system and keep data safe is just not enough anymore.
The thing is, Apple does not make it easy to sync backups to an external drive automatically. Typically, iPhone owners will plug in their devices, and Apple will create a directory on the main hard drive and stuff the backup there. That's easy, and it's probably enough for most people. Forcing iTunes to store the backup elsewhere requires a redirect trick.

Using Windows 10

Here's how I solved the problem on my Windows 10 machine. First, since I had the capacity on my current drive (but only just), I created an iPhone backup using the regular iTunes sync method to the default location, just in case any mishaps should occur. I went to the folder Apple uses to store backups, typically this one:
C:\Users\[Username]\AppData\Roaming\Apple Computer\MobileSync\Backup
You should replace [Username] with your own actual username, naturally.
You'll want to copy that folder to your desired new backup location, and then either delete the original Backup folder or rename it as "BackupOld." Then hold the shift key and click the right mouse button to open a command window. There, enter the following:
mklink /J "%APPDATA%\Apple Computer\MobileSync\Backup" "[External Drive]:\iTunes Backup"
Of course, you'll replace [External Drive] with your actual drive letter.
You can add subfolders here too if you like to keep your storage as organized as possible. So, something like this would work just fine:
E:\MyBackups\iTunes Backup
Then you can close the command prompt window, and try an iPhone backup to see if it works.

Using macOS

The steps are similar for Mac systems. You should find the standard backup folder here:
~/Library/Application Support/MobileSync/
Copy, then remove or rename the Backup folder. Then open a terminal and type this:
ln -s /Volumes/[External Drive]/MobileSync/Backup ~/Library/Application\ Support/MobileSync/Backup
Close the terminal and then try an iPhone backup to see if it works.

Better Safe Than Sorry

Even if you have a main hard drive large enough to handle your backups without any concern, shuttling your data to an external drive has its advantages. It can act as an off-system failsafe in case your computer's drive collapses beyond repair. It also frees up the main drive, which hopefully will keep your computer working snappily for a little longer.
In either case, please remember to back up your phone regularly. And maybe don't put yourself in a situation where you wonder for 15 minutes if you tossed it out with the recycling.
Source :
www.technewsworld.com


_PIMAX 4K HMD VR Headset

#TODAY_PIMAX 4K HMD VR Headset


The PIMAX headset is the first VR headset providing a 4K UHD image at a stunning resolution of 3840 x 2160 and 8.29 million pixels as the name suggests, Oculus Rift, HTC Vive and SONY PSVR are 2160 x 1200 resolution only.

gearbest, review, unboxing, aliexpress, gearbest.com, china, compras, tutorial, smartphone, gaming, xiaomi, online, importação, produtos, ita, barato, tecnologia, gear best, recebidos, como comprar en gearbest, как заказать из китая, tech, how to order from china, the most interesting parcels from china, affiliate, полезные посылки, gadgets, вскрытие, tecnofanatico, tablet, comprar, alfândega, como comprar na gearbest, seguro, como comprar na china, como, galaxy, portugal, best, paypal

Here you can see a nice look pictures from the outside:
gearbest, review, unboxing, aliexpress, gearbest.com, china, compras, tutorial, smartphone, gaming, xiaomi, online, importação, produtos, ita, barato, tecnologia, gear best, recebidos, como comprar en gearbest, как заказать из китая, tech, how to order from china, the most interesting parcels from china, affiliate, полезные посылки, gadgets, вскрытие, tecnofanatico, tablet, comprar, alfândega, como comprar na gearbest, seguro, como comprar na china, como, galaxy, portugal, best, paypal

gearbest, review, unboxing, aliexpress, gearbest.com, china, compras, tutorial, smartphone, gaming, xiaomi, online, importação, produtos, ita, barato, tecnologia, gear best, recebidos, como comprar en gearbest, как заказать из китая, tech, how to order from china, the most interesting parcels from china, affiliate, полезные посылки, gadgets, вскрытие, tecnofanatico, tablet, comprar, alfândega, como comprar na gearbest, seguro, como comprar na china, como, galaxy, portugal, best, paypal

PIMAX parameters (available on Gearbest)

Screen: higer resolution than Oculus, HTC VIVE and PS VR. PIMAX used a high performance custom-made screen, response time reach to 2.3ms, and AMOLED screen is 2.0ms.
FOV: 110°, the dual 53mm lenses enable 110 degrees field-of-view (FOV) with adjustment between 58-71mm from the eyes. This should enable good amount of space for users wearing prescription glasses.
Dizziness: 1000Hz dual gyroscope, there is an improved "anti-vertigo" double gyroscope controlled within 18ms.
Glasses: two 53mm Aspherical Lens, plus the built-in anti blue laser lens with auto light adjustment and auto demisting systems will protect your eyes.
Myopia self adaptive: its support under 500 degrees myopia naked eye watching and 58-71mm IPD, and has a headspace for those people ware glasses use VR.
Weight: 220g for the bare machine, 449g selling by Gearbest, and a comfortable medical grade sponge. So no head pressure when wearing it.
Music experience: supports Virtual 5.1 Sound Stage for immersive sound experience, and built-in microphone for communicate with others in the game.

Computer configuration requirement

System: Windows 7, 8, 10 (64-bit only)
CPU: Intel i5 equal or better processor performance
Graphics card: DirectX 3 d10 recommended NVIDIA GTX960 / AMD R9 290 equal performance or above
Memory: 4GB + RAM
Port: compatible with HDMI 1.4B video output, 2.0 / 3.0 USB interface
Finally here are photos of the complete PIMAX 4K VR:
gearbest, review, unboxing, aliexpress, gearbest.com, china, compras, tutorial, smartphone, gaming, xiaomi, online, importação, produtos, ita, barato, tecnologia, gear best, recebidos, como comprar en gearbest, как заказать из китая, tech, how to order from china, the most interesting parcels from china, affiliate, полезные посылки, gadgets, вскрытие, tecnofanatico, tablet, comprar, alfândega, como comprar na gearbest, seguro, como comprar na china, como, galaxy, portugal, best, paypal

gearbest, review, unboxing, aliexpress, gearbest.com, china, compras, tutorial, smartphone, gaming, xiaomi, online, importação, produtos, ita, barato, tecnologia, gear best, recebidos, como comprar en gearbest, как заказать из китая, tech, how to order from china, the most interesting parcels from china, affiliate, полезные посылки, gadgets, вскрытие, tecnofanatico, tablet, comprar, alfândega, como comprar na gearbest, seguro, como comprar na china, como, galaxy, portugal, best, paypal

Competition advantages

• The PIMAX 4K VR headset is a HMD which currently has the highest resolution out of all the main competitors (Vive , Oculus, OSVR), the resolution is a big jump so everything just feels better to do, games like Elite dangerous and it makes using this to watch movies a very good experience.
• The PIMAX is a very light headsets. It's very comfortable to use when wearing it.
• PIMAX supplied a high quality headphone include in the box.

Competition weakness

PIMAX is currently has no positional tracking, it's not going to support anything that requires Vive controllers or Oculus' pointer thing, but there are in terms of games, if it's on Steam and doesn't require Vive wands, it'll work with this right out of the box. That means the likes of Elite Dangerous, American / European Truck Simulator and DCS World.
SOURCE : http://www.gearbest.com/blog/products/review-pimax-4k-hmd-vr-headset-875/reviews/

Nvidia announces new ‘Nvidia’ Titan X: $1,200, 12GB of GDDR5X, shipping August 2

#new nividia


Nvidia has been launching GPUs at a rapid-fire pace this summer. The GTX 1080 and1070 debuted in late May and early June, the 1060 dropped earlier this week, and now the full-fledged Titan X is shipping by August 2. The new GPU was announced by Jen-Hsun Huang last night and sets a speed record for fast turnarounds between the launch of a new architecture and the debut of its top-end GPU. The first GTX Titan launched nearly a year after the first Kepler GPU, while the Titan X launched roughly six months after Maxwell.
Branding on the new GPU is a bit confusing. Previous Titan-class GPUs have used a secondary label, like Titan Black or Titan X. In this case, Nvidia is removing the “GeForce” branding on the GPU and calling it the Nvidia Titan X. This could prove confusing for customers, but it may also signal that this card is meant to straddle the line between Nvidia’s gaming and workstation divisions.
The new card is based on the GP102 GPU and will offer 3,584 CUDA cores at a base clock of 1417MHz and a boost clock of 1531MHz. While this is somewhat slower than Nvidia’s GTX 1080, which ships at 1607MHz / 1733MHz, the 40% increase in cores (the 1080 has just 2560) will more than offset the 12% decrease in clock. A new 384-bit memory bus gives the GPU 480GB/s of bandwidth — almost as much as what AMD debuted with its Fury X last year, but coupled to a far more powerful GPU.
Performance is said to be up to 60% faster than the Maxwell-based Titan X, but given that the 1080 is already capable of winning past that card, the performance improvement over 1080 is probably in the 25-35% range based on core counts and the other speeds and feeds. TDP on the new GPU is 250W, which is still quite svelte compared to other high-end GPUs from past generations. Unlike past Titan’s, there won’t be any third-party availability on Titan X. Nvidia will only sell the card directly through its own website without partner participation, though OEMs will still be able to order and include the card.
This is obviously as much a luxury play as anything, given that Nvidia’s GTX 1080 is meant to retail for $599 and 2x GTX 1080’s would easily outperform a single Nvidia Titan X. Many gamers prefer not to use multi-GPU configurations, however, since a single high-end GPU typically delivers better frame times and smoother performance. Low-overhead APIs have the potential to change that thanks to new methods of sharing workloads between cards, but we’ve only seen very limited support for multi-GPU in DX12 titles to date. At the same time, Nvidia may have some difficulty justifying this GPU’s price tag. Even if we assume this card is a flat 40% faster than the GTX 1080, you’d be paying 2x the cash for 1.4x the performance. Then again, people with money to burn who want the best often don’t care — and nobody who doesn’t have cash to burn buys $1,200 video cards in the first place.
There’s not much to say about competition for the Nvidia Titan X that doesn’t revolve around previous-generation Nvidia products. With AMD holding its fire at the high-end until late this year or early next, there’s nothing in the old Fury product line that can match the firepower Nvidia is bringing to the table. Async compute and better performance in DX12 has helped Fury and Nano products already on the market, but if you want top-end performance in both APIs, Nvidia’s GTX 1070 and 1080 have already cleared the tables.
Nvidia announces new ‘Nvidia’ Titan X: $1,200, 12GB of GDDR5X, shipping August 2

support: www.extremetech.com
<meta name="google-site-verification" content="NXg0thvcn297ISV_z1GUah69IDZFZAtT4yQwSe99z7w" />

Xbox One S vs Xbox One


#Xbox One S vs Xbox One
Xbox One S vs Xbox One


What's the difference between the Xbox One S and the original Xbox One? We take a closer look at how the new, smaller Xbox One S stacks up against the Xbox One. Everything you need to know is right here – including the now confirmed Xbox One S release date, plus all the pricing and spec news.

XBOX ONE S FAQ

Xbox One S release date? August 2 2016 (Now confirmed by Microsoft)
Does it support 4K? Yes, for video and Blu-ray, but not for games.
Is it more powerful? Yes, a slight boost to processing power over the Xbox One to accommodate HDR gaming.
Is a controller included? Yes, contrary to early reports, one is included in the price.

XBOX ONE S PRICE: $399/£349 FOR 2TB LAUNCH EDITION, 500GB AND 1TB MODELS ALSO INCOMCING

There are three different capacities. Prices start at $299 for the 500GB version, moving up to $349 for the 1TB and $399 for a massive 2TB.

XBOX ONE S IS 40% SMALLER, HAS BUILT-IN POWER SUPPLY

The Xbox One S is 40% smaller than the original – it's a huge reduction. Given how big the original Xbox One is – at 333mm x 276mm x 78mm, it dominates the comparatively slight PS4 – it's an important change that could entice potential buyers.
Watch Xbox One S: Everything you need to know
What's doubly impressive, however, is the power supply is now built-in. The bulky power brick on the Xbox One was a serious pain and was another con against it given the PS4 has it built-in.
So, 40% smaller and no bulky power supply? Thanks Microsoft – we like that.

4K ULTRA HD, 4K BLU-RAY AND HIGH DYNAMIC RANGE SUPPORT

This is huge. Not only does the Xbox One S support 4K video playback from streaming services like Netflix and Amazon, it also has a 4K Ultra HD Blu-ray built-in.
This is especially good news for AV fans and the announced $299/£249 starting price makes it good value compared to dedicated Ultra HD players currently on the market, which at this time cost anywhere from £400 to £650.
In fact, if you have a 4K TV, we'd argue it's a must-have to enjoy the full potential of your TV.


Facebook Releases Diversity Report – No Surprise as Minor Changes Are Reported

#Facebook’s annual diversity report only showed minor changes in hiring and diversity


Facebook has released its annual diversity report which shows slightly improved figures, and includes LGBTQ data for the first time. The report also shows Facebook committing around $15 million to Code.org to encourage interest in computer science, and the company’s TechPrep resource hub is also being taken up to communities of color across the US.
Facebook revealed that 90% of its US-based employees are either white or Asian, which represents a 1% reduction from the diversity report released in 2015. 92% of senior leadership roles are now occupied by white or Asian employees, representing a 2% reduction since 2015. More women are now involved in senior leadership roles, at 27% as opposed to 23% last year. Technical jobs have seen a 1% reduction for men, with 83% of technical jobs currently secured by men.
Black and Hispanic employees remain at the same percentage, showing no change in terms of underrepresented diversity groups. These two groups represent 3% of senior leadership employees at Facebook, while 9% of new hires were black. 5% of new hires were Hispanic. 29% of new hires for senior leadership roles were women.
According to Mashable, Facebook’s global director of diversity Maxine Williams believes there is only so much hiring initiatives can accomplish. Ms. Williams expressed her pride at Facebook’s efforts to change things, and said that the company was heading in the right direction. But she also pointed out that several employees from minority backgrounds, and women were not getting the chances they deserved in the industry. She mentioned that this was due to lack of exposure to computer science at an early age.
Facecbook has tried to remedy this with initiatives such as Facebook University, which saw the company recruit and subsequently hire 170 underrepresented group students for analytics, engineering, and business internships. TechPrep is a website that teaches programming and computer science in both Spanish and English. The website has attracted over half a million unique visitors since its launch.
According to Ms. Williams, these initiatives aim to resolve the issue of lack of awareness or interest in computer science. 18% of undergraduate computer science degrees are held by women, while black and Hispanic graduates account for 10% of these degrees. Three out of four public high schools do not have a computer science course. In a lot of states, no women or black and Hispanic people took the Advanced Placement computer science exam.
Facebook uses the diverse slate approach, which requires managers to interview at least one minority candidate. That said, the problem is present on a national level. It can be argued that this is just owing to lack of interest by minorities in the technology sector. That said, the tech industry and Silicon Valley have both long been criticized for the remarkably skewed results they present concerning women and minorities. It is a fair argument that women and minorities who were simply not exposed to computer science and related fields will end up having less of a chance of breaking into the sector.
That said, it is important to make hiring decisions based on merit. Tech giants cannot simply hire under-qualified individuals to fill quotas. But they also have to ensure that underrepresented groups, including women, get the correct exposure so that more people from that group are able to secure jobs based on merit. Facebook and Google have started releasing diversity reports to help initiate a change. It will be a while before proper change is implemented.

Facebook Releases Diversity Report – No Surprise as Minor Changes Are Reported


Twitter removes posts celebrating attack in Nice

#Twitter removes posts celebrating attack in Nice

The site acted faster than in the past to take down tweets and accounts praising the attack, according to watchdog group Counter Extremism Project.

Twitter removes posts celebrating attack in Nice
Twitter reacted to the truck attack in France last week by quickly deleting pro-attack tweets.
The attack, in which a truck rammed a Bastille Day celebration in Nice, killed 84 people and injured another 200. In the first hour following the attack, at least 50 accounts appeared on Twitter using #Nice in Arabic to praise the violence, according to watchdog group Counter Extremism Project.
"The first tweet praising the attack was released five minutes after the attack," a spokesman for the Counter Extremism Project said. "It was a profile showing the face of a French foreign terrorist fighter and a happy face."
In response, Twitter rapidly removed the celebratory accounts and tweets.
"Twitter moved with swiftness we have not seen before to erase pro-attack tweets within minutes," the Counter Extremism Project said. "It was the first time Twitter has reacted so efficiently, including Orlando last month."
Social media sites have become a resource for terrorists and others to share posts praising violent attacks. Sites such as Twitter have rules against hate speech and similar messages. But the challenge lies in finding such posts among millions and shutting down new accounts that often spring up quickly after old ones are removed.
Another challenge for social media sites is trying to determine which tweets, images and videos are celebrating such attacks and which ones are simply reporting the attacks as news. The Counter Extremism Project did find fault in Twitter's process for tracking down tweets related to terrorist activity.
"Twitter's reporting protocol is a cumbersome, multi-step process and does not have a streamlined reporting protocol specific to terrorist activity," the watchdog group said.
In May, Facebook, Twitter, Microsoft and YouTube agreed to new rules designed to fight online hate speech. The companies now promise to review within 24 hours the majority of notices about a post that may contain hate speech and to remove the post if necessary. They also share information with one another, with governments and with law enforcement about potential online abuse.
Source : www.cnet.com

UK robot cars to challenge Google

#A British firm has developed autonomous car software that could be used by a variety of vehicle manufacturers.
UK robot cars to challenge Google

Most of the high-profile work on self-driving cars has come out of the United States, where Google and Tesla have been testing their technology.
Oxford-based Oxbotica took the BBC's Rory Cellan-Jones for a drive and told him that the technology would be tested in a public trial in London this year.

German police target hate crime in co-ordinated raids

#German police have carried out a series of raids, targeting people suspected of posting hate content on social media.
The co-ordinated raids on 60 addresses were the first time the authorities had acted on this issue in such a way.
The aim is to tackle what police called "a substantial rise in verbal radicalism".
Typical crimes included "glorification of Nazism [and] xenophobic, anti-Semitic and other right-wing extremism", they said.
Holger Munch, president of Germany's federal criminal police authority, the Bundeskriminalamt (BKA) said: "Today's action makes it clear that police authorities of the federal and state governments act firmly against hate and incitement on the internet."
He said politically motivated hate crime on the internet had increased significantly in the wake of the European refugee crisis.
Last year, Germany took in up to one million migrants and refugees.
"Attacks on refugee shelters are often the result of radicalisation which begins in social networks," Mr Munch said.

Raids in 14 provinces

Much of the alleged hate speech took place in a secret Facebook group between July and November 2015, police said.
The raids were carried out across 14 German provinces, involving 25 police departments.
Incitement of racial hatred is a crime under German law and a person can be jailed for up to five years in a case of inciting "hatred against a national, racial, religious group or a group defined by their ethnic origins".
Facebook, Twitter and Google have all come under fire in Germany for failing to remove hate speech from their platforms promptly.
Under pressure from the German authorities, the three tech firms agreed at the end of last year to delete such speech from their services within 24 hours.
Facebook also agreed to a series of further measures including:
  • Partnering with a German group of multimedia service providers to solve the problem
  • Launching a task force to deal with hate speech on the internet
  • A campaign to promote "counter speech" in German, drawing in experts to develop ways to combat racism through discussions on social media.
    German police target hate crime in co-ordinated raids

Galaxy J2 "Version 2016"

#Samsung launches her new Galaxy officially J2
Samsung launches her new Galaxy officially J2

Samsung unveiled a new smart phone "Galaxy J2" public copy of 2016 through the end of last week, the new phone, which is considered low phones technical specifications and cost will be marketed primarily in the markets of developing countries.


The new phone from Samsung Galaxy J2 will not come to any superhero specifications or distinctive as it prompt users to low-income, and therefore is designed to fit their needs in general, and will come with a number of technical features, including screen Super AMOLED measuring 5 inches in addition to the quad-core Spreadtrum processor frequency 1.5 GHz.

In addition come the phone modest in terms of the capacity of RAM, which will not exceed 1.5 GB memory as will the internal storage capacity to 8 GB with the possibility of adding a MicroSD slice of up to 128 GB, as the Galaxy phone will come J2 first Bkamartin in backend accurately 8 megapixel and second in the front end carefully 5 megapixel addition to the Smart Glow technology that will compensate the classic LED in the backend.


Finally, the Galaxy J2 will come with a battery capacity of 2600mAh and will be dual-SIM segment and will Marschmilo system Android, and the company indicates that Sisoq beginning in China in exchange for 130 euros, and it is not known whether it will be circulated marketed on the rest of the world.

Galaxy J2 , 2016

Facebook testing new feature

#Facebook to test feature to download and view videos offline

Facebook to test feature to download and view videos offline

Facebook will be testing a new feature in which users can download videos from the site and view them at any time, whether online or offline.
Starting July 11, the testing will occur among a small group of people in India, according to a Facebook email received by blog site TechCrunch. The company targeted that country because of feedback that "mobile data and Internet connectivity is limited" in regions like India. Many people there also wrestle with poor-quality video.
The goal of the new feature is to let people download the videos over a Wi-Fi connection so they can watch them without chewing up any cellular data.
Live videos have gained popularity with celebrities, businesses and everyday people as a way to promote themselves and share events. They have also become part of news events, including the aftermath of yesterday's shooting of a Minnesota motorist.
Facebook has been pushing its Live video streaming for people to post and view videos in an effort to draw more users to the site. But the company faces competition from such social networks as Twitter, which has been touting its own Periscope video-streaming service.
"People are coming online at a staggering rate in emerging markets and, in most cases, are doing so on mobile," a Facebook spokeswoman said. "We're continuing to improve Facebook so it works seamlessly and easily for people in all parts of the world, regardless of their device."
Facebook is taking some precautions with the new feature to make sure it's not abused. Videos will be locked within the company's app, so they won't be accessible outside of Facebook. Only original videos from public pages and member profiles will be available for download, and the owner of the video can opt out of the process. And no ads will be included in the download.
The social network boasts more than 1.5 billion users, but many are in developing regions with poor Internet connectivity. Facebook has been trying to target such areas with its Free Basics service, which offers a limited number of Internet sites and services for free. But the service was snubbed by India last February over concerns that it violated the spirit of net neutrality, in which all websites are treated equally.
Facebook didn't reveal any plans for its video download feature beyond the initial testing. So we don't yet know if or when the feature might officially launch and whether it will expand to other regions beyond India.
source : www.cnet.com

Piracy Account Executive Director of Twitter

#Piracy_Account Executive #Director_of_Twitter

Piracy Account Executive Director of Twitter
Marked the end of last week, a new event has raised a lot of controversy on social networking sites, where media reported competent piracy Account executive director of the social networking site Twitter, "Jack Dorsey / Jack Dorsey" the figures must be added back to the list of victims of this phenomenon, which has widened over the past few days.

It seems that Mark Zuckerberg CEO of social networking site Facebook and "Sundar Pichai," Executive Director of Google are not alone Almsthdvan Through this new campaign of piracy, where Andhav them CEO of Twitter Jack Dorsey, who was in turn to piracy account on Twitter weekend and Danah and exactly last Alcet.

OurMine Team (@Our_MineNew) | Twitter

Once again, the pirates OurMine group is behind the process of piracy such as spotted competent websites Group's success in penetrating Jack Dorsey account on Twitter through the company's "Vine" video application and on the way I left Group Video of 6 seconds and in describing comments cynically say what effect that it comes to a group OurMine and they are testing the standards of protection and information security on the site.


This process did not last for only a limited period where Jack Dorsey succeeded in restoring his account on his Twitter with the help of technicians of the company.

Facebook tests end-to-end encryption on Messenger

#Facebook
Facebook Inc (FB.O) on Friday said it began testing end-to-end encryption on its popular Messenger application to prevent snooping on digital conversations.
The limited testing on Messenger, which has more than 900 million users, comes three months after Facebook rolled out end-to-end encryption to its more popular WhatsApp, a messaging application with over 1 billion users that it acquired in October 2014.
The move comes amid widespread global debate over the extent to which technology companies should help law enforcement snoop on digital communications.
End-to-end encryption is also offered on Apple Inc's (AAPL.O) iMessage platform as well as apps including LINE, Signal, Viber, Telegram and Wickr.
Facebook Messenger uses the same encryption technology as WhatsApp, which uses a protocol known as Signal that was developed by privately held Open Whisper Systems.
"It seems well designed," said Matthew Green, a Johns Hopkins University cryptologist who helped review an early version of the protocol for Facebook.
While WhatsApp messages are encrypted by default, Facebook Messenger users must turn on the feature to get the extra additional security protection, which scrambles communications so they can only be read on devices at either end of a conversation.
Facebook said that it was requiring users to opt in to encryption because the extra security is not compatible with some widely used Messenger features.
"Many people want Messenger to work when you switch between devices, such as a tablet, desktop computer or phone," the company said in an announcement on its website. "Secret conversations can only be read on one device and we recognize that experience may not be right for everyone."
Facebook also said that Messenger users cannot send videos or make payments in encrypted conversations.
Christopher Soghoian, principal technologist at the ACLU, called on Facebook to commit to rolling out encryption by default once it irons out any bugs in the new technology.
"Encryption is best when it is hidden, invisible to the user and turned on by default," said Soghoian.

(Reporting by Jim Finkle in Boston and Dustin Volz in Washington; Editing by Cynthia Osterman)
Facebook tests end-to-end encryption on Messenger

support: uk.reuters.com

silkroaddialogue.com

banner image

Follow Me On Facebook

banner image