Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,800 Topics
- 12,154 Replies
Two Hackers Arrested for Theft of 12 Million Mobile Customers' Data
[url=http://www.globalpost.com/dispatch/news/yonhap-news-agency/140306/personal-data-12-million-kt-customers-stolen-police]The Yonhap News Agency[/url] reports that two people were recently arrested for allegedly hacking into the Web site of South Korean mobile carrier KT Corp. and stealing the personal information of 12 million customers, approximately 75 percent of the company's customer base (h/t [url=http://news.softpedia.com/news/Two-People-Arrested-for-Hacking-into-KT-Corp-Stealing-Details-of-12M-Users-430929.shtml]Softpedia[/url]). The stolen data included the customers' names, resident registration numbers, places of employment and bnak account information. Police say the attack began in February of 2013, with as many as 300,000 people's data being stolen each day. The attackers allegedly earned 11.5 billion Won (almost $11 million) by using the stolen information to sell mobile phones. The two hackers, surnamed Kim and Jung and aged 29 and 38, allegedly used a custom-desig
Windows 7 build of IE11 with Enterprise mode leaked
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/8584iAAE82F015394CFFF.jpg[/img] This spring will be a very interesting time for Windows fans, as Windows 8.1 will receive a large update that might be called a ‘feature pack’. While the jury is still out if that name will be official, more bits from the update have leaked. This time around, the IE11 build for Windows 7 has shown up in various corners of the web and while there are not a lot of major features, it does introduce the “Enterprise mode” that allows corporations to view legacy applications with the browser without having to worry about compatibility issues. The update for IE11 on Windows 7 may be released at BUILD that is about 3.5 weeks away. It certainly won’t be the highlight of the conference but will be a nice bonus for Windows 7 users. The rumor on the street (twitter) is that the RTM build of Windows 8.1 update 1 will be leaked later today. While we wouldn’t place any money on this information, the leaks
Webroot in PC magazine
REVIEWS Webroot SecureAnywhere Internet Security Complete review: Protection needs improvement 4 weeks ago by Sarah Jacobsson Purewal, PCWorld Webroot's suite has a nice interface, but the program needs to get better at detecting zero-day attacks and distinguishing between threats and nonthreats.
webfoot and dictation
I had to turn webroot off to dictate this post right now. I have yet to have read a solution from webroot as to how to allow dictation to work with web root enabled. Of course, as others have learned one to disable web root dictation through Mac work pretty good. Wondering if anyone else had sent this in and what response they have received from webroot.
Police Password Lost For 8 Years In India
Police over in India did not manage to act on hundreds of corruption complaints in a time frame of up to 8 years, simply because there was one niggling issue that caused the inaction. Apparently, it was reported that the police themselves have no clue as to what the computer password is. This caused Delhi officers to be unable to operate a portal that actually carried more than 600 complaints, where this particular lapse actually went undetected since 2006, at least according to the Indian Express Newspaper. The complaints hailed from India’s very own anti-corruption agency that is known as the Central Vigilance Commission (CVC). A couple of senior police officers have since been trained in the system, and are able to gain access to the 667 odd cases that have been accumulated ever since the portal launched. An officer did mention that this oversight proved to be “a technical problem”, and whatever complaints filed in the past until now are being addressed even as you read this. It do
Young scientist Jamie Edwards in atomic fusion record
A 13-year-old boy from Preston has become the youngest person ever to successfully carry out atomic fusion. Jamie Edwards built a nuclear reactor before successfully smashing two hydrogen atoms together, making helium through nuclear fusion. [url=http://www.bbc.co.uk/news/science-environment-26450494]Source Article and video[/url] The very best of luck to him.
Hacking an Android phone for $8 monthly broadband and TV
Depending on where you are, you can significantly cut your bills for basic cable, home broadband, and mobile voice and data with T-Mobile and Aereo live TV over the internet. In San Antonio, Texas, I hacked an Android smartphone into a Wi-Fi router and then subscribed to Aereo instead of subscribing with one of the cable television and internet companies. I saved a bundle of money. Right now, T-Mobile offers unlimited mobile data. In some locations, 4G performance can be as good as, or even better than, wired broadband. In order to confirm if this was possible, I checked the T-Mobile coverage map using the location’s zip code. The T-Mobile’s map indicated that 4G coverage at the San Antonio location was excellent. Then I tested broadband speed with a really amazing app called Open Signal. The result: 9.4 Mbps down and 2.4 Mbps up. Open Signal also indicated older HSPA service. HPSA is an extension of the 3G standards into the 4G realm. Some might argue that it’s not really 4G, and the
Microsoft releases SharePoint Server 2013 SP1; new version coming in 2015
As part of their many announcements made at today's [url=http://www.neowin.net/news/microsoft-to-hold-sharepoint-conference-2014-in-las-vegas-march-3-6]2014 SharePoint Conference[/url], Microsoft revealed that SharePoint Server 2013 Service Pack 1 is now available for download. SP1 has a few improvements for the web-based content management and collaboration tools designed for enterprise customers. [url=http://blogs.office.com/2014/03/03/sharepoint-server-2013-service-pack-1-now-available/]The Office blog [/url]reveals what's being put into this service pack. It includes a way to add a connection to the [url=http://www.neowin.net/news/microsoft-will-offer-onedrive-for-business-as-stand-alone-service-starting-april-1st]OneDrive for Business[/url] data storage service for Office 365 users, along with offering Yammer as an alternative to the default NewsFeed social network in SharePoint 2013. Finally, it adds support for JSON Light in OData v3 requests. Natur
How mantraps protect data centers from tailgating
[b]When it comes to building security, data centers are more like Fort Knox than one might expect, especially if the facility incorporates mantraps.[/b] A huge heat exchanger spewing steam into the cold February morning air was the only thing distinguishing the building I was going to from other nearby buildings. This building was a newly renovated data center that a friend managed, and I was there to check out his toys. As I walked up to the entrance, I noticed all the empty concrete planters spaced uniformly around the main door. Since this was Minnesota, they were just wide enough for two people or a snowblower to fit through. I remember my friend mentioning the architect called them, "Intrusion protection without sacrificing aesthetics." While waiting at the front desk, I recalled my friend mentioning the security upgrades that were required due to the facility changing from a multidiscipline building to a mission-critical building. The differences being: [list] [*]
Scareware pusher loses appeal against epic $163 million fine
The US Federal Trade Commission (FTC) is [url=http://www.ftc.gov/news-events/press-releases/2014/02/appeals-court-affirms-ruling-favor-ftc-upholds-163-million]celebrating[/url] what it calls a "huge victory for consumers", after an appeal court threw out an attempt to overturn a massive fine imposed on Kristy Ross, a former representative of scareware marketing firm Innovative Marketing Inc. (IMI) which pushed fake security products such as WinFixer and XP Antivirus. Ross was the last hold-out in the case after several others accepted punishments handed to them by courts, including an [url=http://www.ftc.gov/news-events/press-releases/2011/01/operator-deceptive-scareware-scheme-will-pay-more-8-million]$8 million fine[/url] imposed on Marc D’Souza, described by the FTC as "one of the key defendants behind the scam". The case [url=http://nakedsecurity.sophos.com/2008/12/11/ftc-halts-fake-anti-virus-scans-that-scammed-a-million-people/]got under way[/url] in late 2008 when the FTC broug
Mozilla plans '$25 smartphone' for emerging markets
[b]Mozilla has shown off a prototype for a $25 (£15) smartphone that is aimed at the developing world.[/b] The company, which is famed mostly for its Firefox browser, has partnered with Chinese low-cost chip maker Spreadtrum. While not as powerful as more expensive models, the device will run apps and make use of mobile internet. It would appeal to the sorts of people who currently buy cheap "feature" phones, analysts said. Feature phones are highly popular in the developing world as a halfway point between "dumb" phones - just voice calls and other basic functions - and fully-fledged smartphones. Mozilla hopes that it will capture an early lead in a market that is now being targeted by mobile device manufacturers who see the developing world as the remaining area for massive growth. It will face stern competition from bigger, more established brands, however - with more announcements of this kind expected over the course of the next couple of days at the Mobile World Congress in
Microsoft Launches Free Windows XP Migration Tool
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/8477i07B3BC5644EF9CB0.jpg[/img] If you’re still running Windows XP and you’re planning to move to a newer OS, but you don’t have the time to transfer all your data, Microsoft got you covered. Redmond today launched a brand new migration application that’s available free of charge for Windows XP users, just to make sure that everyone is moving to a newer OS version as soon as possible. Developed in collaboration with Laplink, the so-called PCmover Express for Windows XP comes with support for Windows 7, Windows 8, and Windows 8.1 and can transfer basically everything, including files, music, videos, email and user profiles from an old PC running Windows XP to a newer one powered by any of the aforementioned OS versions. “This tool will copy your files, music, videos, email and user profiles and settings from your old PC to your new device, transferring across your home or work network, and even enables Windows XP us
Cellular’s open source future is latched to tallest tree in the village
Deep in the jungles of West Papua’s central highlands, there is a village with its own mobile telecommunications network. That network runs in a box latched to the top of a tree, providing the only reliable cell coverage anywhere within a four-hour drive. This small setup has created a booming local mobile economy—and it could be the harbinger of a whole new class of private and community mobile networks that change the shape of mobile for those who have been underserved or overcharged by traditional phone carriers. The single “tower” cell network is the work of graduate students from the University of California at Berkeley’s [url=http://tier.cs.berkeley.edu/drupal/]Technology and Infrastructure for Emerging Regions[/url] (TIER) research group, under the direction of Professor Eric Brewer—the founder of the content delivery network Inktomi. The group built its mobile solution with software developed in San Francisco and some off-the-shelf hardware adapted for the task. Working with t
Streaming music coming to Amazon Prime?
Some leaks claim it is: [url=http://gizmodo.com/report-amazon-is-gearing-up-to-add-a-streaming-music-s-1532828948]http://gizmodo.com/report-amazon-is-gearing-up-to-add-a-streaming-music-s-1532828948[/url] "Re/code reports the claims of industry sources who say Amazon is in talks to create a streaming music service that it would bundle with Prime subscriptions. The report makes a lot of sense, and if true, it would make Amazon Prime and even better deal than it already is. Think how amazing that would be!"
Apple's security flaws: Are you paranoid enough yet?
[b]Apple's SSL encryption fail and iOS keylogging flaw juiced anxiety levels in an industry already reeling from security fatigue[/b] It's hard not to be paranoid about technology these days, what with the constant onslaught of [url=http://www.infoworld.com/d/security/target-says-40-million-cards-likely-skimmed-in-security-breach-232946]data theft[/url], [url=http://www.infoworld.com/t/web-browsers/internet-explorer-snowman-zero-day-spreading-use-alternative-or-patch-kb-2934088-237200]zero-day exploits[/url], malware [url=http://www.infoworld.com/d/security/zeus-malware-botnet-variant-spotted-crawling-salesforcecom-236638http://]botnets[/url], and run-of-the-mill [url=http://www.infoworld.com/d/security/google-expands-bug-bounty-program-ups-patch-program-rewards-235749]security vulnerabilities[/url]. Add into that mix the ongoing revelations about [url=http://www.infoworld.com/t/encryption/how-the-nsa-was-able-snoop-our-email-233508]NSA snooping[/url] and the [url=http://www.in
Analyzed vulnerabilities in the Top 50 portfolio products
Secunia’s Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The Secunia Vulnerability Review provides a vision on global vulnerability trends, evaluating carefully the 50 most popular programs on private PCs. These programs are practically everywhere, in many cases, they are key application for ordinary IT operations, let’s imagine to internet browsers or applications like PDF reader. Data proposed by Secunia’s Vulnerability Review 2014 revealed that third-party programs are responsible for 76% of the flaws identified in the 50 most popular programs in 2013. Despite large diffusion of Microsoft products that account for 66% of the Top 50 programs, only 24% of the vulnerabilities in the Top 50 programs in 2013 were related to applications designed by company of Redmond. [b]Key findings from the study are:[/b] [list] [*]76% of vulnerabilities in the 50 most popular programs on private PCs in 2013 af
Boeing Unveils Suicidally Secure Smartphone
Boeing this week filed an application with the United States Federal Communications Commission for a secure Android smartphone called the "Black" that will self-destruct if anyone tries to physically open the case. The company will offer it to the U.S. defense and security communities. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/8361i335C14CD2AA81200.gif[/img] The Black has embedded hardware security features, can be configured through software policies, and has endless modularity capabilities, according to Boeing. "With hardware encryption and other security solutions, you can significantly reduce the potential threat of attacks," Jim McGregor, founder of Tirias Research, told TechNewsWorld. However, "unless you're willing to limit the functionality of the device and/or its services, there will always be some threats." [u][b]Boeing Black Specs[/b][/u] The Boeing Black has a 4.3-inch qHD screen with 540 x 960 pixel resolution. With dual 1.2 GHz
Microsoft Office 2013 Service Pack 1 (SP1) Released
Description of Microsoft Office 2013 Service Pack 1 (SP1) is now available via Windows Update or you can download and install from this Article: [url=http://support.microsoft.com/kb/2817430/en-us]http://support.microsoft.com/kb/2817430/en-us[/url] and more info here also: [url=http://support.microsoft.com/kb/2850036/en-us]http://support.microsoft.com/kb/2850036/en-us[/url] I installed it today and all went fine for me. ;) [i][b]TH[/b][/i]
Computer Virus Stalls an F1 Team’s Car Testing
Technology can be wonderful, but sometimes — like when your Mom finds your Twitter feed — it just creates new problems that were previously unthinkable. The latest case in point: On the first day of the second Formula One preseason test, the Marussia team saw its 2014 car complete only three laps around the track because some witless oaf in the team garage downloaded a “Trojan-type virus” onto its computer system. Whoops. According to [url=http://www.autosport.com/news/report.php/id/112630]the team’s principal John Booth[/url], the infection “cost us the best part of the day”, and contributed to the team getting only 29 laps of testing in across its four days at the Bahrain International Circuit. He expressed concern about the team’s readiness for the first race in Australia next month, saying “I’d be lying if I said I wasn’t worried in the slightest.” [url=http://www.wired.com/autopia/2014/02/virus-f1-car/]Full Article[/url]
need help desperatly..someone really good is hacking my phone
I'm not dumb but I'm. Not a programmer by any means...this person accessed my phone..mine and my wifes emails..he went into the phones program..took over and made it where he has totall control he can access anything...I can factory reset it...as soon as I turn it back on. He resets it to his prefferances. I delete apps and a minute later its back...has gone so far as to make it so when someone calls..texts .emails anything..it gets re routed elsewhere...and much more ..please help....thank you
Microsoft releases EMET 5.0 Tech Preview
The program adds another layer of defense to the operating system and springs to action when malware is executed on the system. It can mitigate attacks so that they are not successful at all or reduced in scope. It should be clear that this is not a 100% protection against malware, but it does add a level of protection to the system that can be quite useful if attackers do not target EMET directly as well. Microsoft has released a Tech Preview of EMET 5.0, the upcoming version of the Enhanced Mitigation Experience Toolkit. EMET 5.0 introduces two new mitigations to the 12 security mitigations of version 4.1 which improve the defensive capabilities of the program further. [url=http://www.ghacks.net/2014/02/25/microsoft-releases-emet-5-0-tech-preview/]Full Article[/url]
Hi peeps! Can anyone tell me if there is some kind of programme that lets you wipe your old files from disc so that you can use them again. Probably not, the manufacturers have to make money somehow, but it seems a bit of a waste that you can only use them once, I've got millions of the things with one back-up on.
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.