Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,741 Topics
- 12,030 Replies
Turning web chat into searchable business listings Whodoyou, the new social recommendations engine from Israel helps people find local service providers endorsed by friends and neighbors. By Abigail Klein Leichman July 6. 2014 Seeking a recommendation for a music teacher for your child? A plumber to fix that leaky pipe? If you search Angie’s List or Yelp, you can’t be sure you’re getting unbiased feedback. WhoDoYou was created by an American-Israeli to solve that problem, as well as the annoyance of posting repeated inquiries on the same topic. Essentially, it turns conversations into searchable business listings. [url=http://www.israel21c.org/headlines/turning-web-chat-into-searchable-business-listings/]http://www.israel21c.org/headlines/turning-web-chat-into-searchable-business-listings/[/url]
By [url=http://www.theregister.co.uk/Author/2479]Andrew Orlowski[/url], 13 Jun 2014 Hollywood film actor Tom Hanks' WhoSay page is attributing copyright of a photograph to the millionaire rather than to the British photographer from Cornwall to whom it actually belongs - and the plucky Brit is now fighting for the recognition he deserves. The photo was taken by snapper [url=http://www.timmartindale.co.uk]Tim Martindale[/url] last year, and features his late father’s war medals on a Cornwall beach. R The Register/ Full Read Here/ [url=http://www.theregister.co.uk/2014/06/13/tom_hanks_page_claims_copyright_on_brit_photographers_pic/]http://www.theregister.co.uk/2014/06/13/tom_hanks_page_claims_copyright_on_brit_photographers_pic/[/url]
By [url=http://blogs.computerworld.com/user/richi_jennings]Richi Jennings[/url]June 16, 2014 6:43 AM EDT Stratfor is a secretive, shadowy, somewhat-scary company that refers to itself as a "geopolitical intelligence and consulting firm." The company attracted [i](unwanted)[/i] attention in 2011 for a website data breach, finding itself "pwned" by hackivist group AntiSec, and highly embarrased to boot. ComputerWorlld/ full read here/ [url=http://blogs.computerworld.com/cybercrime-and-hacking/24026/intelligence-firm-stratfor-wasnt-very-smart-about-data-security-itbwgk]http://blogs.computerworld.com/cybercrime-and-hacking/24026/intelligence-firm-stratfor-wasnt-very-smart-about-data-security-itbwgk[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/11194i65E8AA497BD2A1A3.jpg[/img]
By [url=http://www.infoworld.com/author-bios/woody-leonhard]Woody Leonhard[/url] | [url=http://www.infoworld.com/]InfoWorld[/url] posted on June 20, 2014 Immediately following the arrest of former Microsoft employee Alex Kibkalo, who was [url=http://www.computerworld.com/s/article/9249078/Ex_Microsoft_employee_who_leaked_Windows_secrets_to_be_deported_to_Russia]convicted of leaking Microsoft proprietary software,[/url] famed Windows leaker Wzor ducked out of sight. Although it was clear at the time that [url=http://www.infoworld.com/t/microsoft-windows/microsoft-uncovers-mole-who-leaked-windows-secrets-wzor-lives-238755]Wzor wasn't involved[/url] in the Kibkalo mess, discretion was the better part of valor, and Wzor turned off his/her/their website, stopped tweeting, and (according to Wzor) stopped working with contacts inside Microsoft. The leaker [url=https://twitter.com/WZorNET]briefly re-appeared in April[/url], but has stayed silent while the Kibkalo escapade unfolded.
[H1][url=http://thehackernews.com/2014/07/microsoft-boosts-encryption-for-outlook.html]Microsoft Boosts Encryption for Outlook Webmail and OneDrive[/url][/H1]Wednesday, July 02, 2014 [url=http://thehackernews.com/p/authors.html]Wang Wei[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/12072i0C7689BB750E58DB.jpg[/img] After the wide chain of scandals over US global snooping that seriously damaged the trust on the top U.S. Tech companies, Google and Yahoo! came forward and took initiative to provide more secure, encrypted and NSA-proofed service in an effort to gain their reputation again among its users. Now, Microsoft has also [url=http://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/07/01/advancing-our-encryption-and-transparency-efforts.aspx]announced[/url] several improvements to the encryption used in its online cloud services in order to protect them from cyber criminals, bad actors and prying eyes. The company effort
What's that burning tire smell? It's Microsoft screeching away from the No-IP car crash Redmond settles lawsuit, admits mistakes Full post [url=http://www.theregister.co.uk/2014/07/09/microsoft_settles_noip_malware_blocking_lawsuit_acknowledges_mistakes/]here[/url].
It has been a while since I have seen an article here related to Google Glass, so I thought it was time to post one. We have seem them all here, from cool uses to "Glassholes", but I think this is a first. By [b]Jacque Wilson[/b], CNNupdated 8:59 AM EDT, Wed October 15, 2014 [b](CNN)[/b] -- A man who checked in to the Navy's Substance Abuse and Recovery Program for alcoholism treatment was also treated for a Google Glass addiction, according to [url=http://www.ncbi.nlm.nih.gov/pubmed/25306386]a new study[/url]. San Diego doctors say the 31-year-old man "exhibited significant frustration and irritability related to not being able to use his Google Glass." He has a history of substance abuse, depressive disorder, anxiety disorder and obsessive-compulsive disorder, they say. The man was using his Google Glass for up to 18 hours a day in the two months leading up to his admission in September 2013, according to the study. He wore it to work and reported feeling mor
By [url=http://www.itproportal.com]Simon Culmer/ Posted June 17 2014[/url] Over the past few years it seems that the Bring Your Own Device (BYOD) phenomenon has taken businesses by storm, and on the face of it you can see why. Employees pay for their own devices, which means that businesses avoid the majority of the associated upfront costs. Workers are often happy to do this, as it means they can bring their favorite gadget to work and not be forced into using a corporate one they might be unfamiliar with. These employees already know the ins-and-outs of their devices and, as a result, are often much more productive when working on them. However, due to security and practical resource concerns, not all companies have adopted the BYOD approach with gusto. The Register/ full read here/ [url=http://betanews.com/2014/06/17/byod-or-cyod-which-is-the-right-choice-for-your-organization/]http://betanews.com/2014/06/17/byod-or-cyod-which-is-the-right-choice-for-your-organization/
By [b]John Callaham[/b] As [url=http://www.windowscentral.com/microsoft]Microsoft[/url] continues with its public test of the [url=http://www.windowscentral.com/windows-10]Windows 10 Technical Preview[/url], the company is already beginning the process of preparing businesses to deploy the OS and upgrade their PCs from Windows 7 and Windows 8. In a blog post today, Microsoft said: [url=http://www.windowscentral.com/microsoft-wants-make-updating-windows-10-easier-businesses]Full Article[/url].
By Agam Shah | IDG News Service Posted on June 20, 2014 Advanced Micro Devices is reworking its core PC chip design to be 25 times more energy-efficient over the next six years, possibly resulting in laptop battery life of up to 50 hours on idle time. So said Sam Naffziger, corporate fellow at AMD, adding that estimated battery life on active use would also be significantly better, although he couldn't quantify that expected improvement. AMD is trying to sharpen performance-per-watt, with an equal emphasis on power efficiency and performance enhancements. Technological advances like reductions in chip size, restructuring of transistors, new memory technologies, solid-state drives and software improvements will also help AMD in meeting its goals. InforWorld/ full read here/ [url=http://www.infoworld.com/d/computer-hardware/amd-tackles-thorny-problem-of-laptop-battery-life-244784]http://www.infoworld.com/d/computer-hardware/amd-tackles-thorny-problem-of-laptop-battery-life-24
[H2]Official change log lists "security fixes;" Googler says it is OpenSSL related.[/H2]by [url=http://arstechnica.com/author/ronamadeo/]Ron Amadeo[/url] - June 19 2014 Google has a surprise for us today in the form of a new (minor) version of Android. Android 4.4.4 is rolling out to Nexus devices and is available for download on the [url=https://developers.google.com/android/nexus/images]Nexus Factory Image page[/url]. A changelog available over at [url=https://community.sprint.com/baw/message/806726]Sprint[/url] lists nothing other than "security fixes." [url=http://arstechnica.com/gadgets/2014/06/android-4-4-4-is-rolling-out-to-devices-contains-openssl-fix/]Full Article[/url]
[b][url=http://www.darkreading.com/author-bio.asp?author_id=962]Ericka Chickowski[/url] Posted on 9/19/2014[/b] [b]Apple bakes in more security features, but iOS 8 won't come without security ops headaches.[/b] As Apple still reels from the sting of leaked celebrity nudes, the company hopes to up the security and privacy ante with a passel of new security features in iOS 8. However, enterprises may find that they still must work hard to secure data traversing across devices using the new mobile operating system. Released this week for general downloads, iOS 8 brings to devices enhanced security capabilities such as the option for complex passcodes, always-on VPN for WiFi connectivity, improved control over privacy configurations, and bolstered capabilities around the TouchID biometric authentication feature on newer iPhones, for which APIs have been released to let third-party developers build use of the fingerprint reader into their applications. DarkReading/
August 6th, 2014, 08:52 GMT · By [url=http://news.softpedia.com/editors/browse/ionut-ilascu]Ionut Ilascu[/url] [b]In a secret cyber war game, whose details and final results remain confidential, hackers from the military service were totally crushed by opponents from the civilian sector.[/b] One Capitol Hill staffer that attended the exercise, which took place in a secret compound at Fort Meade, Maryland, said that the active-duty team was “pretty much obliterated,” and that they “didn’t even know how they’d been attacked.” [img]http://i1-news.softpedia-static.com/images/news-700/Military-Cyber-Warriors-Crushed-By-Civilian-Hackers-In-Supersecret-Cyber-War-Game.jpg[/img][i] - Hackers outside military have greater infosec knowledge[/i] [url=http://news.softpedia.com/news/Military-Cyber-Warriors-Crushed-By-Civilian-Hackers-In-Supersecret-Cyber-War-Game-453704.shtml]Full Article[/url]
By Paul Mah, [url=http://www.cio.com]CIO[/url], July 18, 2014 There are thousands of apps and Web services out there. New ones are hitting the Internet as you read this. Here are 10 that can actually improve your life [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/12868i67AA0B225534F345.jpg[/img] New online services are launched all the time. It can be an exercise in frustration to separate the fluff from genuinely useful Web services. To help you along, we've identified 10 that contribute to your personal productivity by doing things that you may not have though possible. [b]InforWorld/ Full Read Here/ [url=http://www.infoworld.com/slideshow/159587/10-websites-make-your-life-easier-246527]http://www.infoworld.com/slideshow/159587/10-websites-make-your-life-easier-246527[/url][/b]
[b][img]http://i1-news.softpedia-static.com/images/news2/Windows-9-Build-6-4-9830-Ready-as-the-Public-Beta-Is-Almost-Here-457714-2.jpg[/img] Work on Windows 9 continues these days, as we’re getting insanely close to the public launch of the very first beta of what could be another major revamp of our beloved operating system.[/b] It appears that Microsoft has recently completed development of another Windows 9 build, as version number 6.4.9830 has been spotted online, most likely as the company was test-driving its features. No specifics are available at this point, but we already know that a public beta is expected to be released later this month for anyone willing to give it a try and help Microsoft improve the final product. “Why are these builds numbers so important?” you might ask. The reason is as simple as it could be: with Microsoft fueling the secrecy surrounding Windows 9 on pretty much every single day when it refuses to disclose details about the upcoming operating syst
by [url=http://www.v3.co.uk/author/profile/2325/alastair-stevenson]Alastair Stevenson [/url]11 Sep 2014 [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15429i367532446BC6720D.gif[/img] Google has launched an iOS Sync service for Google Apps, marking its latest attempt to push its enterprise services into mixed office environments. Google for Work product manager Clayton Jones announced the feature in [url=http://googleforwork.blogspot.co.uk/2014/09/increasing-security-and-productivity.html]a blog post[/url], claiming iOS Sync will help IT managers safely take advantage of the ongoing bring your own device (BYOD) trend. "Marvel and DC Comics, Star Wars and Star Trek, Emacs and VI – we all have our favorites. And then there's iOS and Android, each with dedicated fans. Regardless of which you prefer, there's no reason your device of choice should get in the way of your work," he said. "We're introducing iOS Sync for Google Apps giving you and your company the i
After the carry on earlier this week about nude celebrity photographs I thought it might be useful for those who are not too familiar with the Apple OS to post this simple article. [url=http://www.businessinsider.com/author/sam-colt]Sam Colt[/url] Sep. 6, 2014 [i]"On Thursday, Apple CEO [url=http://www.businessinsider.com/tim-cook-icloud-security-update-2014-9]Tim Cook announced that there would be iCloud security updates[/url]. Those updates will alert users when someone tries to access your iTunes or iCloud accounts from a new device. Users will also be alerted when anyone tries to change the password on their account.[/i] [i]That notification system — often called two-step or two-factor authentication — only works for iTunes right now. It will work for iCloud when iOS 8, the new operating system for iPhones and iPads, rolls out this fall. Still, it's something you should set up now.[/i] [i]So, to be clear, two-step authentication won't protect yo
[b]Comment/ Do you feel smart enough?? You can enter this contest.[/b] [b]=================================================================================================[/b] [b]Author/ Zeljka Zorz/ HNS Staff/ Posted on 31 July 2014[/b] More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders step in the shoes of attackers and improve their defensive skills, and hopefully makes them think about what can be done about securing those very systems they were tasked to breach. But what about pushing them towards constructing secure software in the first place? Well, now there is a contest that does exactly that. More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders step in the shoes of attackers and improve their defensive skills, and hop
By [b]John Callaham[/b] [url=http://www.windowscentral.com/tag/microsoft]Microsoft[/url] will officially end retail software sales of [url=http://www.windowscentral.com/tag/windows-8]Windows 8[/url] on Friday, October 31, but there's no reason to panic as the company will still be selling the full versions of the newer, and better, [url=http://www.windowscentral.com/tag/windows-81]Windows 8.1[/url] operating system directly to consumers for the foreseeable future. Microsoft's Windows lifecycle web page shows the ending of Windows 8 software sales on Friday but OEMs can still offer PCs with Windows 8 pre-installed. So far, Microsoft has yet to set a date for those sales to end. They have also yet to reveal when sales of Windows 8.1 software sales, or sales of the OS pre-installed on PCs, can stop. Keep in mind Microsoft is selling the full version of Windows 8.1 for $120 and Windows 8 Pro for $200, without the need for the PC to have Windows 8 pre-installed. In othe
How to Steal an iPhone’s Passcode (from up to 150 feet away!) Posted on July 2nd, 2014 by Graham Cluley Many of us know the danger of shoulder-surfers. Those are the people who lurk beside you, or peek over your shoulder, as you enter a password on your computer or tap the PIN code into an ATM. But did you know that the people stealing your iPhone or iPad passcode could be up to 150 feet away, and not even able to see your device’s screen? It sounds like science fiction, but researchers at the University of Massachusetts Lowell claim they can easily steak smartphone passcodes as they are typed in, even if they are well out of arm’s reach. Xinwen Fu, a scientist who worked on the project, [url=http://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-glance/]described to Wired[/url] how the research revealed that passcodes could be determined on iOS and Android devices even when the screen itself wasn’t visible, by tracking and taking video of the users’ f
[img]http://www6.pcmag.com/media/images/432237-mozilla-streaming-stick.jpg?thumb=y[/img][list] [*]By [url=http://www.pcmag.com/author-bio/david-murphy]David Murphy[/url] [*]June 21, 2014 08:02pm EST[/list]Quote: "Mozilla's aim is to have a much more open streaming device than Google's Chromecast, to the delight of app makers (we're sure). The Firestick? The Foxcast? We don't quite have a name for you just yet — neither does the company, we suspect — but a recent swath of articles suggests that Mozilla is rumored to be a working on a Chromecast competitor of its very own. Well, not quite "rumored to be" as "perhaps accidentally confirmed by a Mozilla employee."" [url=http://www.pcmag.com/article2/0,2817,2459883,00.asp]Full article at PCMag[/url]
By [url=http://www.computerworld.com/author/Gregg-Keizer/]Gregg Keizer[/url] Computerworld | Aug 29, 2014 6:59 AM PT The promotion of the 64-bit Chrome for OS X to the "Beta" channel followed a move earlier this month by Google to push the browser to the rougher-edged[url=http://www.computerworld.com/article/2490880/internet/google-ships-64-bit-chrome-for-os-x.html]"Dev" build[/url]. It also came on the heels of [url=http://www.computerworld.com/article/2599310/web-browsers/chrome-sings-when-im-64-on-windows.html]Chrome 64-bit for Windows[/url] making it to the more-polished "Release" status on Tuesday. Google trumpeted the 64-bit Chrome for Mac as faster to start, less of a memory hog and more secure. "Most programs on a modern Mac are already 64-bit apps," Mark Mentovai, a Chrome software engineer, said in a Thursday [url=http://blog.chromium.org/2014/08/mac-chrome-when-im-sixty-four-bits.html]blog[/url]. "In cases where Chrome was the last remaining 32-bit app, there w
After all the reports in our Security News forum about all of the Point Of Sale breaches over the last few months this article gives a Timeline of all of breaches going back to 2002, quite an interesting read and it puts it all into perspective. September 30, 2014 By [url=http://labs.opendns.com/author/andrew-hay/]Andrew Hay[/url] [img]http://labs.opendns.com/wp-content/uploads/2014/09/1460206246_c029aeb764_m.jpg[/img] If you’re like us you have a hard time remembering the point of sale (PoS) breaches that have occurred over the years. In an effort to simplify past public breaches, we have created a timeline that describes 59 distinct PoS-related breaches where the following were (or are believed to be) true: [list] [*]Malicious software was installed or a malicious actor gained unapproved access to the PoS system, [*]Card holder information was, or could have been, exfiltrated from the organization, and [*]The breach was reported via a publicized breach n
By Himanshu Arora on June 25, 2014, 2:45 PM With the aim to revolutionize public transport, Israel is all set to build a network of elevated hover cars. SkyTran, a NASA Space Act company, will first build a 500m pilot loop on the campus of Israel Aerospace Industries (IAI) in central Israel, followed by a commercial network in the city of Tel Aviv. The rapid transit system will consist of lightweight two-person vehicles, suspended from elevated magnetic tracks. The vehicles will be fitted with a technology that would allow commuters to order the car via their smartphones. These cars would pick up passengers at specific locations and then transport them directly to their destination. The test cars will have a maximum speed of 70 km/h (43 mph), but according to SkyTran, the commercial rollout is expected to offer much faster vehicles, potentially reaching speeds of up to 240 km/h. The first components of the network will be pre-assembled at SkyTran's headquarters at
[b]By [url=http://www.computerworld.com/author/Patrick-Thibodeau/]Patrick Thibodeau[/url] Posted on 9/17/2014[/b] The one sure thing a "yes" vote Thursday for Scottish independence will bring to its high-tech sector is a long period of uncertainty. Scotland is not a major high-tech employment center, but it has good universities and entrepreneurial energy. About 70,000 people work in IT out of a total workforce of about 2.5 million, or about 3%. By contrast, financial services accounts for about 15% of employment in Scotland.[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15671i4F0990147F801362.jpg[/img] [b]ComputerWorld/ full article here/ [url=http://www.computerworld.com/article/2684613/in-scotland-tech-firms-fear-independence-vote.html]http://www.computerworld.com/article/2684613/in-scotland-tech-firms-fear-independence-vote.html[/url][/b]
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.