News, Announcements, Tech Discussions
Samsung unveiled several new products at an event on Thursday, including the new Galaxy NX camera and the Ativ Q, a portable laptop/tablet duo that can switch seamlessly between Windows 8 and Android. The electronics company also announced several new updates to its flagship Galaxy S smartphone line, including mini, active and zoom versions. The Galaxy S4 active promises users up to 30 minutes of protection underwater, while the zoom is the first smartphone with a 10x optical zoom function. The Active Q is perhaps the most exciting addition to the Samsung family, sporting a 13.3-inch display with 3,200 × 1,800 pixel resolution. The Tab3 is another Ativ product that includes a free, full version of Microsoft Office 2013.
Best Buy is recalling 5,100 replacement batteries for the MacBook Pro due to a fire risk. The U.S. Consumer Product Safety Commission said Wednesday that there have been 13 reports that the battery caught fire. One consumer suffered a serious burn on the leg. Best Buy Co. is voluntarily recalling both black and white ATG lithium-ion replacement batteries for the notebook computers. The batteries were sold online or shipped to customers through its Geek Squad services from September of 2008 through June of 2012 for about $50. Best Buy said it is contacting customers to ask them to return the batteries for replacement or for a Best Buy.gift card. Company spokesman Jeff Shelman noted that Best Buy is only one of many retailers that may have sold the batteries. The model number "MC-MBOOK13B" is on the label of the black battery and "MC-BOOK13W" is on the label of the white battery. The ATG logo is on both
The latest Wi-Fi technology, called "802.11ac," offers speeds of up to 1.3 Gigabits per second. That's fast enough to transfer an entire high-definition movie to a tablet in under 4 minutes, share photo albums with friends in a matter of seconds or stream three HD videos at the same time. It's more than double the top speed of the previous standard, known as 802.11n. Those speeds are theoretical maximums -- very few people have anything close to 1 Gigabit speeds from their home broadband connection. Average speeds are less than 1% of that. But the faster speeds mean the new Wi-Fi standard will offer a much bigger pipeline for all those videos, songs and games that a growing number of people are streaming on multiple devices simultaneously. The Wi-Fi Alliance, a global organization that ensures the interoperability of Wi-Fi technologies, began certifying so-called "ac" devices Wednesday. It kicked off the certification program by signing off on 19 routers, access points, microchips and
iPhone users (and there are many)-be wary of your phones mobile hotspot features. According to an ARS Technica article, German Researchers needed less than 30 seconds to crack the entire pool of autogenerated passwords! Yes, the pool is that small. "The research has important security implications for anyone who uses their iPhone's hotspot feature to share the device's mobile internet connectivity with other Wi-Fi-enabled gadgets. Adversaries who are within range of the network can exploit the weakness to quickly determine the default pre-shared key that's supposed to prevent unauthorized people from joining. From there, attackers can leach off the connection, or worse, monitor or even spoof e-mail and other network data as it passes between connected devices and the iPhone acting as the access point." The takeaway? If you use this feature, make sure to manually override the automatically-provided password to secure your connection. Below is are the top 10 most commonly
Browser-tracking Internet "cookies" can be useful, unnecessary, or malicious depending on where they come from — but how are users supposed to know which is which? Mozilla plans to integrate a central list into its Firefox Web browser that takes the guesswork away and makes better privacy automatic. [url=http://www.nbcnews.com/technology/who-tracks-trackers-firefox-monitor-ad-cookies-6C10383266]http://www.nbcnews.com/technology/who-tracks-trackers-firefox-monitor-ad-cookies-6C10383266[/url]
Webcams should be covered when not in use because hackers could be using them to spy on people, a charity advises. Childnet International says webcams should be disconnected when not in use, and teenagers should not leave webcams in bedrooms or other private areas. A [url=http://www.bbc.co.uk/programmes/p01bmk4v]BBC Radio 5 live investigation[/url] found sites where hackers exchanged pictures and videos of people captured on their own webcams without their knowledge. A police spokeswoman said webcam hackers would be prosecuted. Commons Home Affairs Committee chairman Keith Vaz urged teachers to talk to pupils about the dangers of using webcams, and computer manufacturers to improve security for users. But some experts have expressed doubts about how widespread webcam hacking is and stressed that anti-virus software plays a vital role in preventing it. The BBC Radio 5 live team found a thriving black market where access to compromised computers was bought and sold for a few pence
The fact that the LG Optimus F7 is available on more than one carrier is no surprise. It's an excellent midlevel phone that's packed with quality specs, such as a vivid 4.7-inch touch screen, an 8-megapixel camera, and a dual-core CPU. Boost Mobile [url=http://reviews.cnet.com/8301-6452_7-57590072/lg-optimus-f7-available-on-boost-mobile-june-27/]announced today[/url] that the F7 will be coming to the carrier on June 27 for $299.99 off contract, and U.S. Cellular customers can already get the device for $99.99 with a two-year agreement. All in all, despite some of its drawbacks (like its sluggish 3G speeds), I'd still recommend it for current U.S. Cellular customers looking to renew their contracts while on a $100 phone budget. If you're [i]switching[/i] to the carrier, however, then I'd go for the [url=http://reviews.cnet.com/samsung-galaxy-s4/]Samsung Galaxy S4[/url] instead. Why? As unfair as it is to existing U.S. Cellular clients, the carrier knocks $100 off the GS4 for new custome
The FBI and some U.S. Attorneys' offices around the country may be reading emails without a warrant, according to documents obtained by the ACLU and made public Wednesday. Not only does the FBI claim it can read emails and other electronic communications without a warrant — even after a federal appeals court ruled that doing so violates the Fourth Amendment — but the documents strongly suggest that different U.S. Attorneys’ offices around the country are applying conflicting standards to access communications content," he wrote. The Fourth Amendment protects citizens against unreasonable searches and seizures. "The documents we received from the FBI don’t flat out tell us whether FBI agents always get warrants, but they strongly suggest that they don’t." [url=http://www.nbcnews.com/technology/fbi-may-be-reading-emails-without-warrant-1C9840875]http://www.nbcnews.com/technology/fbi-may-be-reading-emails-without-warrant-1C9840875[/url]
The following is a interesting read on how to hide your data from internet snoops. ================================================================================================== (CNN) -- Let's face it: Most of us don't e-mail, tweet, text or post anything worthy of clandestine scrutiny. But having concerns about[url=http://politicalticker.blogs.cnn.com/2013/06/18/live-blog-nsa-hearing/?hpt=hp_c2] NSA cybersnooping[/url] doesn't mean we must surrender all [url=http://www.cnn.com/2013/06/12/tech/social-media/internet-privacy-divide]privacy -- what's left of it -- [/url]in our day-to-day online activities. It's easy to forget that we're volunteering basic information about ourselves in return for free e-mail, social networking and other digital services. And let's remember that third parties -- from government agencies to cybercriminals -- can get their hands on even more personal stuff if they're actively trying. So, whether it's due to a vague fear of Big Brother or a more sp
[url=http://www.sifma.org/tech2013/home/]SIFMA Tech 2013[/url] is off to a quick start in the Big Apple and people are filling up the exhibition halls at the Hilton New York in Midtown, Manhattan. Not only is Webroot attending the event, but we're a Silver Sponsor! This means that we have a booth (#1839), where a team of some of our finest 'Webrooters' are demoing SecureAnywhere, giving out cool free swag, and answering all of your Webroot and cloud-based security questions. And that's not all. Tomorrow, our very own Security Intelligence Director Grayson Milbourne will be hosting a learning lab (Learning Lab Theater 2-2:20 PM EST) as well as a co-speaking with Avivah Litan, VP of Gartner Inc, during a session titled "Can Collective Cloud Intelligence Combat Today's Financial and E-Commerce Threats?" (2:45-3:30 PM EST). Don't miss out! More info and pictures from SIFMA to come. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4178i568C10AC02
Purchasers of used games rejoice! The backlash against the XBox One plans to limit sharing of games/ used games as well as the MUST be connected is being DROPPED! [url=http://www.cnn.com/2013/06/19/tech/gaming-gadgets/xbox-drm/index.html?hpt=hp_t2]CNN Article[/url] "Reacting to "feedback from the Xbox community," Microsoft is appearing to reverse course and change two key components to policies for its new Xbox One video game console." Note: This would seem to apply only to physical copies of games, not downloaded games. But is that a surprise? I have never myself been to a used game store and purchased a used download only game :)
ATLANTA (AP) - An Algerian man accused of helping to develop and market a computer program that drained millions of dollars from bank accounts around the world pleaded not guilty Friday to nearly two dozen charges. A 23-count indictment charges Hamza Bendelladj, 24, with wire fraud, bank fraud, computer fraud and conspiracy. U.S. Attorney Sally Yates said the man was extradited to Atlanta from Thailand on Thursday and was arraigned in federal court Friday afternoon. A second person is also charged in the indictment but has not been identified. Investigators could not disclose whether the person was in the U.S. or abroad. Officials also could not disclose what information led them to Bendelladj. [url=http://www.nbcnews.com/technology/us-nabs-suspected-programmer-bank-trojan-drained-millions-dollars-6C9791174]http://www.nbcnews.com/technology/us-nabs-suspected-programmer-bank-trojan-drained-millions-dollars-6C9791174[/url]
With more than 1.5 million apps now available for Android phones and Apple's iPhone, a congressman is proposing a law that would require mobile app developers to let users know what an app's privacy policies are when it comes to information being shared and the length' The bill, H.R. 1913, also being called the "Apps Act," follows a report from the Federal Trade Commission in February about the same issue. In that report, the agency suggested ways for "critical players" such as app developers, advertising networks and mobile operating system providers like Google, Apple, Amazon, Microsoft and BlackBerry, to provide "timely, easy-to-understand disclosures about what data they collect and how the data is used..
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4294i2B888D977F15223F.jpg[/img] Photoshop Creative Cloud Adobe's Creative Cloud platform, which moves its Creative Suite applications from "perpetual license" to subscription-based payment plans, was designed to reduce piracy. Unfortunately for Adobe, that effort doesn't appear to have succeeded. [url=http://petapixel.com/2013/06/19/adobe-photoshop-cc-has-apparently-been-cracked-one-day-after-launch/]According to tech site PetaPixel[/url], a torrent link was uploaded to The Pirate Bay on Wednesday, allowing users to illegally download Adobe's [url=http://www.cnet.com/adobe-creative-suite/]Creative Suite[/url] applications included in Creative Cloud for free. Those who have downloaded the software from The Pirate Bay say that it appears to work just fine. Adobe's Creative Cloud platform was deployed earlier this week. The company had hoped that the subscription-based plan behind it would curb the massive piracy of s
SAP deployments are being targetted by cybercriminals in the exploit marketplace including insider and remote attacks. 74% of the Fortune 500 uses SAP softare to manage extrememly sensitive information. [i]"If the SAP system is compromised, it is kind of the end of the business. If someone gets access to the SAP they can steal HR data, financial data or corporate secrets."[/i] [i] [/i] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4284i66D7F0C3DB7E0B5F.jpg[/img][video]https://www.youtube.com/watch?v=gbePQQw-XLo[/video] [i] [/i] [i](Source: securityweek)[/i] [i] [/i] [b][i][url=http://www.securityweek.com/online-sap-deployments-widely-susceptible-attack]Full Article[/url][/i][/b]
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4282i7EF981BB7883FB53.jpg[/img] [i]Source: Linkedin, Mashable.com [url=http://mashable.com/2013/06/20/linkedin-dns-issue/]http://mashable.com/2013/06/20/linkedin-dns-issue/[/url][/i] [i] [/i] Last night, Linkedin tweeted that they were working on "a DNS issue" that had been sending all Linkedin traffic to a different web site. This morning, Mashable reported that user cookies may have been captured to compromise Linkedin accounts. [i]App.net co-founder Bryan Berg claims there's more to the issue.[/i] [i]"LinkedIn just got DNS hijacked, and for the last hour or so, all of your traffic has been sent to a network hosted by this company [confluence-networks.com]. And they don't require SSL, so if you tried to visit, your browser sent your long-lived session cookies in plaintext," Berg wrote.[/i] As Linkedin continues to grow as one of the most popular social networks, they will likely need
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4116iCB09BBE369A2BA02.png[/img] Project Loon's network of balloon communicate with special ground stations. Google has officially announced "[url=http://googleblog.blogspot.com/2013/06/introducing-project-loon.html]Project Loon[/url]," its plan to connect the entire world to the Internet that uses a decidedly 19th century technology: Balloons. According to a post on the official company blog: [quote]We believe that it might actually be possible to build a ring of balloons, flying around the globe on the stratospheric winds, that provides Internet access to the earth below. It's very early days, but we've built a system that uses balloons, carried by the wind at altitudes twice as high as commercial planes, to beam Internet access to the ground at speeds similar to today's 3G networks or faster.[/quote]Google says it hopes the floating network could be used to connect remote, rural and underserved areas, something I
No, we're not posting the YouTube link or video here - and we ask that you refrain from posting it as well. Sorry, folks. That one video, while amusing, breaks just about everything in the Community Guidelines. In the meantime, if you truly just want to know how to uninstall McAfee, you can find that [url=https://community.webroot.com/t5/Techie/Software-Removal-Tools/m-p/27608#M455]here[/url]. :)
PCMag has announced its "Best of 2013" list of security suites. Still "Editor's Choice," and still "the smallest, lightest protection available" is [url=http://www.webroot.com/En_US/consumer-products-secureanywhere-complete.html]Webroot SecureAnywhere Complete[/url]. :) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4244iD1035743456A0A4D.jpg[/img] From PCMag: [i]"Looking for the smallest, lightest protection available? The installer for Editors' Choice Webroot SecureAnywhere Complete 2013 would fit on a 3.5" diskette. Its unusual antivirus component doesn't use virus signatures; rather, it detects threats by their behavior and other characteristics. Webroot omits spam filtering and parental control, two common suite features that aren't universally needed, but adds a very flexible online backup and sync utility along with password management powered by Editors' Choice LastPass."[/i] More from PCMag is available [url=http://www.pcmag.co
Today is an inflection point for Microsoft, as well as the security industry. For the first time ever, Microsoft is offering direct cash payouts in exchange for reporting certain types of vulnerabilities and exploitation techniques. We are making this shift in order to learn about these issues earlier and to increase the win-win between Microsoft’s customers and the security researcher community. Full details for the new bounty programs and a fantastic technical deep-dive by our esteemed panel of judges (headed by Matt Miller and David Ross) can be found on SRD's blog. In short, we are offering cash payouts for the following programs: •Mitigation Bypass Bounty – Microsoft will pay up to $100,000 USD for truly novel exploitation techniques against protections built into the latest version of our operating system (Windows 8.1 Preview). Learning about new exploitation techniques earlier helps Microsoft improve security by leaps, instead of one vulnerability at a time. This is an ongoing
I may have hooked up my laptop to the network to transfer some files at about that time, but I didn't install anything on purpose. The last installation I did was the day before, a trial version of Nitro Pro -- but I doubt that's relevant. Anyone else have something like that happen?
[b]June 20, 2013 [/b] [b]9:30 AM PT / 10:30 MT / 11:30 AM CT / 12:30 PM ET / 1 hour[/b] Smartphones and tablets have changed the way people work. Unfortunately, they have also changed the way IT needs to manage security. The sheer number of available apps presents an enormous threat of malware and malicious activity. [b]Featured Experts:[/b] Timur Kovalev - Mobile Technology Director (Webroot) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4240i87E063B5D01221FB.png[/img] Marta Kusinska - Marketing Manager (FancyFon) [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4220iD2500A61CBAF9059.jpg[/img] By attending this web event you will hear a panel of experts discuss: [list] [*]The scope of the new threat [*]Unique challenges of malicious activity at the application level [*]How a Mobile App Reputation Service is essential to a layered defense[/list][b]Who Should Attend?[/b] MDM vendors, mobile carriers, mobile store
No information at this time the other Download links don't show this new version I will update when more info is released. [url=http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html]http://www.oracle.com/technetwork/java/javase/downloads/jre7-downloads-1880261.html[/url] [url=http://java.com/en/download/manual.jsp]http://java.com/en/download/manual.jsp[/url] [b]Be sure to download both x64 & x86 if you have a x64 system and uncheck any unwanted add-ons if offered.[/b] [b] [/b] Also here is the version verification page: [url=http://java.com/en/download/installed.jsp]http://java.com/en/download/installed.jsp[/url] [i][b]TH[/b][/i] [i][b] [/b][/i] [i][b] [/b][/i]
FYI just opened a support ticket about IE7 crashing when going to SSL sites when running as local administrator [i]account[/i] on Windows XP SP3. Issue does not happen when logged in as existing domain users. However, the computers were having other whacky IE issues which is how I discovered this in the first place. I don't know if they were related. Reproduced across 2 machines. Issue resolved by IE8 or WSA uninstall/reinstall. Talked with business support and there were no notes about this being fixed in .155 so I opened a support ticket. I'll update this thread when I hear back. If you run into this issue please post here or contact support so we can see what the common threads are. [b]No,[/b] this is not our normal setup, don't be hating on my retro endpoints. :$
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/4188iA334D1B3E14655CB.jpg[/img] The BlackBerry Z10 in white. BlackBerry has issued a security advisory notice to those who have bought its flagship Z10 touchscreen smartphone -- the first BlackBerry 10 device to launch following the company's bid for revival, back in February. The advisory, which was [url=http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=6B7F13C785207134705EC044CF85A874?externalId=KB34458&sliceId=1&cmd=displayKC&docType=kc&noCount=true&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl]issued last week[/url], notes a bug that relates to BlackBerry Protect, its security and backup utility, rather than the phone's operating system itself. According to the advisory, an escalation of privilege vulnerability exists in the software of some Z10 phones that could allow a malicious app to "take advantage" of weak permissions in the
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.