Friday, June 29, 2018

Slimmer Instagram Lite Comes On Google Play

On Wednesday, the new app Instagram Lite for Android launched on the Google Play Store without any official announcement from the Facebook. The Facebook-owned Instagram has offered the users a cut down version of the photosharing application.
The Instagram Lite app is only of 573KB which is easily compared to the regular Instagram’s 32MB application.
Now, the users can currently post photos, add filters, view stories, use the Explore tab and many more. The Facebook-owned Instagram company is also adding the ability to message any friends and share videos later.
However, millions of Smartphone users all over the world still have an old variation with the slow 2G Internet connectivity, and now the “Instagram Lite” can help them to get in touch with friends and the family easily.
The ‘Instagram Lite’ app is very small and also allowing you to save some space on your phone and download it rapidly,” read the complete app’s description on Google Play Store.
Since the Instagram didn’t instantly respond to a request for any comment, but one of the spokespeople in a post told that the Instagram-Lite version began testing in Mexico this week.
They also added that we are recently working for testing a new version of the Instagram for Android that takes up the less space on your Smartphone or any other Android device, and it will use the fewer data and download faster.
The application looks geared towards the emerging markets, where the connection of the internet is generally slower.
On Tuesday, Instagram was estimated to be worth Whopping $100 billion, and it is also expected to exceed approximately 2 billion of the monthly users in the upcoming five years. The company will also roll out its four-way group video chat that allows the users to browse the Instagram app easily.

Ticketmaster Data Breach in UK

Countless Ticketmaster UK clients are thought to have been straightforwardly influenced by an information rupture at an outsider stage supplier of the web-based ticketing mammoth.
The firm guaranteed in a notice clarifying the episode that it discovered pernicious programming on a client bolster item facilitated by provider Ibenta Technologies a weekend ago.
The malware, which was instantly crippled on disclosure, had been exfiltrating information and sending it to an obscure outsider, Ticketmaster included.
Compromised data includes names, addresses, messages, phone numbers, installment points of interest and Ticketmaster login subtle elements. There’s no data on whether a few or the majority of this information was scrambled.
The firm noticed that UK clients who acquired or endeavored to buy, tickets amongst February and June 23, 2018, might be influenced. As a prudent step, the firm has additionally told worldwide clients who purchased in this period.
If the clients have not gotten an email, the firm does not trust this security episode has influenced them in light of our examinations.
Ticketmaster expressed that under 5% of our worldwide client base has been influenced by this occurrence” – however, this could even now keep running into the millions given a few reports which guarantee the firm serves more than 230 million clients.
It is trusted that upwards of 40,000 UK clients’ subtle elements have been endangered, albeit nobody in North America has been influenced.
As a precautionary measure, Ticketmaster is prescribing clients screen their records for proof of misrepresentation/wholesale fraud.
Rivulets Wallace, head of EMEA for Trusted Knight, cautioned clients likewise to be vigilant for phishing messages utilizing the stolen information or gaining by enthusiasm for the occurrence.
He additionally included that after an episode like this, offenders from around the globe will seize the opportunity to attempt and discover a couple of clueless individuals out. On the off chance that the clients get any messages indicating to be from Ticketmaster requesting any individual data, dispose of them. On the off chance that they have to contact Ticketmaster, type the site address into their program and sign in that way. It’s smarter to be protected.
Javvad Malik, the security advocate at AlienVault, included that the case features the issue of provider hazard.
He contended that it shows up as though the assailant could break in through an outsider, fortifying the significance of reviewing every single outsider for the entrance they require, and to have set up progressing observing and risk discovery controls that can raise cautions when an outsider is getting too corporate frameworks.
Ticketmaster is likewise working with the ICO, and this case could well be a first real trial of the GDPR, contingent upon when the episode happened.

Role of Security in the “Shift Left” Application Security

As the dependency of the users on the software’s continues to grow then, the organizations are increasingly taking a DevOps and agile approach to the software application development programs. Consequently, the operation and the development teams have assimilated, and now the developers play a vigorous role in managing the post-production of the software.
However, to meet the demands for a quicker time to the market, then the development teams are “Shifting Left” security which is moving it further down to the software development lifecycle with the developers that are increasingly being tasked with the building secure software from the outset.
As a result, the DevSecOps process will require developers to take greater responsibility only for securing the software’s as well as for building it, and therefore the consideration must be given as to what this means for the members of the security team.

Always Try to Think like Builders

The most significant advantages of this approach are that through the employing Scrum teams, multi-disciplinary teams with the accountability for one application, one piece of an application, or one micro-service, the needs for a handoff between the teams can be avoided. These Scrum teams are responsible for the planning, coding, performance, testing, uptime and now with the introduction of the DevSecOps, they’re also going to be responsible for the security purposes.
For succeeding in this environment, the very first thing the security team will have to do is to start thinking more like the builders than the breakers. With the progress of software development concluding in the fully automated pipelines which are used in DevOps,
Now, the security experts must consider that they can easily create a process that will deliver to the correct outcome from the get-go, rather than the discovering vulnerabilities and risk which can further down the line.

Always Test Early and Test Often

The security professionals should need to work with the development teams to recognizing the earliest point that manual processes, such as threat modeling, and manual testing which can be effectively implemented to avoid the lengthy remediation before the deadline of delivery.
The Manual testing should be done early in some small batches only on features that require it, rather than the multiple Scrum teams which are having to test a lot of functionality a few days before when the software is due to be released. And also the threat modeling can be only done when there is a design in place; the code even doesn’t necessarily need to have been written fully.
Create a Team of Security Champions
Though the security teams cannot be everywhere at the same time, the majority of companies having a large ratio of developers to the AppSec experts or might be greater than others. It is a very necessary aspect of the DevSecOps model so that many of the organizations haven’t provided their developers with the adequate security training.
However, in the longer term, every Scrum team should include some knowledgeable security person that might be team’s security champion who should meet with the organization’s security experts on a very regular basis.
The presence of some security champion will avoid the situations in which the development team is unaware of the security implications of a particular piece of coding.
And the security champion should also identify that when a critical piece of code has been written badly or maybe something hasn’t been correctly fixed, but it requires some expertise that to bring in from the outside development team. After the identifying these issues, the security champion can easily escalate the situation and also call the security team at the accurate time.

Long Live the Security Team

One move towards the DevSecOps doesn’t mean that the role of the security team is deceased. Subsequently, now they need to lead on creating a culture and also processes that enable the shared accountability. That is working with their colleagues in the development team, as they need to work out with the shared goals, metrics, reporting and measurement that both the teams are going to hold themselves.
By doing this, they will allow their organization to securely deliver the applications at a speed that the app economy essentially requires.

Thursday, June 28, 2018

Steps to Enable Automatic App Updates on iPhone and iPad

When you or anyone as frequently obtains behind on installing any of the app updates on an iPhone or iPad, then you may have to appreciate features in the iOS Settings which allows the App Store to update the apps on the device automatically.
However, the automatic Updates for applications will periodically discover and also easily find the available updates for any of the installed iOS apps on an iPhone or iPad, and then you need to download and install those app updates automatically on your iPhone or iPad. It will take some user involvement which is out of the updating process, as apps will update themselves whenever the updates become available. The Automatic app updates in iOS are one of the great settings for the people who need to maintain the newest versions of apps on their devices, but who regularly fall on manually launching App Store to install the latest updates directly themselves.
For the automatic application updates to work in the iOS, the iPhone or iPad which should be on the latest version of an iOS software system, and also the devices must have an active internet connection, as without the internet connection updates won’t be downloaded or checked.

Steps to Enable Automatic App Updates in iOS

Here are some settings for enabling the automatic updating of iOS apps, and it is almost the same on iPhone and iPad:
  1. Click to open “Settings” app on the iPhone or iPad.
  2. Click to go to the iTunes & App Store.
  3. Under the Automatic Downloads section, search for Updates and clasp that switch to ON position.
  4. Now, exit from the Settings option.
Finally, the Automatic Updates for iOS apps has been successfully enabled, and whenever any of the updates are found in the App Store, then the App Store will automatically install itself on your iPhone or iPad that setting has been enabled.
Although the process is all handled in the background of your device and also away from seeing update indicators on any app icons themselves, and it is rather faultless, and most of the users won’t even notice the updates which are happening behind the scenes.
Once the update feature is enabled, then you will pretty never see the intimidating numerical red button on the App Store icon which is used to notify the number of apps that are waiting for some updates. Instead of the updates which just install themselves when it is possible for all automated and easiest way.
For sure you can easily choose to disable the automatic app updates feature of iOS, and then manually you need to update all iOS apps on the device, or even update apps separately on the basis of individuals, that how to handle the iOS App Store updates is up to you and also how to use the iPhone or iPad.
It does not even apply to install the iOS system software updates, though another same feature lets you to automatically install the iOS system software updates as they appear at an iPhone or iPad, which can be as useful for some of the users.

Tuesday, June 26, 2018

Microsoft To Launch Blockchain Again

Microsoft To Launch Blockchain Again

In recent news, Microsoft is structuring its own Adblock Plus straight into its Edge browser for Android. The software giant has started making the integration which is available to the Microsoft Edge for Android beta users, with the plans to rolled it out more broadly to all the Edge for all the Android users soon. Generally, the ad blocker is available in the Microsoft Edge settings option, and it does not require any separate add-ins for downloading and installing.
The Microsoft’s step is very significant since the company has been partnered with Adblock Plus to build this functionality immediately into the browser. Earlier Google revealed its own ad is blocking in the Chrome browser for Android, but it is not as destructive as Adblock Plus, and most of the ads are not even blocked on the majority of sites. The Mozilla’s Firefox for Android browser also includes a form of built-in the ad blocking, but it’s activated only during an in-private tab session. Some of the Samsung Android users might also install the Adblock extensions to block ads in the Samsung’s browser.
Now, the Microsoft Edge for Android has reached almost 5 million installs on the Google Play Store. Therefore, it still has a way to go to grab up to the 100 million of the Firefox installs or default Chrome browser which has more than 1 billion of installs on Android. In November 2017, Microsoft released Edge for the  Android, but recently, the company made it available only for the Android tablets.

Microsoft Re-launching Blockchain Game With New Services

Now, the Microsoft is looking to re-enter the blockchain game with some new services that aim to help the settle payment disputes of the users.
However, some of the Windows 10 makers has disclosed that a new service aimed at help companies to manage their royalty and rights of payments by using the technology.
One of the services which are powered by the Microsoft’s Azure cloud platform will principally seem to target the gaming space, where the rights disputes can frequently prove very costly for all the content providers.
Microsoft will allow the real-time access and also the insight into the transactions, with some of the new smart contract systems which helps the user by confirming that the correct people get always paid for their work.
Recently, the Microsoft is hoping that the network will definitely become one of the world’s leading enterprise blockchain ecosystems when it is fully operational, probably the processing millions of transactions per day.

Step up

Recently, the Microsoft has been signed up with the banking titan EY, for helping the support service, and the game’s publisher Ubisoft is already set to be one of the first test subjects with fully launching soon and set to be progressively rolled out around the world.
The original network is built by using the Quorum blockchain protocol and also by the Microsoft’s Azure cloud infrastructure and by including the blockchain technologies and also implements some confidentiality of agreements across the entities.
Paul Brody, EY Global Innovation Leader of Blockchain said, the scale volume and complexity of digital rights and royalties transactions will make it a perfect application for blockchains.
A blockchain can easily handle the inimitable nature of each contract between the digital licensors and rights owners which can be handled in a scalable, efficient manner with the audit trail for the applicants. By deploying it on the Microsoft Azure, Microsoft believes that this will be highly scalable across thousands of royalties and the content partners.

Monday, June 25, 2018

Younger Generation Identified as Major Culprits of Breaches

According to a new independent study into the attitudes of next-generation workforce about the cybersecurity, commissioned by Centrify, a leading provider of Zero Trust Security through the power of Next-Generation Access, believes that younger employees are becoming the main culprits for data security breaches in the workplace.
The independent study also reveals that these similar decision makers are doing very small to alleviate their worries, with over a third of 18 to 24-year-olds will be capable of accessing any files on their company network and only one in five having request permission to access some specific files. Almost half (43%) is having access to only those files which are important to their work.
The study conducted by Censuswide, sought the analysis of 1,000 next generation workers who are 18-24 year olds and also the 500 decision makers in UK organizations to determine how privacy, security, and online behavior at work impacts the lives of the younger employees and also the companies that they work for.
While password sharing list is at the top of 56 percent as to what keeps the decision makers awake at night? Approximately 29 percent of younger workers reveals that they are in the driving seat when they come to the password changes with their employers leaving it to them and also for deciding when they need a password change. Additionally, 15 percent of them admit that they can freely share passwords with their colleagues.

Approaches towards Social Media and Online Behaviour

Younger employees could impact the workplace negatively, about 47 percent of the decision-makers concern about them of sharing social media posts and the impact of these could have a reputation and on the brand.  On the contrary, one in five workers are not worried about their social media activities might affect their employers and almost 18 percent generously admit that their posts could compromise employers’ security and also privacy policies of those employees. Less than half said that their company has a social media strategy in place which highlights the need for the strong social media access controls that follow the philosophy of a ‘Zero Trust’ approach towards the security which suppose that users inside a network are no more reliable than those outside the network.
The next generation of the workers will always-on approach to technology with no any experience of an off-line world further strengthen the need for robust security policies. When we come to this generation of workers, then almost 40 percent of the decision-makers are worried about their misuse of devices via social media, while 35 percent said that they are too gullible of technology and 30 percent worry about that they easily share company data.
However, 79 percent of decision-makers report that they have a strong security policy in places and almost 74 percent of them believes that their employees are abiding it, over 37 percent feel that the young workers are too relaxed about security policies.

Sunday, June 24, 2018

Does Linux Need Antivirus?

Linux enjoys a reputation for being safe and secure, but should you get a security solution for your Linux?
It has been a long time since the subject of whether Linux needs an antivirus solution or not has been discussed and debated online. Even though the threat of malware is very little in Linux as compared to Windows, does this imply we let anti-malware protection slide for Ubuntu, Fedora, Mint, RedHat, openSUSE, or any other Linux distribution?
Find out what you can do to safeguard your Linux system from viruses, malware, and an array of other threats.

What do developers think about malware?

Even though only a small section of computers and laptops have Linux, a massive chunk of web servers run the Linux kernel. Therefore, when it comes to the enterprise, there is a perpetual fight going on between cybercriminals and systems admins.
In spite of this, it appears that the online threats faced by home users are not too aggressive.
The official site of Ubuntu, a massively popular Linux distro, has a considerable breadth and depth of knowledge, states that there are antivirus programs for Linux OS. However, the users most likely do not need it. Viruses which attack Linux are very uncommon. Some people think that since Linux is not as popular as other operating systems such as Windows and Mac, nobody bothers to write malicious code for it. Other people believe that Linux is, by its very nature, safer, and security vulnerabilities and patches that viruses could exploit are patched very swiftly.
Whatever the reason may be, Linux malware infections are so uncommon that one does not really have to bother about them presently.

Is Linux malware-free?

Even though Linux is virus-free for the most part, it does not imply that the user should start slacking in the security department.
Two years ago, the Linux Mint 17.3 Cinnamon was compromised by a monitoring software which came if users had downloaded it from the download webpage of Mint.
This happened because attackers changed a PHP script in WordPress installation used by the Mint project. This vulnerability was fixed promptly, although till then login credentials, messages, etc. had been breached.
Linux is more secure if you compare it to other operating systems. However, with any web-enabled device, it is necessary to exercise caution.

Are there any antivirus solutions for Linux?

Yes. Several. Even though developers will talk down the risks of infections, and they are correct in several ways, it doesn’t hurt to exercise caution.
If you think that Linux is malware-free and viruses for Linuxes do not exist, then you are totally wrong. Since Linux is gaining more and more popularity, virus attackers are becoming increasingly interested in it.
Get an antivirus which can detect and remove malware effectively. Ensure that the program scans for viruses in real-time.


Thursday, June 21, 2018

Adobe To Integrate PDF Service To Office 365

Recently, Adobe and Microsoft are announced that they are enlarging their close partnership by combining Adobe PDF services into Microsoft Office 365. The Adobe’s PDF services will be available from the ribbon inside the web versions of MS Word, MS PowerPoint, and MS Excel. The commercial users of Microsoft Office 365 will easily be able to convert documents into the PDFs all while preserving the font choices, layouts, formatting, and password protection features.
The PDF integration follows the news of Microsoft’s is planning to redesign its Microsoft Office web application to be more modern and a lot faster to use. Microsoft is also starting to test the easiest ribbon for Office.com and also on its Office desktop application, and now the Office on the web will include the avatars for comments and enthusiastic colors for the participants who are editing and viewing the similar document.
Recently, Adobe has been worked with the Microsoft on the PDF integration process, by following the company’s e-signature solution for becoming preferred for the Microsoft Office 365 usage. In the recent years, Microsoft and Adobe have increasingly worked intimately, and a nearer partnership has started around the time while both companies teamed up to improve the Photoshop on touchscreens back in the year 2014. Adobe is also integrating its PDF services into SharePoint and OneDrive, along with the deeper integration in Microsoft’s Dynamics 365.


d813bec90524e8805cd74024223dc6a0.jpg

Apple likely to Improve Water-Resistance of Next iPhones

In technology calendar, September is always a noticeable month as every year Apple has revealed its array of new iPhones. Leading towards the launch, the rumor will work eventually and mix out leaks and information almost on a daily basis. The latest in the streak reveals that the new iPhones might get a more water resistant than the previous models. A patent has been filed against Apple for sealed the accessories which are for electronic devices.
According to the United States Patent and Trademark Office (USPTO), one of the Apple’s patent reveals that accessories for an electronic device has been sealed and includes a connector which has a deformable seal situated on it. Then, when the connector is chum to the electronic device, then a liquid-tight seal is formed between the accomplice and also with the electronic device. The accessories will have some functions which are useful in moist, wet or dirty environments.
For the suggestion, the Apple iPhone X and Apple iPhone X which already come with an IP67 rating. Instead, both devices can be submerged in 1 almost meter deep water for up to 30 minutes. However, the new Apple iPhone might get more water resistance. While nothing more has been revealed but the patent does recommend that Apple might develop its iPhones which come with an IP68 rating. The IP68 rating smartphones can save your phone almost up to 1.5 meters of water and approximately up to 40 minutes. It cannot be determined whether the models that are supposed to be launched in this September will come with this feature or not. Though, we can securely say that this is the best feature which will arrive with the iPhone sooner or later.
In the year 2018, Apple is planning to reveal three new iPhones. Among that, all will be a second-generation iPhone X that is predictable to feature the same 5.8-inch OLED display. The second one is allegedly the iPhone X Plus which will come with a 6.5-inch OLED display. Rumors are widespread that Apple might launch a third device that is an affordable 6.1-inch iPhone. This iPhone might come with a full active LCD and the one which is used in premium variants of the iPhone. The three latest iPhones are rumored to feature with an edge-to-edge screen.

Wednesday, June 20, 2018

Netflix Phishing Scam Targets North Bay Resident

North Bay Police recently conducted an investigation into a complaint made in regards to fraud conducted on a bank account which involved a phishing scam using Netflix as a way to gather banking information.
A complaint with respect to irregularities in a bank account was made to the North Bay authorities the phishing mail received by the complainant on their mobile device seemingly originated from Netflix and advised the recipient to enter their banking details as they were outdated. The unsuspecting person re-entered the banking information, and this information fell into the hands of a phisher.
According to the investigation team, the complainant was notified via email that their banking credentials had been changed, and if he didn’t change them, he should get in touch with the bank.
When the person contacted the bank, suspicious activity in his bank account was identified, as a result of which the bank account was suspended in May 2018.
Detective John Schultz from the Canadian Anti-Fraud Centre says that they later learned that several fraudulent financial transactions were made. These activities included withdrawing cash after depositing unlawful bank orders to the bank account.
Netflix is one of the several companies which are used for spoof emails. According to Netflix, they do not require users to give their personal and financial information over email.
The authorities have completed the investigation process, and even though the victim did not undergo a pecuniary loss, the phishers remain unknown.
Detective Constable Schultz says that one can fall victim to phishing quickly as well as easily. However, since the complainant didn’t waste time in contacting the North Bay police and the police authorities worked along with the bank to stop the fraud as quickly as possible.
Phishing frauds are usually connected to sham and unreliable websites and emails, wrongly pretending to originate from an authentic source like a bank, government institution, and multinational corporation in an effort to make the potential victim deliver their personal and financial details. Here it was a spoof Netflix email seeking to get banking credentials.

Monday, June 18, 2018

Chinese Hackers LuckyMouse Hit the National Data Center

As per the report of Kaspersky Lab, a Chinese hacking group has prepared for an attack on the national data center of an unnamed Central Asian country.
The cyber hackers said that’s, they have been used a group to get user information that is called LuckyMouse — it is called by the names that are Iron Tiger, Threat Group-3390, EmissaryPanda, and APT27. In 2017 the attacks have started, and the Kaspersky says that malicious scripts were infected into the official website to conduct the country-level waterholing campaign.
Kaspersky says that the gathering utilized the HyperBro Trojan remote organization device to sidestep antivirus devices between December 2017 and January 2018. The Russian security firm recognized the hacking effort back in March this year. It has selected not to name the nation that has been focused by the hacking gathering, yet says:
Because of apparatuses and strategies being used we ascribe the crusade to LuckyMouse Chinese-talking on-screen character (otherwise called EmissaryPanda and APT27). Likewise, the C2 space update.iaacstudio[.]Com was already utilized as a part of their crusades. The instruments found in this battle, for example, the HyperBro Trojan, are used consistently by an assortment of Chinese-talking performing artists. As to’s shikata_ga_nai encoder – even though.
it’s accessible for everybody and couldn’t be the reason for attribution, and we know this encoder has been utilized by LuckyMouse beforehand.
Government substances, including the Central Asian ones additionally, were an objective for this performing artist previously. Because of LuckyMouse’s progressing waterholing of government sites and the comparing dates, we speculate that one of the points of this battle is to get to pages utilizing the server farm and infuse JavaScripts into them.
There isn’t sufficient data about for Kaspersky to have the capacity to decide precisely how LuckyMouse figured out how to assault government sites keeping in mind the end goal to get the crusade in progress, however the organization says: “The principle C2 utilized as a part of this battle is bbs.sonypsps[.]com, which set out to IP-address, that has a place with the Ukrainian ISP arrange, held by a Mikrotik switch utilizing firmware rendition 6.34.4 (from March 2016) with SMBv1 on board. We presume this switch was hacked as a component of the crusade to process the malware’s HTTP asks. The Sonypsps[.]com space was kept going refreshed utilizing GoDaddy on 2017-05-05 until 2019-03-13.”
In a blog entry about the assaults, Kaspersky’s Denis Legezo says that they could be demonstrative of another, more subtle type of programmers:-
LuckyMouse seems to have been exceptionally dynamic as of late. The TTP for this crusade is very regular for Chinese-talking performing artists, where they ordinarily give new robust wrappers (launcher and decompressor ensured with shikata_ga_nai for this situation) around their RATs (HyperBro).
The most different and fascinating point here is the objective. A national server farm is a profitable wellspring of information that can likewise be mishandled to trade off authority sites. Another intriguing aspect is the Mikrotik switch, which we accept was hacked particularly for the crusade. The explanations behind this are not clear: ordinarily, Chinese-talking on-screen characters don’t try masking their movements. Perhaps these are the initial phases in another stealthier approach.

Keep Your Children Safe Online

The internet is a fantastic tool for learning and entertainment, but it has a sordid side and children can easily stray into it.  On the sunny side, more guardians are recognizing the potential dangers of the internet, which is the first step towards preventing them. In a US poll, adults cited cyber safety second on the list of top health issues children face currently.
Even if parents wish to keep their kids safe on the web, with technology developing swiftly, it is difficult to maintain pace with the latest threats.
For this reason, we have come up with a list of internet security risks for children. In this guide, you will discover the common hazards kids can encounter on the web and get tips for thwarting them.

Cyberbullying

The incidents of cyberbullying are alarmingly common. The Cyberbullying Research Center states that over 27% of respondents (children) say that they have experienced cyberbullying. Unfortunately, merely ten percent of cyberbullying victims notify a parent or a trusted adult about the bullying incident. Moreover, victims of online bullying are two to nine times more prone to consider suicide.
What you can do:-

Report Cyberbullying

Keep reminding your children to inform you of any hateful or obscene messages they come up against and encourage them to tell the truth. Maintain a record of the online harassment and report the issue to your local police or law enforcement agency if need be.

Block Cyberbullies

If your kid is being attacked via instant messaging, social media platforms such as Facebook, Twitter, or applications such as Snapchat, block the cyberbully instantly. Additionally, report the cyberbully to the website where the incident occurred.

Identity Theft

Young kids are major targets of identity theft as they have clean credit records. Child identity theft happens because kids have Social Security numbers because their parents list them as dependents for tax purposes. If a thief gets the SSN, they can conduct a fraudulent activity which may go undetected for years.
What you can do:-

Keep Information Private

Do not let your children post identifying details such as their full name, birth date, residential address, etc. because this information can be used to steal the child’s identity.

Monitor Credit Reports

Be aware of the warning signs of ID theft and monitor the credit report annually. Reach out to every Credit Reporting Company if your child falls victim to identity theft.

Online Predators

41 percent of parents worry about their kids being in contact with dangerous strangers on the web. This fear is valid as one in five teenagers who regularly use the internet admits that they have received unwanted solicited messaged over the internet. Cyber safety for kids includes taking measures to warn them about predatory behavior.
What you can do:-

Talk About the Issue

Explain the dangers of the internet to your child. Ensure them that it not their fault if somebody sends them inappropriate messages, and remind them to let you know about it as soon as possible.

Keep An Eye On Their Online Activity

Keep monitoring your child’s online accounts and web history and speak to them if you find anything concerning. Instead of snooping around your child, let them know that you are monitoring their internet activity. You can also use parental control applications.

Top 20 Android Games of 2018

Gaming on the mobile phones has been improving at a very extreme greater rate than any other technology came before it. Every year Android game seems to strike some new heights. With the releases of Vulkan API and Android Nougat, it only locates to get better and better over the time. It won’t be so long before any mobile glimpse even some more striking titles than we already have.
However, the Apple’s iOS perhaps has a better selection of games, but now the Android has also grown-up significantly over the past few years. Here, we have gathered the list of top 20 Android games of 2018 that are currently on the market. Some of them are free of cost, and others cost a few bucks, but all of them provided an entertaining experience on the go. And also given that there are thousands of titles which across a range of genres role-playing, sports, platforming, etc.

List of top 20 Android Games of 2018

  1. Oceanhorn
  2. World of Warships Blitz
  3. Real Racing 3
  4. Injustice 2
  5. Motorsport Manager Mobile 2
  6. PUBG Mobile
  7. Into the Dead 2
  8. O.V.A. Legacy
  9. Eternium
  10. R-Type
  11. Pokémon Go
  12. Sonic the Hedgehog
  13. Pac-Man
  14. Badland
  15. Project Highrise
  16. Minecraft — Pocket Edition
  17. Project Highrise
  18. Super Mario Run
  19. Vandals
  20. Alto’s Adventure

Facebook Made Special-Access and Data-Sharing Deals with Firms

In the months that have followed Mark Zuckerberg’s testimony before Congress, Facebook has repeatedly found itself in the headlines. Once again, it has come to light that the social media giant has been less than transparent, with the Wall Street Journal reporting that certain companies deemed to provide particular value to Facebook were placed on what was internally dubbed as “whitelists,” granting them access to customer data.
Two companies identified as making the whitelist include the Royal Bank of Canada and Nissan Motor Co., a source familiar with the matter reportedly told the Journal. In addition to phone numbers, the information the companies were able to access included a “friend link” metric, which provided data on the degrees of separation among users and their friends.
While no additional names of whitelisted companies have been disclosed, Facebook has justified the deals, reportedly claiming that the access was granted with the intention of both improving the user experience and allowing third parties and partners the time needed to conclude their previously existing data-sharing projects.
Facebook acknowledged the “small group” had been granted extended access beyond 2015 May as part of what Ime Archibong, vice president of product partnerships, Facebook, called the company’s consistent and principled approach to working with developers.
Archibong reportedly said that as they were winding down over the year, there was a small number of companies that asked for short-term extensions, and that, they worked through with them. But other than that, things were shut down.
This newest whitelist revelation is separate from the data-sharing partnerships with device makers that were reported last week. A Facebook spokeswoman is said to have confirmed that the company has been sharing users’ data with at least 60 different device producers, including Apple, Microsoft, and Samsung, since 2007.
Despite its claim to have stopped third-party access to information on users’ friends back in 2015, NordVPN wrote that Facebook does not internally consider device makers to be third parties, so it did not disclose the fact that it was sharing the same data with those companies.
494c12ad03ca9f55e5a835c60f99b26e.jpg

Friday, June 15, 2018

How to Stop Annoying Google Ads from Following you Online?

We all know that the online ads follow us everywhere on the internet. When you type anything in your search engine or if you visit any website, then the online advertisers will begin popping up the appropriate advertisement to everywhere you go on the internet, it might be your social media network, your email inbox or anything else. It is also the same for Google Ad sense advertisement too. It is strictly or technically termed as performance advertising or interest-based advertising.
However, Google always shows you the advertisement as per your interests and behavior on the internet. For example, if you like a Facebook page of any particular brand, then Google will start showing you the advertisements for that brand everywhere on the internet.

How to Stop Google Ads from following you on the Internet?

There are two types of Google ads which follow you on the internet,
  1. One is when you are already logged into your Google account
  2. The second one is when you are not logged into your Google account.
Both of these two advertisements are based on your internet surfing, browsing, and searching. You will only see the ads for services and products which you have once searched for. Google is very smart as it will only display the ads that are according to your age group, your gender, and your location and it also makes the use of Cookies for this principle.
  1. When you are already logged In into your Google account
It is truly very easy to stop the Google by following you around the internet and showing you the advertisement. To stop these ads, you need to follow the given steps
  1. Visit the google.com while you are logged into your Google account
  2. Click to uncheck the box showing the message “Also use Google Account activity and information to personalize advertisement on these apps and websites and also store that data in your Google Account.”
Once you uncheck the box, Google will automatically stop linking your websites and browse data with their advertising partner applications and therefore will stop showing the advertisement which is based on your internet activity and your interest. However, it might take some time to imitate the change in your settings.
  1. When you are not logged into your Google account
  2. When you are not logged in with your Google account, then you need to visit on google.com/settings/u/0/ads/anonymous
  3. Click to uncheck the two boxes which show the message like this,
  • Ads Personalization Across the Web
  • Ads Personalization on the Google Search.
Once you uncheck the box, then Google will automatically stop showing you the ads when you are on your Google Search page or YouTube. However, some ads will still appear, but they will be irrelevant.
With these given setting squeezes, you can revolve the Google ad personalization on or off. Now, these settings are saved to your Google Account (if you are signed in), or to your browser (if you are not signed in).
Apart from these settings, you can also use the Google Chrome plugin to opt out the personalized ads.

Google Chrome Plugin Opt-Out IBA

It’s the plugin for the Google Chrome which allows you to opt out of Google’s interest-based advertisement on its partnering websites. For this, you just need to install the plugin, and it will allow you to opt out the DoubleClick advertising cookie which is generally used by Google to provide you the internet based advertisement.

Almost 2.27 Million Computers Affected by CCleaner Hack, Including Yours?

Computer-optimization software is invented to keep your computer system running efficiently. Well, in this situation, might be not that much. Recently, the company who makes the CCleaner, Avast’s Piriform, revealed that it’s a free software which was infected with malware. If you are using CCleaner Avast Piriform, here’s we provide the complete process of what you need to know.

Exactly What Does Malware Do?

It collects your all information like your IP address, a list of installed software on your computer, computer name, a whole list of active software and a list of network adapters and sends it to a third-party computer server. Your social security number, credit card numbers, and the like appear to be safe.
“Working with US law enforcement, we caused this server to be shut down on the 15th of September before any known harm was done,” said the company in the announcement.

Who was infected?

According to Avast CEO Vince Steckler and Consumer Business CTO and EVP Ondrej Vlcek, the compromise to the computer system might have started as early as on July 3, before Avast is buying the company. The compromised version of CCleaner software was next released to the customers on August 15.
In a survey, around 3 percent or approximately 2.27 million computers are used the infected software. Particularly, these computers running 32-bit Windows 10. If that applies to you, don’t need to worry. The company supposes that they were capable of defusing the malware before any harm or attack was done to anyone.

How to Recognize the Corrupted Version of CCleaner?

The CCleaner versions which were affected are CCleaner Cloud v1.07.3191 or CCleaner v5.33.6162 for 32-bit Windows operating system. However, the Android version for phones doesn’t appear to be affected. In a recent survey 730,000 users are using the affected version of the CCleaner.
If you have already updated your software, then you should be ok or save yourself from malware infection. Moreover, if you have the Cloud version, then it should have automatically updated itself into the clean version.

If you don’t Use the Cloud Version?

CCleaner v5.33.6162 never update on its own, so if you are using the non-cloud version, then you might have the corrupted software. Piriformis recommending that deleting your current version and downloading a clean version from its website.
After you downloaded your new software, click to run a check on your system by using the malware protection software for making you sure that CCleaner doesn’t need to leave any malicious attackers behind.

Microsoft Is Rumored To Release Andromeda Tablet This Year

Microsoft could be gearing up to launch a brand new range of Surface-branded devices. Inside records reveal that Microsoft could be preparing to release a trio of devices, as implied by the secret code-named ‘Andromeda,’ ‘Carmel’ and ‘Libra,’ as per Thurrott, which was the first to find the documents.
Andromeda is estimated to be one of the most progressive new launches from the tech giant, since it may include totally new hardware dimensions and component layout, including a dual-screen design which can fit in a person’s palms.
It is believed that the parents for pocket-able, dual-display, handheld device filed by the company earlier have been for Andromeda.
Stories have been rolling since weeks that the company has been contemplating a full overhaul of its Surface series of computers. Both Andromeda, as well as Libra, may hit the markets this year, whereas Carmel is more likely to hit the shelves next year or later. Andromeda was listed in the internal records as possessing a launch date of 2018, Thurrot wrote.
A patent which was issued in April 2018 boasted about a device which has a foldable screen, or a ‘digital pocket notebook’ which is able to fit in a person’s hands. As reported in Thurrot.com, the company might want Andromeda to work as a PC and that it may also take the form of a Surface Phone.

Microsoft is not the only one!

 Microsoft is not the sole company which is rumored to be thinking about a dual-screen display.
Very recently, ZTE launched a dual-screen phone which has a hinge, whereas Asus has merchandized Project Precog, a concept computer which has two screens.
Lenovo also verified that Yoga 2, a dual touch-screen laptop is going to launch soon
‘Libra’ is expected to be a relatively less expensive Surface tablet which has been considered to be in the works.
In May 2018, it was revealed that Microsoft is planning to go for a reasonably priced Surface tablet in order to compete in a better way with rival iPad.
This device might be launched by the end of this year and will possibly have a 10-inch display screen, Intel processors, USB-C charging, and Windows 10 Pro.

What are the rumors floating around Microsoft this year?

The tech giant is rumored to have various new products in the pipeline for this year and the following year.
Up to this point, it has been greatly considered that Microsoft is estimated to refresh its range of Surface products. Microsoft may launch a brand-new, affordable Surface tab in 2018 that competes with Apple’s iPad. Codenamed ‘Libra,’ it is estimated to begin at $400, and it may be released post the second half of this year.
The other device, which is called as Carmel internally, will be a replacement to the newest Surface Pro device. Though, it will probably consist of the most recent processors from Intel, which are due to towards the end of 2018. Therefore the ‘Carmel’ device will not be released until the next year at the earliest.
Possibly the most obscure Surface device which is rumored to be in the process of being made is ‘Andromeda,’ which be a Surface-branded phone.
Besides these devices, the company intends to launch a low-cost keyboard case, stylus, and mouse. The current kit is priced at $160.
Microsoft might also be gearing up to release a low-cost version of the HoloLens, which has been codenamed ‘Sydney,’ in 2019.