Take a look at a recent attempt of a couple of U.K. thieves to steal a Tesla Model S. They’re smart enough to actually gain entrance to the vehicle without the fob but they’re not smart enough to unplug the charger!
The owner of the vehicle does admit to not doing a couple of things that could have actually prevented the bad guys from gaining entrance including setting a PIN and using a Faraday pouch for the fob (while would block fob’s signal).
But it just goes to show that even “sophisticated” criminals who use technology aren’t always the brightest.
Microsoft Edge Allows for Web Logins without Remembering Passwords
By leveraging Windows Hello hardware, users can now log into websites using things like IR cameras, fingerprint readers, external security keys, and PINs without having to remember your passwords. Microsoft believes that having these additional means of logging in will not only allows users to log into website more easily, they also think this will assist users with security concerns, and that makes sense from the standpoint of things like key loggers (if a user doesn’t type his password into a field then a key logger can’t grab the password). While this may be true, please keep in mind that the bad buys are always on the lookout to crack the latest security ideas. Additionally you should be sure to follow existing best practices when it comes to passwords. This means be sure you have a safe backup of all your passwords, don’t use the same credentials for multiple sites, etc.
To try this you’ll either Windows Insider Preview 17723 or you can wait for Windows 10 version 1809 to be released.
Having computer or other technology problems but really busy with work or kids so it’s hard to contact us through the week? For your convenience and to better serve you, we’re happy to announce that starting today we’re open Saturday’s from 9am – 2pm. So give us a call or stop by today and let us serve your technology needs!
The infamous hacker group Anonymous has declared war on jihadists over the Charlie Hedbo attack. Anonymous stated in a video posted on YouTube that the Islamic extremists are the “enemy of the freedom of speech” and that they will be shutting down social media sites and websites related to the terrorists, according to CNN.
The group stated in the video, “Freedom of speech and opinion is a non-negotiable thing, to tackle it is to attack democracy. Expect a massive frontal reaction from us because the struggle for the defense of those freedoms is the foundation of our movement.”
Some believe, however, that taking down the social media sites of the jihadists could make monitoring the terrorists more difficult, according to the BBC.
Anonymous is usually an enemy of authority and government. They have shut down sites related to policies they disapprove of. This includes government sites, child pornography sites, and the sites of large corporations likes PayPal, Sony, Visa, and Mastercard, according to Daily Mail. Support for the hacker group is divided. Some see the group as “hacktivists,” doing good for the world while others see the group as cyber terrorists.
Anonymous is based world-wide. Over the years, dozens have been arrested in the US, UK, Australia, the Netherlands, Spain, and Turkey.
Anonymous shows us that the wars of today, and of the future, will not only be fought with guns and bombs, they will be fought in cyberspace. It is becoming increasingly important to protect yourself online.
A young woman from the Netherlands who suffers from a chronic bone disorder will be receiving a new top portion of her skull thanks to a 3D printed skull. She is 22-years-old and the disorder has caused her skull to increase in thickness from 1.5cm to 5cm which has resulted in reduced eyesight and severe headaches.
A team of neurosurgeons at the Utrecht University Medical Centre performed the miraculous surgery. It is claimed that this is the first successful 3D printed cranium not being rejected by a patient. After a 23 hour surgery, led by Dr. Bon Verweij, the patient was saved from impending death or severe brain damage due to the thickness of the skull.
Prior to 3D printing technology there was no real ideal or effective treatment. “It was only a matter of time before critical brain functions were compromised and she would die,” said Dr Verweij.
Using an unspecified plastic the skull was specifically made for the patient. The patient has since regained her eye sight back completely and is symptom free and back to work. Whether the plastic will last for the remainder of her lifetime remains to be seen. If it does not, a future surgery will be required.
It is hoped that the technique will allow doctors to help people who have severely damaged skulls due to cancer or trauma.
Apple released the IOS 7.0.6 upgrade without much emphasis on its importance, but don’t take that with a grain of salt. It’s important! It fixes a nasty bug that allows an attacker with a privileged network position to capture data protected by SSL/TSL. Sound like jargon? Here’s our suggestion. Update your iPhone right now!
Also, keep in mind that OSX has the same issue and has yet to have a fix rolled out. The bug in question doesn’t allow an app or Safari to authenticate the security of the site/app which makes a user vulnerable to a ‘Man in the Middle’ attack. A ‘Man in the Middle’ attack happens when an attacker intercepts communication between a user’s browser and a website. These attackers can monitor, record, and see anything that happens during these transactions. When you think of online banking and other financial websites, this becomes a very scary “bug”, but they can also see your Facebook conversations, Gmail, and any other site you might be utilizing at the time.
While these attacks are normally remedied by the SSL/TSL of any particular website, this “bug” allows people to bypass that leaving you as vulnerable as you would be without them. Another scary thing to think about is that this bugged OS release has been in use since September of 2012.
Wondering if you should be worried? Look at it this way. Developers (who truly understand the moving parts of the bug) weren’t even willing to discuss it as they were worried it would give hackers needed information to take full advantage of the “bug”.
Zeus is known for being one of the most effective tools for stealing a person’s banking information as it hacks login details and even masks secret transactions taking place in the background. Zeus VM is the newest variant that downloads a users configuration file that contains the domains of the bank. Then the malware is instructed to intervene during the transaction.
This was first noticed by a French researcher who writes under the name Xylitol. Jerome Segura, security researcher for Malwarebytes wrote “The malware was retrieving a JPG image hosted on the same server as were other malware components.”
Steganography has been used by malicious code writers for quite some time and is nothing new. The embedded code in the file format looks legitimate and is sometimes overlooked by security software. Most webmasters would assume an image that can just be viewed would be harmless. In bitmap mode the suspect image appears to be much larger and the malicious data that has been added and encrypted using Base64 encoding and RC4 and XOR encryption algorithms.
Even Wells Fargo data has been shown to be captured by this malware.
In recent weeks a study was released stating that (according to Google trends), Facebook could lose 80% of its users between 2015 and 2017. The research was done comparing the decrease to that similar of a disease, which fades as people become immune.
Everyone remembers their old MySpace accounts and how addicted they were to those. Now, most people either have no MySpace account or have not even logged into that account in years. At the time, everyone thought that nothing could replace their beloved MySpace. Now, there are many contenders for the top spot of “web sharers”. Google+, Twitter, Instagram, Pintrest, and that’s just to name a few. While the latter three are not geared as much towards a Facebook style, Google+ is a very powerful and increasingly popular alternate.
The thing about studies is that it all depends on the quality of data that is being analyzed. Garner Marketing research firm director Brian Blau says that the quality of the research seems “suspect.” If the quality of the research is correct, this paints a grim future for Facebook. You can see by the constant rollouts of new features and the ever unpopular changes to their algorithm that Facebook is doing their best to try to remain popular and profitable.
Facebook, in response, also created its own parody study trying to debunk the Princeton study. Data scientist from Facebook, Mike Develin stated that it served as a “fun reminder that not all research is created equal.” Based on similar data showing a decline in the searches for Princeton the Facebook team predicted “will have only half of its current enrollment by 2018, and no students at all by 2021.”
But, all kidding aside. Facebook will need to focus on making their users and brands that use the platform to reach their followers and customers happy to insure a prosperous future for the company and social platform.
bRight Switches could be making their way into a home near you, maybe even yours. This will basically replace your plain light switches with a tablet device. Of course this won’t be just any old light switch. It will expand the functionality well beyond just turning on your lights.
One of the many things that the new “switches” will do will be able to recognize when someone walks into a room and adjust the lights accordingly. It will also allow you to turn on and off your lights remotely by logging in through the internet and even has learning behavior that allows it to get to know your routines and have things “just the way you like it” right when you walk in the door.
it will also provide security for your home and even allow you to access video footage from all the tablet interfaces in your home. It will even trigger an alarm if triggered by motion.
The wall-mounted tablets will be able to run most other native Android apps so you could even launch an Angry Bird or two from your wall. The platform is also expected to have much expansion to allow for future upgrades to the device.
When Google purchased Motorola, it was losing money hand over fist. Google saw potential in the brand and began the process of rebuilding the integrity of Motorola. First, it discontinued the Motorola ‘dumb’ line. The use of more intuitive software and less gimmicks has been a hit since the release of the Moto X.
Lenovo has been making big waves in the smartphone market, but to this point has kept its sights off of the United States. With this aquisition, you can bet that they will begin to shift their focus when it comes to their lines of smartphones. When you look at the purchase price you will see that Google is taking a giant bath on this deal. They are selling to Lenovo for $2.91 billion only 2 years after purchasing the company for $12.5 billion. That is a huge loss.
While Lenovo is purchasing the company, it’s more of a partnership. Google will still retain the vast majority of patents including “current patent applications and invention disclosures.” This will be an ongoing relationship with Google.
You can bet that all eyes will be on the next line of Motorolas that roll out with Lenovo driving the ship. Lenovo will use it’s current brand of smartphone in the markets where they are already doing very well and bring the Motorola brand to the United States. In markets like China, they may market both.
This deal will also free up Google from conflicts with other partners such as Samsung along with shedding a losing handset business. In the long run this will actually increase profit margins for the search giant.