Wednesday, March 25, 2015

Some Tips On How To Disable Startup Programs in Windows 8


Whenever your machine is running slowly, one of the first things you should check out is the list of programs that are auto-starting with Windows. Currently, it seems to be a common practice for software developers to include the auto starting function into their products. Even though this functionality is very important for security software such as anti-virus, for other programs, there is no harm whatsoever with disabling this behavior because any software can be started manually when required.

Usually, the best method of preventing any software from auto-starting with Windows is through the programs own Preferences/Settings. This is usually accessible by right clicking on the programs system tray icon. It is worth noting though that not all software programs include this option to disable their auto start feature and because of this, the startup manager comes in quite handy.

In Windows 8, managing startup items is accessible via the Task manager; in previous versions of Windows one could do this through the msconfig utility. Even though there are several methods of accessing Task Manager, here is how to disable startup programs in Windows 8. The easiest method is to right click on the Taskbar and then select the Task Manager from the menu. You can also press Ctrl + Alt + Delete or right click at the bottom left hand corner of the screen. At times, a simplified version of the Task Manager might popup, if this happens, just click on More Details.

Once this is done, click on the Start-up tab which appears at the top of the Task Manager window and a list of all the current start items will be displayed. You then simply highlight any program you want to prevent from auto-starting and then click the Disable button.

For one reason or another, you may be interested in accessing the actual startup folder. This is especially useful if you are not very conversant with the operating system. In most instances, the startup folder will be saved as a hidden file and you will therefore be expected to enable the option of displaying hidden files. To do this, go to Control panel, then click on Folder Options and then click on the View tab. Now, place a checkmark next to the option written "Show hidden files, folders and drives". Next, click Apply then click OK so as to apply the change.

Once this is done, keep in mind that the per user startup folder is usually stored in "AppData". Go to Computer, Click on C Drive, then click on Users, then Username, then AppData. You then click on Roaming, then Microsoft, click on Windows, then Start Menu, then Programs and finally click on Startup.

A quicker way to get to this though is to open the Run utility by simply pressing the Win + R keys or right clicking at the bottom left hand corner of your screen and the selecting "Run" from the menu. You can then type Shell: Startup into the dialog box and then click OK or press Enter.

If you want to access the "all users" start folder, you can quickly navigate to this folder by opening the Run dialog box and typing Shell: Common Startup.

Facebook Testing 'Phone' App for Android

Facebook Phone app
An accidental Facebook update revealed that the social network is testing a new Android app called Phone.
Android Police was kind enough to take a screenshot of the update. It suggests that Facebook Phone could act as a native dialer that shows information about who is calling you, and prevent commonly blocked numbers from getting through.
I can hear you asking now, "doesn't Facebook already have a calling feature in its Messenger app?" Indeed, it does. But like it did with its Messenger app, it's likely that Facebook wants to simplify its products by releasing dedicated apps, like it did by creating a separate Messenger app. See more in the video above.

Battery Parts Made Out of Packing Peanuts in the Possible Future

Image result for battery picture
Your new batteries could be made out of packing peanuts soon. Researchers from Purdue University have been developing a way to take those old packing peanuts in your shipments and turn them into parts of rechargeable batteries. Only ten percent of the U.S. supply of packing materials are recycled, leaving much of it in a landfill. The Purdue team is instead turning the fluffy foam into carbon microsheets and nanoparticles to use in rechargeable batteries with a new process - baking the peanuts at 1100 degrees Fahrenheit, which will give the materials a 15 percent higher electrical storage capacity than microsheets made at higher temperatures. The modified peanuts were then tested as anodes in rechargeable lithium ion batteries and seemed to work better than some of the commercial tech already out there (usually made of graphite materials).

Tuesday, March 24, 2015

The new HTC One M9

HTC One M9 ReviewHTC One M9 Review
the HTC One M9 is one of the first out of the gate, hoping to get a slight head start against the anticipated horde of competition we know that’s lurking in the shadows, waiting and poised to make their move.HTC is hoping that its latest effort is enough to do justice in the always-competitive high-end smartphone space. With more and more competition looming on the horizon, the M9 needs to succeed valiantly in order to contain its place amongst the elites.


Facebook Payment application ,Would You Send Money Through a Facebook App?

Image result for facebook.com logo
Facebook has added a feature to its chat to give users a way to send and receive money. Once you’ve installed the new payment function you can simply click on the $ icon, enter the amount, click pay in the top right corner and add your debit card options. The transaction requires a Visa or MasterCard debit card and a pin for security. Facebook gives user additional layers if authentication and is encrypting the connection between you and FB, as well as your card information. Even with a team of anti-fraud specialists monitoring the system do you feel secure enough to send or receive money through Facebook?

Windows Hello Uses Your Face or Fingerprint As Your Password

Image result for windows logo
Windows 10 is coming this summer, and with it comes a new way to do away with passwords - Windows Hello. The service will let you log in via a fingerprint, face, or iris - and it's apparently smart enough to know whether it's you or not. Hello will also work with Microsoft Passport (formerly your Microsoft account). It'll allow you to log into compatible services. If the app or service supports the FIDO authentication standards, Hello and Passport on Windows should work well with it. Of course, the catch is having the right hardware to use Hello - a fingerprint reader, an illuminated IR sensor, or even your webcam might do the trick. Is this a next level of password security that could catch on more with the average consumer?

UK Inspiring the Next Generation of Developers

Image result for uk flag
The BBC has created a nationwide initiative, Make it Digital, to inspire the next generation of developers. Every child in sixth grade can be given a microcomputer to learn programming and digital technology. The country is at risk for a major skills shortage over the next five years. A similar program, the BBC Micro, was run in the 1980s to help the country adjust to the first wave of personal computers. The Micro Bit coding gadget is still in development, but this fall one million will be given out in England, Wales, Scotland, and Northern Ireland. Partnering with 50 major UK organizations a traineeship will also launch this summer. It’s a nine-week camp to teach basic digital skills to 5,000 unemployed, young people looking for work. Do you think other countries would benefit from a similar program?

Sunday, March 15, 2015

Scientists have achieved wireless energy transfer across 55m



Scientists in Japan have announced that they've successfully managed to transmit energy wirelessly with high accuracy. It’s a game-changing achievement for electricity generation that could one day allow us to place huge solar sheets in space and beam the energy back to Earth.

The researchers from the Japan Aerospace Exploration Agency (JAXA) announced yesterday that they had used microwaves to deliver 1.8 kilowatts of power - just enough to power a kettle - through the air to a receiver 55 metres away, with pinpoint accuracy.

"This was the first time anyone has managed to send a high output of nearly two kilowatts of electric power via microwaves to a small target, using a delicate directivity control device," a spokesperson for JAXA told AFP.

In the meantime, we're all getting excited about the potential of wireless energy transfer here on Earth, with researchers recently developing technology that uses a magnetic field to charge devices from five metres away, and a router that can beam electricity to up to 12 devices at once. But even though this is pretty impressive, it's got nothing on the distance of JAXA's wireless energy transfer, or its ambition.

Although there’s still a long way to go, the team’s ultimate goal is to set up solar satellites around 36,000 km off Earth’s surface, where they’re able to soak up the intense solar energy from the Sun and then beam it back to Earth via antennae, providing the planet with unlimited renewable power.

It’s something the agency has been working on for years, after seeing man-made satellites such as the International Space Station surviving easily on solar.

"But it could take decades before we see practical application of the technology - maybe in the 2040s or later," the spokesperson told AFP.

"There are a number of challenges to overcome, such as how to send huge structures into space, how to construct them and how to maintain them."

Still, we can't help but get excited at the prospect of fossil fuel-free electricity being beamed down on us from outside our atmosphere. It doesn't get more futuristic than that.

Source: AFP

BlackBerry, Samsung and IBM team up on the SecuTABLET

Samsung Galaxy Tab S 10.5
Secusmart collaborates with IBM and Samsung to deliver global expertise
SecuTABLET provides high-security mobile communication for national and international authorities.
Düsseldorf – Secusmart, a BlackBerry company, is presenting with IBM at CeBIT 2015, the SecuTABLET, a high-security tablet based on the Samsung Galaxy Tab S 10.5. With the new secure tablet for national and international public sector markets and enterprises, data that is subject to special security requirements can be used on the move. Personal applications or those that are not additionally secured, such as Facebook, YouTube, Twitter and WhatsApp, can also be used.
The solution is undergoing certification at the German Federal Office for Information Security for the German VS-NfD (classified – for official use only) security rating.
The SecuTABLET is a new, secure tablet that supplements the SecuSUITE for BlackBerry 10 portfolio and can be seamlessly integrated into existing SecuSUITE infrastructures.
"Security is ingrained in every part of BlackBerry's portfolio, which includes voice and data encryption solutions," said Dr. Hans-Christoph Quelle, CEO of Secusmart GmbH, a BlackBerry company. "National and international government customers have entrusted their voice and data communications with the Secusmart Security Card for years. This same technology is what secures the new SecuTABLET. Working alongside IBM and Samsung, we have added the last link in the chain of the Federal Security Network. Subject to certification of the SecuTABLET, German government agencies will have a new way to access BlackBerry's most secure and complete communications network in the world."
Joint expertise for global security of communication
The IBM Institute for Business Value (IBV) study on Mobility Impact notes that 63 percent of public sector respondents would appreciate mobile access to their specialized applications like budget and controlling. These data are subject to special security requirements. Access via conventional mobile devices is ruled out.
"The SecuTABLET closes a supply gap and opens up for government and administrations an opportunity to derive greater benefit from digitization and the mobile Internet, with system integration as a fundamental success factor," said Stefan Hefter, Senior Management Consultant with IBM. "We have contributed our longstanding expertise as a system integrator for mobile solutions. The technology used to make mobile apps secure by means of so-called wrapping has already proven its worth in the United States."
IBM has provided the secure app wrapping technology for the SecuTABLET, and assists in implementing the high-security solutions by Secusmart within the infrastructures of the various clients inside the governmental sector.
As a BlackBerry company, Secusmart enhances the company's commitment to remaining the leading provider in enterprise mobile security. BlackBerry is the only mobile device management (MDM) vendor that has achieved the "Full Operational Capability" level of certification for operation on U.S. Department of Defense Networks. Furthermore, BlackBerry 10 smartphones were the first to be approved by NATO for classified communications up to "Restricted" level.
Secusmart GmbH (www.secusmart.com), a BlackBerry company (BlackBerry - NASDAQ: BBRY, TSX:BB), is the leading expert in the development and implementation of comprehensive olutions for protecting businesses and governments from electronic eavesdropping. The Düsseldorf-based company's latest innovation is the high-security SecuTABLET, which has been created with IBM and Samsung for use by national and international government agencies and companies. The anti-eavesdropping app Vodafone Secure Call ensures companies can make secure mobile voice calls regardless of the platform and device being used. Since the start of 2015, one of the solutions for securing communications and protecting companies from corporate espionage has been sold to German business customers by Vodafone Germany, the solution's first marketing and distribution partner. With its SecuSUITE for BlackBerry 10 high-security solution, Secusmart also protects the mobile communications of German and foreign governments as well as agencies and organisations responsible for providing emergency services.
For more about IBM visit www.ibm.com

UK Inspiring the Next Generation of Developers

Image result for uk logo
The BBC has created a nationwide initiative, Make it Digital, to inspire the next generation of developers. Every child in sixth grade can be given a microcomputer to learn programming and digital technology. The country is at risk for a major skills shortage over the next five years. A similar program, the BBC Micro, was run in the 1980s to help the country adjust to the first wave of personal computers. The Micro Bit coding gadget is still in development, but this fall one million will be given out in England, Wales, Scotland, and Northern Ireland. Partnering with 50 major UK organizations a traineeship will also launch this summer. It’s a nine-week camp to teach basic digital skills to 5,000 unemployed, young people looking for work. 

Wednesday, March 11, 2015

The new Apple Smartwatch


Apple Watch breaks cover: the new category










The Apple Watch is real: after months of endless leaks and speculations about an 'iWatch', Apple unveiled the new Apple Watch to a crowd of tech and fashion journalists. The Apple Watch is a tech gadget with silicon humming under the hood, but it’s not one made for geeks - it has the stylish and fashionable looks that will appeal to ordinary people.
Apple chief executive Tim Cook made it abundantly clear that the Apple Watch is "an entirely new product ... We believe this product will redefine what people expect from its category."

Apple Watch breaks cover: the new category
First, let's break down the essential characteristics of the Apple Watch:
  • Rectangular display (with no round option) uses a bendable AMOLED panel
  • Comes in two sizes: 42mm and 38mm (diagonal)
  • Three editions: stainless steel, anodized aluminum, and 18-karat gold
  • "Digital Crown" jog dial on the side allows easy navigation
  • Brand new Watch OS with user interface tailored to the smaller screen size
  • Siri is on board
  • Sensors: infra-red and visible-light LEDs, along with photosensors, capable of detecting your pulse rate
  • A wide selection of bands
Touchscreen and navigation

The Apple Watch features a touchscreen that can also sense force via a new 'Taptic Engine', so it knows how hard you touch it and reacts differently. Apple calls the harder touch Force Touch and it basically acts as a right mouse click, showing otherwise hidden options. 
A lot of the navigation also happens via the new Digital Crown that is particularly useful for quick zooming in and out. It also acts as a button - press it and you go back to the main menu.
Functionality
While we are used to smartphones and the benefit they bring to our daily lives, smartwatches are a brand new category that actually first has to convince us in all the added value it brings over a classic watch. Here is what the Apple Watch can do, and it's up to you to decide whether this is enough of a reason to make you switch to a smartwatch.
First, you have plentiful watchfaces that are hugely customizable and can be animated, you have quick access to your contacts that you can text with customizable emoji, plus if a contact of yours has and with gestures (but there is no on-screen keyboard), there's even a photos app with your latest pictures (and you zoom in and out using the crown). Next, you've got maps with navigation, so you can find your way around just by using the timepiece. Mapping and navigation are actually an area where Apple brings a lot of value with the taptic engine that vibrates differently to alert you discreetly when you need to turn left or right, so you know the correct direction without having to even look at a screen.
Apple is opening up access to the Watch via an SDK it calls 'WatchKit', so by the time the timepiece arrives, chances are that it will have some great third-party apps. Developers have already made use of it, and the major apps from services like Facebook and Twitter will come built right in the watch. Others have also jumped in: you have American Airlines, for instance, City Mapper, BMW, and many more.










9 facts about computer security that experts wish you knew

9 Facts About Computer Security That Experts Wish You Knew
We asked computer security experts to separate the myths from the facts. Here's what they said.

1. Having a strong password actually can prevent most attacks

Yahoo's Chief Information Security Officer Alex Stamos has spent most of his career finding security vulnerabilities and figuring out how attackers might try to exploit software flaws. He's seen everything from the most devious hacks to the simplest social engineering scams. And in all that time, he's found that there are two simple solutions for the vast majority of users: strong passwords and two-factor authentication.

Stamos says that the biggest problem is that the media focuses on stories about the deepest and most complicated hacks, leaving users feeling like there's nothing they can do to defend themselves. But that's just not true. He told me via email:
I've noticed a lot of nihilism in the media, security industry and general public since the Snowden docs came out. This generally expresses itself as people throwing up their hands and saying "there is nothing we can do to be safe". While it's true that there is little most people can do when facing a top-tier intelligence apparatus with the ability to rewrite hard drive firmware, this should not dissuade users from doing what they can to protect themselves from more likely threats and security professionals from building usable protections for realistic adversaries.
Users can protect themselves against the most likely and pernicious threat actors by taking two simple steps:1) Installing a password manager and using it to create unique passwords for every service they use.2) Activating second-factor authentication options (usually via text messages) on their email and social networking accounts.
The latter is especially important since attackers love to take over the email and social accounts of millions of people and then automatically use them to pivot to other accounts or to gather data on which accounts belong to high-value targets.
So I would really like the media to stop spreading the idea that just because incredible feats are possible on the high-end of the threat spectrum, doesn't mean it isn't possible to keep yourself safe in the vast majority of scenarios.
Adam J. O'Donnell, a Principal Engineer with Cisco's Advanced Malware Protection group, amplified Stamos' basic advice:Oh, and my advice for the average person: Make good backups and test them. Use a password vault and a different password on every website.
Yep, having a good password is easy — and it's still the best thing you can do.

2. Just because a device is new does not mean it's safe

When you unwrap the box on your new phone, tablet or laptop, it smells like fresh plastic and the batteries work like a dream. But that doesn't mean your computer isn't already infected with malware and riddled with security vulnerabilities.I heard this from many of the security experts I interviewed. Eleanor Saitta is the technical director for the International Modern Media Institute, and has worked for over a decade advising governments and corporations about computer security issues. She believes that one of the most pernicious myths about security is that devices begin their lives completely safe, but become less secure as time goes on. That's simply not true, especially when so many devices come with vulnerable adware like Superfish pre-installed on them (if you recall, Superfish came pre-installed on many Lenovo laptop models):
That's why the Superfish thing was such a big deal. They built a backdoor in, and they built a really bad, incompetent one, and now it turns out that anybody can walk through.
When you're relying on code delivered by somebody else, a service online or box that you don't control, chances are good that it's not acting in your interest, because it's trying to sell you. There's a good chance that it's already owned or compromised by other people. We don't have a good way of dealing with trust and managing it right now. And all sorts of people will be using that code.
The other issue, which erupted in the media over the past day with the FREAK attack, is that many machines come pre-installed with backdoors. These are baked in by government request, to make it easier for law enforcement and intelligence agencies to track adversaries. But unfortunately, backdoors are also security vulnerabilities that anyone can take advantage of. Says Saitta:
I think one thing that is really important to understand is that if you built a monitoring system into a network like a cell network, or into a crypto system, anybody can get in there. You've built a vulnerability into the system, and sure, you can control access a little. But at the end of the day, a backdoor is a backdoor, and anybody can walk through it.

3. Even the very best software has security vulnerabilities

Many of us imagine that sufficiently good software and networks can be completely safe. Because of this attitude, many users get angry when the machines or services they use turn out to be vulnerable to attack. After all, if we can design a safe car, why not a safe phone? Isn't it just a matter of getting the tech and science right?
But Parisa Tabriz told me via email that you can't look at information security that way. Tabriz is the engineer who heads Google's Chrome security team, and she believes that information security is more like medicine — a bit of art and science — rather than pure science. That's because our technology was built by humans, and is being exploited by humans with very unscientific motivations. She writes:
I think information security is a lot like medicine — it's both an art and science. Maybe this is because humans have explicitly built technology and the internet. We assume we should be able to build them perfectly, but the complexity of what we've built and now hope to secure almost seems impossible. Securing it would require us to have zero bugs, and that means that the economics are not on the side of the defenders. The defenders have to make sure there are zero bugs in all software they use or write (typically many millions of lines of code if you consider the operating system too), whereas the attacker only has to find one bug.
There will always be bugs in software. Some subset of those bugs will have security impact. The challenge is figuring out which ones to spend resources on fixing, and a lot of that is based on presumed threat models that probably would benefit from more insight into people's motivations, like crime, monitoring, etc.
RAND Corporation computer security researcher Lillian Ablon emailed me to say that there is simply no such thing as a completely secure system. The goal for defenders is to make attacks expensive, rather than impossible:
With enough resources, there is always a way for an attacker to get in. You may be familiar with the phrase "it's a matter of when, not if," in relation to a company getting hacked/breached. Instead, the goal of computer security is to make it expensive for the attackers (in money, time, resources, research, etc.).

4. Every website and app should use HTTPS

You've heard every rumor there is to hear about HTTPS. It's slow. It's only for websites that need to be ultra-secure. It doesn't really work. All wrong. The Electronic Frontier Foundation's Peter Eckersley is a technologist who has been researching the use of HTTPS for several years, and working on the EFF's HTTPS Everywhere project. He says that there's a dangerous misconception that many websites and apps don't need HTTPS. He emailed to expand on that:
Another serious misconception is website operators, such as newspapers or advertising networks, thinking "because we don't process credit card payments, our site doesn't need to be HTTPS, or our app doesn't need to use HTTPS". All sites on the Web need to be HTTPS, because without HTTPS it's easy for hackers, eavesdroppers, or government surveillance programs to see exactly what people are reading on your site; what data your app is processing; or even to modify or alter that data in malicious ways.
Eckersley has no corporate affiliations (EFF is a nonprofit), and thus no potential conflict of interest when it comes to promoting HTTPS. He's just interested in user safety.

5. The cloud is not safe — it just creates new security problems

Everything is cloud these days. You keep your email there, along with your photos, your IMs, your medical records, your bank documents, and even your sex life. And it's actually safer there than you might think. But it creates new security problems you might not have thought about. Security engineer Leigh Honeywell works for a large cloud computing company, and emailed me to explain how the cloud really works. She suggests that you begin thinking about it using a familiar physical metaphor:
Your house is your house, and you know exactly what the security precautions you've taken against intruders are - and what the tradeoffs are. Do you have a deadbolt? An alarm system? Are there bars on the windows, or did you decide against those because they would interfere with your decor?
Or do you live in an apartment building where some of those things are managed for you? Maybe there's a front desk security person, or a key-card access per floor. I once lived in a building where you had to use your card to access individual floors on the elevator! It was pretty annoying, but it was definitely more secure. The security guard will get to know the movement patterns of the residents, will potentially (though not always, of course!) recognize intruders. They have more data than any individual homeowner.
Putting your data in the cloud is sort of like living in that secure apartment building. Except weirder. Honeywell continued:
Cloud services are able to correlate data across their customers, not just look at the ways an individual is being targeted. You may not [control access to the place where] your data is being stored, but there's someone at the front desk of that building 24/7, and they're watching the logs and usage patterns as well. It's a bit like herd immunity. A lot of stuff jumps out at [a defender] immediately: here's a single IP address logging into a bunch of different accounts, in a completely different country than any of those accounts have been logged into from ever before. Oh, and each of those accounts received a particular file yesterday — maybe that file was malicious, and all of those accounts just got broken into?
But if it's a more targeted attack, the signs will be more subtle. When you're trying to defend a cloud system, you're looking for needles in haystacks, because you just have so much data to handle. There's lots of hype about "big data" and machine learning right now, but we're just starting to scratch the surface of finding attackers' subtle footprints. A skilled attacker will know how to move quietly and not set off the pattern detection systems you put in place.
In other words, some automated attack methods become blatantly obvious in a cloud system. But it also becomes easier to hide. Honeywell says that users need to consider the threats they're seriously worried about when choosing between a cloud service and a home server:
Cloud services are much more complex systems than, say, a hard drive plugged into your computer, or an email server running in your closet. There are more places that things can go wrong, more moving parts. But there are more people maintaining them too. The question folks should ask themselves is: would I be doing a better job running this myself, or letting someone with more time, money, and expertise do it? Who do you think of when you think about being hacked — is it the NSA, random gamer assholes, an abusive ex-partner? I ran my own email server for many years, and eventually switched to a hosted service. I know folks who work on Gmail and Outlook.com and they do a vastly better job at running email servers than I ever did. There's also the time tradeoff — running an email server is miserable work! But for some people it's worth it, though, because NSA surveillance really is something they have worry about.

6. Software updates are crucial for your protection

There are few things more annoying in life than the little pop-up that reminds you that updates are required. Often you have to plug your device in, and the updates can take a really long time. But they are often the only thing that stands between you and being owned up by a bad guy. Cisco's O'Donnell said:
Those software update messages are [not] there just to annoy you: The frequency of software updates is driven less by new software features and more because of some very obscure software flaw that an attacker can exploit to gain control of your system. These software patches fix issues that were publicly identified and likely used in attacks in the wild. You wouldn't go for days without cleaning and bandaging a festering wound on your arm, would you? Don't do that to your computer.

7. Hackers are not criminals

Despite decades of evidence to the contrary, most people think of hackers as the evil adversaries who want nothing more than to steal their digital goods. But hackers can wear white hats as well as black ones — and the white hats break into systems in order to get there before the bad guys do. Once the vulnerabilities have been identified by hackers, they can be patched. Google Chrome's Tabriz says simply:
Also, hackers are not criminals. Just because someone knows how to break something, doesn't mean they will use that knowledge to hurt people. A lot of hackers make things more secure.
O'Donnell emphasizes that we need hackers because software alone can't protect you. Yes, antivirus programs are a good start. But in the end you need security experts like hackers to defend against adversaries who are, after all, human beings:
Security is less about building walls and more about enabling security guards. Defensive tools alone can't stop a dedicated, well resourced attacker. If someone wants in bad enough, they will buy every security tool the target may have and test their attacks against their simulated version of the target's network. Combatting this requires not just good tools but good people who know how to use the tools.
RAND's Ablon adds that malicious hackers are rarely the threat they are cracked up to be. Instead, the threat may come from people you don't suspect — and their motivations may be far more complicated than mere theft:
A lot of the time an internal employee or insider is just as big of a threat, and could bring a business to its knees – intentionally or inadvertently. Furthermore, there are distinct types of external cyber threat actors (cybercriminals, state-sponsored, hacktivists) with different motivations and capabilities. For example, the cybercriminals who hacked into Target and Anthem had very different motivations, capabilities, etc. than those of the state-sponsored actors who hacked into Sony Pictures Entertainment.

8. Cyberattacks and cyberterrorism are exceedingly rare

As many of the experts I talked to said, your biggest threat is somebody breaking into your accounts because you have a crappy password. But that doesn't stop people from freaking out with fear over "cyberattacks" that are deadly. Ablon says that these kinds of attacks are incredibly unlikely:
Yes, there are ways to hack into a vehicle from anywhere in the world; yes, life-critical medical devices like pacemakers and insulin pumps often have IP addresses or are enabled with Bluetooth – but often these types of attacks require close access, and exploits that are fairly sophisticated requiring time to develop and implement. That said, we shouldn't be ignoring the millions of connected devices (Internet of Things) that increase our attack surface.
Basically, many people fear cyberattacks for the same reason they fear serial killers. They are the scariest possible threat. But they are also the least likely.
As for cyberterrorism, Ablon writes simply, "Cyberterrorism (to date) does not exist ... what is attributed to cyberterrorism today, is more akin to hacktivism, e.g., gaining access to CENTCOM's Twitter feed and posting ISIS propaganda."

9. Darknet and Deepweb are not the same thing

Ablon writes that one of the main problems she has with media coverage of cybercrime is the misuse of the terms "Darknet" and "Deepweb."
She explains what the terms really mean:
The Deepweb refers to part of the Internet, specifically the world wide web (so anything that starts www) that isn't indexed by search engines, so can't be accessed by Google. The Darknet refers to non-"www" networks, where users may need separate software to access them. For example, Silk Road and many illicit markets are hosted on [Darknet] networks like I2P and Tor.
So get a password vault, use two-factor auth, visit only sites that use HTTPS, and stop worrying about super intricate cyber attacks from the Darknet. And remember, hackers are here to protect you — most of the time, anyway.
 from GIZMODO

Wednesday, March 4, 2015

Image result for facebook logo or picture
Facebook is rolling out more resources now, including advice and support, to people who may be dealing with suicidal thoughts. The social network consulted with those who have survived self-injury or have experience with suicide, as well as mental health organizations like Forefront, Now Matters Now, the National Suicide Prevention Lifeline, and Save.org. People will be able to report to Facebook that a friend may be in danger, and the next time said friend logs in, a new notification will appear from Facebook asking the person to connect with an expert or a friend for support, as well as tips and advice to work through their feelings. The person who reported the post will also receive notifications to call the friend or reach out to a profession at a suicide hotline support. Nice One facebook