Category Archives: Computers

Its all About your So-Called Personal Computer(PC).

Antivirus

4 Things Your Antivirus Won’t Help With

Modern antivirus programs offer real-time protection against viruses, spyware, malware and Trojans. In fact, the most advanced programs scan for patterns of software behavior that are known to occur in malicious programs and stop them in their tracks.

However, despite all the touted benefits of antivirus software, there are a number of security areas where your antivirus won’t be of much help and you may need to take other measures to mitigate the risk.

1. Unknown Threats

Creators of malicious code are just as good at their jobs as their computer security counterparts. They test their malware thoroughly and study how antivirus programs work in order to devise new methods to beat them. Attackers constantly study software programs to find vulnerabilities they can exploit before the software makers find and patch them. It’s a cat and mouse game where the cat never seems to get the mouse. In 2015 alone, there were over 84 million malware samples detected by a leading computer security firm. That’s a staggering revelation of the sheer size, resources and determination of the underground malware industry. In fact, there is a raise in virus and threats online affecting the crucial data on your system. Therefore, it is hightime for you to run data recovery software like EaseUS on your PC.

2. Advanced Persistent Threats (APTs)

As opposed to regular threats whose intention is commonly to cause damage to the network or computer, the main aim of an Advanced Persistent Threat is to steal high value information such as trade or military secrets, financial data or information that could be used for extortion. APT targets are usually big corporations and governments. Perpetrators are large groups of organized criminals and in some cases, governments. Many governments secretly run APT programs targeting local and foreign companies as well other governments.

Antivirus

APT perpetrators have the singular goal of remaining undetected for as long as possible and gain ongoing access. To gain access to a system, an APT attack will typically begin with spear fishing or social engineering. Spear fishing is similar to email phishing, the only difference being that in spear fishing, an email message appears to have been sent by a trusted person within the organization. For example, a group of employees could receive an email that appears to come from a network administrator asking them to log onto a phony page and update their employee details. The fake page captures the login data and the perpetrators immediately access the network and establish numerous back doors by moving laterally across the network. It only takes one employee to fall for the ploy for it to be successful.
One of the most effective ways to detect an APT is to study outbound data. Any sudden and unexplained increase in outbound could be an indication of an ongoing attack. Other tell tale signs could be an unusually high number of spear fishing and social engineering attempts as well as a sudden increase in late night log-ons when few or no staff work at night.

Mitigation can also be achieved through constant training and retraining of staff to recognize spear fishing and social engineering, and to report any attempts immediately.

3. Infected Devices

In the last few years there has been a proliferation in the use of mobile devices such as smartphones, tablets and laptops. Around the world, most people now access the Internet more times in a day using a mobile device as opposed to a traditional desktop computer. This has created a vulnerability outside the initial intention of antivirus software.

For example, businesses operating Bring Your Own Device (BYOD) programs where employees use their own hardware, are at risk. An employee using an infected device to connect to a network can inadvertently spread malware throughout the network. The same thing can occur when a guest connects to your home network. Usage of free data recovery software like EaseUS can help you restore the network settings stored on your computer’s hard disk.

The risks presented by BYOD can be mitigated by:

  • A dedicated firewall.
  • Tightening network security.
  • Enforcing malware scans for new and existing devices connecting to the network.

4. Inside Job

The final risk your free antivirus software will not be able to help you with is an inside job. In this case, every employee is a potential threat that the employer has to live with. And, administrators pose the biggest threat. Perpetrators may be driven by any number of motivations running the gamut from malice and financial gain to external blackmail. Inside jobs are difficult to guard against. The best mitigation is to have a system of checks and balances such as the maker checker rule. Also, staff that occupy sensitive positions should be continuously vetted to ensure they don’t pose a security threat.

Conclusion

It is clear that in addition to having the best antivirus systems in place, there is a need to understand the threat landscape and remain constantly updated on emerging computer threats and best practices on mitigation.

s

Skype: listening function discovered in Android app?

s

Skype: listening function discovered in Android app?:

Eavesdropping on Skype? Due to a security vulnerability in the chat app is Android phones to make spy camera and a microphone. we investigated.

The no disturbing scenario: Your Android phone indicates an incoming Skype call, but the ringing ends abruptly. No problem, the caller may have placed no more or simply network suddenly. According to recent reports and rumors on the net but you can hear you at this very moment from you. If an error in the Skype system torn a vulnerability?

Accidentally discovered

A user of the technology blogs Reddit happens to come across this “bug” feature and describes how easily this can be exploited: The caller must ensure only on two arbitrary devices into the instant messaging service log and the alleged victim on an Android Call via Skype device. When the phone rings, the caller disconnects the network connection of the apparatus used and then you have probably just have to wait yet. So the called Android device registers the connection is aborted and tried to call back the caller on the second, likewise logged-in Skype device. Critical: This happens automatically – and the callee might remembers nothing about it. The display should not be recognizable that – still run microphone and camera, the record hardworking. The attentive Skype users, who discovered the supposed vulnerability in itself, has already asked for feedback from other Skype and Android users. These confirm the Bug function but only partially, as the comments in the blog entry is read.That sums thing up perhaps to a limit.

s3

Not (yet) confirmed

We wanted to know what is going on with the listening function and tried to recreate tested it with many Android devices – without success! Interception error could not be confirmed. Once the connection was cut off, and the device of the called party terminated the ring. An automatic callback was made in any of the test runs. But beware: The error is still not ruled out. Well, what we recommends: To ensure that you do not become a victim of such an attack in the near future, please do not initially on the phone function by Skype or limit the chats on Skype trusted contacts. Stay tuned and prompts you if there are updates to the supposed vulnerability.Hope you guys got an idea on the same.If any doubt pops up onto your mind- don’t mind letting us know by making your queries in the comment section.Keep visiting the site.

A

Apple OS X update fixes security hole

Apple Mac OS X

Apple OS X update fixes security hole:

 
Apple has released a software patch that closes down a vulnerability in Mac OS X. This affects OS X Yosemite, Mavericks and Mountain Lion.

Apple has released a new security update. It appears that there has been a weak point in the integration of the Network Time Protocol (NTP). It affects Mac users with OS X Yosemite , Mavericks and Mountain Lion . The update is available via the Software Update.

Mac OS X 1

NTP: hackers had an easy time

The NTP is a standard interface over which, inter alia, the time can be synchronized.Apple indicates that there was an error in the previous implementation: Hacker probably had the opportunity to execute malicious software. The update stuffs this vulnerability. The current versions are: Yosemite version 92.5.1, 88.1.1 Mavericks, Mountain Lion 77.1.1. Check the status of your operating system from the terminal by entering the following line of code: what / usr / sbin / ntpd .

At the end of the day, Apple does make an effort to make things cool as far as their products are concerned.Keep visiting the site for more updates.

s

Flown Windows Phone apps from the Store: Snapchat

s

Flown Windows Phone apps from the Store: Snapchat:

Snapchat is an app for smartphones, with which you can send self shot pictures for a few seconds to other contacts. After the indicated time they disappear permanently and can not be viewed. Officially offers Snapchat apps on iOS and Android. Not officially but there are also third party who use the API of the service and thus have access to the Snapchat features and Windows Phone users.

This, however, did not seem to like the company, because since yesterday all third-apps from the Windows Phone Store have suddenly disappeared. Huynh – a developer of such an app – make a statement on Twitter:

“6snap has disappeared as well as all Snapchat apps on store. I will work closely with Microsoft now to convince Snapchat to change its mind”

s

An official statement by Microsoft or Snapchat there is currently not yet. Although warned Snapchat a few months ago, may be those apps as dangerous, but they had not yet announced more so far. That the action, however, probably originating from the app itself and not from Microsoft, tell users which of Snapchat due to the use of a third-party app has been locked .

One possible reason should either missing features such as avoiding screenshots or planning an official Windows Phone app be. Personally, I suspect the latter, eventually Windows Phone has long been a serious operating system.Keep visiting the site to get more updates regarding the news.

t

Trojans Torrent Locker strikes in Europe

 t

Trojans Torrent Locker strikes in Europe:

Experts warn there is a Trojan Torrent Locker: It forces data on infected PCs hostage and demands over a thousand euro ransom in the online currency Bitcoin.

Since this spring drive first versions of this Trojan encryption world mischief. A new variant of ransomware “Torrent Locker” has now apart according to the manufacturer’s protection programs ESET virus researchers to users in Europe.In the past few months have been infected by the malware over 40000 systems.In Italy, the experts discovered 4500 cases with 53,761,689 encrypted by the Trojan files.In Austria Torrent Locker suggested already in 1504 to time, Germany is ranked 240 incidents still in the lower middle.However, the researchers warn: The Trojan is in Europe on the rise!

t

Torrent Locker travels by email

The distribution of the pest is via spam e-mail, which appends a file that is disguised as payment requests, transport persecutions packages or unpaid parking tickets and users should thus encourage them to click. On infected PCs Trojan encrypts documents, pictures and other files, and demands a ransom for their decryption. The ransom demand the blackmailer in the online currency Bitcoin. And their demand is quite steep: While other Trojans settle for this type of payments between 100 and 300 Euro, require the criminals behind Torrent Locker, a whopping 4,081 Bitcoins! This roughly corresponds to a sum of 1,100 euros. According to the ESET experts already have 570 victims paid the ransom and the racketeers Played over 467,000 euros in the hands. The code analysis of the pest also led researchers but on a hot track: “We expect that the actors behind Torrent Lockers are the same as those behind the banking Trojan” Hesperbot “stuck,” said Marc-Etienne M. Léveillé ESET researchers from Canada. The Trojan will constantly adjusted by the criminals. So they had responded to the previous reporting and adjusts the encryption method used for seizure of files, so Léveillé. Was because until recently victims taken hostage data could free himself nor as a method for extracting the key stream, which is part of the Trojan code, was released. Which is now no longer possible. The best protection against such digital extortion are regular backups of important files and a constantly updated held anti-virus program. Should pay to the demanded ransom certainly did not. Because even then it is not certain that you then again gains access to encrypted files. The money is irretrievably but flutes with certainty.

t

We are expecting to get more news connected with it in the coming days,so keep track of the site to get updated.Good day…!! 🙂

wickr messenger

Wickr- Crypto Messenger now available for PC and Mac

wickr messenger
Good encrypted messenger so far mostly found on smartphones and tablets. With Wickr there is such a program now available for PC and Mac.Die provider of the popular WhatsApp Messenger can be celebrated profusely for at least currently have equipped the Android version with end-to-end encryption. But for Crypto Messenger as Wickr and Threema years are tap-proof texts, Delivery of audio, video and photo documents already standard. Here are treacherous meta-data, such as information about the time and place for photos that were shot with a smartphone, the app automatically removed before shipment. What the users such encrypted messenger was missing was the bridge to the PC or Apple computer. But now there is Wickr for these systems such as Linux.

w

Free High-level safety

So far, the encrypted communication (AES 256 bit encryption standard with ECDH521 and Perfect Forward Secrecy) was only possible from app to app. The promise of security of the makers of Wickr not to cache the message claims to be on servers is now extended to the PC level. For new applications for Windows, Apple and Linux (32-bit / 64-bit) subject to the same security and encryption standards.

wWickr- Crypto Messenger now available for PC and Mac:

As for the apps for iOS and Android can now also on stationary devices and notebooks encrypted messages sent with a time expiry date provided. After this time news and data will be overwritten irretrievably to military DoD erase standard and thus cleaned from the device. Currently, the maximum term of messages is still six days. The new Wickr versions also allow encrypted group chats with up to ten people. All versions are available on the website of Wickr for free download .

For more updates regarding the same,keep visiting our site. Have a nice day..!! 🙂

BenQ unveils RL2460HT to stir up the gaming action

BenQ, an internationally renowned provider of digital lifestyle innovations today announced the launch of its fully optimized RL2460HT monitor for high-speed PC and console gaming — perfect for RTS- and MOBA-style games, as well as fighting games. The RL2460HT is equipped with BenQ’s exclusive RevolutionEyes™ technology to provide the visual comfort gamers need for better performance during prolonged hours of competitive play.

benq

The new RL2460HT has been specifically optimized for real-time strategy (RTS), first-person shooter (FPS) console games such as the all-new Call of Duty®: Ghosts, MOBA-style games like StarCraft® ll: Heart of the Swarm™, League of Legends™, and Defense of the Ancients (Dota 2), as well as for popular fighting games such as Mortal Kombat™.

 

With the launch of RL2460HT, BenQ aims to offer exciting special features for some of the professional gaming industry’s most popular titles, played by millions of in-person and online gamers,”said,  Rajeev Singh, Country Head & General Manager, BenQ India. “The RL2460HT has been engineered in collaboration with the world’s top professional fighting game champions enabling it to deliver the precision, speed, and market-first innovations needed to provide gamers with a memorable experience”.

 

To enhance monitor performance, the RL2460HT’s RevolutionEyes technology includes ZeroFlicker™ capabilities that eliminate traditional LED flicker issues, adding to eSports enthusiasts’ comfort during competitive action and longer gaming sessions. The RL2460HT also features BenQ’s Black eQualizer, which enables total gaming visibility by allowing players to adjust brightness without over-exposing white levels, revealing critical combat details with improved visibility in darkened areas. Additionally, BenQ’s Low Blue Light technology removes up to 70 percent of blue spectrum light to protect gamers’ eyes during extended periods of play, with several low blue light levels that automatically adjust emission without affecting picture quality.

 

With the RL2460HT’s HDMI Out port, pro gamers can stream their game content after it goes through the monitor so that the audience sees exactly what the player has seen, without risk of lag or delay to the player. In this manner, pro gamers can preserve monitor speed and performance regardless of the streaming system used. The monitor provides a height-adjustable stand with a precision adjustment marker system that makes setup fast and easy, enabling the player to duplicate the precise setup every time and everywhere.

 

Like the other monitors in the BenQ RL series, the RL2460HT includes a 24-inch, LED-powered TN panel with virtually no input lag and industry-leading 1 ms response time. Other features include integrated speakers, two HDMI ports along with standard DVI and VGA connections, and SmartScaling for gaming pros to customize their screen viewing area for optimal viewing performance.

 

The RL2460HT is available at a price (MRP) of 17500 INR across India. For more information, please visit www.BenQ.co.in.

BenQ launches XL-Z Series gaming monitors

BenQ, a leading market player in technology innovation and design proficiency today announced the launch of XL-Z series of first-person shooter (FPS) purpose-built gaming monitors: The 27-inch XL2720Z and 24-inch XL2420Z and XL2411Z widescreen full-HD displays.

BenQ XL24 20Z

Featuring BenQ’s exclusive Revolution Eyes technology for exceptional monitor performance, the displays are packed with enhancements such as Motion Blur Reduction, Low Blue Light, Zero Flicker, gaming refresh rate optimization management (GROM), and 1-ms GTG response times. In addition, the new models offer BenQ’s latest firmware, which enables third-party utility support for further optimization options. The end result is striking visual clarity, seamless motion fluidity, and added viewing comfort for hours of action-packed game play.

The XL- Z Series models are co-developed by various R&D partnerships with the core product developers and masterminds of gaming industry worldwide. The FPS Mode featured in XL- Z series let players tap into the fundamental insights of pro gamers and view the game how a gaming legend would see it. This feature automatically adjusts monitor calibrations to provide users with optimal brightness, contrast, sharpness and color tint.

Featuring Low Blue Light technology, the XL-Z monitors successfully manage the exposure of blue spectrum light emitted, resulting in more comfortable viewing. To help gamers protect their eyes during extended periods, the monitors provide several adjustable low blue light levels that automatically adjust emission without affecting quality. With the GROM management system, gamers also gain the freedom to custom-build their personal gaming experience according to viewing preferences such as refresh rates (100/120/144Hz), display resolutions, and screen sizes.

XL- Z series augments your gaming experience like never before with industry beating exclusive features like:

  • Fast 1ms GtG Response Time enhances gaming experience with smoothly rendered Fast-moving action and dramatic transitions without the annoying effects of smearing or ghosting
  • 144Hz Refresh Rate Ensures Seamless Graphics: With a refresh rate of 144Hz, there’s never a lag and every in-game details will be smoothly rendered giving gamers captivating realism on screen
  • Display Mode & Smart Scaling allows gamers to interchange between monitor screen sizes from17″ (4:3), 19″ (4:3), 19″W (16:10), 21.5″W (16:9), 22″W (16:10), 23″W (16:9) to 24″W (16:9), as the Smart Scaling feature gives them the freedom to manually scale the screen to any custom size
  • Motion Blur Reduction BenQ’s new Motion Blur Reduction technology further enhances an ultra-smooth, free-of-blur gaming experience, particularly for action-packed FPS games where every millisecond count. With Motion Blur Reduction, gamers no longer suffer from time and gaming comfort lost to poor vision quality created by motion blur and lagging

The all new BenQ XL2720Z gaming monitor is available across India at an MRP of Rs. 37500, while the XL2420Z & XL2411Z are available at retail price of Rs. 32500 & Rs. 30000 respectively.

Swift programming: iOS programmers can now use Emoji as variable name!

Which is that favourite Emoji which you often use when you have a conversation with your friends on Facebook/Whatsapp?
wasssup
Things are getting cooler and cooler for programmers! Heard of Swift programming language? Swift is Apple’s new programming language which lets you program their machines running on iOS and OSX platform which was recently unveiled for developers in WWDC 2014 event. Swift is Emoji friendly 😉 Yup!

swiftunicode

As I was going through the programming guide, I noticed developers are now free to use whatever name they want while declaring a variable or constant name. As seen in the above screenshot one can feel FREE to use wide variety of characters including symbols, unicodes and emojis as their variable names! Sounds cool? Pretty interesting to see programming languages becoming too handy and cool to use!

Interested in learning Swift programming language? Download it on your iBooks here. Requires Mac OS X Mavericks

AirType lets you type without a keyboard


Keyboard is the primary interface for one to interact with their computer. Sid, Mike, Ai, Zach, Ben, Abhi from Austin are inching to get an exciting product out – AirType. Here is the deal- You no longer need a keyboard to talk to your comp. Just fix the Airtype on your hands and you are ready to go!

airtype

AirType‘s official website airtype.io claims that it is designed to be portable, adopts to the way you type and has pretty solid intelligence built with it for a rock solid typing experience.

As of now (8th July 2014) , the product is still not available for public. You can stay up to date, by visiting their website airtype.io .

Thanks for the tip @revthatup

Dell Latitude 10: What is it?

Dell latitude 10 is a recently released multi-touch 25.4 cm tablet which runs on Windows 8.  Dell claims this tablet as a “Business” device as it has Trusted Platform Module (TPM) and support for computrace.

 

dell_lat10

The long lasting battery (9:03 / 16:01) puts it apart from its competitor tablets. The Bright IPS Display is one of its key features.
Productivity dock and the optional keyboard support could serve you as a good add-on.

Screen size of 10.1 inch, screen resolution of 1366 x 768, weighs just 1.57 lb with Corning® Gorilla® Glass display and stylus support.

You can have a look at the official page for complete tech specs

Pros:

  • A very good battery life.
  • 3G Connectivity.
  • IPS Display with Gorilla Glass.
  • Pen input.
  • TPM and computrace security.

Cons:

  • No USB 3.0  support.
  • Non upgradeable 2 GB RAM

If you are looking for a windows 8 experience on tablet consider going for this. Have your say in comments section.