Technical Guruji Rivals Rev Up as Uber 2017

As Uber reels from the fallout of a sexual harassment scandal that led to this week’s ouster of Travis Kalanick and several of his top executives, the company faces twin dilemmas: how to clean up its corporate work environment and restock its executive ranks; and how to maintain credibility with its customer base and core team of street level drivers. Uber controls more than 80 percent of the domestic ride-sharing market, by many estimates, and it competes strongly in major cities around the world. However, rival firms like Lyft, Juno…

Read More

Apple Centers Health Data Strategy on iPhone 2017

Apple quietly has been strategizing to expand its growing healthcare business to include the management of digital health records, with the iPhone operating as a central data hub, CNBC reported last week. Apple has been in talks with numerous health industry groups that are involved in setting standards for the storage and sharing of electronic medical records, in a way that would help consumers gain more control over their private medical information, according to the network. The plan appears to be a natural extension of Apple’s recent health industry strategy,…

Read More

Google Launches Go-To Job Aggregation Site 2017

Google on Tuesday announced a highly anticipated launch of its new job search aggregation technology, following last month’s announcement of its Google for Jobs program at the company’s annual I/O conference. The initiative will allow Google users to search for jobs either on mobile devices or personal computers, and to use a set of filters to obtain highly targeted results pulled from many different sites across the Web. During his keynote presentation last month, Google CEO Sundar Pichai noted that the company has wanted to use its machine learning capabilities…

Read More

Nubia M2 Play with Snapdragon

ZTE’s sub-brand Nubia has unveiled another variant of it’s M2 smartphone dubbed the Nubia M2 Play through its website. The same global Nubia M2 Play variant will soon launch in India as well. In terms of specifications, the Nubia M2 Play boasts of a 5.5-inch HD (720 x 1280 pixels) LCD display with 274ppi pixel density. Inside, it packs an octa-core 64-bit Qualcomm Snapdragon 435 (MSM8940) SoC coupled with Adreno 505 GPU. It is backed by 3GB of RAM. The internal storage is 32GB and features a microSD card expansion…

Read More

Samsung Galaxy A5 (2017) review

Samsung Galaxy A5 (2017) smartphone was first unveiled in January this year. The smartphone is priced at Rs 28,990 in India. Samsung has been the largest smartphone vendor in India thanks to its strong offline presence and a vast portfolio of devices across various price-raia. Samsung Galaxy A7 (2017) was launched along side Galaxy A5 (2017) as well. We used Samsung Galaxy A5 (2017), and here’s what we think of the device in our review. Samsung Galaxy A5 (20017) specifications: 5.2-inch Full HD (1080p) | 1.9GHz octa-core Exynos 7880 processor…

Read More

Tech on TV: A Little Realism Goes

Watching TV shows often requires the suspension of disbelief — that is, a willingness to press pause on one’s critical faculties in order to believe the unbelievable. Realism often must be secondary to story, in other words. This very often is necessary when computers are used to advance plot lines, when programmers and hackers alike can bang away on their keyboards and produce tremendous results in seconds. One need look no further than such shows as The Blacklist or Scorpion, which feature keyboard cowboys who can hack into systems at…

Read More

Defeating Malware With Its Own DNA

It’s widely known that human DNA evidence has had a major impact in the criminal justice system. Now another kind of DNA may have a similar impact in the fight to eradicate malicious software. Malware DNA, also known as “malware provenance,” is the art and science of attributing elements of one object to another object. The technique has applications outside information security — for example, in genetics, or to test the authorship of student papers. One way malware writers avoid detection of their programs is to craft polymorphic attacks. They…

Read More

iPhone Call Logs Easy Pickings on iCloud Russian says firm

Russian digital forensics firm ElcomSoft on Thursday reported that Apple automatically uploads iPhone call logs to iCloud remote servers, and that users have no official way to disable this feature other than to completely switch off the iCloud drive. The data uploaded could include a list of all calls made and received on an iOS device, as well as phone numbers, dates and times, and duration, the firm said. Apple retains the cloud-based data for up to four months, according to ElcomSoft’s report. It includes calendars, wallet, books, notes and…

Read More

Friend Finder Data Breach Exposes 400M Swingers

Hackers have stolen information of more than 400 million users of Friend Finder Networks, which runs several adult dating and pornography websites, LeakedSource reported earlier this week. This is Friend Finders’ second breach in two years. Last year, hackers accessed 4 million accounts, exposing information on users’ sexual preferences and extramarital affairs. Data of more than 412 million users was compromised in the latest breach, LeakedSource reported. Passwords taken in the breach were either in plain text or SHA1 hashed, and neither method could be considered secure. The hashed passwords…

Read More

$5 PoisonTap Tool Easily Breaks Into Locked PCs

Proving once again that you can do a lot of damage with a little investment and a lot of ingenuity, security researcher Samy Kamkar recently managed to take down a locked, password-protected computer armed with only a US$5 Raspberry Pi. The low-tech cookie-siphoning intrusion is one of Kamkar’s simplest hacks ever. He previously has unlocked car doors, garages, wireless remote cameras and other devices, with MacGyver-like precision. Kamkar’s latest hack, PoisonTap, uses a Raspberry Pi Zero, a micro SD card, and a micro USB cable or other device that emulates…

Read More

Group Demands Apple Pay Ransom for iCloud Credentials 2017

Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. The hackers, said to be a London-based group called the “Turkish Crime Family,” have threatened to reset passwords and remotely wipe the iPhones of millions of iCloud users if Apple fails to hand over a total of US$700,000. They have given the company an ultimatum to respond by April 7. Apple reportedly has denied that the group succeeded in hacking its systems, maintaining that it obtained the…

Read More

Spam Czar Nabbed in Spain May Have Link to Election Tampering 2017

An alleged spam kingpin with possible ties to election meddling in the United States was arrested in Spain last week under a U.S. international warrant. The alleged spam czar, Pyotr Levashov, was taken into custody in Barcelona while vacationing with his family, according to news reports. Levashov was arrested for interfering with the 2016 U.S. presidential elections, the Russian news outlet RT reported, but a U.S. Justice Department official told Reuters the arrest was a criminal matter without any national security connections. On its list of the world’s top 10…

Read More

Google Neutralizes Docs Phishing Scam 2017

A phishing scam that surfaced earlier this week used Google Docs in an attack against at least 1 million Gmail users. However, that amounted to fewer than 0.1 percent of Gmail users were affected, according to the company. Google last year put the number of active monthly Gmail users at more than 1 billion. Google shut down the phishing scam within an hour, it said, through both automatic and manual actions. It removed the fake pages and applications, and it pushed updates through Safe Browsing, Gmail and other anti-abuse systems.…

Read More

Microsoft Bashes NSA Following Massive Ransomware Attacks

Microsoft this weekend unleashed its wrath on the National Security Agency, alleging it was responsible for the ransomware attack that began last week and has spread to thousands of corporate, government and individual computer systems around the world. Microsoft Chief Legal Officer Brad Smith launched a blistering attack on the NSA and governments worldwide, equating the ransomware attack with the U.S. military allowing the theft of a Tomahawk missile cache. “This is an emerging pattern in 2017,” Smith wrote Sunday in an online post. “We have seen vulnerabilities stored by…

Read More

Twitter’s Content Stream Into a River

Twitter on Monday announced a partnership with Bloomberg Media to launch a 24-hour streaming news service — one of a dozen new content deals Twitter has entered to drive user engagement. CEO Jack Dorsey and a group of top executives announced the slate of programming agreements — which include concerts from Live Nation, sports from Major League Baseball and the WNBA, and a morning news show from BuzzFeed — at Twitter’s first-ever Digital Content NewFronts presentation. “We could not be prouder of the success we have achieved so quickly since…

Read More

Instagram Snaps Up Rivals’ Users

Instagram on Wednesday announced that it had reached a milestone of 700 million members while enjoying the fastest-ever growth rate in the company’s history. The network has grown by more than 100 million members in the last four months, Instagram reported, although it took six months to accomplish its previous 100 million member increase. The increased growth rate can be credited to new features like Stories, live video and disappearing messages in Direct, the company said. “Ostensibly copied from Snapchat, the feature was significant in driving the ephemeral messaging app…

Read More