Tag Archives: Technology News

Facebook Messenger will have a feature-busting message

facebook comments

A number of technology companies began to show extra attention on the security of users of its services. One such company is Facebook.

facebook comments

Facebook’s app, WhatsApp, and implements several encryption end-to-end to ensure the security of user conversation. After WhatsApp, Facebook reportedly will present similar features for other services that the Messenger.

Facebook is reportedly preparing a feature “automatic message busting”. It is known from @iOSAppChanges Twitter account, which spread the image of these features. Features that appear in the Messenger app for IOS version 68.0.

The actual version is already available on the App Store. However, Facebook is predicted will launch the latest version of Messenger later. Although the leaked pictures come from iOS devices, Facebook will also be presenting similar features for Android.

Regarding functionality, users can basically determine the “age” of messages in a matter of minutes, days, months, even years, thanks to such features. When the message has reached its deadline, the message recipient can no longer see it.

When using this feature, users will receive a notification contains the message, “You turned on disappearing messages, or you enable message busting”. Remain- deadline will also display any message.

Emergency, two hundred million more email accounts sold illegally in Russia

hacker

Hundreds of millions of email accounts reported to have been sold illegally in Russia. Email accounts being traded is a Gmail, Hotmail, and Yahoo Mail.

hacker

Alex Holden, Chief Information Security from Hold Security said that there are about 272 300 000 e-mail accounts that have been stolen and sold by parties who are not responsible.

The third addition to the popular email service, email Mail.ru which was known as the Russian e-mail service is also ‘missed’ as much as 57 million accounts.

Once examined, Yahoo Mail account hacked account has reached 40 million, or as much as 15 percent. While as many as 33 million Hotmail account or 12 percent, while the Gmail account is only about 24 million in the account or nine percent.

Not only email account, Holden also revealed that he found thousands of combinations of usernames and passwords stolen from bank employees, manufacturing and retail companies United States.

The danger, according to Holden, this information could be given to people who are not responsible. These credentials can instead be abused many times.

Meanwhile, a spokesman for Mail.ru Tayupova Madina, said it was checking whether the combination of username and password as email users and is still active and will warn users who have teretas to immediately replace username and password as soon as possible.

Not wanting to lose employees, Google forms incubator program

Google

Google reportedly brewing an incubator project that is specifically intended for their employees. This information was first known from The Information report some time ago.

Google

Incubator project called ‘Area 120’ is made to ensure the best talent Google do not need to get out of the company.

So, Google employees will be able to develop their ideas with the support of Google, including funding.

Google executives called responsible for the project is Don Harrison and Bradley Horowitz. Unfortunately, detailed information about the program is still very small.

However, based on information from an anonymous source, the program allows Google employees to keep working while continuing to develop pioneering project.

Through this program, employees who accepted the proposal can focus entirely on completing the pilot project. Therefore, the originator of a pilot project need not worry about losing a job at Google, when a pioneering project did not go well.

After several months of development, startups can then be established as a new independent company. Google’s move to launch this program is called to prevent the departure of their best talent to the company’s competitors.

Previously, Google has just lost Regina Dugan Head of the Advanced Technologies and Projects Group who participated in Project Tango and decided to leave to Facebook last month.

Use of the Internet at risk of destroying his career and marriage

internet risk

According to a study conducted by Kaspersky Lab, there are still many people are careful about sharing personal information via the internet at risk situation.

internet risk

As many as 28% of respondents sharing confidential data inadvertently and 16% are willing to reveal secrets about themselves, despite the fact proves that sharing information online can jeopardize jobs or even their relationship.

Surveys conducted Kaspersky Lab is working with B2B International. They asked more than 12,000 people around the world and found that there are still many people who are willing to take the risk of sharing personal data through online communication channels in an online environment that is dangerous.

The data are distributed in the form of a photograph of yourself (45%), with their contact details (42%), photos of other people (32%), sensitive personal data (30%), and the data associated with the job (20%) online ,

Further, and perhaps even potentially more serious, one in six respondents share the secrets about themselves (16%), while 9% communicate personal information about others and 8% share sensitive financial details.

It still happens despite the fact that half of the respondents were very concerned about the devastating impact that they receive if the information was published, both in terms of financial loss and emotional distress.

One third of respondents are concerned that it could ruin their relationship or embarrass or offend someone and one in six respondents (15%) fear that it could jeopardize their careers.

Regarding this concern was also recognized by the respondents. A total of 28% admitted that they intentionally share confidential data and one in ten respondents suffered losses as a result of such action.

Natural losses and in-bully

Of those losses, the consequences of which they received, including loss of a friend (20%), in-bullying (17%), suffered a financial loss (15%), decided or divorced couples (13%), and fired from their jobs ( 13%).

However, 13% of respondents still do not take any precautionary measures to safeguard information and online activities keep them safe. Only four out of ten respondents who maintain close interaction with family and friends apart from other activities (43%) or all messages and posts before share (39%).

A quarter of respondents try to avoid sending or share information when they drank alcohol and 29% of respondents who feel guilty about choosing to take steps that could be said to be ineffective, with a rush erase their Internet history after sharing something.

“Many consumers are still not fully understand the realized risk with caution when it comes to online activities. With so many devices and online channels at your fingertips, it’s never been easier to send messages unencrypted or accidentally share information with the wrong people , “said David Emm, Principal Security Researcher of Kaspersky Lab, commented on it.

Through a written statement, David said, if it does not understand well about cyberspace or cyber savvy, and if it also does not have the security and privacy protection is right, then the user can get the possibility of such damages and even destruction of friendship career.

After everything is published online, then it will be there forever. So, if you are still in doubt, it would be better if it kept it to herself.

Twitter add a special photo feature descriptions for blind users

twitter

Twitter continues to make its services more accessible to users with limited ability to see the (blind).

twitter

It released the microblogging social networking support additional features description of the image on the Twitter app on iOS and Android. Thus, any description contained in an image can be read using a screen reader.

Company says, this feature can be used not only active Twitter users who per day to reach 320 million users, but also can be used by publishers and developers.

The release of this feature as well as a sign that Twitter wants to get closer to the developer community. Some time ago, Twitter CEO Jack Dorsey apologized publicly on tense relations between the company and the developer.

Twitter said the feature description of the image is the fourth most requested user.

Then, how to use these features? In the thumbnail images to be uploaded will present the ‘add description’. When the button was tapped, will pop up a dialog box that can hold 420 character description of the image.

In 2006, when Twitter presents only text services, its contents accessible to visually impaired users with the help of screen readers.

“Then, in recent years, we increase the Twitter platform capable of supporting a variety of media. However, we do not provide a text description of the image for users and developers of us,” the company wrote in a blog upload.

Another benefit of the presence of this feature is, if the user utilizes text description on an uploaded image, it will be easier for a search engine to identify specific nudge.

Image content is one thing that may not only be sought through search engines Google, Yahoo, and Bing, but also on the Twitter search field.

For information, users accessing Twitter through the app on iOS and Android devices can now use this feature. While Twitter users who access through the web can not be tasted.

Beware of your Mobile Security System

hackers

News burglary iPhone perpetrators in San Bernadino makes some people wonder about the security of his cell phone. Technology experts, Tyler and private detectives from Hairford Investigation, Ton Hairford, has solved many cases of digital devices during his career.

hackers

Hairford assess that the iPhone is a phone safest on the market. But the fact that the system could be compromised by the FBI, raises its own concerns.

“Apple device, or a Mac computer, never susceptible to PC viruses like most,” he said.

According to him, with a strong determination anyone can do anything. If someone has the ability to hack into the system, he will be able to do so anyway.

Hairford added, the average person in America rarely targeted. But in comparison to one thousand people, anyone can become one of them.

To secure the best possible mobile phone, Hairford advises users to take advantage of the numeric access codes, biometrics, or other.

“Do not rely on the security of the iPhone. Do not let someone take over your phone in any form,” said Hairford. He gives advice to avoid the use of Wi-Fi unnecessary in a public place.

In addition, notice any information stored in your phone. Instead, avoid storing highly confidential nature of the information on your phone.