Wednesday 24 September 2014

Microsoft changes in domain addresses and Nokia websites

Microsoft changes in domain addresses and Nokia websites
The final movement of the domain adresses Microsoft have launched services Nokia, starting with the Nokia UK. «Nokia devices and services have moved to a new website» is the message you receive those who visit the page, which encourages them to follow a new link, which leads naturally to the website of Microsoft

It is natural to move to follow all company websites around the world, and a -like all deichnoun- Microsoft does not want the name «Nokia» in the smartphones. We are not talking about but "unexpected" evolution, since it was already known the intentions of Americans, from the commitment of the company brandnames (Lumia, Asha etc). Together, however, the 'mythical' name is lost as we saw a few days ago and the name «Windows Phone», which will take place the name Windows. 

Naturally expect more developments around the movements of Microsoft, but which leave the intense bitterness everywhere Nokia fans.

Monday 22 September 2014

Check if your Android device is affected by the vulnerability SOP

 Android deviceA quarter of users with devices Android, uses the latest Android 4.4 version. All others use older versions.

The systems have not been upgraded since the manufacturers of the devices can not provide timely updates to devices. So often created security problems. A security flaw recently discovered in Android Browser reminds us why the difficulties manufacturers provide updates is an important problem. The Android Browser is the default web browser for Android devices. This changed after the release Android 4.2 when the default browser Google Chrome.
The Google Chromium changed in the Android 4.4 and this means that whoever does not use version 4.4 is exposed to the bug.

What causes the vulnerability 
When you visit a website, you can expect to provide you with fast content. A script (script) running on the site should, for example, may not be able to modify the contents of another site. This defect is found to occur in the Android Browser.

The Same Origin Policy (SOP) (or Greek Same Origin Policy) is a safety device designed to prevent the JavaScript to be executed from a web page to another. JavaScripts running in malicious sites will not be able to recover data from "good» sites.

This is the Android Browser when the browser is used by applications that could potentially steal sensitive data. Data such as cookies can be stolen by this vulnerability.

Check your device 
To check if your device is vulnerable visit the following website and click test to find out if you are affected.

http://ejj.io/SOP.php

If you get a popup message that your browser is vulnerable, be sure to immediately change browser.

The problem 
The Google is working on a patch to correct the problem. Placing the patch but the end user will be complicated. The main reason is that these kinds of updates responsibility lies with the manufacturer of the device.

Given that support devices usually ends after two years, it is unlikely that all vulnerable devices will receive the update.

To make things even worse, the switch to another browser like Firefox or Chrome the affected devices only solves part of the problem. Although the browser is safe, the applications running on the device can still use the default browser is of course the Android Browser.

Google ads with malware! million computers with malicious software

Google ads with malware!
Google ads with malware! Yes you read that right. Yesterday evening, researchers Malwarebytes noticed a strange behavior on sites like Last.fm, The Times of Israel and the newspaper Jerusalem Post. The ads served these websites were unusually aggressive, causing warnings from anti-virus systems and Malwarebytes. 

After much research, the security researcher Jerome Segura realized that the problem stems from the ad networks of Google, DoubleClick and popular Zedo. Both networks promoted malicious ads that are designed to distribute Zemot malware. A Google spokesman confirmed the problem, saying: "Our team is aware of the problem and has taken the necessary to eliminate it." 

The Malware served by ad networks (or «malvertising») is nothing new, but this incident is noteworthy because of the unusually wide range of attack. 

"He was active, but not visible for several weeks until we started to see popular sites to" fly »flags on our honeypots," says Segura. 
"Then we thought, that something is happening." Early indications came in late August, and today millions of computers likely to have been exposed to Zemot, and people with antivirus is not updated at risk. "

The Zemot focuses on computers with Windows XP, although it can also infect and modern operating systems that run on x86 and 64bit. The Zemot designed to bypass the security of a system before infecting with additional malware. 
"Even though there were only 5% of vulnerable systems," says Segura «expect a very large number of infections."

Sunday 21 September 2014

The Google does not force any more new users to Google+ account

Google+ account
Google is changing little things these days will probably make new users, happy. Those who open a new account in Gmail will not longer have to also create Google + account. 

The option is there, but Google continues to invite new users to create a profile on Google +, which will "help make Google better for all, contributing to reviews on YouTube, and ratings for apps, books, movies Play Store ». But now the company will not cause those who only want the Gmail service to hurry and create an account at Google Plus, according to a publication of the Marketing Land. 

You can click "Create Profile" or select "No, thanks" to proceed without Google + account. 

Until now, those who wanted to use only Gmail completely "democratic" had to obtain a social network of Google. 

The move comes after an attempt by Google to separate users of Google + users of other products. For example, not long ago, the news that YouTube will only accept comments that are supported by a Google + account caused quite a stir and the reactions of users. 

It seems, however, that the dedication of Google for Google + network rather fade. The company came late in the game of social media and really does not offer a product that will make users leave Facebook or Twitter. 

Mr. Vic Gundotra, head of Google+ had created and lead the social networking site from the beginning, chose to leave the company last April. It will be interesting to see how Google will manage the product from here. Rather it is unlikely to close the service, since it has about 300 million monthly users, but is likely to start separated from the other products of Google, or at least will reduce the level of dependency between Google + and the rest of the portfolio.

Posts only specific friends to "Moments" of Facebook

Facebook
One of the problems that has come the complaints Facebook is its membership that they can share photos, files and posts specific atoma.Sta more members, it is difficult to create a post or a photo album with the ability to see specific individuals (through lists), while most also do not know that they can create a hidden group members epithymoun.Afto people trying to solve the Facebook, the application Moments, which has made its appearance even in some pilot users .

The purpose of this application is to create groups in Facebook, a combination of buddy lists and groups that posts, photos and videos that take members to be available to those who wish.

The user simply selects which group of users will be available in the post.

It is not clear whether it will be a separate application, but rather will be enaensomatomeno feature of the social network.

Thursday 18 September 2014

Announcement of the Geforce GTX 960 expected in late October

Geforce GTX 960
On September 19 the expected announcement of the new Geforce GTX 970 and GTX 980 from Nvidia, and it will be late and anakkoinosi "small" GTX 960.

The smallest of the three graphics cards prepared by the Nvidia is also located close to the official announcement.

The Geforce GTX 960 is expected in late October, according to TechPowerUp, it belongs to the lower price of $ 300.

Regarding the cores, the memory supported and the other technical characteristics, there is no information so far.

The Higher-apacity SD card in the world 512 GB by SanDisk

SanDisk 512 GB SD Card
According to the company, the SanDisk Extreme PRO SDXC UHS-I memory card is the highest capacity SD card on the market, and is designed to meet the needs of professionals who require sophisticated equipment in order to meet the demands of recording 4K Ultra High Definition (3840x2160p ) video, Full HD video (1920x1080) and high speed burst mode photography. 

As said Dinesh mess, vice president product marketing SanDisk, the 4K Ultra HD is an example of a technology that "pushes us in the development of new storage solutions able to manage files of huge size. The card 512GB SanDisk Extreme PRO SDXC UHS-I is impressive progress, which allows professionals to reliably store more material in a single card than ever before. "

As stated in the announcement of the company since 2003, the SanDisk unveiled its first SD card of 512 MB, the capacity requirements have grown significantly and the card of 512 GB represents 1.000plasiasmo capacity in just over a decade, however, have the same size. The card provides write speeds up to 90 MB / s speed and recording UHS Speed ​​Class 3 (U3) for high-resolution, natural color and stutter-free 4K Ultra HD video. Transfer speeds of nearly 95 MB / s resulting in fast data transfer. 

To meet the requirements of professionals, the card is designed to withstand and respond to extreme environmental conditions (temperature, water, vibration, radiation), and accompanied by a special offer download software to recover photos that have been deleted by mistake. 
The cost is (suggested retail price by the manufacturer) to $ 799.99.

Printable solar stick everywhere - Two cells per second

Printable solar stick
Printable solar panels that will soon be marketed developed by a consortium set up by Australia's Agency for Scientific and Industrial Research of the Commonwealth (CSIRO) together with the University of Melbourne and Panepistimio Monash. 

The technology relies on the use of a special "solar ink" that can be printed on a plastic film (film) with conventional printers, similar to those used for banknotes. 

The research team behind the printable solar intended for use on any surface that would accept plastic: bags of metaforasforiton electrical computers to skyscrapers. 

The best part is that the printing speed is such that it takes more than two seconds to print a solar cell. 
The Organic Solar Cell Consortium of Victoria in Australia working in printable photovoltaics since 2007 Scientists involved in the project have developed several processes including spray coating, reverse gravure, coating by placing the paint in specific slots (slot -dye coating) and screen printing. 

Plus using semiconducting ink, researchers can print solar cells directly into flexible sheets (sheet thickness) of polyethylene terephthalate (PET), the same type of plastic used for bottled water and soft drinks. 
The cells can also be printed in steel or become semi-transparent for use on windows and facades. 
Initially built in coin-sized cells, but in a short time built into cell surface paper A3. Currently printing speed has reached ten meters per minute, which translates to a solar cell per second. 

The big downside of technology is as will be anamenotan- that achieved a 10% efficiency of this cell silicon. 
However, scientists aim to close the gap factor higher efficiency solar inks. The lifespan of the cells was only six months with a target of ten years. 

Comparing printable plastic solar panels with conventional silicon technology, Fiona Scholes by CSIRO notes that while declining price of silicon, plastic is even cheaper, while the cost of cartridges is negligible. 
"This is an important step forward because you can put those cells where you want. It is also more "consistent" than silicon, and operate in conditions of clouding. "

The huge range of applications of the technology has already attracted many companies prospecting the potential for commercial exploitation. Although, the printer used costs around 150,000 Euros, the economies of scale of commercial production is expected to make the cells very affordable.

Cycling in peace with MindRider

MindRider

The MindRider is a helmet for cyclists who has the ability to "read" the mind of the rider. It has a sensor which operates by way of EEG recording the reactions of the cyclist. It also has built and a LED. 
An application for iPhone receives and then processes the data sent by the MindRider. Then, in collaboration with the GPS data provided notes on the map of the route points that caused more stress and less rider that the next time to choose a specific route as well as to be more careful.

Tuesday 16 September 2014

Android One Unveiled for the first 3 affordable devices

Android One
During the Google I / O, the company officially presented its new project which is called Android One and aims to bring much economic devices in emerging markets. Today presented the first 3 ultra cheap Android smartphones in India. This is the Karbon Sparkle V, Micromax Canvas A1 and Spice Dream UNO. 

The Dream UNO is the most economical of the three at $ 103 while the Sparkle V costs $ 105 and the Canvas A1 106 dollars. In India, Google has to compete with Mozilla on economic devices started selling mobile at $ 40 with Firefox OS. Of course we are talking about a market of 900 million population only 10% use smartphone, apomenos enough space for everyone. 

In terms of technical characteristics and the three models have the same specs: 4.5-inch screen with a resolution of 480 x 854, MediaTek MT6582 SoC with 1.3GHz quad-core Cortex-A7 CPU and Mali 400 MP2 GPU, 1GB RAM and 4GB built-in memory that can be expanded . The outdoor camera is 5MP and the front 2MP. It will also have Wi-Fi, 3G and Bluetooth connectivity, 2 card slot for SIM, FM radio and 1,700mAh removable battery. 

The best thing about the new devices that are running stock Android, specifically 4.4.4 KitKat. This means that for two years will get updates directly from Google and will be the first devices that will be upgraded to Android L with the Nexus.

Thursday 11 September 2014

IFA 2014: New tablets and PC from Lenovo for high resolution gaming

New tablets and PC from Lenovo for high resolution gaming
The latest tablets offer options for mobile use? New gaming PC equipped for high resolution. 
ToTabS8 the first Androidtablet 8 inch powered Intel ® Atom ™ combines wonderfully clean infinity screen me strong productivity into a slim and lightweight frame. 
  • The Y70 Touch- The first inch touchscreen laptop17 Lenovo- provides players with the 4th generation of high-performance processor and Intel ® Core ™ NVIDIA GTX graphics card. 
  • The gaming notebook with quad Z50-75 AMDFX with FullHD screen dualgraphics performance and comes bundled with two free games from the collection of AAA titles at great prices. 
  • The ERAZER X310 expands the already strong gamingdesktopstis Lenovo series with discrete graphics, high-speed memory and futuristic design. 

The Lenovo announced the IFA Consumer Electronics show in Berlin 2014, expanding its product portfoliotis tabletskai PCs, offering consumers more options to suit tabletspou lifestyletous and options exclusively for gamingPCs restless. The new composition begins with the first TABS8 Androidtablettis Lenovopou powered by Intel ® Atom ™. The Lenovoanakoinose gamingPCs well as two new high performance: Y70 Touch, the first touch screen laptop17 inch Lenovo with the latest processor technology and graphics and ERAZERX310 HDgaming, the latest technology available LenovogamingPC. 

S8 Tab: Android combines experience with Intel performance 
The Lenovo TABS8 created for consumers seeking a stylish, slim and affordable Androidtablet. With infinite 1920x1200 screen of 8 inches, the TABS8 has sharper FullHD performance while OneGlassSolution technology within touch experience offers a clear display glass. The ultra slim tablet screen joins harmoniously with the dark facade, giving the TABS8 a clean and elegant. The front has a 1.6 megapixel HD Webcam for easy videochatting. Turning the TABS8 backwards to reveal the 8-megapixel rear camera. The F2.2 wide angle lens captures high definition, even in low light. The preinstalled applications like ShareIT, which allows quick and easy sharing of pictures and files. 

Designed to offer users maximum without sacrificing portability, LenovoTABS8, marks the first Android tablet 8 inches from Lenovo me Intel processor. Available IntelAtomZ3745 technology IntelBurstPerformance processor, fits TABS8 dynamic processing power for each task to maximize battery power without sacrificing speed and slim, lightweight design. ToTAV S8 weighs 295grkai is 78mm thin, almost as thin as a pencil. 

Additional features include optional high-speed 4G LTE (based Intel XMMTM 7160) and data connection WiFigia up to seven hours to give users the freedom wireless technology and 64-bit support. The TAB S8 KitKat runs Android 4.4, includes 2 GB of RAM, 16 GB of storage memory, Bluetooth 4.0 and dual Dolby ® reinforced front speakers. The colors vary by region and include black and blue black, yellow, white. 

Y70 Touch: Utmost performance HDgaming 
ToLenovoY70 Toucherchetai the 4th generation processor Intel ® Core ™ i7 processors and powerful graphics NVIDIAGTX, making it ideal for intensive use for fun and HDgaming. The 17-inch screen makes the Y70 Touchtis Lenovoto most laptop with a touchscreen, reaching new levels of interactivity to video editing, sharing, and games. 

The Y70 produces a stunning aural and visual experience, fullHDpou screen brings movies and games to life with enhanced color, clarity and resolution. The JBL ® stereo speakers and Dolby ® Sound subwoofersyndyasmena advanced AdvancedAudioparechoun experience totally exciting sound rarely  adding to the overall viewing experience. 
Weighing less than 7.5 pounds, the Y70 Touch, is thinner and lighter than most laptopsstin class, thanks to an external optical drive that supports Blu-ray and DVDkathos. ToY70 Touchdiathetei also up to five hours of life choices and adaptive memory and storage, with up to 1TB SSHD and 16GBDDR3L 512GBSSD or storage. 

Z50-75: Slim and lightweight optimized for games 
The elegant LenovoZ50-75 laptopparechei one gamingon-la-Gome great price integrated experience. Once AMDFX 2,5cmlepto has a quad, R7-M260DX 2GBgrafika and innovative APIgrafika that allows games and applications using the GPU effectively CPUkai, which improves performance by up to 60%. Equipped with a large 15.6-inch FHD 1920X1080 until 16GBDDR3Lmnimi, great storage options 1TBHDDi 1TBSSHD and stereo speakers Dolby ® HomeTheater ™, the Z50-75 offers users a fantastic gaming experience. 

The new package comes with two free Z50-75 games collection AAA titles, with titles such as "Thief" and "Darksiders", buyers can download through a special sitekanontas using a single password. The promotion will be available in EMEA and will be valid until 31 March. 

ERAZER X310: Unique Experience Flawless Gamingme 
The LenovoERAZERX310 is the latest addition to the affordable range of gamingdesktopypologistes Lenovostous. To keep users in action, has distinguished ERAZERX310 NVIDIA ® GeForce ® GTX, quad-core processor and up to 2 TB SSD 256 GB SSHD or high-speed memory. The combination of power and speed, which allows users to play more intense games without problems or delays. The ERAZERX310 improves immersive gaming experience with 7.1 channel sound and Dolby ® strengthening. 
The new chassis design features front and futuristic LEDfotismo profile that mimics the soft lines of the armor of a knight. The front panel has a port cover one-touch easy access and conceals a ventilation system keeps the device at the correct temperature when "lights" game. 

Other features include up 32GBDDR3 memory, four USB 3.0 ports and a port system always lit USBthira load for enhanced connectivity. 

Statements: 
"The PCs tabletskai final consumption give consumers even more options to choose the device best suited for quick lifestyletous" JeffMeredith, Vice President, Marketing, MobileBusinessGroup, Lenovo said "From super-portable Y70 tabletsto TABS8 and ERAZERX310 gamingPCs, we have optimized each to meet the diverse needs of consumers. "

"With LenovoTabS8 tabletpou driven by the Intel ® Atom ™ processor, consumers have the opportunity to enjoy high performance without major problems with battery life. You can enjoy the content they want on the tablet, based on Intelepexergasti as games and videos. "ErikReid, Deputy Director General of TabletBusiness IntelMobileandCommunicationsGroupkai said. 

Availability: 
The Lenovo TABS8, Y70 Touch, and ERAZER Z50-75 X310 will be available in the period 11 December 2014 through www.lenovo.com and wholesalers ....

Wednesday 10 September 2014

Five Reasons Not to Buy Android Wear Smartwatch this Year

Android Wear
From the day I won my first Android smartphone, fell in love with everything in it. It was the first smart device I bought, but the configuration, freedom, affinity with Linux and the limitless possibilities offered was exactly what I was looking for. Since all communications in Google's Android to look forward and Wear rumors first Android SmartWatch made ​​my imagination run. 

Apparently, however, what I had in my mind is far from the one created by Google and thus refrain from buying an Android device wear at least for this year. Not that I'm worried about the quality of the raw devices, early adopter like myself who say the Americans, but what worries me is the use of a gadget and whether to serve in my daily life. The main reasons therefore improved by my thinking is: 

It's just a Google Now SmartWatch 
Android watches wear well be called "Google Now SmartWatch 'that's because its main function is to display our applications we have in our cards and mobile information Google Now. Of course more and more developers to create applications for Android clothing slowly, but they can get, and a time to be "improved" the logic of the platform, which means that next year we will have a new device. 

No Greek not proceed 
Since we got unfinished features, the biggest disadvantage of Android wear in my opinion are the languages​​. See all the videos where people use Internet with voice instructions in ... English. Correctly, then, is a device to be used without using both our hands, without the Greek language but how to exploit features and reduced? 

The addition of the Greek language, which by the way according to the rumors that we will be added in 2015, just change the way you see the wear on Android, but also the way we use our smartphone Android. Until then, though ... patience! 

Autonomy is laughable 
Thus we come to the problem that affects everyone gadget, which is none other than autonomy. Since I can remember the first mobile phones Battery technology lithium ion (and some more nickel - cadmium). This action was more than enough for the phones of the time, they do not have connectivity Bluetooth and infrared and color screens five inches. 

Today's manufacturers choose to grow the size of the device, increasing battery respectively, in trying to convince us that one day is enough for use before reloading. The same however can not be done with SmartWatch, first because it has to be necessarily small size and lightweight, and secondly because the wear and made to remove them from time to time by hand to the office. The problem is that if you have a day loaded and sufficient use our device, you may leave us in the middle, which is unacceptable for any gadget. 

I think the category is SmartWatch will force companies to look up the issue of the battery, but it is still too early to talk about it. 

Prices are high 
For each new product for SmartWatch is now up to them, and have higher prices. I remember my first Android (HTC Hero) I would buy € 550 with features that are now considered ridiculous. It's 100% reasonable to be high when you do not know a technology operating prices, but this is not true SmartWatch is so small smartphone with "petsokommeno" Android. The processor, RAM, display technology and other components that make up the first SmartWatch are the same as those observed for many years in our mobile. It is not something new for the company, and therefore the risk is not great to justify the high prices. 

Nor should we forget that we are talking about an accessory and not a stand-alone device and is very stupid to have a decent smartphone to 180 € (Moto G) and the accessories that come with an unfinished 300 € (LG Clock T R). Personally I think the most expensive SmartWatch what we have seen to date should be available at 150 €, while probably my market will do when I will be what I'm asking about 100 €. 

The wear is another concept Android 
The most important of all, however, I think the Android Wear something unfinished. The Google has just launched the idea of waiting for manufacturers and independent developers to complement it. So did the older Android, but the original image was wider than the wear, which will undoubtedly change in the future, but still do not know how. 

Today SmartWatch So as I've seen so far is identical in features and functions, with the exception gear with Tizen OS Samsung and I think still worth investing in them. I am not opposed to SmartWatch in general, and the proof is that I have already purchased one (which will soon be under review), but I can not find utility in Greek Wear for Android users, as our gifts to Google.

The Developers Playground of GDG Thessaloniki started and excited guests of the 79th Thessaloniki International Fair


Developers Playground of GDG

September 07 was the opening day of the season DevFest II, for the second time in Thessaloniki official and exclusively for participants in the playground. 

Developers Google Group this year, after "guideway" from Google, focused on four key pillars that will bring the future in our hands: 
  • wearable technology 
  • cloud platforms 
  • Google Maps API 
  • Chrome Extensions and planning 

During the first day of DevFest, guests and participants of the Playground, I had the opportunity to try the Google Glass and solve their queries by Wiebe Elsinga a Google browser Glass. For this reason, developers Google Group 3 workshops planned based on technology and utility of Google Glass. The positions of these workshops filled immediately, and had over 300 people attending, or have questions about the Glass Google! 

Notable was the presentation of a 12 year old, who traveled from Athens to Thessaloniki exclusively for games. The atmosphere was very warm, and as we all know, the GDG Thessaloniki is enthusiastic when it comes to bringing these young talents. 
Google DevelopersAfter Google sessions Glass, saw Wiebe Elsinga flushes on stage when he began to assemble a team talk UX prototyping and a related workshop, where participants had to form teams and start planning your implementation. The workshop lasted over two hours, but neither the participants nor he realized how quickly time passed Wiebe. 

Alongside the conference center Emil RIADIS (former Crown) held the Lady Geek Day event for the first time in Thessaloniki, inspired by the initiative of women Techmakers Google. The panel attended four main women: Olga Stavropoulou Marika Lambrou, Sandra Zafirakopoulou and Liana Gouta. They shared their experiences with the audience and focused on the need to break the stereotypes that prevent women from participating in science, technology and entrepreneurship. Solve the problem in accordance with the same comes through changes in basic social structures such as family, but also through the educational community in line with the labor market. A pleasant surprise was the presence of two young girls, who have announced their intention to create a group of women in the areas of information technology, in an effort to come closer to the fair sex of code generation and beyond. 

After the end of the break, the event moved to stand 14, the area features the Google Developers. There spokesman Mr. John Kotsifis Hackers Media, presented the group's activities. The main target of hackers Media is developing a flexible program of basic education for journalists in order to be better equipped to deal with new technologies. The joint venture was created specifically for the purpose of the project and includes eight experienced partners representing areas of journalism, journalism education, vocational education and training and advisory services in six Member States of the European Union.

Security measures in iCloud with delay

Security measures in iCloud
The trick that resulted in leaks photos of celebrities, led Apple to implement a stricter security policy delivery push notifications, users using iCloud. 

Apple CEO Tim Cook announced some new measures on Friday in an interview with the Wall Street Journal and said that will be implemented in two weeks. 

Earlier this month, if someone has the user name iCloud for a new device to ignore. 

However, new measures have been implemented, at least in part, by far, the account owner will receive a notification if someone has access to the service web browsers. 

Email notice Apple is very clear and says "Apple ID you use to log into iCloud via a web browser." 

The e-mail had at least ten minutes to take note that informed our Apple ID was used. That time is over-sufficient for an attacker to make changes to our account. 

You can try it for yourself to see the 'immediacy' warning Apple. Of course, if it happens to some really should immediately change your password to your account.

27 Year old arrested for sending a threatening message on Facebook

From the Department of Electronic Crime file a case formed post messages to the social networking site, where there was talk of threats against persons in the prefecture of Ilia. 
Facebook

Case formed file against domestic 27 years old, who was identified as a manager and owner of the "profile" of social networking, through which the issue had been hanging. 

It emerges from the above, through the website and Facebook in particular through "personal profile" which managed, sent a "page-group 'of the site, threatening message when firefighters and police officers who served or are serving in Services of Ilia. 

To clarify the matter, the Department of Electronic Crime contacted directly by the company and after a thorough investigation identified the digital internet connection used to send the message, which, as noted, came from Internet - cafe.

Step the police Cyber ​​Crime went yesterday (07/09/2014) morning in the area of Elis, which identified the 27-year old actor, who admitted that he sent the message in question, but claimed that he had no intention to carry out the threats.

The papers formed on the case will be submitted to the competent Prosecutor Athens.

Tuesday 9 September 2014

How to check a suspicious link before clicking on it

Have you ever been in front of a link, do not inspire confidence? We all know the dangers that can result in a fatal one click. 
Secure HTTPS

There are warning signs that may indicate that the link can infect your computer or send it to a phishing website; 

Below we will describe how to identify malicious links and how you can check whether it is safe or not without their visit. 

Some warning signs of possible malicious links: 
Access services like bitly links (and many others) are popular choices for anyone trying to fit a link to the limits of a Twitter message. The iGuRu.gr use the service, for the same reason. Unfortunately, this method links and shortcut phishers and malware distributors is also used to hide the actual address. 

Obviously a shortened link, which helps identify a malicious link, but there are tools that let you see the real destination without clicking. 

Strange links in unsolicited email 
Very suspicious. If you received a spam email that is supposedly from your bank asking you to "verify your information" then it is likely to be a target of phishing attack. 

Even if the connection to your bank for email seems normal, you should not click as it could be a very well disguised to connect to the database phishing.Gia link, use a new browser window. All you need to enter yourself to face directly in your browser or using a bookmark that you created yourself. Be wary of links in emails, pop-ups, etc. Of course, if the bank check online is secure (https) green. 

Link contains unusual characters 
Malware distributors are constantly trying to hide the destination of links containing malware, or that lead to phishing sites. One of the ways they are using and URL encoding. For example, the letter "A" encoded in a URL will appear as "41%". 

The use of encryption can cover destinations, orders and other unpleasant things through a link, so no one can read it in advance. If you see this type of character in a bond, it would be nice to see. 

How to check a suspicious link without clicking it. 

Expand shortened links 
You develop a brief online using services like Untiny, or by installing a plug-in for your browser, which will show the destination of a shortened connection with a right-click. Some sites let you know if there is a link to a list of known malicious sites. 

Scan this link to connect the scanner 
There are several tools available that can test the security of the link before clicking on it. Visit the Norton SafeWeb, URLVoid, ScanURL and test the link. 

Select the antimalware software analysis in "real time" use. 
To have the best chance to detect malware before it infects your computer, it should benefit from the protection function has enough real-time antimalware. You may use more system resources, but protection is better. 

Keep your antivirus and antimalware used to date. 
If your security software does not have the latest virus definitions, which are not secure. Make sure your software is configured to automatically update periodically. 

Get a second opinion from a second scan of malware 
A second opinion from a different malware scanner offers extra protection. There are some malware that hassle and provide additional security.

Hacking as a Service: How much is hacking an account?

Hacking as a Service: There are many who may not be able to remember the days when HTML was written entirely by hand, as there are also many hackers, who can not remember when an exploit had to be built from scratch. The process of piracy has remained illegal, but seems to have become easier to use. Combining this fact with the increase in the number of online transactions, created fertile ground for the growth of the informal economy. 

With sophisticated exploit kits, free tools, botnets and hackers for hire, has become relatively easier than before could only be done by skilled hackers. We have created an illegal market that anyone can buy and sell malware, exploits, botnets, credit card information, zero-day vulnerabilities (for which no patch available) for all popular operating systems or applications and services such as the attack and destruction of a website or execution attacks DDoS site. How, then, operates through this market? 

As software as a service (SaaS) transforms the way we access applications, so the hacking as a Service (Haas) makes it easy for attackers. 

Piracy as a service 
Economically, the cost required to hire a hacker is similar to that required for hiring any other professional. The time spent by hackers and determines their remuneration, since it takes more time to complete the process of attacking the higher your rate. A simple DDoS attack or some malicious links SEO might cost only $ 100, while rats as Blackshades or renting a botnet could cost between $ 250 to $ 500 The complete control of a ZeuS botnet as the management and control of potential can vary from $ 20,000. 

Since the hackers apparently will not wait until you request its services to seek economic benefits, usually in search of income through the sale of exploit toolkits. Initially toolkits sales were not as profitable as before buy, download and be resold, can bring benefits to the developers stopped. Blackhole kit tools solved this problem by introducing a model of service updates, so that the user can be supported, new features and new zero-day attacks, provided you have subscribed to the original developer. Developers turn to invest some money to find and create new features and exploits the toolkit. Exploit kits as Metasploit open source you can download free. 

There are different specializations among hackers; 
As with the "legitimate" and ethical and IT / security professionals network, hackers hackers have specialties. There may be some who are experts in the planning and creation of viruses or Trojans, just as there are security professionals who specialize in creating signatures to detect this type of malware and participate in the creation of antivirus / antimalware products. There are probably others who have experience in identifying vulnerabilities in software or systems functioning. There may be others who have experience rape or networking websites. This industry is so diverse and the list of security certifications networks, IT managers are trying to acquire to become more expert. 

What is the solution? 
As observed costs may be relatively low, have caused significant damage, although they have significantly reduced barriers so anyone can act voluntarily. In the IT administrator one hand, this situation should not lead to resignation, but seeking new ways to protect smart. In general, to ensure that all software patches have been updated and complete information about new trends in the industry are an important principle. Speaking of trends, make sure you are in contact with the competent authorities if they are victims of a botnet attack. Symantec's work in this field has led to several strikes against botnets so far. 

It is important that users are trained to know how to protect your data. Network administrators must inform you that you have to avoid clicking on email links that do not know or avoid opening attachments you do not recognize. Also, managers should prohibit "pirated" software and conduct awareness classes to keep users informed. 

Editor's Note: This information is not available to help you compare the market or to encourage you to participate in illegal activities, but to better understand what facing IT managers and administrators. The pricing provided is not mentioned anywhere in particular, but the time spent on these activities.

Reddit Launched Support HTTPS for all Pages

The Reddit launched support HTTPS for all pages using CloudFlare, a popular CDN service and DNS. The move means that all the users can now use encrypted connections when browsing the site. 

For those not familiar, the Hypertext Transfer Protocol Secure (HTTPS) is a secure communication protocol. Despite the name, however, is not technically a protocol of its own, as it consists of the SSL / TLS protocol with a layer of HTTP. 

All your communications today, including authentication credentials, and your most cookies, will not be visible to attack man-in-the-middle. 

This is due to the fact that the policy used by Reddit is to redirect any non-HTTPS requests containing your credentials to HTTPS. The company, however, says that this will not work for everyone, because it "can not force them to use client API, such as mobile applications or bots, or some older browsers, use this setting.

Thursday 4 September 2014

The nude photos of celebrities catapulted the share of Apple!

Can the loss of nude photos of beautiful women and famous as Jennifer Lawrence, Rianne, Ariana Grande, Kate Upton, Kim Kardashian and many others to be shocked on the other side of the Atlantic, but this does not apply to Apple itself. 
The stock of the company when it was announced that the issue has been resolved, jumped to a record 103, $ 74, an increase of 1%, despite the fact that the reported loss caused by the accounts of certain names in iCloud. 

According to the results of the internal investigation of the technology giant, which lasted 40 hours, this "targeted attack" exposed to risk accounts only some names but not detected signs of tampering on the storage system iCloud. 

A virus of 2009 has found the "backdoor" of the system 

The problem, according to experts presumably caused by the virus called "ibrute" who took a weakness in the "Find my iPhone". 

The iBrute created in 2009, when he lost 32 million usernames and passwords up to the creators to reach the 500 most common combinations that published in the particular websites. 

Probably, therefore, what they had achieved so far unknown hackers using virus was to find the appropriate codes constantly looking for new "solutions" possible to find a fair and gain access to personal photos of actors and other celebrities as well. 

E 'possible to use absolute immunity? 
As he wrote in Time magazine presents "the only effective way to protect yourself 100% on the internet is not to use it" But because we are in the 21st century and this is nearly impossible, experts conclude in five basic steps for protection. : 

  • Use unique passwords and different on all devices 
  • Use your choice of identification in two phases, if available. This option exists in iCloud from Apple, Google and Gmail, Dropbox, Facebook, Twitter, and Microsoft PayPayl. 
  • Turn off automatic "upload" photo. 
  • Especially for the iCloud the only safe procedure requires first of "close" a service for iPhone, namely the substance is not used. Then you need to delete the folder of photos from photos you do not want to be exposed. The next step is to "close" a pc in iCloud clearing these services does not want to "share" the internet. 
  • Turn the locking services on the mobile phone and the bills 

The operating system of the phone as well as companies such as Apple continually progresses "corrections" that protect against such problems.

Protect Nude pictures in the internet

The Cryptolocker is a ransomware known to have been used in many Internet attacks, at times, with the United States government to finally halt the activities of hackers.

However, a clone Cryptolocker has emerged called Cryptowall and has already been used in attacks that have already damaged thousands of computers.

Until now infected 625,000 computers have been committed by hackers amounted to 5.25 billion files, just like the Cryptolocker work, but with the difference that the Cryptowall can infect files on cloud servers such as Dropbox and Google Drive.

The way it works is that Cryptowall each file it infects, and it incorporates a different decryption key, so that only he knows the keys (ie the attacker) is able to unlock the current file.

This, in simple terms means that users unlucky to release their records should make Bitcons authors of the value of $ 500 in real money.

The techniques that activate the Cryptowall, varied as they may be through spam or through contaminated sites from which unsuspecting users download files carrying dangerous ransomware.

To protect users must install an antivirus program, a firewall to be turned on and be very careful with e-mails from unknown senders.

The Apple responded to the breach of security systems

Allegations of violation of safety systems in case of leakage of personal photos of celebrities iCloud responded with the announcement of Apple. 

As announced by the American Society ", after over 40 hours of research, we discovered that some celebrity accounts were breached by an attack very focused on user security questions, a practice that has become very common on the Internet. Neither of cases examined, the result of any breach of any of the systems from Apple, including the iCloud or Find my iPhone. continue to work with law enforcement agencies to identify the criminals involved. hedging against this type of attack, all users are advised to always use a strong password and apply in two stages of verification. "

In the meantime, continues to evolve within and outside of the internet 'storm' the loss of personal photos of celebrities, the focus of which is the American actress Jennifer Lawrence. The case was investigated by the FBI, and the accident caused general concern for the safety of storage services in the cloud, and how difficult it is to violate the codes of user accounts. 

The photos would be leaked originally 4chan, a user who identified himself as "collector" rather than "hacker", and the movement also announced other photos. The images in question are spread on the Internet through social networking sites and websites and posts on the blog, although very often follows their removal within a short period of time, because the area has been the case. Some celebrities have spoken of fake photos, but some others have confirmed their authenticity.

Google is planning to build its own quantum computer

Google is planning to build its own quantum computer
In collaboration with researchers at UCSB, as Google wants to build its own quantum computer, the investigation has to assume the lab Quantum Artificial Intelligence Lab.

The team of researchers from UCSB and the responsible professor, John Martinis, are the group of Quantum Artificial Intelligence Lab of Google created a year ago in collaboration with NASA and USRA.

H team of UCSB researchers have managed to create Xmons, which is cross-shaped qubits cooled to such a level that there is no electrical resistance and magnetic interference. The Xmons can be placed in series, so that they can communicate with each other in a positive impact on the computational power and beyond.

Finally, Google will continue to experiment with the machine Vesuvius Ames Research Center of NASA, which will be upgraded with the editor of Washington 1000 qubit.


Monday 1 September 2014

Apple Campus 2 new flying saucer

Apple Campus 2

Apple is known for its stunning design, to manufacture everything. How would you like the Apple Campus 2; When you are ready now the Apple Campus 2 will look like a giant flying saucer that came down from the leafy suburbs of Cupertino. Today, imperfect as it is, seems to look like space off a flying saucer. 

This is why we only see the outline of the new futuristic design architects company. It looks very impressive, with the nearby buildings give a sense of the enormous scale of the next "home" of Apple. 

The video below is from a GoPro camera that was on a DJI Phantom 2 drone and managed to make an aerial tour eight minutes in space. The film contains the full view (360 degrees) of space and ultimately down to give us the foundation of nearby built today. 

Hacked : Jennifer Lawrence, leaked nude photos

Hacked by Jennifer Lawrence, leaked nude photos
Scandal in Hollywood with many celebrities have been hacked by unknown. The o hacker or hackers trying to seriously damage the image of many big names of Show Biz leaking online personal files. Among those who were hacked by Jennifer Lawrence, the Kate Upton, the Victoria Justice, the Kirsten Dunst and Ariana Grande. 

A spokesman Jennifer Lawrence confirmed that the leaked photos are real and that they have stolen from her account to iCloud. Leaks from a user on 4chan who claims to have a lot more photos not only from Lawrence, but from other great actors. 

Some of the photos of Lawrence is selfies, and there are others that have been taken by another person. The photographs were taken at various times and places. There are of course spicy photos straight from the bedroom of actress accordance with TMZ. 

Some show the actress in swimwear, and more of them on the show without clothing, and they just chasing newspapers. 

The camp of Jennifer Lawrence, however, threatens legal action everyone who publish leaked material. We have contacted the authorities and will prosecute anyone attempting to publish the stolen photos of Jennifer Lawrence.

The hacker, however, claims to have in his hands a lot of videos, and offers paid media. 

The Victoria Justice stated that the losses do not concern saying: "The so-called pictures of me are FAKE.»