Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles

Sunday 25 January 2015

Whatsapp 5 features that are not in the web browser

Sunday 25 January 2015 - 1 Comment




All of the web application was Whatsapp forward. This app has now arrived, but it has limitations. Look forward 5 features which are not in Whatsapp web app:

1. It does not support iPhone

Between the web browser on your smartphone for Whatsapp  and syncs message through your server. This service is currently not supported iPhone. Whatsapp said, because of Apple's platform Limitations iPhone users can not find this service. According to reports, the future will support it for the iPhone. But then peeping-looked in the phone will make do.

2. Internet connection is Required in the phone 

QR Code image after scanning Whatsapp pair your phone to the Web client, your browser will show a message. But if the phone was switched data, the browser will not work on this service. Ie, to run web browser must be connected to the phone all the time.

3. browsers other than Chrome

In addition to the web interface Whatsapp Google Chrome browser does not support any more. So if you have Firefox, Safari or Internet Explorer Use this service if you will not. This is the explanation for the chrome push Whatsapp better technology.

4. Users can not block

Has greatly increased the number of spam messages Whatsapp. The only way to avoid them is to block users. However, Whatsapp can not block users on the Web client.

5. You can not create group or leave

You can send a message to those who are part of groups and can receive. But you can not create a new group and can not leave the old group. Web client broadcasts a message can not be either.

Saturday 24 January 2015

By September 10, the flagship Windows Phone will come

Saturday 24 January 2015 - 1 Comment



Microsoft's new flagship device with Windows 10 is expected by September 2015.

Wednesday's report states that Windows Central, Product Marketing Director of Microsoft Mobile Devices Majid told Ifi flagship Lumia phones by the end of the summer, is expected to come to market. Between June and September, the device may come anytime.

However, in this regard, and no information in this report has been just. However, this time The other Lumia devices is set to be released Windows 10 update.

Friday 16 January 2015

Microsoft Corporation is Planning App Marketplace Upgrades for Windows 10

Friday 16 January 2015 - 0 Comments



Microsoft is making it easier for developers to monetize their apps when the highly anticipated Windows 10 operating system arrives in 2015, according to Todd Brix, general manager of Windows Apps and Store. The software giant is working to beef up Windows Store, Microsoft's take on app marketplaces like Apple's App Store and Google Play. Despite trailing them in app count and popularity, Windows Store did make some big gains in 2014, revealed Brix in a company blog post.

"We made good progress by both attracting over 30 percent more active users and by exceeding a 110 percent year-over-year increase in app downloads and gross sales," stated Brix. "In addition, the ecosystem has grown, with an 80 percent increase in registered developers and 60 percent increase in app selection year-over-year." Microsoft's mission in the new year is to keep this momentum going and help improve the Windows app ecosystem. - See more at:

"Providing a platform where developers can be successful remains our number one goal as we look to 2015," said Brix. Priorities include enabling app developers to target various device classes and regions, as well as "reducing the amount of time and effort it takes to move from ideas to installs."

To start, Microsoft will continue to pursue carrier billing—the ability to apply app purchases to cell phone bills—in emerging markets. Carrier billing has led to an eightfold increase in average transaction volume in high-growth markets. Currently, Windows Store carrier billing is available in 46 regions, including Argentina, Brazil, Chile, China, India and Vietnam.

"You will also see us work with carriers to more aggressively promote this purchase [option] to their subscriber base," Brix said. "Carrier billing rounds out a range of payment choices that includes credit cards, Alipay, PayPal and—new this year—app-gifting with digital gift cards (available in Canada, France, Germany, the U.K. and the U.S.) and Bitcoin (U.S. only)."

Microsoft also plans to help developers earn more money from in-app ads.
"We are increasing our focus on in-app advertising to help improve fill rates and grow developer revenue," stated Brix. "The recent release of Windows ad mediation for Windows Phone developers is one example, improving fill rates to over 95 percent and increasing revenue up to 200 percent."
Microsoft will continue to refine the Windows Store user interface to improve app discoverability, he added. Even novice coders can get in on the act.

"Windows App Studio Beta enabled those with great ideas but no development experience to bring their ideas to life," Brix said. "We will continue to enhance this toolset in 2015, integrating new capabilities like the recent addition of TouchDevelop."

Finally, the company plans to continue streamlining the complete Windows Store app publishing process, an effort the company kicked off in 2014 with the shift to Windows Dev Center lifetime registrations. "We have much more work to do to simplify and unify the experience and you can expect the evolution to continue over the coming months," said Brix.

Wednesday 14 January 2015

Motorola's phones will soon Android 'lollipop' Update

Wednesday 14 January 2015 - 0 Comments



Motorola has updated lollipop 5.0 Android on some handsets. However, users are still a large number of Motorola are waiting for this update. If you are one of them is good news for you. Motorola's software engineer reports Luciano Carvalho Motorola phones sold in 2013 to 2014 and will soon reach Lollipop update.

Motorola reportedly Lollipop was battling some bugs. Carvalho said "all the possible combinations of every software release after Google Nexus device is not validated Rip Dus getting involved. That's our job. "

Moto X (2014), Moto G (2014), Motorola Droid turbo, Motorola Moto Max, Motorola Moto E, Moto X (2013), Moto G (2013), Motorola Droid Ultra, Motorola Droid and Motorola Droid Mini to the Max will update.

The charger will charge the smartphone in 2 minutes



The extremely high speed of Israel Stordot a new company has developed a mobile phone charger, which can charge the smartphone batteries is just two minutes. Recently held in Las Vegas' Consumer Electronics Show on display in the batteries lasted a short period, but the beauty is that only about five hours after the two-minute run charge.

The company said in a statement that the battery is charged in the two minutes, twice a day, so there will be no difficulty in taking charge. The company also showed during a presentation in Tel Aviv being developed in the laboratory of Bio-Organic charger system, a smartphone can charge the battery in just 30 seconds.

According to the BBC, the company's chief executive officer, said Doron Maiersdorf that the charger, battery technology has been designed to develop anew. The battery in the Reaction normal battery are different from the Reactions specially designed and includes synthetic organic atom.

This Device Convert Your TV into Personal Computer!!




Intel is bringing you a full-Fledged dongle to your computer can be turned into TV. Intel compute stick Windows 8.1 or Linux in the name of the device comes pre-initialised.

The 4-inch quad-core Intel Atom processor in the device is long. The built-in wireless connectivity, on-board storage and micro SD card slot for additional storage facilities. Intel compute the stick will be launched this year.

Intel compute Stick storage and 2 GB to 32 GB of RAM in Windows 8.1 is Version. It costs about $ 149, the 9315 is priced at Rs. While it costs $ 89, or about Linux Version 5565 is priced at Rs. It has 8 GB of storage and 1 GB RAM.

Specifications stick compute:

CPU: Intel Atom Processor Z3735F
Pmic Dollar Cove AXP 288
Memory: 2 GB DDR3L
Storage: eMMC 16 GB / 32 GB / 64 GB
Expandable Storage: Micro SD card slot
Display: HDMI (Mail Connector)
WiFi: IEEE 802.11bgn
Bluetooth: Bluetooth 4.0 HD uART (Single WiFi / Bluetooth combo chip)
Antenna: 30mm x 6.5mm x 2 mm, U shaped dipole antenna
USB: USB2.0 Cut Type A x 1
Power Input: USB 2.0 Micro-B connector
Power Button: Yes
Adapter: 10W (5V / 2A)
LED indication: Power Status Indicator
OS: Windows (8.1, with Bing, 32-bit)
Accessories: 20 cm HDMI cable (optional)
Dimensions: 110.9mm x 38mm x 9.8 mm (with HDMI connector)

Saturday 3 January 2015

Xolo's Octa-core SoC of phone Available soon

Saturday 3 January 2015 - 0 Comments




Xolo's  new smartphone Play the Xolo Officially 8X-1020 soon to be launched. The company does not have it yet but Official Announcement on an e-commerce site is to get Rs 9,999. However, according to a Mumbai (India)-based retailer is available for Rs 9,700 in the phone market.

The phone has 5 inch 720p HD IPS LCD display, 1.4GHz Cortex A7 MT6592M SoC based Octa-core processor, Mali 450 GPU and 1 GB of RAM are Specifications. It has 8 GB internal memory which can be extended up to 32 GB via the MicroSD card slot. This phone runs on Android KitKat 4.4.2.

Play Jholo in 8X-1020 Dual Flash 8 megapixel rear camera and a 5 megapixel front camera Sony Exmor sensor. The battery is 2500 mAh.

Thursday 1 January 2015

50 Dos and Don’ts of Internet Security for the Year of 2015

Thursday 1 January 2015 - 0 Comments



This post is to say thank you to all the fans of Daily Blogg Tips with a recap of some of the most important dos and don’ts of Internet Security. Read on.


The first official post on our blog was live on October 19th, 2006. And since then, we have been diligently striving to keep you updated with the latest happenings in the computer security world. As we are just a couple of days away from welcoming yet another new year, we would like to thank all our fans, readers, and followers for their readership and contribution to this blog. And as a thank you note, we are recapping one of our most commented and read posts – The Dos and Don’ts of Internet Security. We hope that the following tips help enhance your digital experience for the coming year.

Dos and Don’ts of Internet Security


#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.

#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.

#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.

#4. Enable Secure Browsing for your Facebook account.

#5. Keep your computer’s Firewall ON

#6. Avoid making your personal information public on social media sites and Internet in general.

#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.

#8. Use your primary email address to stay in touch with people you know or are acquainted with.

#9. Never use your official email address for social media sites.

#10. For social media sites, use an email address that you do not use for important communications.

#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.

#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.

#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.

#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.

#15. Do away with old accounts that you do not use anymore.

#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.

#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.

#18. Before downloading any free software, research on the software and the website hosting it.

#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.

#20. Beware of files with multiple extensions.

#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.

#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.

#23. Access your bank’s website by manually typing its URL in the address bar.

#24. Do not click any links in emails to access your bank’s website.

#25. Keep your software and operating system up-to-date.

#26. Do not install software that comes as an attachment in emails.

#27. Always shop from reputed and know online stores.

#28. Update the Internet browsers and software on your computer.

#29. Use up-to-date security software that offers multilayered protection.

#30. Increase your awareness of cyber security and share the same with friends and family.

#31. Avoid online shopping on public computers or networks.

#32. If you are buying from an online website for the first time, do a little research about the site and go through its privacy policies.

#33. Change your Internet banking passwords at periodical intervals and never share them with anyone.

#34. Avoid saving your credit/debit card information on websites and web browsers.

#35. Never share your financial details on phone or email, even if the caller/sender seems genuine. Remember, people in cyberspace are not always what they seem to be.

#36. Avoid downloading software from unverified publishers.

#37. Always lock your computer when not in use. Do not leave it unattended, especially in public places.

#38. Keep passwords that have a mix of uppercase and lowercase letters, numbers, special characters, and are at least 8 characters long.

#39. Avoid public networks for accessing websites that require you to sign in to access any information.

#40. If you store any critical information such as social security number, credit card number, bank account details, passwords, etc., in external storage devices, ensure that the data is encrypted.

#41. Accept friend requests only from people you know and have met with in person.

#42. Treat an online stranger in the same way as you would treat a stranger in the real world.

#43. If you suspect that a message from a friend is fraudulent or strange, call or meet the friend to discuss it.

#44. Protect your device with a screen lock. Turn the automatic screen lock function ON.

#45. Don’t root or jailbreak your device. It will make your device vulnerable to attackers.

#46. Install apps only from trusted and official sources.

#47. Turn OFF Wi-Fi, Location Services and Bluetooth when not in use.

#48. Avoid sending or saving personal & overly sensitive information on your mobile device.

#49. Avoid mobile apps that ask for unnecessary permissions.

#50. Install a mobile security app with features such as Anti-malware, Anti-theft, Call & SMS filter, Privacy Protection and Remote Device Management.

And that would be all for the top 50 dos and don’ts of Internet security that will protect you from online threats and hackers this year and the years to come. Have A Happy and Splendid New Year 2015!

Hacker fakes German minister’s fingerprints from HD photos




Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the fingerprint in question gets copied. This is exactly what has been demonstrated by a German hacker at a recent technology convention.
Jan Krissler, a hacker also known as Starbug, recently showcased some rather interesting news at the Chaos Communication Congress (CCC) in Germany. Interestingly, the CCC happens to be Europe’s largest association of hackers so it’s no surprise that this was the location for such a noteworthy revelation. Revealingly, Starbug demonstrated his technique for stealing fingerprints by simply analyzing a few High-Definition pictures of his target, in this case – German Minister of Defence, Ursula von der Leyen.

According to Krissler, faking these fingerprints was far easier than he thought possible. All he needed were a few close-range photos of his target in order to reverse engineer the fingerprints. He gained these photos from several press releases issued by the minister’s office and another that he took himself from a few meters away. With the help of commercially available software called VeriFinger he was then able to replicate the fingerprints of the Defence Minister of Germany, the country with the world’s 4th largest GDP and a leader in several technological and military fields.

After the demonstration, Krissler jokingly added – “After this talk, politicians will probably wear gloves when talking in public.” While that seems like a logical expectation, we doubt that will be the case. But we sincerely hope that politicians heed this warning and demonstration and take care to avert such cases in this modern age of cyberespionage, international cyberwarfare and other technology related crimes.

Krissler aka Starbug, is certainly not new to the hacking of biometric security and authentication techniques. When the Apple iPhone 5S was released in 2013, he successfully spoofed the highly publicized Apple TouchID sensors within 24 hours. He achieved this feat with the help of a finger smudge on the screen, wood glue and sprayable graphene. However, for his latest hack demonstration, it is scary that he does not need physical access to either a device or a finger. Makes you wonder how secure high-level authentication protocols really are.

A notable workaround for this is for users to not think of biometric security as a replacement for passwords or other authentication. While your fingerprints may be unique to you, the fact is they are not a secret. Anyone who is adequately motivated can easily get hands on your fingerprints through several innovative techniques. Instead, biometric security and fingerprint authentication should be used as a supplement for passwords. Starbug also agreed in 2013 by stating – “I consider my password safer than my fingerprint. My password is in my head, and if I’m careful when typing, I remain the only one who knows it.”

Interestingly, another novel hack technique was also showcased at the conference and this is known as “Corneal Keylogging”. This trick allows a hacker to gain someone’s passwords by simply gaining control of the camera of his smartphone. With this control, a hacker can simply read what someone is typing on the screen by analyzing HD photographs of the reflection of the screen in the user’s eyes. This technique may sound implausible to some, but the secondary cameras or front-facing cameras of smartphones today are strong to make this possible.

So while we all hope for and look towards a safe and secure 2015, advanced hack attacks such as this are constantly being built and showcased in all corners of the globe. It just goes to show that when it comes to security, there is no rest for the wicked.

Get Our App

Subscribe

Please Enter Your Email Id

© 2013 Blogger World. All rights reserved.
Designed by Think Exchanger