Monday, 31 July 2017

Gaze at the beauty of the world's most powerful artificial sun

Synlight, a three-storey, 350kW array of 149 conical reflectors enclosing xenon short-arc lamps, can generate light 10,000 times that of the solar radiation at the Earth's surface.
The €3.5 million (£3m) German Aerospace Center project, which is housed in a protective radiation chamber in J├╝lich, will explore the production of renewable fuel by extracting hydrogen from water vapour. "Making electricity renewable has already been done," explains research director Bernhard Hoffschmidt. "But in the future there will be many applications for fuels that cannot be replaced with batteries."
One example is travel. Current battery weight and energy density are incompatible with flight, whereas hydrogen is light and clean. The array began operating in March 2017 and Hoffschmidt hopes it will be a precursor to a system that can amplify the light of the Sun in a carbon-neutral way. "Synlight is only a very big lab," he says. "In the future, this hydrogen production should be done with mirrors concentrating natural sunlight."

Friday, 28 July 2017

Research: UK CIOs focusing on business and tech innovation in 2016

UK CIOs will be focusing on business innovation in 2016, according to research. Technology executives will deal with disruption in the tech sector by leading change and innovation in their businesses.Digital disruption and startup threats have prompted Chief Information Officers in the UK to make business innovation their key priority in 2016, according to research from Techworld's sister title CIO UK.In the study of more than 100 UK CIOs, technology executives responded that their focus had shifted from operational improvement and business and IT alignment to one of business innovation and leading change efforts.
Futurologist, digital strategist and CIO UK columnist Ade McCormack said that with threats from new market players, innovation was key to business survival. "The growing theme of disruption is having a bearing on the relevance of innovation to business success and survival," McCormack said.
CIO advisor Ian Cox said that in the digital age technology leaders must start with customer needs in order to foster game-changing disruptive innovation. "In the digital world, businesses need to take an outside-in perspective," he said. "The outside-in approach is about looking at the business from the customer's viewpoint - this is where the game-changing and disruptive innovation is coming from."
Read more at:- Artipot

GCHQ's National Cyber Security

GCHQ's National Cyber Security Centre joins CISO, CTO and startup accelerator experts at SecurIT event in London A Senior Representative from GCHQ's National Cyber Security Centre will join the speaker line-up at Techworld publisher IDG's SecurIT event on the morning of June 21 in London, which includes CIOs and CISOs from Trainline, Marks & Spencer and Sun Branding as well as startups from GCHQ's cyber accelerator programme.Norton Customer Service UK The Senior Representative from NCSC will also be joined by four security startups from GCHQ's cyber accelerator programme to discuss innovation in cyber security and emerging threats at the Shangri-La Hotel in The Shard.Also taking part is privacy and data security expert Annabel Gillham from law firm Morrison & Foerster who will present a benchmarking masterclass in preparing for the EU General Data Protection Regulations, which will be fully enforced from May 2018.
CIO 100 member Kevin Evans, the CIO of Sun Branding Solutions who is also studying for a PhD in cyber security, will discuss security on a budget, while Marks & Spencer Head of Information Security Lee Barney will share how the retailer has gamified security.Director of Security at Trainline, Mieke Kooij, will also join a closing panel to discuss the attributes, skill sets, and future role of the CISO.

Thursday, 27 July 2017

Munich's startup scene: Our pick of the city's new and innovative companies

It is hard to be Berlin's rival: only 11 per cent of German startups are based in Munich, whereas the capital has 31 per cent. Yet Bavaria's largest city remains a major economic hub for European business. Many corporations, including BMW, Siemens and insurance firm Allianz, are headquartered in the city. These firms foster startups with investment and programmes."We usually think that these corporations are old-fashioned, but in Munich they seem really interested in inventive ideas," says Franz Glatz, managing director of co-working space and incubator WERK1. Mobility, insurance tech, biotechnology and the internet of things are startups' sectors of choice.Munich-based companies benefit from good infrastructure, Norton Support Number UK proximity to an international airport and access to graduates from top universities such as the Technical University of Munich and Ludwig Maximilians University of Munich. On the flip side, living costs are expensive by German standards. It costs about €1,000 (£846) a month to rent a one-bedroom, city-centre flat. This means that labour is expensive, too. "It's partly why Munich finds it hard to attract investment," Glatz says. "Even Munich-born investors often go elsewhere."

The top five startups in Munich
Tado°
Tado is Europe's Nest. It specialises in smart thermostats and cooling products and has partnerships with UK-based energy companies.

Founded: 2011
Investment raised: €50m
Founders: Christian Deilmann, Leopold von Bismarck and Johannes Schwarz

Riskmethods

Riskmethods offers a cloud-based system to monitor risk in a business's supply chain and act as an early warning system for managers.

Founded: 2013
Investment raised: £18m
Founders: Heiko Schwarz and Rolf Zimmer

ProGlove
Supported by Intel, GETTYLAB and Bayern Kapital, ProGove has developed smart gloves designed for use in industrial settings. The gloves have a built-in scanner which sends data wirelessly to a software solution, allowing easy tracking of goods through packing facilities and factories.

Founded: 2013
Investment raised: £1.1 million
Founder: David Levine

Wednesday, 26 July 2017

I busted ghosts at hyperrealistic VR arcade The Void

I'm standing on an unstable scaffolding platform in downtown New York, wind blowing on my face and a proton gun firmly clutched in my hand. Two colleagues in identical uniforms with identical guns pace nearby inspecting the building’s cornice and the pavement some twenty metres below. Suddenly, it happens: carved stone gargoyles start shuddering and thrashing. They spring up with a screech and a flutter of wings. A frenzied proton-gun-versus-flying-monster battle ensues.Over the next ten minutes, my teammates (which included an Uber driver called Rocky) and I bolt from the scaffolding to a cosy apartment before landing on Norton Customer Service top of  a skyscraper, squaring off with a swarm of purple poltergeists, a villainous Victorian ghost and a demonic marshmallow giant.Nothing of this really happened, of course. New York City, the ghosts, and the gargoyles all existed within the Ghostbusters Dimension experience at The Void, the “hyperrealistic” virtual reality centre in Lindon, Utah. Still, when I walk out of the VR arena, and, with visions of burning marshmallow still etched on my retinas, remove my headset, I can barely shake off the feeling of being through a real Ghostbusting training day.

Co-founded in 2015 by entrepreneur and developer Ken Bretschneider with former stage magician Curtis Hickman and creative developer James Jensen, The Void company has pioneered the introduction of a multitude of technological innovations, rapidly establishing itself as an unicum in today’s VR landscape. The firm advises "players" come in pairs, which for a non-local like myself proved tricky. While taking an Uber over to Lindon, some 35 minutes from Salt Lake City, I persuaded my friendly, 50-something driver Rocky to be my wingman.What's immediately noticeable about The Void's VR experiences is that they're full-body affairs: you don’t have to stay static in the way you do with the majority of VR headsets (HTC Vive partly excluded). Rather, you walk around the space wearing a head-mounted device while a haptic harness provides real-time tactile feedback. The Void’s “hyperreality” effect is boosted by the way every element in the virtual universe is matched by a concrete counterpart in the real-world game arena.“Everything you see is paired with something on the physical side,” Hickman explains. 
“Everything is carefully matched to the virtual environment, while fans and other devices contribute things like sounds, smell, and tactile sensations.” As I was walking around Ghostbusters’ world, every wall, armchair, or doorknob I saw were there to be physically touched and interacted with.Like a thin fabric, the virtual world had been programmed to overlap almost perfectly with the material environment, and the two planes were working together to Windows Support Number maintain the make-believe. Such overlapping processes includes the players' own bodies, which are constantly tracked and transformed to credible avatars in the VR world. (In Ghostbusters Dimension, both myself and Rocky were rendered as beefy, khaki-clothed white males.)

Monday, 24 July 2017

Update your iPhone to fix this Wi-Fi security flaw

A problem with the iPhone's Wi-Fi connection could have let hackers take over people's devices and crash them, the company has revealed in its latest update. Apple has released a security update that fixes a problem with the Wi-Fi chip in the iPhone, which could have let cyber criminals access a phone while it was searching for a connection. Using the problem, hackers could have found phones with Wi-Fi switched on, remotely taken over the chip that powers Wi-Fi, and crashed the device.Android devices were also affected by the problem, called the Broadpwn exploit, and Google issued an update at the beginning of the month. Described as a "critical" flaw it affected devices from numerous brands including Samsung and HTC.  Apple released a fix for the Broadpwn exploit in an update that patches an additional 46 flaws in iOS 10. They include a bugs in Messages, Safari, Notifications and Contacts, as well as a way to take over devices using WebKit. Users are advised to apply the update in order to keep their devices secure from would-be cyber criminals. The Wi-Fi problem was discovered by Nitay Artenstein, a security researcher at Exodus Intelligence. Other key problems Apple has now fixed were discovered by Google's Project Zero, independent researchers and Apple. 
Apple regularly releases updates that fix security bugs before they're exploited. Earlier this year it issued an urgent fix for an arsenal of spying bugs revealed by Wikileaks in the Vault 7 files. The iPhone giant advises users to always download the latest software in order to keep their devices secure. Other tips include having a strong, unique passcode, turn off notifications and disable Siri for when the handset is locked. The iOS 10.3.3 update comes just months before the company releases iOS 11, the software designed for the iPhone 8. The latest software includes phone-to-phone Apple Pay, a redesigned control and notifications centre, and a "do not disturb while driving" mode. 


Wednesday, 19 July 2017

Cyberbullying among teens is not the problem you think it is

The largest ever study into bullying among teenagers in England suggests that concerns about cyberbullying may be overblown, with traditional real-world bullying still hugely outstripping it.
The study, carried out by two professors from the University of Oxford, provides an evidence-based look at a sensitive area that has, in the past, been sensationalised. The coauthors, who call for “interventions that holistically target both forms bullying in adolescence”, highlight that their findings are “in stark contrast to media reports”. They point specifically to a January report in the Mirror that claimed nearly half of parents believed their children were more likely to be bullied online than in the playground. But the new study, published in the Lancet Child and Adolescent Health, finds this is not the case.The survey reported in the Mirror was problematic, firstly because it was based on parents' perceptions of their children’s safety, not necessarily the reality, and secondly because it was conducted by Symantec, a firm that sells Norton security software for families. A blog post penned by one of Symantec’s own staff on the topic begins with the individual sharing his own fatherly experiences, emphatically flagging up the most serious concerns (“cyberbullying is a growing problem on the internet and one that as a parent you may underestimate”) before listing the best defence strategies - and corresponding Norton software.


Andrew Przybylski, a co-author on the new paper, calls the Mirror article’s claims “pretty disturbing” and points to the “implausibly high numbers” quoted in the press when it comes to online bullying.
“People are rightly taking cyberbullying quite seriously, but we must hold cyberbullying to the same standards as traditional [bullying],” he tells WIRED. “We wanted to get an accurate measure of what was going on.”

Monday, 17 July 2017

Facebook's Aquila drone completes its second flight – and manages to land safely this time

Facebook has reached its latest milestone in the bid to provide internet to even the most remote locations of the globe.Its Connectivity Lab has completed the second full-scale test flight of the firm's Aquila high-altitude aircraft, almost a year since the first, and, more importantly, it made its first safe landing following a crash last year that saw it take severe damage under windy conditions.Aquila is a solar-powered plane designed to 'beam' Norton Customer Service connectivity to places that can't support the typical infrastructure needed to provide web connections. When complete, it will be able to circle a region up to 60 miles in diameter, beaming connectivity from an altitude of more than 60,00ft using laser communications and millimetre wave systems. Aquila is designed to be hyper-efficient, so it can fly for up to three months at a time. The aircraft has the wingspan of an airliner, but at cruising speed it will consume only 5,000 watts — the same amount as three hairdryers, or a high-end microwave.
Facebook yesterday announced the drone's successful May 22 flight, detailing modifications made to stabilise the plane under challenging conditions and confirming that "the aircraft flew for 1 hour and 46 minutes, and landed perfectly on our prepared landing site".
"Internet access can offer life-changing opportunities and experiences to all of us, but there are still 4 billion people without it," said Jay Parikh, Facebook's global head of engineering and infrastructure in a blog post.

The first functional check last July was a low-altitude flight and the aircraft flew for more than 90 minutes — three times longer than Facebook said it had originally planned. Parikh continued that this meant his team could verify and check aerodynamics, batteries, control systems, and crew training.


Thursday, 13 July 2017

Terrified of public speaking?

Public speaking isn't easy. It's actually, like, kind of a problem that affects, um, roughly 74 per cent of people.Whether it's long pauses, or the use of 'hedging' language (see previous sentence), the way you speak can negatively affect your credibility. So what do you do? Picture your audience naked? Focus all that anxious blinking on one particular, bewildered person? Orai is a mobile public speaking course designed to tackle this specific problem, and in doing so, transforms your smartphone into a speaking coach. Created by engineering students at Drexel University, Orai helps you curate your word choices. By listening to recordings of your speech, Orai uses machine learning to give feedback relating to filler words, pacing and word clarity. It Windows Helpline Number even has a function to try to improve your vocal energy.The idea came from a simple need for expression. When Danish Dhamani and Paritosh Gupta moved to the US, English was not their first language. Paritosh grew up in India, whereas Dhamani was raised in Tanzania. They attended public speaking clubs but knew they weren't for everyone - costly both in terms of time and finances. In an interview with Fast Company, the pair said "there had to be a better way."

Wednesday, 12 July 2017

Origin beastly new EON laptops boast full-blown desktop Core i7 processors

For years, the mantra with gaming laptops has been the same as other gadgets--sleeker, thinner, and more lightweight. And companies have pushed that basically as far as it can go, with Razer's Blade gaming laptop line looking practically indistinguishable from a normal laptop.
Which is why I find it sort of refreshing to see Kevin Wasielewski, CEO of Origin, use the words "relatively thin" in the press release for his company's latest gaming laptops, the updated EON17-X and EON15-X. Make no mistake, at 1.5" thick the EON15-X and EON17-X are pretty bulky machines, but you're trading convenience for power--a lot of power. How much power? Origin crammed an full-blown desktop Core i7 processor inside these new machines.
Playing with power
Intel's pretty tricky when it comes to labeling their processors, specifically when it comes to laptops. That "Core i7" in the latest and greatest gaming laptop? It's a shadow of a real desktop Core i7. Seriously. Origin's even got a built-in example to point to. Alongside the new EON15-X and EON17-X, Origin's showing off the revamped EON15-S at CES, which also runs a Core i7 processor. A Core i7-4720HQ laptop processor, to be exact. Windows Helpline Number The Core i7-4720HQ runs at a base speed of 2.6GHz and can dynamically spool up to 3.6GHz on one active core. Compare that to the EON15-X and EON17-X, which feature the LGA 1150 socket and thus can be loaded with up to an Intel Core i7 4790K, a.k.a. "Devil's Canyon." The quad-core 4790K runs at a base speed of 4GHz and has a Turbo clock speed of 4.4GHz. That's a drastic difference between two "Intel Core i7 processors."Sure, you can get mobile processors that approach the power of top-of-the-line desktop processors. Intel's 4940MX has a max turbo clock speed of 4GHz, which is pretty impressive. The difference is that you'd pay over a thousand dollars for just the 4940MX processor, as opposed to $340 for the 4790K. For comparison, the 4720HQ in the updated EON15-S costs around $400.


So Origin fitting desktop LGA 1150 socket technology into a laptop is a pretty huge boon. It allows them to offer way more power at a price equivalent to the mid-range gaming laptop processors.
With great power comes great thermal responsibilities There's a trade-off, of course. First of all, size. As I said, the EON15-X and EON17-X are relatively hefty machines by modern standards, coming in at approximately 1.5" in height and 7.5-9 pounds (depending on which screen size you choose). That's definitely thicker than the Blade's 0.7", although Alienware's 17 and 18 inch offerings are comparably bulky.The other problem is heat dispersal. Desktop machines are often huge, with multiple fans installed to maximize airflow and keep those processors cool. Most gamers (myself included) even install aftermarket coolers to help that process along even more.Cram a desktop processor into a laptop and you're looking at a lot more heat. I know my current Origin laptop runs pretty hot even with a paltry 2.5GHz laptop processor inside, and I'm curious to see how the EON15-X and EON17-X manage temperatures.Finally, there's the question of whether you even need all this power. Most games are still GPU-limited, not CPU-limited, so the extra processor speed might not help you unless you're doing heavy photo/video rendering or other processor-heavy tasks. Speaking of graphics cards, you can get up to an Nvidia GeForce GTX 980M with 8GB GDDR5 VRAM in the EON15-X and EON17-X. The updated EON15-S, by contrast, comes with an integrated Nvidia GeForce GTX 980M with 4GB of VRAM.

Tuesday, 11 July 2017

Cybersecurity Forecast Looks Grim for IoT and SCADA

With the FBI stating that ransomware alone is estimated to cause a whopping $1 billion in financial losses, cybercriminals have also outdone themselves with the largest denial of service attack to date – 1 Tbps – performed with compromised IoT devices. 2017 is likely to be even more interesting, from a security perspective, than anything we’ve seen before.With the FBI stating that ransomware alone is estimated to cause a whopping $1 billion in financial losses, cybercriminals have also outdone themselves with the largest denial of service attack to date – 1 Tbps – performed with compromised IoT devices. 2017 is likely to be even more interesting, from a security perspective, than anything we’ve seen before.
The IoT Bot Army
The IoT proliferation, estimated to reach 50 billion devices by 2020, will likely be exploited throughout 2017 to perform some of the most massive and disruptive distributed denial of service attacks to date. Built by manufacturers with inherent security vulnerabilities and sometimes even lacking update mechanisms, smart internet-connected devices will likely become part of the largest “armies” of bots controlled by cybercriminals. Potentially ranging in the hundreds of thousands, such massively controlled networks will likely be used to target organizations and even states to disrupt infrastructures and services. If the Mirai botnet that disrupted DNS service provider DYN has taught us anything, it’s that it’s not only amazingly simple to compromise IoT devices, but that the Internet’s infrastructure and IoT security standards need to change to address these concerns.Industrial Control 
Systems Attacks
With SCADA (Supervisory control and data acquisition) systems becoming cheaper to produce and moving towards relying on TCP/IP network protocols for network communications, security researchers have long warned about the dangers of not having the proper security mechanism in place to protect them. Exploiting vulnerabilities in various SCADA components to gain access and control critical systems, such as a country’s power grid, telecommunications, and even transportation systems, attackers could compromise and cripple a town, state, or even a small country. Because most of these systems lack proper security mechanisms as they haven’t been designed around security, security researchers have found that cybercriminals could easily tamper with them and make them execute malicious commands and instructions.
Darknet Proliferation and Targeted Attacks
While seemingly unrelated, the two play a vital role in cybercriminal activities as the tools and malware sold on darknet marketplaces are often used in targeted attacks. Despite the demise of the popular Silk Road website, many TOR-fied hidden services have emerged to fill in the illegal goods distribution vacuum. Highly specialized marketplaces have stepped up to offer everything from illegal drugs and goods to cybercriminal tools, such as ransomware kits, to the highest bidder. This constant supply of cybercriminal tools has spurred a new generation of cybercriminals, focused on financial gains.Targeted attacks will also become a lot more common, as not only the tools used for pulling them off have become easily available, but the rewards of successfully breaching a high-profile company are highly profitable. Either for public shaming or to extort the victim into paying large fees not to publish online sensitive and critical data, targeted attacks will likely intensify through 2017, potentially hitting large organizations and financial institutions.
A Safer 2017
With 2017 just around the corner, many security experts believe cooperation between law enforcement agencies and security companies can only lead to a diminishing in cybercriminal activities. Once such activity has already concluded with the dismantling of a massive international criminal ring and that operated 20 malware and ransomware families.
Dubbed Avalanche, the operation was not only a success, but also proved that both law enforcement and security agencies can stifle cybercriminal activities, which is about everything you could wish for 2017. With the increased sophistication of and persistency of malware, 2017 is all about securing all your devices. Total security for multiple devices does just that and platform-agnostic protection is the best type of protection against new and unknown malware that might ruin your 2017.
  

Friday, 7 July 2017

How can I remove ransomware from my computer?

You’re a home or small business user and a dialogue box has just appeared telling you that your Windows PC's files are now encrypted and you have 48 hours to pay £350 ($500) in Bitcoins to get them back. Fail to meet that deadline and the price will rise.
Now what?
Crypto ransomware targeting Windows turned into a mass phenomenon about five years ago. And by the time you saw the ransom demand, it was too late to pull the plug on the PC to stop further compromise. Your only option was to haul out backups, assuming you had them.Today, the situation has improved a bit, although the right kind of backups is still the number one defence.Today’s antivirus programs are now better tuned to block ransomware, usually by watching for the actions of specific variants while a few even claim they can clean up the mess after the fact. This the second priority – making sure that the system is free of infection before reinstating data.Beyond that, it’s about preparing better defences for future attacks which might be easier than some assume. Although ransom malware almost always uses unbreakable public key encryption to lock files, the number of variants is relatively small at any one time. It is possible that a security programme can be tuned to spot the most active ransomware by watching for known behaviour such as interacting with the filesystem

Obviously, no product can offer 100 percent ransomware removal, not even a fraction of that if we're honest. Businesses and individuals should still operate carefully online, abide by a security best practice and back up their data. But a lot of them will help protect your systems and help you recover as fast as possible with minimal damage to your systems and networks. It needs to be underlined in bold that competent backup is still the single most important defence against ransomware. Without that on hand, simply removing the infection is just a way of getting back the system, not the data that was on it.


Wednesday, 5 July 2017

Who are the virtual reality and augmented reality startups



Virtual reality (VR) and augmented reality (AR) revenues are set to rocket from £4.2 billion in 2016 to more than £130 billion in 2020 according to research from the International Data Corporation. The UK plays home to a number of emerging players in the industry hoping to cash in on the boom. A recent report by GrowthEnabler estimated that of more than 800 companies working in the segment worldwide, more than 150 are based in the Britain. Here's our pick of the ones to watch out for.Buckinghamshire-based EdTech startup MEL Science has taken VR to the chemistry lab. Russian physicist Vassili Philippov founded the company to teach his children about science through a combination of practical training and virtual reality. The startup kit includes a cardboard VR headset, chemistry equipment, and two sets of experiments to start. Another two are delivered to their door every month of the subscription. After conducting a real experiment with the equipment, budding chemists can don the goggles, boot the MEL Science app, and explore their work on a molecular level, viewing, manipulating and even building atoms. The company was founded in 2015 and launched its virtual chemistry lab in June 2017. In October 2016 it raised $2.5m in Series A funding from Sistema Venture Capital. The subscription service is available to customers in the UK, US, and Russia, and costs £38.90 per month including shipping.
Mcafee Support Number UK

Tuesday, 4 July 2017

China's bloggers, filmmakers feel chill of internet crackdown

China's latest maneuver in a sweeping crackdown on internet content has sent a chill through a diverse community of filmmakers, bloggers, media and educators who fear their sites could be shut down as Beijing tightens control. Over the last month, Chinese regulators have closed celebrity gossip websites, restricted what video people can post and suspended online streaming, all on grounds of inappropriate content. On Friday, an industry association circulated new regulations that at least two "auditors" will, with immediate effect, be required to check all audiovisual content posted online - from films to "micro" movies, documentaries, sports, educational material and animation - to ensure they adhere to "core socialist values".Topics deemed inappropriate include drug addiction and homosexuality, said the government-affiliated China Netcasting Services Association, which represents more than 600 members. People flocked online at the weekend to criticize the move, with most saying it was a step backwards that would hamper creativity. Some noted it could be near impossible to enforce. "According to these censorship rules, nothing will make it through, which will do away with audiovisual artistic creation," Li Yinhe, an academic who studies sexuality at the government-run Chinese Academy of Social Sciences, wrote in an online post.
Under the government rules, such works as Georges Bizet's opera "Carmen" and Shakespeare's "Othello" would technically have to be banned for depicting prostitution and overt displays of affection, she said. The rules, which affect social media giants like Weibo Corp (WB.O) as well as small platforms that have thrived in China's buzzing creative online space, are the latest step toughening oversight ahead of the Communist Party Congress later this year, when President Xi Jinping is expected to consolidate power. China's online video market, including revenue from advertising and content purchases, had been expected to more than quadruple to around 96.2 billion yuan ($17.6 billion) by 2020 from 2015, according to 2016 data from IHS Markit. "We used to describe the constant drip of regulation as boiling a frog in warm water. Now it is outright scalding with boiling water," Wang Xiaoxiao, a talent agent who represents several actors who have gained fame online, told Reuters.

Zhao Jing, the founder of Yummy, a site that specializes in education on gender topics, said she would be using euphemisms for genitalia and avoid banned topics such as one-night stands and extramarital affairs to get around keywords that will trigger the censors.She fears her site could be thrown off Tencent's WeChat instant messaging application otherwise. Mcafee Customer Service

Sunday, 2 July 2017

Why cybercriminals are really attacking your smart home

Security issues are a major roadblock in the large-scale adoption of IoT, but not all consumers are aware of the vulnerabilities in their home devices; vulnerabilities they most often facilitate themselves.In most cases, manufacturers rush to market and forget about security. Throughout their purchase journey, users are more often driven by the latest trends or whims, and don’t carefully look into product reviews or demand manufacturers look into strong security algorithms in the device 
lifecycle. Even though IoT security flaws are stalling its growth and global adoption, the segment gaining real traction is home security alarm services. Often, users are not even aware that they own a smart home and don’t know its implications. “A fifth or fewer realize they live in a smart home,” confirms a  Bitdefender global study on IoT adoption and smart homes.The most common smart devices in people’s homes are smartphones, desktop computers and tablets


followed by smart TVs and wireless gaming consoles, the study found. US households lead adoption, with an average of 13 smart devices or accessories each.Mirai attacks have been in the news quite a lot and although, for now, attacks seem to have ceased, DDoS attacks generated by Mirai infections are expected to keep coming our way. As security experts believe we’ve only experienced the tip of the iceberg, Mirai and malware of its like are spreading, taking over DVRs and routers,sooner or later taking its toll on consumer life.Despite poor authentication mechanisms in IoT devices, users make it very easy for hackers to bypass security and infiltrate their networks because they forget to change default credentials, run software updates or use a strong security agent for their home. So if your password is still “admin”, “123456” or something easy to guess based on your personal information, you are a perfect candidate for brute-force attacks. As many as 16 percent of US residents use the same password for all devices. Don’t join their club!  Mcafee Contact Number
Read more:- Go here



Saturday, 1 July 2017

What makes Best Buy antivirus software?

When you download virus protection - whether it’s paid-for or free software - you want to feel confident that hordes of internet nasties will be safely locked out of your PC or Mac. To ensure that security software packages offer good protection against day-to-day threats, we put together a horrible collection of old and new viruses and other malicious downloads, also known as malware. A Best Buy security suite will keep your computer as safe as Fort Knox. But there’s more to internet security than just fighting malware. So our thorough testing considers other key questions you’ll be asking before you download, including: Will I be shielded from viruses? Will it help me avoid scams? Is the software easy to install and use? Does it include all the features I need? Will it slow down my computer? Should I download it? Head on to our antivirus software reviews or read on to find out more about how our independent testing works.

Will I be shielded from viruses? 

We use the latest malware to try to infect our test computers. Using virus-ravaged zipped email file attachments, USB sticks and website downloads, we carry out a full-on cyber assault on the software. And for Macs, we check to see whether they stop annoying adware, too. The security packages that deal with the threats with the most effectiveness and least fuss score the highest marks and earn a place in our run-down of best antivirus programs. We also check the programs to ensure they don’t let you pass infected files onto other people, even if the files haven’t been opened by you first. 
For read more go to official site