This Website Maybe For Sale – Click Here -

COMPUTERS Resource Center

Source Match Computer News

Google Maps for Android is getting the desktop feature you’ve been waiting for

One of the coolest Google Maps tricks is being able to set multiple destinations. You no longer have to plan simple A-to-B trips, and then request new directions whenever a new destination comes along. With multiple stops, A-to-B-to-C-to-D routes are easy to set up. However, as useful as the feature is, it also used to be pretty annoying in one significant regard: it was only available on the desktop website, which is hardly convenient when most people rely on iPhone and Android for their navigating. Thankfully, that just changed, and you’re going to be able to use multiple destinations on mobile as well. DON’T MISS: The iPhone 7 nightmare As is often the case with Google Maps, Android users will be the first to get the new feature as soon as update 9.31 rolls out. As Android Police reports , a beta version of the update shows that Google is actively working on implementing the multiple stops feature, and the feature is finally going live for users. The following screenshots show you what setting up multiple destinations looks like on mobile. The site says the feature is likely activated by “a server-side switch,” not an actual update to Maps, but you should still update Google Maps to the latest version available and wait for Google to make the feature available in your area. It’s likely that Google Maps for iPhone will also receive the future in the near future. After all, Google likes to offer iPhone users the same set of features that are available on Android, especially considering the increased competition from Apple Maps . UPDATE: Google confirmed that Android is going to soon receive the multiple stops feature, with iOS getting it next. Read more about it at this link .

Don’t fall for this Android malware that pretends to be Uber, Facebook, or WhatsApp

Security researchers from FireEye recently uncovered a new piece of Android malware that can mimic the look and feel of app interfaces from the likes of Uber, WhatsApp and Google Play. The malware reportedly struck first in  Denmark and is now making its way through a handful of other European countries, including Italy, Germany and Austria. According to researchers, the malware is spread via a basic yet cleverly deceptive SMS phishing scheme. When a user receives and subsequently clicks on an ostensibly legit link, the malware is downloaded and begins to monitor which apps are active and which apps are running in the background. What happens next is extremely clever: when a user attempts to use an app that the "malware is programmed to target", the software overlays a fake user interface with "nearly identical credential input UIs as seen in benign apps." In turn, the malware than asks unassuming users to enter in sensitive information such as their banking credentials or credit card information. DON'T MISS:  The iPhone 7 nightmare All the while, victims of this attack believe that the UI screen in front of them is 100% authentic because it only sprung into existence once they decided to launch whatever app they happen to be using. All told, the malware is designed to mimic 8 separate apps, including WhatsApp, WeChat, Uber, Facebook, Viber, the Google Play store and more. Notably, the authors of this particular are seemingly becoming more sophisticated and ambitious now that they're targeting a larger array of popular apps. FireEye notes: For example, later campaigns usually targeted more benign apps than earlier campaigns, focusing on messaging apps, for example, as opposed to banking apps. Also, the malicious apps used in later campaigns are often harder to analyze because obfuscation techniques were adopted to evade detection. In addition, some new functionality was added; in particular, we noticed that more recent samples leveraged reflection to bypass the SMS writing restriction enforced by the App Ops service (introduced in Android 4.3). All of this suggests that threat actors are actively improving their code.   Additionally, the malware authors have begun sending out more enticing and seemingly benign links via SMS, with one message stating, "We could not deliver your order. Please check your shipping information here.” In one particular malware campaign targeting users in Denmark, one SMS link managed to generate more than 130,000 clicks. More information on this particular strain of malware can be viewed via the source link below.

Tennis-Not my usual Wednesday, says unlikely lad Willis

By Martyn Herman LONDON, June 29 (Reuters) - With a huge dollop of understatement and a wry smile, rank outsider Marcus Willis described the day he faced the greatest player of all time on Wimbledon's Centre Court as "not my standard Wednesday". "It's not playing Roger Federer on Centre Court," added the 25-year-old. Then to earn a crack at seven-times Wimbledon champion Federer, he had to bridge a yawning rankings gap of more than 700 to oust Lithuania's Ricardas Berankis in the first round.

Google just shamed the antivirus software you probably use, so update immediately

Whether you’re looking to protect your PC or an entire fleet of computers, chances are you’ve either considered or have ended up purchasing products from Symantec. The company sells consumer software under the Norton brand, in addition to Symantec Endpoint Protection that targets enterprises. The bad news is that both products were just shamed by  Google’s Project Zero security team , which found critical errors that leave users at risk. In fact, Google’s security hacker Tavis Ormandy discovered numerous vulnerabilities in 25 different Norton and Symantec products, and he said they are “as bad as it gets.” MUST READ:  The iPhone 7 nightmare "These vulnerabilities are as bad as it gets," Ormandy  wrote . "They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption." Rather than protecting users from malicious programs, the anti-virus programs could end up helping hackers by making it even easier to target these machines – essentially, a hacker could simply have to attack the software intended to protect a computer, rather than the computer itself. "Just emailing a file to a victim or sending them a link to an exploit is enough to trigger it – the victim does not need to open the file or interact with it in any way,” Google’s researcher said. Google’s team looks for zero-day security holes in various products and found issues in antivirus products from Trend Micro in the past. The researchers give companies 90 days plus a two-week grace period to fix issues, after which point they’re revealed to the public. The good news is that Symantec has taken swift action  and all the issues were fixed in an update that was already sent to customers by the time Ormandy published his findings. Even so, while antivirus software on some systems is updated automatically, not all computers are set up that way. Admins might have to perform the updates themselves. It’s still disconcerting to find out that one of the top antivirus makers out there had so many bugs in software meant to protect users from malicious hackers. More details about the software issues found in Symantec and Norton products are available at the source links – and make sure you update all your Symantec products immediately.

ACLU files lawsuit over U.S. anti-hacking law

By Dustin Volz WASHINGTON (Reuters) - The American Civil Liberties Union said it filed a lawsuit in U.S. federal court on Wednesday challenging the constitutionality of an anti-hacking law, arguing it prevents academics and others from collecting data to investigate whether online algorithms may be discriminatory. The lawsuit claims the Computer Fraud and Abuse Act (CFAA) infringes the U.S. Constitution’s First Amendment protections of speech, the press, and a right to petition the government. It was brought by the ACLU on behalf of a group of university professors and First Look Media, which publishes the news site The Intercept, against U.S. Attorney General Loretta Lynch.

China appoints new internet regulator

Xu Lin, deputy director of China's internet regulator, attends a Shanghai delegation group discussion at the National People's Congress (NPC) in Beijing China on Wednesday appointed a new head of its powerful internet regulator, a man who has publicly vowed to maintain the ruling Communist Party's tight grip over cyberspace. In a brief report, the official Xinhua news agency said Lu Wei will no longer head the Cyberspace Administration of China, naming one of his deputies, Xu Lin, as his replacement. Xu, 53, was in charge of propaganda in China's commercial capital Shanghai from 2013-15 before being moved to Beijing to become a deputy to Lu, according to his biography.


Noodles & Co reports possible data security incident

(Reuters) - Fast-casual restaurant chain operator Noodles & Co said on Tuesday a recent data security incident may have compromised the security of payment information of some its customers. The company said the possible data security incident has affected customers who used debit or credit cards at some of its locations between Jan. 31 and June 2. Noodles & Co confirmed that malware may have stolen credit or debit card data from some cards used at some of its locations.

EU leaders tell Britain to exit swiftly, market rout halts

EU and British flags are adjusted before the EU summit in Brussels By Michael Holden and Elizabeth Piper LONDON/BRUSSELS (Reuters) - European leaders told Britain on Tuesday to act quickly to resolve the political and economic chaos unleashed by its vote to leave the European Union, a move the IMF said could put pressure on global growth. Financial markets recovered slightly after the result of Thursday's referendum wiped a record $3 trillion (£2.25 trillion) off global shares and sterling fell to its lowest level in 31 years against the dollar, but trading was volatile and policymakers said they would take all necessary measures to protect their economies. Chancellor George Osborne, whose attempt to calm markets had fallen on deaf ears on Monday, said the country would have to cut spending and raise taxes to stabilise the economy after a third credit ratings agency downgraded its debt.


Why Are Government Hacks Often Bigger Than First Disclosed?

Updated on June 28 at 12:00 p.m. The U.S. government sure has been getting hacked a lot. In July 2014, The New York Times reported that Chinese hackers broke into the servers of the Office of Personnel Management (OPM), the agency that functions as a kind of government-wide human-resources department.

Meet your favorite new Google search feature

Wait, what on Earth did Drake just mumble in that new single? And what the heck is Rhianna saying in the hook on her new song? Is that Fetty Wap track even English? There's a reason lyrics sites like Genius have exploded in popularity over the past few years — fans have no idea what anyone is saying anymore. There are dozens of apps and services that offer lyrics for millions upon millions of songs, and soon you won't have to use any of them ever again. Why? Because song lyrics will appear right within your search results on Google.com and inside Google's mobile search apps for iOS and Android. DON'T MISS:  How to get paid every week just for using one Google app Google and a Toronto-based company called LyricFind have both confirmed a deal that will bring song lyrics directly to search results. As Billboard confirmed , the ink on the deal is dry and the new lyrics feature will begin rolling out to users in the United States on Tuesday. This is more than just a big win for LyricFind, which will undoubtedly pull in some nice additional cash as a result. It's also more than a win for Google, which takes yet another step toward realizing a future where users never actually have to leave Google's own sites and apps. Music publishers and songwriters will also see benefits from the deal, according to LyricFinder CEO and co-founder Darryl Ballantyne. "It should be a significant revenue stream," Ballantyne told Billboard . "I can’t get into the rates, but we expect it to be millions of dollars generated for publishers and songwriters as a result of this. It’s all based on usage. Royalties are paid based on the number of times a lyric is viewed. The more it’s viewed, the more publishers get paid." Here's a screenshot of a lyrics search:

This malware steals data using your Internet-less computer’s fans

So you have an air-gapped computer , or unconnected to the Internet, and you think your data is secured just because it’s not accessible online? In most cases that might be true, but that’s not 100% accurate. There are ways to steal information from computers that are not connected to the web, and smart hackers will not stop looking for such tricks. The newest such malware would let attackers steal information from supposedly secure computers with the help of the sound made by its fans and processor. DON’T MISS: Leaked iPhone 7 photos point to intriguing new camera design Researchers from the Ben Gurion University in Israel explained in a new paper that they would be able to retrieve data from an isolated computer that’s not connected to the internet and doesn’t have cameras or audio hardware in such a manner. What they did was to control and listen to the speed of the computer’s fans and CPU, Motherboard explains . The information can be transmitted in Morse code up to eight meters, and a smartphone could pick up the signals and turn it into usable information. Even so, to work, the malware has to be installed on the air-gapped computer. That would be done using a stick, or any other external storage device that would carry the virus. Once installed, it locates data on the machine and starts transmitting it by controlling the speed of the CPU and cooling fans. The acoustic waveforms would probably be ignored by the computer user, but a nearby listening device would pick it up and translate it for the attacker. Because this is still morse code, hackers can’t really steal large amounts of data. Researchers expect speeds of 900 bits per hour which isn’t a lot. But it might be enough to get passwords and encrypted keys without leaving a trace. Of course, this type of attack still needs two things to happen: 1) the malware needs to be installed on the air-gapped computer, and 2) the attackers need to be in the range of the hacked device to pick up the signal. But it’s more than clear that people are actively devising ways to compromise even the most secure computers. The full paper on the matter is available at the source link.

More Clinton emails released, including some she deleted

Rev. Jessie Jackson listens at left as Democratic presidential candidate Hillary Clinton speaks at a Rainbow PUSH Women's International Luncheon at the Hyatt McCormick in Chicago, Monday, June 27, 2016. (AP Photo/Andrew Harnik) WASHINGTON (AP) — An additional 165 pages of emails from Hillary Clinton's time at the State Department surfaced Monday, including nearly three dozen that the presumptive Democratic presidential nominee failed to hand over last year that were sent through her private server.


Sharp new satellite imagery makes Google Earth way better for stalking

Google Earth and Street View already combine to make the tool for stalking people since the phone book went out of print. With a brand-new set of imagery captured by the Landsat-8 satellite, Google has made the day of satellite imagery nerds and stalkers worldwide. The new imagery was debuted in a blog post , which explains how Landsat-8 and better image processing have combined to give some spookily pretty satellite images. DON'T MISS:  Burger King’s Mac n’ Cheetos is exactly what America needs Landsat-8 went into orbit in 2013, and has sensors that are a step above other satellites in NASA's Landsat program. We've been seeing the results for years from NASA releases, but this is the first time comprehensive imagery of the entire globe has been stitched together. And what imagery! Google has some before-and-after shots prepared , and the contrast is stark. Take these images of New York City: everything is far sharper, showing things like building shadows and baseball fields in Central Park. In order to assemble one complete cloud-free mosaic of the Earth, Google used its Earth Engine API to sort through imagery. In total, it had to mine data from a petabyte of imagery, representing over 700 trillion individual pixels. Good thing Google has computers big enough to be seen from space to do the work for it. The new images are already available to the general public -- go to the Google Earth app, if you're still using that, or enable the satellite overlay on Google Maps. Most of all, I'm excited for what the latest version of Google Earth means for satellite image wallpapers.

One of Google’s biggest partners probably isn’t dumping Android after all

For the foreseeable future, Android will be the number one mobile operating system on the planet. It has continued to build an impressive lead over iOS and the countless stragglers who can't even top 1% of the market share, but that hasn't stopped some of the industry's leading Android phone makers from planning for a future that is significantly less dependent on Google's mobile OS. DON'T MISS:  Forget 2016 Nexus phones, Google is said to be making an iPhone 7 killer Just last week, The Information reported that Huawei had put together a team of engineers to build a new operating system that could one day replace Android as the company's go-to software for smartphones and tablets. Although Huawei hasn't directly responded to the report, the company's CEO Richard Yu took to social media site Weibo over the weekend to confirm that his team will continue to use Android as long as Google keeps it open. This is not exactly an outright denial, but it should be Google at ease for the time being. Even if Huawei is working on its own mobile platform, Samsung has already shown just how long it can take to get any traction whatsoever with a new OS. Tizen has been in various stages of release since 2012, but you'd still be hard-pressed to find someone on the street who had ever even heard of it. The smartphone market will continue to have a decidedly green tint for the coming years, but don't be surprised if other operating systems begin to rise up in the wake of fragmentation and dissatisfaction with Android.

Interview: Spaces is the most exciting VR startup you’ve never heard of

Virtual reality startups like Spaces , a new Los Angeles-based VR shop, are in a race for eyeballs. For some companies in the space, it’s about the wow factor of shiny hardware that gives users awe-inspiring VR experiences. For an enterprise like Spaces, which was launched by veterans of DreamWorks Animation with $3 million in funding, a key piece of the game plan is teaming up with bigger companies like media brands to get the startup’s VR content in front of as many people as possible. That’s one reason, for example, Spaces secured a $30 million joint venture announced earlier this month between it and China-based Songcheng Performance Development Co. Ltd., one of the biggest theme park operators in the world. Spaces will be using tools and technology it’s developing specifically for theme parks to help bring VR and mixed reality into Songcheng’s properties, which drew almost 23 million people last year, according to Spaces. Not bad for a company that’s only a few months old and was born out of its founders’ itch to capitalize on the exploding market for VR content and experiences. DON'T MISS:  Why the boring iPhone 7 is the smartest thing Apple has done in years The founding team includes CEO Shiraz Akmal, who prior to January had spent more than two years developing technology, experiences and games for VR at DreamWorks Animation. He’s also worked for almost a decade at THQ as vice-president of operations-product development and helped establish THQ China. Brad Herman, meanwhile, is Spaces’ CTO who also came from the trenches at DreamWorks. He served as head of DreamWorks Animation’s DreamLab, among other things, and served as crowds supervisor on DreamWorks Animation productions like “Kung Fu Panda 2” and “Monsters vs. Aliens.” The name they chose for their new venture refers to the base unit of virtual reality. “We’re a technology company that has creativity at its core,” Herman told BGR a few days before the Spaces team met with development partners at E3. “We make creative software, predominantly in the enterprise space. We’re about creating spaces and enabling people to create spaces.” One example is the agreement with Songcheng, which Spaces is co-managing from its L.A. headquarters. In Songcheng’s theme parks, VR and mixed reality elements will be added to existing attractions, including elaborate stage shows. The Songcheng-Spaces venture also plans to build unique, standalone virtual reality attractions and parks throughout China. Spaces appears set to tap into something spelled out in the 2016 Virtual Reality Consumer Report released a few days ago that presents the latest consumer research on this topic from Greenlight VR. The bottom line, according to the report — when more than 1,200 survey respondents were asked about their personal interest in different VR use cases, gaming came in at number six. The top use cases were actually things like travel, tourism and adventures; movies and recorded video and live events. “I think this is where our customers and partners like Songcheng — all these companies believe in this kind of future,” Akmal said. “It’s not because they think it’s cool. Of course they think it’s cool. But they also see all these other trends, like the fact that there’s all this major investment money pouring in and all the major companies — from Microsoft to Google to Facebook and Apple — all investing in this perceptual computing wave that’s coming our way. “So I think for us, we see that and say that for all of that to be successful, people are going to want something cool to do. They’re going to want something interesting to use their hardware for. And that’s where content and technology tools will help enable our mission of helping our partners bring their content libraries and brands onto these devices.” Another important point to note: forget the video game console war between Sega-Nintendo or Xbox-PS4. Same with iOS vs. Android. The Spaces team decided that there’s enough of a multiplicity of VR devices — and not, Akmal argues, likely to be one dominant platform or winner — that made now the right time to dip their toe in the water and formally launch their own company. “If you’re a media and entertainment company, these discussions started happening 12 months ago,” Herman said. “Like, every large media and entertainment company 12 months ago started having these discussions, like ‘We have to have a 360-video/VR strategy because our competitors are doing it.’ Kind of like the early mobile era. They didn’t necessarily realize why they were doing it, they just realized the market was going in a certain way and they have to do it. It’s going to take a little longer for it to reach something like your neighborhood pizza place, but I don’t think it’s going to take as long as people think.”

Microsoft pays woman $10,000 for auto-upgrading her PC to Windows 10

Windows 10 auto-upgrades are like a sick, cruel joke being played on us by this point. Most stories that start with "my Windows 10 PC auto-upgraded" tend to end with "and then all my data was lost," but this particular version has a happy ending, because it involves Microsoft paying out a lot of money. A California woman has won $10,000 from Microsoft, after the tech giant gave up challenging a court case. Teri Goldstein alleges that after her computer was upgraded to Windows 10, it became slow and unreliable. DON'T MISS:  Leaked iPhone 7 photos point to intriguing new camera design “I had never heard of Windows 10,” Goldstein said. “Nobody ever asked me if I wanted to update.” Goldstein subsequently took Microsoft to court, suing for lost wages and the cost of a new computer (running OS X, I hope). Goldstein won the initial court case, and although Microsoft initially appealed, it just dropped that case. So, Goldstein should be seeing a $10,000 check show up from Microsoft sometime soon. In a statement to the  Seattle Times,  Microsoft said that "“we’re continuing to listen to customer feedback and evolve the upgrade experience based on their feedback.” As well as being a great Monday morning story of justice, the ruling has to be worrying for Microsoft. Ever since Windows 10 upgrades became more pushy ( bordering on "malware" in some cases ), horror stories of Windows 10 upgrades gone wrong have been doing the rounds of the internet. If even a tenth of affected customers can get a payout on the level of Tori Goldstein, this might be the most costly software update in history.

German who held Swiss boy investigated for sexual abuse

BERLIN (AP) — German prosecutors say they are investigating a man on suspicion of kidnapping, sexual abuse and possession of child pornography after police found a missing 12-year-old Swiss boy at his home.

China moves closer to adopting controversial cybersecurity law

The Google logo is seen on the top of its China headquarters building, behind a road surveillance camera in Beijing China moved closer on Monday to adopting a controversial cybersecurity law, after parliament held a second reading of the draft rules, which carry significant consequences for domestic and foreign business and threaten greater censorship. China enforces widespread controls over the internet that it has sought to codify in law, and Chinese laws often go through multiple readings and drafts before they are adopted. The draft, presented before the standing committee of the National People's Congress, requires network operators to comply with social morals and accept the supervision of the government and public, official news agency Xinhua said.


Bangladesh central bank ends FireEye investigation into cyber heist

Commuters pass by the front of the Bangladesh central bank building in Dhaka Bangladesh's central bank has ended a contract with U.S. cyber security firm FireEye to investigate February's online theft of $81 million, turning down a proposal to extend the agreement, a senior official said on Monday. More than four months after hackers broke into the computer systems of Bangladesh Bank and transferred money from its account at the Federal Reserve Bank of New York, investigators in Bangladesh and the United States are still trying to identify them. FireEye's Mandiant division had asked for 570 hours of additional work to complete its investigation into the biggest cyber heist in history, sources at the bank had said earlier.


Don’t fall prey to this clever piracy extortion scam

For as detestable as they are, scammers are undeniably clever and resourceful. In the most recent example which highlights the lengths to which scammers will go to swindle people out of the hard-earned money, Torrent Freak directs us to a new phishing scheme where ISPs are the primary target. DON'T MISS:  iPhone 7 will be Apple’s riskiest iPhone release yet According to the report, an individual or group of individuals are masquerading as representatives from IP Echelon, the IP tracking arm of Lionsgate. These malicious actors are reaching out to ISPs with takedown notices which are then passed along to consumers, and bundled with such notices are fines which users are encouraged to pay in order to avoid legal proceedings. And because the consumer sees correspondence from their official ISP, they assume that it is 100% legitimate: TorrentFreak was alerted to a takedown notice Lionsgate purportedly sent to a Cox subscriber, for allegedly downloading a pirated copy of the movie Allegiant. Under threat of a lawsuit, the subscriber was asked to pay a $150 settlement fee. ... For a phishing scam the fake DMCA notice does its job well. At first sight the email appears to be legit, and for Cox Communications it was real enough to forward it to their customers. The report notes that U.S. law enforcement agencies are already looking into the matter. In the meantime, you should independently reach out to the legitimate rightsholder if you receive such a notice, rather than just paying up directly.

HTC’s LG Nexus 5X successor will not kill the headphone jack

There’s much ado about a certain headphone jack these days. The iPhone 7 is expected to ditch the standard 3.5mm port, just like Motorola’s 2016 flagship devices that were announced a few weeks ago . But not all phones will stop supporting the audio standard, and at least one of the two upcoming HTC-made Nexus devices is rumored to have a headphone jack. In fact, a new leak gives us a preview of the rumored hardware of the smaller 2016 HTC Nexus handset. DON’T MISS: Galaxy Note 7 shaping up to be Samsung’s most powerful smartphone yet A trusted source shared with Android Police the supposed specs of the HTC Sailfish, which is the codename of the 5-inch Nexus handset made by the Taiwanese handset maker this year. HTC is rumored to have partnered with Google to launch two distinct Nexus devices this year , likely the successors of the LG Nexus 5X and the Huawei 6P. The HTC Sailfish will reportedly feature a 5-inch Full HD display, 64-bit 2.0GHz quad-core processor, 4GB of RAM, 32GB of storage, 12-megapixel rear camera, 8-megapixel front camera, Bluetooth 4.2, rear fingerprint reader, USB-C port, at least one speaker on the bottom, and the headphone jack on top. It’s not clear at this time what type of mobile processor the HTC Nexus will get, whether the phone will have any other storage versions, or whether it’ll have dual speakers on the bottom. But the headphone jack is explicitly mentioned. Information regarding pricing and release dates has not been leaked, and there are no images available for the handset. The specs for the HTC Marlin Nexus handset have not leaked.

DOJ's refusal to turn over code complicates child porn cases

SEATTLE (AP) — The Justice Department's refusal to disclose information about a software weakness it exploited during a major child pornography investigation last year is complicating some of its prosecutions arising from the bust.

Clinton failed to hand over key email to State Department

FILE - In this March 12, 2012 file photo, then-Secretary of State Hillary Rodham Clinton checks her mobile phone after her address to the Security Council at United Nations headquarters. Newly released emails show State Department staffers wrestled in December 2010 over a serious technical problem with then-Secretary of State Hillary Clinton's home email server. They temporarily disabled security features, which left the server more vulnerable to hackers. Weeks later, hackers attacked the server so seriously it was shut down. (AP Photo/Richard Drew, File) WASHINGTON (AP) — Former Secretary Hillary Clinton failed to turn over a copy of a key message involving problems caused by her use of a private homebrew email server, the State Department confirmed Thursday. The disclosure makes it unclear what other work-related emails may have been deleted by the presumptive Democratic presidential nominee.


FBI did not need warrant to hack child porn suspect's computer -court

The FBI did not need a search warrant to hack a suspect's computer during an investigation of a large child pornography website, a U.S. judge has ruled, in a decision one group of private advocates called "dangerously flawed." In a decision unsealed on Thursday, U.S. District Judge Henry Morgan in Newport News, Virginia, rejected a bid to suppress evidence against Edward Matish, one of at least 137 defendants charged in the probe of the website Playpen. Morgan noted the widespread nature of hacking today, and compared the hacking of Matish's computer to a police officer looking through someone's broken window blinds, which the Supreme Court has said does not violate the U.S. Constitution. As a result, he said, a computer normally afforded protection in other circumstances against unreasonable searches "is not protected from Government actors who take advantage of an easily broken system to peer into a user's computer." The ruling drew sharp criticism from Mark Rumold, a senior staff attorney Electronic Frontier Foundation, who in a blog post called the decision "dangerously flawed." "To say the least, the decision is bad news for privacy," he wrote.

Banks are killing the password, and they can thank the iPhone for that

Many distinct entities are looking to kill the password, or replace it with better, more secure ways of logging into several online services. Banks are among them, and it’s easy to understand why. They want to protect their money. In light of the many security breaches that have put at risk the identities and online assets of millions of users, banks are encouraging customers to sign up for in-app biometric authentication methods. Scanning a fingerprint, the eye, or recording voice is a lot easier, and more secure, than logging into online banking services using credentials that hackers can steal or social engineer. And the iPhone is a big reason why banks are looking to kill the password. DON’T MISS: Galaxy Note 7 shaping up to be Samsung’s most powerful smartphone yet In an extensive piece, The New York Times explains the various password alternatives banks use, all related to a certain extent to biometrics. Bank of America, JPMorgan Chase, and Wells Fargo have millions of customers who log into their bank accounts using fingerprints on mobile phones, a feature iPhone introduced with the iPhone 5s, and which later became an integral part of the Apple Pay wireless payments feature. Apple equipped smartphones with fingerprint sensors all the way back to 2013, and many competitors followed suit. A year later, Apple opened Touch ID to developers and launched Apple Pay. However, it’s only recently that banks have released apps that can take advantage of the feature. Other biometrics used include eye scans (Wells Fargo), voice (Citigroup), and facial contours (USAA). It’s important to note that banks are worried that regular username and password logins aren’t secure because of all the many breaches in the last few years that allowed hackers to steal millions of credentials for various services as well as other identifiable information such as social security numbers. Financial institutions have toyed for years, with the idea of adding biometric-based security layers to customer accounts but the available technology was cumbersome and expensive. The iPhone and other devices solved that problem, making smartphones practically ubiquitous. Smartphones are advanced enough to let apps read fingerprints, scan eyes, and record voice in crystal clear quality. Also, smartphones also act as a second layer of protection. “If you have your phone and you are authenticating with your fingerprint, it is very likely you,” Twin Mill founder and biometrics security expert Samir Nanavati told the Times . The problem with biometric-based logins is that customers have to agree to make fingerprints, eye scans, and voice accessible by banks. And there’s always the theoretical possibility that clever hackers might find ways to compromise this type of security as well. But banks to not store actual fingerprints or eye patterns. Instead, they’re keeping templates made of hard-to-predict numerical sequences. Other safeguards are also in place, including voice prompts that ensure the user isn’t playing a voice recording to log in. Eye-scanning apps tell users to blink and/or move the eyes to avoid someone using a photo to log into an account. Wells Fargo teamed up with EyeVerify, whose technology creates a maps of the veins in the whites of the eye. In addition to securing accounts better than passwords, biometrics can also transform the entire banking experience, making it faster than before. However, while logins are almost instant, certain operations, like transferring funds, might still require good-old passwords, at least for the time being. The Times ’ full article on the matter is worth a read and it’s available at the source link.

Bankruptcy filing by Brazil's Oi rattles global supply chain

By Brad Haynes and Ana Mano SAO PAULO (Reuters) - Brazil's biggest bankruptcy filing ever is sending shockwaves far beyond the recession-hit country's borders as operator Oi SA seeks creditor protection from global telecoms suppliers and export banks around the world. Oi is seeking protection on over 500 million reais ($150 million) of accounts payable to international providers from Nokia Corp and Ericsson to IBM Corp and Alcatel-Lucent SA, according to court documents reviewed by Reuters. The biggest Brazilian fixed-line carrier also owes about $1 billion to foreign development banks in China, Finland, Canada and Germany, which encouraged exports to Brazil during a recent surge in spending on wireless and broadband networks.

Google’s two biggest partners are both working toward ditching Android

Today, Google's Android platform and Apple's iOS platform dominate the mobile landscape. It's difficult to imagine that ever changing considering how far behind other platforms are at this point, but people said the same thing more than a decade ago when operating systems like Symbian and Windows Mobile ruled the world. Things change and what goes up must come down. What's interesting, however, is that major Android vendors are already starting to prepare for life after Android despite the platform's strong position at the moment. MUST READ:  Why the boring iPhone 7 is the smartest thing Apple has done in years According to market research firm Gartner, Android's worldwide smartphone market share was 84.1% in the first quarter of 2016. The next closest platform was iOS at just 14.8%, which was down from 17.9% in the same quarter a year earlier. No other mobile platform had a market share that even reached the single digits of a percent — Microsoft's Windows Mobile/Phone was closest at a pathetic 0.7% In other words, it's Android's world and we just live in it. Despite Android's firm grasp on the smartphone and wider mobile markets, the platforms biggest partners are also working toward someday abandoning the platform. Samsung, the world's biggest Android vendor by a massive margin, has developed its own open source Tizen operating system and it sells phone models that run Tizen in a few regions. Now, a new report reveals that Huawei is following suit. Huawei was the third-largest smartphone vendor in the world in the first quarter of the year, with estimated handset shipments that totaled 28.7 million units. According to The Information , Huawei has a team of engineers that is currently beginning to build a new mobile operating system. Details are scarce for the time being but the report says that this small team is based in Scandinavia and it includes some former Nokia engineers. Hopefully it's not the same team that built MeeGo. This is absolutely something that Google needs to keep an eye on. The company's two biggest Android partners are now both taking steps to dial back their reliance on Google's mobile platform, and perhaps someday abandon it entirely.

Emails: State Dept. scrambled on trouble on Clinton's server

FILE - In this March 12, 2012 file photo, then-Secretary of State Hillary Rodham Clinton checks her mobile phone after her address to the Security Council at United Nations headquarters. Newly released emails show State Department staffers wrestled in December 2010 over a serious technical problem with then-Secretary of State Hillary Clinton's home email server. They temporarily disabled security features, which left the server more vulnerable to hackers. Weeks later, hackers attacked the server so seriously it was shut down. (AP Photo/Richard Drew, File) WASHINGTON (AP) — State Department staffers wrestled for weeks in December 2010 over a serious technical problem that affected emails from then-Secretary Hillary Clinton's home email server, causing them to temporarily disable security features on the government's own systems, according to emails released Wednesday.


U.S. SEC accuses U.K. man of hacking, fraudulent trades

The headquarters of the U.S. Securities and Exchange Commission are seen in Washington By Jonathan Stempel NEW YORK (Reuters) - The U.S. Securities and Exchange Commission sued a U.K. man it said hacked into online brokerage accounts of several U.S. investors, placed unauthorized stock trades, and within minutes made profitable trades in the same stocks in his own account. A federal judge issued an emergency order freezing assets belonging to the defendant, Idris Dayo Mustapha, the SEC said on Wednesday, shortly after filing its civil lawsuit with the U.S. District Court in Manhattan. It was unclear whether Mustapha had a lawyer.


Bangladesh unlikely to extend FireEye contract for heist probe

FireEye logo is seen outside the company's offices in Milpitas, California By Sanjeev Miglani and Serajul Quadir DHAKA (Reuters) - Bangladesh's central bank is unlikely to extend the contract of U.S. cyber security firm FireEye to investigate the electronic theft of $81 million of its money, sources at the bank said on Wednesday, citing high costs as one of the factors. The move comes as law enforcement in Bangladesh and the United States have reported little progress in identifying the criminals more than four months after one of the biggest cyber heists to date. FireEye's Mandiant forensics division was hired by Bangladesh Bank weeks after the cyber heist in early February.


World's Smartest Companies: The Chinese Are Rising

China’s companies are getting smarter, beating their Japanese and Korean counterparts and catching up with their American counterparts.  According to recent MIT Technology Review’s  annual listing of the ...

Reports claims Samsung’s Galaxy S8 will feature a 4K display and a (shocker) dual camera

We're still several months away from the unveiling of Samsung's Galaxy S8, but rumors are already cropping up on what seems like a weekly basis. Earlier this month, Samsung showed off a 5.5-inch 4K UHD display at a trade show in California, leading some to believe that it would be the display featured on the company's next flagship smartphone. Now Chinese tech blog NetEase is making a similar claim, providing even more credence to the rumor. DON'T MISS:  A week with iOS 10: It’s fantastic, and I’m bored Although 4K may sound like overkill for a smartphone display, it could be invaluable for smooth virtual reality content. Samsung has already made strides in that field with the launch of the Gear VR headset, but if the quality of the content is ever going to come close to that of the Oculus Rift or the HTC Vive, Samsung needs an incredibly sharp mobile display to work with. As CNET notes , if Samsung were to go with a 4K display, it would put an enormous strain on the battery, forcing the company to use a higher-capacity battery in the Galaxy S8. Might this affect the overall design of the phone? Later in the same report, NetEase claims that, much like the iPhone 7 Plus , the Galaxy S8 will feature a dual-lens rear camera. There appears to be even less evidence backing up this tidbit than there is for the 4K display, but it wouldn't be a stretch for Samsung to follow the likes of LG and Huawei in 2017, especially if Apple is going to include a dual camera on its own high-end iPhone 7 Plus.

OnePlus 3 vs. Galaxy S7 edge speed test, round 2: What happens when 6GB of RAM is unleashed?

The OnePlus 3 might be one of the best smartphones you can buy without parting with too much cash, but it’s not necessarily the fastest one. Recent real-life speed tests showed that the OnePlus flagship lags behind the Galaxy S7 edge and the iPhone 6s even though it has an outrageous amount of RAM. The OnePlus 3 packs 6GB of RAM, compared to 4GB for the Galaxy S7 edge and 2GB for the newest iPhone. OnePlus addressed the RAM management following these tests, saying that the phone doesn’t keep too many apps in memory to conserve battery life. That said, some intrepid hackers came up with an unofficial "fix" for the issue, prompting a second speed test comparison. DON’T MISS:  This crazy iPhone 6s scam on Amazon isn’t what you think The same C4ETech channel that conducted the previous tests performed this “revenge” comparison and the results are quite intriguing. The Galaxy S7 edge’s Samsung processor is speedier than the Qualcomm Snapdragon 820 in the OnePlus 3, but the RAM performance is clearly now superior on the OnePlus phone. The Galaxy S7 edge might still be speedier at opening apps, but the OnePlus 3 seems to load them from memory much faster when the 6GB of RAM is unleashed. Compared to Apple's iPhone 6s, the OnePlus 3 is still slower at opening apps but the RAM fix makes it even faster at loading apps from memory than the iPhone, something that didn’t happen in the first test . That said, it should be noted that the OnePlus 3 in this test is rooted and running custom firmware that "repairs" the default RAM management. OnePlus is yet to roll out similar firmware for the phone, and it might never make these changes in order to conserve battery life. The OnePlus 3 does have a large 3,000 mAh battery and comes with fast-charging technology, so why is OnePlus so worried about battery life that it decided to throttle RAM performance? The full video is embedded below. https://www.youtube.com/watch?v=np3wfpTq_2Y

Proposals to curb online speech viewed as threat to open internet

Protesters from the Anonymous India group of hackers wear Guy Fawkes masks as they protest against laws they say gives the government control over censorship of internet usage in Mumbai By Yasmeen Abutaleb and Alastair Sharp SAN FRANCISCO/ TORONTO (Reuters) - At least a dozen countries are considering or have enacted laws restricting online speech, a trend that is alarming policymakers and others who see the internet as a valuable medium for debate and expression. Such curbs are called out as a threat to the open internet in a report on internet governance set to be released today at an Organization for Economic Cooperation and Development meeting in Cancun, Mexico. The report, reviewed by Reuters, warns of dangers for the global internet, including intrusive surveillance, rising cybercrime and fragmentation as governments exert control of online content.


Chinese economic cyber-espionage plummets in U.S.: experts

A hand is silhouetted in front of a computer screen in this picture illustration taken in Berlin By Joseph Menn and Jim Finkle SAN FRANCISCO (Reuters) - The Chinese government appears to be abiding by its September pledge to stop supporting the hacking of American trade secrets to help companies there compete, private U.S. security executives and government advisors said on Monday. FireEye Inc, the U.S. network security company best known for fighting sophisticated Chinese hacking, said in a report released late Monday that breaches attributed to China-based groups had plunged by 90 percent in the past two years. FireEye's Mandiant unit in 2013 famously blamed a specific unit of China's Peoples Liberation Army for a major campaign of economic espionage.