Andrew Thomas joins us from NEXA and we are talking about the burning tech issues of the day. SNAP glasses, need them.
Alibaba need to be ordering.
Facebook and listening to us, could be a good thing if there is an ounce of truth to the theory.
A great hour!
Click for the podcast!
The Notes.
Snapchat advertising 1.9 million users in the UAE
Someone has already cracked the iphone x
We talk alot about amazon and sometimes forget the giant that is ali baba
Ouch 40 million, thats an expensive mistake!
Iphone upgrades this is you dude!
Gave it away at CreativeMornings! Thanks SONY!
A flagship
SONY Experia XZ1 1849 dhs
-autofocus bursts 100 in 10sec
-3d modeling
One feature exclusive to the XZ1 is the all-new autofocus burst mode. This allows you to capture up to 100 photos in 10 seconds, with autofocus tracking your subject throughout.
Form, Screen, Sound, Oreo!
Intuitive
LOVE it and so does Richard who wants to go back!
- 19 MP Motion Eye™ camera with Super slow motionMore about camera
- 5.2” Full-HD HDR displayMore about display
- New 3D CreatorMore about 3D Creator
- IP65/68 water resistant2 designMore about design
- Qualcomm® Snapdragon™ 835 Mobile PlatformMore about performance
SIM CAPABILITY
Single SIM, Dual SIM, Nano SIM
MEMORY AND STORAGE
4GB RAM, 64GB UFS internal memory3, microSDXC support (up to 256GB)
WEIGHT
156g
DIMENSIONS
148 x 73 x 7.4 mm
DISPLAY
5.2" FHD HDR Display, TRILUMINOS™ Display for mobile, X-Reality™ for mobile, Dynamic Contrast Enhancer, sRGB 138%
CAMERA
19MP Motion Eye™ camera , 1/ 2.3” Exmor RS™ for mobile memory-stacked sensor, 960 fps Super slow motion video, Predictive Capture (motion / smile), Autofocus burst, 13MP front camera
ON THE INSIDE
Qualcomm® Snapdragon™ 835 Mobile Platform
A little emoji fun!
Remember what your Google Drive looked like when you first started using it? It was neat, organized, and free of clutter. As you began to use Drive more frequently, you probably started creating folders and perhaps you are now looking for a way to organize them. In addition to color coding your files, you can add emojis and other symbols to your folders to help you identify them quickly and easily.
The first thing you need to do is open your Drive and identify a folder that you would like to add a symbol or emoji to. Make sure the symbol you select is something that helps you remember the contents of the folder. Maybe you use a snowflake for activities that pertain to winter or a test tube for chemistry lessons. All that matters is that your icon makes sense to you. Once you have selected your folder, navigate to one of the sites below, select the symbol you want to use, copy it, edit the name of the folder then paste the icon into the box where the folder name appears.
Symbol and emoji sites:
This is a cool learning tool could be good for the sales team in the office!
OK this is cool!
Just need!
iPhone X
Apple is working on a software fix for a mystery bug that causes the iPhone X's display to become unresponsive in cold weather.
The fix is coming in response to complaints that the screen doesn't detect touches when the device is in cold weather.
One user on Reddit who claimed to be using an iPhone X in -4F (-20C) temperatures reported that the screen only recognized 20 percent of touches, but that locking and then unlocking the screen fixed the problem.
Another user from Minneapolis, where it was 7F (-14C), reported similar issues and confirmed that locking and unlocking the phone solved the issue.
"Key taps take multiple taps to register and it was pretty annoying. I'll try the lock-unlock trick to see if it works," the user wrote.
Other users noticed that the issue arises when moving from an indoor environment to a cold outdoor environment.
Apple has acknowledged the issue and says it surfaces when the iPhone X faces a rapid change in temperature. The software update suggests the problem is not an issue with the iPhone X's OLED display.
Apps using our microphones to spy? Like FB? Really?
The theory that Facebook is spying on us using the microphones in our devices is practically ancient in technological history.
Most readers can say they have either heard stories or encountered advertisements that were eerily pertinent to a niche topic they were discussing with a friend – for example, a menstrual pain relief device or Minnie Mouse.
The tech podcast Reply All recently released an entire episode dedicated to finding out whether the giant was indeed using the microphones in our devices to gather nuggets of data about us.
Host PJ Vogt put the question to Twitter and was flooded with anecdotal responses from people who firmly believed the site was listening in.
Reply All is taking phone calls today. Call us if you believe that Facebook uses your mic to spy on you for ad reasons. 3PM ET. 917-267-5180
I was talking to my friend about how I need a phone holder in the bathroom bcause our counter is small and I got this ad an hour later pic.twitter.com/0GB5NH2kkc
During the episode, co-host Alex Goldman tried to convince people who believed in the microphone theory that there were other ways the company could have harvested that data, but he was unable to do so.
In response to the episode, in which Facebook flatly denied it uses the microphone for surveillance purposes, Rob Goldman of Facebook spoke out.
Phishing is this something you are thinking about? You should it may be bigger than hacking!
Google's research sets out hijacking victims' email providers and geographic locations.
Image: Google
Google has released the results of a year-long investigation into Gmail account hijacking, which finds that phishing is far riskier for users than data breaches, because of the additional information phishers collect.
Hardly a week goes by without a new data breach being discovered, exposing victims to account hijacking if they used the same username and password on multiple online accounts.
While data breaches are bad news for internet users, Google's study finds that phishing is a much more dangerous threat to its users in terms of account hijacking.
In partnership with the University of California Berkeley, Google pointed its web crawlers at public hacker forums and paste sites to look for potential credential leaks. They also accessed several private hacker forums.
The blackhat search turned up 1.9 billion credentials exposed by data breaches affecting users of MySpace, Adobe, LinkedIn, Dropbox and several dating sites. The vast majority of the credentials found were being traded on private forums.
Despite the huge numbers, only seven percent of credentials exposed in data breaches match the password currently being used by its billion Gmail users, whereas a quarter of 3.8 million credentials exposed in phishing attacks match the current Google password.
The study finds that victims of phishing are 400 times more likely to have their account hijacked than a random Google user, a figure that falls to 10 times for victims of a data breach. The difference is due to the type of information that so-called phishing kits collect.
Phishing kits contain prepackaged fake login pages for popular and valuable sites, such as Gmail, Yahoo, Hotmail, and online banking. They're often uploaded to compromised websites, and automatically email captured credentials to the attacker's account.
Phishing kits enable a higher rate of account hijacking because they capture the same details that Google uses in its risk assessment when users login, such as victim's geolocation, secret questions, phone numbers, and device identifiers.
The researchers find that 83 percent of 10,000 phishing kits collect victims' geolocation, while 18 percent collect phone numbers. By comparison, fewer than 0.1 percent of keyloggers collect phone details and secret questions.
The study finds that 41 percent of phishing kit users are from Nigeria based on the geolocation of the last sign-in to a Gmail account used to receive stolen credentials. The next biggest group is US phishing-kit users, who account for 11 percent.
Interestingly, the researchers found that 72 percent of the phishing kits use a Gmail account to send captured credentials to the attacker. By comparison, only 6.8 percent used Yahoo, the second most popular service for phishing-kit operators. The phishing kits sent were sending 234,887 potentially valid credentials every week.
Gmail users also represent the largest group of phishing victims, accounting for 27 percent of the total in the study. Yahoo phishing victims follow at 12 percent. However, Yahoo and Hotmail users are the largest group of leaked credential victims, both representing 19 percent, followed by Gmail at 12 percent.
They also found most victims of phishing were from the US, whereas most victims of keyloggers were from Brazil.
No comments:
Post a Comment