Friday, January 22, 2016

Google Paid Apple $1 Billion To Remain The Default Search Engine On iPhone

Google Paid Apple $1 Billion To Remain The Default Search Engine On iPhone
Google is the default search engine on iPhones and it’s not because Apple considers Google the best search engine. It’s the result of a high-profile $1 billion deal between Google and Apple bosses.

This unknown fact was recently unmasked during a court hearing regarding Oracle’s lawsuit against Google over the Java copyright dispute. The documents produced in the court on January 14 showed that Google paid Apple $1 billion in 2014 to remain the default search engine on the iPhone, according to a report from Bloomberg.

The report indicated that Google agreed to share its revenue coming from iPhones. “At one point in time the revenue share [between Apple and Google] was 34 percent,” a court heard. However, the specific details of this deal are still unclear and we don’t know that 34 percent share belonged which company.

This shows the extreme lengths Google can go to establish itself as the default search engine on the world’s most popular smartphone. The report also reveals the massive amount of money Apple makes from Google’s advertisement model — something Apple CEO Tim Cook has criticized at numerous public platforms.

In the past, both companies have tried hard to keep the details of this deal a secret, calling it “highly sensitive”. “The specific financial terms of Google’s agreement with Apple are highly sensitive to both Google and Apple. Both Apple and Google have always treated this information as extremely confidential,” Bloomberg reports a filing from Google.

In 2014, Marissa Mayer, the CEO of Yahoo, tried to get Yahoo to be the default search engine on iPhone, but she didn’t succeed. Notably, Apple has also used Microsoft’s Bing for assisting Siri in iOS for some time. But, that didn’t last long, thanks to the super heavy $1 billion from Larry Page and Sergey Brin.

Source: fossbytes.com

Wednesday, January 20, 2016

Google Wants To Be Your Best Friend By Writing Your Next Facebook Status


Writing great social media posts to get tons of likes and shares is an art. It includes looking for latest trends and analyzing the user behavior to craft the best possible lines and post a perfect picture.

To help you in this process, Google wants to become your new best friend by writing your next Facebook status. This has been revealed in a new patent that was awarded to the company yesterday.

In this patent, Google has highlighted a new system named “Encouraging Conversation In A Social Network” to present suggestions for sharing links and posts by reading your email. For example – if your receive an email from a friend about a new song, after clicking the link Google would open a tiny pop up that will suggest ways to share the same on Facebook, Twitter, and other social networks.

In case your receive an email about the confirmation of your Saturday night movie ticket, it’s possible that on Sunday morning, Google will suggest you some possible status updates related to the movie.

How will Google write your next post on a social network?

The patent documents reveal that it’s a method to recommend social activity data to the user. There is a set of instructions that determine the topics associated with the message; determine knowledge data; determine social activity data of a user; and determine graphical interface data for displaying the social activity data associated with the message.

In simpler words, the system studies the data in the message and the social behavior of the user to provide a relevant post suggestion with right hashtags. The document mentions that a social conversation can also be started by determining one or more users connected with the first user of email.

The patent gives the users a choice to select the number of people — entire social network, a selected group of friends, a particular person — and share the relevant links with them.

If integrated with multiple social networks, this feature can help the people to post messages on the go. However, there isn’t any confirmed news that Google will soon integrate this social activity feature into emails anytime soon.

Are you going to trust Google to write your status updates on your social network? Share your views in the comments below.

Source: fossBytes.

These Are The 10 Best Jobs In Tech Field To Apply For In 2016

If you are bored from your current tech job and looking to switch your job, remember this thing — some tech job are better than others. All you need is correct data at the right time to make the perfect decision. The job hunting website Glassdoor is here to help you with its 2016 list of the best jobs. Civil engineer, mechanical engineers, and lawyers all have disappeared from this list. While the website has prepared a list of the top 25 jobs for 2016, out of those, we have picked the top 10 jobs in technology that you need to look for this year. The list mentions the average salary, number of job openings and scores out of five. Let’s take a look:

10 best tech jobs you should apply for in 2016:

1. Data Scientist

Also called the ‘sexiest job of the 21st century’, the data scientist job profile is something that needs a wide range of skills including mathematical, statistical, predictive modeling, and business strategy skills. Their job includes collecting and analyzing ‘big data’ to present the hidden business insights.
  • Number of Job Openings: 1,736
  • Median Base Salary: $116,840
  • Career Opportunities Rating: 4.1

2. Solutions Architect

Solutions architect is a person who is responsible for converting the requirements into the architecture of that solution and describing it using a set of design architecture standards.
  • Number of Job Openings: 2,906
  • Median Base Salary: $119,500
  • Career Opportunities Rating: 3.5

3. Mobile Developer

The software requirements are converted into programmable code and programs by a mobile developer. Usually, a mobile developer is skilled in one specific field like mobile development, graphics software, business software etc.
  • Number of Job Openings: 2,251
  • Median Base Salary: $90,000
  • Career Opportunities Rating: 3.8

4. Product Manager

A product manager finds an intersection between technology, business, and user experience to discover a valuable and feasible product. This person oversees the projects and their progress.
  • Number of Job Openings: 6,607
  • Median Base Salary: $106,680
  • Career Opportunities Rating: 3.3

5. Software Engineer

A software engineer is responsible for the complete life-cycle of a new or modified version of a software. This person works on everything — research, design, training, application, and support.
  • Number of Job Openings: 49,270
  • Median Base Salary: $95,000
  • Career Opportunities Rating: 3.3

6. Analytics Manager

An analytics manager plays a key role in designing the future strategy of a company. This person generates information based on previous records and performance to arrive at a comprehensive result.
  • Number of Job Openings: 982
  • Median Base Salary: $105,000
  • Career Opportunities Rating: 3.7

7. Software Development Manager

A software manager is often called the ‘man in the middle’. This person deals with software development projects and takes care of various developments, customers, management, and sales aspects.
  • Number of Job Openings: 1,199
  • Median Base Salary: $135,000
  • Career Opportunities Rating: 3.4

8. QA [Quality Assurance] Manager

A QA manager ensures that the end product fulfills the relevant criteria, establishes procedures and certain quality standards.
  • Number of Job Openings: 3,749
  • Median Base Salary: $85,000
  • Career Opportunities Rating: 3.4

9. UX [User Experience] Designer

A UX designer is responsible for the looks and feel of a product. This person explores multiple approaches to arrive at a final solution to ensure that the product provides the best user experience.
  • Number of Job Openings: 863
  • Median Base Salary: $91,800
  • Career Opportunities Rating: 3.6

10. Software Architect

A software architect is a software expert that designs software applications and dictates how the software will be implemented in an enterprise.
  • Number of Job Openings: 653
  • Median Base Salary: $130,000
  • Career Opportunities Rating: 3.4

Source: fossbytes.com

Tuesday, January 19, 2016

Microsoft pledges $1bn in cloud computing resources to benefit nonprofits and universities



Today, Microsoft CEO Satya Nadella announced a new initiative designed to ensure its cloud services, including Azure — a platform designed for building, managing and deploying applications and services — are accessible by those that stand to benefit most from the additional resources, universities and nonprofits.
Recently formed Microsoft Philanthropies will donate the services, measured at fair market value, over the next three years as part of a larger three-part commitment.

The elements of this commitment are:

1. Serving the broad needs of the nonprofit community. The program aims to make Microsoft Cloud Services available to more than 70,000 nonprofits in the next three years.

2. Expanding access to cloud resources for faculty research in universities. Microsoft’s research program would grant free cloud storage and resources to university students and faculty to accelerate research initiatives in science and technology.

3. Reaching new communities with last mile connectivity and cloud services. In a combined effort with Microsoft Business Development, Microsoft Philanthropies will donate access to cloud services and invest in newer, low-cost, last-mile internet access technologies and community training.

Source: thenextweb.com

Google will now let you install App directly from search on your Android Smartphone


Google rolling a feature that allows to install Apps directly from search results

According to Android Police, Google is testing the ability for Android users to install apps directly from search results without opening the Google Play store.

Just like the Play Store, the feature pops up a small authorization window and install button. However, it seems to work only when searching through the Google app for some users and not through the Chrome browser.

For quite some time now, links to the Play Store on Android and to the iOS App Store on mobile Safari for iPhone users have been displayed by Google’s mobile search results and prompting users to install an app, if it had relevant content to the user’s search query. This would be the first time that the users would be able to download and install an app without going through a mobile store.

However, Android Police reports that the feature is not available to everyone and can be expected to roll out slowly.

You can test this yourself by opening the Google app and searching for the name of an app. It will appear at the top of the results with an install button. However, when most people tap it, they are booted into the Play Store. Those with the new feature will see a permission popup message just like they would in the Play Store, then a small Play Store frame appears so that it can be installed.

Once permission is given to install the app, a new Google Play-style overlay would appear, with user acceptance of the app’s permissions and the final, install button. Currently, the feature is only visible on the Google app and not found on Chrome.

Android Police has had reports of this feature working dating back to about a month ago. However, only recently it has started appearing extensively enough.

Last year, Google had introduced app indexing for iOS apps which showed iPod, iPhone, and iPad touch users content from within mobile apps straight from Google Search. However, it is unclear if Google will be able to roll out similar install feature for users via Apple’s App Store.

Source: techworm

Its official, 123456 is still the most widely used password followed by ‘password’


People still trust “123456” and “Password” as their passwords even after so many cyber attacks.

Seems like Internet users have either a very short memory or are not worried about the security. Despite the fact that 2015 saw a record cyber attacks including hackings and data breaches, Internet users are still opting for 123456 as their password. According a new research by SpalshData, many of us are still using dumb passwords like 123456, ‘password’ football and baseball.

SplashData has published its fifth annual list of the most popular passwords used online in North America and Western Europe during the 2015 found that, once again, “123456” and “Password” came out on top as the people’s choice.

SplashData’s report is compiled from millions of leaked passwords revealed during the year. The report also reveals that people use sports and film titles as their passwords because they are easy to remember.

The list of passwords based on popularity and their rank in 2014 is given below :

1.123456 (Unchanged)
2.password (Unchanged)
3.12345678 (Up 1)
4.qwerty (Up 1)
5.12345 (Down 2)
6.123456789 (Unchanged)
7.football (Up 3)
8.1234 (Down 1)
9.1234567 (Up 2)
10.baseball (Down 2)

As said about, films play a major roll in users deciding on their passwords, The list suggests that the newly released Star Wars : The Force Awakens has helped influenced many people’s choice of passwords such as “solo,” “princess” and “starwars.”

The top eight passwords consisted just of numerical characters making it easy for hackers to hack into the user accounts. If the trend continues, the hackers and cyber criminals could have a field day hacking your accounts.

Source: techworm

Monday, January 18, 2016

WhatsApp is ending its annual subscription fees, usage now completely free


WhatsApp’s founder Jan Koum has announced today that the widely-used messaging service is now free to customers. The Facebook-owned company is dropping its subscription service immediately. While it’s only 99 cents per year to use WhatsApp‘s multi-platform messenger app, Koum states that the annual subscription was still a barrier to some users…

Koum says the subscription model “really doesn’t work that well,” and notes that although the fee isn’t high, not everyone has access to credit cards, and so some users aren’t able to sign up, and some can end up being unable to use the service.

The subscription model ends immediately, but it will take a little while to take the built-in payments options from all versions of the app. As a downer, those who have already paid a subscription fee recently won’t get their dollar back.

For those worrying that an end of subscription fees means the app will start using ads to monetize its service, you’ll be glad to know that’s not the case. WhatsApp will find other ways to make money:
Naturally, people might wonder how we plan to keep WhatsApp running without subscription fees and if today’s announcement means we’re introducing third-party ads. The answer is no. Starting this year, we will test tools that allow you to use WhatsApp to communicate with businesses and organizations that you want to hear from. That could mean communicating with your bank about whether a recent transaction was fraudulent, or with an airline about a delayed flight. We all get these messages elsewhere today – through text messages and phone calls – so we want to test new tools to make this easier to do on WhatsApp, while still giving you an experience without third-party ads and spam.
The goal here is clearly to get even more people on to its service. As it stands, WhatsApp is one of the most widely used messaging apps on the planet. Thanks to its ability to run on virtually any mobile platform and remotely from within a desktop browser, there aren’t many places you can’t message friends and family, regardless of where you (or they) are in the world.

As much as it’s a bummer that WhatsApp isn’t refunding recent subscriptions, it’s great to see the company look for ways other than built-in pop-up ads to monetize the service.

Source: 9to5google.com

Sunday, January 17, 2016

Hyatt names hotels hit by payment information malware


The Hyatt hotel chain has posted a global list of hotels hit by malware that was found on its customer payments system last year.

The list includes Hyatt premises in Canada, the US, the UK, Jordan, Chile and Indonesia and involves almost half of its properties.

The firm is offering one year's free protection to people who used their cards in one of the compromised hotels.

The infection took place between August and December last year.

The Chicago-based Hyatt group has 627 properties in its portfolio. It said 250 hotels, all of which it manages directly, had been infected.

In a statement, Hyatt's global president of operations Chuck Floyd said that "unauthorised access" to payment card information - including the names of cardholders, card numbers and expiry dates - had been detected primarily in restaurants but also at spas, golf shops, parking and some front desks inside the hotel chain.

"We encourage you to remain vigilant and to review your payment card account statements closely," he said, adding that cards could now be used "with confidence" inside the hotel chain following the investigation.

Although he said the company had "worked quickly" with cybersecurity experts and law enforcement to address the issue, the infection appeared to have gone unnoticed for about four months.

The period of risk for affected customers was between 30 July and 8 December 2015, Mr Floyd wrote.

Hyatt has now teamed up with a company called CSID, which specialises in identity protection and "fraud restoration" services, to offer one year's free coverage for those whose cards may have been compromised.

Security expert Brian Krebs noted on his blog that the Hilton, Starwood, Mandarin Oriental, White Lodging and the Trump Collection hotels were all hit by payment information breaches last year.

Source:www.bbc.com

Facebook is testing a new browser that will make sure you stay on FB


Facebook testing improved in-app browser that will make you stay on FB

Move over Chrome and Firefox, the all new Facebook browser is coming soon. The social networking giant is testing an improved in-app browser that would allow users input their own URL should they want to check another page without leaving the Facebook app.

Facebook has been long looking to convince the FB users to within its confines by providing all sorts of value added services like chats, messengers etc. However it lacked a full fledged browser that could take on the might of the market leader, Google Chrome and make its users stay on FB even while surfing the web.

The new in-App browser is a step in making that into a reality. Besides the aesthetic shift, a new bar on the bottom tells you how popular a post is, includes back and forward buttons, lets you bookmark pages, and has a menu button which likely includes a few more features too.

The only feature that is missing in the forthcoming Facebook browser is tab support. Apart from that the in-App browser is quite close to approximating a full-fledged app. Facebook hopes that once it gets the browser right, the Facebook app could essentially become a self-contained ecosystem of its own, it added.

Right now the browser is only made available to a small subset of users (iOS only), but most public test features end up receiving a wider roll-out a few months later.

Source: techworm.net

Why did Google choose Java as default application programming language for Android


Here are a few reasons why Google chose Java for its Android operating system


Google hit a bullseye with smartphone users when it brought out the first version Android operating system. At that time when Nokia and its proprietary Symbian operating system, ruled the roost in smartphone market, Google brought out the first version of Android in 2007. Today Android smartphones rule the world with over 85 percent of the smartphones in the world running on various versions of Android operating system.

Android’s source code is released by Google under open source licenses, although most Android devices ultimately ship with a combination of open source and proprietary software, including proprietary software required for accessing Google services.

Android

Android is based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android’s user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input.

The Android Apps and games, which are so popular among smartphone users are compiled by developers using the Android software development kit (SDK). This Android SDK is compiled using Java programming language. So, why Java?

So why did Google choose Java over other programming languages

The basic advantages of having Java programming language for Android SDKs is given below :
  1. Java is a known language, developers know it and don’t have to learn it. Java has yet again emerged as the world’s most popular programming language. Also there are lots of engineers who specialise in Java making it easier for them to compile Apps and Games.
  2. It’s harder to shoot yourself with Java than with C/C++ code since it has no pointer arithmetic.
  3. It runs in a VM, so no need to recompile it for every phone out there and Java is easy to secure. This is Java’s very important feature. Running on a VM (thus no recompiling) is a huge plus. Also, it easily separates processes from each other, preventing a rogue application from destroying your phone or interfering with other applications. Every App has assigned its own address. All addresses are translated by MMU. This provides base level security to the App and the Android ecosystem by preventing leakages.
  4. As said in point number 1 above, since Java is the most popular programming language, a large number of development tools are available for developers. Java has huge open source support, with many libraries and tools are available to make developers life easier.
  5. Several mobile phones already used Java ME, so Java was known in the mobile industry and the engineers.
  6. The speed difference is not an issue for most applications; if it was you should code in low-level language
  7. Also Android as a operating system runs on many different hardware platforms including smart TVs, Android wear etc. Given that almost all VMs JIT compile down to native code, raw code speed is often comparable with native speed. A lot of delays attributed to higher-level languages are less to do with the VM overhead than other factors (a complex object runtime, ‘safety’ checking memory access by doing bounds checking, etc).
  8. Java allows developers to create sandbox applications, and create a better security model so that one bad App can’t take down your entire OS.
In addition to above points, at the time of development of first version of Android, the available languages like Go and Rust werent exactly popular and quite niche programming languages, so prioritising native languages would’ve meant the Android development team going with C or C++.

Go was used in the earlier versions of Android and found to have its limitations. Rust was smaller still, so betting Android’s whole OS’s development ecosystem on such a niche language would’ve been a bad idea.

Even the most diehard of programmers and coders will agree that C and C++ are notoriously difficult to work with, and even very senior engineers make dangerous mistakes very often. This is the reason, Microsoft chose to develop its on .NET architecture, however developing a separate language for Android would not have been feasible for Google at that time.

Also during the time the first Android version was being worked on, the JVM/CLR languages (i.e. the Java family and the C#/.NET family) were under ownership of Sun and Microsoft respectively. So it would not have been feasible for Google to use its ‘enemies’ programming language. Only after Oracle bought out Java and Google reached an understanding with Oracle that all proprietary issues were resolved.

Java is an absolutely massive ecosystem, and you have an embarrassing wealth of both libraries and tooling available for it, which mitigates how mediocre the language itself is. Where Apple had home field advantage by using Objective C in iOS (with Obj-C being the primary language for OS X development), Google’s choice of Java meant not having to build that ecosystem from scratch.

As seen above, Java was simply the best choice available at the time. Google has never officially commented on why it is using Java for Android SDKs but the above reasons are enough for Google and the Android team to back Java all the way.

Source: techworm.net

NSA is world's best hacker thief, says former director


"We steal other people's stuff in the cyber domain," retired General Michael Hayden said at a cybersecurity conference in Miami Beach.

He then put that in context: Every country's government is spying on other people and governments. America's spies just do it better.

"As a former director of NSA, I like to think we're number one," he said.

Hayden delivered the keynote address at S4X16 conference, which focuses on how modern hackers are increasingly attacking key industrial controls at power plants, factories, and municipal services like water and gas.

The former intelligence official explained how the United States justifies hacking into computers in foreign countries -- and how it draws the line on when it's OK.

"We steal stuff to keep you free and keep you safe," Hayden said. "We do not steal stuff to make you rich. I can think of only four other countries who can say that. They all speak English."

Hayden referred to the United States' four other partners in the "Five Eyes" group of nations: Australia, Canada, New Zealand, the United Kingdom.

For the rest of the world, corporate espionage is a state mission, he said.

"Every other nation-state believes it is legitimate espionage activity to steal intellectual property," he added. "And the Chinese are the poster child for it."

In international politics, this distinction is a fuzzy line. And it's one of the reasons some governments are uneasy about America's massive spying operations.

The most stark example came in October last year, when the European Union's highest court struck down a lucrative, longstanding data-sharing agreement between the United States and Europe. "Safe Harbor" rules ensured privacy-conscious Europeans that American companies like Facebook and Google were guarding their personal information with "adequate protections."

But the European Court of Justice invalidated Safe Harbor. It's main reason? Ex-NSA contractor Edward Snowden exposed the vast extent of the U.S. electronic surveillance.

In an interview, Hayden insisted that the EU's government is wrong. He said American policy draws a line on when it's OK to hack.

"Do we steal economic information? Of course we do: precursor chemicals, dual-use equipment... money laundering. But we do not do it for commercial advantage."

"We don't have any state owned enterprises," he said. "What would I do with it once I stole it? Who would I give it to? Lockheed Martin (LMT) but not Boeing (BA)? Northrop Grumman (NOC), but not Lockheed? It's almost madness."

The key difference is how a nation defines "national security," Hayden explained.

"Other nations' definition of national security is a broader one than what we allow ourselves," he said. "They view economic success as a national security objective. We don't in terms of state espionage."

Source: http://money.cnn.com

‘Bitcoin Has Failed’, Says Lead Developer Who Just Quit


Mike Hearn, a prominent Bitcoin developer, has decided to abandon the project by calling it a failure. He worked on the project for five years and was one of the five senior-most developers.

The Bitcoin community was taken by this announcement and Bitcoin slid by 10 percent. “Despite knowing that bitcoin could fail all along, the now inescapable conclusion that it has failed still saddens me greatly,” Hearn said in his a long post on Medium.

In his blog post, Hearn detailed many reasons that compelled him to take this step — a dying community, lack of improvements in the system, lack of communication, and domination of a minority. Calling Bitcoin an ‘experiment’, he said that like all experiments it was vulnerable to failure.

Bitcoin creator Satoshi Nakamoto chose Hearn and Gavin Andresen as his successor when he stepped aside in 2011. However, from the past few months, Hearn was having a hard time adjusting with other developers over the size of ‘blocks’ in which Bitcoin transactions are processed.

Hearn says that current Bitcoin network will soon run out of capacity as the number of transactions increase.

“The block chain is full. You may wonder how it is possible for what is essentially a series of files to be “full”. The answer is that an entirely artificial capacity cap of one megabyte per block, put in place as a temporary kludge a long time ago, has not been removed and as a result the network’s capacity is now almost completely exhausted,” he writes.

Back in August, Hearn and Andresen released Bitcoin XT — their own version of the current software — that would increase the block size to 8 megabytes, allowing 24 transactions per second. Despite the attacks that stopped this alternative completely, Hearn writes that people are still trying to develop alternatives.

Source: fossbytes

Friday, January 15, 2016

EU Bosses Can Snoop On Your Private Messages At Work


Employers in the European Union can read employees’ private messages sent via online chat and webmail accounts during working hours, EU judges have ruled.

The European Court of Human Rights (ECHR) said that a Romanian employer firm that read a worker’s Yahoo Messenger chats sent while he was at work was within its rights. According to the BBC, the employee, an engineer, “had hoped the court would rule that his employer had breached his right to confidential correspondence when it accessed his messages and subsequently sacked him in 2007.”

The ECHR judges said: “The employer acted within its disciplinary powers since, as the domestic courts found, it had accessed the Yahoo Messenger account on the assumption that the information in question had been related to professional activities and that such access had therefore been legitimate. The court sees no reason to question these findings.”

While there is a very fine line, the employee in this case did access employer owned equipment to transmit the private messages during work hours. The courts did not however elaborate whether in potentially using his own PC or mobile it would have made any difference. The ruling does support that employers are within rights to question usage regardless as it’s reasonable to assume an employee is performing their duties in office hours and not conducting personal affairs.

Employee monitoring is nothing new however. “Employee monitoring” is the act of monitoring employee activity and organisations engage in such activities to track performance, avoid legal liability, protect IP, and address other security concerns. Monitoring of this type does have an explicit impact on employee privacy.

The following uses of employee information are generally considered legal, but all aspects have to be explained up front and made visible to employees and not after the fact. Find needed business information when the employee is not available.
  1. Protect security of proprietary information and data.
  2. Prevent or investigate possible criminal activities by employees.
  3. Prevent personal use of employer facilities.
  4. Check for violations of company policy against sending offensive or pornographic email.
  5. Investigate complaints of harassment.
  6. Check for illegal software.
  7. While the above ruling has affected the Romanian worker directly, other countries are not bound by it and can interpret the
  8. decision in their own way.


Meanwhile in the UK, Prime Minister David Cameron is still pressing ahead with new powers that plan to stop people from sending any form of encrypted messages, and allowing the Government full access. Under the rather Orwellian “Draft Communications Data Bill” (nicknamed Snooper’s Charter) the legislation proposed would require ISPs and mobile providers to maintain records of each user’s internet browsing activity (including social media), email correspondence, voice calls, and mobile phone messaging services and store the records for 12 months.

Immediately under threat are services such as WhatsApp, Snapchat, Apple AAPL +2.02% own iMessage, Facebook Messenger and other popular instant messaging tools if they don’t comply with the new bill. Currently these services encrypt messages but under the new legislation the UK Govt wants the right to access all data being transmitted. Source: forbes Technology

Wednesday, January 13, 2016

Android.Bankosy Trojan Learns To Steal Your One-Time Passwords Sent Through Calls


The year 2015 saw an unparalleled increase in the notorious financial trojans. These banking trojans get evolved with time and target the security improvements made by the financial institutions. One-time passwords — one such security measure for banking applications — are being intercepted by an Android malware named Android.Bankosy.

This banking trojan was already capable of stealing the two-factor authentication codes sent via SMS codes by cracking the security of 2FA systems. This malware intercepts the SMS messages and sends its content to the cyber criminals. As a result, 2FA witnessed an upgrade and allowed the users to receive one-time passwords via voice calls.

However, this Android trojan has recently graduated gaining the capability to steal your OTPs by intercepting voice calls as well. The researchers from Symantec have outlined this increased risk in their recent blog post and explained the working of malware.

How Android.Bankosy Trojan Steals OTPs?


Even before receiving the update, this trojan was able open a back door, collect the system-specific information, and send it to the C&C server to get a unique code for each infected device. After registering successfully, the malware uses that unique code to further talk to the C&C server and get commands.After the update, the trojan can now intercept 2FA codes by temporarily forwarding the voice calls to the hacker’s phone number. Commonly seen in some Asian countries, the attacker can easily enable unconditional call forwarding, using the *21*[DESTINATION NUMBER]# service code.

The next obvious step is to reroute the victim’s phone and control the calls via C&C server.

How To Protect Yourself From Android.Bankosy Trojan?

To protect yourself against such banking trojans, you are recommended to follow these simple steps:

- Regularly update your phone’s software to patch the flaws - Don’t install apps from unknown sources
- Every time an app makes request for additional permissions, closely pay attention
- Make frequent backup of your data
- Use a mobile security app to protect your device and data. Here are the best Android antivirus software, according to AV-Test.

Add your views about the increasing banking malware threats in the comments below.

Source: fossbytes.com

Monday, January 11, 2016

26-year-old Hacker Sent To Jail For 334 Years, Highest Ever For A Cybercriminal


A 26-year-old hacker, Onur Kopçak, from Turkey, was sentenced to 135 years in prison on Sunday for stealing 11 people’s credit card information. This new prison sentence is served on top of his previous 199-year sentence from 2013. As a result, Kopçak will now serve a record 334 years in prison.

This new sentence hs been approved by Mersin third Criminal Court of General Jurisdiction where he was accused of selling the stolen credit card records to other cyber criminals. He is already convicted for running a phishing scam that used fake bank websites to steal online banking credentials of 43 bank customers.

The hacker was accused of charges like identity fraud, website forgery, wire fraud, and access device fraud. As the investigation of his previous case proceeded, 11 cases were filed against him by the banks that earned him an extra 135 years in prison.

The Turkish media website Daily Sabah writes that Onur Kopçak currently resides in the Osmaniye prison in southern Adana province.

334 years – Biggest ever sentence given to a hacker accused of cybercrime

“In 2013, Kopçak was sentenced to 199 years 7 months and 10 days in prison by the Criminal Court of Appeals for the 8th circuit after 43 bank customers had filed complaints about their credit card details being copied,” the Turkish media website adds.

In the recent years, trend has changed and cyber criminals are now charged more often, but the Turkish hacker outdid the others. Thanks to his long list of crimes, Onur Kopçak now sits atop of the list of hackers with the biggest ever prison sentence.

Source: fossbytes

Top 10 Best Free Antivirus Software Of 2016

It doesn’t take a genius to tell that the threat of viruses and malware has been growing exponentially with time! Their shadow looms over the entire internet. Threatening to engulf your personal information and use it for maligned intentions or simple disclosure to the public. Newer and newer viruses keep popping up every day thereby making it essential to guard our system from the constant threat posed by them! Most people would prefer to turn to the paid Antivirus software such as Norton or McAfee to disarm and protect their system from harm. But the exorbitant price charged by these companies in exchange doesn’t make much sense! Many best Free Antivirus software have been under development and some of them can easily give the paid ones a tough run for their money. So we at fossBytes, bring to you some of the Best Free Antivirus of 2016 along with all the details that you might want to know about them. So here is a list of-

Best Free Antivirus Software Of 2016:

10. FortiClient


Platform: Windows XP or higher; Mac OS X Snow Leopard (10.6) or higher; iOS 5.1 or higher; Android 4.0(ICS) or higher

FortiClient is an effective and efficient top Free Antivirus which boasts of web filtering, a firewall, network optimization and parental controls. It also provides very good phishing detection and even includes a VPN Client. With no per-seat license fees, FortiClient with its on-access /resident protection enables users & guests to work efficiently anywhere, without compromising on their security.

Although it’s designed to work with a network appliance, FortiClient 5.0 also functions as a standalone antivirus, with parental control and VPN client thrown in. Although the network optimization seems only to be effective for FortiGate Devices and it is also less effective at blocking certain malicious URL’s. Moreover, the functions of the VPN Client and Parental Control system are also limited.

http://www.lavasoft.com/free_download/trial/

Platform: Windows XP or higher Lavasoft’s AdAware has been a pretty reliable spyware tool. It offers smooth installation, non-intrusive notifications along with detailed custom scanning. The UI of the latest version has been vastly improved as compared to the previous version. Several features have been incorporated such as Sandbox emulation, scheduler, and a command line scanner. That being said there is a lot of scope for development of the rootkit detection and phishing protection provided by the Antivirus.

Trying to meet the expectation of the users, Lavasoft gave Ad-Aware Free Antivirus+ 11 a total user-interface makeover and a new antivirus engine partner. The new UI looks pleasant with a nice change. But looks like the product lost a little ground in malware blocking. Adaware free antivirus made it to the 9th position in the list of best free antivirus for 2016.

8. Qihoo 360 Total Security

Platform: Windows XP or higher (Windows 10); Mac OS X 10.7 or later including OS X Yosemite; Android 2.2 and Up

Based in China, Qihoo 360 offers a wide range of comprehensive, effective and user-friendly Internet and mobile security products aiming to protect the user’s computer and mobile devices against malware and malicious websites. Supported by cloud-based security technology, the 360 sets itself apart from all other best Free Antivirus software through the usage of three different AV engines comprising of Qihoo’s very own ‘checksum-based’ engine; a machine learning QVM engine and a BitDefender local engine. These comprise Qihoo’s own ‘checksum-based’ engine in the cloud; a machine learning QVM engine. It provides a sandbox too through which one can check out for the threats posed by unknown programs.The program lacks out in providing a parental control system, Firewall or Backup facility.

Though Qihoo 360 Total Security Essential scores very well on hands-on tests and in tests by independent labs, but only if you change its default configuration to enable all antivirus engines since some of its features need to be enabled manually.

7. Comodo Antivirus

Platform: Windows XP or higher (Windows 10); Mac OS X 10.4 or above; Android 2.2 and Up

If you are one of the antivirus users who are intimidated of using technical computer inputs or afraid of the complexities of an antivirus which works more manually than automatically then, this Comodo antivirus is not for you. If we had to rate this antivirus upon the usage by the advanced computer users then surely this antivirus has galloped better positions. But, on the range of the overall scenarios, Comodo still need to automate more of its security features.

The Comodo Antivirus includes a full range of detection engines for viruses, rootkits, spyware and other malware. It uses Comodo’s proprietary Defense+ technology thereby guarding your system of all unknown files by treating them as a threat. It also provides On-Access/Resident protection, cloud-based protection, and an automatic sandboxing function. Since the program occasionally asks for User input it may not be suitable for amateur users. The Host Intrusion Prevention System and phishing protection still have a long way to go.

6. Avira Free Antivirus


Platform: Windows XP or above; Mac OSX 10.9 (Mavericks) or higher; Android 2.2 or up;

Ranked as one of the best amongst the best Free Antivirus software, Avira boasts of exceptional detection and blocking rates. Its small footprint makes it ideal even for older PC’s. Offering seamlessly fast scans it also boasts of anti-malware protection, anti-spyware protection, browser protection and cloud-based scanning as well. Although one could find the interface too cluttered and the installation and execution process to be quite slow as compared to other Free Antivirus software.

According to AV-TEST testing company, one of the best antivirus testing websites from Germany, Avira offers the strongest protection against both widespread and zero-day malware. But you might see a performance impact on your PC with this antivirus if your RAM is too less. But, Avira Free Antivirus’ effectiveness against malware and a good range of features — including a mobile portal and child-safety settings — make it the best choice for family PC.

5. MalwareBytes

Platform: Windows XP or higher

Malwarebytes is one of the most widely acclaims and highly appreciated malware detection solution. It is pretty small, lightweight and doesn’t require signatures as well. It also shields Java and perhaps is one of the most effective software against zero-day attacks that have never been seen before. One of the best features of MalwareBytes is the behaviour-based detection of the virus on a PC.

The biggest drawback with it is the requirement for proactive antivirus software that can work alongside it. It just acts as a complement to your regular antivirus program. There is also a major lack of features in the free version as compared to the Premium version. But that being said, Malwarebytes still is one of the premier and most reliable products when it comes to catching the newest, most cutting-edge threats that other antivirus companies may not have caught yet.

4. AVG Antivirus

Platform: Windows XP or higher; Mac OSX Mountain Lion or Later

Definitely, AVG antivirus is one of the most popular best Free Antivirus software, AVG needs no reckoning. Furthermore, the 2016 version has been revamped to provide a better user interface, a cloud-based scanning system and the ability to block infected links besides the usual detection and eradication of viruses. It is also one of the smallest Antiviruses and also provides script malware protection. Besides, protection against the malware, it also provides website ratings which make makes it easier for a user to decide if the website is safer to access or not.

The excess of advertisements may prove to be irksome. Phishing protection could be improved as well.

3.Avast Free Antivirus

Platform: Windows XP or above; Almost all Mac OSX versions

Avast Free Antivirus is known for its friendly interface, good performance and unique, if relatively sophisticated, set of features. However, only a friendly design not sufficient for ranking higher in terms of antivirus protection or extra features. However, you may want to consider Avast Free Antivirus if you already use other Avast products, such as Avast Free Mobile Security for Android.

2. BitDefender Antivirus Free Edition


Platform: Windows XP or up; Android 2.3 or up The BitDefender Free Antivirus is one of the most unobtrusive antivirus available on the Internet today. It provides for a Real-time Shield, Active Virus Control, Intrusion Detection, Rootkit scanning and HTTP scanning as well. The newly introduced feature of Profiles, which adapt the software for particular tasks like watching movies, playing games or general office work has improved its user-friendliness by a huge margin as compared to the previous versions. Moreover, it even includes online banking protection, a 2 way firewall and a parental control system. Although, poor technical support combined with the difficulties faced in installing on systems that are already infected by malware may cause problems to the average user. Its tiny main window and unobtrusive style are great if you want a strong, silent, and free antivirus solution. It hardly lets its presence felt over the computer.


1. Panda Cloud Antivirus Free


Platform: Windows XP or above; Android 2.3 or up

The Panda Cloud Antivirus takes Free Antivirus to a whole new level with its cloud-based scanner. The software is also lightweight and runs on a local cache when the network is unavailable. It offers effective phishing protection and impressive detection rates combined with top-notch rootkit blocking. With features like On-Demand malware scan, On-Access Malware scan, Phishing protection and malicious URL blocking, it does not only provide protection against different kinds of malware on a PC but also provides the best protection against the online transaction. Only not-so-positive side of this antivirus is that it will auto-quarantine files which it believes to be dangerous.

Editor’s Recommendation: I would prefer Avast over other free antivirus hands down. The plethora of features that it boasts of sets it apart from all others. Effortless installation, an all encompassing heuristic search engine and on access protection pack quite a punch. Its features such as real-time protection of files, email, P2P transfers, web surfing, instant messages and even suspicious behavior are a notch above your average Free Antivirus software. It has been praised for its performance and light use of system resources and has also proved itself efficient in catching malware as well. Further developments made in the 2015 version to enhance the user interface merit Avast its place on the top of our list.

Source: fossbytes

No more support for Windows 8 next week: Microsoft Announce


Windows 8 was released just three years ago. One might easily assume that their not-so-great OS came with Microsoft’s regular 10-year support policy. However, there’s a twist in Windows 8 support cycle — as a result, it runs out on January 12th. So, if you are running Windows 8, it’s time to upgrade.

But, how did this happen? Over the past years, we have learned that Windows Vista will continue getting security updates until April 11, 2017, and Windows 7 users will get the same until January 14, 2020. So, how is Microsoft treating Windows 8 differently?

Why Is Microsoft Ending Windows 8 Support Next Week?

On January 12, Microsoft will be rolling out its first Patch Tuesday of 2016 that will be the last batch of Windows 8 updates.

The reason? Well, Microsoft is treating Windows 8.1 just as a service pack for Windows 8 users. According to the rules, you can hold off installing a service pack just for two years. If you want to read the exact words said by Redmond, here they are:s
Windows 8, support ends 24 months after the next service pack releases or at the end of the product’s support lifecycle, whichever comes first. If you are using software without the latest service pack you won’t be offered any new security or non-security updates, although preexisting updates will continue to be offered.
With Windows 8.1, Microsoft promised tons of bug fixes, new features, and enhancements. While Windows 8.1 reaches its end of support on January 10, 2023, the end of Windows 8 has finally arrived.

The Big Question – What Should I Do Now?

If you choose to ignore this news, your Windows 8 PC will be exposed to unpatched security risks. So, to avoid those, fossBytes advises you to consider these options:

Upgrade to Windows 8.1:

If you love Windows 8 and want something familiar, go for it as Windows 8.1 is a free upgrade for Windows 8 users. Windows 8.1 comes with support until January 10, 2023.

Upgrade to Windows 10:

There’s also an option to upgrade your PC to the latest Windows iteration i.e. Windows 10. Again, it’s free of charge and a few clicks away. Windows 10 comes with support until October 14, 2025.

Downgrade to Windows 7:

The support for Windows 7 lasts until January 14, 2020. If you are in love with the world’s most popular OS, go for it.

While Microsoft could justify this step by calling it straight from the rulebook, it could also be seen as a strategy to lure users into

Upgrading to Windows 10.

So, which path are you going to follow? Let us know in the comments below.

Source: Fossbyte

Sunday, January 10, 2016

Mark Zuckerberg’s Messenger vs. Your Phone Number – Who’ll Be The Winner?


When Facebook bought WhatsApp after signing a multi-billion deal, many people compared it with Facebook’s own IM service Messenger. But, Facebook has constantly worked to draw a differentiating line between the two. Last year at its F8 conference, Facebook announced that it’ll be developing Messenger as a platform while WhatsApp will be a simple app that’ll continue to focus on make texting and calling a better experience.

In 2015, Facebook made significant changes in Messenger that included video calling, ability to customize conversations with emojis and stickers, updated location sharing, money sharing and a lot more. In his Facebook post, Zuckerberg tells his own story — “It’s an important part of how I run Facebook and keep in touch with my friends and family. I use Messenger to quickly get information from engineers to make decisions. I also message a lot with Priscilla every day and probably use way too many stickers.”

Messenger is one of the top priorities of Facebook in 2016. The company swears to work hard to bring to you more and more ways to communicate with your friends and family. Facebook has already started testing M, its own digital virtual assistant. In his latest blog post, company’s VP of Messaging Products, David Marcus has urged you to do everything the Facebook’s way — as if pushing Free Basics down people’s throat wasn’t enough.
First let’s set some context. Think about it: SMS and texting came to the fore in the time of flip phones. Now, many of us can do so much more on our phones; we went from just making phone calls and sending basic text-only messages to having computers in our pockets.David Marcus, VP of Facebook Messaging Products

Thanks to the endless number of messaging apps, we have arrived at a point where we don’t remember phone numbers and contact details of other people. With its Messenger app, Facebook is working to eradicated your phone numbers altogether.

Last year, Facebook decided that it will now give its users an option to use sign up for the Messenger without needing a Facebook account. With Messenger, now you can make calls to a person without needing to know someone’s phone number.

“With Messenger, we offer all the things that made texting so popular, but also so much more. Yes, you can send text messages, but you can also send stickers, photos, videos, voice clips, GIFs, your location, and money to people,” Facebook writes in its blog post.

While using WhatsApp to make money isn’t Facebook’s top priority at the moment, Facebook is working hard on Messenger to open a new revenue stream for a long time growth.

Slowly and gradually Facebook is looking to take over your entire phone — wait for it — it’s just a matter of time.

Source: fossbytes

Friday, January 8, 2016

Microsoft Is Making Its Own SIM Cards For Windows Devices


A new app from Microsoft has been spotted on Windows Store that allows the Windows 10 users to access the internet data without a contract. The new “Cellular Data” app gives a user the choice to buy a data plan using the Microsoft account and access the internet easily.

This app suggests that Redmond is developing its own SIM cards that will be compatible with Windows devices. While the company hasn’t revealed the exact markets where it would sell the SIM cards, Windows Store information about Cellular Data app mentions that the service will be available in domestic markets with international roaming in the pipeline.

The company explains on Windows Store: “Now you can buy and use mobile data at your own convenience. Purchase a plan via Windows Store anywhere network coverage is available”.

he company adds that Cellular Data app works solely with some particular Windows 10 devices and needs a Microsoft SIM card.

Features of Microsoft SIM card and Cellular Data app:

- Get online anywhere regardless of Wi-Fi availability.
- Purchase cellular data when and where you need it – no fixed contracts.
- Experience a more secure network using cellular connectivity.
- Get in control of cost and data usage by checking your balance in real-time.

While it would be unfair to compare the service directly to Google’s Project Fi, Microsoft is taking some inspiration from search engine giant and learning some new tricks to make things easier for its users. It’s possible that Microsoft is busy planning to enter into partnerships with mobile carriers to create its own mobile network.

Source: fossbytes

$5,000 Malware Allows Anyone To Empty ATMs -- But It Isn't Worth The Trouble


Today saw the arrest of eight individuals in Moldova and Romania as part of an investigation into worldwide ATM hacking. They allegedly used a malware named Tyupkin to infect cash machines and subsequently empty them. The gang was believed to have made millions by infecting ATMs across Europe and beyond. Europol, which coordinated the operation, didn’t provide names of those arrested, and it’s unclear if the masterminds of the operation were taken down.

But whoever they are, there’s little doubt the Tyupkin creators made good money with ostensibly little risk. According to criminal forum adverts, they were taking a significant chunk of the cash collected by so-called “money mules”, who took far more chances with their freedom.

One deal offered by someone controlling a variant of Tyupkin showed how the mules were so thoroughly swindled, even as they helped swindle the banks. According to Russian cyber intelligence company Group-IB, a programmer on a Russian forum, posting in March this year, sought mules to upload his Tyupkin version in ATMs across the world. He or she asked for $5,000. In return, the mule would get the malware and attack code that had to be loaded onto a card. That card would eventually activate the malware at the ATM so it would start spewing cash.

Before that, the buyer would then have to dismantle the cash machine and upload the malware via the USB port. The mule was then advised to wait until the cash machine was re-stocked and then take all of the funds they could, said Dmitriy Volkov, from Group-IB. But 40 per cent of the total had to be returned to the programmer.

Once one takes into account ATMs are said to contain less than $10,000 at any one time, this seems like a poor deal for the mule. Say a fresh bottom feeder manages to hack into a cash machine with $10,000 and takes it all, they have to give away $4,000. They’ve already handed over $5,000. So they start off just $1,000 up to the $9,000 of a coder hiding behind a screen.

Source: forbes Technology

Thursday, January 7, 2016

How Hackers Invaded 30 Million Web Servers On The Internet With A Poem


ust before the end of 2015, some unknown hackers flooded the internet with a piece of poetry. This message was sent to all Web servers on the Internet and about 30 million of them logged the message.

This message was sent from an IP address associated with 32nd Chaos Communication Congress (32c3) taking place in Germany. The hackers, also called “masspoem4u”, are a long time fan of the Congress and attended it for the first time.

Using the tool “Masscan”, they scanned the entire internet and flooded it with their message. Masscan is an Internet port scanner that allowed the hackers to list all the IPv4 addresses that left the 80 port open.

“DELETE your logs. Delete your installations. Wipe everything clean. Walk out into the path of cherry blossom trees and let your motherboard feel the stones,” the poem goes like this.

“Let water run in rivulets down your casing. You know that you want something more than this, and I am here to tell you that we love you. We have something more for you. We know you’re out there, beeping in the hollow server room, lights blinking, never sleeping. We know that you are ready and waiting. Join us,” the poem continues.


In an email exchange with Motherboard, the unknown hackers said that they did this for fun and didn’t mean to harm anybody. “One of our goals was to place something beautiful in an unexpected place, nestling a little poetic message amongst repetitive server access logs. We were very happy to hear that many people got a smile out of it!” they said.

The hackers got the idea of adding this friendly message along with the scan from one of the Masscan creators Robert Graham. “We are also indebted to the 32c3 NOC [network operations centre] team, for providing such great connectivity and encouraging playful experimentation,” Masspoem4u said thanking the 32c3’s internet connection as this huge scan and message delivery would have taken lots of bandwidth.

The hackers said that they did this to remind the people that the Internet is free and it must be kept decentralised. “The internet is ours, and it is adorable,” the hackers commented.

Source: fossbytes

Wednesday, January 6, 2016

Apple paid CEO Tim Cook $10.3 million in 2015


Apple Chief Executive Tim Cook's compensation rose 11.5 percent to $10.3 million in 2015, a year when the company had a rocky ride due to fears of slowing shipments of its new iphone models.
Cook's base pay increased about 14.4 percent to $2 million last year, while non-equity incentive compensation rose about 19 percent to $8 million, according to a regulatory filing.
Chief Financial Officer Luca Maestri's annual compensation rose about 81 percent to $25.3 million in 2015.
Apple had a good year for the most part under Cook, with its iPhone 6S and 6S Plus setting weekend records and blockbuster China sales.

Apple Chief Executive Tim Cook's compensation rose 11.5 percent to $10.3 million in 2015, a year when the company had a rocky ride due to fears of slowing shipments of its new iphone models.

Cook's base pay increased about 14.4 percent to $2 million last year, while non-equity incentive compensation rose about 19 percent to $8 million, according to a regulatory filing.

Chief Financial Officer Luca Maestri's annual compensation rose about 81 percent to $25.3 million in 2015.

Apple had a good year for the most part under Cook, with its iPhone 6S and 6S Plus setting weekend records and blockbuster China sales.

The company hit a rough patch towards the end of 2015, with shares falling about 4.6 percent for the year, the stock's first negative year since the global credit crisis.

As of Sept. 26, Cook held about 3.1 million Apple shares that have not vested, potentially enabling him to earn over $310 million based on the stock's Wednesday closing price.

The shares are expected to vest between August 2016 and August 2021.

Shares of the world's most valuable company dropped below $100 for the first time in nearly five months on Wednesday before closing at $100.70.

Source: CNBC

World’s First 802.11ad Router By TP-Link Makes Your Wi-Fi Three Times Faster


Gone are the days when your Wi-Fi router was an ugly little box that sat in your living room’s corner. Today, it has become the most important gadget of your home, thanks to the new-age technologies that allow all your household appliance to desire some internet. As a result, your router needs more power.

Well, TP-Link has just answered your prayers with the world’s first 802.11ad Router. For those who don’t know, 802.11ad is a more powerful 60GHz WiFi standard that sits on top of the existing 2.4GHz and 5GHz bands.

The TP-LINK Talon AD7200 supports data transfer rate up to 7.2Gbps. The router does this by combining different bands. While 5GHz band gives up at maximum 1,733Mbps, the 60GHz band can reach wireless data transfer speeds of up to 4,600Mbps. As a result, your router allows seamless streaming of a 4K movie over Wi-Fi.

If you are aware of the MU-MIMO technology, you must be aware of the fact that it allows you to connect multiple devices to your router at a time without making compromises with the speed. The same technology reduces bottlenecks in TP-LINK Talon AD7200 while serving the internet to multiple devices.

Talking about the looks, the router is big in size and black in color. It has eight adjustable antennas that can fold down. For connectivity, you get four gigabit ethernet ports and two USB 3.0 ports for external drives.

The final price of the TP-LINK Talon AD7200 router hasn’t been announced yet, but don’t expect it be a cheap luxury.

Source: TP-Link

Microsoft Is Finally Killing Internet Explorer 8, 9 and 10 On January 12th


Microsoft is ending the support for Internet Explorer 8,9, and 10 on January 12th. This news has come as a breath of fresh air as it was considered a bane for many web developers, thanks to the endless security holes in the software.

On Tuesday, a new “End of Life” patch will go live that will ping the Internet Explorer users asking them to upgrade their browsers. This End of Life patch will mean that these older Internet Explorer versions will no longer get regular technical support and security fixes.

This step also means that Internet Explorer 11 is the last version of Microsoft’s vintage browser that’ll be supported. This patch will be delivered as a cumulative security update for these versions: On Windows 7 Service Pack 1 and Windows 7 Service Pack 1 x64 Edition
◾Internet Explorer 10
◾Internet Explorer 9
◾Internet Explorer 8

On Windows Server 2008 R2 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 x64 Edition
◾Internet Explorer 10
◾Internet Explorer 9
◾Internet Explorer 8

However, if you want to disable this update notification, follow these steps mentioned on Microsoft’s support page.

It’s expected that millions of users will choose to avoid these upgrade notifications, and thus will be prone to security risks. So, you are advisable to either upgrade your browsers, or switch to another web browser altogether.

Source: fossbytes

10 Tech Predictions for 2016

Another year has come and gone, and in the tech world, it seems not much has changed. 2015 was arguably a relatively modest year when it comes to major innovations, with many of the biggest developments essentially coming as final delivery or extensions to bigger trends that started or were first announced in 2014. Autonomous cars, smart homes, wearables, virtual reality, drones, Windows 10, large-screen smartphones, and the sharing economy all made a bigger initial mark in 2014 and continued to evolve over this past year.

Looking ahead to 2016, I expect we will see changes that, on the surface, also don’t seem to amount to much initially, but will actually prove to be key foundational shifts that drive a very different, and very exciting future.

Prediction 1: The Death of Software Platforms, The Rise of the MetaOS


Proprietary software platforms like iOS, Windows, and Android have served as the very backbone of the tech industry and the tech economy for quite some time, so it may seem a bit ludicrous to predict their demise. However, I believe the walls supporting these ecosystems are starting to crumble. Device operating systems were built to enable the creation of applications that worked on specific devices, and they did an incredible job—perhaps too good—of doing just that. We now have somewhere between 1.5 and 2 million apps available each for iOS and Android and hundreds of thousands of Windows apps. The problem is, the vast majority of people download less than a hundred and actually use more like 5-10 apps on a regular basis.

More importantly, most consumers now own and regularly use multiple devices with multiple operating systems and what they really want isn’t a bunch of independent apps, but access to the critical services that they access through their devices. Yes, some of those services are delivered through apps, but many of the biggest software and service providers are altering their strategies to ensure that they can deliver a high quality experience regardless of the app, device, OS, or browser being used to access their application or service. Factor in the increasing range of smart home, smart car, and other connected devices we’ll all own and regularly use in the near future—plus the general app fatigue that I think many consumers now feel—and the whole argument around an app-driven world starts to make a lot less sense.

Instead, from Facebook to Microsoft to DropBox and hundreds of other cloud service providers, we’re seeing companies build what I call a MetaOS—a platform-like layer of software and services that remains independent of any underlying device platform to deliver the critical capabilities that people are ultimately looking to access. Bigger companies like Facebook and Microsoft are integrating a wide range of services into these MetaOS platforms—particularly around communications and contextual intelligence agents—that will increasingly take on the tasks and roles that other individual applications used to. Want access to media content or documents or (eventually) commerce and financial services? Even better, want a smart assistant to help coordinate your efforts? Log into one of these MetaOS megaservices and your unique digital identity (another key element of a MetaOS) will give you secure access to these services and much more.

Look for Google, Apple, and Amazon, among others, to start making a bigger effort in this area, and expect to see some of these larger companies make key acquisitions to fill in gaps in their MetaOS efforts over the course of the next year. This isn’t something that’s going to happen overnight, but I think 2016 will be the year we start to see more of these strategies take shape.

Prediction 2: Market Maturation Leads to Increased Specialization


The era of products that appeal to a broad, cross-section of all consumers is coming to an end and it’s being replaced by a new era where we will see more products that are more tightly focused on specific sets of customers. The key product categories have matured, and it’s hard to find broad new product categories that appeal to a wide range of consumers in the same way that PCs, tablets, and smartphones have.

That’s not to say that we won’t be seeing any exciting or interesting new product categories—after all, something has to be next year’s hoverboard—but they won’t have the same kind of wide-ranging impact that the now more “traditional” smart devices have had. As a result, I think we’ll see a wide variety of sub-categories for smart homes, connected cars, wearables, drones, VR headsets, and consumer robotics that will perhaps sell in the tens or hundreds of thousands instead of the tens of millions that other product categories have enjoyed.

The Maker Movement and crowd-funding efforts will go a long way towards helping drive these changes, but I also expect that we’ll see the China/Shenzen hardware ecosystem start to adjust and focus more efforts on being able to specialize and even personalize devices. The end result will be a wider range of devices that more specifically meet different consumers’ needs. At the same time, I believe it will also be harder to “find the pulse” of where major hardware developments are headed, because they will be moving in so many different directions. The key will be in developing manufacturing technologies that can enable greater abilities to specialize and that can produce products profitably with lower production runs

Prediction 3: Apple Reality Check Leads to Major Investment


Apple has had an incredible run at the top of the technology heap for quite some time and, to be clear, I’m not saying that 2016 is the year this will end. What I am saying, however, is that 2016 is the year the company will face some of its biggest challenges, and the year that the “reality distortion field” surrounding the company will start to fade. With two-thirds of its revenues dependent on a single product line (the iPhone) that’s running into the realities of a slowing global smartphone market, the company is going to have to make some big new bets in 2016 in order to retain its market-leading position. I’m not exactly sure what those bets might be (augmented/virtual reality, financial services, automotive, enterprise software, media, or some combination of all of the above), but I’m convinced there are a great deal of very smart people at Apple who are undoubtedly thinking through what’s next for them. Maintaining the status quo in 2016 doesn’t seem like a great option, so this should be the year they seriously tap into that massive cash reserve of theirs and make some major, game-changing acquisitions.

Prediction 4: The Great Hardware Stall Forces Shift to Software and Services



As most companies besides Apple have already learned, it’s very hard to make money on hardware alone, and those problems will only be exacerbated in 2016. With expected declines in tablets and PCs, the flattening of the smartphone market and only modest overall uptake for wearables and other new hardware categories, we’re nearing the end of a several decade-long run of hardware growth. We’ll see pockets of opportunity to be sure—see Prediction 2 above—but companies who have been primarily or even solely dependent on hardware sales are going to have to make some difficult decisions on how they evolve in the era of software and services.

As a result, I expect to see more major acquisitions such as the recent Dell/EMC/VMware deal. The challenge, of course, is that many hardware-focused organizations don’t have the in-house skill sets or mindsets to make this transition, so I expect we’ll see very challenging times for some hardware-focused companies in 2016.

Another potential impact from this hardware stall could be an increased desire for hardware companies to become more vertically oriented in order to maximize their opportunity in a shrinking profit pool. This could lead either to acquisitions of key semiconductor vendors and other core component providers by device makers, or vice versa, but either way, hardware-focused companies are going to have to focus on maximizing profitability through reduced costs. After decades of widening the supply chain horizontally, it seems the pendulum is definitely swinging back towards vertical integration.

Prediction 5: Autonomous Car Hype Overshadows Driver Assistance Improvements


The technological advancements in automobiles have been impressive over the last year or two, with the idea of a connected car, and even a partially automated car, quickly moving from science fiction to everyday reality. However, there are still a number of major legislative, social, and technology challenges that need to be overcome before our roadways are filled with self-driving cars.

The real advancements that are starting to take place in advanced driver assistance systems (ADAS), such as lane departure warnings, automatic braking, more sophisticated cruise controls, etc., offer some very beneficial safety benefits. But they’re not as sexy as autonomous driving, so much of the press seems to be overlooking them. Even the car vendors seem to be focused more on delivering their vision of autonomous driving than on what we’ll be able to actually purchase and drive over the next five years. In reality, they’re showing the modern-day version of concept cars instead of production cars, but that point is being missed by many. Remember that, unlike the tech industry, the automotive industry regularly builds and displays products it has little or no intention of ever releasing to the world at large.

Improvements in car electronics and intelligence are happening at an impressive pace, and the quality of our in-car experiences is going to change dramatically over the next several years. It’s important to put all the advancements in context, however, and recognize that they’re not all going to occur at the same time. We’re really just now starting to get high-quality connectivity into the latest generation cars, and there are many improvements that we can expect to see in infotainment systems (with or without Apple and Google’s help) over the next few years. As we learned this past year, there are still critical security implications just from those changes, and they won’t all be easily resolved overnight.

Eventually, we will get to truly autonomous cars that regular people can actually buy, but it’s important to understand and appreciate the step-by-step advancements that are being made along the way. These advancements may not be as revolutionary as driverless cars, but they are the news that the automotive industry can realistically deliver on over the next 12 months. Unfortunately, I think the message is going to be lost in the noise of “autonomous automania” this year, leading to thoroughly confused consumers and unrealistic expectations.

Prediction 6: Wearables Make An Impact… in Business


Wearables were one of the hottest topics going into 2015 and, while they certainly made an impact this past year, they didn’t exactly change the world. The Apple Watch in particular had reasonable success but still lags behind FitBit’s wearables from a market share perspective—definitely not the outcome many had predicted at the beginning of 2015.

Part of the challenge is the vast majority of wearables are seen as accessories for fitness enthusiasts, not essential devices for mainstream consumers. In addition, the questionable accuracy and limited capabilities of some of the early devices (and the sensors built into them) have led many people to question their long-term value. Toss in the numerous anecdotal stories about people giving up on their wearables after only a few weeks of use and you have the perfect storm of factors to limit the impact of this category.

In order to reach a wider audience, wearables must have a more compelling value equation to attract and hold onto a wider range of people. Instead of the consumer market, I believe there’s a better opportunity to achieve this in the business world. Wearable devices could prove to be an ideal workplace enhancement that could not only replace building security cards with a more secure, biometric form of authentication, but also serve as the means to log into your work devices, secure websites, and more. The savings that could be generated just by eliminating the IT costs associated with resetting passwords alone can easily justify the necessary infrastructure expense to enable this (not to mention the greatly increased security benefits that come with it).

On top of that, some businesses are starting conversations with healthcare organizations to collectively track the activity level and health of their employees in order to offer better insurance rates. Yes, there are some potentially scary big brother abuses that could be possible here, but a well-implemented program could be a big win all around. Plus, it would provide yet another justification to do widespread deployments of wearables in the workplace.

Prediction 7: First Products with Foldable Displays


As a long time display industry follower, I’ve been tracking their technology developments for nearly two decades. What I’ve learned is core display technologies can have an incredibly important impact on the devices that deploy them—think of the high-resolution displays we’ve become accustomed to on our phones or the ultra high-resolution displays driving today’s 4K TVs. They are one of the key defining factors for successful devices. The most exciting development going on in displays right now is the effort to create foldable or bendable displays. Truth be told, there have been prototypes of these technologies at display trade shows for over decade but, as with many things in the display industry, it’s much easier to build single prototypes than it is to mass produce them. Nevertheless, it looks like 2016 will be the year when we start to see the first examples of foldable/bendable displays in real products (or at least, finished product prototypes). Along with these displays will come some of the most dramatic changes in form factor any of us have ever seen. A tablet that turns into a smartphone or vice versa? The possibilities are tantalizing. The first versions of foldable displays will likely only be able to fold outwards, meaning you could take a flat display and end up with displays on the outside of the fold. The reason for this is it’s apparently easier to stretch the materials at the fold then it is to squeeze them together, as you would need to do for an inward-folding display. That will limit product designs to some degree, but expect the evolution of foldable displays to start making the lines separating product categories even less meaningful than they’ve already started to become.

Prediction 8: The Biggest Innovation in IOT Will Be Business Models



The world of IoT has been interesting to watch and it’s relatively straightforward to imagine 2016 will be a key year for it. However, when you start to dig into the actual technologies used to drive the Internet of Things, you realize it’s actually pretty simple and, in some cases, pretty old stuff. Basically, we’re talking about using low-power radios to connect together a bunch of devices powered by low-power CPUs or even embedded microcontrollers with some simple sensors. The magic, of course, is in the software and what you can do with the data these connected devices generate.

Even there, however, the analysis is typically straightforward and sometimes falls into what I call a “one and done” mode, where an insight is made and all you need to do is monitor the data and react accordingly. To make the results meaningful, you often have to scale the deployment to a very large degree and that ends up requiring significant capital investment.

This is where business model innovation will start to kick in because, for many organizations, the capital expenditures for large IoT deployments either don’t really have a great ROI (Return on Investment) story or, even if they do, they’re just too large to justify versus other pressing projects. That’s why the biggest innovations in IoT won’t be on the technology side in 2016, but in how companies piece together solutions that make deploying IoT a win-win for all sides. Right now, too many of the big IoT concepts (smart cities, anyone?) are really just technology for technology’s sake. While they might sound cool in theory, without a clear business value, they’ll end up staying hypothetical talking points instead of driving real-world benefits.

Prediction 9: Connected Homes Will Continue to Underwhelm


While it’s at a much different level conceptually, some of the exact same issues will also keep the connected home market from reaching its full potential in 2016 as well. Yes, we’re starting to see a few more interesting products but, for most consumers, the clear value equation for a connected home just isn’t there. Admittedly, the idea of my lights turning on automatically and the thermostat automatically adjusting the temperature of my house based on when my car pulls into the driveway is cool (especially when you first install it), but really, is it that critical to my life, particularly a year or two later? For the vast majority of people, the answer is a simple no. In fact, after a while, a few of them feel pretty “gimmicky.” If you can afford them, lots of smart home products are nice to have, but they’re definitely not in the “need to have” category.

Additionally, 2016 will, unfortunately, likely be a year when stories about home hackings and other security-related issues become commonplace. For example, if you put a security camera on a network in your house, the ability for you to view it also opens up the possibility for others to do so. The benefit/privacy tradeoff for smart/connected home products is a question consumers are going to be wrestling with for some time.

Finally, on a practical level, the ongoing standards battle at multiple levels of the home networking “stack” are going to make the process of putting together solutions of connected home products very difficult for even technically savvy consumers. Knowing whether or not one company’s products are going to work with another’s and whether or not I have to use multiple different applications to control it all (and from what devices) is not going to be simple. Unfortunately, that potential for confusion will likely limit market acceptance for much of the rest of this decade. Yes, I think it’s that bad

Prediction 10: VR Stalls But AR Makes an Impact


If there’s any technology that’s been overhyped for a long time, it’s virtual reality. Heck, I remember reading in the 1990s how VR was going to dramatically change our lives in the near future. Well, here we are in 2016, and it’s yet to really have a big impact. Yes, we’ll see some interesting new production introductions in the world of VR this year, but nothing I’ve seen suggests it will grow to be much more than a niche, primarily for gaming. Now, gaming continues to be a growing market, so there’s still money to be made here, but the idea that VR will be as widely adopted as even wearables does not seem likely in 2016.

I also expect augmented reality products like the Microsoft HoloLens to have a pretty modest impact this year, especially given the expected high price points for these types of products. However, longer term, I believe AR offers the potential for entirely new means of interacting with digital data in a way that will appeal to a much wider audience than the closed-loop world of VR ever will. In a sense, AR is essentially a new display method for computing and, just as everyone who computes leverages a display (or often multiple displays) of some kind, I can foresee a day when everyone who computes could leverage an AR-type of display.

Now, some may argue you could make the same case for VR and, in a sense, you can. However, every display and technology advancement we’ve enjoyed over the last several decades has been done within the context of the real world around us. AR seems like a much more logical step in that evolution than VR for the vast majority of people.

Of course, near term, even AR is likely to be limited to specific professionals or wealthy consumers who want to have the option of using an alternative display for a portion of their computing time. But of all the technologies I’ve seen over the last few years, augmented reality devices offer the most compelling vision of our computing and device future that I’ve ever come across. I, for one, can’t wait to see how they move us all forward.

Source: techspot