Saturday, 29 October 2016

Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana

ORLANDO, Fla.—Microsoft CEO Satya Nadella faced sharp questions from Gartner analysts Tuesday about the privacy-invading implications of its $26.2 billion acquisition of LinkedIn, and its all-knowing virtual assistant, Cortana.

Helen Huntley, one of the Gartner analysts questioning Nadella at a conference here, was particularly pointed about the fears.

Cortana, said Huntley, “knows everything about me when I’m working. She knows what files I’m looking at, she knows what I’m downloading, she knows when I’m working, when I’m not working,” she said.

To read this article in full or to leave a comment, please click here

Half of U.S. adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults—117 million people—are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study.

Along with a lack of regulation, critics question the accuracy of facial recognition algorithms. Meanwhile, state, city, and federal facial recognition databases include 48 percent of U.S. adults, said the report from the Center on Privacy & Technology at Georgetown Law. 

The search of facial recognition databases is largely unregulated, the report said. “A few agencies have instituted meaningful protections to prevent the misuse of the technology,” its authors wrote. “In many more cases, it is out of control.”

To read this article in full or to leave a comment, please click here

Yahoo asks US for clarity on email scanning controversy

Yahoo is asking that the U.S. government set the record straight on requests for user data, following reports saying the internet company has secretly scanned customer emails for terrorism-related information.  

On Wednesday, Yahoo sent a letter to the Director of National Intelligence James Clapper, saying the company has been "unable to respond" to news articles earlier this month detailing the alleged government-mandated email scanning.

"Your office, however, is well positioned to clarify this matter of public interest," the letter said.

The scanning allegedly involved searching through the email accounts of every Yahoo user and may have gone beyond other U.S. government requests for information, according to a report from Reuters.  

To read this article in full or to leave a comment, please click here

Privacy groups target kids advertising disguised as YouTube content

Marketing companies are targeting children on YouTube with advertising disguised as other content, an “unfair and deceptive” business practice, three privacy groups said in a complaint to the U.S. Federal Trade Commission.

The companies, including Disney’s Maker Studios and DreamWorks’ AwesomenessTV, use popular “influencers” on YouTube to pitch products, aimed at children worldwide, with videos that “masquerade” as unsponsored content, said the complaint, filed Friday by the Center for Digital Democracy (CDD), Public Citizen, and the Campaign for a Commerical-Free Childhood (CCFC). YouTube and corporate parent Google reap the benefits through advertising sold alongside the videos.

To read this article in full or to leave a comment, please click here

WikiLeaks says it doesn’t collaborate with states

WikiLeaks claims to have many thousands of sources but does not collaborate with states in the publication of documents, its editorial board said late Sunday.

The statement by the board of the whistleblowing site assumes significance after the  administration of U.S. President Barack Obama charged that it and other sites had released allegedly hacked emails under the direction of Russia.

WikiLeaks has leaked mails from the Democratic National Committee that showed that the Democratic Party’s national strategy and fund-raising committee had favored Hillary Clinton over her rival Senator Bernie Sanders for the Democratic Party nomination. The website has also published mails from the account of John Podesta, chairman of Clinton's campaign for the presidential election, which could prove to be embarrassing to the candidate.

To read this article in full or to leave a comment, please click here

French surveillance law is unconstitutional after all, highest court says

The French Constitutional Council has taken another look at a new security law it waved through in July 2015, and found it wanting.

A key clause of last year's Surveillance Law essentially allowed security agencies to monitor and control wireless communications without the usual oversight applied to wiretapping operations.

This is unconstitutional as the lack of oversight is likely to result in a disproportionate invasion of privacy, the council ruled Friday. It was responding to a complaint filed by La Quadrature du Net (LQDN), an association campaigning for online rights, the ISP French Data Network (FDN) and the Federation of Non-Profit ISPs.

To read this article in full or to leave a comment, please click here

Privacy group shoots legal arrow at Privacy Shield

Privacy Shield, the legal agreement allowing businesses to export Europeans' personal information to the U.S., is under fire.

An Irish privacy advocacy group has challenged the adoption of the decision in the EU's second-highest court, Reuters reported Thursday, citing sources familiar with the case.

Privacy Shield entered effect in July, replacing the Safe Harbor framework, which had itself fallen victim to a legal challenge in October 2015. The new agreement supports transatlantic commerce worth US$260 billion, U.S. Secretary of Commerce Penny Pritzker has said, and has consequences for many companies offering cloud services to consumers.

To read this article in full or to leave a comment, please click here

FCC tells Internet providers to get customer permission before sharing sensitive info

The U.S. Federal Communications Commission has passed rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties.

The FCC on Thursday voted 3-2 to adopt the new broadband privacy rules, which also include requirements that ISPs promptly notify customers of serious data breaches.

Broadband customers need transparency and control over how their data is used, said Jessica Rosenworcel, one of three Democratic commissioners voting for the rules. Broadband providers are increasingly sharing customer data with third-party companies such as advertising networks and analytics firms, she said.

To read this article in full or to leave a comment, please click here

EU privacy watchdogs seek answers from WhatsApp and Yahoo about users' data

European Union privacy watchdogs have warned WhatsApp CEO Jan Koum to stop sharing users' data with parent company Facebook until they investigated whether the transfers comply with EU data protection law. They also want Yahoo's Marissa Mayer to come clean about recent leaks and spying allegations.

In an open letter to Koum published Friday, an umbrella group representing the EU's national data protection authorities expressed its serious concerns at the way WhatsApp users were informed of changes to the company's terms of service and privacy policy, and questioned whether the company had their valid consent to the changes.

To read this article in full or to leave a comment, please click here

How to chat with Google support from your Pixel phone - CNET

Having trouble with your Pixel phone? Google support is at your fingertips.

Google Pixel has a hidden notification light -- here's how to enable it - CNET

There's a hidden notification light on the Pixel. Here's where to find the setting to enable it.

This Android keyboard trick fixes bad autocorrect suggestions - CNET

Get rid of autocorrect's bad habits by taking out the trash.

How to tell if your Apple Lightning cable is fake - CNET

Counterfeit Lightning cables can damage your device. Here's how to make sure you're using Apple-certified products.

Alexa, how can I keep track of the election? - CNET

With the election less than two weeks away, here's how you can use Alexa to help you stay updated on the presidential candidates and the results of the election.

Search engine Shodan knows where your toaster lives - CNET

How did hackers find all the net-connected gadgets they used to attack Dyn and knock out your favorite sites? It's as easy as typing in some search terms.

Today's Apple MacBook event: Live stream, start time and what to expect - CNET

Everything you need to know to follow Apple's event today.

Friday, 28 October 2016

How to create photo reminders in Cortana - CNET

The Windows 10 Anniversary Update brings picture reminders to Cortana's repertoire.

How to download and test Android apps before they're released - CNET

Like living on the bleeding edge when it comes to testing apps on your Android device? Read this.

Here's how to request a verified account on Twitter - CNET

Want the blue checkmark that accompanies a verified account on Twitter? You can now ask for it.

How to view two Safari tabs at the same time on iOS 10 - CNET

It's time to stop making fun of the iPad's inability to view two Safari tabs at the same time.

Laziest Pokemon Go hack helps you hatch eggs without walking - CNET

Don't call it cheating, call it a pro-tip.

Download Amazon videos to your Android SD card - CNET

Good news for storage-strapped Android phone and tablet owners: The Amazon Video app finally supports expansion cards!

How to install the MacOS Sierra public beta - CNET

If you can't wait until the official release of the next Mac OS this fall, then you can use the public beta of MacOS Sierra right now. Here's how to install it.

Everything you need to know about Google's My Activity page - CNET

Yes, Google does know everything about you.

7 things you should know about Prime Day - CNET

Amazon's "holiday of savings" returns July 12. Here's everything you need to know, including what's different this year and how you can make sure you're getting the best deal.

Today's top Prime Day Countdown deals: The name is Bond, James Bond - CNET

Quick! Here's your chance to score The Ultimate Bond Collection on Blu-ray for less than the price of an Aston Martin. Also: sweet TV and Sonos deals.

How to tell if your Android phone has the HummingBad malware - CNET

HummingBad is bad news. Luckily you can find out if you're affected and do something about it.

Never forget about another paid subscription with these trackers - CNET

It's too easy to sign up for new subscription services. It's just as easy to forget about them. Use these apps and sites to help you track and manage all the paid services you subscribe to.

4 ways to stop sleeping with your phone - CNET

Let's get real: You do it, your neighbor does it and we do it, too. But before getting cozy under the covers with your smartphone, consider one of these ways to go to bed solo and proud.

How to uncork a wine bottle with a drill - CNET

If you lose your corkscrew, you can still keep the bottles poppin' with this tip.

Monday, 17 October 2016

Remove NCrypt Ransomware: Easy process to eradicate

This virus quietly insert throughout towards the System while customers study spam mails, insert corrupted CD, Downloading unwanted programs, sharing files via removal devices and other social engineering techniques. NCrypt Ransomware may always be the newest infection that belongs to ransomware family. That offers the chance to inject all Personal Computer System files just about all over the particular globe. Auto infection Removal:

All of us recommend using SpyHunter Malware Safety measures Suite.

You can get SpyHunter & it will detect illness and remove it, by clicking often the download button below. Once installed, SpyHunter will automatically initiate a malware check out that will detect all threats offer on the system, but to unlock the complete potential of the SpyHunter Malware Protection Suite, use it as a removal device, you need to purchase a license.

Download Now

Remove infection from the browser:



Internet Explorer:

Go to Tools -> Internet options -> Enhanced Tab and click the Reset option (make sure to select the Delete Particular Settings checkbox).

*please note that in order to save your favorites, you need to foreign trade them before resetting the web browser as you will lose all personal functions.

After Internet Explorer tidies up the operation, click close option and then re-start it for the fresh changes to take effect.

Google Chrome:

Go to the adhering to path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

Otherwise, you can navigate to these folders by these steps:



For Or windows 7:

1 . Click on Begin in the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows .mov file recovery custom logo in the lower left part of the display.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . On top of the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.

second . Click the Refresh / Reset Internet explorer button in the upper-right corner on the Troubleshooting Information page.

3. To continue, click Refresh as well as Reset Firefox in the confirmation home window that opens.

four. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Finish off and Firefox will reopen.

Delete any folders as well as files related to infection by going through the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download NowThe…

Thursday, 13 October 2016

Remove go.ai.me/click: Simple method to Uninstall

It generally will get enters within to the System through bundling associated with freeware plan which customers download mostly infected…. go.ai.me/click is an advertising platform which in turn promotes alternative party annoying advertisements. The idea comes from adware family. Particular person Guide: How wireless infection Scanner to take out infection

Step 1: First related all, you actually download and fit this Windows Protection in computer to run with administrator privileges.

Step 2: Then at the time of clicking of unquestionably the shortcuts icons on the Windows Laptop or pc and then offer its from launch menu. Once it entirely installed, run software and the commencing a start inside Windows appears from a screen. Instantly discover the scan buttons on to scan Windows routine.

Step 3: Then subsequent choose the Run over Computer Now so as to start complete understand of your notebook computer or computer desktop.

Step 4: Such Windows Scanner have the ability to automatically scan different of threat within your computer files memories, application, cookies, pc as well being other dangerous danger in Windows The pc.

Step 5: In this approach step, after making the scan, visit all the hateful items from if so scanning result in addition to remove all individuals.

Step 6: Sypware Help Table is an built in software features. Nearly always it help on to contact to my security expert people time regarding spyware infection.

Step 7: page you can immediately blocks all entered of malware suggests of enabling System Care for features and mature your computer natural from infection attacks.

Step 8: Now you would certainly see here remaining security option telephoned Network Security. Utilize this feature to successfully secure your service.

Step 9: Located at last you most certainly see the Study Scheduler option plan your scanning solution for daily on the way to uninstall nasty menace and infection.



Download Automatic Code reader to take it out infection







That continues for you to be invented by the team associated with cyber crook with most the intention for you to tends in order to make money through cheats innocent on the internet users

Saturday, 8 October 2016

Remove ws-00921qlk.r.worldssl.net (Easy Steps to uninstall ws-00921qlk.r.worldssl.net

ws-00921qlk.r.worldssl.net is a dodgy website where you'd by no means prefer to visit while On-line browsing. It is actually promoted as browsing assistant that will promises to help a person although online searches and also shopping. Programmed infection Removal:

Many of us recommend using SpyHunter Malware Protection Suite.

You can find SpyHunter & it will detect an infection and remove it, by clicking the particular download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will detect all threats found on the system, but to unlock the total potential of the SpyHunter Malware Protection Suite, use it as a removal software, you need to purchase a license.

Download Now

Remove infection from the browser:

Internet Explorer:

Go to Tools -> Internet options -> Innovative Tab and click the Reset photo recovery key (make sure to select the Delete Individual Settings checkbox).

*please note that in order to save your favorites, you need to move them before resetting the internet browser as you will lose all personal options.



After Internet Explorer finishes the operation, click close option and then re-start it for the brand new changes to take effect.

Google Chrome:



Go to the adhering to path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.

For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle

For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle

As an alternative, you can navigate to these folders by these steps:

For Or windows 7:

1 . Click on Come from the lower left part of the screen.

2 . Choose Run.

3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.

For Windows Vista/7/8:

1 . Click on the Windows emblem in the lower left part of the monitor.

2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.

Mozilla Firefox:

1 . In first place on the Firefox Main window (top-right corner), click the Firefox Menu key, go over to the Help sub-menu and choose Troubleshooting Information.

2 . not Click the Refresh / Reset Opera button in the upper-right corner on the Troubleshooting Information page.

3. To continue, click Refresh and Reset Firefox in the confirmation home window that opens.

5. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click End and Firefox will reopen.

Delete any folders or even files related to infection by exploring the following locations:

%ProgramFiles%

%AppData%

%ProgramData%

%LocalAppData%

Download Nowwhile your PC can be connected with…. but quickly you'd recognize that it is just aim would become to market commercials that are based on pay-per-click

Friday, 7 October 2016

Yahoo's secret email scans helped the FBI probe terrorists

What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. 

The company was searching for a digital "signature" of a communication method used by a state-sponsored terrorist group, according to a new report from The New York Times that provided more details on Yahoo's email scanning.  

The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.

To read this article in full or to leave a comment, please click here

EU privacy watchdogs have questions about Yahoo's secret email scanning

European Union privacy watchdogs are concerned by reports that Yahoo has been secretly scanning its users' email at the request of U.S. intelligence services.

"It goes far beyond what is acceptable," said Johannes Caspar, Commissioner for Data Protection and Freedom of Information in Hamburg, Germany.

Reuters reported on Tuesday that Yahoo had built a system for U.S. government agencies to search all of its users' incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.

To read this article in full or to leave a comment, please click here

FCC to vote on strict privacy rules for ISPs in late October

The U.S. Federal Communications Commission will push forward with controversial privacy regulations that would require broadband providers to get customer permission before using and sharing geolocation, browsing histories, and other personal information.

Broadband providers have complained the proposal puts stronger privacy rules in place for them than for internet companies like Google and Facebook. But FCC Chairman Tom Wheeler has scheduled a final vote on the regulations for Oct. 27.

Broadband customers should have the ability to make informed decisions about their privacy, and the rules are designed to help them, FCC officials said in a press briefing,

To read this article in full or to leave a comment, please click here

Verizon may want a $1 billion discount on Yahoo

Verizon may be getting cold feet with its acquisition of Yahoo. Reportedly, it's asking for a $1 billion discount on the original $4.8 billion deal for the Internet company.

Recent news about Yahoo's massive data breach and its alleged secret email scanning program has diminished the company's value in the eyes of Verizon, according to a Thursday report by the New York Post.

Tim Armstrong, the head of AOL, which Verizon acquired in 2015, reportedly has met with Yahoo executives about reducing the acquisition price.  

"He’s pretty upset about the lack of disclosure and he’s saying can we get out of this or can we reduce the price?" the report said, quoting what it called a source familiar with Verizon's thinking.

To read this article in full or to leave a comment, please click here

How to give Siri access to third-party apps in iOS 10 - CNET

Before you can ask Siri to send cash or messages through third-party apps, you'll need to take an extra step.

How to search Safari tabs in iOS 10 - CNET

Search more, swipe less.

All the music, podcasts and radio services that work with Alexa - CNET

Amazon's Alexa speakers can stream audio from more than just Amazon Music. Below are all the streaming services that work with Alexa.

Wednesday, 5 October 2016

How to encrypt your Facebook messages with Secret Conversations

Good news, privacy enthusiasts: Facebook’s one-on-one encrypted messaging feature called Secret Conversations is now live for all Android and iOS users. 

Secret Conversations allows Messenger users to send end-to-end encrypted messages to their Facebook friends. There are a few caveats, however. First, it only works on a single device. Facebook says it doesn’t have the infrastructure in place to distribute encryption keys across your phone, tablet, and PCs.

secret conversation ios

A beta version of Secret Conversations on iOS.

To read this article in full or to leave a comment, please click here

How to reinstall default apps in Windows 10 - CNET

Here's how to get those default apps back without reinstalling Windows.

This trick lets you navigate around your iPhone's busted bits - CNET

Assistive Touch can be a massive help if your iPhone's buttons are breaking down or broken off.

When and where you can purchase Google Home - CNET

The company's always-on personal assistant now has a price and a release date. Here's what you need to know.

How to enable end-to-end encryption on Facebook Messenger - CNET

Make your convos are super-secret with this Messenger feature.

The difference between Google Now and Google Assistant - CNET

Google's two virtual assistants aren't so different after all.

9 things Google Home can do that Alexa can't - CNET

Google Home is the first major competitor to Amazon's Alexa speakers, and Google came out of the gates swinging. Here are nine things Google Home can do that Alexa still can't.

Windows 10's 'secret' Start menu - CNET

It's not really a secret, but it is a convenient way to access important features.

5 tips for selling on Marketplace, Facebook's version of Craigslist - CNET

Here's how to make your Facebook Marketplace listings pop.

Don't worry -- your OnHub router will work with Google Wifi - CNET

Despite the name difference, Google Wifi and OnHub routers will work seamlessly under a single roof.

How to watch tonight's Mike Pence-Tim Kaine debate - CNET

There are multiple ways to tune in to tonight's vice presidential debate. Here's what you need to know.

Monday, 3 October 2016

How to use the bokeh effect on the iPhone 7 Plus - CNET

The iPhone 7 Plus will get a new portrait mode with the update to iOS 10.1 that lets you take dSLR-like photos right on your phone.

Get to know the security features in the Edge browser - CNET

Microsoft is trying to make its browser as efficient and secure as possible.

Saturday, 1 October 2016

Firefox blocks websites with vulnerable encryption keys

To protect users from cryptographic attacks that can compromise secure web connections, the popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.

Diffie-Hellman is a key exchange protocol that is slowly replacing the widely used RSA key agreement for the TLS  (Transport Layer Security) protocol. Unlike RSA, Diffie-Hellman can be used with TLS's ephemeral modes, which provide forward secrecy -- a property that prevents the decryption of previously captured traffic if the key is cracked at a later time.

However, in May 2015 a team of researchers devised a downgrade attack that could compromise the encryption connection between browsers and servers if those servers supported DHE_EXPORT, a version of Diffie-Hellman key exchange imposed on exported cryptographic systems by the U.S. National Security Agency in the 1990s and which limited the key size to 512 bits. In May 2015 around 7 percent of websites on the internet were vulnerable to the attack, which was dubbed LogJam.

To read this article in full or to leave a comment, please click here

String light Jack-o-lantern: A creative twist without candles - CNET

Windy nights, toddlers and fire hazards can make lighting your Jack-o-lantern with candles seem like a bad idea. You can purchase LED lights to put inside your pumpkin, but there's a more creative solution: a string light pumpkin. This type of Jack-o-lantern puts a bright spin on the traditional carved pumpkin and will wow the neighborhood trick-or-treaters.

How to customize your Alexa speaker's Flash Briefing - CNET

The Flash Briefing is one of the more compelling features of Amazon's Alexa speakers. Use these tips for customizing and getting the most out of your Flash Briefing.

How MacOS Sierra gives back gigs of storage space - CNET

Apple's latest desktop software leans on iCloud Drive to help you offload files from your Mac to the cloud.

Let Apple create some Memories for you - CNET

You make the memories, Apple gives them some structure.

Your iPhone's flashlight has a hidden brightness tool - CNET

Have a 3D Touch-enabled iPhone? Check this out.