1 "TAKE NO AS A QUESTION ": TECHNOLOGY
Showing posts with label TECHNOLOGY. Show all posts
Showing posts with label TECHNOLOGY. Show all posts

Sunday 22 November 2015

Nearly Half of India's Internet Population Hit by Cyber-Attacks: Norton


Nearly Half of India's Internet Population Hit by Cyber-Attacks: Norton

mobile_user_ap_112.jpg
The Digital India initiative by our government is an ambitious move, to say the least. Indian Prime Minister Narendra Modi envisions a country in which a number of crucial sectors of our economy embrace the Internet to foster growth, expansion, and accessibility. Of the many things the government is working on, one is connecting rural areas with high-speed Internet networks. This has the potential to significantly ramp up our efforts in education, health, entertainment, and business among other spaces, and revitalise our economy as a whole. However, our cyber-security awareness and efforts continue to lag behind the curve.
A recent report said a large number of Internet users in the country don't hesitate sharing their bank credentials with others. People also continue to download and install apps, music, and movies from unsafe sources - to save money - that is crippling their security and privacy, a conclusion security firm Norton by Symantec has reached. The company first shared the insight with a few journalists at a media conference in New Delhi on Thursday.
As more people come online, and access a smartphone for the first time, it has become more crucial than ever that they are aware of the security implications that these services and facilities come tied with. But as has been found, we continue to remain ignorant about the basics of how the Web works, and what these "smart" devices are doing behind the scenes.
The India-specific report by Norton by Symantec said that as many as 113 million users were affected by a form of online attacks in the past year. On an average, an affected individual loses roughly Rs. 16,000 dealing with the fallout of cybercrimes, and as many as 30 hours in the aftermath of such an attack. "In the past year, 48 percent of India's online population or approximately 113 million Indians were affected by online crime," said Ritesh Chopra, Country Manager, India, Norton by Symantec. The firm found these conclusions looking into an online survey of more than 17,000 devices users with age of 18 or above across 17 markets.
One would expect the younger generation - people with base age of around 24 years - to be more educated about how to handle their digital world, because they grew up in a period when the Internet started getting traction, and different companies cropped up to offer their services. But that isn't the case. On the contrary, this subset of user base has been flagged as one of the most immature by Norton.
The firm reports that four out of ten such people live under the impression that they aren't "interesting enough" to be a target of an online crime. Reality is, Norton said, seven in ten of such people have experience a form of cybercrime, with as many as five in just the last 12 months. People around the average age of 55, on the other hand, are in a better position.
That's a dreadful statistic for a country with a young population and in which hundreds of thousands of smartphones are sold every few seconds, and thousands of people mark their arrival on the Interweb. And that also highlights the challenges we've in front of us that need to be sorted.
When asked if cyber awareness among people has gotten better over the past year, Chopra told Gadgets 360 that we're seeing a mixed result. While many people are getting hold of these aspects of the digital world, there are thousands of new people that come online everyday that don't.
The state of current security is already worrisome, with hackers devising new ways to circumvent the security our devices offer. We're seeing an increasing number of sophisticated attacks in which our devices are locked down, and attackers demand for a ransom. Attackers have also found ways to hack IoT devices, and get access to the Wi-Fi network they are connected to compromise the whole networkand the devices that they are connected to. But these are sophisticated attacks that we can also understand when we're aware of the basics, and have made others aware of them as well.
But aren't our operating systems getting better? GoogleApple, and Microsoft continue to tout the level of sophistication their products and services have reached with each new iteration. Chopra told us that while good guys continue to protect us, bad guys are balancing the equation by finding vulnerabilities and new ways to hack at an equally staggering rate.
What exactly is compromising our security?
People trust others with their password
Norton said that as many as 60 percent of users in the country are sharing credentials of two email accounts with others (global average is 55 percent). Around 55 percent of people share the passwords of their social media accounts (global average is 43 percent), and a staggering 36 percent Indian users share credentials of their bank accounts as opposed to 27 percent across the globe.
Obsession with freeware and means to get free alternatives
Many users continue to flock to shady websites to get free apps, and download copyright infringed content. What many people don't realise is that these files are highly likely to be riddled with malware or adware of some kind. As we've seen in the past, attackers are aggressively targeting such users.
Many users also like to use freeware products. While there are many great freeware apps and services available in the market, one has to understand the business model these providers maintain to sustain, said Chopra. As has been in the case of AVG - whose AVG Free security suite is highly popular - the company was found selling the data it had obtained from its users to marketers.
As has been previously reported, many apps on Google Play seek permission to information that they absolutely do not need for proper functioning. One needs to be careful while installing and needs to check the kind of things that particular app requires to function. A torch app must not get access to your contacts and text messages, for instance.
Easily sharing information
People continue to readily share their personal information such as their mobile phone number. "While entering this hotel, you provided your contact information at the registration desk." said Chopra, giving a simple example of how people don't think twice before sharing their information. "Who knows who goes through that register and gets your information," he added, jokingly revealing that he often provides a fake data to avoid the consequences such as telemarketing companies mysteriously getting their number.
Not using a secure password
People continue to use same password for all the services, and these passwords are generally not secure (combination of at least eight letters, number and symbols). As we've seen in previous reports, there are plenty of people who still use passwords such as "12345."
"I dream of Digital India where cyber-security becomes integral part of national security," Modi had said earlier this year. At the current state, we've a lot of work to do if we want to stay secure.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Top 5 Android Games From India You Must Play

Top 5 Android Games From India You Must Play


It's that time of the year when our lives get consumed by big budget console or PC games. From shooters like Call of Duty: Black Ops 3 to more nuanced fare like Fallout 4, there's a game for everyone. But even if you don't own a decent enough console or PC, there's a lot of entertainment to be had on mobiles and tablets. A surprising number of these are developed in India, and no, none of the ones we're listing are digital takes on existing games like Teen Patti or Rummy. Here are our top 5 picks:
1. Little Life: Adaptivity
Odd name aside, this is a quirky puzzle platformer whose visuals remind you of a simpler time. Rest assured, its levels are anything but simple. With responsive controls and surprisingly addictive gameplay, there's little wrong with this Android debut effort by developer Prasanna Kumar K K. Check it out on Google Play.
little_life_adaptivity.png
2. Samosa
This running game sports art direction that's seemingly inspired by monochrome indie darling Limbo, except with liberal splashes of red to make things seem all the more macabre. You'll drive an auto-rickshaw through hordes of enemies and trick it out with some interesting weapons to boot. As for the naming after a fried snack? It's actually a portmanteau of the game's hero and villain, Sam and Osa. Grab it on Android via Google Play.
samosa_spells.jpg

3. Scribbled Arena
Sporting a neat hand drawn art style, Scribbled Arena is a top down multiplayer shooter that has you controlling a tank across a few well-realised levels. It promises deep customisation options and has more than a few power-ups to help you even the odds. With more content promised in months to come, it's shaping up to be more than just a precursor to the PC version we checked out at IGX. You can download it for your Android smartphone.
scribbled_arena.jpeg
4. Huemory
The premise of Huemory is simple. Select a colour and remember where it is on the screen. Tap correctly and quickly enough and you progress to more complex levels. There's your usual host of power-ups and traps as well. But perhaps its biggest strength is its minimal aesthetic. Well worth looking into if you prefer your games to be a little more cerebral. Available on Google Play.
huememory.jpg

5. Avion Flight Simulator 2015
Winner of the Nasscom Game Developer Conference 2015 Indie Game of the year, Avion Flight Simulator 2015 is a polished, fun affair. It features 12 aircraft and 5 missions per aircraft, apart from a free flight mode for each plane. Add to that three difficulty levels for each mission, and you can see that this game doesn't suffer from a lack of content. There's an Airbus A380, Boeing 747-8 and a military expansion pack in the works as well. Out on Google Play.
avion_flight_simulator_2015_flying_no_fuel.jpg
What will you be playing? Let us know via the comments.



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Mobile Locked Unless You Pay the Ransom? Could Happen to You in 2016



Mobile Locked Unless You Pay the Ransom? Could Happen to You in 2016

Software security firm Kaspersky Lab is holding the APAC Cyber Security Summit in Malaysia, where it is talking about the current security trends and threats faced by individuals and businesses in the region and across the world.
Gadgets 360 spoke to Vitaly Kamluk, Principal Security Researcher at Kaspersky Lab, who discussed Kaspersky's predictions for the global security landscape in 2016. Here they are:
1) Ransomware
Ransomware is a relative new online phenomenon, where the victims are locked out of their devices, unless they pay a ransom to the attacker. Since most users don't back up their devices, many agree to pay to get access to their important data. It a lot more appealing to attackers as well, since the payout is immediate, especially when compared to traditional attacks where they had to steal financial information and then use it to gain access to the money.
According to Kamluk, the amounts involved in ransomware attacks are usually not too huge, and users are also less likely to report such cases, which decreases the possibility of attracting attention from government authorities. As a result, he sees ransomware attacks getting really popular in 2016.
Mobile ransomware is already a reality and Kamluk believes it will be one of the biggest trends in 2016, with users being locked out of their mobiles unless they pay up the ransom. According to Sergey Lozhkin, Senior Security Researcher at Kaspersky, 98 percent of all current mobile malware targets Android, which should tell you which set of users needs to worry the most about this trend.
OS X could also be another target in 2016, and Kamluk believes attackers see Mac users as more affluent, so they could be asked to pay bigger ransoms than their PC counterparts. IoT ransomware will also be on the rise, and it's hard to disagree with Kamluk on this one - we'd hate to be locked out of our Internet-connected refrigerator, and will happily pay up whatever is necessary to get our hands on the pizza inside come meal time.
kaspersky_lab_summit_ndtv.jpg
2) Attacks on researchers and developers
Kamluk believes researchers will be one of the top targets in 2016, as attackers will try to compromise popular tools used for reverse engineering, virtualisation, debugging, and even various PGP implementation themselves. Code repositories like Github and other channels frequented by developers could be another popular target as a way of injecting code into the entire ecosystem. This means we could see more XcodeGhost-like incidents in 2016.
3) Financial attacks
Kamluk hinted that payment systems like Apple Pay and Android Pay are on the radar of hackers and the next big attack could be used to exploit one of more of these systems. He admitted that the company predicated the same for 2015, and as these systems become deployed in more markets, the probability of such an attack increases.
4) Abuse of trust
One of the biggest threats in 2016 will come from the comprise of websites that consumers implicitly trust, for example the Intranet or Sharepoint, which are used to share information within a company.
5) Extortion and shaming
According to Kamluk, 2016 will see more cyber-extortion and shaming attacks similar to this year'sAshley Madison case.
6) The end of APT
This one is for those who track security trends rather closely. Kamluk believes the Advance Persistent Threats - or ATPs as they are known in the security world - will see a decline in 2016. However, don't go celebrating just yet, as Kaspersky sees newer memory-resident or file-less malware replacing them, which will be even harder to detect.
kaspersky_lab_summit_slide.jpg
Disclosure: Kaspersky Lab sponsored the correspondent's flights and accommodation for the event in Malaysia.



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Microsoft Lumia 950, Lumia 950 XL India Launch Tipped for November 30


Microsoft Lumia 950, Lumia 950 XL India Launch Tipped for November 30

microsoft_lumia_950_dual_sim.jpg
If you're looking forward to purchasing the new Microsoft Lumia 950 or Microsoft Lumia 950 XL in India, you might not have to wait till next month. The company has an event scheduled for November 30, in which it is expected to launch the flagship handsets.
At its Future Unveiled conference in Mumbai earlier this month, Microsoft CEO Satya Nadellaannounced that the company plans to launch both its newly launched Windows 10 Mobile-powered handsets in India by December. It appears we might not have to wait till the end of the year. Windows Central reports that the company is planning to launch the Lumia 950 as well as the Lumia 950 XL in all likelihood in India on November 30. Microsoft India confirmed an event on November 30 with Gadgets 360, however, it didn't reveal what it plans to launch on the day.
Windows Central further notes that the company is also likely to launch the Display Dock, the device that allows a Windows 10 Mobile handset to connect to a large monitor and switch to Windows 10-like desktop mode. At this point, we don't know how much Microsoft will ask for these handsets or the Display Dock.
For a refresh, the Lumia 950, which starts at $549 (roughly Rs. 35,800) in the US, comes with a 5.2-inch QHD display of pixel density 564ppi. It is powered by a 1.8GHz hexa-core Qualcomm Snapdragon 808SoC, 3GB of RAM, and 32GB of inbuilt storage that's expandable via microSD card (up to 200GB).
The Lumia 950 XL, which starts at $649 (roughly Rs. 42,300), sports a 5.7-inch QHD display with a pixel density of 518ppi. It is powered by a 2GHz octa-core Qualcomm Snapdragon 810 SoC, 3GB of RAM, and 32GB of inbuilt storage that's expandable via microSD card (up to 200GB).
Both handsets are liquid cooled, and come with an adaptive antenna technology. In addition, both feature USB Type-C port (USB 3.1), with support for faster charging. The Lumia 950 and Lumia 950 XL handsets come equipped with a 20-megapixel rear camera with 4K video recording capability, OIS, and an f/1.9 aperture. There's also a 5-megapixel sensor placed upfront with an f/2.4 aperture, which can shoot full-HD videos. Both the Lumia handsets run Microsoft's new mobile operating system, Windows 10 Mobile.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Xiaomi Redmi Note 2 Pro, Mi Pad 2 Teased Ahead of Tuesday's Launch


Xiaomi Redmi Note 2 Pro, Mi Pad 2 Teased Ahead of Tuesday's Launch

Xiaomi has already confirmed a launch event on Tuesday where the company is expected to reveal the new Redmi Note 2 Pro. The company has been teasing the handset in continuous teasers. Now, Xiaomi has shared a new teaser possibly showing the next-generation Mi Pad 2, as well as a fresh teaser for the Redmi Note 2 Pro.
Bin Lin, Co-Founder and President, Xiaomi, has shared an image on Weibo showing the sides of the Mi Pad 2 tablet that is now expected to be showcased at the company's Tuesday event alongside the Redmi Note 2. The teaser image appears to confirm that the Mi Pad 2 tablet will feature metal body. Considering that the first generation MiPad (First Impressions) tablet did sport a plastic build, we will have to wait for the company's Tuesday launch event to see if Xiaomi has in fact chosen to use a metal body.
The company also shared a new teaser image for its Redmi Note 2 Pro tipping the thin profile of the handset.
xiaomi_redmi_note_2_pro_teaser_weibo.jpg
Xiaomi so far has already confirmed that the Redmi Note 2 Pro will feature a metal body and fingerprint scanner. The company in its teaser images has corroborated previous leaks of the Xiaomi Redmi Note 2 Pro, showing a circular camera lens at the back followed by a dual-tone flash below and a circular fingerprint sensor placed below it. It also showed the metal-clad smartphone in Gold colour version.
The Xiaomi Redmi Note 2 Pro was recently spotted in a Tenaa listing. As per the listing, the smartphone may feature MediaTek's MT6795 Helio X10 processor; a 5.5-inch full-HD display; 2GB of RAM; 16GB of inbuilt storage; a 13-megapixel rear camera, a 5-megapixel front camera, Android 5.0 Lollipop, and pack a 3060mAh battery. It also adds that the Redmi Note 2 Pro will measure 149.9x75.9x8.7mm and weigh 165 grams. The Redmi Note 2 Pro is tipped to share the same specifications as the Redmi Note 2. The only difference would be an inclusion of a fingerprint sensor and a metal build.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


10 Tips to Cut Down Your Mobile Data Bill



10 Tips to Cut Down Your Mobile Data Bill 

Is your smartphone running up huge bills on data usage and throwing your budget out of control? We've all been there, and here are a few simple tips that you can follow to save some money. These are ideas we've tried out ourselves, and can tell you that they work. What's more, you won't just save money by reducing 3G or 4G mobile data usage, but will also use less of our battery as a bonus.
1) Schedule app updates over Wi-Fi
When app updates happen over your cellular data, even something as simple as loading a webpage can become slow. The continued mobile data use also heats up your phone and eats up your battery. There's an easy way to prevent this from happening though, on both Android and iOS. Updating apps on Wi-Fi can help lower your mobile data usage, and make a big impact on overall bandwidth savings. Check if you have this setting enabled. 

auto_update_android_1.jpg

On Android, open the Play Store app, then tap the menu button in the top left. Here, tap on Settings. Under "General," tap on Auto-update apps, and select Auto-update apps over Wi-Fi only.
On iOS, tap on Settings > iTunes & App Store, then scroll down and turn off the Use Mobile Datatoggle to make your phone does automatic updates on Wi-Fi only.
2) Disable Wi-Fi Assist
Disabling Wi-Fi Assist, a new iOS 9 setting that's enabled by default, can help save cellular bandwidth too. Wi-Fi Assist automatically switches to cellular in the event of a poor Wi-Fi connection. You can disable this feature in Settings > Cellular and then tapping on Wi-Fi Assist.
auto_update_android_1.jpg
3) Enable data compression while browsing
Chrome's Data Saver feature, available on almost every major computing platform, uses Google's servers to reduce the amount of data that gets downloaded when you visit a site. Data savings are dependent on the type of content you're accessing. Google claims that you can save up to 50 percent of data by enabling the feature, by tapping on Settings > Data Saver
Data_savings_opera_3.jpg
Data compression features are also built into Opera's suite of web browsers - Opera and Opera Mini. In Opera, you can adjust the image quality and enable video compression in the Settings tab, while Opera Mini 11 gives the user a choice between High or Extreme compression modesUC Browser also introduced data compression this year. For more details on this setting, visit the help docs hosted on the websites of OperaChrome, and UC Browser.
4) Enable system-wide data compression using Opera Max
The previous tip will help you save data while browsing, but what about other popular apps? Opera's data management app on Android compresses videos, photos and media over mobile and Wi-Fi networks across most apps, and claims bandwidth savings of up to 50 percent. The app also provides an App Management option that lets the user control background app usage over Wi-Fi or cellular bandwidth. 
Opera_Max_4.jpg
5) Disable media auto-download for WhatsApp
WhatsApp can turn into a major bandwidth hog with auto-download turned on. Fortunately, you can toggle the settings to disable auto-download for images over cellular or Wi-Fi for audio and videos sent by your contacts and groups.
media_autodownload_whatsapp_5.jpg
(Also seeWhatsApp - How to Stop Auto Downloading and Saving of Photos)

To do this, just launch the app, then go to Menu > Settings > Chats and calls > Media auto-download. There tap on When using mobile data and de-select all the options, and tap OK to save your settings.
6) Switch mail sync to manual
If heavy email attachments are bogging your phone down, Gmail's app on Android allows you to switch Sync off. The settings, accessed in Menu > Settings in the Gmail app, also lets you set the time period for data that needs to be synced.
gmailsync_5.jpg
7) Disable Cellular Data on an app-wise basis
In iOS, you can turn off Push Notifications in Settings > Notifications, and turn off cellular data off for any app in Settings > Mobile data.
auto_update_android_1.jpg
On Android, you can disable background data by tapping on Settings > Mobile Data, then tap on the app and tick Restrict background data. Enabling the setting ensures that the apps won't consume any data unless you are actively using them.

8) Use Greenify, if you don't have Android M
App Standby, a new feature only available on Android Marshmallow devices prevents seldom used apps from using your network data, sending you push notifications and draining your battery. This setting is enabled by default on Android M devices, those on an earlier version can install Greenify, which lets you send misbehaving apps on hibernation. 
greenify_datasaver_8.jpg
9) Disable auto-play on Facebook and Twitter
If you're a heavy social media user, disabling auto-play of videos on both these platforms can give your bandwidth some respite. We've published an article detailing how you can do that for Facebook, covering iOS and Android.
videoautoplay_disable_9.jpg

For Twitter, the setting can be accessed from menu on the top right of the screen. Tap on Settings > General > Video autoplay, and tap on choose the Never play videos automatically option. On iOS, this setting is available in the Settings menu for Twitter. Just Tap on Video autoplay > Never play videos automatically to disable it.
10) Cache Google Maps for offline use
Google Maps lets you save a map area the size of 120,000 square kilometers on your smartphone, with navigation functionality. This feature is available on both iOS and Android, and was rolled out this month. If you're living somewhere where this feature is already available, it could make a big impact on battery life as well as data consumption, if you use maps regularly to get around. Remember you will miss out on features like live traffic updates.
google_maps_offline_navigation.jpg
Others
Ad blockers, RSS feed readers, Facebook's Instant Articles, and apps like Pocket, which lets you sync your reading for offline use can help manage your media diet without taxing your bandwidth plan. Paying for apps can also help reduce network usage, according to a study conducted earlier this year.
Do you have any other ideas on saving your phone's bandwidth? Sound off in the comments below.



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Lenovo Vibe S1 With Dual-Front Cameras Set to Launch in India on Monday


Lenovo Vibe S1 With Dual-Front Cameras Set to Launch in India on Monday

lenovo_vibe_s1_ndtv_1.jpg
Lenovo has sent invites for the launch of its Vibe S1 smartphone in India on Monday. The company is holding an event in New Delhi to launch the smartphone.
The Lenovo Vibe S1 smartphone was unveiled in September during the IFA 2015 trade show in Berlin alongside Lenovo P1 and Lenovo P1m. The Android 5.0 Lollipop-based Lenovo Vibe S1 features a 5-inch full-HD (1080x1920) display. The highlight of the smartphone are its dual front cameras. It sports 8-megapixel and 2-megapixel front-facing cameras. The company at the time of the launch said "The 8-megapixel primary front camera takes the sharpest photos and a 2-megapixel secondary front camera analyses depth of field information."
lenovo_vibe_s1_teaser.jpg

The handset also sports several built-in photo editing tools such as Blur, which allows refocusing anywhere on the selfie (up to 3 focal plains), and Cut Out, allows users to cut out people from a selfie and then superimpose them on another image. There Lenovo Vibe S1 also sports a 13-megapixel rear camera. It sports a 7.8mm thin profile and weighs 132 grams. Under the hood, the smartphone is powered by a 64-bit quad-core MediaTek processor coupled with 3GB of RAM. The smartphone offers 32GB of built-in storage and supports expandable storage via microSD (up to 128GB). Running Android 5.0 Lollipop, the smartphone supports 4G LTE connectivity, features a 2500mAh battery, and will be available in Pearl White and Midnight Blue colours.


Display

5.00-inch

Processor

 octa-core

Front Camera

 8-megapixel

Resolution

 1080x1920 pixels

RAM

 3GB

OS

 Android 5.0

Storage

32GB

Rear Camera

13-megapixel

Battery capacity

2500mAh


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Pepsi Phone P1s With 5.5-Inch Display, Android 5.1 Lollipop Launched


Pepsi Phone P1s With 5.5-Inch Display, Android 5.1 Lollipop Launched

Pepsi-branded smartphones and accessories were announced to be in the works last month. The popular Pepsi brand on Thursday took the wraps off the Phone P1 and Phone P1s in China. The food and beverage company is however running a crowdfunding campaign to produce the smartphone.
It's worth noting that Pepsi is only licensing its brand for use on smartphones and accessories, while Shenzhen-based Scooby Communication Equipment company will be manufacturing the first smartphones. The company has revealed two versions of its first smartphone: Phone P1 is the regular version while the Phone P1s is compatible specifically with China Unicom's FDD-LTE support. There are no other differences in specifications between the two variants.
The Pepsi Phone P1s (and P1) is now available via crowdfunding campaign from jd.com in China. The early bidders (now sold out) were offered a price of CNY 499 (approximately Rs. 5,000). The phone was then available at CNY 699 (approximately Rs. 7,250) for next 1,000 bidders, after which it will be available for CNY 999 (approximately Rs. 10,500) and followed by CNY 1,299 (approximately Rs. 13,470) until the target has been achieved. The company has set a target of CNY 3 million (approximately Rs. 3,10,69,901) by December 3 and at the time of writing had raised CNY 637,614 (approximately Rs. 66,03,534).
pepsi_phone_p1_rear.jpg
For specifications, the Pepsi Phone P1s (and P1) features a 5.5-inch 2.5D curved display with a resolution of 1080x1920 pixels. It runs dido OS 6.1 version based on Android 5.1 Lollipop. The smartphones feature hybrid dual-SIM card slots, with the second slot usable for either a microSD card or a SIM card.
The Phone P1s (and P1) is powered by a 1.7GHz octa-core MediaTek (MT6592) processor with 2GB of LPDDR3 RAM. It comes with 16GB inbuilt storage and supports expandable storage via microSD card (up to 64GB). The phones sports 13-megapixel rear camera while there is a 5-megapixel front camera also on board. It is backed by a 3000mAh battery.
The 4G LTE-enabled Pepsi Phone P1s supports Bluetooth, 3G, GPRS/ EDGE, Micro-USB, and GPS. The smartphone also features a fingerprint scanner at the back panel just below the primary camera.
The handset comes with accelerometer, ambient light, and proximity sensors. It measures 152.2x76.2x7.7mm and weighs 158 grams. The Pepsi Phone P1s will be available in Blue, Gold, and Silver colours.


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


Sunday 15 November 2015

Hackers-for-hire played key role in JPMorgan, Fidelity breaches


Hackers-for-hire played key role in JPMorgan, Fidelity breaches

NEW YORK/SAN FRANCISCO: 
When US prosecutors this week charged two Israelis and an American fugitive with raking in hundreds of millions of dollars in one of the largest and most complex cases of cyberfraud ever exposed, they also provided an unusual look into the burgeoning industry of criminal hackers for hire.

The trio, who are accused of orchestrating massive computer breaches at JPMorgan Chase & Co and other financial firms, as well as a series of other major offences, did little if any hacking themselves, the federal indictments and a previous civil case brought by the US Securities and Exchange Commission indicate.

Rather, they constructed a criminal conglomerate with activities ranging from pump-and-dump stock fraud to internet casino break-ins and unlicensed bitcoin trading. And just like many legitimate corporations, they outsourced much of their technology needs.

"They clearly had to recruit co-conspirators and have that type of hacker-for-hire," said Austin Berglas, former assistant special agent in charge of the FBI's New York cyber division, who worked the JPMorgan case before he left the agency in May. "This is the first case where it's that clear of a connection."

Berglas, who now heads cyber-investigations for private firm K2 Intelligence, said additional major cases of freelance hacking will come to light, especially as more people become familiar with online tools such as Tor that seek to conceal a user's identity and location.

Rented time

This week's indictments accused a hacker referred to as "co-conspirator 1" of installing malicious software on the servers of multiple victims at the direction of Gery Shalon, the alleged mastermind of the scheme now under arrest in Israel. A second indictment charges a man referred to as John Doe, believed to be in Russia, for an attack on online trading firm E*Trade.

Officials have not said if the co-conspirator and John Doe were the same person, or even if the FBI knows their true identities.

Law enforcement and computer security officials say that outsourced cybercrime services -- including rented time on networks of previously compromised personal computers and custom break-ins - are most readily found on underground Russian-language computer forums, where skilled attackers advertise their services.

The forums are tight-knit communities where newbies must be vouched for by multiple known members and pay membership fees that cost thousands of dollars, said Daniel Cohen, who oversees an undercover team at EMC Corp's RSA Security that monitors the forums.

"You can find anything you want for an operation. Hackers, servers, software, code writing. They are all available," said Cohen. Individuals hide their identities even from each other, making infiltration and arrests rare.

In this case, the ringleaders are accused of hiring hackers to steal contact information and other data that they then used to help convince ordinary investors to buy little-regulated stocks. Prosecutors have not disclosed how the hackers were compensated.

Fees vary greatly in the cyber-underground, depending on the complexity of the assignment and supply of talent available to do a particular job. Elite hackers who pull off the most technically challenging attacks might get a percentage of profits, while others might earn an hourly rate or get paid a few thousand dollars for winning access to a target's network, researchers said.

Pump-and-dump

All three of those accused this week -- Shalon, Joshua Samuel Aaron, who is at large, and Ziv Orenstein, who is also in jail in Israel -- began promoting penny stocks before the hacks took place, according to US government claims.

They used websites including Pennystockdiscoveries.com and Stockcastle.com to send emails as part of a scheme in which they invested in penny stocks, spread false information to boost their prices, and then sold them to make windfall profits, according to an SEC suit filed in July.

Orenstein's lawyer declined to comment, and Shalon's lawyer did not return messages seeking comment.

In one case in early 2012, the SEC claims that they used the website Stockcastle.com to promote shares in Mustang Alliances Inc, reaping $2.2 million, the largest pump-and-dump cited in the regulator's lawsuit. In March of that year, the British Virgin Islands Financial Services Commission issued an alert warning that two entities tied to Stockcastle were falsely claiming to be registered in the territory.

That same year, the enterprise began a massive hacking spree to get contact information for investors who might be good targets, according to prosecutors. By the end of 2013 they had ordered up six hacks that provided data on tens of millions of customers, prosecutors said.

They hit the mother lode in 2014 when they attacked three other firms, and stole data on 83 million customers from JP Morgan alone, prosecutors said.

In addition to JP Morgan and E*Trade, the firms attacked included the mutual fund giant Fidelity Investments, Scottrade, TD Ameritrade Holding Corp and News Corp's Dow Jones unit, the publisher of the Wall Street Journal, according to court documents and people familiar with the cases.

"To do a 'pump-and-dump' operation, you no longer need 30 people behind phones in a strip mall," said Shane Shook, a security consultant specializing in investigating financial breaches. All you need is to find a hacker on a Dark Web forum to provide addresses from customers of financial services firms like Fidelity or JPMorgan, then hire a spam service to push out promotional emails, he said.

Shalon bragged about the stock manipulation scheme, telling the hacker known as co-conspirator 1 in a web chat message that it was "a small step towards a large empire," according to the indictment.

His plan, Shalon told the hacker, was to distribute "mailers" on stocks to those customers. The hacker asked if buying stocks was popular in America, the indictment said, prompting Shalon to reply: "It's like drinking freaking vodka in Russia."

Shalon ultimately made good on his promise to build an empire, according to the indictments. Profits from the pump-and-dump fed into a sprawling conglomerate including offshore Internet casinos and payment-processing services for other criminal operators, such as counterfeit pharmaceutical makers. Shalon also allegedly directed hackers to attack rival casinos, stealing customer data and temporarily bringing down their websites with denial-of-service attacks, which are easily commissioned online.

Butterfly and Hidden Lynx 

While this week's indictments opened the first major criminal case involving outsourced hacking, there have been other substantial break-ins that researchers believe were contract jobs.


Researchers at Symantec in July attributed a series of precision breaches at Apple, Facebook, Microsoft and Twitter in 2012 and 2013 to a sophisticated gang called Butterfly, which also attacked law firms and pharmaceutical companies.
Computer security firm Symantec concluded that the group likely works for hire, either for a client looking for financial gain in the stock market or for competitors. How Butterfly gets hired remains unclear.


Tech criminologist Marc Goodman, author of the book 'Future Crimes', says another group, dubbed Hidden Lynx by Symantec, may consist of contractors moonlighting from jobs with the Chinese military.
"It's crime as a service," "Goodman said. "They take all the pain out of it."


Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


'Startup founders, not cricketers, are the new Indian idols'

'Startup founders, not cricketers, are the new Indian idols'

"Whom do you idolize?"



At school or college, in competitions of every nature, from friends and family members, the question of who one wants to be like in a few years seems to crop up invariably. Over a decade ago, when I was growing up, the answer would largely cover a few regular names. A celebrated cricketer, an astronaut, maybe an actor, a social worker, a historical figure or perhaps a businessman or two. Circa 2015, however, things are decidedly different.
The same question quickly gets answers like Jack Ma, Steve Jobs, Lei Jun, Mark Zuckerberg ... the list goes on. There is an equally large number of Indian entrepreneurs and startup CEOs that a college-goer or a fresh professional hero-worships ardently. The youngsters are closely following their international idols' every step, every tweet, every interview as they have become almost synonymous with that romantic notion of 'following your passion'.

Many of the top entrepreneurs in the country today are engineering graduates from regular middle-class families. Most of them have no political connections, great family wealth or business inheritance backing them. They are, therefore, symbolic of completely self-made success.
Unlike the earlier generations that often viewed business as the preserve of those who have the clout and the luck to navigate through the country's red-tapism, startup pundits make it clear that no obstacle is too large. In addition, many entrepreneurs are viewed as mavericks. They have made a success of their companies entirely on their own terms, doing things differently and always taking the uncharted path. These elements make for a highly palatable recipe as far as the youth goes.


Young adults today don't want to be told what the set path is. They don't want to believe that if they do things differently, success will elude them. This is exactly what their startup idols personify. The new-age entrepreneur's zany policies, belief in ideas against all odds, innovative strategies, courage, confidence and complete disregard for traditional parameters of judgment validate the youth's own desire for freedom, flexibility and love for the unconventional.

What also makes the new-age entrepreneurs connect with the youth is how they leverage technology. Many of these founders and CEOs have either found a solution to a real-life problem through technology or have just managed to make life simpler and smoother using tech.


Tech, as we all know, is something that the youth is most passionate about and feels strongly about. A man who makes booking a cab a matter of seconds is bound to be liked and admired by the youth. He who makes a phone recharge possible in the middle of the night also automatically becomes someone the young citizen views with affinity.


The fact is new-age entrepreneurs have their finger on the pulse of the youth and offer solutions and technologies that wow them.



Hi guys If u like this post please leave a comment in comment box... comment box will top right of every post and bottom of every post. its useful for me give a better information.. check top of the blog there is menu bar in that go to comments i replied for u r comments because there is no direct option for reply for u r comments. if u want to give any suggestion in bottom of blog there is contact information option please leave a msgs with u r mail id sure i will get u.


HTML Comment Box is loading comments...
MARUTHU Copyright@2014. Powered by Blogger.