At the end of January 2018, Spectre and Meltdown, the biggest security flaws in history, continues to add chapters.
All last week, lots of users complaint Intel has a patching problem. After installing Intel’s Spectre/Meltdown patch, their computers spontaneously reboot.
The executive vice president Neil Shenoy announced bug that causes unusual reboot problem has been found. He told users to stop deploying this patches entirely until they develop a better version. Read the rest of this post »
Published by Andrew Gonzalez on January 23, 2018 3:34 am and last modified on January 23, 2018 3:36 am.
With bitcoin’s popularity soaring, the bitcoin system has been straining to handle the load. Two bitcoin-obsessed engineers, Poon and Dryja met and discussed the central problem of bitcoin. They are trying to make bitcoin more useful.
It turns out that the bitcoin network’s design effectively limits it to handling three to seven transactions per second, compared with tens of thousands per second for Visa. That causes high fee with long transaction time while bitcoin has been famous for instant and free payment all over the world. Read the rest of this post »
Published by Andrew Gonzalez on January 22, 2018 4:54 am and last modified on January 23, 2018 2:34 am.
XUC officially entered OKEX currency transaction zone at 16:00 on January 19. From now on, you can buy XUC with currency from OKEX.
OKEX is one of the leading digital asset transaction platforms in the world. The number of transactions of KEX is one of the largest in the world. Its legal currency transaction zone currently supports BTC/LTC/ETH/ETC/BCH/USDT, and the above currencies are the mainstream currency in the market. This time, XUC ranks on the list which is unprecedented! Read the rest of this post »
Published by Andrew Gonzalez on January 19, 2018 4:16 pm and last modified on January 22, 2018 1:10 am.
A discovery underscores the rising arms race among competing malware developers. More and more aggressive malware has been created to attack mobile device.
Last year, researchers found what was most likely the world’s most sophisticated espionage app ever written for the Android mobile operating system at the time. You need to be more cautious if you are an Android user.
Now, researchers have uncovered a new Android spying platform that includes location-based audio recording and other features that have never been seen in the wild before. It is Skygofree which is much more dangerous than the FBI Ransomware and other police-theme viruses. Read the rest of this post »
Published by Andrew Gonzalez on January 17, 2018 2:30 am and last modified on January 18, 2018 7:48 am.
TorGuard, a virtual private network (VPN) service provider, has started accepting lightning network payments on the bitcoin backbone, although the technology has yet to be officially released. TorGuard made the announcement on Twitter, stating that “testnet is so boring”. TorGuard is not the first company to accept mainnet payments over the Lightning Network. May be later the nascent technology will be used worldwide. Read the rest of this post »
Published by Matt Johnston on January 11, 2018 1:23 pm and last modified on January 11, 2018 1:36 pm.
In the beginning of 2018, we are warned for one of the biggest security flaws in history. The news has emerged about Meltdown and Spectre. A bug in Intel chips allows low-privilege processes to access memory in the computer’s kernel, the machine’s most privileged inner sanctum. The security flaws affect processors made by Intel, AMD, and ARM.
Erik Bosman, a colleague of Gras in Vrije Universiteit Amsterdam’s VUSEC security group, successfully reproduced one of the Intel attacks, which take advantage of a feature in chips known as “speculative execution.” The newly discovered vulnerabilities are devastating because they affect the vast majority of Central Processing Units (CPUs). It is able to affect almost every computer in the world. Read the rest of this post »
Published by Andrew Gonzalez on January 8, 2018 10:03 am and last modified on January 9, 2018 8:37 am.
Facebook has gained world popularity now and is used by almost everyone. It provides the users with the best and easiest methods of connecting with the loved ones, making new connections, or even gathering news and information. A person who has ever thought of traveling to China, and is also an active user of Facebook, will face difficulties once he reaches there. He will lose all connections with the social world. Also, many other social networking sites are banned as well. But does a ban or censorship from the government make any difference? The answer is no. There are methods to access Facebook, and one just has to go through the methods that are listed under to use Facebook successfully through their android phones. Read the rest of this post »
Published by Deb Mirren on December 1, 2017 11:55 pm and last modified on January 17, 2018 7:10 am.
Twitbird is a Popular app and it is a super-fast Twitter client loaded with unique features that’s a joy to use on iPhone, iPod Touch, and iPad. It includes many of the cool features that you’ve seen separately in other Twitter clients but rarely together. From timeline to map search and four beautiful themes, Twitbird offers advanced Twitter functionality beyond your expectations. And with its logical and intuitive interface. If you are traveling to China, then you can’t access Twitbird from there, and it will create a huge problem for you to communicate with the people who know. But there comes a question why is Twitbird banned in China?
The Chinese government has banned a number of well-known social media platforms, that are elsewhere ruling with their connectivity capability. A number of applications and entertainment sites have been blocked as well so that the country does not have to compromise with the security. Basically, the Chinese Government has taken this extreme step to protect the country from terrorism and safeguard the citizens from hacking or anything that concerns cybercrime. There are a number of features that the social media has benefitted the people with. So, while the rest of the world gets the advantages of social media and are able to connect with people across the globe, the Chinese are under the strict scrutiny of the Great Firewall. Though China has social media platforms that are designed in the same manner as twitter or Facebook or Instagram, they are completely different from the others are. Read the rest of this post »
Published by Deb Mirren on November 5, 2017 2:11 pm and last modified on December 20, 2017 12:07 pm.
Bed Rabbit is a suspected variant of the recent ‘Petya’ ransomware that sparked disruption across Europe, according to a number of experts, including the U.S. Computer Emergency Readiness Team. This Ramsomware require victim download a fake Adobe Flash installer from infected websites and manually launch the .exe file, thus infecting themselves. So, it is not easy unlock the infected computer. In order to decrypt the files and lock the whole screen, computer user is asked to pay a fine about 0.05 bitcoin, roughly equivalent to $280. Also, this virus infection will create a “.txt” “.exe” and “.gif” files in the computer and tell the victim how to process the payment. However, some people who have already done the payment, their files are still encrypted. So, we suggest the victims not to pay the so-call fine under no circumstance. If won’t decrypt the files for the victims, it just focus the victims to pay more.
There are many ways for cyber hackers to spread this warning virus to innocent people. It is comes to you unconsciously when you click some links on the website, opened unknown e-mail attachments, or download unknown “free” software and so on. Freeware download websites encourage users to use small download programs (called ‘installers’, ‘download managers’, ‘download tools’, ‘download clients’, and so on) to download the chosen software. Download apps supposedly ease the download process. However, they offer installation of third party applications with the chosen software. When you download some documents or apps which you are interesting, this virus program will also be attached to download, and run as document application. There are also set up that contain the hijacker and users are directed to those sites from links within email messages that are sent out. Some of the emails will not contain the link, but they will instead have an attachment that they will be asked to click on. Once the virus goes into the target device, it may be trying to hijack your android and lock your apps began to generate advertising revenue. We strongly recommend that you don’t do that above behavior, because they are likely to be false. No matter whatever how you get the virus, it is necessary to remove it from your computer before the arrival of more dangerous. Read the rest of this post »
Published by Deb Mirren on October 26, 2017 8:46 am and last modified on November 6, 2017 1:41 am.
My computer is frozen on a fake tech support page. It blocks me from logging in the computer. I can’t get to the desktop. I learn that if i go into Safe Mode or Safe Mode with Networking. I will be able to fix the problem. That is really a good news. But how can i get in Safe Mode with Networking in Windows 10?
Safe Mode is a diagnostic mode of a computer operating system which makes it easier for users to troubleshoot various problems, for instance deleting a violent malware. Under Safe Mode, only such basic startup programs as drivers for keyboard, mouse and the OS itself. Safe Mode with Networking is just the basic Safe Mode where you can access the Internet. “Safe Mode”, “Safe Mode with Networking” and “Safe Mode with Command Prompt” are usually arranged in the same list on the Windows System. If you are first time to use Windows 10 and try to enter into Safe Mode of the system, you will find that the “old methods” of pressing the key of F8 or combination of Shift + F8 keys on the keyboard no longer lead into the list of various Safe Mode at all. The windows 10 system starts up faster than previous systems. This is why the “old methods” stop working. There still exists the Safe Mode list in Windows 10. But it is needed to follow different instructions to boot your computer running windows 10 into Safe Mode with Networking or other options of Safe Mode. In this article, we will discuss two of the most used ways to enter into the option list of Safe Mode. Read the rest of this post »
Published by Sarah Poehler on June 16, 2017 2:26 pm and last modified on June 16, 2017 2:29 pm.