Technologicalbestideas.com

Friday, 30 December 2016

Beware of posting false news in facebook!

Farzana Sharmin


Beware  of posting false news in facebook!  Facebook's fake news problem isn't going away. The company may face steep fines in Germany . if it fails to address it satisfactorily.A bill slated for consideration next year would establish fines of up to $500,000 euros per day for each day that a fake news story persisted
after notification of its falsehood was provided. The legislation, which has bipartisan support, would apply to other sites as well, but Facebook
clearly is its main target.  Following that action system Bangladesh could be being

taken  effective but hard  action applying with the help of  laws.

Thursday, 29 December 2016

Bad news for Adobe and Apple



Farzana Sharmin


Bad news for  Adobe and Apple  in the upcoming year of 2017!More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft's, more attacks on the Internet's infrastructure will occur, and cybersecurity events will stoke international tensions. Those are a few of the predictions for 2017 that security experts shared  .

Users of Apple desktops and laptops for years have been relatively insulated from the kinds of malicious activity that has besieged those in the Windows world, but that's going to change next year, warned Trend Micro.

More software flaws will affect Adobe and Apple in 2017, compared to Microsoft, the company noted in a security predictions report.

Declining PC sales and an exodus to mobile platforms have dampened interest in targeting devices running Windows, Trend Micro explained. Microsoft also has upped its security game in recent times, which has made it more difficult for attackers to find vulnerabilities in Windows.

Follow the Money

Signs of hackers' increased interest in Adobe and Apple started appearing in 2016, Trend Micro noted. Zero day vulnerabilities -- flaws unknown to researchers until malicious actors exploit them -- numbered 135 for Adobe compared to 76 for Microsoft.

Meanwhile, Apple's vulnerability count during the same period increased to 50, shooting up from 25 in 2015.

The increased attention Apple has drawn from criminals can be associated with its growing success in the desktop and laptop market.

"There's a much broader use of Apple products now," said Ed Cabrera, vice president of cybersecurity strategy  .

"The criminals go where consumers and enterprises are," he told . "If consumers and enterprises are utilizing more Apple products, then that's where they're going to focus their activity, because that's where the money is going to be."
Upstream Attacks

Distributed denial of service attacks long have functioned as a cyberweapon against websites, but their use reached a new level in 2016, when they disrupted Internet service in parts of North America and Europe by choking an important piece of Net infrastructure: the domain name system.

The DNS converts domain names into corresponding IP addresses. If a domain name can't be paired with its IP address, then a browser becomes lost on the Net.

More "upstream" attacks on the Internet will take place in 2017, said Chase Cunningham, director of cyberoperations at A10 Networks.

"If you're an enemy of someone who depends on the Internet for business or commerce, last year it was shown that if you upstream a little bit and launch a crafted Denial of Service attack, you can bring down large provider websites and infrastructure," he told .
"In 2017, we're going to see more upstream attacks, and DDoS is going to make a comeback as a cyberweapon," Cunningham said. "We're going to see a powerful denial of service attack on something that will cause problems for a national infrastructure."
Geopolitics Feeding Cyberattacks

Simmering tensions over nations hacking nations will come to a boil in 2017, predicted Tom Kellermann, CEO of Strategic Cyber Ventures.

"Geopolitics will be the harbinger for cyberattacks in 2017," he told .

Those cyberattacks will be fostered by both old and new presidents of the United States.

"Due to the president elect's rhetoric against China, Chinese hacking will begin again with increased vigor," Kellermann said. "North Korea will leverage IoT for more denial of service attacks against the West."

In addition, he continued, Trump's anti-Muslim statements during the presidential campaign have increased the membership of cyberterrorist organizations -- like al-Qaida and the Cyber Caliphate -- that will use their new resources to dismantle and destroy U.S. infrastructure in the coming year.

Russian cyberattacks also will increase.

"Once President Obama takes revenge upon Putin for the hacking of the election and other things, you will see increased cybermilitia activity via Russian proxies in Eastern Europe against the U.S.," Kellermann said.
Election Hangover

A cyberhangover from a divisive and inconclusive presidential election also can be expected in 2017.

"Disillusioned American voters will become more inclined toward hacktivism," Kellermann predicted.

That hacktivism will be more destructive than it has been in the past, he said. For example, ransomware will be used to encrypt data solely for denying access to that data and not for ransom. Malicious software delivering "wiper" payloads, which destroy data, also will increase.

Voter disillusionment could give old line hactivist groups, like Anonymous, a new reason for being.

"Anonymous has been fractured for some time," Kellermann noted. "On Jan. 20, you could see a consolidation of Anonymous once again, for the cause of acting out against the incoming administration."
Breach Diary

    Dec. 12. Quest Diagnoistics, a medical lab operator based in New Jersey, says it's investigating data breach in November that placed at risk the personal health information of some 34,000 people.
    Dec. 13. KFC in the UK advises some 1.2 million members of its Colonel's Club loyalty program to reset their passwords because of an intrusion at program's website.
    Dec. 13. Data for more than 200 million people allegedly from credit agency Experian is being offered on sale on the Dark Web for US$600, CSO Online reports.
    Dec. 13. A 17-year-old youth who previously admitted to cyberattack costing UK telecom company TalkTalk $75 million is sentenced to 12-month rehabilitation order in British court.
    Dec. 13. October data breach at Peachtree Orthopedics in Atlanta put 531,000 people at risk of identity theft, WSB-TV reports.
    Dec. 13. Frederick County Public Schools in Maryland says some 1,000 students who attended public schools between November 2005 and November 2006 are affected by data breach discovered in September.
    Dec. 14. Owner of adultery website Ashley Madison agrees to pay $1.65 million to settle state and federal cases stemming from 2015 data theft of personal information of 37 million users.
    Dec. 14. Yahoo says it's discovered data breach from August 2013 exposing accounts of more than 1 billion users.
    Dec. 14. Joshua Samuel Aaron, 32, arrested in New York City by federal authorities and charged with stealing contact information for more than 100 million customers of American financial institutions, brokerage firms and financial news publishers.
    Dec. 15. Threat intelligence firm Recordfed Future says it's discovered evidence that Russian-speaking hacker may have compromised more than 100 access credentials at U.S. Election Assistance Commission.
    Dec. 15. Protenus reports that the number of healthcare data breaches in November reached an annual high of 57 but records exposed during the month declined from October to 458,639 from 776,533.
    Dec. 15. Prosecutors in Los Angeles issue arrest warrant for Austin Kelvin Onaghinor, 37, for launching cyberattack on county that placed at risk confidential information of 750,000 people.
    Dec. 16. President Barack Obama vows to retaliate against Russia for interfering with U.S. elections by stealing information from computer systems of the Democratic Party.
    Dec. 16. Bleacher Report alerts its online and mobile users it is resetting their passwords in 72 hours due to a data breach of its systems.

Upcoming Security Events

    Dec. 20. Insiders Are the New Malware. 1 p.m. ET. Webinar by Presidio. Free with registration.
    Dec. 22. Part 2: How Is This Yahoo! Breach Different from Their Other Breach? 1 p.m. ET. Webinar by Fidelis Cybersecurity. Free with registration.
    Jan. 6. The 2017 Threatscape. 10 a.m. Webinar by Cyber Management Alliance. Free with registration.
    Jan. 9. 2017 Predictions: Authentication, Identity & Biometrics in a Connected World. 11 a.m. ET. Webinar by BioConnect.
    Jan. 12. 2017 Trends in Information Security. 11 a.m. ET. Webinar by 451 Research. Free with registration.
    Jan. 12. The Rise of Malware-Less Attacks: How Can Endpoint Security Keep Up? 1 p.m. ET. Webinar by Carbon Black. Free with registration.
    Jan. 12. FTC PrivacyCon. Constitution Center, 400 7th St. SW, Washington, D.C. Free.
    Jan. 13. I Heart Security: Developing Enterprise Security Programs for Millennials. 5 p.m. ET. Webinar by NCC Group. Free with registration.
    Jan. 13-14. BSides San Diego. National University, Spectrum Business Park Campus, 9388 Lightwave Ave., San Diego. Tickets: $30 (includes T-shirt).
    Jan. 16. You CAN Measure Your Cyber Security After All. 1 p.m. ET. Webinar by Allure Security Technology. Free with registration.
    Jan. 26. The True State of Security in DevOps and Expert Advice On How to Bridge the Gap. 1 p.m. ET. Webinar by HPE and Coveros. Free with registration.
    Jan. 31. Using GDPR To Your Advantage To Drive Customer Centricity and Trust. 5 a.m. ET. Webinar by Cognizant. Free with registration.
    Feb. 4. BSides Huntsville. Solutions Complex building, Dynetics, 1004 Explorer Blvd.,Huntsville, Alabama. Tickets: $10.
    Feb. 13-17. RSA USA Conference. Moscone Center, San Francisco. Full Conference Pass: before Nov. 11, $1,695; before Jan. 14, $1,995; before Feb. 11, $2,395; after Feb. 10, $2,695.
    Feb. 21. Top Trends That Will Shape Your Cybersecurity Strategy in 2017. 11 a.m. ET. Webinar by vArmour, American University, TruSTAR and Cryptzone.
    Feb. 25. BSides NoVa. CIT Building, 2214 Rock Hill Rd.#600, Herndon, Virginia. Tickets: conference, $25; workshops, $10.
    Feb. 28. Key Steps to Implement & Maintain PCI DSS Compliance in 2017. 1 p.m. ET. Webinar by HPE Security.
    March 28-31. Black Hat Asia. Marinia Bay Sands, Singapore. Registration: before Jan. 28, S$1,375; before March 25, S$1,850; after March 24, S$2,050.



(SOURCE # Farzana Sharmin)

Monday, 26 December 2016

100 Chrysler Pacifica hybrid minivans

Farzana Sharmin


Waymo,  unveiled a fleet of 100 Chrysler Pacifica hybrid minivans with the latest high-tech sensors, telematics, and other gear designed for fully autonomous operation.

Modifications were made to several parts of the Pacifica -- including its electrical, powertrain, chassis and structural systems -- to optimize it for fully autonomous driving.

With the additional computer equipment, the cars will undergo more challenging tests. They will be subjected to a broader variety of traffic and weather conditions, as well as other variables, with the goal of being ready for introduction by 2017.


 The announcement comes just days after Waymo unveiled new branding and a new team of executives, amid increasing competition to bring autonomous vehicles to the U.S. market.

The joint program team has worked to integrate the self-driving computers and other systems into the Chrysler Pacifica minivans to get them ready for use, noted Waymo CEO John Krafcik. The work has included more than 200 hours of extreme-weather testing since the companies originally announced the partnership in June.

Waymo and Fiat Chrysler have co-located part of their engineering teams to a new facility in southeastern Michigan to speed development. The companies also have conducted extensive testing at FCA's Chelsea Proving Grounds in Chelsea, Michigan, and the Arizona Proving Grounds in Yucca, Arizona, as well as Waymo's test track in California.

FCA sells cars under the Chrysler, Jeep, Dodge, Ram and SRT performance vehicle brands. The firm also distributes under the Alfa Romeo and Topar brands. (source - website)

Friday, 23 December 2016

Samsung Galaxy S8


 Farzana Sharmin


Since from Last  Wednesday the people of technological world  have engaged arguments about  new feature of Samsung may include in its upcoming Galaxy S8. It's dubbed "Beast Mode," and that's just about all that is known about it so far.

Spotted in an EU trademark application, Beast Mode would apply to smartphones, mobile phones and application software for smartphones, noted Galaxy Club, a Netherlands-based blog.

The Galaxy S8 is expected to be the first smartphone built around Qualcomm's Snapdragon 835 processor. If true, that lines up with the notion that Beast Mode could allow super high performance.

Another rumor is that the Galaxy S8 will have an optical fingerprint scanner built into the display instead of the body.

Further, it's rumored that it will include Bluetooth 5.0, recently approved by the Bluetooth Special Interest Group -- and that idea seems to carry a fair amount of weight.

"There's a strong possibility that Samsung will incorporate Bluetooth 5 into the Galaxy S8," said Ken Hyers, director of wireless device strategies at Strategy Analytics.

"With the cancellation of the Note7, the Galaxy S8 is now [Samsung's] premier device to showcase the latest and best smartphone technology," he told .

Samsung had to institute a global recall of millions of Galaxy Note7s after multiple instances in which the device spontaneously burst into flames. Some replacement devices also caught fire.

"Samsung has a PR problem," observed Michael Jude, a program manager at Stratecast/Frost & Sullivan. "Note7 is a disaster, and they need something with which to seize the technological high ground."

Putting cutting-edge technologies in the S8 "will help a lot," he told .

"Remember, practically nothing is Bluetooth 5-compliant," Jude noted. "As long as the S8 can talk to existing Bluetooth devices, it's golden. People will be drawn to the latest, greatest technology."

Bluetooth 5.0 doesn't replace 4.0, 4.1 or 4.2. It extends the functionality of these previous versions of the Bluetooth Core Specification.

Further, Bluetooth 5.0 lets manufacturers leverage interoperability and performance improvements incorporated in the core specs since 4.2 was released.

"From Bluetooth headsets and speakers to home control, personal robots and drones, Bluetooth is a default technology for connecting devices, with the smartphone as the hub of consumers' device universe," Strategy Analytics' Hyers remarked.

"We are rapidly moving into a more complex connected device world," he pointed out.

Samsung has focused heavily on the Internet of Things, offering smart TVs and smart appliances that can be tied to its smartphones.

Bluetooth 5 "is a huge advance over previous versions of Bluetooth from a connectivity speed and capacity standpoint," Hyers pointed out, noting that it's a natural fit for Samsung's next flagship device.

The S8 will "be both a mass market flagship and a showcase for Samsung's technological leadership" since the company has canceled its Note series of phablets, he said.

Therefore, Samsung "will be careful to only put technology and features in it that it's certain will not create issues," Hyers contended. As a relatively low-risk feature, Bluetooth 5 likely will appear in the S8 in Q1 2017.


Bluetooth 5.0 offers 2Mbps of bandwidth, twice that of Bluetooth 4.2, with low energy.

The bandwidth can be decreased to achieve up to 4x the broadcast range of Bluetooth 4.2 with the same power requirement. That means home automation and security devices can cover entire homes, buildings or locations.

Developers can adjust the broadcast range, speed and security for different environments.

Bluetooth 5.0 delivers reliable Internet of Things connections, and it will increase the relevance of beacons and other location awareness technologies, which will enable a seamless IoT experience.

It also has ad extensions that enable more efficient use of broadcasting channels on the 2.4 GHz band.

Slot availability masks can detect and prevent interference on neighboring bands. (SOURCE - WEBSITE)

Thursday, 22 December 2016

To create apps

 Farzana Sharmin


Some  apps out there that can do everything from put you in the pilot's seat during an epic spaceship battle to exploring the ocean's depths in a dive suit. But Facebook and Google plan to invest even more.

For Google, that means continued efforts to bring its suite of apps, such as YouTube and Google Earth, to VR.

 That's similar to the approach it took with its Android software for mobile phones a decade ago. Teams at the company built and then refined apps for Google's services, helping attract the billions of people who use its site while also offering new designs and technologies for developers to create their own apps.

"We want to start early and iterate as much as possible," said Andrey Doronichev, group product manager of VR products at Google. He was also one of the first Googlers creating apps for Android too. "To make the best services the way we think we can make them, having our own platform to move as fast as we need is very helpful."

One of the things he's focused on: alternative ways to use VR, such as with art and news, in addition to playing games and watching movies. So far, Google has released five VR apps for Daydream, including YouTube and "Arts + Culture." And there are already more than 50 apps total in the app store for Daydream.




(Source # website)

Monday, 19 December 2016

Video shows a game being played around the office

 Farzana Sharmin

There are many wonderful technological device have changed our life positively. Among of them 
awe-inspiring video Magic Leap unveiled last year is not a demo of its still-secretive mixed reality technology, but a bit of sleight of hand from special effects firm Weta Workshop, which is credited at the beginning and end of the clip.

Magic Leap's post -- titled "Just another day in the office at Magic Leap" -- claims the video shows a game being played around the office.

The true nature of the video was exposed last week in a report published by The Information.

"Most of us thought that video was a demo of the technology -- not a film created by a special effects company," said Rob Enderle, principal analyst at the Enderle Group.

"I expect some of the folks that invested in the company likely thought so as well, and that could be considered fraud," he told .

The ray guns shown in the video apparently are Dr. Grordbort's Infallible Aether Oscillators, which exist in designer Greg Broadmore's satirical parallel universe.

Weta CEO Richard Taylor, a founding director of Magic Leap, reportedly is collaborating with the firm on a mixed reality game set in the world of "Dr. Grordbort's Invaders. (source- website)





Saturday, 17 December 2016

Luis Von Ahn ; . CAPTCHA Inventor

Luis Von Ahn is latest famous and respectable figure in technological world.


Ask Luis Von Ahn why he decided to become an entrepreneur and he will tell you that the career actually chose him. When he was a professor at Carnegie Mellon in 2005, he developed a program that websites could use to distinguish humans from robots. CAPTCHA became so popular that school officials urged Von Ahn to turn the program into something more.

"At some point the university was kicking the project out because it had too many users and they just said, 'You can't be in the university, you have to do something about it,'" he says. "I had to turn it into a company."

In 2006, he received a prestigious six-figure MacArthur Fellowship, otherwise known as the "Genius Grant," which also recognized his work with CAPTCHA. In 2011, when, the entrepreneur estimates, his CAPTCHA system was digitizing two-and-a-half million books a year, he launched his new initiative, the free tool for language learners, Duolingo.

Though he never planned for entrepreneurship to be his career path, Von Ahn does appreciate the fortuity. He came from a family of business people. In Guatemala, his parents owned one of the largest candy producers in the country, Tropical Candy.Today, there are 1.2 billion people around the world learning a new language and 150 million of them, aged seven to 95, are now using Von Ahn's website Duolingo to do that learning for free.

But reaching this milestone has been no easy feat. Here are some of the challenges Von Ahn has needed to overcome.In April 2011, Von Ahn gave a TED talk about how collaboration online could be used for the greater good. He recounted how CAPTCHA has helped digitize books and how he hoped to use his Duolingo to help millions of people learn a new language at no cost.

"That talk got watched by two million people," he says, "and that was luck that it coincided [with the company's launch]."

As the company continues to launch new features, he hopes to attract even more followers, but he says that's one of the most difficult parts of growing his company: Getting, and retaining, an audience.As most companies do, Duolingo started small.

Perhaps one of the biggest mistakes that Von Ahn says he made early on was making the wrong hires, and choosing inexperienced people. Employees were expected to assume different roles and recent graduates were tapped even though they sometimes lacked the proper background for their roles.

Ultimately, he learned that choosing individuals with the right experiences and skills was crucial.

Making mistakes, the entrepreneur says, is the way that he gained the skills he needed to grow the company. And Duolingo does keep expanding, as well as launching new features. Its latest? Chat bots to help users practice a new language using artificial intelligence.




Friday, 16 December 2016

Snakes Robots

Farzana Sharmin


 Recently  mind blowing Robots with the advantages of a snakes has found in technological market place

Now here’s an idea that is truly “outside the box!” This innovation, which uses nature for inspiration, is just one incredible example of biomimicry; a growing field of science at the intersection of engineering, design, and biology.

First, a quick look at where we are going today…


Consider the many dirty jobs that, performed by humans, endanger lives, or jobs that require access to small spaces, spaces that even conventional robots, with limbs or wheels, could never access.   Consider the possibility for assisting in minimally-invasive surgery, for inspection of power plants, for aiding in search and rescue efforts, in archaeological digs.

When one considers the many fields of work and disciplines of study in which we humans are engaged, and the number of associated problems we are trying to solve, it becomes clear that the snake robot has a lot of potential indeed!

We found a short video from a conference that explores the reaches of the snake robot’s potential. Let’s take a little trip into the future of this extraordinary technology, with a video courtesy of the Huffington Post:If you’d like to read more about the snake robot story, here’s a link to a darn good article by Fox News called Snake Robots: Slithering machines could aid search and rescue efforts.

Snake robots aren’t just interesting creepy crawlies, they offer us a chance to explore our world and enhance our experience.



Source # website

Thursday, 15 December 2016

1 billion customers accounts being hacked in Yahoo

Farzana Sharmin


1 billion customers  accounts being hacked  record in Yahoo recently. .The company said Wednesday that it was hit by yet another hacking attack, this time affecting more than 1 billion user accounts. That's double the number affected by a hack revealed in September.

The hack occurred in August 2013. Stolen data included users' names, email addresses, telephone numbers, dates of birth, and encrypted passwords. Those passwords are scrambled up with an encryption tool called MD5, which experts say is possible to crack with some patience. The data also included some security questions and answers, some of which weren't encrypted.


Yahoo president and CEO Marissa Mayer speaks at an event 2015 in San Francisco.



"Yahoo is notifying potentially affected users and has taken steps to secure their accounts, including requiring users to change their passwords," the company said in a statement. "Yahoo has also invalidated unencrypted security questions and answers so that they cannot be used to access an account."

Among the victims are more than 150,000 US government and military employees, presenting a threat to national security, according to a Bloomberg report. The accounts belong to current and former White House staff, congressmen and their aides, FBI agents, officials at the National Security Agency, the Central Intelligence Agency, the Office of the Director of National Intelligence, and each branch of the US military.

The breach is another black eye for Chief Executive Marissa Mayer, who joined Yahoo in 2012 amid great fanfare. The former Google executive was charged with turning Yahoo around and tried to bring the lumbering company into the smartphone era. She made big bets on mobile, refreshing all of the company's mobile apps, but Yahoo hasn't been able to make much money off her projects.

The announcement caps off a rough few months for the troubled tech giant and leaves another blemish on a company seeking to sell itself to Verizon. When Yahoo announced a separate data breach in September, in which hackers in 2014 swiped user information from half a billion accounts, it was said to be the biggest cybersecurity breach ever.

Two weeks later, the company again came under fire after a report said Yahoo built tools to surveil customers' emails for US intelligence officials.

All the while, Yahoo has been awaiting its fate with Verizon, which agreed to buy the company for $4.8 billion in July. The deal is set to close in the first quarter of next year, but Yahoo's disclosure of the previous hack had given Verizon executives pause about the deal.

"We are confident in Yahoo's value and we continue to work toward integration with Verizon," a Yahoo spokeswoman said Wednesday.


Source # website

Wednesday, 14 December 2016

Portable speaker of Laptop Computer

Farzana Sharmin


The speaker of Laptop Computer is very important  supplimentary technological device in twenty first century. Without speaker
laptops would become un complete device.There are many kind of portable speaker of laptop technological devices now  in technological market.

US $2.9 - 5 / Piece | 1000 Piece/Pieces
Supply Ability:   200000 Piece/Pieces per Month

Port:Shenzhen



Source # website



Sunday, 4 December 2016

Virtual flirting app creat threat for children

Farzana Sharmin

Yellow has been compared to the dating app Tinder, as users swipe right and left on profiles to connect with strangers.

Unlike Tinder, which has a minimum age of 18, Yellow has no age checks.

Under 18s can only speak to other under 18s on the app, but there's no mechanism to stop adults lying about their age and pretending to be children.It has led to concerns that Yellow, which claims to have five million users, puts children at risk of predators.

In a statement, the creators of the app played down these fears.
To avoid deviant behaviours". Lisa McCrindle, policy manager at the N The makers of a controversial app, which the NSPCC fears trying   to make developing tools .

They told Sky News: "As a matter of fact, we are looking for the best compromise between privacy and users' security."

They said that Yellow is not a location-based dating application. But in their own marketing material, they call Yellow a "virtual flirting app".

The makers of Yellow added: "We have been developing a set of tools to avoid deviant behaviours."SPCC, told Sky News that the app's focus on encouraging strangers to network "is a risk when we're talking about children".

She said: "We do know that those who are seeking to groom children will use this mechanism and can do it incredibly quickly to start to groom a child, until they make sexual contact,  making sexual requests of a child.

"Some research suggests that that can happen within 20 minutes of contact."

From foreign journal