Google has updated its privacy terms and conditions on Monday to offer more transparency regarding its email-scanning practices. One of the world’s biggest Web internet giant, Google, made it clear that the information its users submit and share with its systems is all analyzed.
Last year, Google was accused of its illegal interception of all electronic communications sent to Gmail account holders and using the gathering data to sell and place advertisements in order to serve related ads to its users. Practically, the more information you let Google collect about you, the more accurate its adverts become. <READ MORE>
With the end of Windows XP support from Microsoft imminent, perhaps you’ve finally made the (very wise) decision to stop using the vulnerable operating system. I commend you. However, if you’re planning to simply install a newer operating system on your existing hardware, you should reconsider.
Sure, there’s a good chance that your existing hardware meets the minimum system requirements for either OS: a 1GHz or faster processor, 1GB of RAM (2GB for 64-bit), 16GB of hard drive space (20GB for 64-bit) and a DirectX 9 graphics device with WDDM 1.0 or higher.
But although Windows 7 or Windows 8 will technically run on a system like this, it will do so in that way that causes you to frequently threaten your PC and spew profanity laced insults at Microsoft. For either of those operating systems to run moderately well, you need at least a dual-core CPU and 4GB of RAM. And Windows itself may only need 20GB of hard drive storage, but it’s easy to fill 500GB or more with applications, photos, videos, and other content. <READ MORE>
From – The Hacker News, Tuesday, April 08, 2014 by Wang Wei
It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible.
As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.
The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.
OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL. <READ MORE>
Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for its Windows Operating System on the devices with screens smaller than nine inches.
Yes, Free a Windows OS for the Internet of Things (IoTs), such as Mobile Devices, Smart thermostats, Smart TVs, wearable devices etc., that was announced by Microsoft at Build 2014 conference on Wednesday.
“To accelerate the creation of great mobile devices running Windows and grow our number of users, we announced today that Windows will be available for $0 to hardware partners for Windows Phones and tablets smaller than 9” in size,” said Terry Myerson, executive vice president, OS Group at Microsoft and he also added that it will include a one-year subscription to Office 365. <READ MORE>
ON HIGH-PRIORITY YAHOO! is finally rolling out encryption implementation over their site and services in order to protect users. Yahoo is rapidly becoming one of the most aggressive supporters of encryption, as in January this year Yahoo enabled the HTTPS connections by default, that automatically encrypts the connections between users and its email service.
November last year, Yahoo revealed plans to encrypt all information that moves between its data centers and finally from 31st March Yahoo has taken another leap in user-data protection through the deployment of new encryption technologies. <READ MORE>
Hacker News: Wednesday, March 26, 2014 by Wang Wei
The Mysterious Malaysian Airlines flight MH370, a Boeing 777-200 aircraft that has gone missing by the time it flew from Kuala Lumpur to Beijing. The Malaysian Prime Minister had also confirmed that the Malaysia Airlines plane had crashed in a remote part of the southern Indian Ocean.
Cyber Criminals are known to take advantage of major news stories or events where there is a high level of public interest and now Scammers are also targeting tragedy of MH370 to trap innocent Internet users. <READ MORE>
Intuit Small Business Blog, by Brett Snyder on March 19, 2014
As you may recall, Cranky Concierge switched to using Google Apps for email last year to improve the reliability and functionality of our communications system. This past week, however, a quirky little feature left us in hot water with a client. All we could do was fix the problem and rely on our customer-service skills to save face.
If you use Google Apps for email, you probably have Groups set up. This lets you establish a group that acts as an email alias and forwards messages to multiple addresses. Cranky Concierge’s main address (info@) is nothing but a group that forwards email to various employees. <READ MORE>
PC World – Software Security Information, March 24, 2014, by Melissa Riofrio
As Malwarebytes announces its new Anti-Malware Premium suite Monday morning, it comes with a nice present for Windows XP users: lifetime support. Perhaps it isn’t entirely surprising given that, according to the company, 20 percent of its user base remains on Windows XP. Microsoft is actually extending malware support well beyond the XPocalypse date of April 8th, but knowing other companies have your back is a rare bright spot.
From Legal Productivity, By Tim Baran, March 13, 2014
This series on “Working Remotely” is inspired by “Remote,” the book by the 37Signals guys, and by my own experience working remotely for the past six years.
We know the benefits of working remotely and what it takes to be a good remote worker. So you’re a good candidate, your employer is on board, and you’re ready to work from home. But how does one manage a worker who’s no longer working a few steps away?
It starts with trust – David and Jason laid it out clearly in Remote:
If you can’t let your employees work from home out of fear they’ll slack off without your supervision, you’re a babysitter, not a manager. Remote work is very likely the least of your problems. <READ MORE>
Back in June, OIG conducted the hacking test on Indian Health Service’s information systems and computer network, requesting that IHS response staff not be notified of the testing to better gauge employee response. Subsequently, the agency was able to obtain unauthorized access to an IHS Web server and one of its computers, according to a recent OIG report <READ MORE>