Iphone/Ipad and Ipod touch's battery problems have become particularly noticeable with IOS 7.1, in fact battery technology has not advanced as the other features, rather its overall performance is even worsened,.
So let’s have a look to a couple of tips to keep our battery running for as long as possible.Many of these tips are going to be common sense but still valid for the less technology savvy people.
Since Satya Nadella took the reins of Microsoft in February, he is leaving his mark by demonstrating his ability to make the software giant as relevant today as it was back when it promised to put a personal computer on every desk and in every home.
Nadella effort now is focused on re-energizing the 40-year-old Microsoft's corporate culture that has missed the biggest waves in the industry including search and mobile.
After a hard work finally on Tuesday, Nadella brought his Skype team onto the stage and presented a terrific new technology that emulate the Start Trek universal communicator: Skype translation.
Essentially you can speak to someone who speaks a different language and be understood. Skype adds the other person's translations for you in subtitle format at the bottom of the screen. Although it's not an immediate translation as you need to wait until the other person is done speaking before the service starts whirring away.
Microsoft isn't sure how many languages will be included initially. The company will release new languages as they meet the bar for translation quality.
This technology if well implemented has the potential to revolutionize the business world.
It will be made available for all Skype users apparently within the end of the year.
Yesterday morning a number of people across Australia woke up with an unpleasant message on their Iphones.
The hacker who calls himself "Oleg Pliss" systematically froze iPhone, iPad and Mac users out of their own devices, holding them hostage until payments of between $50 and $100 were received.
The hack was conducted by exploiting a weakness in Apple’s “Find My iPhone” feature. In fact the victims who had set a password on their device were able to unlock them without paying the ransom. However, most people without passwords set up prior to the attack were not able to regain access to their device.
As if that was not enough PayPal told the Sydney Morning Herald that the email address in the message is not linked to any account and so anyone who had paid the ransom can be refunded.
To keep your devices from being attacked is simple and involves two steps.
In this way even if the hacker discovers you password he cannot do any changes without having in his hands your Apple device to access your account.
Large number of users switched to the latest versions of Windows since Microsoft officially ended to support Windows XP the 8th of April 2014.
Despite there are still many users that rely on the old operating system, especially some companies and organizations that were unable to migrate to the new systems before the support phase ended, and that are paying Microsoft to get security patches and updates.
Now a registry hack that allows Windows XP to continue receiving update has emerged. In fact the discovered hack will allow receiving security updates until April 2019 and… for FREE.
By making a few changes in the registry of XP, the hack basically tricks the automatic update servers at Microsoft into thinking the OS is Windows Embedded POSReady 2009. The OS is based on Windows XP Service Pack 3 and it will continue to get security updates from Microsoft until April 2019.
For 32-bit versions of Windows XP SP3, tweak the registry by opening Notepad, and pasting in:
Windows Registry Editor Version 5.00
Then Save As xp.reg. Note, the ".reg" file extension, not the default .txt.
For 64-bit versions of XP, there is a workaround on Sebijk.
However is worth to say that is still better to migrate from XP as this operative system is less secure than the other more modern versions. Moreover is likely that Microsoft will find the way to block any updates that use this hack.
For the moment, we like to know that the good old Widows XP is not yet dead.
Ebay on Wednesday released a warning to all its users to change their passwords following a security hack that compromised a database containing encrypted passwords and other non financial data.
Simultaneously the Ecommerce giant reassured its consumers that for the moment there are no evidence of any unauthorized activity or access to financial or credit card information, which they say are kept separately in encrypted format.
Ebay does not seem to be too concerned about this stolen personal information like postal addresses and dates of birth, as they assert the stolen identities could not be used to access other companies owned by the auction site, including PayPal or GumTree.
But others have different thought saying that the repercussions of this data theft could be felt for a long time after the break-in since we are dealing with identity theft.
The fact is that someone in now claiming to have a copy of the Ebay’s stolen database and is selling that for 1.45 bitcoin (£447) via the website Pastebin.
Ebay took two months to discover it had been hacked as no unusual activities were detected until May. Apparently a couple of employees company identities were stolen in February, after that the compromised database, which included eBay customers’ names, encrypted passwords, email addresses, mail addresses, phone numbers, and dates of birth, was hacked between late February and early March.
Ebay realized the attack just recently after the repeated attempts to access a database that was restricted for the two identities.
Now some customers are complaining on eBay Community forums saying that they didn’t receive much information about the breach from eBay and have yet to get notifications by email, which the company has promised to do.
The good part is that apparently Paypal doesn’t seem involved in the security attack.
Nevertheless this is another warning call for organizations that need to take an very careful approach to internet security, hacker are more and more capable and keen to get sensible data.
Cloud computing became a very popular term; everyone is now switching to the cloud.
When it first appeared as a concept, a lot of critics dismissed it as being the latest tech fad. However, cloud computing managed to cut through the hype shifted the paradigm of how IT is done nowadays
But what exactly is “Cloud Computing”? The “cloud”refers to the internet, so when we refer to Cloud Computing we refer to the way data are stored and accessed through an internet connection, this means that people are allowed to access their data anytime and anyplace.
Why is so popular? It is a great and easy way to storage your data, but is it a reliable solution? The answer is no, not at 100%.
Like most things in life, benefits come with risks. Let’s try to understand which are the benefits and if they can outweigh the risks.
In conclusion despite its disadvantages, cloud computing remains a great choice for businesses especially if well contemplated with the right provider. We certainly hope that the advantages will further grow and the disadvantages will be eliminated but the future certainly looks promising.
Google finally released yesterday an update for Google Chrome after fixing the three critical security vulnerabilities of Adobe Flash, Reader and Acrobat that were affecting the Windows, Mac and Linux versions of the browser. In fact before of the update was seriously possible for malicious attacker to take control of user’s operating system.
After paying $ 4,500 to make the better update possible, Google in now encouraging users and administrators to make the necessary updates.
The update is not only available for PC but for Android devices as well, as Chrome is recognized as the most used browser for Androids with over five hundreds millions installs. But although the update contains multiple security and stability update, there are still major issues, like YouTube support for casting videos and full screen video controls, that have not been addressed yet and that could lead in a future loss of popularity for the famous browser,
You can read more about Microsoft Security Bulletin at this link: https://technet.microsoft.com/library/security/ms14-may
More and more often small to large business choose to outsource their IT System. This trend is given to a series of reasons that eventually will bring the cost down and the reliability up.
Let’s have a more detailed look to each of these reasons:
Visit our Service page for more informations or call us at: 07 3871 1222
Computit | IT Support Brisbane
Cryptolocker is an evolution of non familiar ransomware schemes in which the malware encrypts all the files he finds in different network resources, including shared network drives, removable media such as USB sticks, external hard drives, network file shares and some cloud storage service, and ask for the description key that you should get after paying a fee. The goal of all ransomware variants is to extort money from victims in one way or another.
US-Cert sais the number of infections caused by Cryptolocker are rising and is important NOT TO PAY the demanded fee, but instead report it to the Cybercrime Federal Police.
If the red screen notice of Cryptolocker appear on the screen is very important to disconnect the computer from its wireless network immediately as all other computers of the network are then likely to be infected.
Normal antivirus software protection doesn’t provide a great level of security as the antivirus usually detect the malware after few hours, but meanwhile it is able to encrypt thousands of files on the local drive and present the user with the now-familiar bitmap image explaining the attacker’s demand for ransom.
Avoiding ransomware and minimizing its damage is much the same as avoiding other types of other malware.
A good Antivirus software is a must and is aldo important to and keep Windows and browser-related components (Java, Adobe, and the like) updated. Always be wary of unexpected email attachments and spam. (CryptoLocker spreads via .zip files sent as email attachments, for example.)
And just to beat this dead horse one more time: Always have a good backup system in place, this is particularly true for business whose loss of data often mean loss of money and reputation.
If you want to know more about how to protect your data, visit our Service Page.
http://www.computit.com.au/disaster-recovery or call us at 1300 443 507
Computit, IT Company Brisbane
Running a small to medium business can be daunting as you juggle staff, clients, products, suppliers, finances, and the list goes on.
While you’re busy doing all of the above and more, have you ever thought about your business security and the risks that can be posed by your ex-employees? Do you have an exit strategy for your business where staff are given an exit interview, keys handed in and then all computer access removed for them?