Lizabeth Wolf

Lizabeth Wolf

Google just released its top trending searches list for 2016, and the results won't surprise you at all.

Donald Trump, Hillary Clinton, and the election topped this year's list, along with notable sports figures like Michael Phelps and Simone Biles. One breakout hit was mobile gaming, including Pokémon Go and Slither.io, which topped App Store charts and attracted millions of users.

Google broke the results down by the top Google searches and the top people searches (although the people list did not include those who died in the last year).

Here are the top 20 people and searches from Google in 2016.

10. Kevin Durant

10. Kevin Durant

In what was called a "stunning move," Kevin Durant signed to the Golden State Warriors in July. The former Oklahoma City Thunder small forward inked the two-year deal after the Warriors achieved one of the best regular-season records in NBA history last season at 73 wins and 9 losses.

9. Usain Bolt

9. Usain Bolt

Usain Bolt completed the elusive triple-triple at the Rio Olympics this summer, winning the 4 x 100-meter relay, the 100 meters, and the 200 meters for the third straight time. 

8. Cam Newton

8. Cam Newton

It's been a tough season for Carolina Panthers quarterback Cam Newton. Newton has taken several blows to the head, suffering a concussion against the Atlanta Falcons earlier this season and taking several late hits by defenders. Experts inside the NFL are worried about Newton's safety on the field and would be "stunned" if he lasted longer than a few years in the NFL. 

7. Simone Biles

7. Simone Biles

After her first showing at the Olympic games in Rio this past summer, Simone Biles was quickly a fan favorite. But she also proved to be one of the best gymnasts the US team has ever seen, and possibly the best gymnast in history. Biles won five medals at the games, including four gold. 

6. Ryan Lochte

6. Ryan Lochte

Despite being one of the best swimmers in US history, Ryan Lochte fell from grace this summer after lying about being robbed at gunpoint in Rio. Lochte's lies were quickly exposed, resulting in the swimmer losing sponsorship deals and being suspended from competing for 10 months. 

5. Steven Avery

5. Steven Avery

After the documentary "Making a Murderer" premiered on Netflix, its subject, Steven Avery, became the subject of national fascination. Avery spent years in prison for a crime he says he didn't commit, but after being released, wound up in prison again after being accused of murder along with his nephew, Brendan Dassey. A judge overturned Dassey's conviction in August, but Avery remains behind bars.

4. Bernie Sanders

4. Bernie Sanders

The Vermont senator was a strong contender for the Democratic presidential nomination in 2016, fighting a tough battle against former Secretary of State Hillary Clinton, who eventually clinched the nomination. Sanders was an outspoken critic of money in politics and captured the allegiance of those who wanted universal higher education and health care. 

3. Michael Phelps

3. Michael Phelps

After finishing up the 2016 Olympic games with a grand total of 28 medals — 23 of them gold — Michael Phelps said he's officially retired from professional swimming. His teammates don't believe he's actually done, but Phelps said at the time that he's just "ready for something different."

2. Hillary Clinton

2. Hillary Clinton

The democratic presidential nominee and former Secretary of State was the heavy favorite to win the 2016 presidential election, leading in every national poll before the race. But Republican nominee Donald Trump won the election by clinching the electoral college vote (although Clinton won the popular vote nationwide).

1. Donald Trump

1. Donald Trump

Donald Trump ran for president on a platform of cleaning up Washington and bringing jobs back to the US, a message that resonated with those who were hoping for change. Trump won the election in November and will take office on January 20. 

Searches

10. Hillary Clinton

10. Hillary Clinton

The 2016 election was fraught with scandal, Hillary Clinton's email servers and handling of the Benghazi situation being frequent topics of conversation. The Democratic nominee has since blamed FBI director James Comey for her defeat in November after Comey reopened his examination of the email server just days before the election. 

9. Election

9. Election

The 2016 election will likely go down as one of the most scandalous and divisive elections in US history, resulting in widespread protests and speculation of hacking and election fraud in the days following Trump's win. 

8. Trump

8. Trump

Donald Trump has spent the weeks following his election meeting with potential cabinet members and setting up plans to take office in a little more than a month. The president-elect met with President Obama in November to discuss the transfer of power and foreign and domestic policy. 

7. David Bowie

7. David Bowie

In January, legendary musician David Bowie died of cancer at age 69. The beloved British rocker was known for his flamboyant persona, Ziggy Stardust, and left behind a new album, "Blackstar," which was released only a few days after his death. 

6. Olympics

6. Olympics

Despite concerns that Rio wasn't ready to host the 2016 Olympics, the games went off mostly without a hitch — unless you count pool water that turned bright green and one faked robbery. The US women's gymnastics team dominated the competition, winning team gold and several individual gold medals between them. 

5. Slither.io

5. Slither.io

A fresh take on the old cell phone game "Snake," Slither.io topped App Store charts this year. The addictive game unseated Snapchat as the top free app, winning over fans by being simple, easy to play, and entertaining. 

4. Pokémon Go

4. Pokémon Go

Pokémon Go took over the world this summer, winning over fans of the original "Pokémon" and new players who traversed city streets, parks, and even national cemeteries to catch Pokémon. The free app quickly became the most popular mobile game in history. 

3. Hurricane Matthew

3. Hurricane Matthew

Hurricane Matthew hit the Caribbean and Southeast US in October, devastating island nations like Haiti and knocking out power for more than 400,000 people on the East Coast. The storm caused beach erosion, flooding, and was responsible for at least four deaths in the US and hundreds in Haiti. 

2. Prince

2. Prince

Prince died in April at the age of 57. While the cause of death wasn't announced at the time, it was later reported that Prince was suffering from an opiod addiction and was found with the prescription drug Percocet in his system and at his home. 

1. Powerball

1. Powerball

It was a year of massive, million-dollar Powerball drawings. In January, the Powerball reached $1.5 billion, a record amount that was won by three people in California, Florida, and Tennessee. In May, the ninth-largest US lottery prize in history was awarded in New Jersey when the payout reached $429.6 million.

Author: Avery Hartmans
Source: http://www.businessinsider.com/top-google-searches-of-2016-2016-12/#10-kevin-durant-2

 

Why hack Android devices one at a time when you can infect local Wi-Fi access points with an Android Trojan and use DNS hijacking to hack every device connected to that network?

Researchers at Kaspersky Lab reported their encounter with a new type of Android malware, which they call "Trojan.AndroidOS.Switcher" and which is doing almost exactly that: Once it wakes up and determines it's on a targeted wireless network, the malware runs a brute force attack on the local Wi-Fi router password. If successful, the malware resets the default domain name system (DNS) servers to its own servers. From there, almost any kind of attack is possible on other devices or systems connected to that network.

"Instead of attacking a user, it attacks the Wi-Fi network the user is connected to, or, to be precise, the wireless router that serves the network," wrote Nikita Buchka, mobile malware analyst at Kaspersky, in a blog post. The new Android Trojan gains access to the router by a brute-force password-guessing attack on the router's admin web interface. "If the attack succeeds, the malware changes the addresses of the DNS servers in the router's settings, thereby rerouting all DNS queries from devices in the attacked Wi-Fi network to the servers of the cybercriminals -- such an attack is also known as DNS hijacking."

Because devices usually reset their default DNS server configuration to reflect the defaults configured in the local Wi-Fi router, this new Android Trojan can force devices connected through the router to point to rogue DNS servers under the control of the attacker. The result, Buchka wrote, is that "after gaining access to a router's DNS settings, one can control almost all the traffic in the network served by this router."

If successfully installed on a router, Buchka wrote, the Switcher malware can expose users to "a wide range of attacks" such as phishing schemes. "The main danger of such tampering with routers' [settings] is that the new settings will survive even a reboot of the router, and it is very difficult to find out that the DNS has been hijacked," he wrote. "Even if the rogue DNS servers are disabled for some time, the secondary DNS, which was set to 8.8.8.8, will be used, so users and/or IT will not be alerted."

By setting the secondary DNS server to Google's DNS service, located at IP address 8.8.8.8, the attackers ensure that even if their own malicious DNS server is unavailable, users won't experience any outage.

Once in place on a user's Android device, Switcher checks for the local wireless network's basic service set identifier -- the MAC address of the local network's access point -- and reports it to the Trojan's command and control network before going to work on brute-forcing, and reconfiguring, the router. The malware also attempts to identify which internet service provider is being used so that it can reconfigure the router to use one of three rogue DNS servers, and then it runs the brute-force attack on the router's web interface for system administration.

The Kaspersky researchers reported two versions of the Android Trojan: One masquerading as a mobile client for the Chinese search engine Baidu, and the other a fake version of another popular Chinese app used to share Wi-Fi access information. Based on its analysis of input field names hardcoded in the malware, as well as the structure of HTML files the Android Trojan attempts to access, Kaspersky judged that Switcher affects only TP-LINK Wi-Fi routers.

The actor responsible for Switcher piggybacked its command and control system on top of a website it set up to promote its fake Wi-Fi access app; according to Kaspersky, the site also includes an infection counter for Switcher. Kaspersky reported that 1,280 Wi-Fi networks had been successfully infiltrated. Kaspersky recommended users check their DNS configurations to see if any of the rogue DNS servers (101.200.147.153, 112.33.13.11 and 120.76.249.59) have been configured. If a network has been infected, the attack can be mitigated by resetting the DNS server configuration and resetting the default router administration password; the attack can also be prevented by changing the default user ID and password for administering vulnerable routers.

 

Author: Peter Loshin
Source: http://searchsecurity.techtarget.com/news/450410127/Switcher-Android-Trojan-targets-routers-with-rogue-DNS-servers

 

 

A recent report conducted by cybersecurity firm Recorded Future shows that most of the cybercriminals earn between $1,000 and $3,000 a month, however, 20 percent make about $20,000 per month.

According to report author Andrei Barysevich, director of Recorded Future, the data is based on a survey conducted by a closed underground community. He says the security company posted a survey while investigating invitation-only underground internet and dark web hacker forums.

“We actually saw criminals who made way more than that, $50,000 to $200,000 a month,” Barysevich said. “This is what they keep, this is not revenues, but pure profit. This is what they can spend on loose women, fast cars, and nice clothes.”

The researcher said he was quite surprised how many cybercriminals participated in the survey (a couple of hundreds), and revealed details how they worked anonymously. However, the results did not surprise him.

“What we saw actually supported our previous research,” he said. “Recorded Future has been gathering information about cybercriminals for years. Our job involves engaging with cybercriminals and we talk to them all the time. And they share with us quite intimate details, which city they are in if they actually have a regular job if they have families. And we see a lot of weird stuff.”

Barysevich added that most cybercriminals work part time and for some of them, cybercrime is a family business.

“We’ve seen several generations that engaged in cybercriminal activity,” the researcher said. “We’ve seen messages between bad guys, with one guy complaining that today his wife was only able to purchase cheap electronics with stolen credit cards, worth a few hundred dollars, while as his father was doing Internet crime.”

According to Barysevich, the biggest demographic group are individuals with no criminal records, no ties to organized crime, with steady jobs. Many of these hackers got involved in cybercrime while they were in college and continued their operation afterward. However, the director of Recorded Future added, the most dangerous cybercriminals are those who run criminal syndicates.

“Team members tend to have strong ties in real life and often are respected members of their communities, viewed by many as successful businessmen and entrepreneurs,” the report goes by. “The group will often have a diversified investment portfolio and maintain a presence in real estate, hospitality, and auto-related businesses.”

“They are not dilettantes,” Barysevich said. “They are professionals, but in real life, and in cybercrime. They plan their operations very carefully, they have trusted people on the team of different professionals, so they have lawyers and ex-law enforcement officers. They also have professional forgers if they need to establish shell companies and need fake documents. They have people responsible for money laundering. They have real estate developers that help them build a legitimate business empire on the profits they make from illegal activities.”

 

Barysevich added that cybercriminal organizations mirror traditional mafia groups.

Author:  BENJAMIN VITÁRIS

Source:  https://www.deepdotweb.com/2016/12/14/report-cybercriminals-make-1000-3000-per-month

The makers of Firefox are today introducing a new mobile web browser for iOS users that puts private browsing at the forefront of the user experience. Called Firefox Focus, the mobile browser by default blocks ad trackers, and erases your browsing history, including your passwords and cookies.

The end result is a simplified browser that may load web pages more quickly, the company claims, given that ads and other web trackers can bog down pages and impact performance.

The app was originally launched on the App Store almost a year ago, but at the time was designed as an ad-blocking utility that could remove ads and trackers from iPhone’s Safari browser. That feature is still available in the revamped app, but it’s now aiming to compete more directly with Safari, too.

The browser itself doesn’t have any bells and whistles compared to its rivals, however. There are no tabs, no list of favorite sites, or numerous other configuration options. Instead, a trip to the Settings section only lets you toggle on or off the data you want to block, like ad trackers, analytics trackers, social trackers, other content trackers and web fonts.

Oddly, given the widespread privacy issues Yahoo is facing in the wake of one of the largest data breaches of all time, Firefox Focus has opted to use Yahoo Search as its default search engine. There doesn’t appear to be a way to change this in the current version, which is frustrating. (Update: Mozilla says search engine choice will arrive in a later release. Other markets outside the U.S. may have a different engine than Yahoo.)

Pointing users to Google may seem counterintuitive for a company focused on protecting personal data, but eliminating user choice in such a Big Brother-like fashion under the guise of knowing what’s best is off-putting, as well.screen-shot-2016-11-17-at-10-57-11-am

After you complete a web search, you can erase that activity with a simple press of an “erase” button. Firefox Focus could have automated this, but there’s something about manually clearing a search that feels cathartic.

Despite an increased interest in privacy — especially now, following this period of tumultuous political upheaval here in the U.S. — Firefox may again be too late the game to compete. Already, the top mobile browser makers offer private browsing modes, and there are a number of third-parties that have made private browsing a focus for years, like Tor. The App Store, too, is filled with utilities for private browsing, including a number of startups like Ghostery, Dolphin, Brave and others.

Once one of the world’s top browsers in the desktop era, Firefox didn’t really weather the shift to mobile. Instead of jumping to produce a mobile-friendly browser for the dominant platforms, it protested against the App Store’s restrictions, refusing to build an iOS versionfor years. That finally changed, and Firefox for iOS launched to all around a year ago. But it simply was too late to matter.

The new Firefox Focus is a free download on the Apple App Store. No word on if or when an Android version will be ready.

Author:  Sarah Perez

Source:  https://techcrunch.com

When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from all kinds of cyber-threats.

Today majority of Internet users are vulnerable to cyber attacks, not because they aren't using any best antivirus software or other security measures, but because they are using weak passwords to secure their online accounts.

Passwords are your last lines of defense against online threats. Just look back to some recent data breaches and cyber attacks, including high-profile data breach at OPM (United States Office of Personnel Management) and the extra-marital affair site Ashley Madison, that led to the exposure of hundreds of millions of records online.

Although you can not control data breaches, it is still important to create strong passwords that can withstand dictionary and brute-force attacks.

You see, the longer and more complex your password is, the much harder it is crack.

How to Stay Secure Online?

Security researchers have always advised online users to create long, complex and different passwords for their various online accounts. So, if one site is breached, your other accounts on other websites are secure enough from being hacked.
 

Ideally, your strong password should be at least 16 characters long, should contain a combination of digits, symbols, uppercase letters and lowercase letters and most importantly the most secure password is one you don't even know.

The password should be free of repetition and not contain any dictionary word, pronoun, your username or ID, and any other predefined letter or number sequences.

I know this is a real pain to memorize such complex password strings and unless we are human supercomputers, remembering different passwords for several online accounts is not an easy task.

The issue is that today people subscribe to a lot of online sites and services, and it's usually hard to create and remember different passwords for every single account.

But, Luckily to make this whole process easy, there's a growing market for password managers for PCs and phones that can significantly reduce your password memorizing problem, along with the cure for your bad habit of setting weak passwords.

What is Password Manager?

best-password-manager-software

Password Manager software has come a very long way in the past few years and is an excellent system that both allows you to create complex passwords for different sites and remember them.

A password manager is just software that creates, stores and organizes all your passwords for your computers, websites, applications and networks.

Password managers that generate passwords and double as a form filler are also available in the market, which has the ability to enter your username and password automatically into login forms on websites.

So, if you want super secure passwords for your multiple online accounts, but you do not want to memorize them all, Password Manager is the way to go.

How does a Password Manager work?

Typically, Password Manager software works by generating long, complex, and, most importantly, unique password strings for you, and then stores them in encrypted form to protect the confidential data from hackers with physical access to your PC or mobile device.

The encrypted file is accessible only through a master password. So, all you need to do is remember just one master password to open your password manager or vault and unlock all your other passwords.?

However, you need to make sure your master password is extra-secure of at least 16 characters long.

Which is the Best Password Manager? How to Choose?

I've long recommended password managers, but most of our readers always ask:

  • Which password manager is best?
  • Which password manager is the most secure? Help!

So, today I'm introducing you some of the best Password Manager currently available in the market for Windows, Linux, Mac, Android, iOS and Enterprise.

Before choosing a good password manager for your devices, you should check these following features:

  • Cross-Platform Application
  • Works with zero-knowledge model
  • Offers two-factor authentication (multi-factor authentication)

Note: Once adopted, start relying on your password manager because if you are still using weak passwords for your important online accounts, nobody can save you from malicious hackers.

Best Password Managers for Windows

Best-Password-Manager-for-Windows

Windows users are most vulnerable to cyber attacks because Windows operating system has always been the favorite target of hackers. So, it is important for Windows users to make use of a good password manager.

Some other best password manager for windows: Keeper, Password Safe, LockCrypt, 1Password, and Dashlane.

1. Keeper Password Manager (Cross-Platform)

keeper-Password-Manager-for-mac-os-x

Keeper is a secure, easy-to-use and robust password manager for your Windows, Mac, iPhone, iPad, and iPod devices.

Using military-grade 256-bit AES encryption, Keeper password manager keeps your data safe from prying eyes.

It has a secure digital vault for protecting and managing your passwords, as well as other secret information. Keeper password manager application supports Two-factor authentication and available for every major operating system.

There is also an important security feature, called Self-destruct, which if enabled, will delete all records from your device if the incorrect master password is entered more than five times incorrectly.

But you don't need worry, as this action will not delete the backup records stored on Keeper's Cloud Security Vault.

Download Keeper Password Manager: Windows, Linux and Mac | iOS | Android | Kindle

2. Dashlane Password Manager (Cross-Platform)

Dashlane-Password-Manager-for-Android

DashLane Password Manager software is a little newer, but it offers great features for almost every platform.

DashLane password manager works by encrypting your personal info and accounts' passwords with AES-256 encryption on a local machine, and then syncs your details with its online server, so that you can access your accounts database from anywhere.

The best part of DashLane is that it has an automatic password changer that can change your accounts' passwords for you without having to deal with it yourself.

DashLane Password Manager app for Android gives you the secure password management tools right to your Android phone: your password vault and form auto-filler for online stores and other sites.

DashLane Password Manager app for Android is completely free to use on a single device and for accessing multiple devices, you can buy a premium version of the app.

Download DashLane Password Manager: Windows and Mac | iOS | Android

3. LastPass Password Manager (Cross-Platform)

LastPass-Password-Manager-for-Windows

LastPass is one of the best Password Manager for Windows users, though it comes with the extension, mobile app, and even desktop app support for all the browsers and operating systems.

LastPass is an incredibly powerful cloud-based password manager software that encrypts your personal info and accounts' passwords with AES-256 bit encryption and even offers a variety of two-factor authentication options in order to ensure no one else can log into your password vault.

LastPass Password Manager comes for free as well as a premium with a fingerprint reader support.

Download LastPass Password Manager: Windows, Mac, and Linux | iOS | Android

Best Password Manager for Mac OS X

Best-Password-Manager-for-mac-os-x

People often say that Mac computers are more secure than Windows and that "Macs don't get viruses," but it is not entirely correct.

As proof, you can read our previous articles on cyber attacks against Mac and iOs users, and then decide yourself that you need a password manager or not.

Some other best password manager for Mac OS X:  1Password, Dashlane, LastPass, OneSafe, PwSafe.

1. LogMeOnce Password Manager (Cross-Platform)

LogMeOnce-Password-Manager-for-Mac-os-x

LogMeOnce Password Management Suite is one of the best password manager for Mac OS X, as well as syncs your passwords across Windows, iOS, and Android devices.

LogMeOnce is one of the best Premium and Enterprise Password Management Software that offers a wide variety of features and options, including Mugshot feature.

If your phone is ever stolen, LogMeOnce Mugshot feature tracks the location of the thief and also secretly takes a photo of the intruder when trying to gain access to your account without permission.

LogmeOnce protects your passwords with military-grade AES-256 encryption technology and offers Two-factor authentication to ensure that even with the master password in hand, a thief hacks your account.

Download LogMeOnce Password Manager: Windows and Mac | iOS | Android

2. KeePass Password Manager (Cross-Platform)

Keepass-Password-Manager-for-Windows

Although LastPass is one of the best password manager, some people are not comfortable with a cloud-based password manager.

KeePass is a popular password manager application for Windows, but there are browser extensions and mobile apps for KeePass as well.

KeePass password manager for Windows stores your accounts' passwords on your PC, so you remain in control of them, and also on Dropbox, so you can access it using multiple devices.

KeePass encrypts your passwords and login info using the most secure encryption algorithms currently known: AES 256-bit encryption by default, or optional, Twofish 256-bit encryption.

KeePass is not just free, but it is also open source, which means its code and integrity can be examined by anyone, adding a degree of confidence.

Download KeePass Password Manager: Windows and Linux | Mac | iOS | Android

3. Apple iCloud Keychain

Apple-iCloud-Keychain-Security

Apple introduced the iCloud Keychain password management system as a convenient way to store and automatically sync all your login credentials, Wi-Fi passwords, and credit card numbers securely across your approved Apple devices, including Mac OS X, iPhone, and iPad.

Your Secret Data in Keychain is encrypted with 256-bit AES (Advanced Encryption Standard) and secured with elliptic curve asymmetric cryptography and key wrapping.

Also, iCloud Keychain generates new, unique and strong passwords for you to use to protect your computer and accounts.

Major limitation: Keychain doesn't work with other browsers other than Apple Safari.

Also Read: How to Setup iCloud Keychain?

Best Password Manager for Linux

best-Password-Manager-for-linux

No doubt, some Linux distributions are the safest operating systems exist on the earth, but as I said above that adopting Linux doesn't completely protect your online accounts from hackers.

There are a number of cross-platform password managers available that sync all your accounts' passwords across all your devices, such as LastPass, KeePass, RoboForm password managers.

Here below I have listed two popular and secure open source password managers for Linux:

1. SpiderOak Encryptr Password Manager (Cross-Platform)

SpiderOak-Encryptr-Password-Manager-for-linux

SpiderOak's Encryptr Password Manager is a zero-knowledge cloud-based password manager that encrypts protect your passwords using Crypton JavaScript framework, developed by SpiderOak and recommended by Edward Snowden.

It is a cross-platform, open-Source and free password manager that uses end-to-end encryption and works perfectly for Ubuntu, Debian Linux Mint, and other Linux distributions.

Encryptr Password Manager application itself is very simple and comes with some basic features.

Encryptr software lets you encrypt three types of files: Passwords, Credit Card numbers and general any text/keys.

Download Encryptr Password Manager: Windows, Linux and Mac | iOS | Android

2. EnPass Password Manager (Cross-Platform)

EnPass-Password-Manager-for-Linux

Enpass is an excellent security oriented Linux password manager that works perfectly with other platforms too. Enpass offers you to backup and restores stored passwords with third-party cloud services, including Google Drive, Dropbox, OneDrive, or OwnCloud.

It makes sure to provide the high levels of security and protects your data by a master password and encrypted it with 256-bit AES using open-source encryption engine SQLCipher, before uploading backup onto the cloud.

"We do not host your Enpass data on our servers. So, no signup is required for us. Your data is only stored on your device," EnPass says.

Additionally, by default, Enpass locks itself every minute when you leave your computer unattended and clears clipboard memory every 30 seconds to prevent your passwords from being stolen by any other malicious software.

Download EnPass Password Manager: WindowsLinux | Mac | iOS | Android

3. RoboForm Password Manager (Cross-Platform)

Roboform-Password-Manager-for-Windows

You can easily find good password managers for Windows OS, but RoboForm Free Password Manager software goes a step further.

Besides creating complex passwords and remembering them for you, RoboForm also offers a smart form filler feature to save your time while browsing the Web.

RoboForm encrypts your login info and accounts' passwords using military grade AES encryption with the key that is obtained from your RoboForm Master Password.

RoboForm is available for browsers like Internet Explorer, Chrome, and Firefox as well as mobile platforms with apps available for iOS, Android, and Windows Phone.

Download RoboForm Password Manager: Windows and Mac | Linux | iOS | Android

Best Password Manager for Android

best-Password-Manager-for-android

More than half of the world's population today is using Android devices, so it becomes necessary for Android users to secure their online accounts from hackers who are always seeking access to these devices.

Some of the best Password Manager apps for Android include 1Password, Keeper, DashLane, EnPass, OneSafe, mSecure and SplashID Safe.

1. 1Password Password Manager (Cross-Platform)

1password-Password-Manager-for-android

1Password Password Manager app for Android is one of the best apps for managing all your accounts' passwords.

1Password password manager app creates strong, unique and secure passwords for every account, remembers them all for you, and logs you in with just a single tap.

1Password password manager software secures your logins and passwords with AES-256 bit encryption, and syncs them to all of your devices via your Dropbox account or stores locally for any other application to sync if you choose.

Recently, the Android version of 1Password password manager app has added Fingerprint support for unlocking all of your passwords instead of using your master password.

Download 1Password Password Manager: Windows and Mac | iOS | Android

2. mSecure Password Manager (Cross-Platform)

mSecure-password-manager-for-android

Like other popular password manager solutions, mSecure Password Manager for Android automatically generates secure passwords for you and stores them using 256-bit Blowfish encryption.

The catchy and unique feature mSecure Password Manager software provides its ability to self-destruct database after 5, 10, or 20 failed attempts (as per your preference) to input the right password.

You can also sync all of your devices with Dropbox, or via a private Wi-Fi network. In either case, all your data is transmitted safely and securely between devices regardless of the security of your cloud account.

Download mSecure Password Manager software: Windows and Mac | iOS | Android

Best Password Manager for iOS

best-Password-Manager-for-ios-iphone

As I said, Apple's iOS is also prone to cyber attacks, so you can use some of the best password manager apps for iOS to secure your online accounts, including Keeper, OneSafe, Enpass, mSecure, LastPass, RoboForm, SplashID Safe and LoginBox Pro.

1. OneSafe Password Manager (Cross-Platform)

onesafe-password-manager-for-ios

OneSafe is one of the best Password Manager apps for iOS devices that lets you store not only your accounts' passwords but also sensitive documents, credit card details, photos, and more.

OneSafe password manager app for iOS encrypts your data behind a master password, with AES-256 encryption — the highest level available on mobile — and Touch ID. There is also an option for additional passwords for given folders.

OneSafe password manager for iOS also offers an in-app browser that supports autofill of logins, so that you don't need to enter your login details every time.

Besides this, OneSafe also provides advanced security for your accounts' passwords with features like auto-lock, intrusion detection, self-destruct mode, decoy safe and double protection.

Download OneSafe Password Manager: iOS | Mac | Android | Windows

2. SplashID Safe Password Manager (Cross-Platform)

SplashID-Safe-password-manager-for-ios

SplashID Safe is one of the oldest and best password manager tools for iOS that allows users to securely store their login data and other sensitive information in an encrypted record.

All your information, including website logins, credit card and social security data, photos and file attachments, are protected with 256-bit encryption.

SplashID Safe Password Manager app for iOS also provides web autofill option, meaning you will not have to bother copy-pasting your passwords in login.

The free version of SplashID Safe app comes with basic record storage functionality, though you can opt for premium subscriptions that provide cross-device syncing among other premium features.

Download SplashID Safe Password Manager: Windows and Mac | iOS | Android

3. LoginBox Pro Password Manager

LoginBox-Pro-Password-Manager-for-ios

LoginBox Pro is another great password manager app for iOS devices. The app provides a single tap login to any website you visit, making the password manager app as the safest and fastest way to sign in to password-protected internet sites.

LoginBox Password Manager app for iOS combines a password manager as well as a browser.

From the moment you download it, all your login actions, including entering information, tapping buttons, checking boxes, or answering security questions, automatically completes by the LoginBox Password Manager app.

For security, LoginBox Password Manager app uses hardware-accelerated AES encryption and passcode to encrypt your data and save it on your device itself.

Download LoginBox Password Manager: iOS | Android

Best Online Password Managers

Using an online password manager tool is the easiest way to keep your personal and private information safe and secure from hackers and people with malicious intents.

Here I have listed some of the best online password managers that you can rely on to keep yourself safe online:

1. Google Online Password Manager

google-online-password-manager

Did you know Google has its homebrew dedicated password manager?

Google Chrome has a built-in password manager tool that offers you an option to save your password whenever you sign in to a website or web service using Chrome.

All of your stored accounts' passwords are synced with your Google Account, making them available across all of your devices using the same Google Account.

Chrome password manager lets you manage all your accounts' passwords from the Web.

So, if you prefer using a different browser, like Microsoft Edge on Windows 10 or Safari on iPhone, just visit passwords.google.com, and you'll see a list of all your passwords you have saved with Chrome. Google's two-factor authentication protects this list.

2. Clipperz Online Password Manager

Clipperz-Online-Password-Manager

Clipperz is a free, cross-platform best online password manager that does not require you to download any software. Clipperz online password manager uses a bookmarklet or sidebar to create and use direct logins.

Clipperz also offers an offline password manager version of its software that allows you to download your passwords to an encrypted disk or a USB drive so you can take them with you while traveling and access your accounts' passwords when you are offline.

Some features of Clipperz online password manager also includes password strength indicator, application locking, SSL secure connection, one-time password and a password generator.

Clipperz online password manager can work on any computer that runs a browser with a JavaScript browser.

3. Passpack Online Password Manager

Passpack-Free-Online-Password-Manager

Passpack is an excellent online password manager with a competitive collection of features that creates, stores and manages passwords for your different online accounts.

PassPack online password manager also allows you to share your passwords safely with your family or coworkers for managing multiple projects, team members, clients, and employees easily.

Your usernames and passwords for different accounts are encrypted with AES-256 Encryption on PassPack's servers that even hackers access to its server can not read your login information.

Download the PassPack online password manager toolbar to your web browser and navigate the web normally. Whenever you log into any password-protected site, PassPack saves your login data so that you do not have to save your username and password manually on its site.

Best Enterprise Password Manager

Over the course of last 12 months, we've seen some of the biggest data breaches in the history of the Internet and year-over-year the growth is heating up.

According to statistics, a majority of employees even don't know how to protect themselves online, which led company’s business at risk.

To keep password sharing mechanism secure in an organization, there exist some password management tools specially designed for enterprises use, such as Vaultier, CommonKey, Meldium, PassWork, and Zoho Vault.

1. Meldium Enterprise Password Manager Software

Meldium-Enterprise-Password-Manager

LogMeIn's Meldium password management tool comes with a one-click single sign-on solution that helps businesses access to web apps securely and quickly.

It automatically logs users into apps and websites without typing usernames and passwords and also tracks password usage within your organization.

Meldium password manager is perfect for sharing accounts within your team member without sharing the actual password, which helps organizations to protect themselves from phishing attacks.

2. Zoho Vault Password Management Software
Zoho Vault Password Management Software

Zoho Vault is one of the best Password Manager for Enterprise users that helps your team share passwords and other sensitive information fast and securely while monitoring each user's usage.

All your team members need to download is the Zoho browser extension. Zoho Vault password manager will automatically fill passwords from your team's shared vault.

Zoho Vault also provides features that let you monitor your team's password usage and security level so that you can know who is using which login.

The Zoho Vault enterprise-level package even alerts you whenever a password is changed or accessed.

For Extra Security, Use 2-Factor Authentication

two-factor-authentication-password-security

No matter how strong your password is, there still remains a possibility for hackers to find some or the other way to hack into your account.

Two-factor authentication is designed to fight this issue. Instead of just one password, it requires you to enter the second passcode which is sent either to your mobile number via an SMS or to your email address via an email.

So, I recommend you to enable two-factor authentication now along with using a password manager software to secure your online accounts and sensitive information from hackers.

Author:  Swati Khandelwal

Source:  http://thehackernews.com/

Monday, 21 November 2016 17:37

20 Tips To Use Google Search Efficiently

Millions of people use Google search every day for a variety of reasons. Students use it for school, business people use it for research, and millions more use it for entertainment. Did you know that you may not be using Google search to its full potential? Here are 20 tips and tricks to maximize your search efficiency.

 

1. Use the tabs

The first tip is to use the tabs in Google search. On the top of every search are a number of tabs. Usually you’ll see Web, Image, News, and More. Using these tabs, you can help define what kind of search you need to do. If you need images, use the Image tab. If you are looking for a recent news article, use the News tab. It’s rudimentary and most people use the tabs already. If you are not, then it’s highly recommended to get associated with them. They can cut search times dramatically if utilized properly.

 

2. Use quotes

When searching for something specific, try using quotes to minimize the guesswork for Google search. When you put your search parameters in quotes, it tells the search engine to search for the whole phrase. For instance, if you search for Puppy Dog Sweaters, the engine will search for content that contains those three words in any order. However, if you search “Puppy Dog Sweaters”, it will search for that phrase exactly as you typed it. This can help locate specific information that may be buried under other content if not sorted out correctly.

 

3. Use a hyphen to exclude words

Sometimes you may find yourself searching for a word with an ambiguous meaning. An example is Mustang. When you Google search for Mustang, you may get results for both the car made by Ford or the horse. If you want to cut one out, use the hyphen to tell the engine to ignore content with one of the other. See the example below.

  • Mustang -cars

This tells the search engine to search for mustangs but to remove any results that have the word “car” in it. It can be wildly helpful when finding information about something without getting information about something else.

 

4. Use a colon to search specific sites

There may be an instance where you need to Google search for articles or content on a certain website. The syntax is very simple and we’ll show you below.

  • Sidney Crosby site:nhl.com

This will search for all content about famous hockey player Sidney Crosby, but only on NHL.com. All other search results will be removed. If you need to find specific content on a particular site, this is the shortcut you can use.

 

5. Find a page that links to another page

This Google search tip is a little obscure. Instead of searching for a specific page, you’re searching for a page that links to a specific page. Think about it this way. If you want to see who cited a New York Times article on their site, you would use this trick to find all the sites that link to it. The syntax is below.

  • link:nytimes.com

That will return all pages that link to the New York Times official website. The URL on the right side can be practically anything. Be aware, though, that the more specific it is, the fewer results you’ll get. We know not a lot of people will likely use this Google search trick, but it could be very useful for some.

 

6. Use the asterisk wildcard

The asterisk wildcard is one of the most useful ones on the list. Here’s how it works. When you use an asterisk in a search term on Google search, it will leave a placeholder that may be automatically filled by the search engine later. This is a brilliant way to find song lyrics if you don’t know all the words. Let’s look at the syntax.

  • “Come * right now * me”

To you or me, that may look like nonsense. However, Google search will search for that phrase knowing that the asterisks can be any word. More often than not, you’ll find they are lyrics to The Beatles song “Come Together” and that’s what the search will tell you.

7. Find sites that are similar to other sites

This is a unique one that could be used by practically everyone if they knew it existed. Let’s say you have a favorite website. It can be anything. However, that website is getting a little bit boring and you want to find other websites like it. You would use this trick. Below is the syntax.

 

If you search that above, you won’t find a link to Amazon. Instead, you’ll find links to online stores like Amazon. Sites like Barnes & Noble, Best Buy, and others that sell physical items online. It’s a powerful Google search tool that can help you find new sites to browse.

 

8. Use Google search to do math

As a college student, I can attest that I use this one rather frequently. Google search can actually do math for you. This is a rather complex one to describe because it can be used in so many ways. You can ask it basic questions or some more difficult ones. It is important to note that it won’t solve all math problems, but it will solve a good number of them. Here are a couple of examples of the syntax.

  • 8 * 5 + 5
  • Planck’s Consant

If you search the first one, it’ll return 45. It will also show a calculator that you can use to find answers to more questions. This is handy if you need to do some quick math but don’t want to do it in your head. If you search the second term, it will return the number value of Planck’s Constant. So it can do math, but it can also help you solve math problems by showing values for known mathematical terms.

 

9. Search for multiple words at once

Google search is flexible. It knows you may not find what you want by searching only a single word or phrase. Thus, it lets you search for multiples. By using this trick, you can search for one word or phrase along with a second word or phrase. This can help narrow down your search to help you find exactly what you’re looking for. Here is the syntax.

  • “Best ways to prepare for a job interview” OR “How to prepare for a job interview”

By searching that, you will search both phrases. Remember the quotes tip above? It’s being used here as well. In this instance, these two exact phrases will be searched. It can be done by word too, like the example below.

  • chocolate OR white chocolate

This will search for pages that have either chocolate or white chocolate!

 

10. Search a range of numbers

Searching for a range of numbers is another tip we don’t anticipate a lot of people using. The people that do use it, though, will probably use it quite a bit. People interested in money or statistics will find this tip particularly useful. Essentially, you use two dots and a number to let Google search know you’re looking for a specific range of numbers. Like the syntax below.

  • What teams have won the Stanley Cup ..2004
  • 41..43

 

In the first instance, the search will toss back the team that won the Stanley Cup in 2004. The two dots with only one number will tell the search that you don’t need anything before or after 2004. This can help narrow down searches to a specific number to improve search results. In the second, Google will search for the numbers 41, 42, and 43. It is obscure, but wildly useful if you happen to need to search for numbers like this.

 

11. Keep it simple

Now we’re getting into the general tips. Google search knows how to search for a lot of things. What this means is you don’t need to be too specific. If you need a pizza place nearby, use this to search.

  • Pizza places nearby

Google search will grab your location and deliver a variety of results about pizza places that are near you.

 

12. Gradually add search terms

There will come a time when Google search doesn’t shovel out the results you expect. In this instance, keeping it simple may not be the best option. As Google itself suggests, the best method is to start with something simple then gradually get more complicated. See the example below.

  • First try: job interviews
  • Second try: prepare for job interviews
  • Third try: how to prepare for a job interview

This will gradually refine the search to bring you fewer, more targeted terms. The reason you don’t go straight from the first try to the third try is because you may miss what you’re looking for by skipping the second step. Millions of websites phrase the same information in a number of different ways; using this technique lets you search as many of them as possible to find the best info.

 

13. Use words that websites would use

This is a very important one. When people use Google search to hunt the web, they generally search for things using the same language that they would use for speaking. Unfortunately, websites don’t say things the way people do; instead, they try to use language that sounds professional. Let’s look at some examples.

  • “I have a flat tire” could be replaced by “repair a flat tire.”
  • “My head hurts” could be replaced by “headache relief.”

The list goes on and on. When searching, try to use terminology you would find on a professional website. This will help you get more reliable results.

 

14. Use important words only

The way Google search works is to take what you search for and match it with keywords in online content. When you search for too many words, it may limit your results. That means it may actually take you longer to find what you’re looking for. Thus, it is apropos to use only the important words when searching for something. Let’s see an example.

  • Don’t use: Where can I find a Chinese restaurant that delivers.
  • Instead try: Chinese restaurants nearby.
  • Or: Chinese restaurants near me.

Doing this can help Google find what you need without all the clutter. So remember, keep it simple and use important words only.

 

15. Google search has shortcuts

A number of commands can be entered to give you instantaneous results. Like the math example above, Google can immediately give you the information you need that is displayed right at the top of the search results. This can save time and effort so you don’t have to click a bunch of bothersome links. Here are a few examples of some commands you can enter into Google.

  • Weather *zip code* – This will show you the weather in the given zip code. You can also use town and city names instead of area codes, but it may not be as accurate if there are multiple area codes in the city.
  • What is *celebrity name* Bacon Number – This is a fun little one that will tell you how many connections any given celebrity has to famed actor Kevin Bacon. The popular joke, Six Degrees of Kevin Bacon, is that no actor is more than 6 connections away from Kevin Bacon. Mark Zuckerberg has a Bacon Number of 3.
  • The math example posted above is another one.
  • What is the definition of *word* or Define: *word* – This will display the definition of a word.
  • Time *place* – This will display the time in whatever place you type in.
  • You can check any stock by typing its ticker name into Google. If you search for GOOG, it will check the stock prices for Google.


These quick commands can take a web search that is usually multiple clicks and condense it into a single search. This is very helpful for information you need repeatedly.

16. Spelling doesn’t necessarily matter

Google search has gotten a lot smarter over the years. These days, you don’t even need to spell words correctly. As long as it’s pretty close, Google can usually figure out what it means. Here are some examples.

  • If you search “Nver Gna Gve Yo Up” Google will automatically assume you mean to search for “Never Gonna Give You Up.” If by chance your misspelling was intentional, Google gives you the option to search for the misspelled term instead.

This trick is great if you happen to forget how to spell something or are not altogether sure how something is spelled. It can also be helpful when searching for obscure words. This applies to capitalization and grammar as well.

17. Use descriptive words

Pretty much everything can be described in multiple ways. Take our namesake, the “life hack.” The terminology “hack” refers to a computer programmer breaking security on a network or system. However, when used in conjunction with the word “life”, it alters the meaning to tips and tricks people can use to improve their lives. If you have trouble finding what you’re searching for, keep in mind that people may search or define what you need in a different way than you do.

  • You may search “How to install drivers in Ubunut?”
  • When you really mean “Troubleshoot driver problems Ubuntu.”

There really isn’t a good specific example for this one. If you search for something and you can’t find an answer, try asking the same question using different words and see if that helps the results.

 

18. Find a specific file

An often forgotten feature of Google search is the ability to search for a specific file or file type. This can be infinitely useful if you need a specific PDF or PowerPoint file that you previously viewed or need to use for another project. The syntax is quite simple.

  • *Search term here* filetype:pdf

In the above example, you simply replace the search term with whatever you’re searching for. Then use the filetype command and enter the extension of any file type you can think of. This can mostly be useful for scholarly purposes, but business presentations and other assorted presentations can benefit from this kind of search as well.

 

19. Money and unit conversions

Google search can quickly and accurately convert both measurement units and currency value. There are a variety of uses for this, like checking to see the conversion rate between two currencies. If you happen to be a math student, you can use it to convert from feet to meters or from ounces to liters. Here’s how to do it.

  • miles to km – This will convert miles to kilometers. You can put numbers in front to convert a certain number. Like “10 miles to km” will show you how many kilometers are in 10 miles.
  • USD to British Pound Sterling – This will convert a US dollar to British pounds. Like the measurements above, you can add numbers to find exact conversions for a certain amount of money.

It’s true that this tip is geared toward math students and international business people. However, you’d be surprised how often these tips are used by regular people.

20. Track your packages

Our last trick is to use Google search to find out where your packages are. You can enter any UPS, USPS, or Fedex tracking number directly into the Google search bar, and it’ll show you the tracking information about your package. This is much easier than going to the specific sites, waiting for them to load, then searching for your packages there. No examples are really needed for this one. Just type your tracking number in and see where your package is.

 

Google Search wrap-up

Google search is a very powerful search tool. Using the tips outlined above, you can find anything and everything you could ever need on the World Wide Web. Whether it’s avoiding Wikipedia for a school essay project, finding the latest stock prices, or even finding song lyrics, there is a way to make Google search work for you.

 

Small Business Hub gives twelve tips on how to improve your productivity by searching Google more efficiently. Search Google Like An Expert

 

Source : lifehack.org

Author : JOSEPH HINDY

 

 

 

 

 

Do you sometimes wish that your Mac would read your mind and organize all your business notes properly? Do you sometimes waste valuable time, looking for important screenshots and files in your computer? Then try out these three technology hacks for quick and effective solutions to your problems in a jiffy.

1. Boost Your Efficiency With Hotkeys, Keywords And Much More With Alfred:

search

Do you often spend a lot of time searching for apps or websites you often use? Then check out Alfred – an award-winning productivity app designed exclusively for Mac OS X that gives you greater control over your computer and makes life much simpler. After making some settings, you’ll be able to open what you want within a second.

Here are just some of the many things you can do with Alfred:

  • Find apps and files without even removing your fingers from the keyboard
  • Browse the web with default and custom search keywords
  • Use the Shift key to preview contents of a document without opening it

2. Manage Your Clipboard History With This Handy Tool:

Tired of switching tabs again and again when copying and pasting a list of things? Clipmenu allows you to do so just all at once!

If you’ve been using clipboard, is your clipboard history too cluttered? Are your work notes always disorganized?

Then here’s ClipMenu to the rescue – a free and highly efficient clipboard manager for Mac OS X which allows you to record 8 clipboard types, including image, plain text and much more.

3. Find Your Precious Screen Shots In A Sec With This Quick Hack:

screen-shot-2016-10-12-at-10-55-00-am

All your screenshots are saved to the Desktop by default but if you take lots of screenshots, finding a particular one might be a difficult task. Fortunately, you can use this trick to change the default screenshot location on your computer. If you make them be saved to Downloads folder, then you can drag the screenshot as the latest download file from the folder in the tool bar.

From now on, be more productive when you switch on your Mac. Share these tips with your friends today!

Source:  lifehack.org

The MacBook Pro may have found success straight out of the starting blocks, but it’s unlikely to change Apple’s focus. Cupertino’s future does not feel like it is focused on the classic laptop form and macos, but on sealed Pro tablets running iOS.

Apple CEO Tim Cook previews a MacBook Pro during a product launch event at Apple headquarters in Cupertino (Photo: Josh Edelson/AFP/Getty Images)

The mobile market is where Apple’s strength lies. Although Android commands the lions’ share of the market (approaching a global share of ninety percent, depending on the analyst), that share doesn’t translate ninety percent of the profits. Apple takes over one hundred percent of the market’s profits. Arguably Google’s value is not in the hardware sales but in capturing the Android users into its cloud where it can monetize each user.

Now look at the difference in the laptop market. Here Apple commands a similar market share of between seven and eight percent. It is generally found in fourth or fifth place in the top manufacturers list but with a share of the profits more in line with the market numbers.

Apple has a strong and stable presence in the laptop ecosystem. With the new MacBook Pros now on sale, Apple should be able to extend that position. It’s just a shame that Apple’s true focus is on pastures new.

Last year at the launch of the iPad Pro, Tim Cook asked “Why would you buy a PC any more?” Why indeed? It’s possible to carry out many of the day-to-day task that would normally be done on a laptop on a tablet – web browsing, social networks, music and video playback, note taking, document editing, messaging, and more. iOS has matured to point where the third-party ecosystem can cover the majority of tasks required by the majority of users.

The challenge in part is to convince consumers that think ‘laptop first’ to think ‘tablet first’. That continues to be the role of the iPad Pro in Apple’s portfolio. With the smart keyboard covers, long battery life, and Cupertino’s focused marketing the iOS tablets continue to perform strongly.

Yes, there is a pent-up demand for a new MacBook Pro, but it’s noticeable that the internal hardware design of the MacBook Pro, last year’s MacBook, and the venerable MacBook Air owe more to the fixed-specifications single-board sealed designs of the iPad than the user-accessible modular approach taken by older designs such as the superstar MD101LL/A non-retina MacBook Pro from 2012. These are no longer computers designed to be updated and maintained by a user, but as machines designed to be disposable and require replacement within two or three years.

The trick for Apple is to keep the die-hard user-base of the MacBook Pro on-side while transitioning as many as possible to the more profitable iPad and iPad Pro machines. Could touch be added to macos and Apple’s laptops? Yes. Would it be useful? Given my experiences with Windows 10 my answer is yes. But it would mean that one of the biggest points of differentiation between the iPad Pros and MacBook Pros would be diluted, hampering the transition efforts.

Apple Inc. iPad Pro 9.7 inch, center, is displayed at the company’s Omotesando store (Photo by Tomohiro Ohsumi/Getty Images)

This is not as drastic as Steve Jobs killing the iPod Mini at the height of its retail power. There will always be a small core of users that actually need a high-end portable macos devices and an iPad Pro is not a functional 1 to 1 replacement. Yet Apple has already decided what happens now that it rules the laptop space.

It’s going to let it slowly slide into a niche product line for a handful of power users as it moves the public towards the walled-garden flexibility of iOS and the iPad.

Source:  forbes.com

IF YOU ADD them all up, Google actually makes a lot of gadgets. It sells Nexus phonesChromebook PixelsPixel C tabletsNest smart-home products, cardboard VR viewers, Chromecast and Chromecast Audio, pretty Wi-Fi routers, even weird custom phone cases. But you’d never think of Google as a hardware company, because there’s no rhyme or reason to any of it. Some things are made for developers, others to show off how great a form factor or operating system could be. Some become really expensive doorstops. I’m sure I’m forgetting stuff, too—Google’s made so many small-time moves in the gadget market that it’s hard to track them all.

What’s Google really about? Attention. Yours, ours, everyone’s.

This one feels different, though. If the rumors are true (which they almost always are), Google’s about to drop the biggest bundle of hardware in the company’s history. At an event on October 4 in San Francisco, we expect to see two new phones, which will come with Pixel branding and potentially the biggest mainstream push for a Google phone ever. Google will also announce a release date for Home, its Amazon Echo-style chatbox, and for the Daydream virtual reality platform. Sundar and Friends will also reportedly have a new router to show off, and a new Chromecast. Maybe some Chromebooks, too, and maybe even the long-awaited operating system that combines the best of Chrome OS with the best of Android. And who knows? Google could release a new self-driving car just for fun! Either way, it’s going to be a busy day.

None of this means Google’s trying to be the world’s greatest gadget manufacturer. “I don’t think they are about boxes,” says Tuong Nguyen, principal analyst at research firm Gartner. “They’re not out there to sell boxes of anything to anyone.” Hardware’s a crazy business to get in anyway, Nguyen says, with tiny margins and massive entrenched players. Plus, it’s not what Google’s really about.

What’s Google really about? Attention. Yours, ours, everyone’s. Google’s in the business of getting people to use its products, so that it can collect data with which to both improve its products and make several more bargeloads of advertising money. That’s why Google makes so many good apps for the iPhone, ostensibly its biggest competitor. Google’s product isn’t the phone; it’s what you do with the phone.

The Future’s Calling 

There’s a shift happening, though, that threatens to undermine that approach. Services are becoming invisible, and platforms are becoming exclusive. Take the iPhone, for instance: Apple has made iOS so robust and integrated that the iPhone is far more useful if you only use Apple products. Using Siri to do research, play songs, and get directions is a seamless and fast way to use your phone—one that cuts Google out entirely. Sure, you can download the Google app, but launching and using it is much more complex pathway than just holding the home button and asking a question. The Amazon Echo is the same way. Do you know what search engine Alexa uses to figure out who the 31st president was? Do you care, as long as the answer is correct?

Google Home

To be fair, Google’s in a strong position because Android is so wildly popular. But as mobile and voice shift search from pages of blue links to just answering your question, and as more devices start to connect to the Internet, we’re going to start using the web in countless new places. Google has to make sure it’s in all those places.

Advertisment

become-an-internet-research-specialist

More than anything, the Google Assistant is the driving force behind Google’s hardware moves. “The assistant is really realized when it’s on many surfaces at once,” Nick Fox, Google’s head of communication products, told me earlier this month. “It’s almost this connective tissue on top of a lot of services. Instead of needing to navigate to those, and know what you want, you just say what you want.” Your assistant’s only useful if it’s everywhere, and users don’t want to download new apps or tweak settings. They just turn the thing on and expect it to work. Google needs to make sure the voice you hear when you turn on your new chatbox isn’t Alexa’s, or Siri’s, but Google’s.

So no, Google’s probably not trying to sell more phones than Apple. What it’s trying to do instead is turn Google into the connective tissue for all your devices, phone or otherwise. “That paradigm,” Nguyen says, “these underlying interfaces, the conversational agents, that’s one way to tie these pieces together.” To do that, Google needs to push its hardware partners. It’s making these physical manifestations of its most forward-looking products in order to show developers, hardware partners, and users how these things could work for everyone. And to make sure that its platform keeps being everyone else’s platform.

Forget the business case for a second, though. If Google’s really committed to making, selling, and supporting hardware (which is still a big if, given Google’s flighty history), exciting things are about to happen. A real Google presence in the market could put an end to Android fragmentation. It could transform laptop design, because Google’s not concerned with enterprise customers but with disrupting the industry. It could make virtual reality that works for everyone, and tune the experience because it manufactures the phone, the viewer, and the OS. Google can set the tone for the rest of the market, not by making neat prototypes for Huawei to look at but by becoming a real competitor. It’s like Apple always says: things are better when you make both hardware and the software.

Earlier this month, Hiroshi Lockheimer, Google’s head of Android, Chrome OS, and Play, tweeted that “I have a feeling 8 years from now we’ll be talking about Oct 4, 2016.” If Tuesday’s the day Google goes from all-knowing search engine to all-powerful personal assistant, and permanently raises the bar for the actual gadget makers, Lockheimer might just be right about that.

Source : wired

For a week, neither campaign used the special program giving them guaranteed listings in Google for their name.

With the US presidential election hotter than ever, Google’s program to give the major candidates valuable yet entirely free space in its search results wasn’t used by either campaign for the past week. The Hillary Clinton campaign finally began using of the space again today while the Donald Trump campaign has yet to resume.

Advertisment

become-an-internet-research-specialist

Free space for candidates, provided by Google

The space is provided through a program that lacks an official name but is commonly referred to by those outside Google as Google Podium or Google Posts. It allows both the major candidates to have whatever they want to appear in Google’s search results in response to a search for their names.

Here’s an example of how it looks for a “Hillary Clinton” search:

clinton-google-posts

I can’t show an example for the Trump campaign because it hasn’t posted within the last seven days, for some reason. The section only shows posts from the last seven days. Trump’s campaign has used the program in the past, such as like this at the end of September:

trump-hillary

When I was checking on search results for both candidates today, I noticed that the special section was missing for Trump results. That made me think perhaps the Trump campaign had stopped making use of the feature. After all, it has done that before. It had a six month gap between posts — from March through August of this year — before resuming at the end of September.

Donald Trump on Google

But digging further into the issue, I noticed that both the Clinton and Trump campaigns stopped posting at nearly the same time earlier this month.

Space goes unused for a week

The Trump campaign stopped posting as of October 9. The Clinton campaign stopped posting as of October 10, until it resumed earlier today (and for the record, the resumption that happened before I contacted Google or either campaign about this story). You can see all the posts from both campaigns here: Clinton & Trump.

Here’s a side-by-side of the latest posts by both:

Donald Trump on Google and Hillary Clinton on Google-2

Clinton’s campaign has been far more consistent than Trump’s in posting, though it also had a large gap from April through mid-June, earlier this year.

I’ve asked both campaigns for comments but have yet to hear back. My assumption is that neither campaign sees making use of this free space as essential and likely doesn’t bother with it at times.

If so, that’s extremely odd. Both campaigns appear to be running paid ads on Google (Clinton for “Hillary Clinton” and Trump for “Donald J Trump”). It’s strange they would spend money on paid Google listings but not take advantage of getting free ones in a guaranteed space.

As for Google, it gave me this statement:

Both Hillary Clinton and Donald Trump have access to this experimental search feature and have used it in the past. Posts appear for 7 days and if there is no new information shared, the carousel will not appear in Search until they post again.

In short, if you don’t see candidates with posts appearing in that area, that’s down to their campaigns, not Google. It’s still running the experimental program as usual.

Source : searchengineland.com

Page 1 of 2

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.
Please wait

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Newsletter Subscription

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media

Book Your Seat for Webinar GET FREE REGISTRATION FOR MEMBERS ONLY      Register Now