THE WARNINGS CONSUMERS hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. Only install applications from a trusted source or from a trusted app store. But lately, devious hackers have been targeting their attacks further up the software supply chain, sneaking malware into downloads from even trusted vendors, long before you ever click to install.

On Monday, Cisco's Talos security research division revealedthat hackers sabotaged the ultra-popular, free computer-cleanup tool CCleaner for at least the last month, inserting a backdoor into updates to the application that landed in millions of personal computers. That attack betrayed basic consumer trust in CCleaner-developer Avast, and software firms more broadly, by lacing a legitimate program with malware—one distributed by a security company, no less.

It's also an increasingly common incident. Three times in the last three months, hackers have exploited the digital supply chain to plant tainted code that hides in software companies' own systems of installation and updates, hijacking those trusted channels to stealthily spread their malicious code.

"There's a concerning trend in these supply-chain attacks," says Craig Williams, the head of Cisco's Talos team. "Attackers are realizing that if they find these soft targets, companies without a lot of security practices, they can hijack that customer base and use it as their own malware install base...And the more we see it, the more attackers will be attracted to it."

According to Avast, the tainted version of the CCleaner app had been installed 2.27 million times from when the software was first sabotaged in August until last week, when a beta version of a Cisco network monitoring tool discovered the rogue app acting suspiciously on a customer's network. (Israeli security firm Morphisec alerted Avast to the problem even earlier, in mid-August.) Avast cryptographically signs installations and updates for CCleaner, so that no imposter can spoof its downloads without possessing an unforgeable cryptographic key. But the hackers had apparently infiltrated Avast's software development or distribution process before that signature occurred, so that the antivirus firm was essentially putting its stamp of approval on malware, and pushing it out to consumers.

That attack comes two months after hackers used a similar supply-chain vulnerability to deliver a massively damaging outbreak of destructive software known as NotPetya to hundreds of targets focused in Ukraine, but also branching out other European countries and the US. That software, which posed as ransomware but is widely believed to have in fact been a data-wiping disruption tool, commandeered the update mechanism of an obscure—but popular in Ukraine—piece of accounting software known as MeDoc. Using that update mechanism as an infection point and then spreading through corporate networks, NotPetya paralyzed operations at hundreds of companies, from Ukrainian banks and power plants, to Danish shipping conglomerate Maersk, to US pharmaceutical giant Merck.

One month later, researchers at Russian security firm Kaspersky discovered another supply chain attack they called "Shadowpad": Hackers had smuggled a backdoor capable of downloading malware into hundreds of banks, energy, and drug companies via corrupted software distributed by the South Korea-based firm Netsarang, which sells enterprise and network management tools. “ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be," Kaspersky analyst Igor Soumenkov wrote at the time. "Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component." (Kaspersky itself is dealing with its own software trust problem: The Department of Homeland Security has banned its use in US government agencies, and retail giant Best Buy has pulled its software from shelves, due to suspicions that it too could be abused by Kaspersky's suspected associates in the Russian government.)

Supply-chain attacks have intermittently surfaced for years. But the summer's repeated incidents point to an uptick, says Jake Williams, a researcher and consultant at security firm Rendition Infosec. "We have a reliance on open-source or widely distributed software where the distribution points are themselves vulnerable," says Williams. "That’s becoming the new low-hanging fruit."

Williams argues that move up the supply chain may be in part due to improved security for consumers, and companies cutting off some other easy routes to infection. Firewalls are near-univeral, finding hackable vulnerabilities in applications like Microsoft Office or PDF readers isn't as easy as it used to be, and companies are increasingly—though not always—installing security patches in a timely manner. "People are getting better about general security," Williams says. "But these software supply-chain attacks break all the models. They pass antivirus and basic security checks. And sometimes patching is the attack vector."

'People trust companies, and when they're compromised like this it really breaks that trust. It punishes good behavior.' —Craig Williams, Cisco Talos

In some recent cases, hackers have moved yet another link up the chain, attacking not just software companies instead of consumers, but the development tools used by those companies' programmers. In late 2015, hackers distributed a fake version of the Apple developer tool Xcode on sites frequented by Chinese developers. Those tools injected malicious code known as XcodeGhost into 39 iOS apps, many of which passed Apple's App Store review, resulting in the largest-ever outbreak of iOS malware. And just last week, a similar—but less serious—problem hit Python developers, when the Slovakian government warned that a Python code repository known as Python Package Index, or PyPI, had been loaded with malicious code.

These kinds of supply-chain attacks are especially insidious because they violate every basic mantra of computer security for consumers, says Cisco's Craig Williams, potentially leaving those who stick to known, trusted sources of software just as vulnerable as those who click and install more promiscuously. That goes double when the proximate source of malware is a security company like Avast. "People trust companies, and when they're compromised like this it really breaks that trust," says Williams. "It punishes good behavior."

These attacks leave consumers, Williams says, with few options to protect themselves. At best, you can try to vaguely suss out the internal security practices of the companies whose software you use, or read up on different applications to determine if they're created with security practices that would prevent them from being corrupted.

But for the average internet user, that information is hardly accessible or transparent. Ultimately, the responsibility for protecting those users from the growing rash of supply-chain attacks will have to move up the supply chain, too—to the companies whose own vulnerabilities have been passed down to their trusting customers.

Source: This article was published wired.com By ANDY GREENBERG

Categorized in Internet Privacy

The common JPEG could be about to get a lot smaller thanks to Google’s new software. This could lead not only to a faster Web, but also to direct savings on storage costs for everyone from hosting services to hobbyist photographers and especially smartphone users on metered connections.

20x24 pixel zoomed areas from a picture of a cat’s eye. Uncompressed original on the left. Guetzli (on the right)
shows less ringing artefacts than libjpeg (middle) without requiring a larger file size.

Back in 2014, I wrote about BGP, a new file format purported to deliver equivalent quality to JPEG but with much smaller file sizes. The purposes of BPG is ‘to replace the JPEG image format when quality or file size is an issue’.

Fast forward to 2017 and BGP has obviously failed to achieve its stated purpose, with the humble JPEG still firmly entrenched as the file format of choice for the vast majority of users.

However a new, and free to use, compression technology from Google now hopes to revolutionise the JPEG where BGP has failed. Announced earlier this month, Guetzli is a new open source algorithm which creates JPEG files 35% smaller than typical current methods.

What sets Guetzli apart

The crucial difference between Guetzli and BGP is that the latter requires new code to be written before it can be read. Standard browsers and image software would simply fail to read the files without specific support for the format.

Guetzli, on the other hand, continues to use the established JPEG format. So, all software which can currently read standard JPEGs will also be able to read Guetzli JPEGs without modification.

There’s some crossover, in terms of the final outcome at least, with Google’s RAISR technology, announced at the end of last year, which can blow up small images into much larger versions with significantly higher quality than was previously possible.

Both Geutzli and RAISR can cut down significantly on the required size of image files, albeit in rather different ways. There’s also no reason why the two technologies can’t be used together.

How does it work?

The Guetzli encoder works by increasing the level of compression while creating the JPEGs, leaving the standard decompression algorithms for reading and displaying the images unchanged. The increase in compression comes from a new and more sophisticated model of human colour perception than is used by current JPEG encoders.

This results in higher quality images at a reduced file size, but also comes with a tradeoff in speed. Google’s engineers say that Guetzli is currently significantly slower than a standard JPEG encoder. Users of the current Windows version are reporting conversion times of several minutes for a single large JPEG.

Guetzli is potentially great news for anyone who stores or displays JPEG images as the time taken to download and the space needed to store them is significantly reduced. However, there are other options for those who want to create smaller JPEGs.

One such option is JPEGmini which claims even bigger file size reductions than Guetzli, up to 80%, with no loss in perceived quality. The big difference here though is that JPEGmini is a commercial product with prices ranging from $29 for the basic Home User option, up to $199 per month for those wishing to use it on Web servers and large photo repositories.

At the moment, JPEGmini is still a good option for everyday use as it is a polished end-user product, complete with plugins for Adobe Lightroom and Photoshop. However, a free algorithm such as Guetzli, once the speed issues are addressed, will most definitely pose threat to paid-for products like JPEGmini which hope to charge for exactly the same final result.

Source : forbes.com

Categorized in Science & Tech

FlipHTML5 is specially developed digital magazine software that not only enables people to read the digital publications, but it also let them develop many interactive contents. It is vital to note that this free digital magazine software download comes with an excellent range of features that helps people create the best multimedia contents as well as share them online.

FlipHTML5 allows users to read, follow and download all kinds of flipbooks which are hosted on the server of FlipHTML5. In addition to that, users can manage each and every book in their FlipHTML5 by using the flipbook app as well. The free and interactive magazine publishing platform brings user an excellent opportunity to develop an outstanding personal homepage on it, making it simple for individuals to know about them and find their digital publications.

Apart from that, it also allows users to collect all their digital publications automatically in an attractive bookcase that can be embedded into their website in a straightforward manner. Therefore, users get the capability to develop lots of bookcases as per their desire. When the readers love the embedded publications, they will immediately subscribe to the publications of the users and get the fresh updates automatically.

Plus, FlipHTML5 brings users a fantastic chance to share their digital publications easily on the most popular social networks, including Twitter, Facebook, Google and much more. It is incredibly simpler to distribute all kinds of digital flipbook to lots of people. Many users think that the SEO just applied to blogs or websites. But in fact, the content of flipbook can also be listed by the search engines without facing any difficulties.

This free digital magazine software grants users to access different statistics such as publications read, homepage visits and more. Moreover, it helps users to know more useful details regarding their readers and make everyone happy. These are the most exceptional and amazing features of FlipHTML5 that attracts lots of users towards it and cheer them to use this free software for their digital publishing requirements.

It is a smart and fast way to develop interactive digital magazines easily for various platforms and share them online. For more details, please go to FlipHTML5 homepage.

About FlipHTML5

FlipHTML5 Software Co. Ltd. is a world leading provider of digital publishing software. For many years, They have focused on the research and development of outstanding range of e-publishing software for users around the world. Furthermore, they offer customized solutions for publishers in different industries.

Source : http://www.prunderground.com/fliphtml5-free-digital-magazine-software-download-online-for-2017/0085511/

Categorized in Online Research

Single software solution developed to accelerate additive manufacturing workflows for 3D Systems’ plastic 3D printers

ROCK HILL, S.C., Dec. 19, 2016 -- 3D Systems (NYSE:DDD) announced today the release of 3D Sprint 2.0, a productivity-enhancing print management and print optimization software developed for 3D Systems’ plastic 3D printers.

In line with the company’s commitment to providing end-to-end digital manufacturing solutions, 3D Sprint 2.0 streamlines 3D printing workflows by reducing the need for users to divide projects among multiple software programs. This results in a simplified and more productive printing process, saving users of 3D Systems’ plastic printers time and money.

3D Sprint 2.0

3D Sprint 2.0 delivers a wide range of design tools specific to additive manufacturing with 3D Systems’ plastic 3D printers.

3D Sprint Build

Advanced toolsets in 3D Sprint 2.0 help users print productively and manage printer fleets and materials. 

Photos accompanying this announcement are available at
http://www.globenewswire.com/NewsRoom/AttachmentNg/29ce5e0c-b116-426e-8e36-bb3730105daf

http://www.globenewswire.com/NewsRoom/AttachmentNg/249d5a95-4f5b-47d2-845b-b7b76d4ddc67

3D Sprint 2.0 delivers a wide range of design tools specific to additive manufacturing that enable users to manipulate, edit and prepare 3D models for printing directly from the software interface. New features within the software allow users to perform advanced operations, including part splitting, cutting and keying; offsetting, shelling and thickening; part grouping, triangle reduction and part quality checks. 3D Systems printer management tools within the platform facilitate firmware updates, system checks and log retrieval to help users efficiently streamline processes while monitoring and managing print queues and materials. 3D Sprint 2.0 accommodates .stl, .obj and .ply file inputs as well as a variety of polygon and neutral CAD formats.

“3D Sprint 2.0 is the fastest and most reliable user interface we’ve ever used,” says Ian Sayers, 3D Printer and Scanner Sales, Hawk Ridge Systems, a 3D Systems partner. “Having a single piece of intelligent software that can create estimates on numerous virtual machines makes our operations more nimble, and the level of interoperability sets a new standard for what people will expect from 3D printing interfaces in the future.”

“Our goal with 3D Sprint 2.0 is to make 3D printing in plastic easier and faster than ever before,” says Ilan Erez, Senior Vice President, General Manager, Software, 3D Systems. “Having a single software platform for 3D Systems' plastic printers helps our customers achieve greater productivity and improved results.”

3D Sprint 2.0 supports and will immediately ship with all ProJet® 1200 and ProJet MJP 2500 Series printers. Support for other 3D Systems plastics printers as well as premium software levels with advanced editing and additional CAD format support will be announced at a later date.

Author:  ROCK HILL

Source:  http://www.econotimes.com/3D-Systems-Advances-3D-Printing-Productivity-with-Official-Launch-of-3D-Sprint-20-Software-457616

Categorized in Science & Tech

After releasing Android 7.1 Nougat Developer Preview 2 for Nexus and Pixel devices, Google has now started releasing the final and stable Android 7.1.1 Nougat update for the compatible devices. Latest Android 7.1.1 update also includes the monthly security update for December.

The stable version of the Android 7.1.1 Nougat was previously rumored to be launching on Dec. 6. The operating system update is said to agree with the December security patch.

However several reports are claiming that the Google has started to roll out Android 7.1.1 Nougat earlier than the mentioned date that means the owners of the devices who will receive the update can expect it to arrive very soon.

Android 7.1.1 is the most recent version of Android and Google itself released it to its Pixel and Nexus devices on Dec. 5. Famous search engine also made the source code available to manufacturers on the same day via the Android Open Source Project (AOSP), but the update availability depends upon each OEM.

Google has also released the Android 7.1.1 factory images and OTA files for the compatible devices.

The devices that are said to have already received the Android 7.1.1 Nougat update are a General Mobile 4G and a Cherry Mobile One G1. These both are the parts of Google's Android One project.

The screenshot that was sent in by the General Mobile 4G user, who is from Turkey that revealed a size of 240.6 MB for the update. Same screenshot also showed that the software update provides improvements to the security and stability of the Android device, while also fixing certain bugs.

In addition to Android One other devices that will be receiving the Android 7.1.1 Nougat update are the Google Pixel and the Google Pixel XL that are the latest smartphones released by Google. Apart from it several devices Nexus line, including the Nexus 6, the Nexus 5X, the Nexus 6P, the Nexus Player and the Nexus 9; and the Pixel C tablet are also getting the update.

Report says that Vodafone Australia has already listed Android 7.1.1 rollout date as December 6 for Nexus 6P, and the update is weighing about 650MB.

Sony also has announced it will make Android Nougat available to the following devices:

  • Xperia Z3+
  • Xperia Z4 Tablet
  • Xperia Z5
  • Xperia Z5 Compact
  • Xperia Z5 Premium
  • Xperia X
  • Xperia XA
  • Xperia XA Ultra
  • Xperia X Compact
  • Xperia X Performance

The rollout has begun for the Xperia XZ and X Performance as of 1 December 2016. The company is saying that the the update would come to devices "as quickly as we can".

Recent reports also has revealed that Samsung might be upgrading the Galaxy Note 5 to Android 7.0 Nougat soon, Huawei also is planning to launch Android 7.0 Nougat to six devices in the first quarter of next year.

Auhtor : Harsh Soni

Source : http://www.hngn.com/articles/220749/20161212/android-7-1-nougat-stable-update-rrived-full-list-devices.htm

Categorized in Science & Tech

Each year when Apple introduces a new iPhone, critics and users hold their breaths for a major breakthrough to be included in the new model. With the iPhone 7, there's no major breakthrough, but there are two fairly big changes—one good, one maybe not so good.

 

The positive major change introduced with the phone is the new dual-camera system available on the iPhone 7 Plus.

 

With two 12-megapixel cameras, a telephoto lens, and the ability to capture DSLR-quality depth of field effects, the 7 Plus' camera is a big step forward and could lay the ground work for even more advanced features later (think 3D). On the downside, the features don't ship out of the box; they'll be delivered via software later.

 

The negative change is the removal of the traditional headphone jack. The iPhone 7 will now include only a Lightning port for connecting wired headphones. Apple put the removal in terms of "courage," and it certainly fits with the company's other controversial-at-the-time feature removals (DVD, Ethernet, floppy discs), but whether the included adapter dongle is enough to satisfy users remains to be seen.

 

The most notable changes introduced with the iPhone 7 include:

  • Removal of the headphone jack—Bound to be the most controversial iPhone change in years, the iPhone 7 removes the traditional headphone jack entirely. Instead, users are expected to use headphones that connect to the phone's Lightning port or AirPods, a new set of wireless headphones introduced by Apple at the same time. 
  • The dual-camera system on the iPhone 7 Plus—The camera system on the iPhone 7 Plus is a major upgrade. It includes two 12-megapixel cameras on the back of the device, with the second camera offering a telephoto lens. This enables new image effects using depth of field (the foreground of the image in focus, the back blurred), live previews of depth of field effects, and up to 10x zoom. The camera flash also includes four bulbs (up from 2) for better color accuracy.
  • Higher top-end Storage—The highest capacity storage on the iPhone 7 is now 256 GB, up from 128 GB in the iPhone 6S. 
  • Better color fidelity in screen—Both Phone 7 models have technology built into their screens that allows them to display a greater range of colors, delivering better-looking images. This technology was introduced previously on the iPad Pro.
  • New color options—In addition to silver, gold, and rose gold, the iPhone 7 offers two new color choices: Black and a high-polish "Jet Black." Jet Black is only available in the 128 GB and 256 GB models.

 

 


 

 

 

iPhone 7 Hardware Features

 

In addition to the changes noted above, new elements of the iPhone 7 also include:

  • The new A10 Fusion processor 
  • W1 wireless audio chip to support AirPods and new wireless Beats headphones
  • Redesigned, solid state Home button with new force feedback engine
  • Improved user-facing camera
  • 25% brighter screen
  • The ability to edit and add effects to Live Photos
  • Improved battery life
  • IP67 water and dust resistance
  • Support for Felica NFC standard used in Japan.

 

Screen

  • iPhone 7: 4.7 inches, at 1334 x 750 pixels
  • iPhone 7 Plus: 5.5 inches, at 1920 x 1080 pixels

 

Cameras

  • iPhone 7
  • Back camera: 12 megapixel, digital zoom up 5x
  • User-facing camera: 7 megapixel

iPhone 7 Plus
Back camera: Two 12-megapixel cameras, one with telephoto lens, optical zoom to 2x, digital zoom to 10x
User-facing camera: 7 megapixel

 

Panoramic photos: up to 63 megapixel
Video: 4K HD at 30 frames/second; 1080p at 120 frames/second slo-mo; 720p at 240 frames/second super slow-mo

 

Battery Life
iPhone 7

  • 14 hours talk
  • 14 hours Internet use (Wi-Fi)/12 hours 4G LTE
  • 30 hours audio
  • 13 hours video
  • 10 days standby

 

iPhone 7 Plus

  • 21 hours talk
  • 15 hours Internet use (Wi-Fi)/13 hours 4G LTE
  • 40 hours audio
  • 14 hours video
  • 16 days standby

 

Sensors

  • Accelerometer
  • Gyroscope
  • Barometer
  • Touch ID
  • Ambient light sensor
  • Proximity sensor
  • 3D Touch
  • Taptic Engine for feedback

 

iPhone 7 & 7 Plus Software Features

  • The improved camera features of the iPhone 7 Plus don't ship with it. Instead, they'll be delivered as a free software update later in 2016

  • Editable Live Photos

  • iOS 10 support

  • Support for all existing iPhone features like FaceTime, Siri, GPS, AirPlay, App Store, Apple Pay, etc.

 

Colors

  • Silver
  • Gold
  • Rose Gold
  • Black
  • Jet Black

 

US Phone Carriers

  • AT&T
  • Sprint
  • T-Mobile
  • Verizon

 

Size and Weight 

  • iPhone 7: 4.87 ounces
  • iPhone 7 Plus: 6.63 ounces
  • iPhone 7: 5.44 x 2.64 x 0.28 inches
  • iPhone 7 Plus: 6.23 x 3.07 x 0.29 inches

 

Capacity and Price

  • iPhone 7
  • 32 GB - US$649
  • 128 GB - $749
  • 256 GB - $849
  • iPhone 7 Plus
  • 32 GB - $769
  • 128 GB - $869
  • 256 GB - $969

 

Availability

  • The iPhone 7 and 7 Plus go on sale Sept. 16, 2016. Customers can pre-order them starting on Sept. 9, 2016.

 

Previous Models

When Apple releases new iPhones, it also keeps previous models around to sell at lower prices. With the introduction of the iPhone 7, Apple's line up of other iPhone models is now:

  • The iPhone 6S & 6S Plus will be available in 32 GB and 128 GB models for $549 and $649, and $649 and $749, respectively
  • The iPhone SE remains in its current 16 GB and 64 GB configurations and at its current pricing
  • The iPhone 6 & 6 Plus will be discontinued.

 

Author:  Sam Costello

Source:  https://www.lifewire.com

 

 

 

 

Categorized in Internet Privacy

Introduction

Finding the appropriate social media management tool for your business can be a challenge. This buyer’s guide provides a framework for deciding if you need and EMMS solution, details the capabilities of the leading platforms, and compares offerings from leading vendors.

Editor’s Note: The following is an excerpt from “Enterprise Social Media Management Software: A Marketer’s Guide“. You can download the report here free.



The Benefits of Using ESMMS Platforms

With hundreds or even thousands of social media accounts to manage and millions of social conversations to monitor, social media marketing has become increasingly complicated and time-consuming. Automating social media marketing with an ESMMS platform can improve efficiency, compliance, and productivity by providing the following benefits:

Better legal and creative compliance across the enterprise. ESMMS platforms offer
a unified interface for the integration of content development and publishing with a controlled user permission hierarchy. The result is greater consistency and compliance with style guides, as well as legal or regulatory guidelines for enterprises – particularly those with global offices or those operating in the financial, insurance, and healthcare fields.

Improved time management. The publishing tools provided by the majority of ESMMS platforms include calendars and scheduling features that automate social content posts, as well as auto-responses to audience posts or questions. By planning ahead and creating weekly or monthly content calendars, marketing staff can better spend their time being proactive and creative, rather than spending their days monitoring social network accounts.

Cross-channel reporting capabilities in near real time. Enterprises are marketing across multiple social networks, making cross-channel reporting in a single interface a “must-have” rather than a “nice-to-have” feature. ESMMS platforms provide sophisticated cross-channel reporting capabilities, many of which are widget- and wizard-driven to make reporting easy and fast for marketers.

Pricing and annual contracts

ESMMS platforms are a significant investment, with typical enterprise customers spending tens of thousands of dollars each month in licensing fees. Many ESMMS platform vendors license their technology on a software-as-a-service (SaaS) basis; the technology is hosted by the vendor and customers log into a web-based dashboard to utilize the system. Several vendors have moved to the cloud, providing customers with simplified data storage and more plug-in connections with third-party apps and software. Licensing fees can be charged by the number of users or seats; by the volume of social media networks or pages tracked; and by the number of locations, brands, or departments on the system. Some vendors offer monthly licenses, while others require an annual contract. Some licenses include more support features than others, so be sure to clarify what is included in the basic license.

Benefits include:

  • Structured workflow management
  • Permissions and compliance tools that allow customers to monitor and control all social media content and campaigns emanating from the enterprise

Challenges include:

  • Enterprise SMMS platforms can be a significant investment, with larger organizations paying tens of thousands of dollars each month in licensing
  • Certain platforms can require considerable training and integration with existing technology systems and additional premium services to run them

Does Your Company Need Social Media Management Software?

Enterprises deciding whether or not to license a SMMS platform or to upgrade from their existing freemium platform need to first consider the following:

  • Do we have multiple social accounts and utilize multiple social channels, including Facebook, Twitter and blog publishing platforms such as WordPress?
  • Do we operate in a regulated industry, such as insurance or real estate, where a lack of compliance can result in legal or regulatory problems?
  • Do we rely on a sales network of local dealers, agents or franchisees that may be operating hundreds of Facebook pages or Twitter accounts not controlled by the corporate marketing department?

If the answer to one or more of these questions is “yes,” it may be time to consider using a SMMS platform.


 

The internet has been abuzz with warnings about a new darknet eBook that has been doing rounds there, concealed as a free guidebook while in fact it’s a delivery system malware.

It claims to teach rookie users how to navigate through the darknet and make safe purchases using bitcoin, while also maintaining high standards of anonymity for user protection.

Already many web surfers have downloaded this malicious software onto their computers, putting both their machines and bitcoin sums at serious risk of being tampered with.

While this is a topic many individuals will probably take a keen interest on, exact origins of the darknet manual as well as download link are shrouded in mystery.

However, interested parties can still find more information about it on the internet for free, assuming they want to put more effort towards achieving this.

Always practice extreme caution when opening free web files, especially those that are based on darknet topics.

Most people already know that clicking on random PDF files can cause disaster, and are knowledgeable enough not to open mysterious email messages in their inbox with shady attachments.

Nevertheless, there are still those who are not very keen when it comes to retrieving such malicious files directly from the net.

According to Reddit subscribers, this free darknet eBook originated from Reddit itself and has been popping up in multiple darknet related sub-reddits for almost an entire week, possibly already infecting 100s or even 1000s of users.

One point of major concern is that scanning this software in the reputable anti-virus site “VirusTotal,” shows that the darknet file is indeed safe, clean and free from any nefarious programs.

Though, this development isn’t new, as many recent infectious files can also appear harmless even to highly advanced malware programs, including ransom-ware and “Zeus” mega botnet malware.

It’s likely that the infected file’s creators are only targeting darknet users, possibly to gain access to their market accounts and virtual bitcoin wallets.

Currently, information is rather scanty on how computers infected by this malicious software can be scanned or cleaned.

But when that information comes up it will be published online for affected persons to use it accordingly.

Even so, the best approach for those who’ve not yet been affected is simply steering clear of web downloads posing as user guides.

Individuals interested in learning more about Darknet operations are better off referring to instructions found on the specific sites they are using.

Whenever someone posts a direct link on the web to content that’s not yet well understood, users should be weary lest they become victims of cybercriminals.

Even though this darknet file is being hosted on MEGA, there’s still no way of determining whether or not it’s just a regular PDF free book, or file packaging malware with ransomware threats on the cover.

malware-microsoftMost times the darknet malware is spread through infected folders such as PDFs, Word documents and ZIP files.

This is so that it can reach as many individuals as possible.

While VirusTotal hasn’t raised any red flags as far as downloads go, it’s always safe to open files on a cloud machine first upon download.

This will help avoid malicious software or any other types ofmalware from being installed into one’s computer.

While the guide could be a legitimate version of the darknet eBook, only modified to serve interests of a few cybercriminals, such assertions seem doubtful right now.

Nevertheless, it wouldn’t be the first time someone has attacked Bitcoin users in an effort to infiltrate their wallets.

Darknet hackers consider this a lucrative business and usually invest a lot in it. Particularly taking into consideration how many people are nowadays interested in safeguarding their anonymity online.

In that regard, malware disguised as an eBook seems like a smart move, at least for the persons concerned.

If web users are interested in finding out more about darknet matters and keeping their identities secret, they can refer with Google instead.

Here you can find useful information on how to remain “off the grid” without risking your own safety.

Some people have tried to refine their strategy in remaining anonymous while browsing darknet, and are willing to share these valuable tips with others.

Source : https://darkwebnews.com

Categorized in Deep Web

SAN FRANCISCO (Reuters) - Alphabet Inc's Google said on Thursday it is acquiring cloud software company Apigee Corp in a deal valued at about $625 million, the tech giant’s latest effort to claim a greater share of the lucrative cloud business.

San Jose-based Apigee's software helps companies' digital services interact with apps used by customers and partners.

The service is critical for businesses transitioning to the cloud, Diane Greene, who runs Google's cloud computing division, said in an interview. "They are a leader in this application programming interface area," she said.

Cloud computing is the increasingly popular practise of using remote internet servers to store, manage and process data.

Apigee specializes in managing so-called application programming interfaces, or APIs, the channels through which digital services connect when a company logs a purchase for a customer or places an order with a supplier.

Google will pay Apigee shareholders $17.40 for each share, a 6.5 percent premium to the stock's Wednesday close.

Apigee's shares were slightly above the offer price at $17.43 on Nasdaq in afternoon trading on Thursday.

The company, whose customers include AT&T, Burberry Group Plc, Vodafone Group Plc and the World Bank, went public in April last year at $17 per share.

Greene, a former VMware CEO, has pushed to raise Google's profile in corporate computing since she joined last year.

During her tenure, Google has streamlined engineering efforts and appointed new leadership for its cloud efforts, improving traction with clients, Google Chief Executive Officer Sundar Pichai said during the company's latest earnings call.

Greene predicted that the Apigee acquisition would redouble Google's momentum.

"Our customer lists are extremely complimentary," she said. "There's some overlap and some areas where we are going to be able to help each other once [the deal] closes."

The Apigee deal comes a day after Google and online storage company Box Inc said they would partner to enable Box's corporate customers to integrate Google's suite of word processing, spreadsheets and other productivity tools, known as Google Docs.

Google, Amazon.com Inc, Microsoft Corp, IBM Corp and others are vying for a share of the fast-growing corporate cloud computing business.

Apigee, with high-profile clients in a strategically important area, will help Google close in on the competition, said analyst Patrick Moorhead of Moor Insights & Strategy.

“Google has fallen behind both Microsoft Azure and Amazon Web Services in enterprise cloud computing, and this move is intended to strengthen that position,” he wrote in an email.

(The story was refiled to correct the description of Apigee to "cloud software company" the in headline and the first paragraph)

Source : http://ca.reuters.com/article/technologyNews/idCAKCN11E1SG?pageNumber=1&virtualBrandChannel=0

Categorized in Science & Tech

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media

Book Your Seat for Webinar GET FREE REGISTRATION FOR MEMBERS ONLY      Register Now