IANS Blog RSS Feed

http://www.iansresearch.com

Poulin to CSO: We Hacked a Smart Building Using ?Old-School? Techniques

- Thu, 11 Feb 2016 00:00:00 GMT

The ?smarter? buildings get, the easier they are to hack? Maybe. IANS Faculty Chris Poulin, research strategist for IBM?s X-Force ethical hacking team, recently spoke to CSO?s Maria Korolov about a penetration test in which his team was able to gain access to all of the buildings operated by a building management company.

Privacy, Security Concerns Rise as States Mull Encryption Backdoor Requirements

- Wed, 27 Jan 2016 00:00:00 GMT

National Data Privacy Day (January 28th) certainly comes at an interesting time this year, as legislators in two of the most technology-centric U.S. states recently introduced similar bills that would force smartphone manufacturers to include encryption backdoors in their devices.

Fledgling Cyber-Insurance Market Tested by Early Denials, Lawsuits

- Wed, 20 Jan 2016 00:00:00 GMT

Cybersecurity insurance policies may be relatively new, but they have one important thing in common with established, legacy business coverage: They live and die in the fine print.

Hacker-Caused Ukrainian Power Outage Marks First Known Attack With Immediate, Direct Public Impact

- Tue, 05 Jan 2016 00:00:00 GMT

Security researchers have confirmed that a recently updated version of the highly destructive BlackEnergy malware package infected the systems of at least three power authorities in Ukraine, causing a massive outage that left thousands of homes in the Ivano-Frankivsk region of the country without electricity.†

Top 10 IANS Insights from a Tumultuous 2015

- Mon, 28 Dec 2015 00:00:00 GMT

Another year is in the books and what a year it was for infosec pros. From the Ashley Madison hack to the OPM breach, to Jeep commandeering and mysterious backdoors in popular networking gear, every week brought a new security twist that forced us all to keep our heads on swivels.

Herold: Misguided CISA Heightens Security, Privacy Concerns

- Mon, 21 Dec 2015 00:00:00 GMT

The controversial Cybersecurity Information Sharing Act (CISA) is now the law of the land, slipped into an eleventh-hour†spending bill designed to keep the federal government running through 2016.

Patch Now: Rogue Code Leaves Gaping Hole in Juniper Gear

- Fri, 18 Dec 2015 00:00:00 GMT

Juniper Networks says unauthorized code could allow attackers to gain administrative access to its NetScreen appliances and decrypt VPN connections without leaving any trace of their actions. Users are urged to apply fixes immediately.

Poulin: Time to Realistically Acknowledge Vehicle Vulnerabilities

- Wed, 16 Dec 2015 00:00:00 GMT

The images and breathless banter were difficult to ignore: celebrity security researchers gaining remote command of an automobile, disrupting on-board systems before forcing the vehicle and its helpless driver into a ditch.

NIST to Infosec Pros: How Is Our Framework Working?

- Mon, 14 Dec 2015 00:00:00 GMT

The National Institute of Standards and Technology is asking infosec practitioners in the public and private sectors to comment on the efficacy of its cybersecurity framework as it prepares to update the popular, two-year-old document.

As Ransomware Attacks Evolve, Security Teams Must Prepare For New ?Drive-By? Tactics

- Thu, 10 Dec 2015 00:00:00 GMT

Another week, another evolution of the popular ransomware attacks. When we last wrote about it, researchers had discovered a new iteration ? ?Linux.Encoder.1? ? that enabled attackers to inject malware into Linux-powered websites and encrypt all files in the home and backup directories. Now, it appears the popular exploit kit Angler is being used to spread the latest version of CryptoWall and other ransomware on websites as part of ?drive-by? campaigns that begin with the deployment of password-stealing malware.†

Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

W32.Oldigork

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Worm.

Trojan.Elibokof

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bayrob!g13

- Thu, 22 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Kwampirs!g1

- Wed, 21 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Bayrob!g12

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Locky!g19

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Batel

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Mdropper!gen5

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kotver!lnk

- Tue, 20 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.HDDCryptor

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Heur.RGC!g214

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g244

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Linux.Trojan

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Locky!g17

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Odinaff!gm

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Cry!gm

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Dualtoy

- Wed, 14 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Kawaii

- Mon, 12 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Riccietex

- Mon, 12 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Philadelphia

- Sat, 17 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Luabot

- Sat, 10 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

SONAR.Cryptlocker!g79

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g65

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g328

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.BC.CryptDrop!g5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Cryptlocker!g63

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g241

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g250

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g270

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g209

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.JSDownloader!g5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.RGC!g293

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MultiExt!gen4

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.MSWord!g17

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.ProcHijack!gen8

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Shellcode!gen1

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen62

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SuspBeh!gen64

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SusTraffic!gen4

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.SusTraffic!gen5

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heur.C!g19

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.152

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

SONAR.Heuristic.154

-

Risk Level: Very Low. Type: Trojan, Virus, Worm.

Trojan.Bayrob!g11

- Thu, 8 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Cry

- Wed, 7 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Pandemiya!g1

- Mon, 5 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Linux.Umreon

- Mon, 5 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Bloodhound.Exploit.574

- Fri, 2 Sep 2016 00:00:00 +0000

Risk Level: Very Low.

Ransom.Fsociety

- Sat, 3 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3294

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3375

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3247

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3351

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3377

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3324

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3297

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2016-3295

- Thu, 15 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Serpico

- Fri, 2 Sep 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Odinaff!g1

- Wed, 31 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Sysridge!gen1

- Wed, 31 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Domino

- Tue, 30 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Atmoripper

- Tue, 30 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Locky!g12

- Tue, 30 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Odinaff

- Tue, 30 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Atesla

- Mon, 29 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Infostealer.Atesla!gm

- Mon, 29 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Pirpi!gen4

- Sun, 28 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Pirpi!gen3

- Sun, 28 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Ransom.Fantom

- Sat, 27 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Snifula!gm

- Sat, 27 Aug 2016 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

Swiss vote on new law to beef up intelligence services

- Sat, 24 Sep 2016 14:50:19 -0400

GENEVA (AP) ? Swiss voters will be deciding on a new law aimed to strengthen the ability of intelligence services to counter rapidly-evolving threats posed by spies, criminal hackers and violent extremists.

Online services want your birthdate _ creating security risk

- Sat, 24 Sep 2016 11:07:27 -0400

Online services want your birthdate _ creating security riskOf all the personal information people tend to give out willy-nilly on the internet, birthdate is perhaps the most ubiquitous. It's not just Yahoo and Facebook seeking that information. Websites, newsletters, ...


Cyber hack creating a "crazy scenario", warns Cram

- Sat, 24 Sep 2016 05:28:34 -0400

The British ChampionshipsBy Alan Baldwin LONDON (Reuters) - The hacking of confidential medical exemptions risks tarnishing innocent athletes and turning people off elite sport, former world champion runner Steve Cram has warned. The 55-year-old Briton, the 1983 world champion at 1,500 metres and 1984 Olympic silver medallist, spoke before a fifth batch of documents were published by cyber hackers on the fancybear.net website on Friday. The world anti-doping agency (WADA) has said it believes the hackers are Russian and gained access to its anti-doping administration and management system (ADAMS) via an IOC-created account for last month's Rio Games.


Indonesia declares candidacy for UN Security Council

- Sat, 24 Sep 2016 04:49:32 -0400

JAKARTA, Indonesia (AP) ? Indonesia announced Friday its candidacy for membership on the U.N. Security Council, saying its commitment and contribution to the world's body make it a true partner for world peace.

GOP lawmaker: FBI gave immunity to top Clinton aide

- Fri, 23 Sep 2016 22:36:15 -0400

FILE -In this Sept. 3, 2015, file photo, Cheryl Mills speaks to reporters on Capitol Hill in Washington. A court deposition released by a conservative legal group shows that Mills, a veteran aide to Democratic presidential candidate Hillary Clinton discussed Clinton's private email server with a technical aide who helped set up and run the system. Mills said in five hours of testimony that the conversations took place after Clinton stepped down as secretary of state in 2013. (AP Photo/Susan Walsh, File)WASHINGTON (AP) ? Hillary Clinton's former chief of staff, Cheryl Mills, and two other staff members were granted immunity deals in exchange for their cooperation in the now-closed FBI investigation into Clinton's use of a private email server as secretary of state, says a Republican congressman.


Yahoo is sued for gross negligence over huge hacking

- Fri, 23 Sep 2016 20:20:01 -0400

Yahoo Inc was sued on Friday by a user who accused it of gross negligence over a massive 2014 hacking in which information was stolen from at least 500 million accounts. The lawsuit was filed in the federal court in San Jose, California, one day after Yahoo disclosed the hacking, unprecedented in size, by what it believed was a "state-sponsored actor." Ronald Schwartz, a New York resident, sued on behalf of all Yahoo users in the United States whose personal information was compromised. A Yahoo spokeswoman said the Sunnyvale, California-based company does not discuss pending litigation.

Business Highlights

- Fri, 23 Sep 2016 17:31:40 -0400

___ In Yahoo breach, hackers may seek intelligence, not riches If a foreign government is behind the attack that compromised a half billion user accounts at Yahoo, as the company says, the breach could ...

NSA hacking tools were likely stolen after an operative accidentally left them on a computer

- Fri, 23 Sep 2016 17:30:55 -0400

Though the NSA would prefer to fly underneath the radar, the controversial intelligence agency just can't seem to escape the spotlight in recent months. A few weeks ago, a group of hackers allegedly stole an impressively large number of NSA hacking tools and exploits and put them up for sale. Upon close inspection, a number of security experts went on record and confirmed that the leaked exploits were, in fact, from the NSA's vast toolkit. When word of the leak broke, some in the intelligence community initially feared that they were facing another Edward Snowden situation. As it turns out, it now appears that the leaked exploits were probably the result of human error. Embarrassingly, an investigation into the matter has revealed that a NSA operative may have inadvertently left the hacking tools in question on a remote computer, effectively leaving it behind as a gift to whomever discovered it. DON'T MISS:† iPhone 7 review Reuters reports : A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. Interestingly enough, a U.S. operative is said to have left the hacking tools behind†about three years ago. In the wake of that incident, the NSA opted not to reach out to software and hardware companies with products that were left vulnerable to the now "out in the open" hacking tools. Now as to whether or not the aforementioned operative left the tools behind purposefully or not is a question that investigators are still trying to answer. "Another possibility," according to the report, "is that more than one person at the headquarters or a remote location made similar mistakes or compounded each other's missteps." † †

Trump Hotels settles with N.Y. Attorney General over data breaches

- Fri, 23 Sep 2016 17:20:38 -0400

Flags fly above the entrance to the new Trump International Hotel on it's opening day in WashingtonBy Karen Freifeld NEW YORK (Reuters) - Trump International Hotels Management LLC agreed to pay $50,000 to settle with New York State over data breaches that exposed 70,000 credit card numbers and other personal information, New York Attorney General Eric Schneiderman announced on Friday. The company, which is led by Republican presidential nominee Donald Trump and three of his children, manages a number of hotels around the world under the Trump Hotel Collection name. According to Schneiderman, bank analyses of hundreds of fraudulent credit card transactions in May 2015 found Trump Hotels was the last merchant where a legitimate transaction took place.


Yahoo and Facebook slip; Endo and AAR gain ground

- Fri, 23 Sep 2016 16:50:45 -0400

Stocks that moved substantially or traded heavily Friday: Yahoo Inc., down $1.35 to $42.80 The company said hackers stole information from at least 500 million accounts. Facebook Inc., down $2.12 to $127.96 ...

Some Yahoo users close accounts amid fears breach could have ripple effects

- Fri, 23 Sep 2016 16:26:05 -0400

File photo of a man walking past a Yahoo logo during the Mobile World Congress in BarcelonaMany Yahoo users rushed on Friday to close their accounts and change passwords as experts warned that the fallout from one of the largest cyber breaches in history could spill beyond the internet company's services. After Yahoo disclosed on Thursday that hackers had stolen the encrypted passwords and personal details of more than 500 million accounts in 2014, thousands of users took to social media to express anger that it had taken the company two years to uncover the data breach. "We're probably just going to dump Yahoo altogether," said Rick Hollister, 56, who owns a private investigation firm in Tallahassee, Florida.


Markets Right Now: US stocks end lower

- Fri, 23 Sep 2016 16:06:09 -0400

The latest on developments in global financial markets (all times local): 4:00 p.m. Stocks ended lower on Wall Street following three days of gains. Energy companies led the way lower Friday as the price ...

Trump hotels settle with attorney general over data breach

- Fri, 23 Sep 2016 15:12:13 -0400

The Trump Hotel Collection company has agreed to pay $50,000 and shore up data security after breaches exposed more than 70,000 credit card numbers and other personal data, the state's attorney general ...

Sport-Cyber hack creating a "crazy scenario", warns Cram

- Fri, 23 Sep 2016 12:42:11 -0400

By Alan Baldwin LONDON (Reuters) - The hacking of confidential medical exemptions risks tarnishing innocent athletes and turning people off elite sport, former world champion runner Steve Cram has warned. The 55-year-old Briton, the 1983 world champion at 1,500 meters and 1984 Olympic silver medalist, spoke before a fifth batch of documents were published by cyber hackers on the fancybear.net website on Friday. The world anti-doping agency (WADA) has said it believes the hackers are Russian and gained access to its anti-doping administration and management system (ADAMS) via an IOC-created account for last month's Rio Games.

China's Huawei to start India smartphone production in Oct

- Fri, 23 Sep 2016 08:05:23 -0400

Journalists attend the presentation of the Huawei's new smartphone in ParisBy Swati Bhat and Paul Carsten MUMBAI/BEJING (Reuters) - Chinese telecoms giant Huawei Technologies Co Ltd [HWT.UL] will start making smartphones in India next month, the company said on Friday, joining a wave of compatriots setting up plants in the world's third-biggest mobile market. The plant will be operated with the Indian arm of electronics manufacturer Flextronics International Ltd in the southern Indian city of Chennai, Huawei said. India is trying to attract manufacturing into the country as part of Prime Minister Narendra Modi's "Make in India" initiative.


Big email hack doesn't exactly send the message Yahoo needed

- Fri, 23 Sep 2016 01:39:51 -0400

In Yahoo breach, hackers may seek intelligence, not richesSAN FRANCISCO (AP) ? Yahoo has been struggling for years to keep people coming back to its digital services such as email. That challenge just got more daunting after hackers stole sensitive information from at least 500 million accounts.


AP Top Extended Financial Headlines at 11:07 p.m. EDT

- Thu, 22 Sep 2016 23:07:36 -0400

Computer hackers swiped personal information from at least 500 million Yahoo accounts in what is believed to be the biggest digital break-in at an email provider

Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake'

- Thu, 22 Sep 2016 22:44:24 -0400

The logo of the US National Security Agency is seen in Fort MeadeBy Joseph Menn and John Walcott SAN FRANCISCO/WASHINGTON (Reuters) - A U.S. investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. The tools, which enable hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet Inc, were dumped onto public websites last month by a group calling itself Shadow Brokers. The public release of the tools coincided with U.S. officials saying they had concluded that Russia or its proxies were responsible for hacking political party organizations in the run-up to the Nov. 8 presidential election.


10 Things to Know for Friday

- Thu, 22 Sep 2016 21:01:35 -0400

10 Things to Know for FridayYour daily look at late-breaking news, upcoming events and the stories that will be talked about Friday: 1. OKLAHOMA OFFICER CHARGED IN MAN'S DEATH Prosecutors in Tulsa charge a white police officer who ...


Yahoo hack steals personal info from at least 500M accounts

- Thu, 22 Sep 2016 19:31:08 -0400

In Yahoo breach, hackers may seek intelligence, not richesComputer hackers swiped personal information from at least 500 million Yahoo accounts in what is believed to be the biggest digital break-in at an email provider. The massive security breakdown disclosed ...


Beyond the Yahoo hack: Other major data breaches

- Thu, 22 Sep 2016 19:06:27 -0400

Beyond the Yahoo hack: Other major data breachesThe Yahoo hack exposed personal details from at least 500 million user accounts, potentially the largest breach of an email provider in history. Despite the size of the break-in, attackers don't appear ...


Yahoo says hackers stole data from 500 million accounts in 2014

- Thu, 22 Sep 2016 19:05:25 -0400

A Yahoo logo is seen on top of the building where they have offices in New YorkThe attack on Yahoo was unprecedented in size, more than triple other large attacks on sites such as eBay Inc , and it comes to light at a difficult time for Yahoo. Chief Executive Officer Marissa Mayer is under pressure to shore up the flagging fortunes of the site founded in 1994, and the company in July agreed to a $4.83 billion cash sale of its internet business to Verizon Communications Inc . "This is the biggest data breach ever," said well-known cryptologist Bruce Schneier, adding that the impact on Yahoo and its users remained unclear because many questions remain, including the identity of the state-sponsored hackers behind it.


Silver lining: Not every exploding Galaxy Note 7 actually exploded

- Thu, 22 Sep 2016 19:00:23 -0400

They say that all press is good press, but I'm willing to bet that Samsung would beg to differ . The whole exploding Galaxy Note 7 scandal has been nothing short of a catastrophe for the South Korean company, but there is a silver lining. An extremely thin, almost invisible silver lining, but a silver lining nonetheless:†Not all of the reports of†exploding phablets has turned out to be real. DON'T MISS:† Massive data breach hit 500 million users, Yahoo confirms According to ZDNet , Samsung says that it received 26 false reports following the announcement of the worldwide Note 7 recall earlier this month.†Here's how those†26 reports break down: 12 of the consumers had phones that weren't actually faulty, 7 of the consumers couldn't be reached and 7 more either cancelled their reports or told Samsung that they'd already gotten rid of the phone. One of these reports came from a Canadian consumer, who purportedly took a picture of a ruined Galaxy Note 7 he found online and told Samsung that it was his phone. Another consumer in Singapore says they threw the handset out of†their car when it caught fire while they were driving, but couldn't provide proof. It's not surprising to learn that there were customers trying to take advantage of the recall in order to possibly score a lawsuit or at least very least a free phone, but what's perhaps slightly more surprising is that Samsung shipped a phone with a battery that could catch fire. It's almost too close to call, really. If the controversy hasn't scared you away altogether, you can buy one of the 500,000 safe Galaxy Note 7 units that Samsung shipped to carrier stores across†the United States today. Other than the whole exploding business, it really is the best Android phone on the market, and possibly one of the best ever.

MacOS extension lets you watch Netflix while pretending to work on spreadsheets

- Thu, 22 Sep 2016 18:30:33 -0400

The end of the week is nearly here. You don't really want to be stuck in Excel all day. We get it. Luckily, if you're running macOS Sierra, a new feature lets websites pop video out to a picture-in-picture view, letting a small version of the video float over other windows. It's a handy tool†if you just want to keep half an eye on a livestream, but unfortunately, it requires video players to enable a picture-in-picture button, and not many have yet. DON'T MISS:† 15 apps every iPhone 7 and iPhone 7 Plus user needs to try That's why developer†Arno†Appenzeller has made a free Safari extension that will pop out any HTML5 video from a web page into a PiP image. Most notably, it lets you PiP YouTube and Netflix videos, which sounds like an ideal way to waste your afternoon. The app is available for download here. Once you've downloaded, extracted and run the app, go to Extensions in Safari, and tick the PiP box. From there, a toolbar should appear in Safari which will let you pop out any video from the browser. For a long time, Windows has been the go-to multitasking software for heavy users, with much better support for split-screen and multi-display work. But now that better window management is part of macOS, and PiP lets you view a video while working on something else, macOS is making a serious play for heavy users. And, of course, office workers who just wanna slack off.

?Jimmy Kimmel Live? pokes fun at Donald Trump?s fake tax returns

- Thu, 22 Sep 2016 17:55:40 -0400

Donald Trump loves boasting about how wealthy he is, yet the Presidential candidate steadfastly refuses to release his tax returns. Over the past few months, the reasons why Trump has declined to make his tax returns public have been all over the map. Sometimes he'll bring up something involving an audit and other times he'll simply say he doesn't have or want to. Looking to have a little bit of fun with Trump's waffling, the folks over at Jimmy Kimmel Live yesterday took to the streets and told any Trump supporter they could find that Trump had, at long last, released his tax returns. They then "asked them specific questions about these totally fictional tax returns in another edition of†#LieWitnessNews." DON'T MISS:† Google?s Pixel phones look like the iPhone 7, so they must be really boring Many of†the questions Trump supporters were asked were completely random and downright hilarious, including gems such as: "Was it legitimate for Donald Trump to write†off†all his marriages over the years as entertainment ?" and "The Donald Trump foundation donated $1000 to the legal defense fund for the dentist who killed Cecil the Lion, is that okay?" Of course, the nonsensical answers and ridiculous justifications that these people on the street came up with is what truly makes the video shine. As evidenced below, apparently nothing that Trump does these days -- even hypothetically speaking -- comes as much of a surprise to anyone. https://www.youtube.com/watch?v=BYpw2uAD9bg

Michelle Obama passport scan appears online in apparent hack

- Thu, 22 Sep 2016 17:36:38 -0400

WASHINGTON (AP) ? The White House said Thursday it was looking into a cyber breach after what appeared to be a scan of first lady Michelle Obama's passport was posted online.

9 paid iPhone apps on sale for free for a limited time

- Thu, 22 Sep 2016 16:20:31 -0400

Do you want to stream movies, play games, block ads and capture Pokemon, all from the comfort of your iPhone?†Well, you're in store for quite a treat, as we've rounded up a selection of free apps that do all those things and more. And if you're quick, you might even be able to catch a few free apps from yesterday's post . MUST SEE:† New on Netflix: Every movie and TV show being added in October These are paid iPhone and iPad apps that have been made available for free for a limited time by their developers. There is no way to tell how long they will be free. These sales could end an hour from now or a week from now ? obviously, the only thing we can guarantee is that they were free at the time this post was written. If you click on a link and see a price listed next to an app instead of the word ?get,? it is no longer free. The sale has ended. If you download the app, you will be charged. VLC Streamer Normally $2.99. Sit anywhere in your house and watch movies or TV shows on your iPhone, iPod or iPad. VLC Streamer streams movies from your computer to your iDevice. Winner *Best Entertainment App* Chip.de. You can watch anything from your movie collection. No need for complex conversion processes. No need to manually transfer programs to your device. ? Features include ? - Free helper app gets you streaming quickly and allows you to browse local drives, and Windows network shares - Stream over wifi directly from your computer - Support for multiple resolutions and streaming quality levels - Customisable gesture controls - Live streaming of video after a few seconds of processing (assumes a reasonably powered computer) - Airplay support - TV Out support for iPad and iPhone4 - Easy to copy movies directly to your device for watching on the plane or out of the house. - Supports Windows, Vista, Windows 7 and Windows 8 - Supports Mac OS 10.5 and above ? System Requirements ? - VLC Streamer will not play DRM protected videos. Videos from the iTunes store do include DRM. - VLC Streamer is designed to work on your local network, and the free helper app has to run on your Mac or PC. - Supports Windows, Vista, Windows 7, Windows 8, Windows 10. - Supports Mac OS 10.7 Intel and above. Download†VLC Streamer AG Drive Normally $3.99. THE FUTURE IS NOW The boldest futuristic racer ever made is here! An epic vision of the future, AG Drive takes you on the ride of your life as you drive blazing fast anti-gravity race craft and race against opponents on spectacular tracks that dive over and under an Earth city of the future. FEATURES - Main Events and Quick Events: Play AG Drive as you wish - Quick or Big! - Enjoy different modes of play such as Single Race, Time Trial, Elimination, Cup, Speed Record, Duel, etc. - Multiple tracks with different settings: sunny, sunset, night, etc. - Ships with different skills - can you master them all! TECHNOLOGY The world of AG Drive is real and full of life - witness huge futuristic highway systems come to life, with air traffic filling the skies as spaceships land and take off, and spotlights sweep the skies. The stunning, unparalleled visuals of the world of AG Drive were possible to be realized only because of the ZORG 3D engine. SOUNDTRACK The game's mind-blowing original soundtrack is something never done before - an unprecedented collaboration between some of the biggest, most talented musicians spearheaded by none other than Ari Pulkkinen ("Aritunes" - soundtracks for Angry Birds, Resogun, Trine 1 & 2, Outland, etc.). END NOTE Born out of love for games like Wipeout and F-Zero, AG Drive has been a long time in the making, and is now ready to show you the future. AG Drive is a showcase to the world for what can be achieved when you combine true vision and passion with cutting-edge technological prowess. Download†AG Drive Go Surf Normally $1.99. Eternally called by the song of the ocean, a surfer?s journey is never ending. You search the world over looking for that perfect ride. There's always one more wave to conquer. And now the endless wave is finally out there...All within the palm of your hand. Use your bodacious skills to break the record for the longest wave ever ridden. How far do you think you can go? Be careful however, throughout this beach-themed adventure you have to avoid a series of pitfalls. Crowds will attempt to get in your way, wipeouts are most certainly a hazard, and watch out for that which lurks beneath the water?s surface. Remember, the experienced surfer doesn't ever want to become shark bait. RESOURCES ? Easy to learn, hard to master - tap and release surf game ? Complete missions in which you can try new surfers with different styles ? Perform aerial maneuvers to activate ghost mode ? Bonus session - Advanced tube rides ? Fluid and challenging physics-based game ? Beautiful day and night backdrops ? Original musical composition ? Collect floating chips to increase your spending power in the surf shop ? Challenge your friends in the Game Center Download†Go Surf Stringly Normally $2.99. Stringly is a great way to save the little thoughts, snippets, and bits of information that we deal with everyday. The app sets aside all the complication of most note-taking apps while still remaining robust and powerful: Add photos and Markdown rich text to your words. Everything you type is synced to all your devices in real time. If you are looking for a powerful to store simple things, Stringly is perfect. Give it a try! Download†Stringly Ads Blocker Normally $0.99. The most powerful FOUR-in-ONE content blocking App A centralized screen to control all 4 blockers Shortcut to Safari Settings ? Included with the first-time tutorial Ad Blocker ? Block ads, banners, popups, and annoying publishers Content Blocker - Disable images, fonts, and other things that slow pages Privacy Blocker ? Prevent spying and advert trackers Whitelist Manager - powerful custom whitelists for users! Download†Ads Blocker My Speed Track.er Normally $0.99. My Speed Track.er, a simple speedometer to test the speed of walking,driving or sailing. ***Features*** - Easy main interface to show different speedometers which are in different counting units. - Set your aim distance, the time you need to spend will be calculated according to your current speed. - Compass will guide you to the right direction. Please pay attention: Continued use of GPS running in the background can dramatically decrease battery life. Download†My Speed Track.er Easy Car Player Normally $1.99. Easy Car Player is a super easy music player for the iPhone. The main purpose is to have a player centered in the use in the car: very few and simple options to start as fast as possible one of your favorite playlists. Not a lot of options, no small typefaces. Only some few playlists selected from your general iTunes playlists and ordered as you want. The playlist are ever played randomly. When playing a song, a very simplified interface is shown: artwork, song title and album, in very big typeface. And for the control: stop / play, previous track and next track. In addition, we provide an app for the Apple Watch: you could control all the features of Easy Car Player from the watch. Finally, we have developed and interesting feature when we are in the car: hold that album. you can maintain the current playing album when tapping in the artist name (iPhone) or in the "hold" button (Watch). Current album continues playing until you deactivate the option. In that moment player go to the previous selected playlist. Features: - Easy player with very few distractive elements. - Select favorite playlists from your iTunes playlists collection. - Order, reorganize and select favorite playlists from the main screen of the app. Playlist are presented in a very big typeface to easy selection. Selecting a playlist start random playing of that list, immediately, avoiding distractions. - Control the basic playing elements: stop / play, previous an next song. - Control all elements from the Apple Watch. - Hold feature to maintain playing current album or turn back to your selected playlist. Download†Easy Car Player Poke Location Finder Normally $0.99. Poke Finder is pokemon finding tool with known pokemon locations and encounter times submitted by active Pokemon GO players from all the world. Using Poke Finder is simple. You can automatically see all of the known pokemon locations around you by scrolling around the map or you can alternatively use the "Filter" button to select a specific pokemon you want to find. Download†Poke Location Finder Moonlight Shot Normally $0.99. Moonlight Shot is simply the best photo editor for the iPhone. Moonlight Shot employs only the highest quality photo adjustments and does so with blinding speed. Want to take amazing photos? Stand out from the crowd - make your photos POP! Moonlight Shot will transform your photo experience into something truly memorable. Choose how you want to remember that great view from your trip, or that delicious meal you shared with a friend. With Moonlight Shot?s live filters, you can preview how your photos will look, before you even take the photo! Download†Moonlight Shot

Netflix knows how and why you binge-watch its shows

- Thu, 22 Sep 2016 15:55:12 -0400

With the TV landscape populated with so many critically acclaimed and revered shows, keeping up with everything is practically impossible. As a result, viewers are increasingly becoming more discerning about what shows they choose to watch. After all, who has time to sit around and watch 4 hour-long episodes of a show that goes nowhere when there's so much quality programming to digest. As a result, when a particular TV show is recommended to someone, a common response is: "well how many episodes before it gets good?" It's a fair question, to be sure, because some shows need a bit more of a runway before getting off the ground and hooking users in. Interestingly enough, Netflix has all sorts of advanced algorithms underpinning its site and it knows, with startling detail, which episodes of which shows are the ones that lure users in for good. Believe it or not, there's even a name for this type of data: hooked episode research. According to Netflix, they determine which episode of a show is the lure† by determining which episode, upon completion, can maintain 70% of viewers for the duration of the season. DON'T MISS: 10 hidden gestures in iOS 10 to help you get the most out of your iPhone Speaking on the matter to Forbes , Netflix said: "From time to time we analyze data to look for new viewing patterns, habits and trends and unveil the findings and new ways of watching." What's particularly fascinating is that Netflix discovered that "viewing behavior is universal", which is to say that the same episode that gets viewers hooked in the United States is likely to be the same episode that gets viewers hooked in other countries as well. "We?ve always believed there is a universality to great stories,? Netflix†VP of Original Content Cindy Holland said. "The Internet allows us to share these stories with a global audience and what we see from the data is how similar our members watch and respond." Netflix didn't release all of their data, but they did provide a handy graphic which illustrates what their research found for particular shows.

Massive data breach hit 500 million users, Yahoo confirms

- Thu, 22 Sep 2016 14:40:15 -0400

Yahoo has†confirmed that a data breach from 2014 hit 500 million users, allowing hackers access to sensitive information, including poorly encrypted passwords. A press release from Yahoo confirms the news,†and follows reports earlier today that Yahoo was set to confirm the breach. If true, stealing the user credentials from 500 million users would be one of the largest hacks ever to hit a US company. DON'T MISS:† Yahoo to confirm hackers stole passwords for 200M accounts all the way back in 2012 In a release , the company said "A recent investigation by Yahoo has confirmed that a copy of certain user account information was stolen from the company?s network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers." Yahoo points out that no payment info was stolen. While some of the passwords stolen may be encrypted, data dumps like this tend to be decrypted reasonably quickly. The statement goes on to confirm the extent of the hack, saying "Yahoo believes that information associated with at least 500 million user accounts was stolen." However, Yahoo believes its systems are now safe and clear of hackers. Needless to say, anyone with a Yahoo account should immediately change their password, and the password on any other accounts that might share a password. Yahoo will be prompting anyone who hasn't changed their password since 2014 (!!!!!) to go do so now. To help users deal with the fallout from the hack, Yahoo has created a dedicated page full of FAQs . The most significant part of Yahoo's statement isn't the scale of the hack, but who the company believes to be behind it. Major breaches of user information are generally made by for-profit hackers, who steal the information and then sell it to other criminals, who can use it to gain money from identity fraud. State-sponsored hackers often don't have the same motives. We've already seen hackers linked to the Russian government conduct attacks against American political organizations, with the aim being to find sensitive documents and leak them to cause embarrassment. But a direct attack against a popular email host is a more nefarious and more direct attack on an American company.

Hand-delivered hacking: malicious USBs left in mailboxes

- Thu, 22 Sep 2016 14:13:05 -0400

This photo taken July 9, 2016 shows a thumb drive delivered to the home of French software engineer Julien Ascoet outside the French port city of Nantes. Although the memory stick is branded, Ascoet says he doesn?t believe the brand is in any way linked to the mysterious delivery. And Ascoet is not alone; there are signs that cybercriminals are experimenting with hand-delivery of malware to people?s homes. Australian police have drawn international attention by announcing that ?extremely harmful? memory sticks have been left in mailboxes across the suburban town of Pakenham, about 60 kilometers (37 miles) southeast of Melbourne. (Julien Ascoet via AP)LONDON (AP) ? Julien Ascoet was already suspicious when he pulled the plain white envelope from his mailbox this past July.


GOP-led House panel finds former Clinton aide in contempt

- Thu, 22 Sep 2016 12:17:47 -0400

WASHINGTON (AP) ? A Republican-led House committee voted on Thursday to hold in contempt of Congress a former State Department employee who helped set up Democratic presidential nominee Hillary Clinton's private email server. The employee's lawyer accused the panel of a "naked political agenda."

Charges dropped against British-Australian man in Dubai

- Thu, 22 Sep 2016 12:14:58 -0400

DUBAI, United Arab Emirates (AP) ? The United Arab Emirates has dropped charges against a British-Australian dual national living in Dubai over his efforts to raise money for Afghans who fled their country's war.

Iran oil industry fires, blasts raise suspicions of hacking

- Thu, 22 Sep 2016 09:32:23 -0400

In this photo released by the semi-official Iranian Isna News Agency, and taken on July 4, 2016, firefighters try to extinguish a blaze at the Bou Ali Sina Petrochemical Complex at the Imam Khomeini port, southwestern Iran. A series of fires at Iranian petrochemical plants and facilities have raised suspicions about hacking potentially playing a role in the blazes. Iran officially insists the six known blazes this summer weren?t the result of a cyberattack. However, authorities themselves saying that ?viruses had contaminated? equipment at several of the affected complexes. (Borna Ghasemi/ISNA via AP)DUBAI, United Arab Emirates (AP) ? A series of fires at Iranian petrochemical plants and facilities have raised suspicions about hacking potentially playing a role, with authorities saying that "viruses had contaminated" equipment at several of the affected complexes.


The iPhone 7 is already jailbroken (but you can?t jailbreak yours yet)

- Wed, 21 Sep 2016 20:00:51 -0400

Well, that didn?t take long. The iPhone 7 came out just†a few days ago and it has already been†jailbroken. Sadly,†early buyers looking to jailbreak the iPhone 7 or iPhone 7 Plus and install Cydia apps don't have anything to be excited just yet. The author of the jailbreak is keeping the exploit private. DON?T MISS:† 7 ways Apple?s iPhone 7 is much better than any Samsung phone Security researcher Luca Tedesco posted an image on Twitter that shows a jailbroken iPhone 7 (iPhone9,3), running iOS 10.0.1 with Cydia version 1.1.26 installed, discussing the jailbreak in subsequent†messages.†However, the developer did not share the method he used to jailbreak the iPhone, and there?s no tool available that you can use to jailbreak your device. It's also not clear if this is an untethered jailbreak. https://twitter.com/qwertyoruiopz/status/778519133302427648 It?s very likely that numerous other hackers, as well as intelligence agencies, are also working on similar jailbreaks, and the usual suspects who release them to the public will probably come out with a public version in the future. As always, though, you can expect Apple to patch the vulnerabilities that let hackers jailbreak the phone with upcoming software updates. After all, that?s how this iPhone jailbreak cat-and-mouse game is played. Should you jailbreak the iPhone 7 in the first place? It?s probably not necessary†for most users, especially considering the many advancements Apple made with iOS in recent years, some even inspired by†jailbreak apps. Not to mention that a jailbroken iPhone is also more susceptible to malware. Power users who want apps and resources that are only available from Cydia will probably want to do it though, and they likely†know how to guard themselves against iOS malware.

10 paid iPhone apps on sale for free today

- Wed, 21 Sep 2016 13:32:37 -0400

Today's batch of paid iPhone and iPad apps on sale for free for a limited time might be the best list we've put together in a while. There are plenty of high-quality iOS apps on sale for free today, and you'll find the 10 best ones in this post. There are also a few remaining freebies in Tuesday's post , so be sure to check back in that one for even more options. DON'T MISS:† 7 ways Apple?s iPhone 7 is much better than any Samsung phone These are paid iPhone and iPad apps that have been made available for free for a limited time by their developers. There is no way to tell how long they will be free. These sales could end an hour from now or a week from now ? obviously, the only thing we can guarantee is that they were free at the time this post was written. If you click on a link and see a price listed next to an app instead of the word ?get,? it is no longer free. The sale has ended. If you download the app, you will be charged. Privacy Pro Normally $39.99. "In the end, we picked Disconnect as our favorite [privacy] tool because it was the easiest to understand.? The New York Times, February 17, 2016. Super simple to use, Disconnect Pro empowers you to control your privacy and makes your iOS experience faster and safer, and also improves battery life and reduces wasted cellular data. Disconnect Pro gives you the ability to block and visualize tracking across your entire device, protecting you inside all the apps and browsers you use. About us: - Over 50 million people use our software - Amazing accolades include winning the 2015 Innovation Award for Privacy and Security at the South by Southwest Interactive festival, making the list of Popular Science?s 100 Best of What?s New and being recommended as the New York Times' favorite privacy app - Featured on 60 Minutes, the New York Times, the Wall Street Journal, the Today Show, CNN, Wired, and many more - Public partnerships with leading privacy/security organizations like the EFF and Mozilla About Disconnect Pro: - Blocks invisible tracking and next generation malware (malvertising) threats - Allows you to actually see the trackers we block - Accelerates page load speeds by up to 44% and reduces bandwidth by up to 39% depending on your device usage! - Unlike browser specific products, Disconnect Pro protects you across all your applications, including mobile browsers (Safari, Chrome, Firefox, Opera, etc.) Price: Limited time offer of $40 one-time fee Download†Privacy Pro Emoji Me GIF Face Maker $1.99†"clapping animation" in-app purchase is currently free. Design animated emoji faces that look like you, your friends, and your favorite celebrities! - Every face is an animated GIF! - Choose from different expressions like happy, thumbs up, facepalm - Send via Messages, Facebook, Instagram, Twitter, ? - Over 1 trillion combinations! Send emojis for free over Messages, other popular messaging apps, or as a text (MMS). Check if your phone company charges more for MMS compared to a normal text. Download Emoji Me GIF Face Maker Video Color Editor Normally $0.99. Video color editor allow you to colorize your videos and apply various splash effects. With video color editor, you are able to: - Convert videos to black and white while keeping chosen details in color - Make your cloth blue, red or whatever you like - Change color of chosen part in videos - Adjust brightness, saturation and hue of videos - Adjust contrast of videos - Adjust white balance and temperature of videos - Adjust RGB of videos - Add vignette effects Features: - Simply move your finger to color or recolor videos - Infinite undo and redo - Quickly share your editing on Instagram, Facebook and Twitter Download Video Color Editor Addic6ion Free $2.99 "remove ads" in-app purchase is currently free. Dive into the frenetic world of ADDIC6ION. To solve a puzzle, just place the numbers from 1 to 9 into the grid. It sounds seductively simple but there is a catch, only one solution exists. Unleash the math gaming wizard on you and use your logic skill to master this high-class brain puzzle. * Choose among 5 levels of difficulty. * Unlock more than 50 challenges. * Race against the clock and solve the maximum numbers of grids. * Login to Game Center to rank and compare your score with friends and other players. *** 6 reasons to play this addictive numbers puzzle game *** - It's fun for all ages. - It's an oddly satisfying way to kill time. - It helps you improve your memory and logic. - It increases your concentration power. - It holds a genius tag when played in public. - Over a million puzzles waiting to be solved. Download†Addic6ion Free Never Have I Ever Normally $0.99. This app Includes 485 Never Have I Ever Questions. For Adults Only 17+ This game is all about the players! Try to find as many fun and crazy players as you can, because the more they've done, the more fun you will have. And when, they've done something, they have to take a drink. So, get ready to laugh at each other's past actions and embarrassing moments. Be warned of hangovers in the morning and take precautions for it. Don't drink and drive and have a sober friend help out or retain enough basic functions to call yourself a cab. - Includes 485 Never Have I Ever Cards - Contains some hilariously explicit material, recommended for ages 17+ - Played on Ellen DeGeneres, The Big Bang Theory, House of Cards, and Game of Thrones - Relive all of life's awkward and embarrassing moments - Get to know your friends a WHOLE LOT better Download†Never Have I Ever Ella Normally $0.99. Record your elevation in real-time with Ella. Perfect for hiking, climbing, or road trips. Ella records & graphs your elevation changes and provides you statistics when your trip is completed. Ella's color scheme changes from gray to green or red as your elevation gain or loss exceeds 100 ft. from your starting point. When your trip is over, interrogate the elevation profile chart or view detailed statistics about your trip. Recording Statistics - Elevation gain - Start elevation - Finish elevation - Highest recorded elevation - Lowest recorded elevation - Cumulative elevation gain (Up) - Cumulative elevation loss (Down) - Duration (Time) - Gradient Elevation Chart - Interrogate the chart by touching different points of the graph to see your elevation gain/loss at that point in the trip Take Ella with you on the trail, up mountains, and down canyons. Download†Ella PictaSave Normally $1.99. Have you ever wanted to save the pictures you took from instagram or pictures that you've posted on social media that you deleted and forgot about until you come across those very pictures ? Well PictaSave is here for you save all your pictures from instagram. Features: ? Downloads your videos in full HD ? Downloads your photos ? Easy step by step user interface ? Copy the url from instagram ? Then easily paste it in the app ? And its automatically saved in your photo library for you to cherish Download†PictaSave Flick Kick Field Goal Normally $1.99. Step up and see if you have what it takes in the ultimate field goal challenge! With ease to learn controls and hard to master challenges, Flick Kickģ Field Goal is the addictive football game that's impossible to put down! Curve your kicks and earn rewards in ever-changing conditions. Prove your skills in the must-have game for any football fan! Features: - Intuitive Flick Kicking: Control the angle and curve of your kick with the flick of your finger. - The stadium: 360 degree wind with shifting severity. Anything from a light breeze to gale force winds must be taken into account if you want to succeed. Multiple Game Modes: - PRECISION MODE - get rewarded for perfect kicks, and see exactly how great your kicking skills really are!! - SUDDEN DEATH: The classic test of skill. No time limit, just focus and keep making kicks to add multipliers to your score. - PRACTICE MODE: Perfect your technique and learn how to become the best kicker in the world. We love to hear from our players! On Twitter? Drop us a line @pikpokgames Have a screenshot? Share it on Instagram with #pikpok Flick Kick Field Goal offers some game items for purchase with real money. You can disable in-app purchases in your device?s settings. Download†Flick Kick Field Goal InstaVideo Normally $0.99. The great photo and video collage app got even greater with whole new layout options(blended, free style and squared), whole new background options and background music! *********************************** InstaVideo+ is all about how to turn your multiple photos and videos into one single artwork - photo collage, video collage and video slideshow. Create awesome photo collage, video collage and video slideshow within just a few seconds with tons of layouts, endless options, colors, patterns, powerful text editor, beautiful filter effects, flexible play options, musics and narrations. The app is designed and optimized for Instagram! [Video Collage] ? 101 rectangular layouts with up to 9 videos ? Load multiple videos at once ? Trim each video at any time and size ? Apply beautiful filters to each video ? Adjust audio volume of each video ? Add your own song as background music ? Adjust audio volume and start/end time of background music ? Unique decoration with rounded corner, margin, border, shadow ? Tons of beautiful frames ? Background colors and patterns ? Gradient and shape background color ? Powerful text editor and stickers ? Easy width and height ratio ? Portrait and landscape mode ? Save and share in HD (up to 1080x1080) [Slideshow] ? Photo slides with your own photos ? Text only slides with texts and background color ? Edit, swap, duplicate and delete each slide ? Customizable play time ? 10 transition effects ? Background music with your own songs ? Trim and adjust volume of background music ? Customizable watermark with beautiful text styles and fonts ? Apply 11 image filters to each photo slide ? Add narration to each slide ? Add text to each slide with beautiful text styles and fonts ? Apply Background color to each text slide ? Instant preview ? Save to Camera Roll ? Share to Instagram, facebook and youtube ? Send email and copy to clipboard ? Convert to animated gif [Photo Collage] ? The ultimate photo collage layouts - Grid : Combine mulitple photos with 157 rectangular and polygonal layouts - Blended : Blend multiple photos and create stunning collage - Free Style : No limitation on how you add and arrange your photos - Squared : Create no crop squared photo and video for Instagram ? Load multiple photos at once ? Unique decoration with rounded corner, margin, border, shadow ? Tons of beautiful frames ? Background colors and patterns ? Gradient and shape background color ? Powerful text editor and beautiful stickers ? Edit photo with aviary photo editor ? Easy width and height ratio ? Portrait and landscape mode ? Save and share in HD (up to 2400x2400) Download†InstaVideo Free Music Normally $1.99. Millions of Tracks, Playlist! Absolutely Free, without any limits! Browse, search and listen unlimited Free music to your iPhone/iPod/iPad and support to iPhone 6s/6s plus. Millions of free songs, DJ sets, remixes and live concerts. Free Music facilitates free streaming of legal and unlimited music. Keep millions of songs in your pocket and conveniently enjoy them on the go. Free Music has been called ? the best music streamer? and ? the most well-designed app ever? Key Features: Music Streamer: ? Millions of free and legal songs available ? Modern and intuitive user interface ? Explore hottest music on iTunes Top 100 chart ? Explore trending music by genres ? Search for favorite songs or artists ? Powerful and advanced music streamer Music Player: ? Sleep timer ? Equalizer with BassBooster ? Stylish audio Visualizer ? Fine scrubbing ? Lock screen playback controls ? Background music playback ? Album cover art ? auto search or upload your own Playlist: ? Smart iPod-like music playlists ? Create your own playlists ? Full playlist manager ? Add and remove songs in Music Library Media Library: ? Import music from your iPod library ? Rate songs like in iTunes ? Tabs for Songs, Albums, Artists, Genres ? Tag editor Manager: ? Move, rename or delete tracks & songs ? Search by artist, title, album, genre ? Create and manage folders ? Sort by artist, track name, date, duration ? History of Recently listened tracks Support ? Shuffle and repeat mode ? Background playback ? Full lock screen controls ? Support both iPhone and iPad ? Optimized for iOS 9 with minimum requirement is iOS 6.1 ? Optimized for iPhone 6/6s and 6/6s Plus Download†Free Music

WADA head Reedie looks to heal rifts with Olympic officials

- Wed, 21 Sep 2016 11:56:22 -0400

LAUSANNE, Switzerland (AP) ? After months of barbs and sparring between Olympic and anti-doping officials, World Anti-Doping Agency president Craig Reedie expects an end to public conflict.

Samsung suffers backlash in China over smartphone response

- Wed, 21 Sep 2016 02:02:13 -0400

An assistant demonstrates the Galaxy Note 7 smartphone to a visitor at a Samsung Electronics display booth during an electronics expo in Beijing, Wednesday, Sept. 21, 2016. Samsung Electronics says its smartphones sold in China don't suffer the same problems as units that caught fire in the United States but Chinese customers complain the company is doing too little to reassure owners their handsets are safe. (AP Photo/Mark Schiefelbein)BEIJING (AP) ? Liu Jingtang was a Samsung loyalist. The Shanghai technology consultant traded up steadily through its smartphones to the new Note 7. But Liu's devotion was shaken by the Korean tech giant's confusing response to its latest product safety scare.


How the TV show 'Mr. Robot' won the prize for hacker realism

- Tue, 20 Sep 2016 18:20:40 -0400

How the TV show 'Mr. Robot' won the prize for hacker realismFinally, the computer hackers of the world have a TV show they can call their own. "Mr. Robot," a mind-bending drama in which a morphine-using computer-security drone gets enmeshed in a revolutionary ...


The FBI didn?t need an iPhone backdoor ? $100 of electronics does the same thing

- Tue, 20 Sep 2016 16:22:00 -0400

The Apple vs. FBI fight over breaking the encryption of the San Bernardino iPhone was one of the most important news topics of the beginning of the year. Ultimately Apple won, as it didn?t have to create a backdoored version of iOS that would let the FBI spy on that iPhone 5c that belonged to one of the San Bernardino shooters. The FBI won too, as it bought an iPhone hack for more than $1.3 million that let it bypass the password that protects the lockscreen of iPhones. DON?T MISS: Android user switches to iPhone 7 from pure Android and has some surprising opinions During the debate, the FBI shot down one iPhone hack solution that would not involve Apple. Researchers proposed that the FBI would simply dismantle the iPhone, remove the NAND memory that contains the encrypted data, clone that memory, and then brute force their way into it. That way, the FBI would be able to try out all the possible password combinations without triggering any of the safety mechanisms Apple built into iOS, to prevent such spying techniques. The FBI dismissed the method and chose to pursue other avenues. The iPhone is encrypted only as long as it?s protected by a password. Once you discover it, you can access all the data on it. The disadvantages of this proposed iPhone hack are that the NAND memory might be destroyed while it?s unsoldered from the iPhone?s main board. Secondly, entering all possible password combinations would take hours (for 4-character PINs) or months (for 6-character PINs) But the method does work, and a Russian professor demoed it in a YouTube video. For less than $100 in equipment, professor Cambridge computer security expert Sergei Skorobogatov proved that the method above works. He wrote a paper on the matter that explains how such an attack would work on iPhones and iPads no older than iPhone 6 Plus. Hackers looking to break into an encrypted iPhone would certainly be able to do it if the iPhone is old enough. And intelligence agencies that have sophisticated resources at their disposal could do it even more efficiently. Check out Skorobogatov?s video below, and read more about the attack at this link . https://www.youtube.com/watch?v=tM66GWrwbsY

McAfee's MGT sinks 21 percent after NYSE refuses share listing

- Tue, 20 Sep 2016 14:01:10 -0400

Computer software pioneer McAfee speaks with reporters outside his hotel in Miami BeachBy Noel Randewich SAN FRANCISCO (Reuters) - Shares of MGT Capital Investments , led by anti-virus software pioneer John McAfee, dropped 21 percent on Tuesday after it said the New York Stock Exchange denied approval of the listing of shares for a planned merger with anti-spyware company D-Vasive Inc. The steep plunge in MGT brings its losses over two days to about 40 percent after the company said on Monday it had received a subpoena from the U.S. Securities and Exchange Commission. In May, MGT surged more than 1,200 percent after the mobile gaming company announced it would transform into a cybersecurity company and be led by John McAfee. As part of the deal, MGT said it would issue 43.8 million shares to acquire assets from McAfee's D-Vasive Inc. McAfee would become chief executive and MGT would change its name to John McAfee Global Technologies, Inc. MGT said it was exploring alternatives and remained committed to the deal.