antivirus Mining norton-crypto company 1

  News from Norton:   Amid a slew of mining software bugs, developers at Norton Life Lock, the successor company to the former Symantec Corporation, unveiled a cryptocurrency-mining solution built into antivirus. The move was dictated by the need to protect antivirus users from malware-mining programs. This new feature is now called Norton Crypto.         Read more:   That is, when you turn on Norton Crypto with the help of the antivirus module, the computer's video card will start mining cryptocurrency. The fact is that when various miners are installed on users' computers, there is often at best a heuristic, and at worst a system antivirus triggers a suspicious behavior or a virus actually found in the…

(More...)
company Samsung Blockchain wallet smartphones-1

  Cryptosystem News - Samsung launches its Blockchain Wallet:   Samsung has been planning to launch such an application for quite some time. And now the company has been able to create a fairly secure solution for its users. Such a cryptocurrency wallet, Blockchain Wallet, is built into the Samsung ecosystem and into the security perimeter levels of the devices. The development is so far available for Galaxy series smartphones.     Read more about Samsung Blockchain Wallet:   This app is designed only for devices running the Android operating system. That is, according to the enhanced security of the application developed by the specialists of the company, access to the encrypted keys can be carried out on two main…

(More...)
google alibaba privacy user 3

  Google and Alibaba - there's no hiding from them:   The BigTech giants have apparently developed their own ethical standards regarding user privacy. Google and Alibaba are very close-minded about having information about the interests of people who use their services.     About Google:   A lawsuit against Google is now in full swing. The Arizona Attorney General's Office believes the company is engaging in illegal data collection. That is, sensitive user data, according to the prosecutor's office, is being collected in violation of the law.   The most interesting thing is that, according to the case and published documents, Google's management was aware of the situation. A piquant point is that in the process, it turned out…

(More...)
AMD-2-Ryzen 8000 -processor-desktop

  Ryzen 8000 - perspectives from AMD:     Historically, in the market for desktop processors and related devices, Intel leads the way and AMD catches up. However, as years of practice have shown, these are mostly tricks of different marketing approaches. Chips are invariably improving in the long run, as are their technologies. As an example, the introduction of the new Ryzen 8000 processor.     The situation is roughly similar in the mobile chip market, where new players appear from time to time. Of course, this somewhat changes the picture, but just not on a mass scale - shades change, not colors...   AMD has set its own bar for the time being: by 2023 to release Ryzen…

(More...)
serverless computing web year 1

  What is the interest of companies in serverless computing:   Serverless computing has been able to triple its turnover in the last year. Of course - serverless computing, as such. It's just that they are not tied to a specific physical server. But this approach allows for a more rational allocation of resource consumption - both computers and network bandwidth.     Read more:   Statistics on the use of serverless systems indicate that many companies are extremely interested in operating them. In addition, related services such as VPS or Cloud, for example, are also generating interest in related lines of work.       In detail:   Research has been done that has covered the entire serverless computing…

(More...)
Hybrid-cloud-VPN-VPS-security-remote-1

  Hybrid cloud, VPN and VPS - what is it for:   A persistent recent trend regarding remote working involves the right approach to securing components of corporate systems and networks, such as hybrid cloud, VPN and VPS. A comprehensive approach to security measures is being taken to ensure the reliable and stable operation of companies' IT infrastructures.     Prerequisites:   Over the past year, statistics show that the growth of access attempts through remote services of companies, in different countries, ranges from 40 to 130%. Many of them, only due to the number and sharply increased professionalism of cybercriminals (due to the use of services of free, dismissed at the beginning of the pandemic) achieve their goals. This…

(More...)
api-Technology-development-networking-use-1

  API is the center of attraction of the masses in modern networking technologies:   The use of API is becoming more and more important every year in all spheres of IT technology development. It has long been hard to imagine how the networking world did without such things...     Who else is interested in it:   Of course, cybercriminals of all ranks can't ignore such widely sought-after technology. Attacks on the API and, accordingly, the risks of use in various systems are invariably growing.   Entire foundations have already been created to prevent possible security breaches. In addition, artificial intelligence has recently been increasingly used for development in secure use. It also - of course - requires real-time…

(More...)
ARM-chip-Android-architecture-1

  ARM is launching Armv9 technology:   In the latest developments presented, ARM's chips, as well as their GPUs, the company anticipates integrating into new Android as part of its Armv9 architecture over the next year.     Read more:   ARM's flagship processors-including the Cortex (X2 and A710, as well as the Mali-g710 graphics processors-use the Armv9 architecture. In other words, for the current decade, this is really ARM's breakthrough technology.   More to the point:   Of course, most users are unlikely to fully understand what this means. And it's by no means their fault. Marketing tricks by companies have accustomed them to ignoring many of the advertised aspects and technical parameters.     In very short, the…

(More...)
Global-security-market-trend-growth-1

  The growth of the global online security market:   As the global security market has recently been growth at a rate of 5 to 10% per year in various sectors, this trend is sure to continue. Due to a qualitative change in technology - remote networking is stabilizing and new risks are emerging. This is especially true for complex hybrid cloud security.     What this has to do with:   Of course, the shift to corporate remote working in many areas. Many employers have tasted the beauty of lower office costs - rent, travel and the like. And so are in no hurry, even with the reduction or removal of restrictions to reintroduce a full-time office for their employees. By…

(More...)
5G-communication-internet-speed-hosting-1

  The prospects for 5G and the Internet:   The latest news is characterized by one detail: when describing the prospects for 5G and the Internet, only the increase in access speeds and communications is taken into account. For some reason, no one takes the trouble to understand the situation and realize the side effects. For example, such as an increase in the load on the network, hosting and reduced bandwidth.     The main aspects:   5G is certainly a great idea. No worse than WiFi-6. Of course, the two technologies will synergistically have a great effect. The question is - with the speeds that 5G is capable of giving - how quickly will the providers be able to…

(More...)
Android 12-google-operating-2

  Update to Android 12:   The current most recent update from Google has introduced all those operating system design choices, Android 12, that have been hotly debated over the past year.     In design:   Regarding the look, we can say that this is the most serious update to the system's design, if you count since 2014.   In apps:   Google apps such as Google Maps and Photos, for example, have been updated in terms of features in performance and more elaborate privacy.     In devices:   In addition to Google's own devices, of course, such as the Pixel, others will be updated. That is, devices from manufacturers such as Oppo, OnePlus and Xiaomi, as well…

(More...)
Digital-fingerprint-technology-user-1

    A digital fingerprint is a cast of a user's profile:   Why is there so much interest from large companies in anonymized personal data? What does the user want, and what will help their interaction with the company? A workflow technology such as digital fingerprinting from a browser makes this a lot easier. After all, recently announced technologies like Google FloC, for example, have not yet found widespread support.     Historically:   Once upon a time, it was the case that online stores and websites were content with minimal information. Often all they needed was a fictitious nickname and their own created password. This was done to create a user profile.   Then they began to be…

(More...)
Microsoft-Azure-Blockchain-Service-company

  Microsoft-Recommends Azure Blockchain Customers To Move:   The company, without announcing the rejection of the termination of the corporate service, announced the recommendation to its Azure Blockchain customers to transfer data. Among them, such companies that use the blockchain service in their work - such as the fourth largest bank in the United States – JPMorgan. As well as the Microsoft – owned Xbox, and even such as, for example, Starbucks and Singapore Airlines …     Details:   Azure Blockchain is an enterprise cloud service. It works according to the BaaS (i.e. blockchain as a service) model based on Ethereum. According to the parent company, it will stop working in September 2021.   New projects from May 10…

(More...)
Chia- cryptocurrency-eco-friendly-1

  Chia - eco-friendly cryptocurrency of the space:   No sooner had the manufacturers of video cards come to their senses after the boom in their devices, as a new trend – the demand for hard drives and the increase in their cost. Mining a new eco-friendly cryptocurrency requires fast and voluminous storage of information.     Historically:   The most interesting thing is that the introduction of ecology to the new reality in terms of energy efficiency of mining has made its own adjustments to the technology. That is, initially, the manufacturers of the same video cards focused on gamers.   After the advent of cryptocurrencies and the phenomenon of mining, there was competition for GPUs. It has become…

(More...)
xiaomi-black-USA-3

  Xiaomi's victory:   The other day, the company still managed to prove its innocence to the main charges that were the basis for its inclusion in the" black list " of USA. Judge Rudolph Contreras ruled in favor of Xiaomi. His verdict: temporarily limit the bans against the company.     More detailed:   At the beginning of this year, Xiaomi was included in the list of companies undesirable for investment by USA citizens. The reason for this was the decision of the administration of Donald Trump. And the fact is that such a step was taken on the basis of suspicions about Xiaomi's connection with the military of the People's Republic of China.   Of course, the company…

(More...)
Google-EntertainmentSpace-3

  Google-App news:   The new optional section, designed for tablets based on the Android operating system, is now called "Entertainment Space". This option assumes an entertainment center. The touchstone will be the appearance of a separate panel in Walmart devices. Then similar panels will appear on tablets manufactured by Lenovo, as well as other manufacturers.     More detailed:   Also, Google, as the manufacturer of the program, believes that, in this way, it will take care of the users ' time. As you know, the company's strong point is working with media content. And now all the media will be combined in one app. Of course, users should clearly be more comfortable managing content from a single window.…

(More...)
security

  IBM Achievements:   The company was able to achieve excellent results in the development of the processor on the technological process size of 2 nm. IBM expects the final release of chips using this technology in production in 3 years. This will happen after laboratory tests, tests, and performance adjustments are completed.   Processor Comparison:   As stated by the company itself, when testing the chips, a comparison with other processors operating on the 7 nm process was used. The fact is that such testing is more visual. And despite the fact that 5 nm processors have already become widespread, the comparison with the 7 nm process technology is clearer for users.   Peak Quoted Transistor Densities (MTr/mm2) AnandTech…

(More...)
Google-Tsargrad-Court-USA-2

  What is the question - Google and Tsargrad: At the end of June last year, TV Tsargrad was blocked on Youtube. There were no standard 180 days that are allocated after a warning about blocking. The channel was shut down immediately. The basis is the presence of its founder in the USA sanctions lists. The Arbitration Court of Moscow issued a decision: to stop the account until May 20, 2021. They need to make a decision: either restore the channel account, or pay a fine.   Historically:   The owner of the TV channel is Konstantin Malofeev. He appeared on the sanctions lists since 2014. And the Youtube channel started its work in 2015. During this time, no claims…

(More...)
wordpress-hosting-0

  What do you think is the main thing when choosing Wordpress hosting? What should I pay attention to first?   Technical requirements. Wordpress hosting and PHP:   The official Wordpress website says that the recommended parameters for the latest version of the engine are as follows:   - PHP 7 and higher; - MySQL 5.6 and above or MariaDB 10.0 and above; - support for the mod_rewrite module of the Apache web server; - HTTPS support.   Let's look at it in more detail:   Despite the fact that Wordpress can also run on PHP 5.2.4+ and MySQL 5.0+, but this is not recommended due to the fact that support for versions 5.2-5.5 is finished, which affects security in…

(More...)
Google-authentication-multi-factor-mfa--1

  Google MFA or 2FA:   As you know, the most secure accounts are those with Google MFA authentication. The scheme has been working with 2FA for a long time, however, with today's level of penetration of mobile devices into everyday life, multi-factor authentication (MFA) is preferable.     Of course, no one really breaks a spear when choosing. Each user decides on their own what level of protection they need.   However, Google plans to make at least multi-factor authentication permanent in the near future. Enabling such features immediately and permanently will clearly remove the issue of the level of account protection. In any case, the security will greatly increase.   Learn more about this:   Security factors, of…

(More...)
Qualcomm-vulnerabilities-1

  Qualcomm is working on the bugs:   Even companies like Qualcomm, which are very serious about the security of their products for mobile devices, sometimes miscalculate. It is believed that the protocols for checking the security of chips should take into account the real risks. And if you check for all possible potential vulnerabilities and errors, it turns out to be very long and expensive.     Therefore, the developers can not completely exclude errors. Thus, due to the sharp increase in the post-pandemic activity of various cybercriminals, errors are detected more often than usual. No one says that there are none at all. It is only a matter of risk – that is, how much it is potentially…

(More...)
iOS-14-received-versions-Apple-versions-update-1

  News about iOS 14: Are received new versions of iOS 14, there are relatively many updates. Without being distracted by the obvious improvements, we will try to focus on the implicit ones. Apple is constantly improving its systems.     Details:   The main interesting difference is the ability to opt out of pre-installed iOS components. For example, you can now do without apps like Safari and Apple Mail. To replace them with other fields for receiving updates, the user will be able to choose.   About hidden functions iOS 14:   To select the default app in iOS versions higher than 14, a menu with the option to select has appeared. Thus, the function of selecting an application…

(More...)
5G-IoT-power-devices-wireless-energy-1

  Annotation: 5G energy for IoT devices is becoming a promising power use option. As the statistics say, it is already necessary to talk not so much about the "smart home", but how much about the "smart city". That is, there is a technological leap in the wireless infrastructure, in the ecosystem itself.   More detailed: Intelligent devices with a constant exchange of information through the network-this is our near future. Constant network traffic provides not only great opportunities. It has other sides, both positive and negative.     For example, the ever-increasing load on data networks and power grids. According to preliminary calculations, in 3-4 years, the number of IoT devices may well reach 40 billion. And for the…

(More...)
Intel-AMD-testing-esploit-1

  Intel and AMD – what are we talking about:   As part of the testing of the new Intel and AMD chips, disappointing results were obtained. Such a potential threat as exposure to the Spectre esploit was found in both variants. More detailed:   Experts from several universities, in particular, Virginia and California, conducted a study. So it turned out that the new versions of the Spectre exploit cope with standard security practices. Such new options are not safe for modern processors.     In addition: as it was found out, software solutions for blocking potential hazards are quite sound, but they significantly reduce performance. Thus, the meaning of upgrading computers is lost…   Details:   When using an…

(More...)
Apple-vs-Facebook-4

  Facebook and Facebook historically:   Apple and Facebook, privacy or openness? Or status gadgets and hypocrisy? The battle of the tech giants, apparently, is beginning to turn into a war of worldviews. More precisely, the contradictions between the philosophy and the missions of the companies are becoming more acute.   In fact:   By and large, they do not differ in their fundamental essence. They have long been a political force focused solely on their own needs. Whatever they openly declare, what social projects they did not support – the whole truth is in the annual reports.     Apple and Facebook are very different, but they are Big Tech giants. Therefore, Apple was able to increase its sales…

(More...)
Data-storage-1

  Announcement:   Scientists in France and Japan, as part of a joint project, were able to bring data storage to a completely new level of energy efficiency. In this way, innovations can dramatically reduce energy consumption when storing data in storage devices.   Problem Description:   Since there is a global avalanche of zettabytes of data, this is very timely. When expanding communication channels and increasing the amount of content, such a breakthrough is extremely important.     According to the analysis – by 2035-40, the consumption of this data will begin to significantly affect the global energy balance. Therefore, we urgently need technologies that can dramatically reduce the level of energy consumption. After all, the process of writing…

(More...)
1

Digital assets-the need for transformation:   The impending changes on a global scale, related to real productivity and the global transformation of such aspects of ownership as digital assets of companies, directly break the forecasts of three years ago.   The paradigm:   What are digital assets in the corporate sector? As a rule, company economists consider them mainly intangible assets. Thus, they are equated with their own IT infrastructure, key employees, investors, and so on.   However, the pandemic factor continues to operate. It easily introduces dynamic unpredictability variables into the calculations. He destroyed all plans and forecasts – because of implicit fundamental principles. These principles allowed a sharp rise in the number of bankruptcies of many companies, and…

(More...)
1

General information:   Probably everyone has already heard about such a phenomenon as phishing. However, few people realize the degree of reality and scope of this threat. The turnover of phishing, that is, its so-called revenue, is millions of dollars a month on a global scale.   It is difficult to make accurate calculations, because in addition to access to corporate networks, the loss of confidential and commercial information-companies have a lot of collateral losses. These are both reputational risks and customer trust, compromising the information security perimeter, and sometimes paying a ransom.…   More detailed:   No matter how secure the system is, its drawback has long been known – namely, the presence of the human factor.    …

(More...)
1

  5G cellular communications and satellites:   Cellular communication on satellite terminals has always been exotic, and such a standard as 5G is absolutely fantastic. Operators installed such structures only in very remote places, where other options (including fiber-optic cable) are too expensive. This solution is also common in the Arctic regions and individual research stations.   Development:   However, with the development of cellular protocols 5G and higher, it becomes relevant for operators and providers to build a ubiquitous ground-satellite infrastructure to optimize network loads. The question is the criticality of such a parameter as ping in the network: when it is not critical, the signal can be sent via satellite.   The point is that ping is critical:…

(More...)
1

Migration to VPS - background:   Migration to VPS for your company is already in the past - so it is a clear winner. Because over the past 20 months, it has become clear that it is possible to work in a completely different way than before. It turns out that working from home by connecting to the corporate network and clouds on a VPS can be comfortable. Both for the company and for the employees.     For them, a lot has already been passed. For example, - reduction of overhead costs. And this is decent: rent of premises, travel compensation, and so on...   Meetings, it turns out, with universal remote work, can be held in the same…

(More...)
1

About configuring resources in the Task Manager:   Microsoft sometimes still surprises its users. This happens when you add atypical features to your new pre-builds. Since the company, according to its concept, usually decides for its users what is more necessary for them and how best to use their products, this time, apparently, they decided to step aside a little.   More specific:   This new feature, "Eco Mode", is added to the Insider Preview Build 21364.  You can use it by opening the Task Manager menu in the "Processes" tab. Thus, it becomes possible to configure the consumption of computer resources by a specific application.   More detailed:   The function of the " Eco " mode for Windows…

(More...)
11

Promotion:   Promoting your websites, developments, and other products is a rather complex and thankless activity. Only a highly qualified specialist can establish relationships in such a complex and multi-factor environment. And even more so, if he uses only honest and legal methods for successful promotion – then this is definitely aerobatics.   Of course, to learn all these tricks, to spend your precious time on it is not given to everyone. And there are those who consider it possible to do what comes into their head, to use any chance to raise their site in the ranking.   More detailed:   Another platform that unwittingly began to support fans of spreading links to malicious sites and software through its…

(More...)
optovol

  5G - Short-term perspective:   Now everyone who is trying to look ahead and somehow plan their future has to admit the fact that it is not as easy as it was at least 10-15 years ago.   The fact is that the rapid development of technology does not give a clear direction, and such phenomena as, for example, the same coronavirus pandemic is completely confusing.   All these trends of the last few years lead to such an interesting conclusion that planning your life with the same confidence is a waste of time.   That is, of course, it is clear that now everyone will need to constantly learn in order to maintain current knowledge. And be ready…

(More...)

  Google's new approach to implementing privacy is finding more and more opponents: independent browsers, such as Vivaldi and others, and now also providing more than 40% of the Internet capacity of WordPress…   What is the reason for such a sharp rejection of Google FloC technology by independent companies?   As it might seem at first glance, this is just some kind of PR campaign aimed at getting additional bonuses in the marketing race for users.   If from the point of view of the statements of the managers of the development of quite small (by the employment sector in the market) the same Vivaldi browsers - maybe this point of view has the right to live. However, when…

(More...)
servers

Rationalization in all areas of production chains on a global scale is the most clearly traced trend in the optimization field of companies over the past few years.   All sorts of tricks based on "brainstorming" (in fact, the implementation of the properties of the most powerful analog computer known at the moment – the human brain – by enabling the "crowd effect"), and then – the inclusion of the collected data arrays in the processing, first using standard algorithms, and finally-with the help of artificial intelligence.   Without touching on the direct management of companies in relation to employees and the very controversial ethical aspects associated with this, otherwise-we can safely say, based on rapid progress in some areas…

(More...)
6g

Despite the difficult times for the company, Huawei does not stop there: they understand that by focusing only on the existing opportunities of the current moment, they will lose the prospect of generating much larger profits in the foreseeable future for the next 5-10 years.   For example, Huawei is already planning to introduce 6G, which will gradually replace the existing mobile communication standards.     And such implementation deadlines are connected, first of all, not even with an increase in the speed, which is planned to be raised about 50 times in peak values with a decrease in signal delay by 10 times, and not even with a thorough study of the protocols and security regulations for such high-speed…

(More...)
apple vc epic games

What do you think: what can a fairly popular, but not large enough by the standards of technology giants, company do in anticipation of lawsuits with the most expensive BigTech corporation, given the prospect of similar events with several other similar companies?   Of course, it is most reasonable to assume their deliberate loss – after all, the company Epic Games, in fact, unilaterally demanded to change the terms of the contract already concluded and valid for several years with Apple, first, in fact, violating it by action, and when it was pointed out to it-filed a lawsuit…   This, of course, looks somewhat wild from the usual point of view, but we should not forget that the standard ethical…

(More...)
fido2

  Cisco news: The unrestrained progressive growth of corporate systems and networks has intensified in recent months the processes of optimizing the cost of servicing their activities.   Paradoxically, research in this area shows how stable the situation is in the lack of education of employees of companies in computer security.   According to the research of the password manager company LastPass Research, the average user uses about 190 passwords in everyday life. Mobile applications, websites, access to the working environment... Which is quite an impressive figure. That is, it is definitely unlikely that at least one in 10,000 people will be able to remember all of them, without writing down and using a special program… It is clear that…

(More...)
text vps

In the world, the number and volume of infrastructure projects, both planned and already launched and operated by corporations in the current mode using VPS for remote desktops (VDI), is growing.     Due to the concern of the heads of many companies about the change in the structure of the global market, both in terms of production and consumption, especially with all the adjustments of the 2020 model, global digitalization began to yield results after the development of corporate networks at a new level of virtual infrastructure.   Reducing costs and increasing the level of security due to infrastructure virtualization and secure access to remote connection points for company employees, corporate interests are currently focused on bottlenecks in the…

(More...)

  API news: Cyberattacks have seriously evolved: with the encryption of data on servers and mass arbitrariness against Microsoft – as in Exchange Server, as well as obtaining part of the Azure code and other successful criminal actions-there were also attacks aimed at various "application programming interfaces", that is, APIs.     To put it simply, since users work with a GUI, that is, a graphical interface, and programs "communicate" with each other through an API, which is a set of algorithms for interaction between, for example, sites and service databases.   Despite the fact that almost a fifth of companies monitor and test their working APIs on a daily basis, however, only one in five managers does not express…

(More...)
big data

The time of fundamental research and testing of various algorithms in the field of Big Data, apparently, has come to a logical conclusion: existing solutions based on Fast Data (fast data) are quietly making their revolution in processing huge volumes of requests and information in minimal time intervals, bringing the business closer to the idea of responses and process regulation in real time.     Of course, if you look at how any service with the use of such technologies works, it becomes clear that everything is not as simple as you might think when you call, for example, a bank or a transport company.   Even if you determine offhand how many services are involved in the company's macro…

(More...)
vps cloud

  VPS and VDS News: The progress of virtualization of company resources in the modern IT space is becoming increasingly important against the background of all the significant parameters for providing access to resource-intensive applications from VPS, as well as from the position of forming an appropriate level of protection for the company.     The levels of corporate requirements for information protection have been most updated over the past year due to the transition, according to some data, to 60% of employees or more to remote connection options and in general a full remote working day.   Standard RDP connections were, as the coronavirus pandemic made clear, too vulnerable; corporate VPNs only slightly improved the situation.   Relentless statistics…

(More...)
man blockchain

The blockchain technology, which has become common for a long time, introduces new amendments and adjustments to the picture of the world we are familiar with.     These are not only well-known cryptocurrencies, but also other related technologies that greatly simplify auditing in almost any areas where there is a stable flow of information about current processes-no matter if it is financial aspects (payments, transfers), or technical information (network voltage, the amount of resource consumed-electricity or water) - all this reduces the risks of any abuse at times and even if we talk about document control – it makes life extremely difficult for unscrupulous entrepreneurs from the tax base and even civil servants in relation to any corrupt variants…

(More...)
glaz

The desire of Internet users to keep their preferences secret when searching for certain products on the Internet - against the background of the latest wave of privacy protection is quite understandable.     However, their irrational fears (such as the computer and the network as a "black box") do not give a sense of security, especially when trying to understand the complex contractual obligations of the parties, published as the basis of interactions and agreements between users and the corporations themselves, even for employees of companies that provide services for receiving and processing data.   In general, legally, the question always arises: why should the user delve into the complex structures of the offer, if there is a standard…

(More...)
Quantum

  With the advent of the ability to perform calculations in a quantum environment to solve medical, primarily diagnostic, problems, this direction, of course, interested many medical centers around the world.   The first experiments in this area a few years ago were already quite revealing: with the help of quantum computing, it is possible to establish a diagnosis with much greater accuracy than a specialist does, and, most importantly, to develop a course of, for example, chemotherapy for cancer, taking into account a very large number of factors. Thus, when connecting neural networks with quantum technology in the service of medicine, it is safe to say that the human factor in making complex decisions (subjectivity) will be removed to…

(More...)
Quantum technologies

  Quantum technologies news:   At the present stage of the development of training of artificial intelligence systems, in fact, there is a natural technological limitation associated with the limitation of the computing power of servers and even supercomputers in quantum technologies.     Datasets loaded for processing go through "several circles of hell" in not always successful variants of obtaining the optimal algorithm for their implementation: it often turns out that to get at least some useful result, additional data is needed that can significantly speed up the process, or without them the result is impossible at all. The worst case scenario is when it turns out that building a reliable predictive model based on the available data is…

(More...)
backup

39 seconds. What's it? Of course, a relatively short period of time. This is the interval between cyberattacks on various companies in the world today, taking into account the more than 300% increase in such actions on a global scale since the beginning of the coronavirus pandemic…   The world statistics for countries are somewhat different, but the essence remains the same: backups are still given quite little attention. According to the experience of IT specialists, the management of the vast majority of companies relate to backup (rather, not even to it, but to the associated costs for it, such as paying for employees ' time, buying storage facilities that meet security requirements, and so on) rather, as an unavoidable…

(More...)
Google

Google corporate news, as a rule, always catches unprepared readers by surprise – because they skillfully use various trends in related developments in similar areas.     For example, Apple's developments from the very beginning had their own zest – they often went completely their own way, both in the direction of developing their own processors and chips, and in the strategy of developing their operating system.   What seemed easier for the user and more difficult for technicians and programmers in comparison with their counterparts is now almost equal to the available technologies of other companies – and even for several years Apple used Intel processors in its devices… But progress does not stand still: for the new requirements…

(More...)

Since the beginning of this year, more and more analytical studies have been published on the topic of changes in the world's labor market.   Last year, at first, there was a strong opinion against the background of disputes about the need for at least a test version of the introduction of mandatory unconditional income (and in some European cities they have already introduced it as an experiment) - that universal automation, computerization and the introduction of conveyor robotic systems will throw a sea of potentially long-term unemployed people on the streets…   As a result, those startups immediately received support up to the state level, which made it possible to train specialists in the most popular professions for a…

(More...)

Since the end of last year, disputes between Australian representatives of news publishers, losing revenue, and Google, which for some reason was chosen guilty by the Australian Competition and Consumer Commission, have not subsided.   Oddly enough, the essence of the claims presented in two reports with a break in a month, boils down to the fact that Google violates the rights of users with respect to privacy and the rights of publishers due to the fact that they do not stand up to competition and lose revenue.     That is, the news publications of the mainland country really believe that what they are doing is right: of course, why should they grow in information and technical terms together…

(More...)

It's no secret that applications for mobile devices are made in our time for the purpose of earning money – the era of codes for your own pleasure has long sunk into oblivion.   Of course, for one of those who write these programs, there are several others who are also involved in creating the final value – managers, marketplaces and other participants in the global cycle of the digital sphere; and the consumer tastes the fruits of progress to the best of their financial capabilities.   And since the possibilities are different, for those who particularly want to use the paid program for a very limited time, there is such an option as trial versions – which after a…

(More...)
Microsoft

  Microsoft news: the competition of instant messengers during the pandemic and in the predicted post-pandemic level of their development takes on an absolutely epic scale: the growth of users due to the transition to online and cloud services exceeded all possible forecasts and expectations.   Research on the most promising areas of locomotives in online communication recently shows a priority in the growth of the gaming industry, and Microsoft, of course, tries to match the direction of growth, taking into account the existing developments, despite the rather ambiguous results in such projects.   Such Microsoft services as, for example, Microsoft Teams, or the same constantly changing and growing Xbox Live-this, by the way – is more than a dozen…

(More...)

It is very convenient to live in a customized smart home – after getting used to the potential of a complex of customizable equipment in a certain range, life seems to become easier and more pleasant.     Indeed: with the fast pace of life, especially in the metropolis, much is tied to the automation of processes: semi-finished products for cooking, robot vacuum cleaners that work in the absence of the owners of the house, and finally, the economical mode of the split system, which activates the optimal climate not only in the apartment or house, but also in the zones for the arrival of the owners… The smart refrigerator will remind you that the food storage juice is running…

(More...)
Apple

After a six-year trial and review of Apple's patent infringement case against Personalized Media Communications, which has been going on with varying success for the parties, a Texas federal court has finally issued a decision on compensation in the amount of $ 308 and a half million to the owner of the patent for FairPlay technology, which was a stumbling block and kept the lawsuit afloat after the initial decision to refuse.     In fact, the FairPlay technology itself allows for secure viewing of content on the user's end device, and is a method of encryption.   It is very interesting how it is described in Wikipedia – it states that this is an Apple development (and in the…

(More...)

As you know, today there is only an iOS version of the Clubhouse app, which has become the most popular in the top downloads for smartphones.     Now the mirroring of sites has long passed the level when it was possible to visually distinguish a fake from the original on the Internet: many methods are used to thoroughly copy a particular site with all the details, details and nuances of the design.   Often copied and edited sites work even better than the originals-and this is understandable, they experience much less workloads and are much better maintained, are under the constant control of administrators.   Initially, when a copy of the site is published, it is indexed rather poorly…

(More...)

It became finally impossible to deny the obvious – artificial intelligence has already entered our everyday life, or rather - gradually began to enter the work, all improving, and earlier, and faster than expected, faster than the development of so widely predicted robotic employees of companies.     What was not taken into account in the development forecasts is a lot of nuances that began to manifest themselves in the process of using processed arrays. That is, facts about artificial intelligence that were initially completely implicit became known – you can only compare this with flights into space or a descent into the Mariana Trench: that is, you can assume that there will be and how technology and metals will…

(More...)

Against the long background of various high-profile hacks in recent years, exploiting various vulnerabilities in Microsoft products, however, according to research, the global corporate sector is in no hurry to abandon the use of their software.     The number of unpatched servers has sharply decreased, the work has been stabilized: the familiar and quite convenient environment is gaining additional reasons to remain in the service of companies.   In addition, Microsoft has further corrected the situation by releasing in recent days the Exchange On-premises Mitigation Tool for comprehensive automatic correction of identified security flaws, in particular, such as ProxyLogon. There is also an additional tool - a specific correction script. Thus, Microsoft has focused its efforts on supporting small…

(More...)

  Google and Chrome news: Relations between the courts in the United States and the Alphabet corporation, which includes Google, have entered a new spiral: this is not the first time that lawsuits are filed with accusations of violating user privacy and violating their rights to personal digital space by collecting data in Chrome even in "incognito" mode.   The company clearly opposes such claims, which, in fact, does not help it to go against the actual state of affairs: in fact, when you open the Chrome window in private mode, a message is displayed that such information as, for example, the history of site visits, site data and cookies, as well as information in the forms to fill out,…

(More...)

With the development of many integrated technological processes in the work of post-technological societies, examples of which can serve as most developed countries, as well as in connection with the creation of programs that can also write programs in a given key, it is time to combine or "information qualitative explosion", as in evolution - a sharp increase in biological diversity (species and biomass growth) during the emergence of extremely favorable conditions for this.   There are many reasons for this, and the coronavirus pandemic has only spurred these nascent processes in the information community, especially in the circle of various tech-geeks who do not particularly bother to restrict the flight of creative imagination in the complete absence of moral…

(More...)

The progressive development of information technologies in recent years allows us to predict the discovery of mathematical algorithms that allow circumventing known encryption techniques: leading researchers in this field talk about not yet discovered, but definitely should be variants of equations, the solution of which lies in the field of both artificial intelligence and quantum systems.   What is beyond the power of modern supercomputers should conquer a new shift – cryptography in the quantum context of application is developing quite successfully, finding practical application both in the financial sphere (for remote authentication within banking corporate structures), and, of course, in the military, in cellular communications and other aspects of application.     The essence of this kind of idea…

(More...)
Google-11

  Google - Fight for users:   The evolution of targeting over the past decade has jumped several turns of the spiral at once. The explosive growth in the accuracy of Google ads for a particular user has surpassed all possible forecasts.   Many people perfectly remember the condescending smiles in response to the first attempts of search engines to guess our preferences for search queries, as well as some naivety and straightforwardness of the logic of the first Google algorithms and others…     The concept of Google in relation to advertising immediately fell in love with users: the ascetic look of the search engine and the absence of conspicuous advertising pleasantly distinguished the company from the rest, trying…

(More...)
Microsoft

It is impossible to ignore the absolutely significant debriefing regarding hacking recently – not only the private corporate sector, but also many state institutions, as well as even large financial structures that are rarely mentioned in this context, were under attack. That is, despite the emergency release of critical Microsoft updates for their Exchange, as well as the planned release of a set of updates and patches containing 89 fixes for critical aspects of the functioning of the software environment in the corporation's products, the question of the quality of response to known security problems remains unresolved.   The global nature of the recent hacker attacks, made possible after serious planning on the part of the attackers, has set a serious…

(More...)

At the end of last week, after summing up the results of cyber attacks on Microsoft products, such as Exchange Server and message services, crisis managers in the field of information security sounded the alarm because of a continuous system of hacks, which covered not tens, but tens of thousands of objects.     The global level of such a cyberattack, according to security experts, is primarily due to the obvious progressive automation of the infection process and the exploitation of vulnerabilities.   In addition, not only large corporate networks were attacked, but also medium-sized and even small companies; there is also an assumption that the vulnerabilities discovered by various hacker groups were spread within a limited circle of cybercriminals,…

(More...)
google floc

  Facebook Instagram, Twitter, WhatsApp, and other big tech giants, such as Google, Apple, and Facebook, with all their subsidiaries - Twitter, Instagram, and WhatsApp – have raised the issue of how many copies have been broken over the past year in the heated discussions in the vast information space regarding privacy. The topic of data misuse was raised by both websites and antivirus companies, not counting the giants BigTech, such as Google, Apple, and Facebook.…   Apple, as always, in its role – introduced a complex system of identifiers, which, judging by surveys of professional marketers-very few people have been able to independently understand at a decent level for a full-fledged level.   Facebook and its subsidiaries are still…

(More...)
Edge

  The January release of the Microsoft Edge browser pleased its users: a thorough reworking and revision of every important need in terms of memory consumption, total resource load and energy efficiency-all the main issues were not ignored by the developers.     The ability to build browser tabs in a vertical row that appeared more than 10 years ago in Opera, which is all the more popular in our time due to the change in the monitor format (the aspect ratio changed from 3:4 to 19:6 and even more widescreen options), is also implemented in Edge. However, not all functions are fully used yet: for example, it is not yet possible to freely move (reorder in the order the…

(More...)

Contrary to the belief about the extremely high degree of security of boot loaders for UNIX-based systems, there have recently been reports from security experts about quite critical flaws, up to a risk level of up to 7.5 on the CVSS 3.0 scale.   This list includes bootloaders such as GRUB and its next modification – GRUB2, and the main vulnerability that started it all turned out to be BootHole.     The most important thing is that on the basis of this boot vulnerability, it became possible to create parallel paths of information passing during checks from the algorithm underlying the UEFI structure and its Secure Boot, which ultimately negates the guarantees of this mechanism about the reliability of…

(More...)
Companies microsoft

  Technologies have been developing recently, trampling on all the predictions of analysts, Moore's laws and other predictive options with their results-so far we do not have such wide opportunities to predict and take into account all the variants of sobitiy.   That is, the development of IT, at this stage, can be compared with climate forecasting-that is, with equal persistence, based on the same facts, to build completely opposite models-from global warming to the second ice age - while slightly modifying the algorithm, and putting mathematical methods at the service of one or another interested in the necessary result structures…   Last year was very indicative of the results of the triumphant March of a virus-ransomware, because of the…

(More...)
System

Nothing stands still, especially in information technology, related both to the security of systems and to the evolution of tools and strategies of cybercriminals.   It is worth noting that the analysis of viral development trends at this time suggests that relatively few radically new objects are created: preference is given to fairly successful areas, protection from which is "on the verge of a foul" - that is, a point change that does not bring cardinal closures of the direction of the attack vector.     As a result, only a relatively small change in the components, the interaction mode – and new soldiers are ready in an unequal battle…   The strategic changes of the last couple of years…

(More...)

Industrially developed countries have recently made progress in the field of the quantum Internet. Almost all such centers have achievements – in the Netherlands, Russia, Germany, the United States, and others.     At the same time, their goals are very diverse, from connecting, as it was at the very beginning, the cryptographic authentication equipment of two clients (as was done in the interests of, for example, German banks in Munich in 2009), to plans for connecting computers at the country level.   At the same time, as the analysis of such systems shows, it is more logical to go in the direction of creating an infrastructure for clustering such computers, both for the development of quantum equipment and for…

(More...)

The relationship between users and a popular application is unlikely to change, even when at least one of them takes the trouble to really understand what it really means to transfer data to third parties.   Tik Tok lawyers on Thursday of this week decided that it is better not to start legal claims in the wilds of court hearings, and recommended that the owners of the application accept a pre-trial agreement.     According to its meaning, $ 92 million will be paid, and this amount includes damages for the systematic collection of user data, which included both biometrics and personal, confidential information. The essence of the claims against Tik Tok, however, is no longer about the collection of…

(More...)
Screen

  Since the last quarter of the previous year, it became known about the upcoming version of the shell functionality from Microsoft, which is aimed at creating a large-scale update in test mode approximately at the end of February.   This is an update to Sun Valley, which will significantly simplify life and bring a much more streamlined mode in a multitasking environment, provided you work with a lot of information: that is, it will be able to structure virtual desktops on a completely new level, especially if there are two or more monitors, and organize a stable, customizable binding of windows to specific workspaces.   In particular, there should be a function to optimize the size of the window…

(More...)

Last year, among other things, quite boring, against the background of all the unusual events in the world, almost ignored the fact of the 25th anniversary of Java technology, which, despite its rather impressive age and track record of participating in the development and maintenance of many necessary systems in modern IT, is not even going to retire.     And there are several reasons for this. First of all, because Java is not only a program execution environment (platform), but also a language, and again-and not only.   In addition, few platforms can boast of such a large number of developers – Java currently has more than 10 million people. Since the launch of the Java standard itself, namely…

(More...)

The whole complex technological nuances and the irrepressible desire of the company to stay on the cutting edge of technology, culminated in the triumphant March of production and sales of the iPhone 12 – Apple returned to the winner's title for the recognition of customers in the world in the last quarter of last year.     However, the main competitor, Samsung (with sales of 62.1 million units), remained the main global sales engine for the year, and the main intrigue this year is how events will develop in the marketing wars in the global global smartphone sales market, given the overall decline compared to the year before last by 5.4%, which amounted to 384.6 million units.   The main…

(More...)
Internet traffic

  Last year, contrary to many forecasts issued during the first quarter, significantly increased the volume of data transmitted globally: at peak loads, network capacity increased to almost 300 TBit/s, with an increase in possible throughput from 450 to 600 Tbit / s, that is, by about 35%.   International traffic exchange has increased more than one and a half times – 47% instead of the annual average for the last few years-30% annually, despite the expected 25-27% due to the pandemic.   The leaders in the growth of network capacity were European centers: Frankfurt and Amsterdam with traffic indicators at a peak of about 7 Tbit/s.   Thus, remote work and video communication generated one and a half times…

(More...)
Security

  All the way back to 2010, Apple has been focusing on the security of its mobile devices, its computers in this context remaining in the shadows. That changed recently, after a platform security update this Thursday on the company's Web site. Almost all the changes are related to the release of the new M1 processor, as well as as in anticipation of the launch of its older modification M1X, designed for Mac computers.     That is, all those security technologies that have long been implemented in mobile products were able to get their working version only at the level of standardization in relation to device chips, namely, starting with the M1 processor and its older versions.   This…

(More...)
Apple

With the release of a new line of Apple computers on the M1 processor, it turned out that they became popular not only among users, but also, accordingly, cybercriminals.   They must have drawn conclusions about the viability of citizens and companies, which in this difficult time, I was able to seek financial resources to apirat its computer equipment to the new Apple that certainly got their attention at the level of the attacked target segment.     Such an ARM processor as the M1, of course, has quite impressive means of additional protection, up to the built-in security modules. However, it can also be noted that the hackers worked at a very high level, and were able to find…

(More...)

Thus, more than a dozen cities in the United States will not use the face recognition of their citizens with the help of computer technology. This number includes cities such as Boston, San Francisco, and others.   The dissatisfaction of citizens expressed through members of city councils is manifested, on the one hand, in the violation of basic constitutional confidentiality – that is, it means that when face recognition systems are introduced, filming is carried out without obtaining explicit consent in the framework of automatic monitoring in the process of computer scanning of the observation space.   With regard to the invasion of privacy, the city councils of cities that have introduced bans on face recognition express their wishes to…

(More...)
Android

The development of an absolutely progressive shell for Android, based on many years of research by the company's employees, was a landmark message for those who were looking forward to updating to the latest version of this operating system.   The company has not made such large-scale changes for quite a long time, more than seven years. The concept of Material Design (which appeared with version 5 of Android) will be radically redesigned, taking into account the data obtained after processing arrays of statistical data and suggestions from both users and developers of various shells, who also revealed their interests and inclinations when creating certain design options.   The release of a new shell called Material Design Next may be…

(More...)
Apple

At this time, in many countries, an attempt is being made to pass legislation to restrict Apple's rights in relation to 30% fees (commissions) adopted at the level of the corporation's transaction policy; and the second point that threatens their financial well-being is the permission to create third-party points of sale for iPhone programs…   In the US state of North Dakota, senators decided to deprive Apple of the monopoly rights to sell applications written for their mobile devices and, thus, called into question the very cost-effective march on the planet of their smartphones and tablets.   The draft of this law No. 2333 provides for a prohibition for monopolists to restrict developers in placing their applications only on specialized…

(More...)

Research at the beginning of this year provides conclusions about the problems that have recently worsened in almost all software vendors, without exception: the pandemic, first of all, has become increasingly active in identifying gaps in the protection of any products.   This is due to several main important facts that companies can influence: the lack of qualified specialists not only in information security, but also users of server corporate platforms, that is, in fact, the system administrators themselves. In addition, it is clear that software vendors still fail to perform various important aspects and perform high-quality testing of products for security and overload resistance. Interesting news in this area was the results of testing a platform such as SAP…

(More...)

Long-known Favicon images, which were already identified in the noughties as clearly undesirable by many antivirus programs, have turned on a second wind in the marathon of tracking actions in various browsers.   The paradox is that, despite the rather advanced, from the point of view of the user, the methods that they use to hide any data about themselves in the process of Internet surfing, such as connecting via VPN and using various types of "incognito" mode, are powerless before the new identification system.   The point is to define a specific instance of a particular browser. This is due to the unique values that are formed in the operating system when the browser itself is functioning, and it…

(More...)

Monopolists-tech giants, according to the decision of the Government of the People's Republic of China, are limited in terms of the volume of market sectors.   China's state structures, which are responsible for regulating antitrust conditions in the administration of the Government of the Republic of China, have introduced additional restrictions for BigTech giants.     The newly adopted framework for them means a regime of stricter regulation of their activities, especially in terms of the established commercial practices of monopolies in this area. The basis for this is the main property of digital technologies, namely the explosive replicability (scalability) of business with almost no costs, when compared with other types of economy, for example, mining or shipbuilding.   That…

(More...)

Over the past few days, the largest social networks have conducted a joint operation to neutralize buyers and sellers of stolen accounts. This was similar to the resellers own actions, only this time the trolling was carried out not by them, but directly by Facebook security specialists (with subsidiaries), as well as by Tik-Tok: criminals were blocked and their accounts were deleted, even if there were several hundred thousand subscribers…   It is not known how shocked they were by this treatment of their digital profiles – the habit of staying in the shadows and taking such liberties only with other people has certainly broken the pattern of blackmailers, and it is now unclear how long such a shadowy industry…

(More...)

Recently, preparations for the commercial operation of the Dunant fiber-optic communication from the coast of the United States to France were completed. The cable runs along the ocean floor from the American point of Virginia Beach to the receiving station, located on the Atlantic coast of France.     The main partner in the design and implementation of this system was Google's partner, SubCom; the installation of ground stations on the American side was made by Telxius, on the French coast – by a well-known operator, Orange.   Technical innovations in the implementation of such a project as Dunant are, first of all, increased throughput characteristics due to channel separation and, secondly, the introduction of twelve-pair multiplexing. Also, in the…

(More...)

Google's loyalty to its customers is the fact that at this time there is an attempt to maintain a rather shaky balance between the interests of users of Internet browsers and the Google search engine itself and the interests of companies that produce and use contextual advertising in their work.   We must not forget that this mass of companies brings Google an annual income of about $ 100 billion, and they do not intend to just give up such a delicious piece.   At this time, there is a rather sluggish mode of working out and writing new relevant privacy rules (Privacy Sandbox). Those companies that bring large amounts of money to the company's cash register for targeting ads…

(More...)

The much anticipated user interface optimization Android TV suddenly turned into overhauled interface, which began to resemble the familiar and the comfortable look of the app on Google TV, widespread as TVs and a separate USB device that transforms almost any gadget with a large enough screen and USB port-the port into a full-fledged SMART TV.   This update from Android TV is already being distributed to Google Apps users.   Information about this app update has been online for several months, and finally it came out in the Google store.   The new Android TV has a thoroughly redesigned user interface, which looks as close as possible to Google TV. The Chromecast media player, which is part of Android…

(More...)

Recalling the expression – "if the product is free, then you are the product", many providers in 2020 conducted a complete audit of their resources and revised their plans for 2021.     Hosting itself, as a type of business, now, and especially last year, has received a powerful additional boost due to the pandemic and the limitations and at the same time opportunities that have appeared in the world.   On the one hand, at this time it is quite difficult to find a person who does not even remotely understand the meaning of such words as "Internet", "provider", "site" and "hosting". On the other hand, these concepts are extremely vague in the public perception… At this time, there…

(More...)

In general, such a product as a Dedicated Server is a set of hosting services, when the hosting provider allocates access to a physical server leased in the data center. The client gets full access to both the hardware and software parts for self-installation and configuration of the operating system, as well as configuration.     What you may need a Dedicated Server for - most often, to run projects that have increased resource requirements, for example:   - for hosting and administration of large sites with high traffic; - for projects that include application sites or those that require a high level of security.   Such servers are located in specially equipped production facilities (data centers), where they are…

(More...)

WordPress is currently the most popular content management system in the world. In general, out of the total volume of sites on the Internet and not being online stores, WordPress is preferred by developers in almost 40%...   Despite the criticism of WordPress for some slowness and imperfections of the architecture, which many webmasters attribute more to the possession of the ability to configure quality (that is, it is enough to understand the structure, functions, plugins and the interdependencies of all this), nevertheless, the number of sites on it continues to increase constantly.   So – why do developers and site administrators value WordPress so much, what is its appeal and what can it do?       Historically, from…

(More...)

In addition to the fact that the app can scan text and translate it, Google Lens is able to find and identify different objects, correctly identify and solve math problems, and recognize handwritten text in many languages…     The former name of the program is Google Lens, and it was published on Google Play in mid-2018. Since then, the popular app has been downloaded more than 500 million times in the Google Store alone.   Google Lens recognizes both objects and objects of the surrounding world and text (translated into the desired language from a rich selection list) in pictures and in a mode similar to augmented reality search. The first demonstration of this software product took place at…

(More...)

Restrictions on dealing with the coronavirus pandemic mean that employees working from home are more likely to connect a corporate laptop to a home broadband connection. This is not ideal: there is one connection from the Internet to the house, then it is distributed and routed throughout the house to all devices.     A single connection means that the same physical channel is used. As isolation has shown, families combine home schooling and lessons conducted on Zoom with business video conferences. At some point, school ends; children can be on social media, on YouTube, on a game console, or watching online television. This can happen at the same time that the network is being used for business video calls.…

(More...)

The British chipmaker that dominates smartphones is now trying to fix the poor performance of PCs.   Arm's Cortex-X1 chip design can be tweaked to improve performance, and this approach should be useful as Arm tries to expand its processor family to PCs.     For years, computer manufacturers have tried to sell PCs based on Arm processors, a family of energy-efficient ones that are used in smartphones.   However, compared to models running on Intel and AMD's x86 chips, Arm-based PCs suffer from performance and software compatibility flaws. Now the Apple M1 processors developed by Apple, a member of the Arm family, which are used in the new MacBook, change the idea of the Arm PC.   The M1…

(More...)

In a message to Prasad, CAIT demanded that "the government immediately ban WhatsApp from implementing the new policy or impose a ban on WhatsApp and its parent company Facebook, "the traders' organization said.     In New Delhi: On Sunday, the traders ' organization CAIT wrote to Information and Technology Minister Ravi Shankar Prasad demanding that the government restrict WhatsApp in implementing its new privacy policy or impose a ban on the messaging app and its parent company Facebook.   The Confederation of All Traders of India (CAIT) said that thanks to the new privacy policy, "all kinds of personal data, payment transactions, contacts, location and other important information of the person using WhatsApp will be obtained and can be…

(More...)

The US Department of Justice has joined the list of federal agencies that have fallen victim to a vulnerability in the SolarWinds Orion network management platform.   "On December 24, 2020, the Office of the Chief Information Officer (OCIO) of the Department of Justice became aware of previously unknown malicious activity related to the global SolarWinds incident, which affected, among others, several federal agencies and technology contractors." the ministry said in a statement. "This activity provided access to the Department's Microsoft O365 email environment. "Upon learning of the malicious activity, OCIO eliminated the identified method by which the attacker gained access to the O365 email environment. At the moment, the number of potentially accessible O365 mailboxes is limited to about…

(More...)

Using a special SIM card and app, some China Telecom smartphone users in Anhui Province can make phone calls protected by quantum encryption. And the race to develop quantum technology could threaten traditional encryption and lead to new, more secure forms of cryptography.     China Telecom, one of the country's three state-owned telecommunications giants, has announced a new pilot program allowing smartphone users to make phone calls protected by quantum encryption. Last week, the company announced that some users of China Telecom, one of the country's three state-owned telecommunications companies, can now make quantum-encrypted phone calls using a special SIM card and a smartphone app.   This is the latest move by China, demonstrating the country's commitment to all…

(More...)

Microsoft's "Azure in a transport container" offering could play a prominent role in its cyber-sovereignty and "special cloud" efforts in the coming year. Announced last fall, the Azure Modular Data Center, or MDC, is an Azure data center in a transport container that is delivered to remote locations on a truck platform. It runs under the Azure Stack Hub (at the moment) and can work without a connection or via satellite. In addition to the data center device itself, Azure MDC is interesting for a number of reasons.       When Microsoft announced MDC last October, many readers and commenters wondered why Microsoft had once again hit out at the idea of Azure in a container. After all, Microsoft…

(More...)

This could save a struggling electric car startup. It is reported that one of the main suppliers of components Apple is in talks to buy the financially struggling manufacturer of electric vehicles.     According to a Bloomberg News report that quoted "people familiar with the matter," Foxconn Technology Group is in talks to invest $ 200 million in Chinese electric vehicle startup Byton Ltd.   The funding injection is expected to help Byton start production of its M-Byte electric vehicle by the first quarter of 2022. Although this information is not confirmed, and the sources are not named. Byton is one of a host of emerging Chinese electric vehicle manufacturers that are looking to become key players in the…

(More...)

While making predictions in this environment is difficult, there is a list of five Microsoft technologies that could impact Microsoft's business customer base in 2021.     Predictions this year seem to be more unreliable than usual. As shown by the year 2020, attempting to predict what any more do not make sense. But these five may have the greatest potential impact on business users in 2021.   MetaOS for mobile masses:   Microsoft has an evolving strategy and baseline in the Microsoft 365 cloud space that is somewhat better known internally than externally. This initiative is known as "Meta OS" (and also sometimes as "Taos"). Metaos is conceived as a single mobile platform that provides a consistent set of…

(More...)

From antitrust lawsuits to a potential privacy law and restrictions on protecting free speech, Silicon Valley will face calls for increased regulation next year.     Lawmakers on Capitol Hill want to curb the rampant power of big tech.   For more than a decade, lawmakers and regulators have ignored Silicon Valley. But all of that is likely to change for big tech companies like Amazon, Apple, Google, Facebook and Twitter as the people in charge in Washington seek to rein in their power and influence.   Politicians and senior officials on both sides of the aisle are increasingly concerned about the power these companies wield - how it can harm consumers by allowing firms to stifle competition from smaller…

(More...)

The tech giant, like all of us, will have to fight COVID-19.  But that's only half the story.     Now that Apple's iPhone has 5G and its Mac computers have M1 chips, what's next?   Apple has spent the past few years making high-profile changes, such as promoting its services, with the $ 5-a-month Apple TV Plus; adding 5G to the iPhone 12; and its hit airpods wireless headphones, which cost $ 149.   In 2021, Apple will make changes that most of us won't notice or care about, but they may be some of its most important steps. One example is that Apple plans to start using non-standard chips in more of its Macs, which will lead to…

(More...)

All this may sound like a science fiction concept, but the creation of quantum networks is a key goal of many countries around the world. The U.S. Department of Defense (doe) recently released a first-of-its-kind plan outlining a step-by-step strategy that will make the dream of a quantum Internet come true, at least in very preliminary form, over the next few years.       The US has joined the EU and China in showing great interest in the concept of quantum communication. But what is the quantum Internet, how does it work, and what wonders can it do?   WHAT IS THE QUANTUM INTERNET?   The quantum Internet is a network that will allow quantum devices to exchange some…

(More...)

As demand for online services grows, Google's presence in data centers in Europe is rapidly expanding. But instead of increasing carbon emissions, the company says these new buildings reinforce the EU's commitment to fighting climate change.   In Hamina, Finland, work is underway to build Google's sixth data center in Europe, following the opening last week of a new building in Fredericia, Denmark. This week, Google's second data center in the Netherlands will also start operating in Middenmeer.       The search giant's investment in new European infrastructure is a direct result of a surge in consumer demand for services ranging from YouTube videos to Google Maps, which has been driven by the coronavirus pandemic and the accompanying shift…

(More...)

AWS presents its response to the command-line interfaces of Google and Microsoft browsers for accessing cloud resources.   Amazon Web Services launched cloudshell, a browser-based shell for command-line access to run scripts and access various AWS resources. The Developer Web shell is designed for developers who prefer to work in a browser and want to have a command line to access AWS tools. According to AWS , CloudShell works on Amazon Linux and pre-installed 2 General command line interfaces, AWS, and the execution environments and the AWS SDK for programming languages Python and Node.js. There are also popular command-line utilities to shells, such as Bash, PowerShell, Zsh, editors, version control system Git and package management - npm / Java pip…

(More...)

Сredit card theft Scripts are evolving and becoming harder to detect due to new concealment tactics. The latest example is a web skimmer that uses CSS code to mix with the pages of a hacked store and to steal customers ' personal and billing information.   By hiding their payment information theft script in the CSS code, the creators of this skimmer successfully bypassed detection by automatic security scanners and avoided raising any flags even when checking during a manual security code audit.     This is because scanners don't usually scan CSS files for malicious code, and anyone looking at a skimmer trigger script reading a custom property (variable) from a CSS page won't take a second look at…

(More...)

Over the past week, users of the MetaMask cryptocurrency wallet have been losing funds due to phishing scams that attracted potential victims through Google search ads.   MetaMask has a community of over a million users. The site offers a wallet for the Ethereum cryptocurrency in the browser via a browser extension that allows distributed applications to read data from the blockchain.   When installing a legitimate extension, you can either import an existing wallet or create a new one along with a secret initial phrase that allows access to the wallet.   While it's unclear how many MetaMask users fell for the Scam, some say they were left with empty wallets after clicking on a fraudulent search ad promoted…

(More...)

On November 29, 2020, the Taiwanese manufacturer of electronic components Foxconn was attacked by an encryption virus: the attack resulted in the theft, encryption and deletion of files on the company's servers in Mexico, in Ciudad Juarez, according to the BleepingComputer website.     The hacker group DoppelPaymer claimed responsibility for the cyberattack, demanding $ 34.7 million in bitcoins for the return of information and posting part of the Foxconn documents on its website to confirm its intentions: "Your files, backups and shadow copies are not available until you pay for the decryptor," says a message window that POPs up on Foxconn servers. — If you do not make any contact within three business days after encryption, the first portion…

(More...)

An analyst at Acronis has published a report on cyber threats for 2020. According to their research, the main targets for cybercriminals will be managed service providers, as well as employees of companies that use a remote method of work. In addition, an increased level of information leakage is predicted, which will exceed the speed of development and development of systems and the level of encryption.     In their opinion, ransomware will remain the most likely and widespread cyber threat , since almost 50% of attacks took place with the participation of such a software product as Maze: to maximize the impact of hacking, criminals demand not only the ransom of the encryption key to the blocked data, but…

(More...)

A California district Court has rejected two decisions by President trump on H-1B visas, concerning salary restrictions and a list of where foreign programmers can work in the United States.     The court found that there were no sufficient reasons for these decisions, and also pointed to deviations from the legal implementation mechanisms made by the authorities.   These controversial decisions were made by trump in October 2020, and their cancellation is the merit of judge Jeffrey white. The first was presented by the US Department of homeland security, and sharply limited the number of positions that could not be held not only by Americans, but also by foreign specialists. The decision was supposed to take effect on December…

(More...)

The use of a decentralized network like Tor has been causing a lot of controversy since its inception. Network advocates talk about protecting online privacy and circumventing censorship in countries where human rights violations occur. The criticism is that the network helps criminals hide information…     Based on the results of recent research, there is an attempt to verify the potential harm and benefits of the Tor network. Thus, globally, almost 7% of those who actively use Tor services work with services that usually provide illegal content or services. The most interesting thing is that the connection to such services was recorded much higher in those countries that were rated as "free" in comparison with "partially free" and "non-free".…

(More...)

The European Union has adopted a new regulation on working with data related to the potential expansion of Internet giants, primarily, of course, American, but also affecting the interests of Russian services, such as, for example, Yandex, Mail.ru, Aviasales and Ozon. If the regulation is ratified, only the European offices of companies will have access to EU data.   The project was published on the website of the European Commission, and affects the work of both American and Russian Internet companies and services. The 43-page document introduces a restriction on data transmission to countries that do not have a standard of compliance with European legal norms.   This regulation restricts access to information by large multinational corporations, offering "an alternative…

(More...)

Attacked by the cryptographer Ryuk in October 2020, the French IT Corporation Sopra Steria lost the vast majority of damage in the amount of about 40-50 million euros to restore systems.   The most paradoxical thing in this situation is that with expected financial losses, the maximum amount of coverage is limited to 30 million euros.     The fact of the cyber attack was officially recognized by the company on October 21, 2020, but only at the very end of November it was reported that the cause was the cryptographer Ryuk, and that the attack itself was launched a few days before the discovery.   Since the discovery, restoration work has been carried out, and by now the company…

(More...)

Notifications about the new digital tax of 3% of the turnover of large technology corporations in France have already been received at the offices of Google, Facebook and Amazon.     Historically: in 2019, France introduced taxes on revenue from turnover in the provision of digital services by companies, which obliged those with annual global revenue of more than 750 million euros to pay the state 3% of turnover. This is despite the fact that at least 25 million euros of the revenue should be due to services rendered in France, which was confirmed by a press release from the Ministry of Finance, also indicating that a corresponding e-mail notification of the tax to the relevant respondents has been launched.…

(More...)

Google has announced its plans on January 25,  2021: updated requirements about the possibility of checking some of the business transactions that can lead in some cases to temporarily block accounts of certain advertisers, which will last until the completion of monitoring the actions of organizations.       This innovation will affect all countries of the world – it is a global action of Google.   According to the company itself, Google will be able to instantly suspend the advertiser's account and require the ability to pass verification if it finds an unclear business model and there are suspicions that advertising activities or business practices themselves are potentially capable of causing physical or financial damage to users. The suspension…

(More...)

These applications were noted by the government of India as damaging the country's sovereignty, as well as the security and territorial integrity of the state.   At this time, the state strategy of India is based on banning applications, primarily Chinese ones, that can harm the country's security and economy.   The official state portal of India has published a list of 43 applications. This time, it also includes applications of the Alibaba group-of course, Including the Aliexpress platform, as well as WeTV, MangoTV, as well as some Dating apps and games.     It is alleged that these apps are blocked under the information technology Act of India, under section 69A. Thus, the list of Chinese apps prohibited for…

(More...)

Was only finalised requirements in a few States claim to Apple in the span of less than a week a bipartisan group of prosecutors General of the States was announced antitrust lawsuit against Google, and this lawsuit is not connected with the independent claims of the state of Texas, which, most likely, will give your claim separately, before the end of the year.   Starting in October 2020, the US Department of justice, as well as 11 States, were able to formulate their requirements in an antitrust lawsuit against Google.     The above-mentioned group of prosecutors has plans to combine their claims with those of the government (that is, the interests of the States of Colorado, Iowa, Nebraska, new…

(More...)

The events of recent months, initiated by Epic Games against Apple, as well as the EU antitrust investigation initiated by Spotify and other legal claims at various levels, have pushed the Corporation to take independent steps to mitigate the situation around relations with both users and software developers in the App Store – namely, to reduce the tax rate from January 2021 from the standard 30% accepted by other companies, such as Google, to 15%, that is, exactly 2 times.     This reduction in Commission fees will apply to companies that have a turnover of less than $ 1 million per year – in order to allow small businesses and developers to invest more in business and increase staff,…

(More...)

Apple is once again leading in terms of amounts paid under settlement agreements: 34 States, led by Arizona, Arkansas and Indiana, as well as the district of Columbia, sued for incorrect information provided to users about the practice of artificially reducing the performance of old iPhone models after standard updates to their operating system – the amount of compensation was $113 million...     There has been an investigation into the device slowdown scandal, and the crux of the lawsuit filed against Apple is that the company deliberately misleads its users about its updates, using complex technical explanations for battery management. It was also stated that all Apple's actions were focused on directing users to form an opinion about the…

(More...)

Microsoft has announced a "shared vision for the future of Windows PCs" with AMD, Intel, and Qualcomm - a new Microsoft Pluton processor with security features built directly into the core.   According to the developers, this processor with built-in security features is designed so that it can provide more complete integration of software and hardware of a computer running on the Windows operating system, thus blocking the possibility of cyber attacks in entire classes and directions.   Cut off a large number of potential targets of physical attacks, as well as a complication, even impossible at this period of development software options theft of user credentials and encryption keys, as well as a new level of control hardware and…

(More...)

Google decided to provide the ability to quickly directly disable various smart features and personalization to better provide privacy to its users.   The company decided to add new settings for the smart features of the Gmail mail service, as well as personalization settings for various services that use data from the user's history of actions and behavior.   In the near future, Google will start asking users questions about their desire to use smart features and personalization in Gmail, Meet and Chat, as well as whether they should be disabled at all.     In the coming weeks, Google will start asking users if they want to use smart features and personalization in Gmail, Meet, and Chat, or if…

(More...)

The release of the new version of the operating system from Apple was marked not only by widely announced additions to support new M1 processors, built – in T2 security blocks and a program compatibility system for older versions for Intel processors – Rozetta2-but also by new features that are not yet disabled, allowing you to monitor user actions.     According to information from German security researcher Jeffrey Paul, Apple has significantly changed the approach to tracking the actions of its users in the new release of its operating system - Big Sur.   According to the verification of the operation and functioning of the main components of the Big Sur system, the new macOS now sends its own…

(More...)

Apple has introduced three new devices with its new M1 processor, which is the first processor with a 5-nanometer technical process for desktop computers (two laptops and one nettop). Apple's decision to abandon chips from third-party manufacturers has moved into the practical implementation phase.       That is, at this time, Apple has launched computers on its own microchips for the first time in its production activities: new ARM processors have appeared in MacBook Air , MacBook Pro 13 and Mac mini nettop laptops. All of them work on the M1 processor based on 5-nanometer technology (despite the fact that AMD currently stopped at 7-nanometer, and Intel – 14 - and 10-nanometer technological processes). The decision to switch to…

(More...)

Kaspersky Lab has discovered malicious software written for Linux - this is the Windows version of the RansomExx cryptographer. Both versions differ in that they are entered into the system manually.   The new version of the cryptographer, discovered by Kaspersky Lab experts, is a product of the development of the authors of The ransomexx Trojan, which is indicated by several factors:   - using the same model of communication with victims of extortion; - similarity of text versions in the ransom correspondence; - and, most importantly, the similarity of the code is obvious to experts, even taking into account the fact that it was compiled by different means and for different platforms.     RansomExx has been noted in…

(More...)

New vulnerability in WordPress plugin dobaviti concerns site administrators: expanding the Ultimate Member plugin to simplify profiles and community sites, with the number of active installations of more than 100,000, who urgently need to update to the latest current version.   The reason is a critical bug that led to the possibility of exploiting several fairly easy-to-use vulnerabilities that potentially allow you to take full control of the site…     The plugin itself makes it possible to create websites and significantly simplifies the process of registering and creating online communities with flexibly configurable access levels, roles and privileges for users.   On November 9, 2020, Wordfence Threat Intelligence published a report in which analyst Chloe Chamberland presented three bugs…

(More...)

In December 2020, Microsoft will stop supporting Windows 10 with the index 1903, better known as Windows 10 May 2019 Update. As part of this update, Microsoft has prepared an automatic update for all devices running Windows 10 (1903) to the latest version.     It is planned that in the near future, Microsoft will form update packages to the newest versions.   At the same time, it is interesting that the software platform will not be updated immediately to the latest versions – the software manufacturer prefers to make the transition from previous versions as smoothly as possible, gradually, and therefore the systems will be updated first to Windows 10 (1909) or Windows 10 November 2019 Update, since this…

(More...)

For Oracle WebLogic Server urgently released a patch to the vulnerability, on the basis of which there are already precedents for active exploitation. Also, a few days ago, a fairly close vulnerability was identified in the same software.   The urgent release of an extraordinary patch for such a critical vulnerability was extremely relevant for Oracle Corporation due to the beginning of active exploitation of this flaw in the Oracle WebLogic Server software. This vulnerability is called CVE-2020-14750 and is found in many versions of WebLogic Server.   Since this software is mainly used as a platform for operating (developing, testing, branching and running enterprise SOFTWARE in, for example, Java), most often in a local and cloud environment, the risk…

(More...)

To the question of who was able to correctly redistribute efforts in the areas of their business-the Big Tech giants, of course, were on top during the coronavirus pandemic. Despite the decline in results in the first quarter of 2020, they were all able not only to return lost profits, but also to significantly increase their revenues.   Corporations have made uneven progress in various areas of IT technology. For example, Google and Apple lead the way in sales of their online stores, but Amazon has surged ahead in the direction of cloud services, capturing a significant market volume in recent months. Of course, such objective factors that accompanied the development and course of the COVID-19 pandemic, such as the…

(More...)

The new browser from Microsoft is steadily increasing its share in the global Internet space. The transition to technology from Google made it possible from the beginning of the year almost from scratch to take the market volume at the beginning of October this year more than 10%, according to the analytical company NetMarketShare.   The share of the Edge browser based on Chromium in September 2020 was about 8.84%, and in October it was already 10.22%.     Microsoft made a great move with pre-installing the browser in the operating system, and strengthened its position by entering the browser on previous versions of Windows with updates throughout the year, not counting promotions in all its other products.   The…

(More...)

In may, 2020 on the 2020 fair Build, Microsoft announced the launch of the cloud Microsoft Cloud for Healthcare in the status of accessibility for users from 28 October 2020 with combining components such as Azure, Microsoft 365, 365, and Power Dynamics Platform.     Microsoft has prepared this cloud for its healthcare Department to process structured and unstructured data about the health of platform users and provides customers with very wide opportunities and options: from various bots for interacting with AI to protecting patients with reduced immunity for various reasons from any epidemics and intra-clinical infections using virtual doctor visits, with a full set of protection, including personal data of those who Microsoft said in a statement that Microsoft…

(More...)

The Linux Foundation, a non-profit company, and the edX training system published an analysis of demand for open source software development specialists and trends in this area in their 2020 Open Source Jobs Report.     Ignoring the coronavirus pandemic, the search for specialists with development skills in open source technologies not only continues to be high, but also shows steady growth.   Companies are constantly increasing the number of vacancies and recruitment of employees, while offering expanded educational opportunities for existing employees in order to further develop their competencies.   Approximately 93 % of headhunters admit to difficulties filling such vacancies as open source software developers, and in 63% of cases, it turned out that their companies launched open…

(More...)

According to data from the analytical report of J'son&Partners Consulting on the network security market (indicators for standard products were considered, as well as the consumption of Security as a Service (cloud security services)), with the forecast horizon until 2025, the global volume of services reached $ 26 billion in 2019, of which cloud information security systems accounted for 24%, that is, about $6.2 billion.   At the same time, the market for information security and cyber security services is expected to grow by at least 11% in the 2020-2023 period and reach a volume of $ 40 billion by 2023.     Analysts believe that as a driver of growth, cloud models will be able to show growth in…

(More...)

IBM Corporation, which started as a hardware manufacturer, is moving even more to the side, increasingly moving into the service sector, in particular, at this time – in the cloud service.   IBM has announced plans to spin off a separate public company as a division with the function of managing infrastructure services. It is expected that the annual revenue of this new company will be about $ 19 billion, and will focus on hybrid cloud applications and an artificial intelligence system.   According to the company's CEO, Arvind Krishna, the procedure for allocating resources for the formation of a new company with the provisional (conditional) working name NewCo (new company) will be completed by the end of 2021.  …

(More...)

Google published an open letter in response to a lawsuit filed by the US Department of justice related to violations of antitrust laws.   In response to the main articles of the charges, Google said that the search engine chosen by users is a conscious choice, and not out of necessity due to the lack of analogues in the market and the information infrastructure itself.     In Google believe that such complaints can, in the end, only hurt end-users of the services of the Corporation because the company's engineers work tirelessly to improve the search results, and claims and power structures based on the controversial arguments, not covering complete the picture as a whole, that creates grounds for abuse…

(More...)

The non-governmental organization Amateur Radio Digital Communications (ARDC) from California (USA) sold 4 million IPv4 addresses to Amazon for $108 million. Amateur radio at one time was allocated in the network 44 (44.0.0.0/8), also familiar to many users under the name AMPRNet, a certain set of addresses for research and experiments with digital communications. The coordinator was the non-profit organization ARDC.   The block (44.192.0.0/10) of approximately four million AMPRNet IP addresses out of the 16 million available was sold to Amazon by ARDC in mid-2019, but only now has the transaction value been announced. Amazon paid ARDC approximately $27 for each IPv4 address. "The non-disclosure agreement with Amazon, which related to the sale of our redundant IP addresses, required…

(More...)

Nokia and Google Cloud executives have signed a strategic partnership agreement that will see NOKIA move its it infrastructure to the Google Cloud over the next five years. The agreement stipulates that NOKIA's data centers and SERVERS will be relocated from all over the world, including various software components.     As presented in Nokia's press release, this transaction shows the direction of growth trends and the desire for stability in the direction of an IT strategy focused on the latest modern cloud technologies, as well as efforts to actively strengthen and match the time in their digital aspects of activity, which also provides additional opportunities for both cooperation and employees of the company, while improving the quality of service…

(More...)

The Freedom House research group stated in its report that many governments are using the coronavirus pandemic to tighten control over Internet Users.   They believe that the situation of real freedom of speech and privacy has steadily deteriorated over the past six months.     It is also noted that during the restrictions and special conditions of activity during the pandemic, society has become much more dependent on digitalization, and the Internet itself is more controlled by various structures. This trend has continued since 2010.   The analysis was conducted for 65 countries around the world, and the conclusion of the study is that the most difficult situation is in China. According to the Freedom House group, officials in…

(More...)

Due to the release of the iPhone 12, according to surveys, many users choose the iPhone 11 that has fallen in price to $ 600…   After the announcement of the iPhone 12, the Barclays Bank analytical group reported a decrease in the short-term profitability of Apple shares with a decrease in the average selling price of smartphones from the latest line. This information caused the target price of the company's shares to be significantly lowered.     Despite all Apple's attempts to reduce the cost of its new smartphones by actions such as removing the 12-wire EarPods and power supply from the iPhone package, analysts at Barclays Bank believe that this will not recoup the costs incurred by the…

(More...)

Sophos researchers, who have been specializing in the security of IT systems for quite a long time, have identified and described a new type of phishing attack that is characterized by an extremely atypical design- namely, the absence of links in the email text.   Such a non-standard approach significantly advanced the attackers in deceiving even highly doubtful users who did not recognize the threat in such mailing messages.   Usually, the standard mechanism of the algorithm of a typical phishing approach schematically consists of three stages: - the end user receives a special email with an embedded link leading to a fake site; - when you click on the phishing link specified by the user, a web page opens…

(More...)

There is an opinion that Google uses its resources based on its dominant position in the information technology market in terms of search and control over the Android OS to increase its share in browsers – meaning Chrome.   During 2020 alone, several investigations were conducted against the IT giant (a series of which, however, were initiated against other major technology companies). The antitrust case against Google is currently being investigated by the US Department of justice – and one of the aspects being considered is whether it makes sense to force the Corporation to sell Crome and part of its advertising business… The Ministry of justice is considering such a proposal in preparation for an antitrust trial that began…

(More...)

Over the past few years, there has been a breakthrough in technologies that can significantly reduce power consumption in computer systems.   A team of chemists and physicists from the University of California, Berkeley, reported the creation of a metal-like wire made entirely of carbon. This detail was the last in the Arsenal of tools that allow you to start making carbon-based transistors. The researchers say that they worked on the new technology for several years, and eventually they were able to make semiconductors and insulators from graphene nanoribbons, which are narrow strips one atom thick.     The silicon structure of modern transistors has long required modernization – more than 40 years. At this time, the limit of performance…

(More...)

IPO mania and high investor activity recently suggests that a repeat of 2000 is not far off…   They are already comparing the jump in profitability and capitalization of digital industry giants with the boom of the late 20th century, which preceded a sharp drop-then in a short moment the value of such large companies at that time, such as Cisco, Intel and Oracle, fell by 80%, and the recovery to the previous level took about 15 years on average.   This was a period of the Domino effect of many failed companies in a chain, when one pulled the other, and also many simply failed separately.   Despite the speculative nature of the modern market, many investors, however, in…

(More...)

Nvidia has decided to share its plans for developing its own strategy for the next few years, during which it aims to create a new type of chip designed for use in data centers.   The main breakthrough in the proposed technology is the independent execution of those functions that are currently involved through solutions created by Intel – NVIDIA's main competitor.     This also applies to Intel chips that are used in video game graphics, but recently they also solve problems of artificial intelligence, even with image recognition.   Typically, the chips are installed in conjunction with Intel CPUs, which take over some of the computing, but NVIDIA wants more.   "Using artificial intelligence, the chips can detect…

(More...)

This is the opinion of Eric Reidmond, co-founder of the Open Source Initiative and author of "the law of Linus "and the book"Cathedral and Bazaar".   Indeed, his arguments make you think... Eric says that the direction in which Windows is moving is to become an emulation layer on the Linux kernel. This is the result of many steps that Microsoft has taken since the time when Android was still "underdeveloped" - it was only designed and actively tested, but even then components from Linux began their way to Windows 7 (under the guise of such names as "support for the UNIX printing subsystem "and"extended network support"). Thus, starting with the integration of network protocols, *nix began to be implemented…

(More...)

In 2020, many previously widely unused technologies, thanks to the development of the situation in the world and contrary to the forecasts of analytical agencies for 2019, finally began to grow and fully work in the global industrial space.   What can be attributed to industry? With the arrival of IT technologies (data centers, cloud solutions) in almost all areas of our life, up to the concepts of "smart cities", autopilots in taxis, sea vessels and mining equipment, it is already difficult to surprise anyone with something new.   However, the field of biotechnology has been hidden from public attention for a long time due to its knowledge intensity in terms and definitions – for example, genetic engineering is still…

(More...)

Since 2019, many mobile operators around the world have predicted the development of 5G networks by leaps and bounds – only in reality, despite the brave start of the service, everything was not so rosy.   The most interesting thing is that the operators planned very large investments for various projects related to the development of fifth-generation networks, but many factors, including the coronavirus pandemic, made their own strict adjustments to their plans.     Even at the level of initial calculations for the payback of building networks of this level, it was clear that the return on investment would not be as fast as it was in the case of third – and even fourth-generation networks-then there were completely…

(More...)

The United States district court (judge Carl Nichols) temporarily suspended the ban on TikTok, which was supposed to take effect on the order of US President Donald trump by granting a request from ByteDance.   In practice, this means that ByteDance (and, accordingly, TikTok) will have additional time to settle the process and get approval from both Chinese and American regulators to bring it into compliance with all the norms and requirements of both technical and legal nature on both sides of the unfinished transaction for the sale of the Oracle and Walmart service.   From the background: On August 7, trump signed a decree requiring the sale of the service to US companies by mid-September 2020 ("On combating the…

(More...)

In recent years, the development of AI (artificial intelligence), coupled with ML (machine learning), has shown completely different horizons in the field of corporate IT technologies- and this applies to absolutely any field of activity of companies.   Data processing has turned from routine operations in modern data centers into a rather exciting process that affects the interests of completely previously disjoint segments of business processes.     According to data for 2019, 37% of enterprises use AI to some extent when analyzing their work processes, which gives an increase of 270% over the past 4 years.   Such an opportunity, such as collecting data to form business ideas, inspires many minds and shows the real potential of technology that…

(More...)

The UK's largest trade Union, Unity, has strongly criticised the sale of ARM to NVIDIA. According to their assumptions, this will lead to the reduction of thousands of jobs.   Unity also appealed to the government to block the deal because of the potential threat of disrupting the growth of the country's technology sector.   So do some politicians, in particular, and Edward Miliband.       Unions and politicians also don't believe in NVIDIA's long-term policy, with its promises to preserve the location of ARM's headquarters and plans to build a research center in Cambridge with a supercomputer based on ARM processor systems.   They also suggest that after the full package of conditions for this deal comes into…

(More...)

In the fall of 2020, Apple plans to debug the full-scale industrial release of its A14 processors, which finally fully use the latest 5-nanometer technology (TSMC).   As part of the annual technology conference, the main details of both 5-and 3-nanometer processors were presented.   Based on the fact that Apple processors are manufactured only by Taiwan Semiconductor Manufacturing Corporation (TSMC), which is paid very good money by Apple to ensure that their latest products (iPhone and iPad, with the addition of iMac in the near future) use only the most modern technologies developed by TSMC. At the annual technology conference TSMC Technology Symposium, the announcement of production process optimization was presented, which is already beginning to draw a General…

(More...)

In connection with the upcoming release on the market in November 2020, Microsoft Corporation launches its new cloud service Xbox Game Pass Ultimate.   Since at this time it is also planned to start selling Xbox Series S and X game consoles, such a step to open a cloud gaming service, according to the Corporation, should significantly increase Microsoft's competitiveness in the confrontation with Sony's consoles.   Most importantly, to participate in games for Xbox consoles in the new mode, you do not even need to purchase the console itself.   The fact is that, in addition to Xbox consoles, the Game Pass Ultimate service will support the game on devices with the Android operating system with the appropriate game…

(More...)

In the official channel (blog) YouTube on September 14, it was reported that the video hosting company plans to launch the latest platform on which you can create and publish short videos.       This service, apparently, to some extent copies the functions of the TikTok app, and will be called Shorts.   It will be aimed at fans of recording short videos on a smartphone, and also as a bonus will give them the opportunity to overlay music, various special effects and develop networks of subscribers.   The experimental springboard of the service, where beta testing will take place, is planned in India-there is an atmosphere that is quite conducive to such tests – this means a direct…

(More...)

While there are marketing wars between major players in the field of various high-tech products-NVIDIA has acquired ARM-the main developer of mobile processors.   The transaction became known from the information posted on the company's official website. As it became known, the industry giant will need to pay the previous owner (SoftBank) 21 billion dollars in shares, as well as 12 billion in cash.     This gives SoftBank the opportunity to potentially earn another $ 5 billion from future earnings. In addition, SoftBank employees should receive a total of about $ 1.5 billion due to additional obligations under this transaction.   The final transition, after complying with all the rules and getting all the approvals from regulators in the…

(More...)

Google is constantly improving its system of apps and services to make them easier to use. This often happens unexpectedly for users who themselves do not know how much they needed the new feature implemented by Google – the company processes a huge amount of information in order to analytically, at the tip of the pen, understand the nuances of user interaction both with the interface itself and within the program system… That is, in the near future, users will be able to exchange applications without an Internet connection, that is, they will be able to send applications downloaded from Google Play offline, using the P2P data transfer Protocol, completely without using any intermediate third-party services – the implementation of…

(More...)

For sure, almost any modern person who uses Whatsapp for everyday communication in various networks knows the expression "text bomb".   This expression describes a message in a special format that causes the app to freeze or even restart a smartphone running both Android and iOS.   Not so long ago, journalists discovered entire "factories" for the production of such messages. And although the problem itself is several years old, there is still no clear explanation of the reasons why "enthusiasts" make such messages and send them to other users. At this time, Whatsapp developers can not completely eliminate the ground for exploiting such a vulnerability, and the reason is not in the desire to continue this epic: when a…

(More...)

Owners of marketplaces (for example, such as Google Play and the App Store) can legally prohibit vicious internal policies that lead to antitrust violations and discrimination against business partners, which are SOFTWARE developers.   Having reasoned philosophically and applied the usual logic, Russian parliamentarians submitted one draft law to the State Duma of the Russian Federation on September 1, 2020.   The idea is to regulate the activities of marketplaces: in particular, to deprive companies that use app stores, including Google and Apple, of half of their profits by reducing the Commission for developers, as well as all additional quarterly payments.     Also, one of the provisions of the bill suggests that the owners of marketplaces will be required…

(More...)

Recently, various background information around the Epic Games and Fortnite, became interesting for the attention of cyber communities facts – who and how is trying to use the warmed-up audience to their advantage – and, strangely, all versions have as their object under the pretext lighten the wallets of the naive audience. Some plan to do this right now, and others-to convince that the constant overpayment of several tens of percent is for their own good… Eset, an information security company, for example, has received data about phishing in order to collect credit card lairs using the Fortnite brand.   The main page of the phishing site has a list of 150 addresses associated with Fortnite. They fuel interest and…

(More...)

After the may update of Windows 10, the antivirus built into the operating system received a completely original and potentially dangerous feature – namely, the ability to download files from both the local network and the Internet via the command line.     After conducting a security study of this function, it turned out that it was possible to download a file that the antivirus would not have missed – that is, the built-in antivirus does not check the downloaded files…   Thus, a security expert (Mohammad Askar) was able to download "Cobalt Strike" (SOFTWARE designed to test system protection) in this way (via the download function in the Windows Defender command line). Initially, the Cobalt Strike program is designed…

(More...)

By degree of relevance:   the game Crusader Kings 3 was deliberately released by developers without DRM protection — it even works multiplayer…   Paradox Interactive, releasing its strategy Crusader Kings 3, from the first minutes attracted the attention of several thousand gamers who subscribed to the game page in the CrackWatch service… But they were expected to be very disappointed-the developers refused to protect the game in any way.       In the discussion, it was reported that when you log in to your Paradox account, including on an illegal copy, you can start multiplayer.   As for the popularity of the game-the Steam version is in a record position for online - in the first few hours,…

(More...)

At this time, The Tiktok buyer is expected to be announced to the General public within the next 24 hours.   Among the possible bidders to acquire TikTok assets in Australia, New Zealand and the United States are such whales as Microsoft together with Walmart and Oracle.   Interesting fact: due to recent changes in the export legislation of the PRC-bytedance Corporation (owner of TikTok) you will have to go through the procedure of obtaining permission from the Chinese authorities before purchasing part of the company in the United States.       At this time, it is known that ByteDance has previously decided on buyers – but only Microsoft, Walmart, and Oracle have so far refrained from any comments…

(More...)

Apparently, everyone is thoroughly fed up with cheaters – their manner of behaving in cyberspace from the position of having exploits for purchasing in-game currency finally upset the company Rockstar, which cleared GTA Online of such "players" at the end of August.       Several tens of thousands were" reset" (!!!) accounts – the company's developers brought out of the shadow economy, the enormous wealth of exploit exploiters…   For example, the glitch of buying an apartment or garage made it possible to get millions of game dollars in half an hour or less. The effectiveness of this approach, which clearly violates the principles of game equality and the agreement with the company itself – which, as usual, no…

(More...)

Developers of US universities from the States of California and Iowa, as well as from Mozilla Corporation, offered a program to a wide audience to determine whether the browser can be tracked by its "fingerprints".   For information: now standard cookies are not the only way to identify a user and track their behavior. Currently, many sites use the so - called "fingerprint" - a set of unique information about the browser configuration and settings to identify and track the user, even with cookies disabled. The FP-Inspector program is designed to recognize site attempts to track the browser by its "fingerprint" and block such actions. Machine learning technologies are used in combination with dynamic and statistical analysis methods, and the…

(More...)

Apple blocked a recent Facebook update on Thursday that revealed the payment structure for in-app purchases.   Thus, the opportunity to provide users with information about the 30% tax in the App Store for customer purchases via the social network was covered.   Facebook felt that, especially given the overall economic situation in the world due to the pandemic, it would be useful for people to find out exactly how their payments are spent – that is, where the funds actually flow. "Now, more than ever, we need to be able to help people understand where money really goes. Unfortunately, Apple rejected our transparency notice regarding its 30% tax, but we are still working to make this information available inside…

(More...)

Sony has started registering applicants for the purchase of PlayStation 5 game consoles. You will be able to register to pre-order one of the first next-generation consoles from a limited batch.   "There will be a limited number of PS5 consoles available for pre - order, so we will be inviting some of our existing consumers to be one of the first to pre-order one of the PlayStation," Sony said on its new registration site.       "Pre-orders are accepted on a first-come, first-served basis, so as soon as you receive an email invitation, we recommend that you follow the instructions and act quickly."   In other words, you will need a PlayStation Online ID to register. Sony requires…

(More...)

When Apple announces the new iOS 14, analysts predict risks for the advertising industry.   Now, after the release in September 2020, all apps installed with the App Store must explicitly get the user's consent on whether they agree to "share" (that is, provide data about themselves) with advertising platforms (that is, first of all, analytical databases that accumulate data about the client).       In order to assess the importance of what is happening, let's analyze the current system for purchasing ads on Apple mobile devices.   Question: what does the user care about all these purchases and what does this have to do with practical digital side effects for specific consumers?   Let's assume that most users…

(More...)

Since August 13, 2020, the heated controversy that arose as a result of a long-standing contradiction in the policy of such giants as Apple and Google in relation to software developers has not subsided. The financial foundations of these corporations are based on basic principles, which are the constant collection of 10 to 30% of all payments from digital products sold in their stores. Of course, no one disputes the fact of their merits in the organization and investment in the development of their operating systems. But at the same time, we should not lose sight of the fact that many startups with minimal profitability and unique offers on the market due to this policy can not get proper development,…

(More...)

Despite massive attacks on Citrix and Pulse Secure VPN to hack corporate networks in the first half of 2020, however, the RDP remote desktop Protocol remains the undiminished leader.       Attacks on the corporate sector - became statistically record high until August 2020.   The three most exploited attack areas in 2020:   - to compromised RDP endpoints; - email phishing and - use of corporate VPN devices. Thus, attacks on RDP today are switched from access to home computers and systems to corporate, which is quite natural: having received compromised access points to home computers, with the accumulation of information-the number has grown in quality-to corporate (including by extracting information about corporate RDP access points from home…

(More...)

According to a published report by Dell, penetration into the cyber environment using vulnerabilities at the hardware level has recently become quite popular among hackers. Not to say that this was such a closed topic – these vulnerabilities have been known for many years; but only now, with increased protection at the software level and implemented everywhere corporate systems for tracking security loops-such options as the use of loopholes in the hardware of both computers and network equipment have become more relevant.         At the same time, despite the critical nature of the level of attacks at the hardware level, only 59% implemented a hardware protection strategy. And this is despite the fact that 63% of companies…

(More...)

"The most successful person is the one with the best information."  Benjamin Disraeli     Seagate Technology PLC has published a report on data usage. It was compiled after a survey of 1,500 leading companies in the world (500-Asia-Pacific region with Japan, 475-Europe, 375-North America and 150-China).   Data is a reusable representation of information in a formalized form suitable for transmission, communication, or processing (defined by ISO/IEC 2382-1:1993).   When increasing the accumulation of volumes of relevant data, the quality of management and their use is important. IDC estimates that company data will increase by 42.2% per year in the coming years.     What the study made clear: only 32% of the data is used by corporations to…

(More...)

At the WWDC 2020 conference, Apple released information about the plan to switch over the next two years on computers with chipsets from Intel to products of its own design and production. The architecture, according to the company's previous statements, is ARM. In addition, AMD's products (in terms of graphics accelerators) will also lose their relevance in the light of Apple's own solutions.     However, it is unlikely to expect the announced integrated graphics accelerators from Apple in the near future – according to official plans of the company, even in 2021, MacBook Pro 16 laptops and iMac monoblocks will use Central processors from Intel and AMD Radeon graphics will be used. The latest computer models, at the same…

(More...)

Google is working hard on the third operating system after Android and Chrome OS. This is an open source real-time operating system called "Fuchsia". The OS first appeared in August last year, but then it was just a command line. Now the mysterious project has a crazy new interface that we can take a look at. Unlike Android and Chrome OS, Fuchsia is not based on Linux - it uses a new microkernel developed by Google called "Magenta". With Fuchsia, Google would abandon not only the Linux kernel, but also the GPL: the operating system is licensed as a combination of BSD 3, MIT, and Apache 2.0. Abandoning Linux may cause some shock, but the Android ecosystem seems unwilling to…

(More...)

After offering to pay in the game Fortnite in its own payment system, first Apple, and then Google removed the ability to both download and update from their stores...   The launch and direct offer to pay directly, bypassing the Commission of the IT giants, which is 30%, in fact, was a Declaration of war. Application developers from all over the world have repeatedly raised the issue of this Commission over the past few years, considering it unfair – as in the end, many startups do not go to launch, and existing applications eventually get their mark-up out of the pocket of users, which negatively affects the ability to continue supporting and updating.   At this time, the official reason…

(More...)

The Russian Antimonopoly regulator FAS (Federal Antimonopoly service) has declared Apple a violator – the regulator said that the company abused its dominant position in the iOS app market by restricting third-party apps in the App Store using non-competitive methods. Similar lawsuits against the IT industry giant have been filed in many other countries in Europe and Asia. Russia also issued a court decision on a complaint filed last year by Kaspersky Lab in relation to the parental control program Kaspersky Safe Kids (KSK). Interestingly, the FAS of the Russian Federation made such a conclusion from the review of the materials that Apple reserved the right to reject the application of a third-party developer even if it fully meets the…

(More...)

Artificial intelligence began to be actively developed about ten years ago, when the power of computers allowed us to conduct large — scale calculations and engage in so-called deep machine learning-to download large amounts of information and calculate them.   However, now the development of neural networks is under threat. The University of Massachusetts found that to increase the productivity of existing models of artificial intelligence only 10 times will require a total of 100 quintillion (10 to the 20th degree) dollars — this is 100 million times more than all the money in all countries of the world combined (according to various calculations, this is about 60-80 trillion (10 to the 12th degree) dollars).   Scientists found that from…

(More...)

Today, there are many hidden threats to access levels in various IoT devices – this has been widely discussed recently. But few people imagine the real state of Affairs: all those small devices that have a real operating system, which the average person does not even know that it can be here – in cars, planes, space satellites, as well as in printers, cellular cards, Bank card chips, and, finally, in pacemakers – can be subject to hacking and unauthorized access, and not only to them, but also to those systems where these devices have access by default. This can be both personal computers of specialists and company servers, as well as cloud services. That is, pacemakers, insulin pumps for…

(More...)

On August 6, 2020, President Donald trump, in his letter to the speaker of the House of representatives and the President of the Senate on countering the threat from TikTok, presented facts that, in his opinion, pose a threat to the national security of the country under the international emergency economic powers Act and the National emergency law.   All this data is reflected in an Administrative order that launches additional measures regarding information and communication technologies by the Chinese company ByteDance Ltd and Its Tiktok application.     In addition, another Chinese app, WeChat, owned by Tencent, also poses a threat to the economy and national security. The key points of the President's address are as follows: - automatic…

(More...)

Since the summer of last year, the voice assistants of the IT industry giants have begun to undergo changes after several major data leaks. It is no secret that companies such as Microsoft, Google, Amazon, Apple and Facebook have recently passed "deanonymized" voice message data to their contractors for processing. As we have already found out, this deanonymization of messages is very superficial – that is, with minimal analytical abilities and basic knowledge in the field of IT, it is quite possible to fully authenticate each individual user – whether it is Siri, Cortana, Skype, Alexa or Google Assistant. All this data, as previously reported, contains a set of data that is not processed properly: that is, knowing the IP…

(More...)

Microsoft made the decision to install service packs before the final build of 2004 and may 2020, bypassing the explicit consent of operating system users. This forced update is a prerequisite for maintaining technical support after 2020.   In order to determine which version or build of Windows is used on users ' computers, the company first began using an artificial intelligence system. In other words, all previous versions that, according to Microsoft, do not meet the requirements of confidentiality, security, and software flaws in the operating system will be updated.   However, support for the Enterprise and Education versions (enterprise and education, 1890 and 1903) will continue until may 2021. For other users, the support period will be limited…

(More...)

Potentially, changing one processor platform to another, in this case – from Intel to ARM architecture – is an unpredictably lengthy process that includes both technological and financial and marketing aspects of the company's activities.   Of course, the main question is why is this transition happening? Why is Apple switching to ARM, especially its own production?   The new name of Apple's ARM processors is "Apple Silicon". This, as well as the fact of avoiding the use of processors from Intel, was announced at WWDC 2020. The transition is planned to be implemented gradually, over 2 years.   The decision to change the processor platform was officially made to strengthen the position of autonomy and management of the bundle…

(More...)

"Bloomberg" and "new York times" through their sources provided information about the conduct of "Microsoft" negotiations on the acquisition of the Chinese video application "Tik-Tok".   "Tik-Tok" has long been under attack from many governments, including in the United States, where President Donald trump recently announced plans to ban the use of this video application in the country. The essence of criticism from the trump administration is problems with national security, the privacy of underage users, and the possibility of the Chinese government's influence on the owners of the app.   And, although TikTok is not a public company, some bytedance investors value TikTok at about $ 50 billion, and The Times at $ 100 billion.   In the light…

(More...)

Apple has finally given iOS users the opportunity to become full participants in testing beta versions of new releases of operating systems for smartphones and tablets. Currently available for testing iOS14. There was also a parallel not so much with the interface, but with the features and functions that have long been implemented in Android, namely: The ability to place widgets in any place (page) on the desktop (and not in a specialized menu); The ability to place two widgets in the menu (in iOS13 and previous ones – strictly one in a row); "Picture in picture" video viewing Mode (although there is no official Youtube app yet, but this is easily fixed by viewing via Safari); Due attention to…

(More...)

The Xbox Series X could be a breakthrough gaming device. Microsoft's Velocity system improves the console's performance, taking its capabilities to the next level of development… Functionally, Velocity Architecture is a set of technologies from Microsoft designed to optimize data exchange in the Xbox Series X buses with the exception of" bottlenecks "- that is, on the principle of"the squadron moves at the speed of the slowest ship". The Velocity Architecture complex has four parts: SSD, hardware decompression of information, a new API for working with data on SSD, and a system for intelligent loading of textures in RAM. According to Microsoft, a set of measures to optimize the device will allow developers a greater degree of freedom, also when…

(More...)

One of the most popular content management systems is WordPress. Why? - easy to operate, there are thousands of themes and plugins, you can create any site. It is not surprising that with such a set of advantages, WordPress "lives" in 35 % of all sites on the Network. But the popularity of WordPress pays for those who often come to the attention of hackers. That is, the main focus when using - the protection of your WordPress site; and no matter, it is a personal blog business site. If we talk about WordPress security, users are usually divided into those who take security seriously and take all necessary measures, and those who rely on the case... To understand the…

(More...)

A major failure of Garmin services, presumably caused by the activity of the new WastedLocker virus, has been going on for several days. Representatives of Garmin do not confirm this information, but many researchers and specialists are inclined to this scenario, judging by the scale, structure and results of the attack. This failure has the status of a worldwide failure, and the Garmin Connect system used in synchronization with servers is not functioning, and the other functions of the devices are not violated. In any case, the company in the first hours referred to minor technical failures and problems, but then in its Twitter account recognized the presence of such a large-scale problem. According to the materials provided by DownDetector,…

(More...)

Against the background of high-profile fraud on the accounts of celebrities in last week's hacker campaign to collect cryptocurrency-additional research has shown serious vulnerabilities in the security of the social network. It turned out that, first of all, many employees, including those who are not directly employees of Twitter, that is, hired by third-party organizations (that is, at the second level of outsourcing!), had access to the level that allows you to change user privacy settings. New details are constantly emerging about potential security breaches, including the FBI investigation. That is, in fact, thousands of employees not only had access to account privacy settings, but could also change their access level when transferring their accounts in the course of their…

(More...)

In May 2020, a critical vulnerability was discovered in Windows DNS Server (code name - SigRed, identifier - CVE-2020-1350). According to the CVSSv3 (vulnerability assessment scale), she received 10 points out of 10. Such figures of this rating mean extreme simplicity in using error, operation does not require practically competence. It is possible to use this vulnerability, including for remote automated attacks, since no pre-authentication is even required. The vulnerability has existed for 17 years, and poses a danger to versions of Windows Server (2003-2019 vol.). During operation, you can send specific DNS requests to Windows servers, which will allow the execution of arbitrary code and can potentially compromise the entire structure. How the Windows DNS server handles incoming and…

(More...)

This was a "prank" to collect cryptocurrency, and the consequences could be much more serious. On July 15, 2020, a campaign was launched, attacking the Twitter accounts of many famous rich people (bill gates, Jeff Bezos, Kanye West, Barack Obama and Elon Musk). From their accounts, tweets were published about their alleged desire to "share" their assets with other users of the social network, and to receive them, it was necessary to send an amount to the specified bitcoin wallet, with a refund of twice within 30 minutes… "I return bitcoins to all my subscribers. And I will double the amount when sending the currency back. You send me 0.1 bitcoin and get 0.2 bitcoin back!" — it was indicated…

(More...)

It will also feature other new features, such as inserting information from messages with SMS passwords into browser web forms and a new animation engine. Today, Google has released its Chrome version 84-of course, with automatic updates from previous versions. There were almost no external changes – almost all of them relate to the browser's internal software (API, developer tools). Chrome 84 features updated APIs: the web OTR API and the AI animation management system, and some experimental features (with the API: Wake blocking, idle detection, and content indexing. Also, this version is the first release of Chrome that blocks pop-up notifications on websites that abuse this feature. Summarily: Web-OTP API-actually created by Apple, but Google has agreed to support…

(More...)

The twentieth century has pleased companies with the appearance of computer systems, starting from conducting bulk calculations on the first lamp devices, then with the appearance of personal computers and network computing infrastructure, which is now approaching the deployment of a completely different level of system in cloud clusters… But business owners and officials, due to their specific organization and strategy of thinking aimed at maximizing the optimization of processes in the conditions of capitalism and excessive verification of the correctness of investments – began to wonder by the end of the twentieth century – is everything so good with the consequences of computerization of business (processes, reporting, and others)?   It seems that everything from the point of view…

(More...)

Specialists of the it company "Trend Micro Incorporated" conducted their own research on the prospects of 5g network security - "Securing 5G Through Cyber-Telecom Identity Federation". In short, the conclusions are very disappointing, as for the security situation at the moment – it is possible to implement many types of attacks on such networks, from the hardware to the software level of penetration. Of course, many of these attacks are not immune to the current network – only the situation is changing radically due to the difference in data transfer speed and, as a result, in the efficiency of potential hackers. In particular it and software vulnerability on SIM cards, unauthorized roaming to connect to "need" a phishing cell tower…

(More...)

2019 brought an unprecedented growth of the technology industry – just look at the UPS and accumulated assets of BigTech companies during this time. Their expansive growth has started a new level of competition – the results we are beginning to reap now. On the one hand, this unprecedented growth of structure, which brought a good digital community only positive bonuses: the final victory of cellular standards (up to the history of the USB type-C), the beginning of a new start AMD, coordination of claims Qualcomm (for the benefit of smartphone users), which appeared in full claim to the giants of the digital industry from various legislative, regulatory and public bodies of the various States, and much more. Of course,…

(More...)

With 200 million native American users, TikTok, which has a simple user interface, background music options, and various special effects, has become a growing force on the national social media scene, and the ban has forced fans to look for options. Roposo, an Indian video-sharing social media app similar to TikTok that has been around since 2014, has seen its user base grow by 22 million in two days after India banned Chinese apps.     The number of roposo downloads on Google's Android currently exceeds 80 million, and Bhangadia expects it to reach 100 million in just a few days. Before the ban, Roposo had about 50 million installations on Android devices, making up the bulk of India's nearly…

(More...)

The order even blocks employees from being transferred to the American offices of their own companies.   Green card holders are not currently affected by the new order, but the administration says the immigration restriction order will leave 525,000 vacancies in 2020. Tech firms are resisting the trump administration after the President issued an order suspending the issuance of many types of work visas that allow highly skilled workers with families to enter the US and work for us technology companies. This information updates and expands on an earlier order issued in April. Both the April and June orders claim that hiring employees from other countries at this time would put the United States at an economic disadvantage, while the…

(More...)

The ban on Chinese short-video apps like TikTok and Likee has led to an increase in downloads of Indian 'clone' apps such as Trell, Bolo Indya, Mitron, Chingari, and Roposo, but the battle to replace them with India-made ones is far from over, investors said. Gaining downloads is just the first step, they said. Retaining users, getting them to create a digital footprint and making them addicted to the app is crucial in this 'winner takes all' market, they added. According to industry estimates, around 12-15% retention is considered good for a short video app. So, a few million downloads just does not suffice in the cut-throat industry, they said. "The kind of money needed for scaling won't come into…

(More...)

The internet is home to immeasurable numbers of dangerous malware and viruses. Being familiar with dangerous vices and practicing safe web surfing habits are extremely valuable in keeping your computer healthy, but only go so far. And with random acts of software sabotage being replaced with phishing, ransomware, and identity theft; employing competent antivirus software is more vital than ever. Kaspersky Total Security is in a league all on it’s own in malware detection. It also uses extremely little RAM allowing it to run 24/7 on your PC with inconsequential changes in your system performance. And although Kaspersky Total Security is renowned for it’s malware security, it hosts several other important features like payment/password protection and encryption, antivirus/antispyware, protection from…

(More...)

To those who don’t know, PowerShell is a scripting language and command-line shell even more powerful than Command Prompt. It has become the default option in Windows 10, and its strength and intelligence is what’s made it the preferred choice of IT specialists. The cmdlets (command-lets) is a versatile tool that allows you to execute many handy operations such as automating Windows and automatically running on a VPN based on the app being launched. The easiest way to launch PowerShell is through the taskbar by pressing Windows + X, then clicking “Windows PowerShell.” The Creators Update for Windows 10 allows PowerShell to be seen in the Power Users menu by default; if you don’t see it there iw would be…

(More...)

A new Google Chrome extension released by Check Point called ZoneAlarm Web Secure Free provides users with free protection from multiple dangerous vices on the internet. This is big news for everyone as it is rare to find something that can protect from phishing, malware, and viruses and it's completely free. By adding the ZoneAlarm Web Secure Free extension to Chrome, users’ default search engine will switch to Check Point’s ZoneAlarm Safe Search which is up to date on online threats and security risks, allowing you to observe the potential risks of any links brought up by your searches. Not only has it quickly risen to one of Google Chrome’s most popular extensions, but it has come to light at…

(More...)

With a massive spike in internet traffic during the quarantine, cyber criminals are letting loose many dangerous new viruses to target unassuming individuals. With Google Chrome being the most used internet browser of the last few years, the precarious new malware plaguing the web disguises itself as a Google Chrome browser update. The hiccup in employment and production as a result of the COVID-19 pandemic is affecting Microsoft just as much as any other business establishment; and as a result Google is postponing many of the release events it’s had planned for the near future - opting to prioritize the limited manpower to cyber security. Google Chrome users have been warned to watch out for the counterfeit browser update whose…

(More...)

Rumors have long circulated of Apple using system updates to slow down older iPhone models in order to compel users to buy new ones. These were recently confirmed in a US District Court in San Jose, California; and the settlement agreement is going to cost Apple anywhere between 300 and 500 million dollars. Owners of affected iPhone models will receive $25 per affected device. This sum could fluctuate based on how many people file their claims as well as legal fees and expenses approved by the court. This legal battle has gone on for over two years with Apple refusing to admit to their ruse. In 2017 the company admitted to using software updates in order to slow down older…

(More...)

An unexplainable glitch in recent IOS updates has consequently led to an overconsumption of data in many users’ iPhones. Users plagued by this issue are charged extraneous fees by their cellular provider and some are outright liable for stepping beyond their data contracts’ fair use policy. Apple has not resolved the issue in any recent patches; and the danger of the bug is that most consumers suffering from it will have no idea it is even happening (until it is too late). By navigating to Settings > Cellular > Cellular Data you may find an entry labeled “Uninstalled Apps” consuming data at an alarming rate. Even with Cellular Data shut completely off, many users report gigabytes of data being consumed…

(More...)

The infamous Paradise ransomware prevalent since 2017 has reemerged with a new strategy to sneak past Windows’ defenses and infect PCs. Their new approach isn’t recognized as malicious and once the infection commences users will be locked out of their entire system. Cyber security experts believe Paradise’s new malware is still in the prototype phase, not yet in its final beastly form. Paradise ransomeware’s new variant begins its transmission through phishing emails, generally of a commercial nature, in order to compel targets to open an IQY attachment. Internet Query Files (IQYs) are text files read by Microsoft Excel, which is why the majority of software wouldn’t block it or fly a red flag. These files however, download data from the…

(More...)

Several new leaks surrounding Apple’s smaller MacBook Pro may be good reasons to reconsider purchasing the laptop until the fully renovated MacBooks are released towards the end of this year. The future model is promised to veer away from the infamous butterfly keyboard as well as completely remake the display. The larger 16 inch MacBook Pro from last year delivered the scissor-switch Magic Keyboard, however Apple’s smaller laptop models still house the abismal butterfly keyboards that consumers have long complained about. If the lighter, more compact MacBook model is what you’re looking for it would be wise to hold off on any purchases until the consummated models hit shelves later this year. The new MacBooks are also reputed to operate…

(More...)

Malicious software has found a dangerous new method to infect users’ computers without them realizing a thing. The way in which these Trojans and Backdoor Malware are able to clandestinely corrupt your PCs without any notable indicators is now through bogus website security updates. The new phishing technique reported by Kaspersky has to do with Certificate Authorities, which exist to boost online security by acting as an encryption formula for communication between a browser and a server. These are common in e-commerce and aim to cosign trust in a domain. A substantial number of different websites have recently been compromised by two new nefarious programs called Mokes and Buerak. When a user visits a compromised domain they are met with…

(More...)

The free updates provided to Windows users are an asset these days, allowing customers to constantly wield stronger and more reliable software without the need to purchase a new operating system every couple of months. One of Windows 10’s new updates however, jeopardizes its users’ PCs by masking the true intent of some malicious files users might come in contact with on the internet. Windows 10 users have become more vulnerable to malware and ransomware with the new Windows update labeled “KB4535996”. Although Microsoft does not acknowledge any issues with the said update, claiming they are “not currently aware of any issues with this update”; one of the biggest quality of life fixes with KB4535996 actually exposes Microsoft customers to…

(More...)

Apple has big news for 2021 with a custom arm processor equipped Mac. Although very little information is circulating regarding the new Mac, Apple confirms that the custom arm processors would be built by Apple and liberate their product from the balancing act that was being tied together with Intel. Rumors regarding the Mac’s shift from Intel to Arm have been circulating since before 2020, but the Apple manufactured chip won’t see any action this year. What stimulated the move was a vision to be able to run all the same apps available on iPhone and iPad on the Mac. The iPhones and iPads already run arm-based chips and certain previous Mac models have already operated the hardware. If all…

(More...)

Android’s Google Play store has been pumping out all kinds of great games and intelligent apps since the start of 2020. Alongside some of the creative new games and advanced utility that came out this week, a highly anticipated supplementary app has been released - akin to one of Nintendo’s biggest juggernauts since the start of the twenty-first century. Kick-Flight is a free to play arcade style brawl game. Similar to the prominent Super Smash Bros series, the game consists of choosing fighters and bouncing around the map trying to defeat opponents. Players work in four man teams and fight against real opponents from similar regions. The gameplay is unique and fast paced making it one of the most entertaining…

(More...)

As a brand Apple never fails to outdo it’s prior accomplishments as well as generate buzz in the tech community. To begin the new decade Apple is releasing an all new MacBook Pro; after listening closely to the public and gathering together the best minds in tech Apple is excited to launch their new juggernaut of a laptop. The big upgrade to the new MacBook is Intel’s tenth generation “Ice Lake” processor. According to testers of the new laptop the unit boasts 12% higher CPU performance and almost 30% stronger in GPU tests. A common complaint with the past MacBooks was Apple’s shortcomings in releasing computers capable of playing modern PC games. So to those looking to game on their…

(More...)

The Internet of Things is going through a boom right now with many rival tech companies coaxing us to nest their products in our homes, workplaces, cars, you name it. These Internet of Things or IoT devices refer to devices connected to the internet which can link with other devices and communicate without human-to-computer or human-to-human interactions. From intelligent thermostats to security cameras to virtual assistants who can be told to play music, all these devices are presented as extremely cheap and “must-haves” for the bargain price. But actually this is because these devices’ only purpose isn't to make your life easier. The data collected by these IoT devices daily isn’t going in one ear and out the other. It…

(More...)

Ransomware had its humble beginnings as a common threat to the average Joe, but the statistics show that not only are the attacks growing more complex but they also provide an even bigger threat to businesses. The spoils from a successful cybercriminal campaign on a business are proving to be much more rewarding, as the FBI notes that ransomware numbers have stayed more or less the same for regular citizens, but rose over 300% in businesses. This number reported by the FBI is even more staggering because private businesses have no obligation to report these attacks, meaning the actual number is likely significantly higher. But the other major target for ransomware has been publicly funded institutions. In 2019, cybercriminals hit…

(More...)

As the internet began to take off in the mid 90’s, certain zealous individuals saw the potential in investing in the web. One such entrepreneur Mike O'Connor took it upon himself to claim several sleek or precise domain names; such as bar.com, cafes.com, shelter.com, you name it. Naturally, with the exponential growth of people starting and running their own websites, O’Connor’s “classic” domains multiplied in value. One domain however, is more sought after than all the rest, and for more than just a prestigious looking header for an ambitious business. This precious domain O’Connor has finally released for auction is corp.com; and the reason for its notoriety comes from a loophole in the early Windows service called Active Directory. Because…

(More...)

Looking to boost the performance of your website hosting as well as budgeting to save your business money can be overwhelming with all the different options available. Virtual Private Servers, or VPS’s, are the best form of web hosting because they combine all the strengths of conventional methods while also allowing you to pay for exactly what your business needs to stay ahead of the curve and still save money. The most basic form of web hosting is called Shared Hosting, where you have one physical server being shared by multiple customers. What is being shared is the fundamental resources of the server such as RAM, CPU, and disk space. What makes Shared Hosting so simple is the lack of…

(More...)

Sundar Pichai, CEO of Google and head of day-to-day operations announces that in 2019 Youtube was able to generate over one billion dollars per month in advertising revenue. This was the first time the company revealed how much money the media giant has been raking in. Despite the promising statement, investors have continued to dump their shares. Alphabet (Google’s parent company) shares have dropped about 4% after the markets closed. This is likely because Alphabet stated that their revenues for the prior quarter did not meet expectations. With advertising alone, YouTube brought in $15.15 billion in 2019; $4.72 billion in the fourth quarter. Youtube is generating more wealth through more than just advertisements: YouTube TV and movie rentals, to name…

(More...)

Almost exactly two years ago Steam set a record for players with 18.5 million accounts. This February, the popular gaming platform has set a new high with 18.8 million users online simultaneously. Although the record for players in-game at once still holds at 7 million, there is reason for optimism in the platform as the recent milestone coincides with record numbers of hours played in all of Steam’s top games. The previous year was progressive for Steam to say the least, boasting constant improvements to the client and the games catered to it. Valve has also been able to procure the Chinese market, making the Chinese language Steam’s new most popular language. They are even pushing to extend their application…

(More...)

In a new overhaul by Google, the Google Earth app allows you to see the stars and galaxies that surround our globe. Say goodbye to the empty, black backdrop. The app that once only carried resources capable of observing the planet has had a massive overhaul. The Google Earth App on smartphones and tablets can now observe all of the stars in our universe. Unlike before when the app contained just the Earth and a plain black background, this new update paints the world and adds new functionality to Google Earth mobile. Google credits the innovation in smartphones for their decision to move forward. Over recent years, tablets and smartphones have matured exponentially; allowing Google to begin to bring the…

(More...)

Planning to run an online business which absolutely requires an understanding of the necessary security measures that need to be in place before getting started. And, SSL certificates are the best solution to this statement. So, we are here to provide you with the best lined-up SSL Certificates services & also ensures you with the quick online issuance, 24/7 support, advanced encryption & strong warranties. SSL Certificates are becoming a popular trend for almost all the websites & blogs. An SSL Certificate is a protocol for allowing the data encryption on the internet. SSL Certificates are becoming a popular trend for almost all the websites & blogs. An SSL Certificate is a protocol for allowing the data encryption on the…

(More...)

The Benefits of SSD Hosting Are you looking for comprehensive website hosting? If so, SSD hosting just might be the right service for you. SSD hosting uses solid state disk drives which use non-volatile memory to store data. Below you will learn three of the main benefits of using SSD hosting as opposed to other hosting types.The Benefits of SSD Hosting Are you looking for comprehensive website hosting? If so, SSD hosting just might be the right service for you. SSD hosting uses solid state disk drives which use non-volatile memory to store data. Below you will learn three of the main benefits of using SSD hosting as opposed to other hosting types.

(More...)

Should I Consider Cloud Storage? Are you using the cloud to store your data? If not, then you really don’t know what you’re missing out on. Cloud storage has many benefits that just about anyone could take advantage of. No matter what your data storage needs are cloud storage just makes practical sense. Today we are going to learn more about cloud storage and why it might be right for you.Are you using the cloud to store your data? If not, then you really don’t know what you’re missing out on. Cloud storage has many benefits that just about anyone could take advantage of. No matter what your data storage needs are cloud storage just makes practical sense. Today we…

(More...)

Getting the perfect domain name for your business website is more important than the website itself. It doesn’t matter how much money you spend on designing a beautiful website, if your domain name doesn’t look professional or relevant to your brand, people will certainly be suspicious of your business. Your website’s domain name is also the most important part of your online marketing strategy. It’s how people will recognize your brand when they search for your business on Google or find a link on Facebook.It doesn’t matter how much money you spend on designing a beautiful website, if your domain name doesn’t look professional or relevant to your brand, people will certainly be suspicious of your business. Your website’s domain…

(More...)
GPD Host Contacts
GPD Host Social
Pay with Confidence

Copyright © 2015 - 2020 GPD Host All right reserved.