26 May 2017

After the Galaxy Note 7, Samsung once again in trouble over battery issues


After the Galaxy Note 7, Samsung once again in trouble over battery issues

As the Note 7 fiasco had begun dying down, Samsung is again facing multiple lawsuits following reports that its other models to are plagued with battery issues, media reports said.


The other smartphone models that reportedly face similar issues include the Galaxy S6, S7 Edge and Note 5.


Earlier this month, Dale Holzworth from Massachusetts filed a class action lawsuit that claimed the Galaxy S7 Edge he purchased last year burst into flames while it sat charging in his son’s bedroom, a report in DailyMail reported on Thursday.
According to the report, cases in three US states have claimed that Samsung was aware of the battery issues and fire hazards for years, but opted not to inform its customers.
Another lawsuit filed by Claire Gilligan in New York noted that the other smartphones use similar or identical batteries to those used in the Note 7.
Almost 112 Galaxy Note 7 devices caught fire worldwide within a month of the smartphone’s launch in August last year, prompting Samsung to recall all the 2.5 million products after five months of its launch.
“Samsung manufactures and sells smartphones which pose a threat to the safety of consumers,” reads the Samsung class action complaint.
Plaintiffs have demanded that “users with the older models should be provided with the same refund and exchange program set for the Note 7”.
They alleged that Samsung recalled the Note 7 while leaving other dangerous products in the marketplace as the problem was not limited to a single product only.
“Samsung’s team responsible for designing the system further stated that due to the spatial limits of smartphones, the cooling system’s cooling capacity alone is not enough to cool the device,” the report quoted a plaintiff as saying.





Tech2

25 May 2017

Mechanical Keyboard vs Regular Keyboard: Which One is Better for Gaming


Mechanical Keyboard vs Regular Keyboard: Which One is Better for Gaming

If you're a gamer, what kind of keyboard you should choose for better gaming battle? Mechanical keyboard, undoubtedly? well, if for me, an entry-level gamer without so much on the budget, the answer will be a little different.

Versus mechanical keyboard, membrane keyboard is also a good choice for more and more people over the years. Some feel good on their fingers; some feel awesome on their RGB backlit which is only seen from mechanical keyboards at the very beginning. Today we will compare the mechanical keyboard and regular keyboard (membrane keyboard) from their benefits and downfalls and provide recommendations about who should use membrane keyboard and who should use a mechanical keyboard. 



What is Membrane Keyboard?


Till now, most membrane keyboards are made from a dome with printed letters on the top or laser stretched, and then a rubber or silicone keypad comes with domes as the top membrane layer. 

What is Mechanical Keyboard?


As the name suggests, the mechanical keyboards use switches to send typing signals. Different switches perform differently, though with the same construction, a base, a spring and a stem. Commonly, most switches are black, blue, brown and red. 
mechanical-keybard-different-switches
Pros and Cons of Mechanical vs Membrane Keyboard
    Mechanical KeyboardMembrane Keyboard
Pros
Durability: longer time to wear out;
Tactility: more quickly to register in or type;
N-Key Rollover: allows you to press many keys simultaneously;
Similar Typing Experience to Mechanical Keyboards;
Relatively Quiet with a High-Speed Typing;
More Affordable with the same features;
Cons
More Expensive;
Louder Typing Sound:  depends on the switches used;
Mushy Typing Feels;
Quicker than Mechanical keyboard to wear out;  
Which One You Should Choose: Mechanical Keyboard vs Membrane Keyboard?
As you see both keyboards have their ups and downs, not one keyboard is for everyone.
If you’re on a budget and don’t care so much on the keyboard perform, typing it at home/office for most of the time  (who love mechanical feel but silent clicky) or even for an entry-level gaming battle, you could save much of money for a membrane keyboard which suits most of your needs. For example, the Redimp GK100, which is now on sale at $26.00 with the new release promotion code NEW4GAME at HERE.
Backlit Gaming Keyboard; Budget Gaming Keyboard

If you are a heavy user who uses the keyboard all the time or a professional/master gamer without too many concerns on a budget, a mechanical keyboard is recommended. For example, the Razer Blackwidow series; and costs you at least $150. 
mechanical-keyboard-razer-blackwidow-series





EasyAcc


Best Apps for Samsung Galaxy S8 and S8+


Best Apps for Samsung Galaxy S8 and S8+


Samsung Galaxy S8 had attracted much concern before its entry to the market. The present releasement of Galaxy S8 has made people even more curious about it. What would you do with this brand new product? What apps are you going to install? In this article, the editor recommends 5 best apps for Samsung Galaxy S8 and S8+, read on and have a look.


best_music_player_app_blackplayer
Best Music Player App—-BlackPlayer

This is an excellent music player for your Samsung Galaxy S8 that can be downloaded for free. With build in equalizer and bass boost, it adds much joy to your leisure time. Besides, the music scrobbling function is rather useful and records the songs you’ve listened. You can even customize the look of the app by changing themes, fonts, and colors as you like. And if you’d like to fall asleep with the company of music, the sleep timer will automatically stop the music after you’re asleep.


best e-book reader app_kindle
Best E-book Reader App—- Kindle

Kindle is such an app that puts millions of books at your fingertips with high-resolution color images, so if you are passionate about reading, it will definitely be a reasonable recommendation. You’ll have access to various free books—- popular magazines like The Economist and Reader’s Digest, classic works like Pride and Prejudice and The Adventures of Sherlock Holmes. Not all books are free of charge, yet they are easy to explore and shop. Get to be a full man with the Kindle app installed on your Samsung Galaxy S8.
best_office_app_microsoft_office_mobile
Best Office App—- Microsoft Office Mobile

Microsoft has greatly facilitated our work in the office. Now it’s time for us to enjoy the convenience brought by Microsoft Office Mobile while on the go with the smartphone. With Word, PowerPoint, and Excel available, we can open, read and edit files freely. And if you also use OneDrive、OneDrive for Business or SharePoint, you can even sync files between your computer and Samsung Galaxy S8.
best_socializing_app_hangouts
Best Socializing App—-Hangouts

When everybody is using Facebook, you may be interested in something new—-Hangouts developed by Google. This is a communication platform which includes instant messaging, video chat, SMS and VOIP features. It enhances contacts between you and your families and friends and adds fun to your life.
best_radio_app_dash_radio
Best Radio App—-Dash Radio

It is said that Dash is the biggest original digital radio broadcasting platform in the world, that’s why Dash Radio app is recommended here. One advantage that you must care much about is that there are no commercial ads or awkward pauses between songs so you won’t be interrupted while enjoying the wonderful music. Besides, it provides abundant music resources, 60+ original (not simulcast FM) live streaming stations are available. And you can stream the music on your Samsung Galaxy S8 via Bluetooth or cord to your car & speakers/headphones.
more_useful_apps
Above are recommendations concerning apps of various functions like socializing and reading, is anyone to your taste? There are actually more useful apps deserve trying, and once you find and use them, you’ll find the life more colorful.





EasyAcc

23 May 2017

Understanding the landscape of ransomware and the effective ways to combat them


Understanding the landscape of ransomware and the effective ways to combat them


Ransomware in IT world can be referred to as virtual kidnapping of data in exchange for a reward. It's a malware which restricts users from accessing their own data on a corrupted system and would demand a ransom to revoke the access. The recent slew of coordinated ransomware attacks known as WannaCry or WannaCrypt on various sectors in European countries has proved to be an effective wake-up call for business around the world. WannaCry is Encrypting Ransomware or Crypto Locker type of ransomware that is programmed to attack Microsoft Windows software. The attack last week, infected more than 230,000 computers in 150 countries including India, demanding ransom payments in bitcoin in 28 languages.


Understanding the landscape of ransomware:
Some variants of ransomware encrypt data in such a way that it is impossible to decrypt unless the user has an encryption key. These are called ‘Encrypting ransomware’ that incorporate advanced encryption methods. Another type of ransomware that is frequently circulated is ‘Locker ransomware, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. CryptoLocker, like WannaCry, is a malware when injected into a host system, scans the hard drive of the victim and targets specific file extensions and encrypts them. The encryption is executed using a 2048-bit RSA key pair, with the private key uploaded to command and control server. Some other types of ransomware are Leak were, mobile ransomware, Reveton, CryptoLocker.F & TorrentLocker and CryptoWall. This malware can attack through impersonation or leak data if the ransom is not paid within the imposed timeline.

A screenshot of an infected computer.
A screenshot of an infected computer.
Infiltration of ransomware:
Typically, entry of ransomware is through Trojan. These Trojans are nothing but malware hidden in legitimate looking files or attachments, which users access on their system. It could be an attachment from an email received in the name of a known user, a trick that involves creating a fake e-mail ID disguised as a known user. Often this ransomware also uses the route to the network to enter the system, taking advantage of network loopholes or vulnerabilities. Once the malware gains access to the system; depending on variants, it might encrypt files, or display hoax messages demanding payment or may just lock the system. To protect themselves from being traced once the crime is committed, hackers are likely to use payment methods like Bitcoin (digital currency), wire transfers to bank accounts with fake names, or online payment vouchers like Ukash.
Let’s have a look at some statistics to understand the spread of ransomware and the sources through which they enter in system
ransomware-distribution-medium
Image: Systweak
This graph shows growth in distribution based on the medium or sources which inject the ransomware in the system. Emails are the most susceptible to attracting malware. Email with attachments is generally the easiest way to target potential users. Website attachments and social media are the next target tools of opening a gateway for Trojans.


 ransomware-attacks-12-months
This graph shows the growth in ransomware attacks on business in last 12 months. This indicates that though most of the organizations have strong security strategy, many still fall short to protect their perimeters, leaving loopholes for such attacks.  Surprisingly, the average ransomware amount demand has also seen a spike from $300 to $700 in last year. There is an increase in ransomware variants and almost all platforms / OS have been compromised now.
Protection from ransomware:
  • Regular Data backup: This helps restore the last saved data and minimize data loss. Ransomware also attacks servers; hence it is important to have a backup on a disconnected hard drive or external device on the pre-defined regular basis.
  • Prevention: To prevent infiltration of malware, having password protected tools to identify and filter certain file extensions like “.exe” or “. Zip”, are essential. Emails that appear suspicious should also be filtered at the exchange level. There are also some tools that detect the entry of such malware with features of zero days’ protection which work on threat emulation and threat extraction techniques. Users and businesses also need to ensure that hidden file extension is displayed since it becomes easier to filter them.
  • User awareness: Awareness among users needs to be created to avoid opening the unsolicited attachment. Malwares are typically designed to mimic identities of people that users interact with on a regular basis either on a personal or professional level.
  • Rules in IPS: It’s necessary to create rules in the Intrusion Prevention Software (IPS) to discard or disallow the opening of files with extension “.exe” from local App data folders or AppData.
  • Regular patch and upgrades: To prevent leaks or vulnerabilities in software, ensure to regularly update the software versions and apply patches released by the vendor. These patches and version are often released to wrestle with known or newly discovered exploits and can prevent known signatures of these malware's, Trojans or ransomware's to enter the system.
It is inevitable to use the technology in day to day life, but it is equally important to be alert and proactive to deal with malware in technology to safeguard data and systems. Services like penetration testing and vulnerability testing extended by companies such as TÜV SÜD are one of the most important facets of cyber security services to enable customers for early detection of vulnerabilities in network and web/mobile applications and be ready to take proactive and preventive measures to impede cyber-attacks before the system is invaded.
The author is Head IT Infrastructure – APAC, TÜV SÜD, leading testing, inspection, certification and training service provider




Tech2

21 May 2017

Samsung Galaxy C10 with dual-camera leaks again, this time it gets the rose gold treatment


Samsung Galaxy C10 with dual-camera leaks again, this time it gets the rose gold treatment


Earlier this month saw a rumored Samsung smartphone touted as the Galaxy C10 with a dual-camera setup. The handset seems to have leaked again, but this time in a different shade.

A rose gold variant of the Galaxy C10 has been spotted on Weibo confirming the fact that it will go on to become the first Samsung smartphone to feature a dual-camera setup. But, if you look carefully, the new leak has the dual-LED placed between the two lenses. The leak that we saw earlier had the flash unit positioned on the right side. Even the camera housing is a bit different. The new leak is, however, similar to one of the alleged sketches which also has the flash between the lenses.

Samsung Galaxy C10 with dual-camera leaks again, this time it gets the rose gold treatment (1)


Information about the device is still scanty, but rumors say that the Galaxy C10 could feature a Snapdragon 660 SoC which was recently announced by Qualcomm. Considering the Galaxy C9 Pro offered 6 GB of RAM, we could see the same amount on the C10 or even more.

It seems that Samsung wants to try out the dual-camera setup on a more mid-ranged device before committing to a flagship smartphone. Hopefully, we will see a similar camera setup on the upcoming Galaxy Note 8 which should arrive by the beginning of Q4 this year.





Tech2

14 May 2017

WhatsApp fined $3 million for sharing data with Facebook in Italy


WhatsApp fined $3 million for sharing data  with Facebook in Italy


WhatsApp has been fined over $3.3 million in Italy for 'forcing' users to share their personal data with its parent company Facebook.

The popular chat app has been asked by all of the 28 European Union data protection authorities to stop sharing users’ data with Facebook as there were doubts over the validity of users’ consent, Express.co.ukreported on Friday.



“We’re reviewing the decision and we look forward to responding to officials,” the report quoted a WhatsApp spokesman as saying.
Facebook took over WhatsApp in 2014 and in August 2016, it changed its privacy policy to allow the transfer of its users’ personal information to the parent company for processing — a move that also created a furor in India.
The Indian government told the Supreme Court in April that it was actively considering to put in place a law to protect data and curb sharing of individual data on social networking sites and online messaging services.
The petitioners challenged a September 23, 2016, Delhi High Court order which allowed WhatsApp to roll out its new privacy policy.
Although the high court did say that it could not share the data of its users collected up to September 25, 2016, with Facebook or any other related company.
During the acquisition, Facebook had claimed that respect for users’ privacy was “coded into its DNA”.
But Italy’s antitrust regulator alleged that “the opportunity for WhatsApp users to refuse the handover of data to Facebook was available ‘but it was inadequately flagged’.”
The German authorities in April banned Facebook from collecting information on its WhatsApp users in the country after it was found to have breached data protection laws.
Since Facebook took over WhatsApp, it has been surrounded by controversies related to privacy.
Earlier in 2017, The Guardian reported a security vulnerability that could be used to allow Facebook and others to intercept and read encrypted messages had been found within its WhatsApp messaging service.
WhatsApp denied the allegation saying it had a design decision relating to message delivery, with new keys being generated for offline users in order to ensure messages did not get lost in transit.




Tech2

12 May 2017

Refurbished Samsung Galaxy Note 7R is now on sale in China


Refurbished Samsung Galaxy Note 7R is now on sale in China


While Samsung had earlier confirmed that it will not be bringing its Note 7 phablet to India, a report now points out that it has begun selling in other markets after its re-launch in Korea.



According to a report by the Playfuldroid, the refurbished unit of the Samsung Galaxy Note 7 has gone on sale in China. The product listing on a retailer's website showcases a Samsung Galaxy Note 7R (R for refurbished) already on sale, much before the official re-launch.
The smartphone in the image is a gold unit with a price tag at CNY 3,599-3,999 (Rs 33,446) which is a lot less compared to the launch price in India which was set at Rs 59,990 (after which reports of the Note 7 catching fire started to pour in and the model was discontinued).
The Samsung Galaxy Note 7R comes in two variants, one with a 3,200mAh battery and the second with 3,500mAh battery. The variant with the smaller battery is reportedly heading to Europe, the US, and Asia. The variant with the larger battery will be a limited volume run.
The Note 7 packed in a 5.7-inch Super AMOLED display sporting a resolution of 2560 x 1440 pixels. There’s Gorilla Glass 5 on the back and the front. Inside, you get an Exynos 8890 chipset which is the same as on the older Galaxy S7 along with 4 GB RAM and 64 GB of internal storage. Connectivity options include LTE, dual-SIM card option (hybrid slot), Wi-Fi, Bluetooth, USB Type-C, GPS (A-GPS, GLONASS, BDS, GALILEO). The Galaxy Note 7 borrows the 12 MP camera that featured on the S7 and the S7 Edge.





Tech2