Saturday, 4 April 2015

Intel, AMD Going All In With Windows 10 Tablets



Tablets still are an unconquered domain for Microsoft, and the plan is for Windows 10 tablets to take things to another level in terms of both performance and pricing.

Intel and AMD, the two chip giants, are two central figures for this plan to succeed.

Both companies continue to push their tablet oriented solutions, even as the tablet market is showing signs of fatigue — at least in terms of growth. Large screen smartphones and phablets have started to impact tablet sales.

For example, 7-inch tablets used to dominate with well over a 70% market share not too long ago, and this has now fallen to around the 60% mark, primarily thanks to handsets with larger screens.

According to this report, though both Intel and AMD are ready to unleash their new tablet platforms.

Intel is set to release Cherry Trail, early in the first quarter of 2015, with volume production on track to begin in March. This new processor platform is based on a 14nm process, and will be available for both Windows and Android tablets.

Expect a plethora of such solutions from brand vendors and Chinese white label companies by the time Windows 10 makes its public debut.

AMD is not out of the game, either. If anything, it’s just getting in.

The company has its Nolan and Armur platforms in the pipeline. The former utilizes an x86 architecture, while the other is a heterogeneous system architecture (HAS) specifically for Android and Linux slates.

With several new third-party hardware manufacturers on board, Windows 8.1 tablets are just now starting to make their impact. Windows 10 promises a similar response, provided Microsoft keeps up its current pricing strategy for tablets.


The US government under attack by Google over internet privacy rule change



For the past few years, the US government has been under attack a couple of times over its way of handling internet privacy. In 2013, former CIA system administrator Edward Snowden leaked to the mainstream media the NSA’s tools for operating an alleged “global surveillance network” over the internet. In 2014, German chancellor Angela Merkel was enraged by reports of alleged American spying on German citizens, as well as on Merkel herself. Now, in 2015, the internet search giant Google is taking a formal stand against the US government concerning its plan to amend what is known as Rule 41.

Rule 41 is one of the federal laws of criminal procedure, concerning the issuing of search warrants. Basically, the current rule allows a judge to issue a digital search warrant only within the boundaries of his or hers judicial district. According to the Justice Department, this rule became archaic and obsolete as far as criminal investigations of computers are concerned, because today’s technology makes it easy for any user to be able to completely hide the location from which he or she is operating.

When the FBI needs to seize computer data related to a violation of US laws, says the Justice Department, it needs to be able to do so without first finding the computer’s physical location.

Richard Salgado, Google’s director for law enforcement and information security, strongly objects. The amendment suggested to Rule 41, he says, implicates that the US government would in effect be allowed to carry out digital search warrants in computers across judicial borders. This, says Salgado, is both in contradiction of the US constitution 4th amendment, which protects people from unreasonable seizures and searches, and also gives the US government the power to spy on any computer in the world. As Salgado says, this is a matter concerning both the privacy of US citizens and the US recognition of the sovereignty of other nations, and should be decided by congress.

The Justice Department responds that the subject matter has been blown out of proportions and is merely a “tweak of protocol”. It does not, says the JD, grant the US government any authorization to carry out any form of digital search and seizure techniques not already permitted by law. The JD adds that just like in real-life search warrants, investigators are careful not to create any collateral damage, and of course not to overtake any sovereignty of any nation or other judicial body.

The proposed rule change, for which the public comment period has already ended, has so far gone unnoticed by the public, even though some privacy and civil-liberties groups have objected to it. It wasn’t until Google joined the objection, becoming the first and so far only major tech firm to do so, that the subject matter caught the public’s attention. The main objection of all parties involved is that the wording of the current rule change is “far too vague”, and that only congress should decide whether to extend the JD’s powers to investigate computers and computer data.
With all the objections, the change to Rule 41 still has a long way to go. It is expected to go for review by the supreme court and by congress. Now, as public awareness grows and the subject of network privacy is making headlines, it will be interesting to follow its course and see how the world we live in is affected by the changes brought by the digital age.



WTF!! What is the FREAK vulnerability? Why Should i care ?


Last year, the OpenSSL vulnerability called Heartbleed causes so much problem for the internet users. It was one of the most dangerous security flaws because it affected every big website and allowed hackers to hack SSL protected websites. However, There’s another widespread vulnerability on the internet called ‘FREAK’ and it has affected a lot of internet websites and browsers.

The FREAK is the acronym for Factoring RSA Export Keys flaw. FREAK is a bug that allows attackers access to secure communications. It was discovered in software that was used to encrypt data that went from web servers to web users. It has been in existence for a decade now but was only thought to affect Apple’s Safari as well as Google’s Android browsers. Now however, Windows has been added to that mix.

It affects all versions of Windows which use Internet Explorer. All Microsoft Software that utilizes the Secure Channel via the Windows — Secure Sockets Layer and its descendant, the Transport Layer Security also has FREAK Vulnerability.

FREAK vulnerability permits an attacker to easily intercept data that is moving between the source site and a visitor to use a weak encryption which makes it possible and easy to crack the data and reach sensitive information such as passwords as well as access the data on that page. This FREAK flaw was exposed by encryption and security guru Karthikeyan Bhargavan.

The FREAK vulnerability gives the attacker an easy channel to forcefully downgrade any coded suite that is used in SSL/TLS connections on the system of a Windows Client System. The FREAK technique is an issue that affects the whole industry and if left unsolved might lead to software crisis worldwide.

In an attempt to value the impact of this bug a group has been set up to evaluate and gather numbers regarding the worldwide risk. A 9.5% of the overall worldwide web’s one million websites have been found with Freak Vulnerability and are therefore prone to attacks. They have introduced an online tool so people can check whether the browser they are using is at risk.

To counter the Freak Vulnerability, Google has updated its Chrome Version for the Mac but Android is still on review. Apple is also geared to introduce a solution soon. There have been various advisories from Microsoft concerning how to eliminate the Freak Vulnerability. Unfortunately, these solutions can lead to very severe problems with other programs. Because of this, other better solutions are being sought. Microsoft is expected to address the issue with its scheduled patch Tuesday update or an irregular one.

Though there has been no report of the use of this flaw for cyber crime, the frenzy with which a solution is being sought reflects its seriousness. Microsoft has even suggested that Windows users disable their RSA export ciphers in the meantime.

Many experts blame the FREAK flaw on the earlier US policy bans that barred the strongest encryption standard appliance. This allowed the infiltration of weaker standards in most software including Web browsers and Windows. This was done so as to allow intelligence agencies to keep an eye on web action. The remnants of this ban are the cause of the FREAK vulnerability today.

According to the miTLS Team, which discovered this FREAK security hole in the first place, the following SSL/TLS client libraries, are vulnerable:

=> OpenSSL (CVE-2015-0204): < 1.0.1k version.
=> BoringSSL:  Older than Nov 10, 2014 version .
=> LibReSSL: < 2.1.2 Version.
=> SecureTransport
=> SChannel

Web browsers that use these TLS libraries are open to attack :

=> Chrome versions before 41 on various platforms are vulnerable.
=> Internet Explorer.
=> Safari is vulnerable.
=> Android Browser is vulnerable.
=> Blackberry Browser is vulnerable.
=> Opera on Mac and Android is vulnerable. .


It is advisable for all users to keep an eye out for updates so as to protect their systems once a solution is found or switch your web browser to Chrome 41 or Latest Firefox browser. Staying ignorant might cause a lot of long term losses that will be irreparable.


WhatsApp Calling Feature Invitation Spreading Malware in Phones






Many WhatsApp users are waiting for the invitation to enable WhatsApp calling feature in the app. You may have received an invitation too or you are waiting for it. Well, if you haven’t received any invitation yet and feeling unlucky than trust me you are very lucky. According to a report by the Daily Star, WhatsApp users across the world are becoming victims of cyber Scammers who are sending fake messages inviting users to test the new calling feature that installs a dangerous Malware in the phone. If user click on the invitation link, they are taken to another website where they are asked to take a survey on behalf of the popular messaging service.

After completing the survey, they are forced to download multiple third-party applications, which run the risk of spreading malware on smartphones. It doesn’t end here The malicious voice calling invite also ask users to invite friends, before testing the feature, thus putting other users at risk of losing confidential data.

The message looks like “Hey, I am inviting you to try WhatsApp Calling, click here to activate now”. Hence, if you receive any kind of message similar to this, Do not open it , Do not click on the link , Do not forward it to friends . WhatsApp has not announced the calling feature officially, It is in beta stage so users are advised to wait until WhatsApp enable this feature  for everyone.

However, now the big question is rising that if WhatsApp has added encryption for messages sent among its users to prevent messages from being hacked or monitored then how those scam messages are coming?. If WhatsApp itself is not collecting and selling its users data then – from where are these companies getting the mobile numbers of millions of WhatsApp users?



Tuesday, 31 March 2015

6 Tips To Design eLearning Courses That Appeal To A Wider eLearning Audience


How To Appeal To A Wider eLearning Audience

Regardless of the subject matter of the eLearning course you are designing, like all eLearning professionals, you ultimately want your eLearning courses to reach as many people as possible. But how do you extend your reach and leave your mark upon a greater number of learners? In this article I'll share 6 smart tips for creating eLearning courses that appeal to a wider eLearning audience.

1) Steer clear of content that is location or culture specific.
Ideally, you'll want to avoid using references or terminology that may only be found in a particular culture. For example, if you include various sayings in your eLearning course that may not be popular in several parts of the world, then your international audience will not be able to get the full benefit from the eLearning experience. They might even disengage altogether, because they simply aren't able to understand the significance of the old adage. Also, try to avoid pop culture references if possible, as they usually aren't shared globally. Last, but certainly not least, make sure that you are aware of what might be offensive in certain cultures especially if you are planning on selling your eLearning course in international markets. For instance, one gesture might be seen as commonplace in one country, but entirely rude and offensive in another.


2) Choose tools that allow quick and convenient modifications.
There are some cases where the content you currently have in your eLearning course may not be suitable for every eLearning market. You may have to add subtitles to your eLearning course or modify it in order to make it relevant for international audiences. This is why it is helpful to choose tools that allow you to make these changes without devoting a lot of time or money to the process. By creating templates that you can reuse and utilize eLearning authoring tools and Learning Management Systems that enable quick and convenient modifications, you can make your eLearning course engaging and informative for a wider eLearning audience.


3) Make it relevant and relatable.
Even though you are aiming your eLearning course to reach a wider eLearning audience, it should still address specific learning needs. Do your research to figure out what your learners want to gain from the experience, what learning goals need to be met, and what cultural, professional, and educational background your audience has. Every element of your eLearning course should not only appeal to a wider eLearning audience, but it should also help them engage in the eLearning experience and get what they truly need out of the content. You can determine this by conducting surveys, holding focus groups, and speaking with subject matter experts to see what should be included in your material, as well as how the information should be presented in order to achieve the best results.


4) Include assessments and multimedia elements that appeal to all learning needs.
The simple truth is that no two learners are alike. While one learner might respond well to audio presentations, another might get a better eLearning experience from interactive scenarios or games. As such, it is essential to include assessments and multimedia that cater to a wide range of learning needs. For example, you can create an assessment that includes both audio and visual components, or a variety of different multimedia elements (such as slideshows). Also, try to be as simple and straightforward as possible when creating the content itself. For instance, when trying to draw in a wider eLearning audience, you should not create an eLearning course that only someone who has advanced knowledge of a subject can complete. If you do plan on creating an eLearning course specifically for those with prior knowledge of the topic, then you may want to include this in the syllabus, so that other learners aren't caught off guard when they participate.


5) Use language that is both basic and informative.
Steer clear of lengthy paragraphs that contain complex language, and use words that are more basic. By doing so, you make the eLearning experience educational and effective for learners of all backgrounds, ages, educational levels, and cultures. Even learners who may speak English as a second language can benefit from your eLearning course if you use more simplified language, due to the fact that they won't have to struggle with complex terms or phrases. And if there is an elaborate word that you need to use but a wider eLearning audience may be unfamiliar with, they can look it up and expand their vocabulary as they improve their comprehension of the subject matter.


6) Include captions or subtitles.
One of the best ways to appeal to a wider eLearning audience is to include captions or subtitles in your eLearning course. This is particularly true if you have an eLearning course that contains an abundance of audio elements. By doing this, those who may be hearing impaired, have special learning needs, or use English as their second language will be able to easily absorb the information given. In addition, when learners can read the text while listening to the audio, they will be able to fill in the comprehension gaps they may have, which means that they will get more out of their eLearning experience.
Use these eLearning course design tips to reach a wider eLearning audience and take the success of your eLearning course to a whole new level. If your eLearning course is still in the development stage, put these bits of advice to good use now, in order to draw in a larger eLearning crowd when it's time for launch.

Want to know how to extend the shelf life of your eLearning courses? Read the article 6 Tips To Design eLearning Courses With Long Shelf Life which reveals 6 tips that will help you design eLearning experiences that stand the test of time while always being relevant and relatable for your future audiences.


3 Windows 10 Features That Every Admin Should Know




We don’t know exactly when Windows 10 will be released, but it’s a good idea for IT pros to start thinking now about deployment, training and security issues.

Windows 10 is on the horizon. While there is no confirmed ship date quite yet, there’s a good chance we’ll see the final OS this year -- possibly in the fall if Microsoft sticks to its normal release schedule.

To be prepared for any gotchas, it’s a good idea for IT admins to start thinking now about deployment, training and security issues.

1. Deployment and Management Strategy

One of the key enhancements in Windows 10 (which skips a version number from the current Windows 8) could be a godsend to IT admins. With any new Microsoft OS, deployment usually involves a so-called “wipe-and-load” process that essentially removes the existing OS and adds the new version.

With Windows 10, Microsoft is using a new in-place upgrade that retains user settings like desktop resolution or color scheme, but still fits within the management infrastructure for deploying the new release. It’s known as dynamic imaging and, with a new laptop or other device, it means IT can configure even brand-new devices without having to first do a wipe-and-load to meet corporate requirements.

It’s also worth noting that Microsoft says Windows 10 will have the same basic hardware requirements of both Windows 7 and Windows 8, and that there will be better integration between Active Directory and Azure Active Directory. For example, if a user signs in to Windows 10, he or she will also automatically sign in to the Windows Store and to Office 365 in the cloud.

2. Interface Changes

Of course, one of the most important changes in Windows 10 has to do with the interface, which will combine the Metro-style tiles more directly into the desktop. Users will see a new Start menu displaying the tiles that filled the entire screen in Windows 8. This could mean less user training, as users are likely already comfortable with the Start menu from Windows 7.

3. Security Features

“The biggest way in which Microsoft has addressed the needs of business users is that Windows 10 will provide built-in data loss prevention, often referred to as DLP,” says Benjamin Caudill, founder and principal consultant at Rhino Security Labs  . “This means that sensitive documents can take care of themselves, so to speak. Once a file has been secured with Windows 10 DLP, it will ‘phone home’ before allowing anyone to open it. This means that even if an employee accidentally forwards sensitive documents, or if a thumb drive full of charts gets stolen, these files will not allow themselves to be opened.”

Goretsky adds, “Microsoft has basically declared passwords dead, so they are looking into other forms of two-factor authentication. Whether it be out-of-band with a cellphone text, biometric or picture mapping, we will see a non-password form of authentication.”

Goretsky says that other security improvements include more encryption throughout the entire OS, for both managed and unmanaged files. He says Microsoft will also sell a “locked-down” version of Windows 10 hardware, including laptops and tablets that only include software loaded from the Microsoft Store without the possibility to add additional software -- something a business might use to keep employees from loading software that could contain malware.


Why Soft Skills Are Key to a Successful IT Career



Why Soft Skills Are Key to a Successful IT Career


The most important IT career skills aren't necessarily technical. Communication, negotiation, team-building and conflict resolution are all critical to IT success, especially in leadership positions.

With IT sector unemployment at its lowest rate in seven years, it's a seller's market for professionals with technology skills. However, it takes more than just hard-core technical knowledge to get ahead in IT departments. While skills and hands-on technical experience are required for any IT professional, some of the most important contributors to a successful IT career have nothing to do with speeds and feeds or bytes and bits.

1) The Value of Soft Skills

Technology pros who also have the ability to communicate effectively, negotiate conflict, work well in teams and are adaptable to the ever-changing needs of a dynamic market are much more valuable to their organizations, especially at the managerial and executive level, says Matt Brosseau, director of Information Technology, Instant Alliance, a recruiting, staffing and consulting firm based in Chicago.

"I would argue that soft skills, like communication, empathy, teamwork and negotiation are almost more important than technical skills, especially in leadership or executive roles. Technologists who have these soft skills are better able to understand and accurately convey the business value of IT projects to other, non-technical stakeholders, get their buy-in and support and deliver more successful projects," Brosseau says.

2) Soft Skills Drive Engagement and Retention

There's a direct relationship between soft skills and workers' effectiveness, and greater effectiveness on the job translates to better overall business results, says Kevin King, founder and CEO of Transformation Point, a management consulting and assessment firm, in a recent webcast for Society of Human Resource Management (SHRM).

"A higher degree of soft-skills competency brings improved effectiveness and improved organizational results, and that in turn drives greater employee engagement and retention," says King, two top priorities for businesses today, according to the State of the American Workplace survey from Gallup.

"When people work more efficiently and effectively together, that means their organizations see better results and they're more likely to stay," King says.

3) Soft Skills Are Hard to Find

But even as engagement and retention become more important, the soft skills that can help increase those metrics become harder to find. SHRM's 2014 survey of economic conditions and recruiting skills gaps found that the 2,583 respondents cited critical thinking/problem-solving (40 percent), professionalism/work ethic (38 percent), leadership (34 percent) and written communications (27 percent) as the top four applied skills gaps.

Experts agree that technical skills can be taught much more easily than soft skills. If you have workers with great communication, negotiation and interpersonal skills, hold onto them. "You can have the best technology and processes in the world, but if your people aren't able to communicate about them, if they aren't effectively demonstrating teamwork, critical thinking and emotional intelligence, it doesn't help your business succeed," he says.




what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...