Always Providing You With Ongoing Information

Archive for the ‘Computers’ Category

New Revised Guidelines For Passwords

 

Snapshotcaramel13_001

We previously been told the following:

  • Make them complicated.
  • Use numbers, question marks and hash marks.
  • Change them regularly.
  • Use different passwords for each app and website. Now the National Institute of Standards and Technology is about to make all of our lives much easier. The organization recently revised its guidelines on creating passwords, and the new advice sharply diverges from previous rules.

 

 Longer passwords that are harder for hackers to break the longer the better. Previously, security experts recommended the use of password manager apps to ensure users’ accounts were protected. The apps are useful because they completely randomize the password, but he says they aren’t necessary to maintain security.

The new Thing In Mental Healthcare

Snapshotcaramel9_001

 

Dr Jeffrey Lieberman from Columbia University says” the new technologic innovation that is emerging and which does seem likely to impact psychiatry and mental health care in a time that is commensurate with the other specialties of medicine, is the technology that informs how we use Internet-based smartphone mobile app devices. The rudimentary ways in which this has already begun to permeate medicine and mental health care include electronic health records and telemedicine, which is ideally suited to psychiatry in terms of being able to provide consultation at a distance.“The initial idea is to have smartphone-based applications that can perform several functions. One is a monitoring function: having apps that can passively monitor the activities or biologic signals of an individual—whether it is movement, heart rate, respiratory rate, or level of activity—and have an ongoing record that can be catalogued, observed, and interpreted by clinicians. A second function is as a means of communication. Doctors already have begun to employ FaceTime, Skype, and texting to maintain contact with patients remotely in a variety of situations. Another area would be to develop apps that could provide some kind of actual therapeutic assistance, including cognitive-behavioral therapy, motivational interviewing, and supportive types of techniques or protocols when needed. All of these have great potential and can expand the reach of healthcare providers, psychiatrists, and mental health care clinicians, and provide help to a larger proportion of people when they need it.”

Spyware Apps That Sneaked Its Way Into Google Play & Spy On Users

Snapshotcaramel4_001

Soniac was one of the three apps found on Google Play, according to a blog post published Thursday by a researcher from mobile security firm Lookout. The app, which had from 1,000 to 5,000 downloads before Google removed it.  Soniac had the ability to record audio, take phones, make calls, send text messages, and retrieve logs, contacts, and information about Wi-Fi access points. Google ejected the app after Lookout reported it as malicious. Two other apps—one called Hulk Messenger and the other Troy Chat—were also available in Play but were later removed. It’s not clear if the developer withdrew the apps or if Google expelled them after discovering their spying capabilities.  The apps are all part of a malware family Lookout calls SonicSpy.

Once installed, SonicSpy apps remove their launcher icon to hide their presence and then establish a connection to the control server located on port 2222 of arshad93.ddns[.]net.

The researcher said SonicSpy has similarities to another malicious app family called SpyNote, which security firm Palo Alto Networks reported last year. The name of the developer account—iraqwebservice—and several traits found in the apps’ code suggest the developer is located in Iraq. Additionally, much of the domain infrastructure associated with SonicSpy has references to that country. The phrase “Iraqian Shield” appears constantly. Lookout is continuing to follow leads suggesting the developer is based in that part of the world.

eSports May Soon Be Included In 2024 Olympic Games

Snapshotcaramel5_001

Nothing is certain just yet, but discussions are a positive step forward for the recognition of esports at the Olympics.

Esports will be present at the Asian Games, the Olympic Council of Asia announced in April. An event recognized by the IOC, the Asian Games’ esports program will likely help push along the Paris Olympic bid committee with their discussions.

Team EnVyUs has secured a major investment from Hersh Family Investment and Interactive Group, according to an ESPN report.

The group is led by Kenneth Hersh, an executive in the oil and natural gas industry, and is based in Texas. The company reportedly offered EnVyUs a $35 million deal, which would make it one of the biggest acquisitions in the esports sector. EnVyUs is headquartered in Charlotte, North Carolina, but will relocate to Dallas to align with its reported Overwatch League slot, ESPN said.

HBO Hackers Leaked Executive’s Emails

Hackers who posted several of HBO’s new episodes and a “Game of Thrones” script online in late July have published a month’s worth of emails from the inbox of one of the entertainment company’s executives. The Hackers also addressed a video letter to HBO CEO Richard Plepler that demands the company demand payment of money, although the figure was redacted, according to the report. The hackers said HBO marked their 17th victim, and only three have failed to pay. HBO said its forensic review of the incident is ongoing and noted that it believed further leaks were forthcoming.

HBO private emails in the hands of hackers, came Monday in an email message to The Hollywood Reporter that also contained nine files with such labels as “Confidential” and “Script GOT7.” The hackers also delivered a video letter to HBO CEO Richard Plepler that says, “We successfully breached into your huge network. … HBO was one of our difficult targets to deal with but we succeeded (it took about 6 months).”

They say that the frequency of the attacks has overwhelmed the FBI’s Los Angeles field office, which has been unable to properly investigate all of them. The FBI’s surprising advice, according to industry sources: Pay the ransom.

FBI spokesperson in the L.A. office denied that the agency is telling companies to cough up the bitcoins in cases of ransomware. “The FBI does not encourage payment of ransom as it keeps the criminals in business,” says Laura Eimiller. “Of course, the individual victim must weigh their options.”

“The FBI will say it’s easier to pay it than it is to try to fight to get it back,” says Hemanshu Nigam, a former federal prosecutor of online crime in L.A. and onetime chief security officer for News Corp. “And if one company pays the ransom, the entire hacking community knows about it.”

 

 

Firefox Getting VR Support

paisley6_001

Firefox 55, is set to come out on August 8th complete with VR support. Firefox will be joining Google Chrome and Microsoft Edge, which also added web-based VR functionality this past year.

Web-based VR on Firefox will be available for all Windows users who have an HTC Vive or Oculus Rift headset. It’s  WebVR allows browsers to run virtual-reality experiences. It’s already available in Firefox Nightly, the pre-release version of Mozilla’s browser, and has very limited availability in Servo, a browser engine built by individual developers and sponsored by Mozilla.

They Say Not To Worry About Superhuman Babies But Fear Who Will Be Doing The Genetic Engineering

Sir Venki Ramakrishnan says risks and benefits of germline therapy, which is banned in Britain, should be debated

Sir Venki Ramakrishnan
Sir Venki Ramakrishnan, president of the Royal Society. Photograph: Andy Hall for the Observer

An international team of scientists, led by researchers at the Oregon Health and Science University, has used genetic engineering on human sperm and a pre-embryo. The group says is doing basic research to figure out if new forms of genetic engineering might be able to prevent or repair terrible hereditary diseases. Congress has banned federal funding for genetic engineering of sperm, eggs, pre-embryos or embryos. That means everything goes on in the private or philanthropic world here or overseas, without much guidance. It should be determined who should own the techniques for genetic engineering. Important patent fights are underway among the technology’s inventors. Which means lots of money. is at stake. And that means it is time to talk about who gets to own what and charge what. Finally, human genetic engineering needs to be monitored closely: all experiments registered, all data reported on a public database and all outcomes — good and bad — made available to all scientists and anyone else tracking this area of research. Secrecy is the worst enemy that human genetic engineering could possibly have. Today we need to focus on who will own genetic engineering technology, how we can oversee what is being done with it and how safe it needs to be before it is used to try to prevent or fix a disease. Plenty to worry about.

Tag Cloud

%d bloggers like this: