Showing posts with label Computer Advice. Show all posts
Showing posts with label Computer Advice. Show all posts

Wednesday, July 17, 2013

Yahoo: $5 Billion Share Buyback Program


Yahoo has released its  Q2 earnings, and a this have given everyone the answer they are waiting for — yes, Yahoo still has plenty of cash to pursue more acquisitions.  This all lies in the company’s share buyback program. “During the second quarter of 2013 Yahoo repurchased 25 million shares for $653 million,” here is the release for this.  Those are part of a bigger $5 billion program.  These shares can be reissued and sold for cold cash any day.

Last September 2012, Marissa Mayer decided to sell 40 percent of Yahoo’s stake in Alibaba for $7.6 billion.  $3.65 billion was put aside to reinvest in Yahoo shares, giving that the company has confidence in its own future.


“We are happy to announce that as of today we have essentially completed our commitment to return $3.65 billion from our Alibaba Group proceeds to shareholders, repurchasing a total of 190 million shares,” wrote CFO Ken Goldman in today’s earnings release.



Yahoo will be growing further and  further.  It has a $5 billion share buyback authorization with the SEC and it will be planning on using this authorization in full.  Reports of the disappearance of Yahoo’s cash after the $1.1 billion Tumblr acquisition have been greatly exaggerated.  Yahoo bought Tumblr for $1.1 billion in mostly cash in hopes that it will continue to grow and define it's image as a mega company with social influence.  Tumblr has 300 million monthly unique visitors and is expecting to have a growth in traffic of %20.

If you are not familiar with a stock buyback program, the stock can either be canceled or reissued at a later date.  If it is reissued it is a big win for the company because the existing shares are not over saturated and the new shares just keep the same stock number, just like it was before.

Yahoo if very confident that there is no better investment than its own stock.  Yahoo ever so slightly raises the price of existing shares as there are less outstanding shares.



Yahoo Shares


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:

With Its $5 Billion Share Buyback Program, Yahoo Still Has A Big Pile Of Cash For Acquisitions - TechCrunch
http://techcrunch.com/2013/07/16/with-its-5-billion-share-buyback-program-yahoo-still-has-a-big-pile-of-cash-for-acquisitions/

Yahoo! Reports Second Quarter 2013 Results - Yahoo
http://finance.yahoo.com/news/yahoo-reports-second-quarter-2013-200500159.html

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Friday, June 28, 2013

Apple: Don't make nuclear weapons using iTunes

Contract





What exactly are you agreeing to when you click the little check box in the License and Terms statement? Are there hidden terms, like agreeing to not design or reproduce nuclear weapons with the help of the software you are using with Apple?


Warning


The warning in the End User License Agreement is protecting software makers against mass installation and distribution of their product. Most of us just scroll down to the bottom of the page and check the box.   Wanting to get rid of all that mumble jumble so we can get on with our gaming, right?  Maybe all that verbiage should be read with a little more caution. This could be what you are agreeing to without even knowing it:

  •  The company reserving the right to install spyware on your computer.

  •  The company reserving the right to change the agreement at any time...without your knowledge or consent.

  •  The right to publicly display and distribute content submitted from your computer.

  •  Giving up the right to sue.

Fake Flash Player 11 installer

These EULA's are not very user friendly.  How long would it take to read and understand an entire contract?  If I have a question about what's in the agreement is there a number I can call to get an answer right away or do I have to shoot someone an email or letter to get some answers?  I don't think the End User License Agreement is really meant for us to read...

The reason why I just scroll down and click agree is because I trust these companies.  Even if it's a new company or a product I've never used, when I see all the legal stuff I figure they have all their ducks in a row, so everything I just didn't read is most likely legit.

iTunes Paragraph G states:  ""You also agree that you will not use these products for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons."


;

Are you the Owner


In some EULAs, the companies state that although you purchased the product with money, it's still not yours. You haven't actually bought the goods/services/software; you are temporarily licensing it.


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

CNET
http://news.cnet.com/8301-17852_3-57591531-71/apple-dont-make-nuclear-weapons-using-itunes/
Published June 28, 2013

TotallyWP
http://totallywp.com/2013/06/28/apple-dont-make-nuclear-weapons-using-itunes/
Published June 28, 2013

InputOutput
http://h30565.www3.hp.com/t5/Feature-Articles/5-Most-Ridiculous-EULA-Clauses/ba-p/657
Published Jan. 11, 2011

Image courtesy of [adamr] / FreeDigitalPhotos.net

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+

Wednesday, June 19, 2013

Sony PS4 Remote Play

Remote Play with the PS4 and PSP Vita


PSP Remote Play



At the reveal event for the new Sony PS4, it was mentioned a few times that the new update to Sony’s gaming console the PlayStation may be able to interact with its equivalent handheld device, the PSP Vita. The newest IP, Knack, was used by Mark Cerny, a famous video game industry figure, as a demo piece to show how the device need not be connected only to your television set. Remote Play is an option that has been available in many previous versions of the PlayStation, but had not been supported well. You may now experience a new generation of gaming where you have the option of gaming on your console while you are connected to the internet.


What’s Good and What’s Not


Live streaming theoretically allows you to use your handheld PSP while you are on the move, and yet be connected to your console at home. This is similar to the way Microsoft’s Nintendo Wii U’s new gamepad controller works. Sony is trying to bring forth this feature, as it is under-used today, and is trying to propagate the usage of this option in gaming consoles worldwide, not only restricted to their own appliances. If everything goes as expected, Remote Play could become a feasible option and may even go to become standard for any new releases related to gaming consoles or other hardware devices. The only place this option is not feasible, however, is the fact that some titles require the camera of the PS4 for the entire experience.


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:

PS4 Gaming Requires Remote Play Compatibility
Published June 1st, 2013 - http://www.bit-tech.net/news/gaming/2013/06/01/ps4-games-require-vita-remote-play-compatib/1



PS4 Games Require Vita Remote Play
Published May 30th, 2013 - http://metro.co.uk/2013/05/30/ps-vita-remote-play-mandatory-for-all-ps4-games-3820266/



Sony Mandates Vita Remote Play
Published May 29th, 2013 - http://www.eurogamer.net/articles/digitalfoundry-sony-mandates-vita-remote-play-for-ps4-games



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Wednesday, June 12, 2013

Malware on the Rise

Microsoft is clearly the industry leader in terms of operating system and it still has a firm hold over that position. In recent times, the company has had a quiet time in terms of security risks, especiallyBackdoor Malware after the introduction of  Windows 8. However, a new type of malware is being distributed for the Windows OS through German spam that affects the boot record of the infected computer. Also, this malware can also give the hacker control of the infected computer.

Distributed Via Attachment


Trend Micro was the company that was responsible for the detection of this new type of malware. The researchers who analyzed this malware said that it was attached to the German spam mail, and is code named BKDR_MATSNU.MCB. The mail will claim that the recipient has to pay some money to the sender, and all the relevant details have been attached to the mail. Trend micro researchers claimed that this method is very effective in influencing the recipients to open the attachment.



Ransomware Reaction


Once the malware is downloaded and installed on the victim’s computer, the data is collected and sent to the hacker who planted the malware. Once that is done, the malware is capable of erasing the boot record on the drive, erasing data, and also locks the screen of the computer. The victim is then asked to pay a certain sum of money if the screen has to be unlocked, the classic ransomware approach.

 

Links:

German Ransomware Threatens Victims, Disables PCs | Security ...

www.technewsdaily.com/18282-german-ransomware-disables-computers...

6 days ago – If you become a victim of the BKDR_MATSNU.MCB ransomware, getting it off of your system may not be as simple as running a virus scan.

 

Compromised Japanese Sites Lead to ... - Threat Watch

www.trendmicro.eu/smartphone/content.php?m=TrendLabs...i...

Jun 5, 2013 – Like any backdoor, BKDR_MATSNU.MCB performs certain malicious commands, which include gathering machine-related information and ...

 

Backdoor.AndroidOS.Obad.a, an Advanced Android Malware Threatens Users

http://thedroidguy.com/2013/06/backdoor-androidos-obad-a-an-advanced-android-malware-threatens-users/

Jun 8, 2013 - A known computer security company revealed that there is an advanced Android malware..

 

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

 

Wednesday, May 29, 2013

Most Mobile Malware Target's Android Devices

According to the NQ report, one type of malware is delivered through app repackaging in which a user downloads a mobile application that looks legitimate but is actually a harmful program.

Malware can also be downloaded through fake websites when a user clicks on a URL that appears authentic but is not.

Mobile users can also be duped through so-called "smishing" -- a combination of the words SMS and phishing -- where a user receives a text message asking for personal information like a credit card number, e-mail address or social security number.

Android's malware not limited to bad apps


Apple IOS

Stels, an Android trojan delivered via fake U.S. Internal Revenue Service-themed emails, uses "an Android crimeware kit to steal sensitive information from the device," and also makes calls to premium numbers. Sullivan said the new threat “could be a game changer.”

Users on any mobile platform, including iOS, can be targeted with spam that directs them to malware websites. However, while previous exploits have been demonstrated to allow a visited website to crack the security on iOS to "jailbreak" the device, Apple has been vigilant about patching these flaws and distributing iOS updates that scuttle the profitability of discovered threats, effectively frustrating the malware business on iOS.



Here’s Symantec’s breakdown of the types of mobile threat it identified last year, with information theft being the most common threat. Add in user tracking and more than fifty per cent of the mobile malware identified was trying to steal user info or track their movements:

Mobile Threats

Check your phone: Nations with the most mobile malware - CNN.com
edition.cnn.com/2013/04/16/.../world-most-mobile-infected-countries
Apr 19, 2013 – Security threats from mobile malware are on the rise and nearly 95% ... Android devices were targeted by malware in 2012; Mobile devices in ...

Mobile malware jumped 163 percent in 2012, mostly on Android
www.techradar.com › ... › Mobile phones
by Matt Swider - in 89 Google+ circles
Apr 16, 2013 – Another reason Android continues to be the most malware-targeted mobile OS is that it's more popular in pirate-heavy countries like China, ......

Android Remains Main Target For Mobile Malware Writers Despite
techcrunch.com/2013/04/16/symantec-mobile-malware/
by Natasha Lomas - in 770 Google+ circles
Apr 16, 2013 – Mobile malware remains a small and nascent issue, especially when ... In fact, while Apple's iOS had the most documented vulnerabilities in 2012, ... But clearly the vast majority of Android malware lands on devices via the ......

Mobile malware exploding, but only for Android - AppleInsider
appleinsider.com/.../mobile-malware-exploding-but-only-for-android
May 14, 2013 – Malware targeting mobile devices is rapidly growing in both the number of ... but the only platform being actively targeted is Google's Android, which ... an exploit and chose to address it with a patch, most Android users would ...

Mobile Malware grows massively, Android targeted most » Phone
www.phonesreview.co.uk/.../mobile-malware-grows-massively-android-t...
Apr 15, 2013 – There will be many of us that have some kind of security software installed onto our computers especially if its running Windows, but this is not ...

Thursday, May 23, 2013

Malware Threat to ATMs

ATM-Malware-Takes-Off-2

Malware has been a big threat to computers and there have been a lot of problems caused by this type of malicious software. As if that was not enough, a forensics and security threat firm has announced a threat that malware can be used to target ATMs. Group-IB, the firm that announced these findings, said that malware can be used to collect data from the ATMs or swiping machines, and hack into the bank accounts. According to the study, the malware stores the data and sends it to the hacker who planted the malware whenever a network connection is available for transmission.

A Few Researchers Disagree


While Group-IB discussed their findings, the Director of Research at the University of Alabama, Gary Warner, said that malware cannot be used in the way Group-IB is announcing. He said that ATM networks are secured at multiple levels and something as simple as malware cannot get through the layers of encryption and firewalls. Typically, malware tries to exploit the weaknesses in the security that protects a system.

Bank Networks Vulnerable from Inside


Warner added that banks don’t have to worry about the attacks from the outside. He said that banks should worry more about someone from the inside planting malicious software into the bank networks as that is where the vulnerability is at its highest. He said that an auto load malware can be inserted as easily as plugging in a USB drive into the computer.The jury is still out on whether malware can affect banks from the outside or not, but the question is how severe the repercussions will be in case malware does attack a bank network.

[via Bank Info Security]

Tuesday, October 16, 2012

What to Do When Your Twitter Account Has Been Compromised

Twitter bird is dead. Let’s say you’ve fallen for one of the many phishing scams that tend to circulate on Twitter and now followers are sending you messages asking why you’re tweeting about diet pills and sending them DM’s about how other people are spreading nasty rumors about them.

How do you stop the phantom tweets and get things back to normal?

  1. Change your Twitter account password ASAP. You can do this by clicking the little gear icon and selecting ‘Settings’. You will see the ‘Password’ option in the left-hand navigation menu. Enter your old password, create a new one (make sure it’s a strong one with upper/lowercase characters, numbers & symbols) and press ‘Save changes.’

  2. Review Apps that have access to your Twitter account. Assuming that you’ve just finished changing your password and you haven’t left the page, you can see the Apps connected to your Twitter account by clicking the ‘Apps’ link in the left-hand navigation. Carefully look over the listed Apps and hit the “Revoke access” button for any App that seems questionable.

  3. Check your browser for malicious plug-ins and/or extensions. Given that there have been sightings of rogue browser plugins capable of posting spam on Facebook walls it’s not all that farfetched to believe the same can be done with Twitter. Therefore, it may be worth your while to double-check that no malicious plugins/extensions have been installed on your browser.

  4. Scan your computer for malware. It’s a possibility that your Twitter account was compromised thanks to your computer being infected by a piece of malware prone to stealing login credentials. You know, like the Dorkbot worm that’s actively being spread via Skype? As they say, it’s better to be safe than sorry, so go ahead and do a full system scan with your antivirus program.

  5. Delete the garbage tweets. After you’ve taken the necessary steps to protect your own Twitter account, help out your fellow Twitter users by deleting any spam updates posted by the scammer/bot and post a warning to your followers about what transpired.


Try to be more careful in the future! And yes, that means no clicking suspicious links (at least not without investigating them first) or entering your Twitter login right after clicking a link.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Tuesday, September 25, 2012

Safety in the Home: Safeguarding your Child's Internet Searches

Young Child Supervised While Using PCDespite our grandest efforts, there is no way we can fully protect our children from every negative, harmful thing out there on the Internet.

I have tried time and time again to integrate secure-search settings on my family's computer only to find they are either too restrictive or not restrictive enough. Even though I'm fully aware there are going to be times when my children will be exposed to things that aren't appropriate, that doesn't mean I've given up all my efforts to protect them on the Internet.

If you have a child who actively uses the Internet, here are three things you can do to make sure they are safely navigating the Internet.

Search with them


The first few times I let my children use the Internet, I made sure to stay with them the whole time. No, I wasn't just keeping an eye on them; I was also taking an opportunity to teach my children how to safely use the Internet. I wanted them to know about the dangers of Internet searches, sexual predators, and Internet downloads.

At first, they voiced their frustrations about my needing to be there for each of their Internet sessions, but they eventually started appreciating my Internet-safety lessons. Nowadays, I let my children handle their own Internet searches because I trust they've learned a great deal from all that I taught them in those first few Internet sessions.

Track their Internet searches


There are a number of programs you can invest in to make sure you're children aren't engaging in unsafe Internet searches.I've heard a number of friends recommend McGruff's Safeguard, but I haven't personally used it. Most of the time, I'll just check the most recent search history on my computer, since my children aren't aware of how to clear the history.

If you're worried your children might engage in unsafe Internet searches, however, go ahead install a program on your computer to keep tabs on your children's searches. Not only will this calm your nerves, it will also be a way for you to calmly confront your children without them being able to deny any evidence.

Activate the right safety controls


I'm not the biggest fan of safety controls. Not only do they hinder successful Internet searches, but sometimes they overextend themselves. Although these settings have the best intentions at heart, they walk a fine line between being helpful and just plain annoying.

If you're absolutely set on using safety settings, however, the best way to find the right safety controls is to test drive various settings. Should you activate a setting that prevents your children from visiting basic, necessary websites, lessen up the grip a little more. Just keep playing with the settings until you find the right fit for you and your children.

If you haven't already, always keep an eye on what your children are looking for on the Web. See how these three tips can help you in your endeavors.

This guest post is compliments of Silvia Brooks, a busy mother who keeps a watchful eye over her children. She contributes to HomeSecurity.org and is passionate about empowering families to take control of their safety by investing in quality home security technology. You can reach out to Silvia by leaving a comment.

Thursday, July 26, 2012

Accidentally Minimize the Ribbon in Microsoft Office? Here’s How to Restore It

Microsoft Office 2010I’m not exactly sure how I managed to do it, but at some point the preference to ‘Minimize the Ribbon’ in Microsoft Office 2010 became enabled.

Having the Ribbon jump to-and-from view whenever I moved my mouse to the top of the Office window was driving me downright crazy, so I had to change the setting back.

Should this happen to you, here’s how you can get the Ribbon to remain visible without having to hover near the top of your Office 2010 window:

Method 1:

  1. Press Ctrl + F1


Method 2:


  1. Hover your mouse at the top of Office to trigger the Ribbon to show and right-click.

  2. Click on the ‘Minimize the Ribbon’ option.


There you have it, folks. Enjoy a visible Ribbon once more!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.

Thursday, February 16, 2012

Are you a part of the Web of Trust (WOT)?

Web of TrustI like the Web of Trust browser plug-in.

Now, whether that admiration really stems from the colorful circles used to indicate a site’s reputation rating or the fact that it helps me steer clear of sites that may put a damper on my web browsing experience could prove to be a rather interesting debate.

However, I like to think that it’s a mixture of both.

For those of you who’ve never heard of it, the Web of Trust plug-in allows you to enjoy a safer and more pleasant internet experience by adding a reputation rating next to site links and search results.

Highly rated sites literally give you the green light with a green circle next to their links, while a yellow circle is displayed for “iffy” sites and red circles strive to stop you from visiting sites with a poor reputation. Websites with no rating are given a gray circle with a blue question mark.

Website reputation ratings are based off the feedback of millions of web users that have shared their personal experience – good or bad – on countless sites they’ve visited.

Such information can come in handy when you’re debating whether or not you want to make a purchase from an unknown vendor or even visit a site that you’re not feeling so sure about.

If you happen to click on a poorly rated site link, you will be presented with a warning message that provides the option to escape, view comments left by other users regarding their experience, or to take a chance and proceed anyway.

Web of Trust plays well with all of the popular browsers – Chrome, Firefox, Internet Explorer, Safari, & Opera – and can be downloaded for free from the MyWOT.com website.

If you haven’t done so already, I’d say give the WOT browser plug-in a shot. Feel free to share your thoughts on it in the comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Friday, December 16, 2011

PC Slow on Startup? Check What Programs Start When Windows Starts

Windows Start ScreenDoes your PC seem to be dragging its feet on startup?

If so, it may be time to take a peek at what programs are set to run when Windows starts up and disable the unnecessary junk.

Often times we tend to blow through the installation process and inadvertently allow programs to run on startup by completely missing the opportunity to uncheck the “Start program when Windows starts” box.

Then again, some programs tend to help themselves by not presenting any start related options at all during installation and simply set a list of items to fire up once we power up our machines. (*cough* AdobeCreativeSuite*cough*)

Thankfully it’s not difficult to remove these privileges and you don’t have to rummage through the preferences for each and every single piece of software on your computer in order to do it.

All you need to do is launch Windows System Configuration Utility (msconfig.exe).

Disable Unnecessary Programs in Windows Startup


To access the Windows System Configuration Utility (in Windows 7), do the following:

  1. Click the Start Menu orb.

  2. In the ‘Search programs and files’ box, type msconfig and select the ‘msconfig.exe’ option.

  3. Click the ‘Startup’ tab in the System Configuration window that pops up.


MSConfig Window

In the ‘Startup’ tab, you will see a list of applications that are currently set to start when Windows loads.

You can disable programs from launching at start-up by unchecking the checkbox next to the appropriate application.  Just be sure that you don’t disable any antivirus or firewall applications, otherwise your PC will be vulnerable to attack.

When you’re done making changes, hit ‘OK’ and select whether or not you want to restart now or manually restart later. The changes made will take effect the next time you restart your PC.

Don’t forget to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest tech news & PC security threats.

Photo Credit: acidpix