Author: Brett Bogler

An end to memory hogging with Chrome 55!

chromeChrome 55 is set for release on December 6th of this year, and promises to reduce the usage of memory for major websites such as Reddit. YouTube and the Times. Sites like these will consume 50 percent less RAM than in the most current version of Chrome. This change will occur due to the reduction of background memory consumption. Currently Chrome pre-loads websites in the background, but does not release the memory used once loading is complete.

Using a memory visualization tool, programmers working on the V8 JavaScript project discovered that “the background parser would keep an entire zone alive long after the code was already compiled,” according to a blog post. “By immediately freeing the zone after compilation, we reduced the lifetime of zones significantly which resulted in reduced average and peak memory usage.”

A year ago Google announced that coders had began streamline processes to clean up Chrome’s background loading, and had changed Chrome to identify when a website was no longer busy, using that time to clean unused memory. A few months later Microsoft announced that the Edge browser was more power-efficient than Chrome.

Seems as if Chrome isn’t afraid of a challenge. Chrome 55 release date is December 6th.

 


 

If you would like to educate yourself in greater detail about the information presented in this blog post please visit: www.pcmag.com

iOS 10 – What happens if my iPhone 7/6 home button breaks??

iphone6-ios9-assistive-touch-menuThe iPhone 7 has changed the home button and like the headphone jack debacle, users are divided. Regardless of opinion if you have a iPhone 7 the home button has changed to a haptic engine known as the “Taptic Engine” which responds to touches with subtle vibrations, which actually simulates small movements although the home button itself does not move. The lack of moving parts is, in theory, less likely to break.

However, things do break occasionally. One user discovered what happens when the home button stops working with a home button notification reading, “Home Button May Need Service – In the meantime you can use the onscreen Home button below” as a temporary workaround. Yeah the home button still doesn’t work, but at least Apple is giving you another option for the time being.

Have a iPhone 6 with a broken home button? There’s a solution for you too, Enable Assistive Touch. Open Settings > General > Accessibility > Scroll down to Assistive touch and select it. Your screen should a white round button. This will serve as your onscreen home button. Tap the white round circle button, and home options will appear. You can move this button around your screen so that it is less in the way of your daily functions.

Regional Apple Support will also help you find out if the phone is under warranty, which will make the home button replacement free!


 

If you would like to educate yourself in more detail about the information presented in this blog post, please visit: www.howtosolve.com  www.mashable.com 

How can I recover deleted items in Outlook 2011?

recovering-deleted-files-1Easily! When you delete a message from your inbox, it is moved to a deleted folder. How often have you cleared this folder only to think, oh shoot, I needed that one email!! Not to worry, once this folder is cleared, the messages are removed from your inbox but remain potentially recoverable for 28 days.

Go to the Deleted Items folder and select the email you would like to recover. You can also select multiple emails at a time by holding down the ctrl button as you click. In the menu above, click the Move icon and select the folder that you would like to restore the email to, such as “Inbox“.

Another means to recover such emails is through the Outlook Web App, exchange.sussex.ac.uk/owa/ .

Login and right click on the Deleted Items folder and select Recover Deleted Items. This will open a list of recovered deleted items for you to choose from. Once you find the messages you would like to recover, click Recover and then select the folder you would like to move the recovered email to.

Voila!


If you would like to educate yourself in more detail about the information presented in this blog post please visit : http://www.sussex.ac.uk/its/help/faq?faqid=2277

 

Farewell Galaxy Note 7 – Samsung discontinues production

sammmm

Samsung has permanently discontinued production of the Galaxy Note 7, and my what a road it has been. From catching a Jeep on fire to halting a plane from take off, the Galaxy Note 7 explosions continued to cause worry among it’s users despite the first recall and replacement. Sales of the flagship phone were halted yesterday due to the replacement models still encountering the same explosive defect.

Samsung said that “taking our customer’s safety as our highest priority, [so] we have decided to halt sales and production of the Galaxy Note 7,” according to the Associated Press

Samsung knows the Note 7 is quickly turning into a money pit for the company and a serious hazard for users. The initial recall and replacement was estimated to cost Samsung nearly a billion dollars. Sadly, the Note 7 came very highly recommended and was predicted to sell over 20 million devices. Only 2.5 million were actually sold. In addition, the company’s shares fell eight percent today, swiping $17 billion from the company’s value.

If you own a Note 7 replacement, the verdict is out and the phone is still not safe. Power down and get yourself a refund.

RIP


If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.engadget.com

 

Is WiFi Assist Swallowing your Data?

wifi assist iphone apple If your iPhone software is up to date, meaning iOS 9 and the most recent iOS 10, then you have “WiFi Assist”. WiFi Assist is a feature that allows you to stay connected to the internet even when the WiFi connection is poor. Meaning that if a webpage is having trouble loading or your Instagram won’t refresh due to poor internet connection, the cellular data on your smartphone will step in to bridge the gap. When this feature is turned on you will see the cellular data icon in the status bar on your device. Apple’s website warns that because of the obvious (the feature is using cellular data here) you might use more cellular data than usual, but should only be a “small percentage higher than previous usage”. Despite what Apple recommends, I read a decent amount of hoopla from consumers outraged by the increase in data usage when their phone bill arrived at the end of the month.

I turned my WiFi Assist feature off, and I have noticed no difference in my performance. However, I have a strong WiFi connection both at my house and my office – hey I do work for an MSP after all :) !

I will be interested to see how it holds up in other environments. Regardless I can always turn the feature back on.

Want to turn off WiFi Assist and maybe save a little cash? Watch my video!

Settings > Cellular > Scroll alllllll the way down till the end of your apps > WiFi Assist toggle


If you would like to learn more about the information presented in this blog post please visit: https://support.apple.com

Snapchat is dropping the chat and adding Spectacles

snapchat

The company has been renamed Snap Inc. and is set to release video-recording sunglasses called Spectacles. Spectacles will contain a 115 degree-angle lens, allowing the wearer to record up to 30 seconds of video. If you are an avid Snapchat-er this will change the way you snap indefinitely. Taking the handheld out of the equation, Snap Spectacles allow for greater mobility, and hands free adventures.

You could say Snapchat is getting a head start on virtual reality with their Spectacles. Although a pair will set you back $129.99, I have a feeling this new release will be a sellout hit with the holiday season just around the corner. Smaller than a VR headset, and less expensive than a go pro alternative, and easier to use than with the app on a smartphone, what could be the drawback? From a personal standpoint, design could be seen as a complaint. Unless you like funky colors. The latest marketing advertisement for the glasses showcases the Spectacles in a vivid blue or bright yellow shade.

Although Snapchat daily users averages around 150 million while Facebook daily user count is somewhere around 1.13 billion, Snapchat is still trying to get in the ring with Facebook. Snapchat has gain immense popularity since its introduction a few years ago, and the increased user features and now Spectacles, will only provide the opportunity for more growth.

 


If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.mashable.com 

 

DDOS Attack: Mirai botnet hacks devices with default passwords

miraiWeak default usernames and passwords spawned the massive DDOS attack against internet connected cameras and DVRs. Most botnets use infected PCs to generate an attack. This botnet, Mirai, was of a different breed, specifically programmed to scan the internet searching for poorly secured products, and proceeding to try redundantly obvious and easily guessed passwords. When a poorly secured device was found the botnet attempted to log into the product with a login similar to “admin” and a password with some derivative of “12345”.

The botnet’s maker released the source code, which is programmed to try a list of over 60 password and username combinations. This list gained the botnet access to over 380,000 devices. Mirai also took down the website of security researcher Brian Krebs last month in a DDOS attack.

Unfortunately this could become a bigger problem, as devices connected to the internet, such as cameras and DVRs are not created with security in mind. Passwords are not required to be changed once installed, and on a hunch I can assume that most users are not using their strongest password for their DVR. Security researchers have noticed an upward trend in DDOS attacks, as botnets continue to attack poorly secured devices and infect the devices with malware.

Krebs went online and looked up default usernames and passwords and matched them to devices, creating a list of possibly susceptible devices to the Mirai botnet. Check it out and change your passwords.


If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.techconnect.com 

 

 

Do this and not that – Mobile Malware

mobile-malware1

The three best practices to avoid mobile malware is to use an official app store, resist temptation to jailbreak your device, and keep updates current. Apple and Google app stores remain the most vigilant about mobile malware concerns. Google uses Verify Apps that runs in the background of modern Android systems to scan for spyware, ransomware, and fraudulent apps. The company also checks mobile apps that are submitted to the Google Play Store. Less than one out of every 10,000 devices that only downloads from the Google Play Store has a program in the malicious category.

Jailbreaking your device undermines much of the already pre-installed security on the phone. In addition to this, the ability to restrict applications from accessing personal data on the phone as well as validate applications is disabled. Basically, if you jailbreak your device you better have a pretty good understanding of technology, because you just became the sole provider of security for that device.

This may be a surprise to most, but vulnerabilities actually do not increase the likelihood on malware on mobile devices. Symantec’s Internet Security Threat Report released Apple iOS had nearly 8 times as many vulnerabilities as Android in 2014, but near all malware for that year were targeted at Android devices.

The reliance and increased functionality of mobile devices leads developers to push out updates and bug fixes as fast as possible. Users should pay attention to this and keep their applications and software updates current. Android users often wait to update because of the lengthy process involved, but the benefits usually out whey this inconvenience, especially considering Android devices are most susceptible for malware.

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.pcworld.com 

Cisco PIX firewall and IOS software security vulnerabilities

security

Cisco has released reports that a high priority security hole in its IOS software could have allowed hackers access to memory contents, and therefore confidential information, from more than one product in their lineup.

Cisco has pinpointed cause of the vulnerability to  “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests.”

Network World 

IKEv1 is used in VPN applications such as LAN-to-LAN VPN, remote access VPN, Dynamic Multipoint VPN, and Group Doman of Interpretation. To address the vulnerability Cisco plans to release software updates and currently there is no workaround available.

The list of Cisco products is as follows:

  • Cisco IOS XR Software versions 4.3.x through 5.2.x.  are affected

  • Cisco IOS XR Software released 5.3.x and newer are not affected

  • PIX versions 6.x and prior are affected

  • PIX versions 7.0 and after are unaffected

Back in August Cisco was alerted to information posted on the internet that had been exploited from firewall products from multiple vendors. The potential for exploitation of Cisco PIX firewalls was considered, and Cisco began an investigation into reports of the “BENIGNCERTAIN” exploit.


If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.networkworld.com 

 

Teenage hacker grabs massive data from 800,000 open FTP servers

hacker

Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly a million open FTP servers needing no authentication for access. This scan revealed that not only is no authentication needed but that 4.32 percent of all FTP servers in the IPv4 space can be accessed by an anonymous user login with no password. Seriously!!

Shortly there after this report was released, reports surfaced that a young teen hacker by the name of “Fear” had gained access to and downloaded massive amounts of data from every state with a domain on .us, as well as some .gov domains. (In a report to Network World)

“I gained access to an FTP server that listed access to all the FTPs on .us domains, and those .us domains were hosted along with .gov, so I was able to access everything they hosted, such as public data, private data, source codes etc.,” Fear told DataBreaches.net. It was “very simple,” he said, “to gain access to the first box that listed all the .us domains and their FTP server logins.”

Network World

He later added to this claim, stating that the attack was a SQL injection (poorly coded web database that leaks information). Fear gained access to credit card information, social security numbers, email address, home addresses, phone numbers, and web-banking transactions. Fear claims there was no encryption to protect the data and that he could “read all of it in plain text form”

His message to those responsible for securing state and government FTP servers is: “5 char passwords won’t save your boxes.”

On Sunday, someone in Florida attempted to secure the data, taking down the FTP server before password-protecting it and bringing it back up, but Fear said, “Too bad they don’t know its backdoored LOL…. they legit suck at security.”

Network World

Security professions are questioning the reliability of the claim.

“We can’t state unequivocally that he did not hack something, but only because it’s impossible to prove something didn’t happen,” said Neustar Senior Vice President Rodney Joffee.

But as Fear states “It only takes 13 hours and 23 minutes and 12 seconds for somebody to finish gathering data on every US citizen,”

The Hill 


If you would like to learn more about the infomration presented in this blog post please visit: www.networkworld.com  www.thehill.com