Sunday 26 June 2016

Πρόγραμμα Ανάκλησης και Αντικατάστασης Ασφαλείας Μπαταρίας Φορητού Υπολογιστή HP

Στις 14 Ιουνίου 2016, η HP ανακοίνωσε ένα παγκόσμιο πρόγραμμα οικειοθελούς ανάκλησης και αντικατάστασης ασφαλείας σε συνεργασία με διάφορες δημόσιες ρυθμιστικές υπηρεσίες για ορισμένες μπαταρίες φορητού ηλεκτρονικού υπολογιστή. Οι σχετικές μπαταρίες απεστάλησαν με συγκεκριμένους Φορητούς Υπολογιστές HP, Compaq, HP ProBook, HP ENVY, Compaq Presario και HP Pavilion που πωλήθηκαν παγκοσμίως από τον Μάρτιο του 2013 μέχρι τον Αύγουστο του 2015 ή/και που πωλήθηκαν ως εξαρτήματα ή ανταλλακτικά ή που παρασχέθηκαν ως αντικατάσταση των παλαιών μέσω του τμήματος Υποστήριξης. Για τις μπαταρίες αυτές υπάρχει το ενδεχόμενο υπερθέρμανσης, γεγονός που εκθέτει τους πελάτες σε κίνδυνο πυρκαγιάς και εγκαύματος.
Επειδή αυτές οι μπαταρίες θέτουν κίνδυνο πυρκαγιάς και εγκαύματος, είναι εξαιρετικά σημαντικό να ελεγχθεί εάν η μπαταρία σας ανήκει στις ελαττωματικές και να σταματήσετε τη χρήση των ελαττωματικών μπαταριών αμέσως. Οι πελάτες μπορούν να συνεχίσουν να χρησιμοποιούν τον φορητό υπολογιστή τους χωρίς τη μπαταρία συνδέοντας τον φορητό υπολογιστή στην παροχή ρεύματος.
Σημείωση: Δεν είναι ελαττωματικές όλες οι μπαταρίες σε όλους τους Φορητούς Υπολογιστές HP, Compaq, HP ProBook, HP ENVY, Compaq Presario και HP Pavilion.
Για περισσότερες πληροφορίες, διαβάστε εδώ
Για να ελέξετε τον υπολογιστή σας διαβάστε εδώ

Saturday 18 June 2016

FACEBOOK WILL TRACK WHAT PHYSICAL STORES YOU GO INTO

AND SHARE THE DATA WITH ADVERTISERS
Facebook is planning to track how many times a week you go to the grocery store, and every other store, and it will share that information with advertisers.
Using the location services on your phone, Facebook will keep a tally of who goes to what stores, and show the anonymized numbers to advertisers, as evidence that buying ads on Facebook is getting people to visit brick-and-mortar businesses.
It's a great thing for Facebook, which will now have excellent data to prove (or disprove) on a user-to-user basis what a store is getting for its advertising dollar. But it's a pretty frightening idea that a company will have information not unlike your credit card statement all from location services data.
Of course, turning off location services is fairly easy on most devices: something to think about.

Bluetooth 5.0 to Quadruple Range, Double Speed

The next generation of Bluetooth devices will have quadruple the range and double the speed of what is currently available thanks to Bluetooth 5.0, which was announced today by the Bluetooth Special Interest Group (SIG) and will be available to device manufacturers as early as this fall.

Instead of automatically requesting to pair with a device, Bluetooth 5.0 will be smart enough to analyze the type of connection required to transmit the information. Warehouse managers, for instance, will be able to pinpoint an item in their inventory just by walking through the stacks. Travelers will be able to find the nearest Starbucks in a foreign airport without a Wi-Fi or 4G connection.

More information can be found at PCMag.com

Microsoft Testing Tool to Wipe Windows 10 Bloatware

Microsoft announced a new tool that lets you start fresh with a clean installation of Windows.  Use this tool to install a clean copy of the most recent version of Windows, and remove apps that came pre-installed or that you installed on your PC. 

This tool is will only work on recent Windows 10 Insider Preview released builds (build 14342 or later) so far.

The tool will download to start installing Windows 10 automatically.
If you chose to Keep personal files only, and the build of Windows 10 currently installed is more recent than the build available through this tool, you will later be prompted to choose to keep Nothing, and can cancel if desired.
All steps are automated with buttons greyed out. You can close the tool to cancel the operation if needed.
You can reinstall your Windows Apps that are available in the Store using your Microsoft Account.

for more information visit Microsoft Community Forum

Wednesday 15 June 2016

Text scams: The messages that allow criminals to break into your iPhone, and how to spot them

Mobile phones are increasingly becoming the most important part of people’s work and social lives – which means they’re more and more vulnerable to attack

The next text message you receive could ruin your life.

Increasingly, SMS messages are being used as a way of duping people into giving up their online accounts, and out of their identities and their money.
Many of those messages arrive looking perfectly innocent, and even useful. But they could be incredibly dangerous – and so it’s important to make sure to know how to spot them.

One of the major problems with such scams is that it is now relatively easy to pretend to be someone else, over text. The technology that powers texts allows people to put custom names in when they send messages – allowing people to easily pretend to be Google, Apple or anybody else.

iCloud scams


One of the more recent scourges coming over SMS are iCloud scams. They aim to trick people into giving up the password that they use to get into their Apple account – and, once hackers are into that, then they can easily get your bank account details, your location, and more scary stuff besides.
Most of these notifications just work like traditional phishing scams, where cyber criminals pretend to be a company so that users send them details. But because they are done through the very personal but notoriously sketchy technology of SMS, they can be easy to spot.

It isn’t clear why there has been such a huge amount of these in recent months, but reports of them definitely do seem to be surging. The advice is the same as traditional phishing: responsible companies will never ask you to reply to a message with your personal details, or tell you to click on a dodgy link, so make sure that you always only give your information to official websites and be careful that you are.

Two-factor authentication

Another more new development is tricks that try and get around the two-factor authentication that many products now have built in – and which, for the most part, serves as a big problem for people breaking into your account. That's why it's also become such a security risk.

Two-factor authentication works by attaching a phone number to a person’s account. When they try to log-in, it will send a unique code to that phone number, and that has to be typed into the site. It’s built to foil people who steal passwords and then use them to get into accounts, because it requires physical access to the phone; and that’s why people are now trying to get around it with scams.

One highlighted this weekend shows a message that claims to be from Google and tells people that their account may have been hacked. If they want to have it shut down, it says, they need to reply to the message with the 6-digit verification code that they are about to receive.

Cloning of contactless cards device?


New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per Second



A criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that's capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim's card.
CC Buddies claim that their device, named Contactless Infusion X5, can copy up to 15 bank cards per second, something that may come in handy if a crook is going through a crowd at a concert or through a jammed subway car.
X5 targets RFID-enabled contactless debit cards
X5 is designed to copy data from the radio chip embedded in modern RFID contactless bank cards. This data is stored on X5's internal storage system, and thieves can connect the device to their PC using USB cables and transfer it using special software, also supplied by CC Buddies.
The device can collect data such as the card's number and expiration date. If the debit card's RFID chip stores information such as the card holder’s name, home address, and a mini statement, X5 can steal it as well.
When it copies credit card numbers, X5 encrypts the data. The software provided by CC Buddies will allow the crooks to decrypt and download the stolen information from their X5 device to a Windows (XP or higher) PC, and start creating fake debit cards using blank plastic cards.
X5 costs around $800 and comes with blank plastic cards
Crooks can get their hands on an X5 device for only 1.2 Bitcoin (~$825). CC Buddies says they ship devices via mail, and each buyer will receive the X5 device, a USB cable for charging and data transfers, and 20 blank cards.

Read more: http://news.softpedia.com/news/new-device-sold-on-the-dark-web-can-clone-up-to-15-contactless-cards-per-second-505200.shtml#ixzz4BfxAdZ00