After EU court ruling Belgian users now have to log in to Facebook

Facebook users now have to log in to view the publicly available data on it's servers after the ruling by the European Court discussing the matter.

After privacy ruling, Facebook now requires Belgium users to log in to view pages - The Verge 

The ruling comes after the European Court observed in November that the company has undermined the privacy rules of the European Union which are more stringent than in the US.

 Facebook bows to Belgium privacy ruling over cookies

In the US, Facebook doesn't need the prior permission to place a tracking cookie in the User's system, but in European Union you now need to log in to view any Facebook pages, even for locally available business sites.

In October European Court invalidated 15 year-old agreement with the US companies validating the data transfer related to the information of EU residents to US.

Landmark EU ruling says US privacy protections inadequate - The Verge 

Facebook in response replied that it's cookie is only meant to prevent the network being used by Fake accounts, to prevent Hijacking and prevent online thefts. After the verdict Facebook said it will respond to the ruling.

This decision could affect 4500 U.S.companies that move and store, collected customer data in the US.


 Valleyz

Adobe renames Flash, Samsung's VR, iphone7 headphones : Tech Overview and News

 Adobe is changing the name of it's Flash professional to Animate CC, keeping in mind the interests of web developers using the tool to develop with open platforms like HTML5, tipped to be the web platform across all devices.  
  
Adobe isn't killing flash, just changing the name to - MacWorld

Adobe's new tools supports open web standards like CSS and Java Script also.

 Adobe's new tool supports open web standards like CSS, HTML5 and Java Script


Samsung Launches its new Web Browser for Gear VR available at Oculus store, supports voice commands, on screen keyboard, 360 degree video streaming and HTML5 for better performance. In the gaze mode a typical user won't even have to touch the screen. Samsung says it is an important step in consumerization of VR(Virtual Reality).

Samsung Launches new web browser for Gear VR

Apple iPhone7 is tipped to use new smart headphones which will Synchronize with Apps and automatically adjust volume. Also Apple is rumored to get rid of headphone jack to lightning ports, which industry experts are divided on whether or not Apple is going to get on with that idea.

iPhone7:What will the Smarphones new headphone's do? - The Week


For Further Reading:

Youtube Red topping charts, Swatch's new Swipe Watch due in 2016 and Vtech hack details - Tech Overview 




 Valleyz

Youtube Red topping charts, Swatch's new Swipe Watch due in 2016 and Vtech hack details - Tech Overview

Youtube Red, You tube's new ambitious strategy to rope in new customers for ad-free service since it's launch in October 2015, is reportedly gaining traction as the featured app showed up among the Top Grossing charts.

 Youtube is now offering the same percentage of ad-revenue share of 55% with the new service without any other options for the creators, but only sign it or leave offer. That has led to ESPN's departure from the service, where Youtube has reportedly pulled down the prime broadcasters major chunk of video's off the network. Detailed story and more at TechCrunch

Youtube Enter's The App Stores Top Grossing Charts, Thanks to Youtube Red - TechCrunch

Switzerland based watch maker is introducing Swatch Swipe watch, which will let you pay through a swipe with your wrist using a NFC(chip). For more interesting features of the watch please go to 
Cnet website below.

Swatch will let you pay with your wrist - Cnet

V Tech hack proves costly, as the company details out the damage caused by the hack. Read further about the story at Mashable.

The story was  first reported by Lorenzo Franceschi Bisceshi - Bichhierai of Motherboard . Detailed analysis of the hack done by  Microsoft Developer Troy Hunt .

For Further Reading: 

Adobe renames Flash, Samsung's VR, iPhone7 headphones : Tech Overview and News

Valleyz

Windows 10, iPhone7 rumor, Amazon's unlimited online storage and Pirate bay - Tech Overview and news

 Here are some snippets of the latest and important Tech updates and news for you.

1. Windows has released new version of it's operating system that is Windows 10 in July 2015.

  • Windows 7, 8, 8.1 Users will be able to freely upgrade to the newer version up to one year and thereafter will be charged approximately 100 pounds. 
  • Android and iOS apps will be able function with the new OS.
  • Comes with a new web browser Windows Edge

 2. According to Japanese Tech site macotara the iphone7 is going to ditch the headphone jack to slim down its latest model by a full millimeter.

Also it will feature
  • Lightning based ear pods
  • Support third party Blueetooth and
  • Lightning based headphones 
For further reading

Rumor suggests the iphone7 will ditch the headphone-jack - Macworld

3. Amazon's unlimited online storage comes with riders. Read the terms of use and full story at.

Is Amazon's online storage really unlimited read the fine print ?

4. A Swedish court has ruled that local ISP Bredbandsbolaget is not responsible to enforce blocking of Pirate Bay
Valleyz

What is Spyware? How to protect your Mobile/PC from it?

A Software program designed in such a way to extricate information from a device Mobile/PC or communication/electronic device including identity details, financial transactions, property certificates, bank information, credit card information, other personal communications etc.,

 Intrusion into a system through a software program is one of the ways to do it. Often spyware is loaded on to a computer in the form of a legitimate PC game or a Browser Tool bar etc etc.,. Then it logs your activity, the sites you visit, the communications you make and transfers data remotely without the user even knowing about it on a regular basis, unless it scanned and removed from the system regularly.

Often the cookies that you receive from the sites you visit they record and trace your browsing info, but when you store those cookies continuously, they will continue to know about even after several months that you have visited their site. The companies use such information to target customers when they are browsing the Internet. And ads that Pop up in your browsers reflect that reality. Those are Adware.

Always have an Anti-Virus and Spyware protection on hand. Run the spyware scan and remove any unwanted program on your computer. Buy your Spyware Protection and Anti-Virus from a reputed brand.

There is no fool proof security, some or other way a User clicks on unwanted Pop-up. Sometimes visit a website while browsing and malware catches it. It's always useful to close Pop-Ups by clicking the X sign instead of cancel.

Don't click on suspicious links on Twitter, Facebook, MySpace etc.,

Three basic steps for Android Users :
1. Do not leave 'unknown sources enabled'
2.Avoid third party apps i.e., use only apps from Google Play store.
3. Read App Permissions carefully.

For Apple Users :
 It is a Unix based operating system it is less susceptible to attacks.

  1. Apple has built in Anti-Malware X protect officially known as File Quarantine, snow leopard, Apple OS X
  2.  Do Not Install Norton Anti-Virus on a Mac machine. Not compatible and it will seriously damage your device
  3. Number of fake security products don't install them.
  4. Block Pop-ups
  5. Avoid suspected websites
  6. Avoid Peer to Peer communications.
  7. Consider using Mac OS X built in firewalls.
  8. Use an Anti Virus Program like ClamXav.
Further reading :

What is malware? How to protect your PC/Mobile from it? 

What is Computer Virus? How to protect your Mobile/PC from it? 
 
  Valleyz

What is Malware? How to protect your Mobile/PC from it?

Malware is an abbreviated term for various types of malicious piece of software like Viruses, worms, Trojans, RansomWare, SpyWare, Adware, ScareWare etc., causing your mobile/PC to malfunction.

If your computer/Mobile holds crucial data and a virus attacks it, then it could cause temporary or permanent damage to your hard disk and operating system unless you take remedial measures.

Worms are standalone malicious code and does not attach itself to other files but perform same disruptions as a Virus does.

Trojans are hidden pieces of software that were shipped along with your hardware device from the assembly line itself. or Installed on to your PC through online software purchases or through other peripherals connecting your PC.

Install a reputed Anti-Malware software from vendors such as Symantec, Google Play Store, Samsung or Apple, Avast, Kaspersky for your PC/Mobile. or Download online from Original vendor and not any other third party source.

Do not click on unwanted ads of email links or suspicious looking Pop-Ups on your computer or Mobile.

Always make a habit to click the X on the top right corner of a Pop-up instead of the 'cancel' button.

If you are using a cable internet always log out off your account. Install reputed company firewalls to protect your computer from unwanted traffic.

Scan any attachable peripheral before downloading any files from it on to your PC/Mobile phone. Do not fill in financial details in online forms from suspicious links.

Keep your confidential information like Credit/Debit cards safe. Don't store it on your computer. Don't give out your info even somebody calling on the phone from the bank, because banks never ask such info on the phone.

Don't click on to unknown websites/Ads or email links etc.,

Don't get drawn away by lottery win e-mails or 'collect a gift that you have won' asking you to pay for processing fees or inviting you to a seminar abroad and asking for fees.


Don't click on suspicious links on Twitter, Facebook, MySpace etc.,

Three basic steps for Android Users :
1. Do not leave 'unknown sources enabled'
2.Avoid third party apps i.e., use only apps from Google Play store.
3. Read App Permissions carefully.

For Apple Users :
 It is a Unix based operating system it is less susceptible to attacks.

  1. Apple has built in Anti-Malware X protect officially known as File Quarantine, snow leopard, Apple OS X
  2.  Do Not Install Norton Anti-Virus on a Mac machine. Not compatible and it will seriously damage your device
  3. Number of fake security products don't install them.
  4. Block Pop-ups
  5. Avoid suspected websites
  6. Avoid Peer to Peer communications.
  7. Consider using Mac OS X built in firewalls.
  8. Use an Anti Virus Program like ClamXav.
What is Spyware? How to Protect your Mobile/PC from it?

What is Computer Virus? How to Protecct your Mobile/PC from it?

 Valleyz

What is a Computer Virus? How to protect your Mobile/PC from it?


A Computer Virus is a malicious software code that is designed to spread from one system to another by attaching itself to a system file of an attacked computer system or Mobile rendering it to malfunction or rendering it's Operating system corrupt.

For example:- An infected Universal Serial Bus (USB) or Pen drive can infect the computer or the Mobile Phone. It not only infects but multiplies itself in to many copies and transfers itself to other computers on the network.

In order to prevent a Computer Virus to attack your system, it is highly recommended that a User should install an Anti-Virus software from a reputed vendor like Symantec/Norton, Kaspersky, Avast, Google Play store, Apple or Samsung etc.,

If you do not have an Anti-Virus installed on your PC or Mobile and your computer is already attacked by the Virus then try to install the new Anti-Virus software downloaded online or purchased through original vendor in the form of a CD/DVD. If the system has totally collapsed. Then it is bad news as all your data on Mobile phone or the PC will be lost.

So it is highly essential to scan a USB, CD or any other devices attached to your system/Mobile to be scanned first to check any hidden Virus.

Viruses could be downloaded on to your system through  Internet also. In order to protect your PC or Mobile Phone from online attack, avoid clicking on to suspicious links in e-mails or websites offering murky deals. Install a firewall to block unwanted and suspicious traffic entering your computer.

Outdated Operating systems should be removed from your system  and latest OS should be installed for your Anti-Virus Program to function properly and protect your PC or Mobile phone.

Always download your Anti-Virus software from original vendor online. Also download other essential utilities such as Adobe flash player from the Adobe site itself by visiting the site.

Also another grey is peer-to-peer or P2P networking, where online users use bit-torrent technologies such as now defunct Lime-wire to share movies, games, software, and other pirated data. There lies a potential threat of Trojans (hidden malicious codes) presenting itself as a genuine file getting downloaded on to your system.

Android phones are reportedly leaking data worldwide,  don't leave 'unknown sources enabled', avoid illegitimate apps i.e., outside of Google Play Store.

Downloading files on a Mobile is very much similar to a PC, always see what permissions you are allowing newly installed software/App access to on your device, that is the crucial thing to stop your device being manipulated. If you suspect anything suspicious twice check the credentials of the software again online before continuing with the installation.

Often clean your devices of temporary files, free up disk space, keep your installed programs regularly updated through visiting original vendor sites. Never let your personal device in a public space unattended or hand over it for even a few moments.

Always lock up your PC/Mobile through a Pin/Password or Pattern or Voice or Facial recognition lock, don't modify i.e., jailbreaking.

Wireless security is another area where users have to be cautious connecting to an unsecured network, where any one can log in and install a virus. Use a secure Wireless connection only. Bluetooth devices have potential security problems, like Bluetooth Holes and Bluetooth Bonding, often scan your Bluetooth devices for viruses.

Don't click on suspicious links on Twitter, Facebook, MySpace etc.,

Three basic steps for Android Users :
1. Do not leave 'unknown sources enabled'
2.Avoid third party apps i.e., use only apps from Google Play store.
3. Read App Permissions carefully.

For Apple Users :
 it is a Unix based operating system it is less susceptible to attacks.

  1. Apple has built in Anti-Malware X protect officially known as File Quarantine, snow leopard, Apple OS X
  2.  Do Not Install Norton Anti-Virus on a Mac machine. Not compatible and it will seriously damage your device
  3. Number of fake security products don't install them.
  4. Block Pop-ups
  5. Avoid suspected websites
  6. Avoid Peer to Peer communications.
  7. Use an Anti Virus Program like ClamXav
  8. Consider using Mac OS X built in firewalls. 
What is Malware? How to Protect your Mobile/PC from it?

What is Spyware? How to Protect your Mobile/PC from it?
Valleyz

Internet Security and Privacy at stake

Ever since the news broke out about the wide spread surveillance programmes through monitoring and interception of communications of individuals and organizations alike, the confidence of an average internet user is fast eroding in the security policies of the internet which seemed fool proof at least in terms of high end communications, such as ATM transactions and private communication networks.

But detailed media reports in the recent times showing how monitoring agencies carried out the surveillance, left many users high and sundry. Private organizations have alleged secret surveillance of their businesses and black listing them out for continued surveillance can sum up the seriousness of the issue. The data about how an organization is going to conduct their business in the near future can practically be damaging to the interests of a private business.

In other instances individuals are reported to have been fooled into believing that they are communicating or logging into servers of giants like Google is quite alarming. There are allegations in the media about surveillance agencies carrying out Man in the Middle (MITM) attacks thereby intercepting and routing the user generated traffic to servers belonging to surveillance networks without the user not knowing is quite alarming.

Industry experts are already pointing towards the damage these findings are causing to the internet industry world wide. The biggest names in the internet industry like Yahoo, Google, Microsoft and others are tight lipped and have confirmed of giving out data belonging to consumers to surveillance agencies when there are specific requests from the government. What this corresponds to is whether anybody has committed a crime or not you are going to be monitored. Even the banking transactions over secure tunnels of ATM network is not out of the purview of surveillance, which means any body using any thing on the internet is under constant surveillance. Whether they write emails, conduct monetary transaction, shop online or even read any material, someone out there is watching you.

Though the technology is highly enabling but constant and relentless requests by the governments can scare away even legal and law abiding entities who want their business transactions and other lawful business plans coming into the domain of intelligentsia could spell the doom for the industry.

Nobody any longer would want to believe the technology that used to rely on is secure and cannot be deciphered and analyzed for any length of time. The world has come to know bitterly that internet is not secure no matter what the encryption standards are no matter how private a network is, no matter what the industry has to offer.

Decades of innovation, research and design has come under intense scrutiny that has given rise to plethora of questions, whether the internet is going to be a secure, fast, reliable, anywhere, anytime communication technology is going to be seen in the near future.

An ISP can track you, a hacker could break into your network, a surveillance network can intercept your online data, cyber criminals looting your private data from public entities such as hospitals, insurance companies, banks. How is it going to be any safer on the internet?

For Further Reading :

Discussing Internet Privacy issues 

Discussing Internet Privacy Issues

Now we will look at some of the web links related with Internet Privacy issues .

This paper by a suffolk University researcher Morris A. Singer  notes in particular the privacy issues involved in Social Networking sphere. You can take a look at it   

http://suffolkmedialaw.com/2010/05/20/how-privacy-limits-utility-using-facebook-as-a-case-study/

Below is an excerpt from that paper.

"On April 27, 2010, U.S. Sens. Al Franken, Charles Schumer, Michael Bennet, and Mark Begich wrote a letter to Facebook, urging the social networking company to change their privacy settings modifications from opt-out to opt-in. In a statement accompanying the letter, Sen. Schumer said:


Millions of New Yorkers use social networking sites like Facebook, Myspace, and Twitter every day with an expectation that their private information is shared only with those they choose to connect with . . . . [I]t’s vitally important that safeguards are in place that provide users with control over their personal information to ensure they don’t receive unwanted solicitations and other nuisances, and that they are not automatically gathered into online groups without their consent."


Science Daily had some of the reports below running  last year, discussing issues related with Privacy, How Facebook and other  Social Networking sites pose concerns for a user, where the user signs away his rights to the online entity.

You can read about the Science Daily  report discussing this particular issue.

 http://www.sciencedaily.com/releases/2009/10/091013162746.htm

Another Science daily  report discussing a research at Worcester Polytechnic Institute,  how practices of many social networking websites make available a User's browsing information with the tracking websites.

You can read this report

 http://www.sciencedaily.com/releases/2009/08/090824151307.htm

Recently there were many privacy issues reported in the media, when it was noted that Engineers at the web giant Google were detected to have copied or collected a huge volume of private data illegally, while surveying the streets in European cites, for the Google's Street View application.

Read related BBC story

 http://news.bbc.co.uk/2/hi/8684110.stm

Google has been since in damage control mode and  made clear that it has already purged or are on the way to purge complete data collected illegally, and then recently Google tightened up it's employee privacy policy when dealing with Customer data. Read related Yahoo report here.

There's no reason to doubt the steps taken by Google in this direction, but the concern will remain high with How much user data changed hands or the content duplicated. Though these issues are still unfolding, and it will take time till the user's swarming the Social sphere can comprehend about what exactly is been done with their virtual identity, that's increasingly revealing more and more information about a User. And a fact that it no longer gives a User an identity, which used to seem so anonymous online a couple of years ago.

You can take a look at the Privacy Policy of the facebook

 http://www.facebook.com/policy.php

You can  take a look about the latest privacy features introduced by facebook recently  

http://www.pcworld.com/article/194866/facebooks_new_features_and_your_privacy_what_you_need_to_know.html
 
How do you think that your Privacy might be affected online ?
Do you think it is OK for tracking websites to scan your data from Social Networking sites with which a User actually signs a Privacy and Terms contract ?
When did you felt that your Online Privacy has been violated ?
Are you satisfied with Privacy Policy of all the online majors in the Social Networking realm ?


For Further Reading :

Internet Security and Privacy at stake 

Browser Security Essentials for User Privacy Part 4

Continuing from the previous post, we will discuss now what are session cookies and persistent cookies and how to handle them.

Session Cookies are sometimes used in authentication in order to log-in a customer into a restricted area, like chat clients, e mail, bank accounts and other authentication based user access websites, to record your visit and amount of time spent at a website and give seamless access to all the web pages associated with that website. 

Session cookies are also time duration sensitive and record your activity when using a website, if there isn’t any activity for a stipulated period of time, some websites prompts to re enter the authentication credentials to prove that it is the original user who is using the account, since there are so many ways that an account can be compromised. Always remember to clear the cache and other personal details like search forms, address bars and history of the browser when using a public terminal and also do not forget to close off the browser before leaving. 

The closing of the browser terminates all the connections with communication ports through which the data traverses on the machine. This all information is stored in an Internet Protocol header (IP header) and other memory registers on your system. There are so many other ways to work with IP headers. So when the browser window is closed it terminates all those ports involved in communication at that particular moment of time. So when a new Browser is opened it has to initiate all the requests to establish a new connection with new set of values.This in many ways helps protect your privacy.

Communication technologies have converged fast, 4G networks are already deployed in many parts of the world particularly in some markets in Scandinavia, North America and South East Asia. More and more devices are hooking up, more technologies and gadgets are developing at a rapid pace, the more the security issues are involved with all the devices which we use for our daily communication needs, and it is highly advised to update your understanding and techniques of using these technologies, so that we do not fall victim to attacks and loose our precious data and time.

And now we will come to discuss Persistent cookies, these are the cookies which note a user's preferences and other needs like customer settings like language, mode and other user preferences while visiting a site and stores this information in the cookie to be placed onto your system. So when you make the next visit, it is easy for us to be offered services at a faster speed. But the problem with these set of cookies is same as ever, that it could be used to target you knowing your preferences, if a malicious user gains access to these cookies. So it will be up to you to clear the cookies when you visit a site. Or the level of trust you place with the site being visited.

So you need to focus on how to set privacy settings on your local browser, if you're using multiple browsers, you need to understand where you need to look for the privacy settings in different browsers. You need to understand how to clear cookies from your system, how often and when.

In the upcoming posts we will look into how other types of persistent cookies( which are almost impossible to remove), flash objects and scripts pose serious privacy issues for a user and how to deal with them.

The reason to take these issues seriously is, it is not all the time that a user can know in any way that his accounts are being used unscrupulously. Sometimes there is every chance that you will never know, how your personal accounts have been abused.