Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 09/27/2016 in all areas

  1. 1 point
    Did you ever wonder if your Twitter account has been hacked and who had managed to gain access and when it happened? Twitter now lets you know this. After Google and Facebook, Twitter now lets you see all the devices—laptop, phone, tablet, and otherwise—logged into your Twitter account. Twitter has recently rolled out a new security feature for its users, dubbed Apps and Sessions, allowing you to know which apps and devices are accessing your Twitter account, along with the location of those devices. In order to find out current and all past logged in devices and locations where your Twitter account was accessed for the last couple months, follow these steps: Check Twitter Login Sessions On Smartphone: twitter account security login sessions •Open the Twitter app, and head on to your profile •Tap on 'Settings and privacy' section •Inside the section, select 'Account' •Once inside the option, tap on 'Apps and sessions' Check Twitter Login Sessions On Desktop Or Laptop: The process is almost the same using a desktop or laptop. •Open Twitter and tap on the photo icon on the top right corner where you find all the account settings. •Tap on 'Settings and privacy' section •Inside the section, scroll down to 'Apps and devices' Once you tap 'Apps and sessions' on mobile or 'Apps and devices' option on desktop, you will be shown a list of all devices active on your Twitter account in the last month, as well as location they're in, along with a list of third-party apps that have access to your Twitter account. Now, you can click on the devices to see more information, including the name of the device your Twitter account was accessed on, what browser it was used on, date and time, and the approximate location the device was used in. If you found any suspicious device that you never logged in, you can revoke back the access in just one click. This will close any open session, preventing people with your Twitter account access to log into your account again. However, you are highly recommended to change your password as well as recovery and 2-step verification settings, if you found such situation, as this will prevent people that may have your current password from signing back in.
  2. 1 point
    Common bacteria living on our skin has raised a red flag for scientists concerned with the rise of superbugs, as new research reveals the spread of a new type of drug-resistant infection around the globe. Some sub-strains of the bacteria have now outfoxed the last known antibiotics that may be able curtail it, raising the very real possibility that the infections it causes will essentially be untreatable. To say the emergence of drug-resistant bacteria is a global health concern would be putting it mildly. Superbugs that have evolved to resist our current crop of antibiotics threaten to return the world back into the "dark ages of medicine," according to one UK government report. That same report predicts that if action is not taken, superbugs could kill up to 10 million people a year by 2050. Many may be familiar with the human pathogen Staphylococcus aureus, more commonly referred to as staph, which itself has evolved to become resistant to methicillin. But it has a little known relative living in its shadows that is giving medical researchers fresh cause for concern. Staphylococcus epidermidis (S. epidermidis) lives on the skin of all humans and is actually the leading cause of hospital-acquired infections, though a manageable one with an antibiotic called vancomycin routinely deployed to treat it. In more difficult cases, vancomycin is combined with another antibiotic called rifampicin to put a patient on the road to recovery. But scientists are now calling for a rethink in how we treat S. epidermidis infections, in light of a peculiar case where a patient was admitted to hospital in 2012 for a simple procedure and remained there for months after contracting a highly resistant infection. Dr. Jean Lee from the University of Melbourne's Department of Microbiology, together with her consultant and PhD supervisor Professor Ben Howden, began to investigate whether this drug resistance was a one-off case, or something more disconcerting. Over the following six years, the team sequenced the entire genetic code of S. epidermidis and uncovered three lineages, comparing the mutations to similar cases from across the globe. Indeed, the same mutations giving the bugs their antibiotic resistance showed up in every one of the 10 countries examined by the scientists, across the UK, Europe and America. "Our findings demonstrate that three lineages of S. epidermidis that are resistant to all the standard antibiotics that would be normally be used for treatment have spread internationally," Lee explains to New Atlas. "In Europe, a few of the isolates have also gained additional antibiotic resistance to the two 'last-ditch' antibiotics that are tried when all the usual options have failed. Infections with these strains are potentially untreatable." Those last-ditch antibiotics Lee refers to are not standard treatments but "salvage drugs" with limited clinical evidence available as to their efficacy. Lee says there are a handful of reports of bacteria exhibiting extreme drug resistance, with S. epidermidis now among them. While the researchers know it has caused serious infections, their work so far is yet to establish exactly how many, or the degree of their severity. The findings have, however, prompted them to turn their attention to how the bug is spreading and what is giving rise to its resistance. A lot of patients contract S. epidermidis infections in intensive care, where their immune system is already compromised and they are often injected with catheters or lines to administer drugs, granting the bug entry to their bodies. "Catheters and other implanted devices are frequently impregnated with antibiotics as a strategy to prevent infection, however this approach may be promoting the development of resistance," says Professor Howden. "Also, these infections are most prevalent in intensive care, where patients are sickest and strong antibiotics are liberally prescribed, promoting the development of additional resistance." The scientists are now focusing on pinning down how the bug is being passed to patients, and then learning more about its spread internationally. This will hopefully help them draw up new treatment guidelines that can start to curtail its effects. "We know what we're currently doing is just leading to more resistance," says Professor Howden. "So, we urgently need to think about what we should be recommending instead. There is an urgent need for an international monitoring system to understand the prevalence and impact of S. epidermidis and to systematically measure antibiotic resistance and infections due to this pathogen." The research was published in the journal Nature Microbiology. Source: University of Melbourne
  3. 1 point
    I am not sure that I like the call recording feature. I still like calls to be just that.... when it's hung up, there are no traces of the conversation.. I wonder how many people's calls get put out there for unintended ears.
  4. 1 point
    You probably spend a lot of your day inside apps: catching up on the news, playing music and movies, keeping in touch with friends, racing cartoon characters around a track, and so on. Every once in a while though, it's worth running an audit on these apps to make sure they're not overreaching and going beyond their remit—collecting more data about you and controlling more of your devices than you'd like. Here's how you can put controls on what your apps are allowed to do on Android, iOS, Windows, and macOS. Choosing App Permissions App permissions are the privileges an app has—like being able to access your phone's camera or your laptop's contact list—but deciding which ones to switch on or off isn't an exact science. Granting those permissions isn't in and of itself a mistake; generally, trusted developers won't request anything they don't need for the app to function, even if that purpose isn't immediately clear. Facebook Messenger asks for access to your microphone, for instance, not because it's eavesdropping on you but because it has a voice-memo function. That said, if you don't plan on ever using that feature, you might as well disallow it. Similarly, an app might request access to your contacts so you can more easily share a link or split a bill with someone—it isn't necessarily harvesting all your contact data and putting it in a database somewhere. But if blocking that contact access doesn't break basic functionality? Go for it. If you really want to dig deep into these permissions, check out the app's data and privacy policy as well, which should explain what it does with the data that gets collected (like your location or contacts list). These policies are often couched in vague language, but they should help you decide what to disallow. Even if you don't make any changes though, it's still a good idea to be aware of what privileges you're giving to your apps. When in doubt, check the app listing or website for details. If you're lucky (and the developers have done their job), you might find a list of requested permissions and what they're used for. Again, this can help in choosing which ones to switch off. If disabling a certain permission causes the app to misbehave or become less useful—you turn off phone-location access in your favorite mapping app, for example—then you can always turn it back on. Here's how to do both on all the major platforms. Android App Permissions Android comes in a variety of flavors depending on which manufacturer makes the phone, but here we'll list the required steps for the stock version of Android installed on the Google Pixel. Your version may not match exactly, but you should be able to find something similar on your handset. Open up the Settings app and head to the Apps & notifications menu. Then, tap on the app you want to look at (if you can't spot it, tap See all). Tap on Permissions to see everything the app has access to: A messaging app, for instance, might have access to SMS. To turn off a permission, tap on it. If the permission is particularly important to the app, you might have to tap a confirmation box. A more comprehensive list of permissions can be found by tapping App permissions on the Apps & notifications screen. Here you can browse by permission—from microphone access to call logs—and switch off any you're not comfortable with. As before, you'll be warned if you're disabling a permission that an app significantly relies on. If you notice an app behaving strangely after you've removed a certain permission, or part of the app no longer works, you need to decide whether to allow the permission or live without that particular bit of functionality. iOS App Permissions As on Android, iOS apps request permissions as and when they need them, though you'll usually see a flurry of requests—including one to show notifications—when you first install something new. You can revoke these permissions at any time. From the Settings app, tap Privacy to see all the permissions available on your phone: access to photos, motion and fitness data, your phone's location, and so on. Tap on any entry to see the apps granted those permissions and to disable those permissions, if necessary. The exact choices vary depending on the permission. For location data, for example, you can grant access to an app all the time or only when the app is open. With Apple Health data, meanwhile, you can give an app access to certain bits of data, like the hours you've slept, but not others, like the steps you've walked. Scroll down the Settings screen beyond the Privacy menu to find individual app entries. Tap on any app to access the same permissions as before, plus some extra ones—like access to notifications and permission to use cellular data as well as Wi-Fi. Again, a simple tap on an option or toggle switch is enough to grant or refuse a permission. Windows App Permissions As Windows 10 has evolved over time, it's become more smartphone-like in the way it handles apps, and that includes the way it handles app permissions. Click the cog on the Start menu to open Settings, then pick Privacy to see what your installed apps are allowed to do on the OS. The options are sorted by permission rather than by app, so click any of the entries on the left side to see apps with access: Location, Camera, Pictures, and so on. Each screen looks slightly different, but if you scroll down you'll see a list of apps associated with that permission. You can grant or revoke them with a click on the relevant toggle switch. With all of these permissions, you can turn off app access completely: For example, you might decide you don't want any of your applications using your webcam. Note though that these screens cover apps installed only from the Windows Store and some apps bundled with Windows, like Mail and Cortana. For full desktop apps with access to all your system resources, like Photoshop, there's no easy way of controlling permissions; these apps may have some options available in their respective preferences boxes, but otherwise you'll have to completely uninstall any that you aren't happy with. MacOS App Permissions Finally to macOS, which has a simple and straightforward permissions management screen that closely resembles the one in iOS. To find it, open up the Apple menu, then choose System Preferences. From there, click Security & Privacy, then open the Privacy tab. Here you can see all the permission categories, from location to app analytics. Click on any of the entries on the left side to see which apps have requested and been given permission. The screens look slightly different depending on which permission you're dealing with, but they're all straightforward. To make changes to permissions, click the lock icon on the lower left, then enter your macOS username and password to confirm you have the authority to modify these settings. You can then untick the box next to any permission you're not happy with. Note that the changes won't be applied to open apps until they're restarted. As on Windows, desktop applications are of course more complex than their mobile counterparts, so you might find more permission and privacy options by delving into the programs themselves—most will have a preferences pane available. And there you have it! Just remember that even when you set your app permissions the way you like them, the wording can still be vague about what they'll do with the info they collect. The safest way to keep an app you don't trust from accessing things it shouldn't will always be to not download it in the first place.
  5. 1 point
    Amazon and other members of the Alliance for Creativity and Entertainment have declared 'war' on pirate streaming devices and addons. While legal threats are issued left and right, the Amazon store is ironically still stocked up with books that explain to newcomers how to install some of the same addons Amazon is fighting. Last summer saw the birth of a new anti-piracy initiative, which has already made quite a few headlines. A coalition of the major Hollywood studios, Amazon, Netflix and several other media properties teamed up, launching the Alliance for Creativity and Entertainment (ACE). Their ultimate goal is to beat piracy, with pirate streaming boxes as the main target. In the months that followed, several third-party Kodi-addon developers received threatening letters in the mail and on top of that ACE filed lawsuits against three vendors of alleged pirate streaming boxes. Their show of force hasn’t gone unnoticed. It triggered some developers and sellers to lay low or move out of the game entirely. At the same time, fully-loaded pirate boxes are now harder to find at ACE member Amazon, which has removed tens of thousands of listings. These boxes, which ship with a built-in media player as well as pirate addons, were not always hard to find though. In fact, Dragon Box, which is now being sued by Amazon and the others, was previously sold on Amazon. This is perhaps what prompted the company to argue as a defense that it had “Amazon’s implied authorization to promote and sell the device.” Clearly, these Dragon Boxes have now been stripped from Amazon’s inventory, but it’s still not hard to find several alleged piracy inducing items there today. For starters, there are still hundreds if not thousands of cheap media players for sale. While these may be perfectly legal, reviews of Amazon members show, sometimes with screenshots, how these can be easily set up to run pirate addons. Arguably, without 24/7 moderation this is hard to avoid. After all, people may also buy a PC on Amazon and recommend people to bookmark The Pirate Bay. Perhaps we’re nitpicking. What may be more problematic for Amazon is the widespread availability of “Kodi tutorials.” While Kodi is perfectly legal, some of these books go into detail on how to add “pirate” addons. The same tools Amazon is suing Tickbox, Set TV, and Dragon Box over. “Do you want to install Area 51 IPTV or Set TV on your Kodi and Amazon Fire TV Stick or Fire TV?” one guide mentions, referencing Set TV specifically. “Do you want to install Supremacy, Dogs Bollock, Covenant, Genesis Reborn and Neptune Rising?” it adds. One of the many Kodi guides Another book offers help on “How To Install Kodi And The Latest Downloads On Any Firestick” mentioning the addon Exodus, among others. Exodus was famously highlighted as a “pirate” addon by the MPA. And then there are books discussing how to install a wide range of addons with a “pirate” reputation, including Covenant which is specifically highlighted in the ACE lawsuits as a bad actor. None of these addons have been declared illegal in court, as far as we know, and writing about it isn’t illegal by definition. But, it is clear that Amazon itself sees these as pirate tools. This leads to the awkward situation where, on the one hand, Amazon is suing vendors who sell devices that ship with the Covenant addon, while they sell books that show people how to set this up themselves. We won’t make any judgments on whether these books or addons encourage infringement in any way, that’s not up to us. But for Amazon it’s not a good look, to say the least, especially since part of the profits for these titles go into its own pockets.
  6. 1 point
    Exactly a year after Canada's largest telecoms companies executed a warrant against TVAddons founder Adam Lackman, unwelcome visitors have again attended his home. After a court order to pay attorney's fees of CAD$50,000 went unsettled, bailiffs representing Bell, Rogers, and Videotron turned up at Lackman's home Wednesday in an effort to seize property. On June 2, 2017, Canadian telecoms giants including Bell Canada, Bell ExpressVu, Bell Media, Videotron, Groupe TVA, Rogers Communications and Rogers Media, filed a complaint in Federal Court against Montreal resident, Adam Lackman. Lackman is the founder of Kodi addon repository TVAddons and someone described by the telecoms companies as a serial infringer of their intellectual property rights. The companies demanded injunctions against Lackman, preventing him from developing, promoting or distributing allegedly infringing add-ons and software. The plaintiffs also requested damages and costs on top. Without Lackman being present or able to mount a defense, on June 9, 2017, the Federal Court handed down a time-limited interim injunction. Bailiffs took control of TVAddons’ domains, shutting TVAddons down. They also obtained an Anton Piller order, a civil search warrant which granted no-notice permission to enter Lackman’s premises to secure evidence. On June 12, 2017, Lackman’s home was searched against his wishes, but on June 29, 2017, a judge decided that Lackman had been mistreated. The Anton Piller order was vacated and the application for interlocutory injunction was dismissed. The plaintiffs took this decision to appeal during November 2017. A three-judge panel handed down its decision February 2018, effectively turning the earlier ruling on its head. The telecoms companies emerged victorious with the Anton Piller order and interim injunctions declared legal. As the image below shows, Lackman was also told to pay the telecoms companies attorney’s fees of CAD$50,000. Yesterday, just one day after the anniversary of the original search of Lackman’s home, representatives of the plaintiffs were back again to carry out yet another search. “Bell, Rogers, and Videotron showed up once again to force their way into our founder’s home,” TVAddons said in a statement. “They had a court order that allowed them to search through anything and everything, in order to mark down things of value which would be sold to repay the debt.” Lackman said he could find no deadline dates on the order issued by the court and believed he had much more time to tackle the issue. “I didn’t think they expected to be paid prior to the conclusion of the [full] lawsuit,” Lackman said. “I’ve already been forced to fundraise in order to defend myself, they have seized millions worth of property (domains, social media) and destroyed my only source of revenue already. Harassing me to pay them when I don’t even have money to pay my own lawyers is really disruptive to my general well being.” But surely the TVAddons founder was given notice that the monies were due and a visit was imminent? Not so, he insists. “Other than the appeal judgment, I had not heard from them since. I had no clue they could even show up again. How could I expect that collections would begin while the entire lawsuit on the actual merits (the only important part) is still ahead?” he said. But turn up they did. Yesterday morning three bailiffs working for Smart & Biggar Fetherstonhaugh on behalf of Bell, Rogers, and Videotron arrived at Lackman’s home and made their presence known. “As soon as I opened my door, one of the bailiffs put his foot in it and said that they had the right to enter. I called my lawyer who told me I should comply with their demands,” Lackman says. “One of the bailiffs appeared to be there for ‘muscle.’ The other bailiff was extremely aggressive, even asking me to show them copies of my invoices with lawyers. And the third bailiff (who seemed to be in charge, he was also part of the original seizure last year) was a bit harsh, but it seemed like he was just trying to do his job.” Lackman says the visit wasn’t particularly fruitful. The bailiffs found a laptop and “two near worthless” prints on his wall. The goods will be sold at auction come July 31 unless Lackman can either come up with the funds (now CAD$57,500, up from the original CAD$50,000) or get a court to suspend the action. But for a man with no money, it’s a catch-22 situation. “I am hoping that we will be able to get a sort of stay of proceedings on the collections, at least until the court hears the merits of the lawsuit at trial. The problem is that the goods they are going to seize probably aren’t even worth what it will cost to return to Federal Court. They’re trying to ruin me,” Lackman adds. With Lackman’s back up against the wall, he’s still relying on well-wishers to help bail him out. However, the case is already a year old with many thousands spent in legal fees and no end in sight. When or if a trial on the merits will ever take place is still anyone’s guess but with powerful deep-pocketed adversaries, there’s a possibility that Lackman might be worn down without ever having had his day in court “If they are going to harass me on an ongoing basis for every little thing I have (such as my laptop), I’ll have no chance of ever being able to fight the merits, which is what they want,” he concludes.
  7. 1 point
    The first thing I would notice that's wrong is that it's not a desktop! LOL
×