Archive for June, 2018

udoq Launches The Ultimate Apple Dock… This One Is Qi Wireless

Posted in Commentary with tags on June 29, 2018 by itnerd

udoq announced today THE ULTIMATE APPLE DOCK. Available through Indiegogo at 50% off for only $99 (normally $199), THE ULTIMATE APPLE DOCK includes the udoq anodized aluminum docking/charging station, udoq designed Qi wireless adapter charging plate, udoq Apple watch adapter, two Lightning cables with adapters, and the udoq cable box that cleanly organizes cables out of view. Designed for Apple lovers by Porsche minimalist designers, the udoq THE ULTIMATE APPLE DOCK has a high quality, nearly indestructible dark grey profile that matches timelessly with Apple’s famous design aesthetic — built for a lifetime of use and always compatible.

Patented Sliding Cable Design

THE ULTIMATE APPLE DOCK features udoq’s convenient patented sliding cables that move back and forth and can be changed out while keeping cables always elegantly hidden from view. In addition, the dock’s front facing design lets you see and operate devices while charging. udoq Founder Marcus Kuchler said, “I developed udoq because I was sick and tired of the daily search for my family’s iPhones, iPads, iPods, or AirPods. And cable clutter or dangling connectors simply don’t match Apple’s clean and straightforward design concept. THE ULTIMATE APPLE DOCK lets you charge, operate, and display all your Apple mobile devices in one central spot. It lasts you a lifetime, and since udoq stays compatible forever​, it will be adaptable to all new charging technologies.”

udoq is the only patented docking station to:

  • Dock and slide around mobile devices with patented cable adapters.
  • Dock and remove devices from the dock with just one hand.
  • View and operate all devices simultaneously while charging.
  • Wirelessly charge iPhones X or iPhone 8 with the included Qi adapter.
  • Charge with included udoq Lightning cables.
  • Dock and charge any Apple Watch by mounting the Apple magnetic charging cable into udoq’s adapter.
  • Adjust the height of udoq connectors to fit bumpers and cases with up to 8mm thickness.
  • Charge super-fast with 2.4A per USB port/device with the integrated 40W power charger for all USB cables.
  • Neatly hide cables in udoq’s cable box.
  • Mount on any wall surface with the optional WALL MOUNT SET (available separately).

 Features:·

  • Measures 15½ inches (400mm) and fits 4-6 devices.
  • Comes with two Lightning cables with adapters.
  • Includes Apple Watch adapter.
  • Includes Qi wireless adapter.
  • Anodized 4mm high-grade aluminum dock stays beautiful and is nearly indestructible.
  • Cables slide smoothly to any position for a custom arrangement of your mobile devices and can be moved and swapped out in seconds.
  • Hides and organizes all cables and connectors to avoid cable clutter.
  • Comes with a 4 port 40W charger so all devices get up to 2.4A for fast charging.
  • Dock also works with Android and fits older Apple devices (cables sold separately).
  • Comes with non-slip cables and user manual.

Indiegogo Campaign Live Now 50% Off

Shipping December 2018 through Indiegogo. Indiegogo backers will receive a 50% off discount, priced at $99 (normally $199), and be the first to receive udoq’s THE ULTIMATE APPLE DOCK in dark grey. Udoq is also available in a variety of sizes and versions for Android, completely customizable at https://udoq.com/configurator/. For more information, see www.udoq.com.

#PSA: All-Radio 4.27 Portable Is Malware That You Really Want To Steer Clear Of

Posted in Commentary with tags on June 29, 2018 by itnerd

I often get called in to do malware removal. Sometimes, I am able to remove the malware in question. Sometimes, I can’t. Based on what I am reading here, All-Radio 4.27 Portable is going to be one of those ones that I can’t remove. At least not easily. Here’s why:

If your computer is suddenly displaying the above program, then your computer is infected with malware that installs rootkits, miners, information-stealing Trojans, and a program that is using your computer to send send out spam.

Unfortunately, while some security programs are able to remove parts of the infection, the rootkit component needs manual removal help at this time. Due to this and the amount of malware installed, if you are infected I suggest that you reinstall Windows from scratch if possible.

That’s not good to say the least. Thus you need to protect yourself from being a victim. Fortunately, that seems to be easy as it appears that this malware shows up on your computer if you install game cracks and Windows activation tools. Thus you should avoid those as this is a textbook example of what happens to you if you don’t. Beyond that, you should have an up to date antivirus installed. Not to mention having a backup strategy in case the worst happens.

Infographic: McAfee Threat Report – June 2018

Posted in Commentary with tags on June 28, 2018 by itnerd

infographic-threats-report-jun-2018.jpg

Source: McAfee

Check out the report that is referenced in this infographic here.

Peace In Our Time: Apple And Samsung Settle Years Long Patent Infringement Dispute

Posted in Commentary with tags , , on June 28, 2018 by itnerd

Samsung and Apple have had a patent infringement dispute that goes back seven years and went something like this:

  • Apple sued Samsung for pretty much copying the iPhone and scored a $1 Billion victory.
  • Samsung appealed, but not before Apple got some Samsung phones banned in the US.
  • Subsequent trials dropped that billion dollar figure to $539 million this past may. But this is more than the $399m figure Samsung had managed to shave off in the past.

Yesterday, both parties settled. No clue how much cash traded hands. Though it is a safe bet that Samsung likely cut a big cheque to make this go away. But all claims in the case be dismissed with prejudice, meaning they cannot be refiled.

Thus after 7 long years, there is peace in our time in the smartphone world. Until the next patent infringement lawsuit.

McAfee Labs Sees Cryptocurrency Mining Surge

Posted in Commentary with tags on June 27, 2018 by itnerd

McAfee Labs’ most recent threats report – McAfee Labs Threats Report: June 2018 – found cryptojacking and cryptocurrency mining malware increased over the quarter. Coin miner malware, which installs a cryptocurrency mining program on infected PCs, grew 629% in Q1 2018, while the Lazarus cybercrime ring launched a sophisticated Bitcoin-stealing phishing campaign, targeting global financial organizations and Bitcoin users.

Overall, McAfee Labs saw an average of five new threat samples every second in Q1.

Other report highlights included:

  • Gold Dragon targets Winter Games to steal data using fileless techniques
  • GhostSecret campaigns target health care, finance, entertainment, and telecommunications
  • Gandcrab ransomware infects around 50,000 systems in first three weeks of Q1
  • Total new LNK malware grows 59% as enhanced PowerShell techniques proliferate

For more information on these threat trends and statistics, please visit:

Fantom Drives to Unveil Plug-and-Play 5 TB Xbox One Hard Drive and Storage Hub

Posted in Commentary with tags on June 27, 2018 by itnerd

Fantom Drives today announced the company’s enhanced Xbox® One Hard Drive and Storage Hub, featuring up to 5 TB of capacity in the latest generation product. The Xbox One compatible storage system provides on-demand gaming or media capacity ranging from 1-5 TB and plug-and-play attachment to the Xbox One for superior gaming portability. The high capacity unit (Available Here: http://fantomdrives.com/l/xbox.html) offers players space for up to 125 (50 GB) games and top performance to speed game installation, loading, and saving.

IMG_8060b.jpg

Before they can be played, Xbox One games must be completely installed on the Xbox One’s hard drive, including store bought games on optical disc. Because the Xbox One’s built-in hard drive cannot be replaced or upgraded without voiding the system’s warranty, players must purchase an external drive to grow the capacity of the system. With the Xbox One Hard Drive and Storage Hub by Fantom Drives, a massive capacity increase with the current 4 TB or new 5TB system can be added quickly and affordably, whether the gamer is at home or at a friend’s location.

The Xbox One Hard Drive and Storage Hub is available in several drive capacities, ranging from 1 TB to 5 TB and includes 3 additional USB 3.0 ports for adding additional storage (maximum 2 ports), controllers, or charging other USB devices. The drives are also available in very high-performance Firecuda Hybrid Solid State (SSHD) configurations of either 1 or 2 TBs. The power-efficient unit eliminates the need for cumbersome cords or power supplies, allowing for simple setup and operation. The plug-and-play device is simple to install and use and includes a quick installation guide with directions on how to set up the drive within minutes.

The Xbox One Hard Drive and Storage Hub includes:

  • A single built-in high-quality Seagate Hard Drive in capacities ranging from 1-5 TB or a high-performance Firecuda Hybrid Solid State (SSHD) configuration of either 1 or 2 TBs drives.
  • Easy snap on design to directly connect to the Xbox without the need for an external power supply or USB cables.
  • Powerful yet efficient 2.5” drive technology that provides a smaller, quieter, and more durable system that runs cooler and more reliably.
  • Three port USB 3.0 hub which can be used for additional storage (maximum 2 ports) or as a regular USB port expansion.
  • Support for SuperSpeed data transfer rates of up to 5Gbps (USB 3.0) – backward compatible to USB 2.0/1.1.
  • One-year limited Warranty. Xbox One not included.

Those interested in purchasing the Fantom Drives’ Xbox One Drive and Storage Hub can call 800-800-DISK or go directly to the company website to purchase at http://fantomdrives.com/l/xbox.html or find the product at Walmart.com, Newegg.com, BHPhotoVideo.com, or Amazon.com.

VPN Special Notes That A New China VPN Crackdown Is Under Way

Posted in Commentary with tags on June 27, 2018 by itnerd

VPN Special has recently observed intensified restrictions on VPN accessibility in China.

There is no official explanation for the new crackdown, but they suspect that the increased censorship may be due to Communist Party’s approaching anniversary. China is known for increasing censorship during important commemorations and celebrations.

As a result, they have observed a 200% spike in the number of VPN users from China in the past few days. For now it seems that only very few VPN services are able to operate in China.

“China is now censoring mentions of HBO comedian John Oliver on social media and restricting access to the HBO website. Last week Oliver ran a 20-minute segment mocking Chinese president Xi Jinping. We have noticed that VPN crackdown began after Oliver’s show,” said Laura Black, Communications Director at VPN Special. “So we are not sure what it is related to: the Communist Party’s anniversary, John Oliver or anything at all. The fact remains that most VPNs are now not working in China. However, we have news that some are still operational, such as NordVPN or VyprVPN.”

China’s “Great Firewall” has currently blocked at least 165 of the world’s 1,000 most popular websites, such as Reuters, the New York Times, Bloomberg and South China Morning Post. It has also censored 26,000 Google search terms, 880 Wikipedia pages, and popular services like Facebook, Twitter and Instagram.

China has been called “the worst abuser of internet freedom” by FreedomHouse, a US-based NGO focused on promoting free speech and democracy.

Have I Been Pwned Teams Up With Mozilla To Ensure That You Don’t Get Pwned

Posted in Commentary with tags on June 26, 2018 by itnerd

Coming to a future version of Firefox is Firefox Monitor which is a service that is powered by the famous Have I Been Pwned Service. The tool will allow Firefox users to enter an email address to see if their account was part of a known breach. If so, Firefox Monitor will let them know the extent of the personal data exposed, and serve up recommendations on how to secure their account. The service will go into trials next week and then roll it out to everyone if the trial is successful. Watch this space for more details.

Buying A New WiFi Router? Make Sure It Is WPA3 Compatible

Posted in Commentary on June 26, 2018 by itnerd

If you’re in the market for a new WiFi router, there’s one thing that you should make sure it comes with, which is WPA3 support. WPA3 is the successor to the WPA2 security standard that we’ve used for the last few years on routers. It’s decent, but it does have weaknesses:

  • An attacker can capture an encrypted data stream from your router and then carry out an offline dictionary attack. That can allow them to break into your router later once they figure out what the password is.
  • If someone carries out the above attack, they will be able to decrypt the data they already hold.

WPA3 which the WiFi Alliance has officially started certifying, addresses these issues and offers these enhancements:

  • A more robust password-based authentication system that reduces the chances of a hacker guessing your password.
  • Individualized data encryption to protect against Wi-Fi eavesdropping
  • The ability to protect data traffic even if a password is compromised after the data was transmitted.
  • 192-bit minimum-strength security protocols
  • A quick-setup option for devices

Devices with WPA3 will be backwards compatible with WPA2 so it won’t break your existing devices. It will be rolling out to new devices this year. If you’re in the market for a WiFi router, future proof yourself by making sure it is WPA3 compatible.

Guest Post: NordVPN Provides 8 Tips On How To Avoid Cyber Threats At The World Cup Russia

Posted in Commentary with tags on June 25, 2018 by itnerd

As the biggest football tournament in the world has taken center stage in Russia, cybersecurity experts are warning that soccer fans might be attractive targets for hackers. Besides, internet security is a growing concern in Russia in general.

“All big events are an attractive target for hackers, and the World Cup is not an exception. Those visiting the 2018 FIFA World Cup must be extremely cautious and take additional steps to avoid various threats. Emotional matches can cause loosened focus on personal privacy, and the World Cup can become a true goldmine for cybercriminals,” said Laura Tyrell, Public Relations Manager at NordVPN. “The biggest security issue during the event are public Wi-Fi hotspots.  In addition, Russian authorities have been strengthening mass surveillance and tracking, so that should also be a concern, especially to journalists and others transmitting sensitive information.”

About 1 million football enthusiasts from different countries are currently in Russia, visiting 12 venues in 11 cities. Recently, Kaspersky Lab analyzed around 32,000 Wi-Fi hotspots in 11 cities hosting World Cup matches and found that over a fifth (22.4%) of them are unsecure. According to the report, the top three World Cup cities with the highest percentage of unreliable networks are Saint Petersburg (48%), Kaliningrad (47%) and Rostov (44%).

The most common hackers’ tactics are man-in-the-middle attacks, Wi-Fi sniffing, and fake hotspots. Especially unreliable are those Wi-Fi hotspots that are free, usually provided in coffee shops, shopping malls, airports, stations, etc.

Here is some advice from NordVPN on staying secure when using the internet at the World Cup – or any big public event.

  1. Don’t share your device. Be extremely cautious with your devices – don’t share your smartphone or computer with anyone, especially the ones you don’t know.
  2. Install a VPN. A VPN makes a user’s online traffic snoop-proof through strong encryption. When connected to a VPN, public Wi-Fi can be used without getting paranoid about data being stolen. NordVPN, for example, is easy to use and keeps no user logs.
  3. Be careful with gifted USBs. Be cautious with various IT-related gifts, such as USB keys – throw them away instantly, as such items might contain viruses or other malicious content.
  4. Always update. Update all your apps and software, both on your laptop and smartphone.
  5. Be careful about fake apps. Use and download only official applications.
  6. Avoid online financial transactions on unprotected networks. Avoid using internet banking, buying online or presenting your credit card details online if the network is unprotected.
  7. Don’t tell them where you are. Avoid sharing your location on social media or other applications.
  8. Press the off button. Keep your Bluetooth and Wi-Fi off, except when needed.