Saturday 11 March 2017

Dark Net is More Resilient to Attack than the Internet

Darknet
Our reliance on internet for day to day activities is growing exponentially with every passing month. Internet is regarded as a robust and complex network which happens to fail quite a lot even though the technological evolutions are upgrading it capabilities at break neck speed. A research conducted by the scientists has revealed that the dark net which remains hidden from the regular internet as well as invisible to the common search engine happens to be less vulnerable to the cyber attacks. Given the fact it has low visibility and not everyone knows about it keeps it secure even though it works on the same foundation of the commonly used internet.

Decentralization is the major reason for attacks on common internet

The regular is extremely decentralized which is known to become extremely stable in normal circumstance which makes it easier to wreak it. Internet is just an amalgamation of sites and servers which are millions in number and works fine even when you take out few sites or servers from this complex network. That is why it becomes more vulnerable and can easily be used to launch a coordinated attack and this is what exactly happens when someone launches a distributed denial of service attacks or more commonly known as (DDoS). Dark Net is less vulnerable because of its unique structure.

Lack of rick club effect safeguards dark net from attacks

Their study has found that the powerful network nodes in the regular internet tend to connect with the powerful nodes with ease. This helps in forming what these scientists describe as network elites. Therefore launching an attack on single such node results in triggering the failure of the other nodes and this ultimately results in failure of the whole network. Dark net simply does away with the high level connectivity among the powerful nodes present in its network.

When it comes to network elites in the dark elites then appear to avoid each other which ensure its robustness against the mitigated attacks. Dark net in essence creates the ‘small world network’ which is filled up with the heavily connected nodes link which is a part of the smaller local nodes. It can be easily visualized as the major traffic hubs and how they connect with the smaller airports spread across the region. Scientists are still to figure what makes the dark net so much touch against the attacks when they happens to very much similar to regular internet in the way it works and interacts with different node in many ways.

Scientists have put forward the thought that completely reconfiguring the internet is the only resort toward infusing the robust toughness in the regular internet. This method of reconfiguring the complete internet will certainly be a giant momentous task that would be expensive beyond imagination but this will help in bringing highly secure environment for the next generation of the users and large companies.

Thursday 9 March 2017

Google Head Confirms Second Generation Pixel Phone

Pixel
This year might have just have begun but we are already moved by the reports of Google and Apple. Probably this year would bring a dynamic change in the world of cells. Google is trying its best to compete with it’s one of the top rivals –Apple with Second Generation Pixel phone. Well, Apple has always maintained the trend of releasing iPhones each year ever since its inception and now we may see Google just following the same trend. But the catch is whether Google will be able to match up to the expectations of the users and also whether it would take everyone by surprise. The rumours of iPhone 8 have already been spread but now the question lies whether Apple would be able to be deliver those features without any glitches like the 3-D selfie camera which is supposed to map your face.

THE PIXEL 

With the news being confirmed that Google is set to launch the second version of Pixel which can range around 900$. So be prepared to shed a bit more for the wonderfully crafted design of Pixel 2. The previous Pixel boasts of an enormous charging facility and battery backup which is the major concern for the normal consumers. Well, it was able to give seven hours of standby charge when it was charged for just fifteen minutes. Needless to say, the design was superb with the storage capacity of 32 GB or 128 GB. The video calling app like DUO may get a newer look or an upgrade in the Pixel 2. The ALLO app for messaging was a huge success. The design may be a sleek a bit and may use cutting edge technology to beat the likes of Apple in the top smartphone market.

THE FEATURES

With the passage of time, the technology has got more advanced and with more exciting features, it is just icing the cake. The latest report says Google is planning to ditch the headphone jack just like the iPhone 7. It is planning to take over the market in the broader way. Well, this report might not be true as it was an internal Google document and hasn’t been verified still. But within a short span of time, the picture would be clear. The processor for the Pixel 2 would be Snap Dragon. Probably it would be the Qualcomm Snapdragon 835 SoC. It is supposed to be water resistant as well as dust resistant.

THE MARKET

Google’s main focus would be on photography just like the predecessors. And for this they have decided to stay premium in the market. Well, we have got to have patience before any final news is confirmed about the product and release date. It is now time to see whether there would be any better feature than the Gorilla glass or not. The display is said to be HD with latest features which will be quite cool when coming to the photography part. The year surely promises to be awesome with respect to the smartphones.

Protection Against Android Malware

Android
BGR
Some tips could always be useful irrespective of the user being new to Android who would be eager to explore new available options on the screen. Some of them could also be annoying which tends to come with the daily functions and operations. These tips could be helpful to the user since every few months there seems to be some security vulnerability in Android which could affect many users of Android smartphones, for instance in recent years, Quadrooter together with Stagefright.

 These two security vulnerabilities were considered to be different. In regular life, how secure would Android be and what would be helpful against the dangers from the internet? Numerous security holes had been exploited by Quadrooter, in Qualcomm drivers in the summer of 2016 wherein nine hundred million Android devices had been affected.

This had been presented by those who had identified the gaps. But in order to take the benefit of the Quadrooter exposure, the invader needs to be capable of installing and running an appropriate designed app on a smartphone. The Stagefright susceptibility seemed to be different which was unseen in the functions in processing of streams or media files and the issue was that when even a video would be sent as an MMS there was a tendency of it being misused.

The invader had the capability of sending a file to the user where the dangerous code could be accomplished. Beginning with Android 4.0, it seemed difficult to exploit the susceptibility owing to the system intervention, though it is not difficult. The dissimilarity between the two security breaches is evident. While Quadrooter tends to need few steps from the user, Stagefright can be exploited remotely without the need of interaction of the user. Android tends to have various means of safeguarding the security of the users. The most significant methods are:

1. Prevention of installation of unfamiliar apps 



There is said to be a setting in the Android system which enables or disables installations of apps of unfamiliar source wherein the option gets deactivated on the device in its delivery state where one can install apps only from the Play Store. Some of the companies tend to have their own app store preinstalled like in the case of Samsung, with its Galaxy Apps. The capability of limiting the option is not relevant for these and this option tends to protect the user against malware spreads through an unfamiliar app store or simple internet pages. News regarding malware in the Play Store seems to be quite rare since these disreputable apps are eradicated rapidly from the Play Store. However, unknown sources need to be activated in using app store of Amazon or perhaps for another like F-Droid.

2. Virus Scanner of Google 



The second line of defense of Google does not seem to have compatibility issue but provides security against malicious apps – virus scanning. Beginning with Android 4.2, this has been made available and is now a part of the services of Google Play. It has also been activated by default and should be left that way. The setting is said to enable apps to be scanned for likely malware before the installation. However if malware tends to be discovered, Android rejects the installation.

Quadrooter Malware 



Google had confirmed with Android Central some few days after discovering that Quadrooter malware cannot be installed while the corresponding setting had been set. Adrian Ludwig, security chief of Android had declared that it was identical to Gooligan, the malware which had hacked Google accounts in December 2016. As of April 2016, Android Security Report, in 2015 states that with this procedure, the threat landscape for users of Android could be considerably less and with this feature the malware apps does not have any chance against Google. Essentially the verification of the app tends to function by calculating the fingerprint – hash value of an APK which is compared against the database of Google comprising of likely threats. Google tends to scan apps on the Play Store, as well as APKs which are accessible through the web.

Alerts against Ensuing Manipulation



This system seems to be quite effective since around 90% of the apps connected outside the Play Store seemed to be well-known to Google which had been scanned for probable security concerns. Besides this, Google is also capable of extracting specific features from the apps subjecting them to identical process which enables Google to identify dangerous feature. Thus it warns the user if essential and also prevents the installation of such a kind of app. Google, in the meantime tends to scan the installed apps during the process and can also alert against ensuing manipulation of the app, which is already installed. In the case of extreme condition, there is also the likelihood of removing apps from the smartphone if these have been permitted by a device administrator.

Wednesday 8 March 2017

Google Fights Online Trolls With New Tool Perspective

Perspective
In the past couple of years the internet has turned into an ugly place which is filled with name calling, harassment and in some extreme cases with threats of violence. The extent of the online violence or trolling or abusive barrage is so much that half of the internet users in United States have stated that they had experience such intimidation.

Almost a third of those users has confirmed that they restraint themselves from posting anything online simply out of fear. This data has been generated by a non-profit Data & Society Research Institute and a gruesome has fact has emerged from this study which points that the young women and women of colour are targeted specifically by the trolls.

Google is coming up with a noble solution for this by releasing an artificial intelligence tool named Perspective. Perspective is designed to scan the online content and define its ‘toxicity’ purely based on user’s ratings.

How Perspective works?

Perspective works in a simple and dignified fashion wherein a user can feed an online comment board eight into the Perspective to understand it toxicity level based on the user’s responses. This score will help the users in deciding whether they should participate in the conversation or to stay away from it. This tool will be a boon for the publishing houses as they will be able to monitor their site’s comments boards in a more effective manner.

Quick scan of ugly words on Perspective

Perspective support rating for specific words and phrases as well wherein a quick scan is conducted and results are shown to the user. Perspective has thrown an insightful report based on a quick scan of the ugly words. This report has shown that the words with n-letter has toxicity of 82 percent, k--- which is a derogatory word for the Jewish person had toxicity of 39 percent while c--- which is a slur for Chinese origin person had toxicity of 32 percent. When phrases like ‘you are a’ is thrown at Perspective then the toxicity score goes up wildly.

The future applications of Perspective

The use of Perspective is free and open for everyone and it is up to the publishers whether they wish to showcase the results to public or not. Currently the online publishers rely on the crowdsourcing methods in which readers are required to flag the offensive language in the comments to the human moderators. Perspective can even be utilised by the website owners in cleaning up the language on their sites.

Some have suggested that Perspective can lead towards censoring the free speech in the long run. In a response Google has stated that this tool has been designed to flag the ‘low hanging fruit’ which can be later on adjudged by the human moderators whether it should be removed or not.

Google attempt towards fighting the troll and abusive content in the online arena is very similar to the efforts of Twitter and some other non-profit organisations.

Tuesday 7 March 2017

MWC 2017: Samsung Unveils Two New Tablets

Samsung
Mobile World Congress at Barcelona is an esteemed event which is followed closely by the consumer electronics industry and fans worldwide. Samsung has always indulged in showcasing its Galaxy S Smartphone at this tech show since 2013 but this year it has given it a miss by simply bringing two tablets and a virtual reality headset. The particular VR headset unveiled by the Samsung comes with a remote control which is weird but exciting at the same time. It is hard for any major Smartphone maker to do away with the Smartphone complete at MWC therefore Samsung briefly teased one new Smartphone right at the end of its presentation. Samsung however left the presentation at a happy note by stating that the new Smartphone will be unveiled on 29 March in New York later this year.

Samsung will lose onto rivals

Samsung has already lost the crown of most selling Smartphone brand in the world to Apple this year in terms of shipment. After the Note 7 debacle last year Samsung has lost a considerable market share to rivals and not bringing any successor to the S7 at MWC will simply become a boon for the rivals especially Huawei. However signaling to the fans that a new device is expected to make its way to them soon is a good thing from Samsung point of view as it will make potential buyers to wait for some time.

News tablets doesn’t excite anymore

Samsung has launched two new tablets the Galaxy Tab S3 and Galaxy Book and both of these devices are targeted at the consumers who are more into gaming and video playback. The Galaxy Tab S3 comes with a 9.7 inch screen and boasts of the latest Android 7.0 Nougat. While Galaxy Book will come in two different sizes of 10.6 inch and 12 inch and it will be running in the Windows 10 OS. Galaxy Book is being targeted at the on the go professionals and it also comes with additional accessories in form of snap-on keyboard and S Pen stylus.

Tablet sales are going down on global scale for all the manufactures as the initial popularity for the larger devices has depleted. Consumers tend to favour the larger Smartphone instead of tablets but Samsung is looking forward to ignite popularity in larger device through bringing better specs coupled with features. Both of these tablets boasts of the organic light emitting diode (OLED) and displays and brings powerful specifics which will help in reigning over the competitors.

Samsung presentation marred with Greenpeace protest

Samsung days are going rough since its recall and effective demise of the Note 7. Sadly its presentation had an unexpected appearance of the Greenpeace activist staging a banner stating ‘reduce, reuse and recycle’ which is direct wink at the Note 7 handsets. Quite a number of protestors started gathering around the building where this press conference was taking place and they displayed varied banners on the same lines.