Cyber ​​security expert John McAfee was the victim of hacking

The people who become victims of hacking are usually those who do not pay attention to the security of the device.

But this isn’t entirely true, the article recently a pioneer in the field of cyber security named John McAfee claimed to have hacked his smartphone and hijacked his Twitter account.

The 72-year-old said his Twitter account was hacked and used to promote an unpopular crypto-currency currency.

Twitter is reluctant to comment on the hack, but the micro-blogging site has a two-factor authentication security feature. Namely, in addition to logging in, one must enter the code sent to the smartphone to be able to access their Twitter account.

Unfortunately, McAfee says its smartphone has been hacked to allow hackers to hijack their millik Twitter accounts.

“The indication, my smartphone hacked and the perpetrators see the authentication code,” he said.

He added, that’s when McAfee realized that his smartphone has been hacked hackers.

“I was on the ship at the time and could not come to the operator booth to stop the hacking, the culprit broke into my Twitter account, and maybe worse,” he said.

Just known, this time McAfee is developing an anti-hacker phone. Possible smartphone that claimed could not be hacked this will be released February 2018.

AntiVirus McAfee VirusScan

McAfee is not a new person in the cyber security world. In the 1980s, McAfee founded a company that released the first antivirus software, McAfee VirusScan, which was quite successful in the market.

Although the business has been sold to Intel, McAfee is still developing its own cybersecurity products.

The Scottish-born man is also the leader of Bitcoin mining operations, MGT Capital Investment, which solves complicated mathematical problems to verify transactions in virtual currency.

Founder of Vine is ready to launch new app

In 2012, Twitter officially acquired a short video service called Vine, and spawned short video trends across social media platforms.

Thanks to the popularity of the service, Vine loyal users have suddenly turned into internet celebrities. But in 2016, Twitter finally announced it would shut down the Vine, and realized the plan officially closed it in early 2017.

But the good news is the co-founder of Vine, Dom Hofmann is working on a new project as a continuation of the close of the Vine earlier this year.

“After officially closed the Vine, I developed something as an extension of the short video sharing service,” Dom said.

He added that the new project is being funded by himself. Unfortunately, Dom is still reluctant to reveal more details about what he’s working on.

Although the Vine has disappeared, some of today’s social media platforms are ‘adopted’ adopting a format similar to the Vine. Examples are Snap (Snapchat Stories) and Facebook (Messenger, Instagram, and WhatsApp).

It was only a matter of time until Dom finally revealed what the project was doing. Will this new project take care of the success of the Vine?

Twitter Close Vine

On January 17, 2017, Twitter officially closed the Vine short video service. Even so, the company also clarified that it will continue to maintain video services through the Vine Camera app.

Consequently, users can still take short-form videos but can only be uploaded to Twitter, no longer available to the Vine app.

Despite being hacked, Twitter invites users to download the videos they have uploaded on Vine before the app is renamed Vine Camera.

Vine Camera can record video for 6 seconds. The 6-second video has the ability to rotate automatically, as in the Vine app before it is closed.

In his blog upload, Twitter notes that the videos that have been uploaded in the Vine app will not be lost, but can still be watched through the vine.net site

Vine Acquired Twitter

Vine himself debuted first in 2013 as a simple social network to record 6-second videos that can continue to be played back automatically. Twitter previously bought the Vine app in 2012 because it believes the platform will support its services.

At that time, the acquisition value of Vine by Twitter amounted to US $ 30 million before the application was launched.

Vine is quite successful into an entertaining platform. Unfortunately, the application is considered poor in innovation, so it is unable to compete with Snapchat and Musical.ly.

Subsequently in October 2016, Twitter announced the Vine service will be closed. Shortly after Twitter announced the closing of the Vine, founder Vine Rus Yusupov summarized his opinion, “do not sell your company!”

5 Social Media Facts That Changed the World

According to data published by We Are Social, of 7.4 billion inhabitants of the earth, 3.7 billion have been connected to the internet. Of the number of Internet users, billions of people are accessing social media every day. This number is reportedly increasing.

By 2018, an estimated number of social media users will reach 2.44 billion.

Social media is used for many things in life, such as connecting with others, entertainment, networking with colleagues and college friends.

The use of social media does not only change the way people communicate, but also change people doing business, change government communication, and change people’s lives.

Here are five observations and predictions from experts from the Global Agenda Council on the fact that social media has changed the world:

1. Must have social media

Social media now seems obligatory. According to Claire Wardle of the Digital Journalism Determination Center, in the past seven years, social media has changed things. For example, social media is used for digital marketing or communication channels for customer service.

Various industries have used social media for business purposes. Therefore, it feels social media so it is mandatory to have.

2. Social Media Platform Make Easy Banking

Social media becomes a platform that is also used in the banking sector. Just as above, social media is changing the way of communication in the banking world. Starting from improving customer service to allow users to transfer money through online platform.

Not only that, financial technology companies also use social media to help others open accounts. In fact, social media can also make it easier for someone to get a loan.

3. Social Media Help with Health Services

The health industry is also one that is helped by social media. For example, public health campaigns can be done through social media or virtual doctor visits can be done in the Skype service.

Social media can also help patients stay connected to those who can answer their questions about health. “Social media has done well in the health of a person or society, especially getting people to share information quickly,” said Lee Aase of the Mayo Clinic Center for Social Media and Social Media Network.

However, social media can also be bad. For example when a non-expert person shares health information with others. Therefore, according to him, health agencies need to make plans to respond and overcome if there is less accurate information about health, especially through social media.

4. Social Media Changing Government Communication with Citizens

The participation and involvement of civilians in social media has been the source of ideas, plans, and initiatives for the government. Through social media too, many regional leaders communicate and embrace their citizens. In addition, they also make government more transparent.

In fact, there is now a platform created specifically to provide input or report directly to the local government, Qlue one of them.

5. Social Media Facilitates Communities to Respond to Disaster

Social media also makes it easier for people to respond to disasters. This is one of them shown up through the Safety Check feature. With this feature, Facebook users who are around the disaster area can tell each other their condition.

In addition, various other social media platforms also become a bridge of communication during the disaster, including a channel of communication to provide assistance.

Here are 3 ways to prevent Hater on the Internet

Haters gonna hate or haters will still hate, this expression is quite often heard in the realm of the internet. It’s not a secret as the development of social networking, a message to evoke an emotional response or anger, many scattered on the internet.

The sender of the message is often referred to as a hater on the internet. The hater attacks anyone who does not like. They do not even mind using a real identity to attack.

In addition to damaging the image of others, the other purpose of the hater is to get attention. Even when you respond to the negative message with a joke, they remain happy. That is, they managed to attract attention.

It’s hard to stop the hater. The likelihood of the one-and-only way to prevent online hatred is to follow the classic advice that says, “do not do, say and be anything”.

You can not predict when it will be a target hater. However, there are a number of simple steps to overcome the hate.

1. Do not Response

Never respond to any messages sent by the hater, even if you politely deliver them. Ignore them. When nobody responds, they usually get bored and leave.

It is not an easy matter to ignore negative messages about you, especially if spread widely on the internet and can be read by others. If you include people who are hard to resist anger, you should take a break from the virtual world. Do that as often as possible if the hater keeps poking around with their messages.

2. Delete Negative Comments

If hater continuously sends messages on social media accounts like Facebook, YouTube or blogs, the simplest solution is to delete the comment. Especially if the messages are related to violence, sexism, racism or homophobia.

Treat hater in your online space like in offline world. If they do not appreciate, then you can stay away.

3. Block Hater Account

Controlling conversations on social media is not an easy matter. If many comments are out of control, you should block those accounts that are considered annoying.

Blocking a hater account is a surefire way, if they keep twittering about the annoying negative things. Because surely no one wants to be cursed every day, right?

The three ways above you can follow, if the hater continues to interfere with their various negative comments.

Beware of Hackers When Using WiFi Hotel

When staying at the hotel, we are often given free Wi-Fi facilities. However, the easy Wi-Fi hacking needs to be a concern. Not infrequently the crime is done because of weakness of Wi-Fi protection.

Is The DarkHotel, a hacker group that has been around for more than 10 years. Recently, they brought the latest malware threat named Inexsmar.

DarkHotel is selective in choosing targets. Various important people such as company officials, politicians to CEOs can be victims. DarkHorse uses phishing, a hoax for the purpose of stealing a target account.

This attack is done gradually. Initially, Wi-Fi networks will be hacked. DarkHorse takes advantage of weak Wi-Fi server security to gain access to hotel infrastructure. After that, they send a fake email made in such a way that the target sure the email is secure.

In fact, the email contains an archive that started the Trojan download. However, the download is done periodically so as not to arouse suspicion. Microsoft Word files can be open to distract the target from the Trojan.

One senior Bitdefender analyst, Bogdan Botezatu, said that hackers send emails with extreme caution, and are sent to one person at a time.

Unfortunately, DarkHotel covered his tracks so well that the researchers could not detect who and what their goals were.

Simple Technological Strategies That Will Optimize Your Company’s Growth

If you’re serious about making your organization as successful as possible, be sure to tap into the power of using technological strategies to facilitate company growth. Luckily, there are hundreds of tech-based products, services, and strategies you can use to make organizational expansion happen. Here are three of them:

1. Utilize Time Tracking Software.

One great technological strategy that can keep your organization on the road to perpetual growth is utilizing time tracking software. This software is incredible because it will empower you to organize and expedite the process of recording the number of hours that your employees have worked. Companies like Timesheet Portal are pleased to provide clients with the cutting edge software they need to move their organizations forward. To ensure that you locate the right time tracking company, make sure that you do background research on the retailer. One great resource you can use to determine whether the organization in question will offer high quality products and services is online reviews.

2. Build A Strong Online Presence.

In addition to utilizing time tracking software, make sure that you focus on building a strong online presence. This technique is empowering because it will enable you to communicate with your target audience in an incredibly immediate, organic manner. While traditional modes of advertising like brochures and print ads can be effective, they don’t permit you to engage prospective clients and current customers with this type of ongoing immediacy. Some of the online marketing strategies that you can use to build a substantive internet presence include:

  • content marketing
  • web design and development
  • search engine optimization
  • email marketing
  • responsive web design
  • social media optimization
  • online reputation management

3. Buy Company Products And Services Online.

One final tech-based strategy that can really push your organization forward is buying company products and services online. This approach is empowering because it will save you the time you might otherwise have spent driving to a physical store, fighting off aggressive sales representatives, and standing in long checkout lines. An added benefit of buying products and services online is that many retailers offer clients a substantive discount when they make purchases via the company website.

Start Growing Your Company Now!

Business owners who want to keep their organizations growing should know that using tech-based strategies can help them realize the objective. You can use some or all of the tips and techniques outlined above to ensure that your organization continues to grow and thrive this year!

Tips to prevent hacking of Facebook

Hacking on social networks is not new, up one. Lately, Facebook user accounts are often targeted for fraudulent purposes.

Various methods are carried out by cyber criminals in order to take over one’s own account, including through the confirmation code change Facebook password is sent via SMS.

But in fact, Facebook has introduced a service called Log Approval alias entry permits since 2011. The aim is to prevent hacking by cyber criminals.

Andrew Song, Product Manager of Facebook said, “Facebook is always working to keep your account and information belonging to users. Users will also be given more control over their account.”

This service departs from the increasing number of people who use Facebook, whether for business or interconnected with others, users need a control to protect their accounts from unauthorized access.

Login Approvals is a two-factor authentication system that requires users to enter a code that is sent up to the user’s mobile phone number via SMS. With that code, then the user has successfully logged into the new device.

Once you enter this security code, you have the option to remember passwords in a computer (or device), so you do not need to do this step again in order to login.

With Login Approvals, users will get a notification if one of his Facebook account login from an unknown device. If it turns out the user does not perform the login process, they are allowed to change your Facebook password.

Therefore, cyber criminals will not be able to sign in to your account and you would not be losing money.

Well, if you ever lose your phone and Login Approvals-enabled, you still have another option to authorize your account from the account login information is still stored on the device, for example, you are still logged on Facebook via a home computer. With the extant accounts, Facebook make sure you can regain access to your Facebook account.

It is important to remember that an SMS containing the licensing code Login Approvals is private, so please do not tell anyone else who asks.