Tips to take advantage of some unique features WhatsApp

WhatsApp is the most popular messaging service application on a mobile platform. For those users WhatsApp, you need to know the features that exist in the messaging application.

Shortcut conversation friend

When a user is intense enough to communicate with someone via WhatsApp and sometimes need to quickly reach them, then the user can use the shortcut features. How, in the column Chats, find friends who elected.

Then touch screen or hold the friend until the option at the top right of the screen, click on the option and find the ‘Add chat shortcut’. Now your friends will appear in the form icon in the row of application icons on the home of your Android phone.

Turning off the mark has been read

Users can see a blue tick on the side of the message, which indicates that the message has been read by the recipient. A user may not want others to know that the message has been read. How, go to Settings, select Account, then Privacy. Now users can remove the tick in the Read Receipts.

Use text effects to the message

When users want to add some effects such as bold text, then the user can type *test*. Meanwhile, to make the text italic, user type _test_. In fact, users can also do both as * _test _ *.

Sharing status to a specific person

Status feature with a photo or a new video released WhatsApp some time ago. When users only want certain people can see that status, then the user can follow the steps below.

First, open the application WhatsApp. Then, select ‘Status’ at the top of the screen, right next to the ‘Chats’. After that, select the three dots in the upper right corner. Select the privacy status, if you just want to share the status of a particular person, it can choose ‘Only share with’.

Change font size

If users want to change the font size to be small or large, then the user can enter Settings, then go to Chats, and then select Font Size. Now select the desired font size.

Ransomware: A Complex Threat for Cyber Security Professionals

In societies today where there are development and advancement, there also are those opposed to progress who seek to destroy growth and gratify themselves at all costs. So it is in today’s digital world. Hackers and cyber criminals have developed a variety of harmful techniques to invade and take control of all manner of digital information. There are several main threats currently, but one of the most dangerous—and dramatic—of these is the rise of complex ransomware.

Ransomware Basics

Ransomware is, as the name implies, a specific type of malware that attackers use to encrypt data, lock systems, or lock files until victims make a demanded payment. Some types of this malware may install and lock pornography onto victims’ screens, while others add time pressure by telling victims a piece of data will be destroyed every 30 minutes until they make payment. Sometimes cyber criminals ask for minimal payments in widespread spam-based strikes, but they also target executives and others in positions of authority through laser-precise spear phishing attacks.

Protection From Ransomware

A professional line of defense against ransomware is called cyber security. It is a grouping of processes, techniques, and practices developed and used to protect digital networks, computers, programs, and information from unauthorized entry, attack, and damage or destruction.  The need for professionals in this field is growing quickly because even as new digital advancements are made, cyber criminals are developing new ways to attack and exploit them.

Experts in cyber security need a strong understanding in a number of different areas to effectively strike back against ransomware and maintain the integrity of digital networks and data. Topics may include insights into the current security environment, as it changes quite quickly; cyber criminal mentality and methods; and the most common digital targets. Cyber security professionals must also be proactive and look ahead as they can, since attacks are sudden and intricate.

The Rise of the Cyber Security Professional

As the likelihood of ransomware threats rises, cyber security professionals are in demand in numerous industries ranging from business to computer security firms to the highest levels of government. A number of educational programs for those wishing to enter this dynamic, expanding field are now in place. Cyber security studies include bachelor and master degrees as well as high-level certificates. The field’s dynamic growth and the potential for a large salary attract many to this industry. Review this infographic to better understand what cyber security education can do for career advancement.

Demand for Cyber Security

As ransomware grows more complex, and as cyber criminals become bolder, more advanced, greedier, and more malicious, demand for trained cyber security professionals is rising in all fields and areas of society. Ransomware, though it is popular and has proved lucrative for cyber criminals, is only one in an army of growing threats posed to digital systems and data. Opportunities abound for would-be cyber security experts. Cyber security professionals, through solid educational programs, are trained to provide defense now against cyber attacks as well as plan for future prevention of cyber crime.

Ransomware is the modern method of kidnapping. With it, attackers encrypt and lock data and programs until victims meet payment demands. Cyber security professionals work to combat cyber crime from ransomware and also other types of attacks. The demand for these experts will only grow in the foreseeable future.

Building a loyal customer in Online Business

When selecting a product in the online media, customers have a choice. Because there are many online shopping sites that offer a variety of discounts. Including e-commerce as large as Amazon and Alibaba offers a lot of promo.

In the end, businesses are confused how to make customers loyal alias build customer loyalty. Here are tips that can help you build customer loyalty:

– Provide clear information on your products

When you visit the website customers to shop, he’ll see the details for the products that you sell. If you are able to give a clear and detailed explanation will give yourself the added value of the customer.

You can add a description of products in the website content. Additionally, you can also use the live chat facility between the customer and admin. That would enable customers when asked.

– Provide support to customers

Customers expect to have a pleasant experience while shopping. For that, you need to provide support or services to customers, for example by giving the customer service number.

When there is a problem, the customer wants to hear. When have questions, customers want to get the answer right away, but not only from recordings. But really customer service is ready to serve.

– Understand consumers

The basic thing that you need to have is you have to understand your customers. What are their needs, what desire, what is to be purchased, the customer why you bought it. It must understand.

Each customer must have had different needs. It would be easy to create loyal customers when you can understand what the needs of the customer.

– Incentives

Having new customers is important, but serve existing customers is one that should not be forgotten. One way to keep your customers is to provide incentives.

You can only give free shipping to special deals for those who often buy your product. Simple things like this can make customers come back and buy your product.

Hacker selling 126 million US mobile users’ data

Hundreds of millions of mobile users in the database of the United States (US) sold freely on the website Dark Web. Worse, the database is stolen by the same vendor who stole billions of internet users in China account.

Databases are sold containing the personal information of 126 million Americans who are subscribers United States Cellular Corporation (U.S Cellular),

U.S Cellular itself a telecommunications network operator with the fifth largest in the United States which has 4.9 million users spread across 426 territories in 23 US states.

The database itself contains personal information, such as full name, address, telephone number of 126 761 168 subscribers. Meanwhile, the price set for the database it is Bitcoin 0.5497 (equivalent to US $ 500).

In other words, anyone who has access to this database can scan and check the phone number of the millions of US citizens. Party Hack Read yourself trying to confirm to the management U.S Cellular that attempts to break access. However, the company has not responded

This is not the first time the US public personal data is sold on the internet. Last year. DataDirect sell unscrupulous hacker full access to the voter registration database (voter) US to the free market.

Personal data of 80,000 netizens hostage hacker

Ransomware become one of the threats to watch out for in 2016, because this attack is very beneficial for hackers. Since April 2016, Kaspersky Lab has detected CryptXXX ransomware attacks against at least 80,000 netizens worldwide.

More than half are located in six countries: the United States, Russia, Germany, Japan, India, and Canada. However, these statistics are based on the users who have been protected by Kaspersky Lab detection technologies.

The worrying thing is the actual number of total users attacked by ransomware the perpetrator is certainly much higher.

The real figure is unknown, but experts Kaspersky Lab estimates that there may be a few hundred thousand users were infected.

Ransomware CryptXXX has the ability to infect thousands of PCs around the world and previously was not possible to fully decrypt files that are victims of this malicious program. However, now it is not an impossible thing.

To avoid attacks ransomware, Kaspersky Lab’s security experts suggest, if there is currently no decryption tools are available for versions of malware that encrypts files, never pay ransom to the hacker.

Keep the corrupt file and be patient. Probability decryption tools that appear in the near future is quite high. Kaspersky CryptXXX v.3 consider the case as proof of this suggestion. Some security specialists around the world are working hard to help victims of ransomware. Sooner or later the solution to most of ransomware victims would be found.

Suggestions from other Kaspersky Lab is proactively protect themselves from the outset. You do this by backing up data regularly on portable data storage media that is not constantly connected to the computer all the time.

Then install a good security solution. According to recent independent study showed that Kaspersky Internet Security is very good at detecting ransomware.

To note, after releasing the tool descriptions for the two variants of ransomware CryptXXX in April and May 2016, Kaspersky Lab again released a new decryptor for the encrypted files by the latest version of the malware’s various hostage-takers.

Twitter Users Can Edit Tweet Typo

Error tweet on Twitter is not corrected. The only way to do a Twitter user is deleting the tweet and replaced it with a new one.

But thanks to new editing features, you can edit a nudge that typo. This feature will reportedly appear immediately after Twitter CEO Jack Dorsey asked users about what features they most want, last week.

In a tweet, Jack admitted that demand is the most widely requested. Yes, the edit feature (tweet) is definitely required. But for everyone, not just (for) users with badges (verified).

But until now, Twitter has not offered the edit button. One reason is to ensure the tweet that is embedded in the website does not change in the future.

This new feature allows users to make edits in a short time, and ensure tweet corrected unchanged in the long term.

Not only that, Twitter is considering bookmark features, a better conversation, enhanced security, reporting to bullying, and multiple timelines based personalization.

For information, Twitter also recently launched a feature that allows users to share live broadcasts in 360 degree video. This feature also applies to users who do so out of Periscope.

5 Features Google secrets you need to know

Did you know Google has a number of useful features that are rarely known to many people? Yes, these features have enough functionality to help and entertain users.

For the record, these features can only be used with the Google Chrome browser and is recommended for use on the desktop.

I use them quite easily. The following 5 features Google’s highly confidential help everyday users.

1. Timer

Google search field can also function as a timer. To activate the timer, go to the Google search field, then type “timer … hours”.

For example, if you want to activate the timer feature in four hours, type “timer 4 hours” in the search field. Once you tap the magnifying glass icon, search results will display timer.

2. Google Chrome and Lego

You can build a Lego in the Google Chrome browser. Moving into www.buildwithchrome.com and you can build a lego building in multiple regions spread across the world map.

3. Number Speaker

If you are confused with pronunciation of the numbers in English, you can put the score she wanted to say in the search field by adding ‘= english’.

For example, if you want to know how the pronunciation of the numbers 575 877, 575 877 = english writing in the search field.

4. Google Sky

You can also fly across the atmosphere and the solar system by using Google Sky.

Yes, Google Sky is Google Maps for outer space. This feature allows users to find information about planets, stars, galaxies and all the words that exist in the solar system.

5. Find Font Site

In Google Chrome, you can change the font of the site you want to visit. It’s easy, go to www.google.com/fonts and select the font you want to change. You can collect your favorite fonts into collections.