Cyber ​​security expert John McAfee was the victim of hacking

The people who become victims of hacking are usually those who do not pay attention to the security of the device.

But this isn’t entirely true, the article recently a pioneer in the field of cyber security named John McAfee claimed to have hacked his smartphone and hijacked his Twitter account.

The 72-year-old said his Twitter account was hacked and used to promote an unpopular crypto-currency currency.

Twitter is reluctant to comment on the hack, but the micro-blogging site has a two-factor authentication security feature. Namely, in addition to logging in, one must enter the code sent to the smartphone to be able to access their Twitter account.

Unfortunately, McAfee says its smartphone has been hacked to allow hackers to hijack their millik Twitter accounts.

“The indication, my smartphone hacked and the perpetrators see the authentication code,” he said.

He added, that’s when McAfee realized that his smartphone has been hacked hackers.

“I was on the ship at the time and could not come to the operator booth to stop the hacking, the culprit broke into my Twitter account, and maybe worse,” he said.

Just known, this time McAfee is developing an anti-hacker phone. Possible smartphone that claimed could not be hacked this will be released February 2018.

AntiVirus McAfee VirusScan

McAfee is not a new person in the cyber security world. In the 1980s, McAfee founded a company that released the first antivirus software, McAfee VirusScan, which was quite successful in the market.

Although the business has been sold to Intel, McAfee is still developing its own cybersecurity products.

The Scottish-born man is also the leader of Bitcoin mining operations, MGT Capital Investment, which solves complicated mathematical problems to verify transactions in virtual currency.

Founder of Vine is ready to launch new app

In 2012, Twitter officially acquired a short video service called Vine, and spawned short video trends across social media platforms.

Thanks to the popularity of the service, Vine loyal users have suddenly turned into internet celebrities. But in 2016, Twitter finally announced it would shut down the Vine, and realized the plan officially closed it in early 2017.

But the good news is the co-founder of Vine, Dom Hofmann is working on a new project as a continuation of the close of the Vine earlier this year.

“After officially closed the Vine, I developed something as an extension of the short video sharing service,” Dom said.

He added that the new project is being funded by himself. Unfortunately, Dom is still reluctant to reveal more details about what he’s working on.

Although the Vine has disappeared, some of today’s social media platforms are ‘adopted’ adopting a format similar to the Vine. Examples are Snap (Snapchat Stories) and Facebook (Messenger, Instagram, and WhatsApp).

It was only a matter of time until Dom finally revealed what the project was doing. Will this new project take care of the success of the Vine?

Twitter Close Vine

On January 17, 2017, Twitter officially closed the Vine short video service. Even so, the company also clarified that it will continue to maintain video services through the Vine Camera app.

Consequently, users can still take short-form videos but can only be uploaded to Twitter, no longer available to the Vine app.

Despite being hacked, Twitter invites users to download the videos they have uploaded on Vine before the app is renamed Vine Camera.

Vine Camera can record video for 6 seconds. The 6-second video has the ability to rotate automatically, as in the Vine app before it is closed.

In his blog upload, Twitter notes that the videos that have been uploaded in the Vine app will not be lost, but can still be watched through the vine.net site

Vine Acquired Twitter

Vine himself debuted first in 2013 as a simple social network to record 6-second videos that can continue to be played back automatically. Twitter previously bought the Vine app in 2012 because it believes the platform will support its services.

At that time, the acquisition value of Vine by Twitter amounted to US $ 30 million before the application was launched.

Vine is quite successful into an entertaining platform. Unfortunately, the application is considered poor in innovation, so it is unable to compete with Snapchat and Musical.ly.

Subsequently in October 2016, Twitter announced the Vine service will be closed. Shortly after Twitter announced the closing of the Vine, founder Vine Rus Yusupov summarized his opinion, “do not sell your company!”

5 Things to watch out for before buying a new phone

Having a new phone that has been equipped with the latest features and technology is the desire of many people. Only, there are some considerations that must be considered first.

The number of phones released in the adjacent time would make many confused parties to make choices.

Instead of getting a mobile phone as needed, buyers sometimes get stuck with too expensive a price for a feature that ‘austerity’. Before reaching in, there are some things like quoting Phones Review that could be your consideration.

1. Resilience

The quality of mobile phone material can be a consideration before you buy it. Make sure you buy a mobile from a familiar brand.

In addition, you can also search penilain from reviews about the phone being targeted. Objective assessment can help you determine how well a phone is holding.

2. Screen Size

The dimensions of the screen can be fitted in the grip can be one consideration before buying a mobile phone. When choosing a phone with a big screen, make sure you are comfortable using it.

If the phone is about to be used to work to capture photos and videos, you’ll want to choose a phone with a screen and high resolution.

3. Performance

Performance is no longer just a figment for the latest generation of smart phones. Multitasking requires that the phone has a fast processor that accommodates the needs of playing games, featuring documents and large-capacity media.

Processor speed also affects operating system and interface.

4. Camera

Camera features have become an integral part of a smart phone today. If you like capturing moments to upload via Instagram, the camera should be your primary consideration.

Conversely, if just for the needs of swafoto, you can also find which phone can accommodate it. For information, the size of the camera resolution does not guarantee the best picture quality is best.

5. Battery life

Long-lasting batteries can help you use them as long as you need them. A good quality mobile battery should last for a full day.

5 Social Media Facts That Changed the World

According to data published by We Are Social, of 7.4 billion inhabitants of the earth, 3.7 billion have been connected to the internet. Of the number of Internet users, billions of people are accessing social media every day. This number is reportedly increasing.

By 2018, an estimated number of social media users will reach 2.44 billion.

Social media is used for many things in life, such as connecting with others, entertainment, networking with colleagues and college friends.

The use of social media does not only change the way people communicate, but also change people doing business, change government communication, and change people’s lives.

Here are five observations and predictions from experts from the Global Agenda Council on the fact that social media has changed the world:

1. Must have social media

Social media now seems obligatory. According to Claire Wardle of the Digital Journalism Determination Center, in the past seven years, social media has changed things. For example, social media is used for digital marketing or communication channels for customer service.

Various industries have used social media for business purposes. Therefore, it feels social media so it is mandatory to have.

2. Social Media Platform Make Easy Banking

Social media becomes a platform that is also used in the banking sector. Just as above, social media is changing the way of communication in the banking world. Starting from improving customer service to allow users to transfer money through online platform.

Not only that, financial technology companies also use social media to help others open accounts. In fact, social media can also make it easier for someone to get a loan.

3. Social Media Help with Health Services

The health industry is also one that is helped by social media. For example, public health campaigns can be done through social media or virtual doctor visits can be done in the Skype service.

Social media can also help patients stay connected to those who can answer their questions about health. “Social media has done well in the health of a person or society, especially getting people to share information quickly,” said Lee Aase of the Mayo Clinic Center for Social Media and Social Media Network.

However, social media can also be bad. For example when a non-expert person shares health information with others. Therefore, according to him, health agencies need to make plans to respond and overcome if there is less accurate information about health, especially through social media.

4. Social Media Changing Government Communication with Citizens

The participation and involvement of civilians in social media has been the source of ideas, plans, and initiatives for the government. Through social media too, many regional leaders communicate and embrace their citizens. In addition, they also make government more transparent.

In fact, there is now a platform created specifically to provide input or report directly to the local government, Qlue one of them.

5. Social Media Facilitates Communities to Respond to Disaster

Social media also makes it easier for people to respond to disasters. This is one of them shown up through the Safety Check feature. With this feature, Facebook users who are around the disaster area can tell each other their condition.

In addition, various other social media platforms also become a bridge of communication during the disaster, including a channel of communication to provide assistance.

Here are 3 ways to prevent Hater on the Internet

Haters gonna hate or haters will still hate, this expression is quite often heard in the realm of the internet. It’s not a secret as the development of social networking, a message to evoke an emotional response or anger, many scattered on the internet.

The sender of the message is often referred to as a hater on the internet. The hater attacks anyone who does not like. They do not even mind using a real identity to attack.

In addition to damaging the image of others, the other purpose of the hater is to get attention. Even when you respond to the negative message with a joke, they remain happy. That is, they managed to attract attention.

It’s hard to stop the hater. The likelihood of the one-and-only way to prevent online hatred is to follow the classic advice that says, “do not do, say and be anything”.

You can not predict when it will be a target hater. However, there are a number of simple steps to overcome the hate.

1. Do not Response

Never respond to any messages sent by the hater, even if you politely deliver them. Ignore them. When nobody responds, they usually get bored and leave.

It is not an easy matter to ignore negative messages about you, especially if spread widely on the internet and can be read by others. If you include people who are hard to resist anger, you should take a break from the virtual world. Do that as often as possible if the hater keeps poking around with their messages.

2. Delete Negative Comments

If hater continuously sends messages on social media accounts like Facebook, YouTube or blogs, the simplest solution is to delete the comment. Especially if the messages are related to violence, sexism, racism or homophobia.

Treat hater in your online space like in offline world. If they do not appreciate, then you can stay away.

3. Block Hater Account

Controlling conversations on social media is not an easy matter. If many comments are out of control, you should block those accounts that are considered annoying.

Blocking a hater account is a surefire way, if they keep twittering about the annoying negative things. Because surely no one wants to be cursed every day, right?

The three ways above you can follow, if the hater continues to interfere with their various negative comments.

How to Secure Personal Documents and Folders

Users of smartphones, tablets, laptops, or computers have personal files that surely can not be opened by others. But not infrequently our device, where the file was stored, could have borrowed someone else.

Not the intention of worse suspect, it could be someone who borrowed our device to open our personal files, whether it is intentional or not. So, we should take anticipatory steps to secure the file.

For that, consider how to secure files from others following.

1. Documents

If the file is a Microsoft Word document, we can use the password encryption feature available in Microsoft Word.

The trick is very easy. The feature can be found in the File menu> Info> Protect Document> Encrypt with Password. Type the password that will be used to access the document.

There are usually two options, whether a password is required to open a document in read-only mode, or a password is also required to open a document and make edits. Just choose according to your needs.

A similar method applies to other popular document files such as PDF, Excel, and so on.

2. Archive

If your personal files consist of one or more files, with multiple formats, from music, pictures, videos, documents, and so on in the same folder, you can secure it in one simple step using the archive program. One of the archive programs you can choose is 7-Zip.

After the program is installed on your laptop, right-click on the folder or file you want to give protection, then select 7-Zip> Add to Archive.

Next select the archive format you want and type in the password you will need to open the file or folder and select OK. Done, now your folder or file has been archived and secured with password.

Beware of Hackers When Using WiFi Hotel

When staying at the hotel, we are often given free Wi-Fi facilities. However, the easy Wi-Fi hacking needs to be a concern. Not infrequently the crime is done because of weakness of Wi-Fi protection.

Is The DarkHotel, a hacker group that has been around for more than 10 years. Recently, they brought the latest malware threat named Inexsmar.

DarkHotel is selective in choosing targets. Various important people such as company officials, politicians to CEOs can be victims. DarkHorse uses phishing, a hoax for the purpose of stealing a target account.

This attack is done gradually. Initially, Wi-Fi networks will be hacked. DarkHorse takes advantage of weak Wi-Fi server security to gain access to hotel infrastructure. After that, they send a fake email made in such a way that the target sure the email is secure.

In fact, the email contains an archive that started the Trojan download. However, the download is done periodically so as not to arouse suspicion. Microsoft Word files can be open to distract the target from the Trojan.

One senior Bitdefender analyst, Bogdan Botezatu, said that hackers send emails with extreme caution, and are sent to one person at a time.

Unfortunately, DarkHotel covered his tracks so well that the researchers could not detect who and what their goals were.