Wednesday, 25 February 2015

iOS most vulnerable and Windows less vulnerable:Reports 2014

Surprised isn't it?But this is true.iOS is the most vulnerable operating system according to a report by US National Vulnerability Database(NVD).
As per the report, OS X leads the list followed by iOS, Linux, Microsoft Windows Server 2008, Windows 7, Windows Server 2012, Windows 8, Windows 8.1, Windows Vista, and Windows RT.Its also been noted that 7,038 new vulnerabilities were added last year, which results in 19 new vulnerabilities per day.
Analysis say that of the 7,038 vulnerabilities,almost 80% of them come from the third party application installed in the iOS device,13% from the OS and the remaining from the hardware.OS X was found to have the lion's share of vulnerabilities in 2014, with 147, while iOS had 127, Linux had 119, and the first Windows version on the list, Windows Server 2008, had 38, and Windows 7 had 36.

Sunday, 22 February 2015

Updated Windows Defender can now remove the Superfish Adware

 

Recently,Lenevo came under heavy fire for installing the Superfish software-a software(adware) that compromises the security of the device(laptop), in some of its laptops.The adware tampers the system's official certificates for websites used by it to detect the fake websites.This way,it can hijack the HTTPS connections on the affected laptops making it vulnerable to the hackers.
Although the company apologized for this major flaw,Microsoft did not stop itself from securing the devices and leaving it to lenevo as it released an update to Windows Defender.The new update not only removes the superfish from the affected devices,but also erases the self-signed certificate that the adware used to compromise the encrypted Internet traffic of the computer.
One thing to note is that Windows Defender is automatically disabled when a third-party antivirus software is installed, which is a concession made by Microsoft to vendors of antivirus programs and to computer manufacturers. Computer companies are paid whenever users upgrade the trial versions of antivirus software, and if Windows Defender was active, then no such thing will probably happen.

Friday, 20 February 2015

Windows 10 vs Windows 8

Windows 8 has definitely proved costly for Microsoft.Because of its major bugs,many users lost their faith in it.Now,its up-to Microsoft to regain the faith from its users and it looks like Windows 10 would do it.Due to the polarizing nature of Windows 8,Microsoft has made big changes for Windows 10 to appeal the traditional users.
First thing is the Start Screen.Anyone who uses(used) Windows 8 knows that start screen is good for a touch screen device.Therefore, the Start screen in Windows 10 will be designed mostly to tablets while desktop users will get their full Start menu back, which is just what they’ve been asking for.
Another thing from Windows 8 is the Charms Menu.Many Windows 8 users found it very difficult to use the Charms Menu.Its clear that Microsoft would keep the Charms Menu for the touch screen devices.
Charms Menu was definitely charming for Windows 8

On the whole,Microsoft has done a great job by listening to the concerns of the Windows users.So,Windows 10 is definitely going to be promising release by Microsoft.
 

Wednesday, 18 February 2015

Microsoft's baffling move on Windows 10

Recently,Microsoft released the Windows 10 tech preview to the users and I am sure that everybody knows about it.Here is an article by forbes.
Article:Microsoft's baffling move

Friday, 13 February 2015

Microsoft fixes a major bug after 15 years

Computer bugs and glitches lets the hackers to have an access of your system.One such bug has been fixed by Microsoft after a whooping 15 years.The flaw named as "Jasbug" wherein computer access files on a network.If you guys are using your computer or a laptop in a public network like the public wifi,nearby hackers can spy on you and thus exploit your device.
Finally,you are safe.!!!

Luckily,none of the hackers has ever succeeded in finding out the flaw and then using it to exploit a device.Microsoft (MSFT, Tech30) deemed the severity of this "critical." It even warranted an alert from the Department of Homeland Security, and similar warnings from major cybersecurity companies. 
This bug could affect anything from the Windows Vista to the present Windows 8.1.At last,this serious bug which could prove fatal has been fixed.

Wednesday, 11 February 2015

Internet.org comes to India

Can anyone imagine free internet for anyone??Yes, Facebook's Internet.org program will make it for you.After its successful program in Africa and Indonesia,Internet.org will now be available in India.

Facebook in association with Reliance Communications has launched the Internet.org program in India with the aim to launch "zero bandwidth content".With this,people having the Reliance network will have a free access to the internet.
To use Internet.org,you must be a Reliance Communications customer in Maharashtra,Mumbai,Kerala,Tamil Nadu,Andra Pradesh or Gujarat.Although,customers in these circles can use it,the target of the program is for the non-data plan users(almost 70% of the people) and having said that Internet.org will be accessible within the next 90 days.
So how does this really work?Internet.org will give a free access to 40 websites to the Reliance Users including the Wikipedia.So,to access these websites,you will need to have a Reliance connection in your device.If you're on an Android device, you can also access the 'whitelisted' sites via the Internet.org app - there's no app for iOS or Windows Phone yet. If you try to access a site that isn't a partner with Internet.org, you're charged for the data used. So, for example, a Bing search can be used to look up information, but opening one of the search results will cost you money. You are given a warning before leaving free access.

Sunday, 8 February 2015

Are android phones safe?

When it come to the privacy of a person, it must not be compromised.But android phones have had this loophole since many days.The place you travel is also being tracked.
In the TEDx talk,Bram Bonné mentioned explained on how continuously android phone on the wifi networks that are saved in your device.For example,if you connect to a free wifi network(hotspot)-like the Mcdonalds,a spoof network will be created and once this is done,the networks that your phone has been saved or previously connected will be visible to them.
Here is a video of Bonné addressing at the TEDx.