5 SECONDS OF SUMMER

Michael Clifford Fires Back at Abigail Breslin's Diss Track

Stars Most Stylish Selfie of the Week

Stars Most Stylish Selfie of the Week

GMAIL BLOCKED IN CHINA

5-Minute Outfit Idea

5-Minute Outfit Idea: An Effortless, Polished Look to Try This Weekend.

Facebook suffers outage

Facebook suffers outage affecting users worldwide!! .

Sunday, 14 September 2014

Apple gets a failing grade for Canadian geography

Apple gets a failing grade for Canadian geography

Reuters


Geography has again stumped Apple Inc, with the technology company mixing up and relocating both Canada's largest city and its national capital on a map showing when different parts of the country can expect new iPhone deliveries.

Not only did Apple's Canadian website misplace Toronto and Ottawa, it incorrectly placed Edmonton west of Calgary, and missed the apostrophe in St. John's, screen grabs from local media showed. The offending map was quickly removed.
The error prompted a new round of light-hearted digs at the Apple, which has a history of getting lost with its maps.

"You would think they could've asked Siri for help with that," said Twitter user Jennifer Hoegg, referring to Apple's voice-recognition software.

The latest snafu echoes the launch of Apple Maps, which replaced Google Maps as the default mapping application in 2012 to a chorus of complaints over errors and omissions.
CEO Tim Cook quickly apologized for those problems at the time and took the unusual step of recommending rival services.

The Canadian mishap was unfortunate on the day the smartphone and computer company began taking pre-orders for its iPhone 6 models, which quickly outpaced supply, especially for the Plus version with a larger screen.

Customers might have to wait three to four weeks to get their hands on the iPhone 6 Plus, while most versions of the smaller iPhone 6 should ship between 7 and 10 business days. 

What to Do If You’ve Been Hacked (and How to Prevent It)

What to Do If You’ve Been Hacked (and How to Prevent It)

Bonnie Cha
Re/code 

The recent celebrity hacking incident and Home Depot data breach may have you worried about your online security, and rightly so. As we bring more aspects of our lives online – social, shopping, banking, storage — the risks of cyber crime increase. But there are ways you can better protect yourself.
In this guide, I’ll outline some steps you can take to safeguard your various Web accounts and devices. The recommendations come from several Internet security experts I spoke with, including Laura Iwan, senior vice president of programs at the Center for Internet Security, Sean Sullivan, security advisor at F-Secure (an anti-virus and online security solution provider), and Timo Hiroven, senior researcher at F-Secure. There are also tips on how to detect if you’ve been hacked and what to do about it.

De-fense! De-fense!
There are numerous precautions that you can take in order to protect yourself from hackers. One of the easiest and most simple ways is to create strong, unique passwords for every one of your accounts. Yet, most people don’t.
While it’s tempting to use something like your child’s name and birthday because it’s easier to remember, creating a password with a random mix of upper- and lower-case letters, numbers and characters will be harder to crack.


There are password apps like LastPass and 1Password that can help you with this by generating strong passcodes for each of your accounts. Plus, they’ll keep track of them all. When choosing such a program, Iwan recommends that you look for one that uses an industry-accepted standard for encryption like AES (Advanced Encryption Standard), and one that stores your passwords locally on your computer, rather than in the cloud.
Another safety measure you should take is to enable two-factor authentication when available. Two-factor authentication requires a user to provide an extra form of identification beyond just your login ID and password. This may be a special PIN code that’s sent to your phone, a physical token like a key fob or your fingerprint.

Two-factor authentication isn’t impervious to attacks, but it does add an extra layer of protection. Many popular Web services, including Gmail, Microsoft, Apple, Twitter, Facebook, and Dropbox offer two-factor authentication, so take the extra few minutes to turn it on.
Next, be suspicious of emails asking for personal information. A lot of hackers use a method called phishing that aims to gather sensitive data from you by sending an email that looks like its from a legitimate entity like your bank or credit card company. Some signs of a scam might be requests for immediate action, spelling and grammar mistakes, and suspicious links. Do not respond to these. Instead, call up the institution that supposedly sent the email and confirm if it’s legit or alert them to the issue.


Also, it should go without saying but in general, don’t click on suspicious links or browse unsafe website. Only install applications that come from trusted, well-known sources. And be sure that the operating system and apps on your computers and mobile devices are updated with the latest versions and patches.

Here are some more specific tips for different Internet activities:
Email and social accounts
  • Think twice about what you post to your social networks, and monitor what others are posting about you. There’s a chance that hackers might use your social profile pages to gather personal information about you and try to guess your password or answers to your secret question.
  • Related to that, check your account’s privacy settings to make sure you’re only sharing information with your friends and not the public.
  • Sullivan also recommends creating separate email addresses for your personal communication and everything else. For example, you might use a throwaway email address for news websites that you make you register with a user name and password, or retailers who want to send you coupons.
Cloud accounts
  • If you back up your files to the cloud, remember that even though you delete them on your computer or mobile device, they’re still stored in your cloud account. To completely delete the file, you’ll also need to remove it from your backup cloud account.
Online transactions
  • Don’t use public computers or public Wi-Fi networks to make any transactions. The machines might contain malicious software that can collect your credit card information, and criminals could also be monitoring public Wi-Fi networks for similar information.
Web browsing
  • Don’t respond to pop-up windows.
  • Secure your home Wi-Fi network using WPA-2 with AES encryption settings. There’s a good tutorial on how to do that here.
  • Set your Web browser to auto-update to ensure that you’re running the most current version.
Know the signs
How do you if you’ve been hacked? There may be some obvious signs. For example, you may start getting emails from your friends saying they received a strange message from your email account. Or your bank or credit card company might call you about some suspicious activity on your account. If you installed a mobile app with malware on your smartphone, you might find some unauthorized charges on your phone bill There are other, more subtle indicators. You may find new toolbars installed on your Web browser, or new software on your computer. Your computer may also start behaving strangely or slow to a crawl. These are all signs that you might have been hacked.

I’ve been hacked. Now what?
If you have been hacked, the first thing you should do is reset your passwords. Iwan recommends starting with your email account, followed by your financial and other critical accounts. This is because password resets for all your other accounts are typically sent to your email.
If you’re locked out of your account or blocked from accessing it, many Web services have steps in place so you can get back in. For example, Facebook has a system where you can use a trusted source like a friend to take back your account. Search each service’s help section for specific instructions.
Speaking of friends, you should let your contacts know that you’ve been hacked, and report the issue to the site. Also, run a scan of your computer or mobile device using a trusted and up-to-date anti-virus program.
In the case of identity theft, order a copy of your credit reports and file an initial fraud alert with the three major credit bureaus: Equifax, Experian and TransUnion. Contact your local police and report the identity theft, and request new cards from your bank and credit card companies. You also continue to monitor your monthly statements for any more unusual activity.
Unfortunately, there’s no way to completely eliminate the risk of hack attacks and other cyber crimes. But by taking some safeguards and arming yourself with the knowledge of what actions to take in the event of an attack, you can help better protect yourself and minimize damage.


Colorado High Schooler Invents Smart Gun That Unlocks With Your Fingerprint

Colorado High Schooler Invents Smart Gun That Unlocks With Your Fingerprint

Sarah Buhr
TechCrunch 

Colorado has a history with gun violence so it’s only appropriate that 17-year-old Kai Kloepfer, a high school student from Boulder, would want to apply biometric user authentication to firearms. Kloepfer just won the $50,000 Smart Tech for Firearms Challenge for his smart gun prototype.

Angel investor and gun reform advocate Ron Conway became the main backer of the $1 million Smart Tech prize to spur gun safety solutions earlier this year. “Let’s use innovation to bring about gun safety. Let’s not rely on Washington,” Conway told the SF Examiner in January. According to the Smart Tech Foundation, a total of 15 innovators will receive a part of that million dollar prize. Kloepfer is the first to get the award.

The gun works by creating a user ID and locking in the fingerprint of each user allowed to use the gun. The gun will only unlock with the unique fingerprint of those who have already permission to access the gun. The clearly brainy teen tells me he has an interest in information security. According to him, all user data is kept right on the gun and nothing is uploaded anywhere else so it would be pretty hard to hack. This potentially makes it ideal for military use as well.
Kloepfer came up with the idea two years ago when he needed something for his high school science project. “The idea came to me right as I was falling asleep. It was kinda in the back of my mind because of the shooting,” said Kloepfer, alluding to the Aurora, Colorado shooting that had been on everyone’s mind at the time. The shooting was just an hour’s drive from his home. “I scribbled it down before I went to bed and fell asleep and then in the morning I began my research,” he explained.

Kloepfer’s parents helped him in monetary increments to get the parts needed for each improvement. It would eventually cost $3,000 for the whole thing to come together. “At first it was just a concept on paper,” he tells me. The gun went from phase to phase with each science fair. “Right now it’s a prototype on a plastic model. It's not entirely there but it works,” he says.
Some of the $50,000 has already been used to purchase a 3D printer to create new parts for his prototype. Kloepfer, who will graduate from Fairview High School this year, plans to use the rest of it toward the integration of a fingerprint scanner.

“Every 30 minutes in the U.S. a kid dies from a gun. I want my gun to help reduce accidental deaths and injuries, and to prevent tragedies,” said Kloepfer (Note: 1500 kids die from a gun and many more are seriously injured every year, according to the Center for Injury and Research Policy).
He spoke about his biometric smart gun tech at the TEDx Mile High: CONVERGENCE this week in Denver, Colorado.

Will Apple's digital wallet kill the card swipe?

Will Apple's digital wallet kill the card swipe?

MAE ANDERSON
Associated Press 


NEW YORK — Apple wants the plastic credit card to become as rare as the paper check.
On Tuesday, the company announced Apple Pay, a digital payment system that lets people pay for retail store purchases using their phones rather than cash or credit cards. The service, which will work both with iPhones and Apple's new Watch, is backed by a host of big retailers, along with most major banks and credit card issuers, including Visa, MasterCard and American Express.
So-called contactless payment isn't new. Starbucks, McDonald's, PayPal, Google and Square offer their own services, but only a small portion of customers use them. Some experts believe Apple Pay — with its presence on millions of iPhones and its advanced security features— could be the service that leads to widespread adoption of the digital wallet.

Citi Investment Research analyst Mark May believes the sum total of mobile payments could grow from $1 billion in 2013 to $58.4 billion by 2017.
Payment digitization paints an enticing vision of shopping's future: simply tap your device against a checkout screen and walk away with your new shoes.
But despite the flashy Apple Pay launch, Apple faces challenges making that vision a reality. The company and other digital wallet providers must convince shoppers that the transactions are safe — especially in the wake of recent high-profile data breaches at Home Depot and Target. Meanwhile, the company must also make a case to retailers that it's worth it for them to invest in new point-of-sale systems.

Many U.S. merchants still aren't sold on the idea. About 220,000 stores are set up to accept Apple Pay. That's only 5.5 percent of the 3.6 million retail locations in the U.S., according to the National Retail Federation. The biggest U.S. retailers, including Wal-Mart and Best Buy, are not participating in Apple Pay.
The main reason is cost. Each point-of-sale device, which uses something called near-field communication technology, costs hundreds of dollars, plus hours of worker training. And there's been little customer demand for the systems.

That may change now that Apple has entered the arena, says Gartner analyst Avivah Litan.
"There's no doubt young people want to use phones to make payments, but they have to have a place to pay," says Litan. She predicts bigger retailers will see how well Apple partners like McDonald's do before they move into mobile payments.
"If it goes well at other retailers, Wal-Mart and other companies may break down and start taking it," Litan says.

In countries such as Canada and the U.K., contactless point-of-sale systems are widespread, and as a result, such payments are far more common. In Canada, for instance, about 20 percent of transactions at registers processed by MasterCard are completed by contactless payment, according to MasterCard.

"What you learn from that is when consumers start 'tapping' two or three times, they never go back to their old behavior at that merchant. ... It's just a much better experience," says Ed McLaughlin, chief emerging payments officer at MasterCard.
One of the strengths of Apple Pay is its security. Its system uses the company's Touch ID fingerprint technology, a secure chip, and payments that require a one-time security code.
That kind of security — similar to the chip-and-pin credit card system used in Europe — would prevent the type of breaches that happened at Target and Home Depot. And it could be a compelling reason for retailers to adopt Apple Pay, Litan says.

"If you get enough people using the service, it would cut down on retailers' security costs, and that's why over time it may really take off," she says.
Still, not everyone is convinced that swiping a credit or debit card is that much of an inconvenience in the first place. Bill Ready, head of next generation commerce at PayPal, points out that near-field communication has been around for 10 years without catching on. His vision of the mobile payment future is more akin to an "e-commerce style transaction happening in the physical world," he says, citing the example of car-sharing service Uber, which works with PayPal to processes riders' payments by way of a mobile phone app.

"Uber addressed a real pain point, in that hailing a taxi and payment for a taxi is cumbersome," he says. "We're focused on those types of things more than killing the card swipe."
Even amid the differing visions, most experts agree that the march toward the digitization of payment will continue.

"Someone is going to figure out how to make mobile payments easy and cheap and then we're talking a real shift in consumer behavior," says Gartner's Litan.

Saturday, 13 September 2014

Cars that drive themselves starting to chat with each other

Cars that drive themselves starting to chat with each other

By Ben Klayman, Bernie Woodall and Paul Lienert
Reuters

DETROIT — An Acura RLX sedan demonstrated an unusual way to tow another car this week: the vehicles were not physically attached. The second car drove itself, following instructions beamed over by the first in a feat of technology that indicates a new stage in automation is happening faster than many expected.

Systems that enable vehicles to communicate with each other have been developed in recent years in parallel with features that enable cars to drive themselves. Manufacturers and suppliers now are putting the two together in novel ways, with broad implications for vehicle safety and convenience.
General Motors Co., Honda Motor Co., which owns Acura, and other automakers are working with traditional suppliers and startup firms. Tech giants Google, with its pioneering work on driverless cars, and Apple, which is working with automakers to embed greater connectivity in their cars, are accelerating the change.

"It is the mix of big companies — Apple, Google, the automakers and the data aggregators — that starts to create momentum. Two years ago, it was different. It was a promise. Today, it’s reality," said Laurens Eckelboom, executive vice president of business development at Parkmobile, a smart-parking startup whose investors include BMW AG and Ford Motor Chairman Bill Ford's venture capital firm Fontinalis Partners.

A "truck platooning" application by Peloton Technology, a startup based in California's Silicon Valley, is intended to save fuel and reduce collisions.
As with virtual towing, a "platoon" of two heavy trucks use wireless communication and computer-controlled braking and acceleration to keep in close formation on the highway, according to a description by the company, which expects to start selling the technology late next year at $2,000 per truck plus a share of the projected operating savings.

The total price tag for widespread adaption of such features could be steep. The National Highway Traffic Safety Administration estimates automakers will need to spend billions of dollars to install safety systems that automatically assist drivers and could be mandated by 2020, when the industry expects the first self-driving cars to start easing onto roads.

WHO IS LIABLE?

There are other risks and issues including reliability, cybersecurity and legal liability.
"What happens if a self-driving car gets into an accident? Who is liable for the damages? Will the human ‘copilot’ be at fault or will the car’s manufacturer?" the Center for Insurance Policy and Research wrote last month, citing "a long list of safety and legal issues to iron out before self-driving cars hit the road.”

All the razzle-dazzle technology promised by automakers and regulators "shouldn't take our eyes off the prize — cars that don't crash," Jon Lauckner, GM's chief technology officer, said at the Intelligent Transport Systems World Congress in Detroit this week.
Citi analyst Itay Michaeli said the convergence of connected and automated technologies also has the potential to reduce vehicle emissions and fuel usage, and bring down vehicle operating and insurance costs.

Active safety, including hands-free driver assistance and accident avoidance, was a common thread of many technical discussions and technology advances on display at the ITS show, which attracted 10,000 engineers, scientists and researchers, ending on Thursday.

Automakers are starting to put more of the new technologies on the road "to get some experience and see how the market reacts in advance of the government requiring it," said Jeff Owens, Delphi Automotive chief technology officer.

Price is still a big question. Some advanced systems could cost two to three times more to develop than early adopters are likely to pay, several industry insiders estimated in conversations at the show.
Even with just a few semi-automated systems installed, the price tag remains stiff, although recent studies have shown car buyers are willing to pay about $3,000 to have hands-free driving capability.
The Chrysler Group, a unit of Italy’s Fiat SpA, is charging nearly $3,500 for a technology bundle on its new 2015 Chrysler 200C sedan that includes adaptive cruise control, which automatically applies brakes and throttle to keep a vehicle a safe distance behind the one ahead; lane departure warning with lane keep assist, which automatically redirects a vehicle that is drifting out of its traffic lane; blind spot and cross path detection, which helps the driver monitor the presence of vehicles, and automatic park assist.

GM's Cadillac brand hasn't said how much its new Smart Cruise system will cost when it debuts in about two years. The system is designed to enable hands-free driving on the freeway with automatic steering, braking and throttle, as well as using GM's OnStar system to provide location, weather and traffic information to the automated systems.

But drivers should not expect to take a snooze. "We are talking about 'automated' driving features, not autonomous driving," with Smart Cruise, warned spokesman Jim Cain. "We will have strategies in place to keep the driver alert and engaged."

Friday, 12 September 2014

The Biggest iPhone Is Already Sold Out, But Plenty Of The Smaller Phones Are Still Available

The Biggest iPhone Is Already Sold Out, But Plenty Of The Smaller Phones Are Still Available

Lisa Eadicicco
Business Insider 



Don't count on getting your hands on an iPhone 6 Plus anytime too soon. Starting Friday at 12 a.m. PT, Apple started rolling out preorders for its iPhone 6 and iPhone 6 Plus, but it looks like the first batch of the larger 5.5-inch iPhone 6 Plus is already sold out.

At the time of this writing (9:00 a.m. ET), the iPhone 6 Plus was delayed by three to four weeks for all colors, carriers, and storage capacities. The 4.7-inch iPhone 6 is set to ship within seven to 10 business days, which just about lines up with the iPhone's official in-store launch scheduled for Sept. 19.

The delay in iPhone 6 Plus orders doesn't come as too much of a surprise. Before Apple unveiled its new smartphones, reports suggested Apple's first phablet would be delayed due to production issues.
We'll update this article accordingly if the situation changes.

Samsung Attacks Apple’s Keynote With “It Doesn’t Take A Genius” Ads

Samsung Attacks Apple’s Keynote With “It Doesn’t Take A Genius” Ads

John Biggs
TechCrunch

Samsung has released a series of videos lampooning this week’s Apple announcement, a move that is at once familiar and not unexpected. There are six of them in total, including one on screen size, in a series called “It Doesn’t Take A Genius.” Collect them all.

After years of cringey, tone-deaf commercials, the company has finally grown a few claws and even made fun of Apple’s jittery live feed in the example above. There’s even the obligatory howl of “It’s a bigger screen!” as the two “nerds” in the ad salivate over the new offerings.
Samsung has a long history of iSheep advertising and I doubt it will abate any time soon. Perhaps Apple needs to bring out the big guns again? Where have you gone, John Hodgman? A nation turns its lonely eyes to you.

China's iPhone delay gives smugglers reason to cheer

China's iPhone delay gives smugglers reason to cheer

By Yimou Lee
Reuters


HONG KONG - The likely delayed launch of Apple Inc's (AAPL.O) new iPhone 6 in China, the world's biggest smartphone market, sparked a race to pre-order the phone in Hong Kong on Friday.
Pre-orders for the iPhone 6 and iPhone 6 Plus sold out within two hours on Apple's Hong Kong website - and many of those devices will be smuggled across the border into mainland China, where they could change hands for as much as four times the Hong Kong price.

The new models go on sale in the United States, Hong Kong and other markets on Sept. 19, but China is still waiting for a release date.

Hong Kong residents went online to pre-order iPhones in the hope of selling them on for a tidy profit to unofficial dealers, many of whom will then move them into China to cash in on pent-up demand there.

Apple did not release the number of sales for pre-orders.

"I'm worried about getting enough iPhones to resell. Orders have doubled compared to last year," said Gary Yiu, a salesperson at I Generation in Sin Tat Plaza in Mong Kok, Hong Kong's electronics hub.
His store offers HK$10,000 ($1,290) for those willing to re-sell the latest model, almost twice the official local price of HK$5,588. Yiu said he received more than 100 orders from Hong Kong and mainland China, double the number he had a year ago when Apple launched the iPhone 5S.

There are about 100 electronics dealers in Sin Tat Plaza and each bought 150-200 handsets immediately after the official release of the iPhone 5S last year.

In Shenzhen, across the Chinese border from Hong Kong, the asking price for the cheapest iPhone 6 model hit 20,000 yuan ($3,260), while a salesperson at a telecoms shop in Shanghai said his company had sent staff to Hong Kong, Japan and even the United States to buy the new models and get them back to China for sale.

"It's tough to say right now what price we'll ask. It really depends on market sentiment. It'll be decided by the asking price in the market," said the man surnamed Zhang.

Typically, student 'mules' from Hong Kong carry iPhones in their schoolbags or strap them around their waists and ankles each time they cross the border to the mainland. Some web users in China shared tips on how to smuggle iPhones into the country - such as opening the packaging so, if stopped, carriers can claim the phone was bought for their own use.

Others in Hong Kong were still weighing whether to resell their newest iPhone after securing a pre-order.

"It's all about luck," said information technology officer Danny Lam, 28. "I kept refreshing. My F5 button almost broke.""I may give it to my sister. I don't need this urgently, so I may check the price with traders. If the price is good, of course I'll sell it."

(1 US dollar = 7.7502 Hong Kong dollar)

(1 US dollar = 6.1344 Chinese yuan)

Thursday, 11 September 2014

Apple sees voice messaging as the next wave of digital communication

Apple sees voice messaging as the next wave of digital communication

Ellis Hamburger
The Verge 


Remember Push-To-Talk? Before Blackberry’s ascent, and before the launch of the original iPhone, Nextel’s range of PTT devices were the hottest phones in America. Cell phones were still relatively new at the time, offering high-tech connectivity and voice calls, but PTT devices offered
instant connectivity for a hefty price tag. Then, with the rise of smartphones and the death of Motorola flip phones, walkie talkie-like functionality disappeared. Texting was in. Facebook messaging was in. FaceTiming was in. PTT was out. Today, PTT’s signature chirp can only be heard on constructions sites and in taxi cabs.

But, within the last couple years PTT has become popular again, but under a new name — "voice messaging." As consumers have experimented with the various ways you might reach someone — a call, a text, a WhatsApp message, an email, a FaceTime, a voicemail — voice messaging has once again proven useful. It’s perfect for when you’re driving or when you simply don’t feel like texting. Apps like Taptalk and Cord make "one-tap" voice messages dead simple, and see crazy-high engagement from users. Viber, which has more than 100 million active users, tells The Verge that its users send more voice messages than photos.

VIBER'S 100-PLUS MILLION USERS SEND MORE VOICE MESSAGES THAN PHOTOS



The trend has gotten so big that even Apple is joining the fray, cementing voice messaging as a legit trend. In iOS 8, the Messages app includes
one-tap access to sending a quick voice message
, a task that used to take several steps to accomplish. In the Apple Watch, "walkie-talkie" mode is a feature worth boasting about on marketing pages, and worth elevating above almost every other feature on the device. The Watch also lets you send voice notes inside text messages. Both these functions are easily accessible through the Watch's dedicated messaging button on its side. Apple and others have taken what was most compelling about PTT — that it’s easy, fast, and immediate — and combined it with what’s best about texting — it’s asynchronous and lightweight.

In the future-world of the film Her, people talk to their phones all day and night. They dictate reminders, emails, send voice messages, and carry on lengthy phone calls without any regard for those around them. We’re not quite there yet. Voice messages aren't going to replace texts, however simpler it may be to send one.


There’s an oddness to sending short sound bites that I can’t quite shake. There’s an awkwardness to dictating a reminder to Siri in public. It’s one thing to get caught talking on the phone by a stranger, but another when you get caught blurting out "Yes, ham and cheese!" seemingly to no one at all. From my experience, using your voice to send a message or control a computer is still strange unless you’re completely alone. But then, it’s a godsend.
This is why voice has taken on such a prominent role in operating systems like Ford Sync and Apple CarPlay that work when you
are alone. "Voice is the only way to communicate and multi-task," says Thomas Gayno, co-founder of Cord. "A few seconds of voice has much more to offer than a few hundred characters." Factor in devices like the Amazon Fire TV and Xbox One, which marketed themselves on voice search features, and you’ve found Silicon Valley's favorite new way to interact with technology.

This stuff is coming — it’s just a matter of when. Voice commands already work pretty well in places like the car and on your couch, but soon, you’ll likely hear them more and more on the street. With Apple’s distribution network, which seeds millions upon millions of devices into the hands of consumers, voice messaging could soon become more mainstream than ever. Voicemail usage has been dropping for years, but perhaps not for the reasons we thought. With the right interface, voice messages have proven to be a really great way to talk.

How Someone Can Track You With a Photograph You Took

How Someone Can Track You With a Photograph You Took


Grant Burningham
Newsweek 

Chances are, if you're currently a living, breathing human, you take digital pictures.
No longer the provenance of fancy cameras, digital photographs can now be taken on pretty much every cell phone out there and uploaded to computers with equal ease and gusto. Today, 91 percent of American adults own cell phones, for a total of 285,649,000 potential citizens out there with cameras. And every one of those JPEGs you upload to your computer and to the web don't just contain images; they contain a slew of extra information, collectively called metadata, that could be used to track you down.

Metadata can be extremely useful to photographers; nearly all metadata includes information like the focal length used to take the photo and the photo's exposure. But more and more often, GPS-enabled cellphones and cameras mean metadata now includes where, as well as when, the photograph was taken—meaning if you post frequent JPEGs, RAWs or TIFFs to the Internet, people could well be tracking you by your photos.

This is not an idle threat. John McAfee, tech mogul and maker of the famous McAfee anti-virus software, was living in Belize in 2012 when he was sought by police as a “person of interest” in a murder case. Convinced the police had it in for him, he fled Belize for the jungles of Guatamala — only to be tracked down by a Twitter user when two reporters from Vice magazine, who’d joined him on his trek, posted photographs online with the metadata still included.

And there’s no need for Vice Magazine to be involved, either: anyone could be just as easily tracked by way of their Facebook photo album. Already websites have popped up aiming to raise awareness of the problem. The most well-known example, IKnowWhereYourCatLives.com, raises the privacy red flag by tracking public pictures of cats to their owner's homes. Despite the site-owner’s (truthful) claim that he’s only showing what’s already public, the site can be a creepfest to look at — especially if you’ve posted a picture of your cat taken, well, anywhere close to your home.

Luckily, if you'd prefer to post to Instagram without people knowing where or when you took your photos, stripping metadata is pretty easy. For mobile phones, CNET recommends simply disabling location settings for the cameras on iOS and Android; for photos that find themselves on a computer, there's plenty of freeware for Windows, Mac and Linux that will strip the metadata from files. Those more curious than paranoid can also read their photo's metadata in plaintext by right-clicking the photo and scrolling to “More Info” (on a Mac) or doing the same and then scrolling to “Properties” and then “Details” (on a Windows PC).

And for those times when even stripping the metadata won't suffice? Well, there's always old-fashioned film.

Double solar storms headed to Earth raise disruption concerns

Double solar storms headed to Earth raise disruption concerns

By Irene Klotz
Reuters


CAPE CANAVERAL Fla. - A rare double burst of magnetically charged solar storms will hit Earth Thursday night and Friday, raising concerns that GPS signals, radio communications and power transmissions could be disrupted, officials said on Thursday.

Individually, the storms, known as coronal mass ejections, or CMEs, wouldn’t warrant special warnings, but their unusual close timing and direct path toward Earth spurred the National Oceanic and Atmospheric Administration’s Space Weather Prediction Center to issue an alert.

The first CME, which burst from a magnetically disturbed region of the sun on Monday night, should reach Earth Thursday night, center director Thomas Berger told reporters on a conference call.
The same patch of solar real estate produced a second, more powerful storm about 1:45 p.m. EDT on Wednesday.“We don’t expect any unmanageable impacts to national infrastructure from these solar events at this time, but we are watching these events closely,” Berger said.

The sun currently is in the peak of its 11-year cycle, though the overall level of activity is far lower than a typical solar max.

Storms as powerful as the ones now making their way toward Earth typically occur 100 to 200 times during a solar cycle, Berger said.

“The unique thing about this event is that we’ve had two in close succession and the CMEs could possibly be interacting on their way to Earth, at the Earth’s orbit or beyond. We just don’t know that yet,” he said.

The highly energetic, magnetically charged solar particles could hit Earth’s magnetic field and disrupt some radio communications and degrade GPS signals, NOAA said.
The storms also have the potential to impact electric field power grids in the northern latitudes, which are more susceptible to geomagnetic disturbances.

Power grid operators and the Federal Emergency Management Agency (FEMA) have been notified “just in case,” Berger added.

On the plus side, the storms should trigger beautiful auroral displays, visible wherever clear skies prevail along the northern tier of the United States. Aurora are caused by electrically charged solar particles hitting oxygen, nitrogen and other gases high in the atmosphere, creating curtains of light above the planet’s magnetic north and south poles.

Demi Lovato Reveals the Outfits She Feels Most Confident In

Demi Lovato Reveals the Outfits She Feels Most Confident In


Credit: Splash News/Image Courtesy of Sketchers
We were so excited when we heard that Demi Lovato was announced as the new face of athletic brand Sketchers, because if any there's any celeb who flawlessly incorporates sporty elements into her edgy style, it's definitely Demi!
Credit: Splash News/Image Courtesy of Sketchers
Even though the singer quickly goes from fierce stage costumes to cute casual styles, she makes sure that her outfits always represents who she is.
Credit: Twitter
 "My style philosophy is to stay true to who I am. To be my own unique self. That is when I am happiest," she explained during her new campaign. "When I'm on stage, it is probably edgy heels or boots and a leather jacket – as fun and crazy as I feel at that moment. When I am not on stage, chances are I am comfortable in a T-shirt and my Skechers."