Posts

Showing posts from May, 2017

WhatsApp: will highlight the conversations that interest you - "TechnoTron"

Image
The app will remain fixed at the top of those conversations that the user choose WhatsApp is the messaging app the world's most popular and, for this reason, any planned improvement or change in the functionality have a huge impact in the market. The who is developing the development team at this time can be the most useful in the day-to-day, and can significantly improve the experience of use: it is a way to keep fixed at the top of those conversations that the user chooses. This interesting feature is already available in the beta 2.17.163 and 163 of the Android version of the messaging application. WHATSAPP, APP, APK, SMARTPHONES To all happens to us: as the hours go by, we accumulate messages of different conversations; some useful, others are simple reminders that we will be able to delete. The problem arises derived from one's own hierarchical structure of the organization of the messages: the platform placed on top of the last message received or sent wit

From where to download applications in the Apk and how to know if you are safe - "TechnoTron"

Image
We offer four sites from which to download apps Apk reliable and, in addition, the way of making sure that these files do not pose problems. The store of Google applications is the best site from which to download Android apps . Well-organized, with hundreds of thousands of choices, full of quality... There is everything, of course, but everything is there. Or almost everything, that there are notable exceptions that can not be downloaded from the official Android app store. Today we will make a compilation with the four sites recommended for download apps in Apk safely. And, as one can never ensure full, we offer you the way of analyzing the files to your smartphone, keep it away from malware. Let's get started. APK, APP, ANDROID Apk Mirror The site header when you're looking for the free apps that are not available officially in some countries. Hosting service owned by Android Police, with Apk Mirror , you have the best repository for application

Unpatched Wordpress: Allows Hackers To change The Password Of Administrator - "TechnoTron"

Image
WordPress , the most popular CMS in the world, is vulnerable to a logical vulnerability that could allow a remote attacker to reset targeted users’ password under certain circumstances. The vulnerability (CVE-2017-8295) becomes even more dangerous after knowing that it affects all versions of WordPress — including the latest 4.7.4 version. The WordPress flaw was discovered by Polish security researcher Dawid Golunski of Legal Hackers last year in July and reported it to the WordPress security team, who decided to ignore this issue, leaving millions of websites vulnerable. WORDPRESS, UNPATCHED, HACKERS "This issue has been reported to WordPress security team multiple times with the first report sent back in July 2016. It was reported both directly via security contact email, as well as via HackerOne website," Golunski wrote in an advisory published today. "As there has been no progress, in this case, this advisory is finally released to the public without an of

Android to iPhone without losing data in the process - "TechnoTron"

Image
In the automatic mode and manual. Change of phone is something we've all done it at some point, and what we're not going to fight sooner or later. Well for work reasons, because we spoil our smartphone , or because it has come out a new model that we can not stop to think, at some point we will have to change phone and migrate the data from one to another. Brand new phone is nice, but if you move data and files from the older device to the new is not as fun, it is rather heavy and not always ends well. And if it is already difficult to move data between devices of the same platform, do it between different platforms can be a challenge. Today, we look at the different ways we have of moving from Android to iPhone . There are beaches for all tastes, and choosing one method or the other depends on whether we want to continue with our previous services of Google, move to the Apple ecosystem, or to stay half way. IPHONE, ANDROID, SMARTPHONES The simplest option Appl

move from iPhone to Android with your data safe and sound - "TechnoTron"

Image
In the automatic mode and manual As we have seen recently, making the leap from Android to iPhone is something that can be done in several ways and according to our needs. The same thing happens in the reverse process. If you have recently purchased an Android phone and you want to abandon your old iPhone , downgrade from iPhone to Android is a matter of a few steps, a bit of patience and a little more. Either Samsung, Huawei, Xiaomi or LG, your Android smartphone is prepared for that amounts a large part of the content of your iPhone . Let's see how. ANDROID, IPHONE, SMARTPHONE The simplest option Google knows that there are iPhone users who make the leap to Android . This is why its Google Drive app for iOS lets you export content to have it available on your Android in a few steps. Google Drive serves as a file store, office suite with apps dedicated (Docs - Documents, Sheets - Sheets, and Slides - Presentations) and also as a tool to switch from i

Are we alone against ransomware? No more ransom - "TechnoTron"

Image
Three key points: Precaution, prevention, and not to respond to extortion Imagine back home, put the key in the lock and verify that you can't open the door. In it there hung a paper on which you are being asked an amount of money to change to provide the key that opens the new lock that someone has installed in the door of your house. So does the ransomware , one of the dangers of digital that more grows and the more popularity you have among the friends of the alien. An example, the ransomware Cryptowall v3 has tried to infect more than 400,000 computers, only in its third version, with an approximate cost of 631 million dollars in damages. Unlike a virus , trojan horse or adware, steal your data, slow down your computer-or what they directly, the ransomware has as purpose to keep the access to your files or to your computer. What the price to regain control? Pay a certain amount to the author of the software infectious. Previously we have spoken of ex

The best tools to discover fake pictures - "TechnoTron"

Image
it will be difficult that you'll take the hair The photo retouching has been around since the first photograph. There has always been photographers who, with more or less success, have altered an image to give it more light, to remove nuisances, or to include others that embelleceran the composition. In analog photography, it was enough to let the photograph to reveal more or less time or crop an image, place it on top of the other and get another copy for edits and montages to hand. With the entry of Photoshop on our computers, the digital retouching of photographs is easier than ever and with a little skill and the suitable tutorial, or simply by trial and error, anyone can retouch a picture, and that is natural, or give the hit. However, in internet it is common to find fake images, photomontages that are trying to make us believe but which turns out to be a photo altered to fool us or convince us of something. Some are coarse and rough, and look to the league, bu

Online privacy: erase your trail vs. leaving a false trail - "TechnoTron"

Image
What is the best way to protect the information that we generate on the Internet? It is a recurring theme. The online privacy . We are not always aware of it, of how our personal data or our browsing habits are exposed on the Internet .  Each bit time is again the debate, especially when a company has a breach of security, and passwords or information from hundreds of users appear in forums or news groups whose purpose is to sell data to the highest bidder.  Recently, the protection of online privacy has become to the fore by the controversial decision of the House of Representatives of the united States, that in the past month of march passed a law that will allow the telecommunications companies (or ISPS) to market with the information of the internet users.  What does this mean? That anyone, individual or company, can buy from the suppliers of u.s. Internet data of their customers without their consent. What data? Search history, downloaded apps, what devices they

Malware directed against Polish banks and institutions in Latin america - "TechnoTron"

Image
Recently, news surfaced of attacks on Polish banks in the site security of Poland ZaufanaTrzeciaStrona.pl (translated to English here). The impact of the attacks described with drama, calling it “the most serious”, and the initial reports were confirmed by two articles from Symantec and BAE Systems . The institutions affected are of various nationalities all over the world and spread to Latin america, including Mexico and Uruguay, with the goals of high-profile in the viewer of the attackers. There are many interesting aspects of these attacks, starting with their targets, going through your vector of and commitment to the specific functionalities of the malicious executables are used. While the first two axes were examined in detail, binary malicious involved did not attract much attention until the time. The purpose of this article is to provide technical details of this malware for now is very poorly documented. MALWARE Distribution channel As mentioned in the news

Presentations on your web page: insérts in a few steps - "TechnoTron"

Image
Desde OneDrive, iCloud, SlideShare, Google Drive... Presentations are a very powerful tool to explain complex topics in a graphical way and understandable by anyone. Leaving aside the PowerPoints of kittens who for years filled the inboxes of many of us, a presentation is the ideal solution for a work meeting, a class, institute, or university and even for your web page. Thanks to the versatility of the current web pages, embed presentations in your website is a no-brainer and accounts with different options to carry it out. Let's look at the most recommended. PRESENTATIONS, WEBSITE, INTERNET With PowerPoint Speaking of presentations is talk of Microsoft PowerPoint, the tool of creation of presentations that gave the name to the same. With the time it has been renewed by adding new functions, and one of them is the possibility of adding PowerPoint presentations on your web page so that you can view it from your web browser, online, without the need

Malware on macOS, discover one of the most sophisticated to date and you can spy on you - "TechnoTron"

Image
MAC, MALWARE If in the last hours has been alerted of a phishing campaign impersonating emails-official Apple to get user accounts, now security researchers from Check Point have published the existence of a new malware that can infect Mac computers. "There is a new malware that attacks directly to macOS, the umpteenth reason to be wary of attachments to emails from strangers." His name is Dok and portray it as the first trojan to large-scale that affects macOS , the desktop operating system of Apple. Dok, the malware on the Mac that intercepts your connection This is not the first time that it is discovered malicious software on Mac , it is not that there are no viruses on Mac , is that an attacker has more chances of success if you develop malware for Windows by the enormous potential of affected. The last case discovered by Check Point is of special interest because it is affecting users in Europe, and arrives via an attached file in an email. What is str