International stories and articles from our Flipboard mag.

JUL
31

Chrome 76 is out, making it easy to get past paywalls

A few weeks ago, we reported Chrome 76 would make it harder to run Flash – because Flash just won’t die – as well as potentially make it much easier to bypass article paywalls. That update is now available.

Basically, if you come across a paywall, you can visit the page in incognito mode. That’s it. I can’t imagine affected publishers will be too happy about the change.

Truth be told, that’s kind of how incognito mode was always supposed to work – and how it used to. It blocks a site’s ability to read or write cookies on your devices, in theory preventing publishers from knowing how many articles you’ve read.

Publishers previously responded by simply making articles unavailable altogether if they detect you’re in incognito mode. They did this by checking if a feature called the FileSystem API was disabled in your browser to determine your browsing mode (standard or incognito).

Chrome 76 prevents the FileSystem API status from being detectable. And indeed, I was able to get through the paywalls of each of the pages I tested.

Continue reading
  469 Hits

Copyright

© Flipboard and it's respective authors

469 Hits
JUL
29

How to Make 30 or More Pieces of Marketing Content From a Single 3-Minute Video

Running a business takes up a ton of hours, making it difficult to find the time to be active and engaged on all social media platforms, or creating as much online content as we know we should be making. Yet, with the right repurposing blueprint in place, you can effectively create loads of content from one core piece of content -- including video.

Where to Start

First, you'll need to make one video addressing a central pain point your audience struggles with, or a covering a topic they'd be interested in. For instance, if you own a local café, you could create a video teaching viewers how to properly roast coffee like an industry expert.

1. Repurpose the video across your social media channels.

Next, take the video and republish it across your other social media channels as a native video -- from Facebook to LinkedIn to YouTube and more. This will increase the organic reach the video receives on each respective platform, given that social media algorithms prioritize native content over external links to different sites. 

2. Break it down into three separate videos for Instagram.

On Instagram, videos have the potential to spread like wildfire, but the platform still only allows videos to be 60 seconds in length. Because of this, chop up the video into shorter clips, and then publish the full-length video to IGTV in addition to putting the original YouTube link in your Instagram bio.

3. Spread the word through Instagram Stories.

Instagram Stories are a terrific way to build hype around content because of their raw, unfiltered style. To get the most out of your video, create Instagram Stories documenting behind-the-scenes footage of your team creating the original video. Once the video goes live, encourage your viewers to post their own Instagram Stories about it and tag you in them so you can reshare the Story to your own channel. This will help prove to audiences that your video is worth watching.

Continue reading
  360 Hits

Copyright

© Flipboard and it's respective authors

360 Hits
JUL
29

Stop robocalls to your phone for good

Kill robocalls dead in their tracks.

Jason Cipriani/CNET

The number of robocalls ringing our phones at all hours of the day has reached an all-time high, and because of that those calls are also getting a lot of attention from the government and technology companies. Most recently, the House passed a bill that will all but stop robocalls. The FCC passed a proposal that gives carriers the permission to be more aggressive when blocking spam calls. Apple even added a feature to iOS 13 that lets you block all unknown callers from ever ringing your phone.

Robocalls convey a prerecorded message to your phone that often urges you to do something. Sometimes it's a message from a candidate running for office or a call from your bank advertising a new service. Even more worrisome are the scammy robocalls -- posing, say, as the "IRS" -- that intend to trick people out of their money. It'll be some time before the FCC's proposal is implemented so, you're not going to see a dramatic decrease in unwanted calls overnight. 

Not every automated solicitation call counts as illegal. Calls from political campaigns, debt collectors and charities are all permissible. What's not allowed are the calls from the fake IRS agents or the companies that claim you won a free vacation to the Bahamas.

While it's not possible to entirely end robocalls from reaching your phone, there are some steps you can take to reduce the number of calls you receive.

Continue reading
  518 Hits

Copyright

© Flipboard and it's respective authors

518 Hits
JUL
26

Megabits vs megabytes: What’s the difference?

Envato

The megabit vs megabyte confusion is widespread among internet users. That’s why we’re here to clear out some uncertainties and help you convert megabits to megabytes.

The confusing part of megabits and megabytes

This issue most often arises when dealing with internet providers. Imagine a company offers speeds of up to 100 Mbps. Because we are more used to dealing with megabytes (for storage), people often assume they will see speeds of 100 megabytes per second. This is not the case.

The abbreviation for megabit is Mb, and a megabyte would be written as MB. That slight difference in capitalization is what brings confusion, because bits and bytes sound and are written alike, but they are different units of measurement.

MB: megabyteMb: megabit

100Mb will always look more impressive than 12.5MB. The marketing advantage certainly helps make more sales.

Continue reading
  362 Hits

Copyright

© Flipboard and it's respective authors

362 Hits
JUL
26

Apple contractors 'regularly hear confidential details' on Siri recordings

Apple contractors regularly hear confidential medical information, drug deals, and recordings of couples having sex, as part of their job providing quality control, or “grading”, the company’s Siri voice assistant, the Guardian has learned.

Although Apple does not explicitly disclose it in its consumer-facing privacy documentation, a small proportion of Siri recordings are passed on to contractors working for the company around the world. They are tasked with grading the responses on a variety of factors, including whether the activation of the voice assistant was deliberate or accidental, whether the query was something Siri could be expected to help with and whether Siri’s response was appropriate.

Apple says the data “is used to help Siri and dictation … understand you better and recognise what you say”.

But the company does not explicitly state that that work is undertaken by humans who listen to the pseudonymised recordings.

Apple told the Guardian: “A small portion of Siri requests are analysed to improve Siri and dictation. User requests are not associated with the user’s Apple ID. Siri responses are analysed in secure facilities and all reviewers are under the obligation to adhere to Apple’s strict confidentiality requirements.” The company added that a very small random subset, less than 1% of daily Siri activations, are used for grading, and those used are typically only a few seconds long.

Continue reading
  420 Hits

Copyright

© Flipboard and it's respective authors

420 Hits
JUL
15

Three Easy Ways To Make Your LinkedIn Profile Unique

With LinkedIn members growing rapidly and the ranks approaching a billion, it’s getting harder and harder to stand out. Of course, you don't need to differentiate yourself from the entire membership, just from others who do what you do. But that’s a tall order too. I did some quick research using the LinkedIn search feature to see just how much competition there is among some common job titles:

Sales Director – 10,862,770HR Manager – 8,273,460Marketing Manager – 23,573,428Chief Information Officer – 7,719,760CEO – 17,132,397

With that much competition, it’s important to make your profile stand out. When someone is checking you out, you need them to see your unique personal brand – not just one more person who shares your job title. Much of that can be achieved through how you write your profile. The content you choose to include, along with your tone and style, will help someone get to know about you and give them a hint about your secret sauce.

There are ways to differentiate you profile visually as well. You can do that with enhanced text, images and video. Here’s how:

1. Enhanced Text

If you’ve looked at a lot of LinkedIn profiles like I have, you’ve probably noticed that the text looks the same from profile to profile. It is all “regular” text. Well, there’s a way to add italics and bold to your content to help you emphasize key messages and at the same time make your profile stand out. A LinkedIn article by Ahmad Imam describes the step-by-step process you can use to add some visual differentiation with text. Just don't go overboard. Too much of a good thing can send the wrong message about your brand.

Continue reading
  550 Hits

Copyright

© Flipboard and it's respective authors

550 Hits
JUL
14

Microsoft Word for Android has been installed more than 1 billion times

Microsoft recently hit a particularly notable milestone: its Android edition of Microsoft Word has passed the 1 billion mark for installs, according to the Google Play Store (via Android Police).

The company’s other Office apps are also doing pretty well. Spreadsheet app Excel, PowerPoint, OneNote, and OneDrive each have more than 500 million installs, while email client Outlook for Android has more than 100 million installs. Android Police points out that these figures aren’t necessarily downloads from Google’s Play Store, noting that Microsoft has some agreements with some manufacturers to preinstall its apps on various devices.

The milestone is also a bit ironic. Last month, Bill Gates noted in an interview that his “greatest mistake ever” was missing out on the mobile OS world, noting that there’s only space for one competitor for iOS, and that it should have been “a natural thing for Microsoft to win.” But, while Microsoft’s mobile efforts have never reached the success of its competitors, its mobile versions of Microsoft Office still enjoy a significant amount of market penetration, much like their desktop counterparts.

Original author: Liptak
  482 Hits

Copyright

© Flipboard and it's respective authors

482 Hits
JUL
10

I’m a hacker, and here’s how your social media posts help me break into your company

Think twice before you snap and share that office selfie, #firstday badge pic, or group photo at work.

Hackers are trolling social media for photos, videos, and other clues that can help them better target your company in an attack. I know this because I’m one of them.

Fortunately, in my case, the “victim” of these attacks is paying me to hack them. My name is Snow, and I’m part of an elite team of hackers within IBM known as X-Force Red. Companies hire us to find gaps in their security–before the real bad guys do. For me, that means scouring the internet for information, tricking employees into revealing things over the phone, and even using disguises to break my way into your office.

Social media posts are a goldmine for details that aid in our “attacks.” What you find in the background of photos is particularly revealing–from security badges to laptop screens, or even Post-its with passwords.

No one wants to be the source of an unintended social media security fail. So let me explain how seemingly innocuous posts can help me–or a malicious hacker–target your company.

Continue reading
  363 Hits

Copyright

© Flipboard and it's respective authors

363 Hits
JUL
10

Google Translate's camera now works with more than 100 languages

Other updates to the instant camera include auto-detect and NME technology.

Google Translate's instant camera feature will now make translating a foreign street sign as easy as aiming your phone -- even if your native language isn't English. The company today unveiled a set of new updates to its …

Original author: Khalid
  346 Hits

Copyright

© Flipboard and it's respective authors

346 Hits
JUL
10

12 of the best hidden features we found in iOS 13 and iPadOS

iOS 13 is shaping up to be a pretty significant update. 

Angela Lang/CNET

One of the best parts of installing an iOS update is finding all of the features that Apple hasn't talked about. Hidden features are often among the most useful aspects of updates, and the release of iOS 13 and iPadOS is shaping up to be no different. Not only is there now a dedicated dark mode (huzzah!), but there are improved privacy features, Apple Maps has a new look and you can even gesture-type on the default iOS keyboard. For the past month, we've been digging around iOS 13 and iPadOS and have found a handful of tools that Apple didn't talk about during WWDC

Below are 12 of the best new hidden features we've found so far, from better battery charging and dual-SIM support in iMessage, to using a mouse to control your iPhone or iPad. 

We'll keep looking and updating this post throughout the rest of the beta program. If you want to get in on the fun early, here's how to install iOS 13 on your iPhone now. If you installed iOS 13 and want to go back to iOS 12, it's possible. 

iOS 13 will help prolong your iPhone's battery life. 

Continue reading
  403 Hits

Copyright

© Flipboard and it's respective authors

403 Hits
JUL
10

25 Million Android Phones Infected With Malware That 'Hides In WhatsApp'

Hackers are trying to replace real apps, like WhatsApp, with ad-serving fake versions, a cybersecurity company has warned. (Photo by Jaap Arriens/NurPhoto via Getty Images)

Jaap Arriens/NurPhoto

As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up adverts, cybersecurity researchers warned Wednesday.

Dubbed Agent Smith, the malware abuses previously-known weaknesses in the Android operating system, making updating to the latest, patched version of Google's operating system a priority, Israeli security company Check Point said.

Most victims are based in India, where as many as 15 million were infected. But there are more than 300,000 in the U.S., with another 137,000 in the U.K., making this one of the more severe threats to have hit Google's operating system in recent memory.

The malware has spread via a third party app store 9apps.com, which is owned by China’s Alibaba, rather than the official Google Play store. Typically, such non-Google Play attacks focus on developing countries, making the hackers' success in the U.S. and the U.K. more remarkable, Check Point said.

Continue reading
  368 Hits

Copyright

© Flipboard and it's respective authors

368 Hits
JUL
09

Two Republicans sue Ocasio-Cortez over Twitter blocks

One former Democratic state lawmaker and one Republican congressional hopeful announced this week that they are suing Rep. Alexandria Ocasio-CortezAlexandria Ocasio-CortezTwo Republicans sue Ocasio-Cortez over Twitter blocks Overnight Defense: Drama over 3B House defense bill | Democratic tensions threaten to snag legislation | White House threatens veto | US, Taliban talks end with 'roadmap for peace' Dem tensions snag defense bill MORE (D-N.Y.) over being blocked from her personal Twitter account.

Former state assemblyman Dov Hikind (D) and congressional candidate Joseph Saladino, who is running in a Republican primary for the chance to battle Rep. Max RoseMax RoseThe Hill's Morning Report — Harris brings her A game to Miami debate Progressives, centrists in open warfare after House caves on Trump border bill GOP scores procedural win by securing more funding to enforce Iran sanctions MORE (D-N.Y.), announced lawsuits this week against the freshman Democratic congresswoman, seeking injunctive relief in the form of a court order demanding they be unblocked.

ADVERTISEMENT

Saladino announced in a press release that he had filed suit in the Southern District of New York, while Hikind told Fox News that he had filed his claim in the state's Eastern District.

"I have officially filed my lawsuit against AOC for blocking me on twitter," Saladino tweeted. "Trump is not allowed to block people, will the standards apply equally? Stay tuned to find out!"

Continue reading
  347 Hits

Copyright

© Flipboard and it's respective authors

347 Hits
JUL
09

Marriott faces $123 million GDPR fine in the UK for last year's data breach | ZDNet

The UK's Information Commissioner's Office (ICO) intends to impose a fine of £99,200,396 ($123,705,870) on international hotel chain Marriott for last year's data breach.

In November 2018, Marriott disclosed that hackers accessed the Starwood guest reservation database since 2014. Initially, the company said hackers stole the details of roughly 500 million hotel guests, a number which the hotel chain later corrected to 383 million following a more throrough investigation.

According to a post mortem of the hack, hackers stole:

383 million guest records18.5 million encrypted passport numbers5.25 million unencrypted passport numbers9.1 million encrypted payment card numbers385,000 card numbers that were still valid at the time of the breach

Class-action lawsuits started piling on hours after Marriott announced its security breach.

ICO: Marriott's security practices violated GDPR

Now, the ICO says it intends to fine Marriott for violations to the EU's General Data Protection Regulation (GDPR).

Continue reading
  363 Hits

Copyright

© Flipboard and it's respective authors

363 Hits
JUL
08

How social media could ruin your business

Image copyright Getty Images

Whether it comes from hackers, disgruntled customers, or is simply a backlash against something you post, negative social media content can destroy trust in your brand in a matter of minutes.

"Social media is the most immediate threat to your company's reputation," says Pete Knott, digital consultant at UK PR agency Lansons Communications.

"If not taken seriously it can and will directly impact your company financially and culturally."

Fake news remains one of the biggest challenges - despite machine learning crackdowns by networks such as Facebook and Twitter.

Image copyright Rachel Helfand GiuseppiImage caption Ilia Kolochenko says hackers pose a danger to corporate social media accounts

In May, for example, shares in the UK's Metro Bank plunged 11% before it could shake off inaccurate social media rumours that it was facing financial difficulties.

Continue reading
  275 Hits

Copyright

© Flipboard and it's respective authors

275 Hits
JUL
08

4 Apple Apps That Are Always Draining Your Battery — Even When You're Not Using Them

You probably expect that the apps you use are going to drain your battery — while you’re using them.

But it’s pretty shocking to find out some apps are not only ridiculous battery drainers while they’re in use, but they continue to use up your phone’s resources even when you aren’t touching them or thinking about them.

Wondering which apps are the worst offenders?

Here are four Apple apps that are always draining your battery — even when you’re not using them.

Shutterstock

Continue reading
  315 Hits

Copyright

© Flipboard and it's respective authors

315 Hits
JUL
08

Netflix's Worst Nightmare Has Come True

If there were a stock market “hall of fame,” Netflix (NFLX) would be a shoe-in.

Its stock has soared 8,500%+ in the last decade as “streaming” video has caught fire.

Netflix achieved those gains by stealing tens of millions of customers from cable companies. Last year, half of Americans age 22–45 didn’t watch a second of cable TV. And 35 million Americans have dropped cable in the last decade.

But it’s time to come to terms with a sad truth...

Netflix’s glory days are over. And what’s coming next won’t be pleasant if you own Netflix stock.

Continue reading
  296 Hits

Copyright

© Flipboard and it's respective authors

296 Hits
JUL
07

Forget about your Youtube channel. Here’s how to actually make money as a creative in the side hustle economy

Ask any vlogger, artist, or musician—it’s really, really difficult to make money as a creative.

People often think that if they just post decent content occasionally, or sign up for the right platforms, they’ll blow up just like Alessia Cara or Bo Burnham. But that’s really hard to do.

Follow Ladders’ magazines on Flipboard covering Happiness, Productivity, Job Satisfaction, Neuroscience, and more!

There are more social media platforms today than ever, but each platform only does one or two things well. For example, Instagram is good for pictures, but less so for videos. Twitter is good for writers, but not great for photos.

And even if you do everything right on the platforms you’re using, algorithms can bury visibility by limiting reach—meaning you’ll only make it so far.

Continue reading
  341 Hits

Copyright

© Flipboard and it's respective authors

341 Hits
JUL
07

Google Confirms Apple iPhone Bricking iMessage Bomb

Google's Project Zero exists to hunt down zero-day vulnerabilities such as the yet to be fixed Windows 10 security bomb I wrote about recently. But it's not just Microsoft that comes under scrutiny from the Google security researchers: a vulnerability in Apple's iMessage has been found that "bricks" an iPhone and survives hard resets, leaving users having to wipe the device and start factory fresh again.

The iMessage text bombing zero-day was disclosed by Google Project Zero researcher Natalie Silvanovich, who describes how the malformed message vulnerability can cause a Mac to "crash and respawn." However, as Silvanovich notes in her disclosure, "on an iPhone, this code is in Springboard. Receiving this message will cause Springboard to crash and respawn repeatedly, causing the UI not to be displayed and the phone to stop responding to input." In other words, receiving this text bomb through iMessage creates a condition that survives a hard reset and causes the iPhone to be unusable from the moment it is unlocked. "The only way I could find to fix the phone is to reboot into recovery mode and do a restore," Silvanovich said, continuing "this causes the data on the device to be lost though."

As long as you keep your iPhone up to date, however, there is no need to panic. The Google Project Zero disclosure policy is to allow the vendor, Apple, in this case, 90 days from the point of informing it of the vulnerability to issue a fix. After that 90 days has elapsed, or a fix has been made available, the vulnerability report will be disclosed to the public. That's what has happened this week, with Silvanovich hitting the publish button on her April 19 bug report. Apple actually fixed the problem really quickly as part of the iOS 12.3 release on May 13. Even so, Silvanovich left plenty of extra time to ensure the fix has been made as broadly available as possible before disclosing the existence of the problem this week.

If you haven't turned on the automatic software update feature in iOS 12, then I recommend that you do. That way you can be sure that issues like the iMessage text bomb iPhone bricker will not impact you. Simply open the Settings app, navigate to the General section, and then select the software update option. Toggle the automatic updates button to on and you are sorted. It goes without saying, but I will say it anyway: if you are not yet running iOS 12.3, then you really should update as a matter of urgency now that the iMessage bricking technique has been made public. Sure, there are always going to be some concerns about updating to a new version of any operating system, and the forthcoming iOS 13 is not immune to these, but updating makes more sense than not if you want to reduce the risk of falling victim to known security issues that could make your iPhone unusable.

. Check out my.
Original author: Winder
  325 Hits

Copyright

© Flipboard and it's respective authors

325 Hits
JUL
06

Microsoft Issues Warning For 50M Windows 10 Users

Windows 10 continues to be a danger zone. Not only have problems been piling up in recent weeks, Microsoft has also been worryingly deceptive about the operation of key services. And now the company has warned millions about another problem. 

Windows 10 users have been exposed to a worrying new vulnerability

Steve Kotecki

Spotted by the always excellent Windows Latest, Microsoft has told tens of millions of Windows 10 users that the latest KB4501375 update may break the platform’s Remote Access Connection Manager (RASMAN). And this can have serious repercussions. 

The big one is VPNs. RASMAN handles how Windows 10 connects to the internet and it is a core background task for VPN services to function normally. Given the astonishing growth in VPN usage for everything from online privacy and important work tasks to unlocking Netflix and YouTube libraries, this has the potential to impact heavily on how you use your computer. 

Continue reading
  312 Hits

Copyright

© Flipboard and it's respective authors

312 Hits
JUN
28

A second Florida city paid hackers thousands to get its computer systems back

Officials from Lake City agreed Tuesday to pay 42 bitcoin, roughly $426,000, to hackers who seized the city's computer systems June 10, ending a 15-day standoff.

It's the second city in Florida to fall prey to ransomware attackers this summer: On June 19, Riviera Beach officials voted to pay their requested ransom of 65 bitcoin, close to $600,000, to hackers who disabled the city's online services in late May.

Lake City police said the city paid a $10,000 deductible to its insurance company, which will cover the rest of the ransom.

In a statement, the city called the attack a "triple threat," a ransomware program that attacked the city's network three different ways and took out email systems, landline phones and online credit card payment.

Read More

Continue reading
  328 Hits

Copyright

© Flipboard and it's respective authors

328 Hits
Advertisement