fbpx

Web Directories

Daniel K. Henry

Daniel K. Henry

Do you know: There is a vast section of the Internet which is hidden and not accessible through regular search engines and web browsers.

This part of the Internet is known as the Deep Web, and it is about 500 times the size of the Web that we know.

What is DEEP WEB?

Deep Web is referred to the data which are not indexed by any standard search engine such as Google or Yahoo.

The 'Deep Web' refers to all web pages that search engines cannot find, such as user databases, registration-required web forums, webmail pages, and pages behind paywalls.

Then, there's the Dark Web or Dark Net – a specific part of that hidden Deep Web.
Deep Web and Dark Web are the intriguing topics for the Netizens all around. But when you hear the term 'Deep Web' or 'Dark Web,' you usually categorize them into one.
 
If yes, then you are wrong.
 
 

What is DARK WEB?

Dark Web is where you can operate without been tracked, maintaining total anonymity.
The Dark Web is much smaller than the Deep Web and is made up of all different kinds of websites that sell drugs, weapons and even hire assassins.

These are hidden networks avoiding their presence on the Surface Web, and its URLs are tailed up with .onion.

These [websitename].onion domains are not indexed by regular search engines, so you can only access Dark Web with special software -- called 'The Onion Browser,' referred to as TOR.

How to Install TOR on Android and iOS Devices

TOR is free, and anyone can download it.

Many of us heard about the Dark Web when the largest online underground marketplace Silk Road was taken down following an investigation by United States federal authorities.

But, what if, you can still be able to dig the Darknet contents with your regular browsers, without the need of TOR?

Here's How to Surf & Search the Deep Web without TOR

Solution: Deep Web Search Engines

Search engines like Google are incredibly powerful, but they can't crawl and index the vast amount of data that is not hyperlinked or accessed via public DNS services.

However, there are Deep Web Search Engines that crawl over the TOR network and bring the same result to your regular browser.

Some of such Dark Web Search Engines are:

Here are some Deep Web Search Engines:

These Deep Web search engines talks to the onion service via Tor and relays, resolve the .onion links and then deliver the final output to your regular browser on the ordinary World Wide Web.

However, there is one consequence of browsing Deep or Dark Web on a regular browser. Working this way will make these .onion search results visible to you, me, and also, for Google.

Moreover, tracker-less search engines are also popular in the TOR culture – like DisconnectDDGIXQuick– which ensures your privacy searches.

Importance of TOR

It is worth noting that mere access via TOR is not considered as an illegal practice but can arouse suspicion with the law.

TOR has long been used by Journalists, Researchers, or Thrill seekers in heavily censored countries in order to hide their web browsing habits and physical location, crawl the Deep Web and exchange information anonymously.

However, one of the main reasons behind the rise of TOR is NSA's Surveillance Programs.

After the Assange-Snowden revelations in the past years, public fears about their privacy getting compromised over the Internet.

The reliability of the Internet had been lost that demanded the Ciphers come into action to thwart the Federal Agency's efforts. So comes the need of TOR.

With the help of TOR, the web users could roam around the Internet beyond any fear, keeping themselves and their real identities hidden from federal and intelligent agencies.

This is why TOR is being one of the favorite targets of federal agencies.

Since Tor has long been a target of the government intelligence agencies, most online users do not feel safe to use Tor anymore.

To known how easy it is for government agencies to unmask Tor users, you can read these articles:

Who lurks in the 'Dark Web'?

According to the recent survey conducted by researchers Daniel Moore and Thomas Rid (in their book Cryptopolitik and the Darknet), it is found that 57% of the Dark Web is occupied by unauthorized contents like Pornography, Illicit Finances, Drug Hub, Weapon Trafficking, counterfeit currency flow and many more.

The netizens had given the shade of illegalities to Dark Web. This is why today Dark Web is being defined as something that is illegal instead of a 'Pool of Information.'

However, there are countless reasons to use Dark Web. But, ultimately, it depends on the surfer what to surf?

Sidelining Darkweb for criminal offenses often gray out the legitimate purposes inside Dark Web.

In the end, I just want to say:

Knowledge is Free! Happy Surfing!

Author : Rakesh Krishnan

Source : thehackernews.com

This story was delivered to BI Intelligence "E-Commerce Industry Insider" subscribers. To learn more and subscribe, please click here.

U.S. retailers moved to EMV chip-enabled credit and debit cards in October in order to enhance security on physical card transactions, but this move had an unfortunate side effect.

Online fraud attacks have risen 11% since October's EMV migration, according to a report from PYMNTS. And these attacks are costing retailers on multiple fronts.

There were 27 fraud attacks for every 1,000 e-commerce transactions in the fourth quarter 2015, an 11% increase from the third quarter and a staggering 215% increase from the first quarter. Digital goods were the most frequent targets of these attacks at a 2.5% rate in Q4, up from slightly less than 1% in Q1.

The report also indicates that $4.79 of every $100 spent online is at risk of a fraud attack, up 150% from $2.90 of every $100 in Q1.

Most of these online fraud attempts stem from "suspected botnets" that hack into a system (such as an online retailer's site) and actually finish a transaction without the user actually knowing it.

E-commerce fraud cost retailers $32 billion in 2014, and estimates say U.S. retailers lost 1.3% of all revenue due to fraud in 2015. That is more than double the 2014 rate.

To combat this growing problem, online retailers must enhance their security. Target's widely publicized data breach in 2013 cost the retail giant more than $250 million. Some of that money was allocated toward bank and credit unions, consumer protection services, and credit card issuers.

Retailers are, however, spending more on cyber insurance. Retailers on average paid 32% more for cyber insurance in the first six months of 2015 than in 2014, according to global insurance broker Marsh.

As the fraud epidemic grows, payment companies and merchants are implementing new payment protocols that could finally help mitigate fraud.

John Heggestuen, senior research analyst for BI Intelligence, Business Insider's premium research service, has compiled a detailed report on payment security that looks at how the dynamics of fraud are shifting across in-store and online channels and explains the top new types of security that are gaining traction across each of these channels, including on Apple Pay.

Payments Security Report Cover

Here are some of the key takeaways from the report:

  • EMV cards are being rolled out with an embedded microchip for added security. The microchip carries out real-time risk assessments on a person's card purchase activity based on the card user's profile. The chip also generates dynamic cryptograms when the card is inserted into a payment terminal. Because these cryptograms change with every purchase, it makes it difficult for fraudsters to make counterfeit cards that can be used for in-store transactions.

  • To bolster security throughout the payments chain encryption of payments data is being widely implemented. Encryption degrades valuable data by using an algorithm to translate card numbers into new values. This makes it difficult for fraudsters to harvest the payments data for use in future transactions.

  • Point-to-point encryption is the most tightly defined form of payments encryption. In this scheme, sensitive payment data is encrypted from the point of capture at the payments terminal all the way through to the gateway or acquirer. This makes it much more difficult for fraudsters to harvest usable data from transactions in stores and online.

  • Tokenization increases the security of transactions made online and in stores. Tokenization schemes assign a random value to payment data, making it effectively impossible for hackers to access the sensitive data from the token itself. Tokens are often "multiuse," meaning merchants don't have to force consumers to re-enter their payment details. Apple Pay uses an emerging form of tokenization.

  • 3D Secure is an imperfect answer to user authentication online. One difficulty in fighting online fraud is that it is hard to tell whether the person using card data is actually the cardholder. 3D Secure adds a level of user authentication by requiring the customer to enter a passcode or biometric data in addition to payment data to complete a transaction online. Merchants who implement 3D Secure risk higher shopping-cart abandonment.

In full, the report:

  • Assesses the fraud cost to US retailers and how that fraud is expected to shift in coming years

  • Provides 5 high-level explanations of the top payment security protocols

  • Includes 7 infographics illustrating what the transaction flow looks like when each type of security is implemented.

  • Analyzes the strengths and weakness of each payment security protocol and the reasons why particular protocols are being put in place at different types of merchants

To get your copy of this invaluable guide, choose one of these options:

  1. Subscribe to an ALL-ACCESS Membership with BI Intelligence and gain immediate access to this report AND over 100 other expertly researched deep-dive reports, subscriptions to all of our daily newsletters, and much more.
    >> START A MEMBERSHIP
  2. Purchase the report and download it immediately from our research store.
    >> BUY THE REPORT

The choice is yours. But however you decide to acquire this report, you’ve given yourself a powerful advantage in your understanding of payments security.

Author : Andrew Meola

Source : http://www.businessinsider.com/online-fraud-attacks-in-the-us-are-growing-at-an-alarming-rate-2016-4

Everything you need to know about iPhone 7, iPhone 6s, iPhone SE, and more!

iPhone is a pocket camera, computer, and yes — communicator — all in one. It's Apple's most successful product and one of the most successful products of all time. Introduced by Steve Jobs in 2007, Apple has sold over a billion of them to date. Current models include iPhone 7 and iPhone 7 Plus, with enhanced cameras, water-proofing, virtual home buttons, and improved battery life. Last year's iPhone 6s and iPhone 6s Plus are still on the market, available at a slight discount. And iPhone SE, which packs most of the features of iPhone 6s into the smaller, iPhone 5s package.

Best iPhone: 128 GB matte black iPhone 7

Berlin-based startup N26 got its own banking license a few months ago. As N26 is building a mobile-first bank without any physical branch, the startup can expand to new countries much more easily. N26 co-founder and CEO Valentin Stalf is announcing on stage at TechCrunch Disrupt that the startup is now active in 17 countries across Europe.

As a European banking license works across the Eurozone, you’ll now be able to open an account in many countries in the Eurozone. While you could already open an account in Germany and Austria, signups had been on hold in France, Spain, Italy, Greece, Ireland and Slovakia for a while. You can now sign up again in these countries.

And starting today, if you live in Belgium, Estonia, Finland, Latvia, Lithuania, Luxembourg, Netherlands, Portugal and Slovenia, you can also open an N26 account.

While N26 doesn’t have any branch, providing good customer support is key when you’re trying to build a bank. While many people speak English, it’s much easier to become mainstream if you can provide support in everyone’s native language.

The startup is taking tiny steps in this direction with a support team that can speak English, German, French, Spanish and Italian.

The company is still saying that it has 200,000 customers, but this new expansion could bring a ton of new customers. The transition from Wirecard to N26’s own back end is still in progress, and based on my own experience, it looks like it’s taking a few more weeks than expected.

But N26 is also adding new features. In addition to providing a modern checking account, the startup is building a fintech hub so that you get all the features you expect from a bank.

For instance, N26 lets you transfer money using TransferWise in the mobile app. There’s an investment feature for German customers and the company recently announced a premium Black card with a few insurance features.

Stalf showed logos of various fintech startups on stage at Disrupt, talking about some of the potential partnerships with other startups. For instance, you could image N26 working with Robinhood, FinanceFox, Vaamo, Raisin, Nutmeg, Auxmoney, Clark, LendingClub and Amazon.

The app alone makes N26 worth it. I’ve had some terrible experiences with other banking apps. Most of them aren’t even native apps, they use web technologies and are slow. N26 is a well-designed native app — it’s like drinking a glass of ice water in hell.

Source : https://techcrunch.com

Auhtor : 

The humble Google, Bing search boxes will disappear by 2027, according to a team of Microsoft researchers. The research team, comprising of all women were asked about technological advances they expect to see in 2017 and 2027. Along with predicting the disappearance of the traditional search box, the team also predicted that farmers will start using AI for predicting crop yields.

 
 

Susan Dumais, one of the researchers, believes that deep learning will continue to help with improved search results in the coming years. She is also of the opinion that the search box will be no longer required by the time 2027 arrives. According to her it will be replaced by something more "ubiquitous, embedded, and contextually sensitive".  She elaborated further on her prediction, "We are already seeing the increased use of voice search with the help of vocal commands, both in cases of home computers and smart-phones. This trend will only increase in the coming years and there will come a time when we will be able to search using images, videos and sound." 

 
 
 
 

It is worth noting here that such a prediction from Microsoft isn't surprising. The company has been losing the search engine battle to Google for decades now. One of the reasons Microsoft used an all-women team of researchers is because there are always complaints about "lack of women in tech fields".  All of the other predictions can be checked out here.

 

Coming to the prediction of farmers using AI for growing crops, Asta Rosway, principal research designer, said that farmers will not only use it for growing crops, but also for tracking "disaster, drought and climate change". Another researcher of the team, Xiaoyan Sun is of the opinion that deep learning and imaging devices will improve so much that "artificial eyes" could be created from them.

 

 

Source : http://www.scienceworldreport.com/

Auhtor : Romi D

Not only can your smartphone be hacked, it can be done very easily without your knowledge.

"At the end of the day, everything is hackable. What I am surprised about is that people sometimes forget that it's so easy to hack into these devices," said Adi Sharabani, the co-founder of mobile security company Skycure, who used to work for Israeli Intelligence. 

Even if a malicious attacker cannot get into your phone, they can try to get the sensitive data stored inside, including contacts, places visited and e-mails.

"It's important to realize that the services your smartphone relies on are much more attractive target to attackers. So for example, the photo leak that happened from iCloud where a bunch of celebrities had their photos posted all over the Internet is the perfect example," said Alex McGeorge, the head of threat intelligence at cybersecurity company Immunity, Inc.

Often, the hack or data breach occurs without the consumer's knowledge, according to Sharabani.

And it's not just consumers that criminals target. With the rise of smartphones and tablets in the workplace, hackers attempt to attack enterprises through vulnerabilities in mobile devices.

Both Sharabani and McGeorge perform attack simulations for clients and find that these hacking demonstrations usually go undetected.

"It's usually very rare that a breach that originated through a mobile device or is just contained to a mobile device is likely to be detected by a corporation's incident response team," McGeorge said.

And Sharibani agrees. He says he's still waiting for someone to call him and say that their IT department identified the attack demonstration. 

"No one knows," he said. "And the fact that organizations do not know how many of their mobile devices encountered an attack in the last month is a problem."

But there is a silver lining, according to the wireless industry.

"The U.S. has one of the lowest malware infection rate in the world thanks to the entire wireless ecosystem working together and individually to vigilantly protect consumers," said John Marinho, vice president of technology & cybersecurity at CTIA, the wireless association. CTIA is an industry group which represents both phone carriers and manufacturers.

Here are the three ways a smartphone is most likely to be breached.

Hacking mobile phone laptop
Scyther5 | Getty Images

Unsecure Wi-Fi

Wi-Fi in public places, such as cafes and airports could be unsecure, letting malicious actors view everything you do while connected.

"Someone is trying to gain access to your email, to your password. They are trying to gain access to all of your contacts, who you meet with, where and when. Do you approve? So me, as a security expert, I always click cancel," Sharabani said.

To know if you're on an unsecure connect pay attention to warning message your device is giving you. On iPhones, a warning will come up saying that the server identity cannot be verified and asking if you still want to connect. You will be prompted to click "continue" before you can join the Wi-Fi.

Despite the warning, "92 percent of people click continue on this screen," according to Sharabani.

"Your phone actually has a lot of really good built in technology to warn you when you are going to make a poor security decision. And what we found through our general penetration testing practice and talking to some of our customers is people are very conditioned to just click through whatever warnings it is because they want the content," said McGeorge.

To protect yourself, be careful when connecting to free Wi-Fi and avoid sharing sensitive information.

Operating system flaws

Despite the best intentions of smartphone manufacturers, vulnerabilities are found which could let attackers in.

"We see that the average ratio is that more than one vulnerability being publicly disclosed every day, and 10 percent of those are critical vulnerabilities, vulnerabilities that allow someone remotely to gain access to your device and control it," Sharabani said.

Device manufacturers release operating system updates frequently to protect users. 

"All of those updates have really important security fixes in them and people are worried well maybe this is going to impact how I use my phone or maybe my phone isn't compatible. They need to apply those updates as soon as they come out," said McGeorge.

Experts advise you install operating system updates as soon as they are available. Once updates are released, hackers know about vulnerabilities and attempt to breach out-of-dates devices.

Malicious apps

Applications add functionality to smartphone, but also increase the risk of a data breach, especially if they are downloaded from websites or messages, instead of an app store. Hidden inside applications, even ones that work, could be malicious code that lets hackers steal data.

"The app ecosystem of mobile phones is enormous. Neither Apple nor Google can possibly look through every single app on their store and determine if it's malicious or not," said McGeorge.

To protect yourself, McGeorge advises you limit the number of apps you install.

"The more apps you have increases what we call the attack surface on your phone. What that means is there is more lines of code and therefore there is higher incidence there is going to be a security critical bug in that amount of code," he said.

McGeorge also suggests you think about who the app developer is and if you really need the app.

Skycure's Sharabani suggests you look at the warning messages when installing applications.

"Read those messages that are being prompted to us that sometimes say, 'This app will have access to your email. Would you agree?'" He said. 

Bottom line, according to Sharibani , there is no such thing as being 100 percent secure. But there are many ways to reduce the risk and make it harder for hackers to invade your smartphone.

In a statement sent by e-mail, an Apple spokesman said, "We've built safeguards into iOS to help warn users of potentially harmful content… We also encourage our customers to download from only a trusted source like the App Store and to pay attention to the warnings that we've put in place before they choose to download and install untrusted content."

And Google, which oversees Android said it also has added additional privacy and security controls. 

"Last year, we launched a privacy / security controls 'hub' called My Account. Since then, 1 billion people have used this and just last week we added a new feature called Find your phone. It's a series of controls that enable you to secure your phone (Android or iPhone) and your Google account if your device is misplaced, lost, stolen, etc," a spokesman said in an e-mail.

Source : http://www.cnbc.com/

Auhtor : Jennifer Schlesinger

About.com is launching its third standalone brand in the form of Lifewire, a tech information and advice site.

Lifewire will offer advice and answers on common tech questions and problems in the most clear, simplified format possible.

About, the IAC-owned media company, is in the midst of a transition. Instead of serving information about how to bake a pie and how to manage your personal finances in the same place, the company is breaking up its various catalogs of DIY and how-to information into branded verticals.

The shift started in spring of this year, with the launch of health and wellness site Verywell. Verywell launched with more than 50,000 pieces of content ranging from common medical conditions like diabetes and rheumatoid arthritis to simple health tips like how to get more sleep or advice on fitness.

In early September, About launched the second new vertical with The Balance, a personal finance site. Smaller than Verywell, The Balance launched with 34,000 pieces of existing content, all organized under the topics of personal finance, investing, money hacks, career advice, and small business tips.

Lifewire will launch with 16,000 pieces of content written by 40 writers, all focused on how to fix products that aren’t working, what gear to buy, and how to get the most out of gadgets. CEO Neil Vogel said that the company is intent on not crossing the line into technology news, but rather offering more evergreen, informational content.

lifewire_hp_wider

About plans to launch five total branded sites. However, the next two (Home and Food) will feel a bit different from the existing verticals. Vogel says that with the first three sites, Verywell, the Balance and Lifewire, users are more likely to dive deep and narrow on a certain topic. But the Home and Food verticals are inherently more browsy.

Lifewire may be one of the smallest verticals from About’s new portfolio, but the company chose to launch it before Home and Food (official names TBA) because they had already built out that topic-focused format with Verywell and the Balance.

About’s transition to standalone brands not only benefits users, but helps the company get traction on social media, as well as serve more targeted, effective advertisements.

If you want to check out Lifewire, head over to the website here.

Source : https://techcrunch.com

Author : Jordan Crook

Wednesday, 16 November 2016 00:42

The Latest Social Media News from October 2016

October was a relatively mellow month in terms of social media updates, but that doesn’t mean there weren’t any noteworthy announcements.

Vine’s demise was probably the most significant, along with news and a few changes from Facebook, Pinterest, reddit, and YouTube.

Here are the latest social media updates from October:

Facebook

Some big changes are coming to call-to-action buttons on Facebook Pages, including new third-party and Messenger integrations. Facebook is also rolling out a new recommendation feature that could help more people discover your business Facebook.

facebook cta

Pinterest

Pinterest now has 150 million monthly active users globally – 70 million of whom live in the U.S.

Pinterest is giving advertisers even more new retargeting options. You can now create audiences based on the actions users take with your pins and the actions people take on your website.

pinterest retargeting

Reddit

Reddit is launching ‘Interest Targeting’ into Reddit Ads, which would “allow advertisers to target audiences based on a handful of predefined interests (e.g. sports, gaming, music, etc.), which will be informed by which communities they frequent.

Twitter

Twitter announced that the Vine app will be discontinued in the “coming months.” However, you’ll still be able to continue accessing and downloading your Vines.

rip vine

Are you responding to your customers’ tweets on Twitter? If not, you could be losing out on revenue and loyalty, according to a new Twitter study. Customer service on Twitter has been recently enhanced thanks to new tools, too.

YouTube

YouTube announced added a new feature that lets you add a thumbnail overlay to the end of your videos to keep viewers engaged. The feature, called End Screens, will appear during the last 5 to 20 seconds of your video.

youtube thumbnail

“We are launching a new, optional video feature that adds visible text on the video for the first few seconds a viewer watches, informing viewers of a paid promotion,” YouTube announced. “Creators can also choose to add this text disclosure to any existing video without losing their view count or other video metrics.”

Source : searchenginejournal.com

Saturday, 29 October 2016 02:24

Mac v PC - who's cooler now?

This week saw the unveiling of a futuristic computer in a very slick presentation. The giant touchscreen device looked gorgeous, did amazing things - and came with an extortionate price tag.

How typically Apple.

Except that the computer was Microsoft's Surface Studio.

Tonight Apple is holding its own event, and is expected to unveil new versions of the Mac.

The pressure is on, and not just because it's been so long since the Mac line-up was refreshed - it is 1,043 days since the top-of-the line Mac Pro was released and the MacBook Air and MacBook Pro are also looking a bit tired.

Apple image

 

This image, contained in a recent MacOS update, appears to depict the next MacBook Pro

 

Microsoft has been working quietly to rebuild a reputation in Windows hardware, with the well-received Surface tablets and laptops now joined by a top-end desktop PC.

At $2,999 - probably at least £3,000 when you add in VAT - the Surface Studio will have quite a limited market.

But its effect on the image of dull old Windows will be much more important to Microsoft.

Surface Studio

The Surface Studio comes bundled with a dial peripheral that offers new ways to control Windows 

Meanwhile, Apple's wider reputation as an innovative company - and a much cooler business than Microsoft - is coming into question.

After the Surface Studio launch Aaron Levie, the chief executive of the cloud storage firm Box, sent out this tweet: "Microsoft's hardware + software strategy is producing some compelling results. It's almost as if Steve Jobs was right all along."

That sparked this response from the former Apple executive and creator of the iPod Tony Fadell: "Not almost - he was & still is right! Except it appears that Apple has forgotten this very valuable lesson."

He linked to a story claiming that Apple had given up on its project to build a car. Even Apple loyalists are beginning to ask just when the next really innovative product is coming along.

Tim Cook

Investors are wondering whether Tim Cook can launch a new product that will rival the iPhone's success

During Tuesday's conference call for analysts following Apple's fourth quarter results, most questions focused on the details of the company's financial performance which despite a rather flat year still looks hugely impressive.

But a couple of analysts gently probed Tim Cook about where the next big money-spinner to follow the iPhone would come from.

Was the company still interested in building a car? What about making a TV and perhaps buying a media business? Any interest in using Apple's expertise in artificial intelligence to build a voice-controlled speaker like Amazon's Echo?

Amazon Echo

Amazon's voice-controlled Echo speaker has proved to be a hit for the retailer

 

You won't be surprised to hear that Mr Cook ducked and dived around all these questions - Apple never previews its product plans.

He did say television was still "of intense interest" to him and others at Apple, the car space was also "interesting", and as for a virtual assistant in your home, well Siri on your phone was much more useful.

But, asked another analyst, does Apple have a grand strategy, does it know what it wants to do over the next three to five years?

"We've got the strongest pipeline we've ever had and we're really confident about what's in it" was all Tim Cook would say.

The trouble is, he has said something very similar before, notably at the beginning of 2014 when he said in reply to another question about innovation: "I think customers are going to love what we're going to do… We have zero issue coming up with things we want to do that we can disrupt in a major way. The challenge is always to focus [on] the very few that deserve our full energy."

Apple Watch

The Apple Watch is the bestselling smartwatch, but a report by IDC indicates shipments fell by 72% over the past year

Later that year there was a brand new product, the Apple Watch. But although it looks the most accomplished of the smartwatches on the market, it has hardly settled the doubts about innovation at Apple under Tim Cook.

This year the most intriguing product to come out of the iPhone 7 launch in September was a wireless headset that integrates with Siri, a kind of virtual assistant in your ears.

The AirPods were due to go on sale by the end of October, but now we learn that they aren't ready and there is no news on when they will be.

Apple AirPods

Apple has yet to provide a revised release date for its AirPods

It's a small hiccup, but one that seems to indicate that Apple's innovation engine isn't firing on all cylinders.

Now, let's be clear, the Apple logo still shines brightly from all those MacBook Airs in any vaguely creative business, or in the front row of most tech conferences.

That isn't likely to change soon - although it will be interesting to see if the new Surface Book laptop's claim of 16 hours battery life tempts many to convert.

Microsoft launch

Microsoft suggested its laptop has the edge over Apple's at its Tuesday event

But the eyes of the tech community will be on today's event in Cupertino, looking for something even vaguely radical in the new Mac line-up.

If Tim Cook does not deliver, the low-level grumbling about whatever happened to the Steve Jobs legacy will only grow louder.

Check back later here for my first thoughts on what Apple announces.

Update:

Apple Touch Bar

So, yes, Apple did deliver innovation in unveiling the new line of MacBook Pros.

The Touch Bar is a smart way of giving users a new interface with their computers while differentiating it from the touchscreen iPad.

And bringing Touch ID to the laptop will be welcomed by those who appreciate the convenience of using a fingerprint to log on - and by ecommerce companies looking forward to more business from identifiable customers.

But it took 90 minutes for Apple to unveil a new and rather limited TV app and an upgrade, albeit a significant one, to just one computer.

It surely needs to quicken the pace of innovation if it is to prove that Mac is still cooler than PC.

Source: bbc.com

The search giant on the Internet, Google, has updated its privacy policy to ensure protection of its users’ personal information. A provision on the technology firm’s privacy statement had been ruled out. In this statement, Google promises not to integrate cookies on personal information without approval from each user.

Ever since Google had changed its method of tracking its users, their personal information on their account had been incorporated with the company’s search records on the Internet.

ProPublica, a non-profit news agency, had conducted a study on Google’s changes in its privacy statement. They research explained that the search engine had promised primarily to keep the two sets of data as separate entities so as to protect user’s information. However, it had update its policies so that it deleted the statement that supports this promise. They used to state that they would ask for user’s consent before the combine cookie data with personally identifiable information.

 

Google had slightly been scrutinized because of this turnaround. In the media, reports had been centered on Google’s tools that enable users to watch and maintain advertisements rather than the new influence that Google had acquired.

DoubleClick is actually an online advertising company acquired by Google. This company employs the cookies to monitor surfing people’s surfing behavior through their IP address. This mechanism allows the company to point their ads to the right target. With cookie information, DoubleClick can predict the surfing habit in one’s location. However, it is unable to determine one’s identity.

DoubleClick-.jpgMeanwhile, Google had all the names, email and other information in their search data.

Many organizations of Google’s users had filed a complaint against the company to the Federal Trade Commission during this acquisition. They contest that their privacy had been violated by this provision change in Google’s privacy statement.

Sergey Brin, on behalf of Google, guarantees the complainants that they are being very watchful of people’s personal information. Data security is their primary concern when it comes to advertising.

Another disputed update on its privacy policy was made by Google in the year 2012. This update permits the company to share user’s data within a variety of Google’s services. DoubleClick, however, had been kept away.

The practical implication of this move is that Google can already make up ample information on people’s online habits. Additionally, DoubleClick advertisements can be embodied according to the keywords that a person uses on his or her Gmail.

Google, however, attested that the change is only voluntary. It is also intended to provide users with greater control of their data. Besides, Google is not the only online firm which tracks people in this method.  Many other websites, including Facebook, are doing the same.

Users have the ability to elect or refuse these changes. They can access their “My Account” settings to opt-out of this feature.

Source : opptrends

AOFIRS

World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.