Monday, November 28, 2016

#Nexus 4 expiration delayed with CyanogenMod 14.1 Nougat

 Market analysts would say that the average turnover rate for most smartphones is two years, which is exactly how long most contracts last anyway. That is true even for Google’s Nexus devices. In that sense, the Nexus 4, launched way back in 2012, is way past its due date. But for those still with a perfectly serviceable unit, news of its death has been largely exaggerated. Especially now that there’s a CyanogenMod 14.1 nightly image for it, bringing the nutty goodness of Nougat to the phone.
Nexus 4 expiration delayed with CyanogenMod 14.1 Nougat



To be clear, this is far from being a “stable” version of Android 7.0 Nougat for the Nexus 4, though CyanogenMod itself has done away with such labels for its rolling releases. The nightly builds, which are cooked, well, nightly, come with no guarantee of stability, which may change daily. But those who own a Nexus 4 hungry from some new dessert, they will most likely take what they can.

The biggest question will be whether it will be worth it for owners to risk running CM 14.1 nightly on their smartphone. The Nexus 4 definitely doesn’t have the hardware to support many of the features introduced in Android 7.0 and the upcoming 7.1. At the very least, the device’s aging hardware might not be able to handle much of those features in the first place. Still, as far as having the latest Android version is concerned, it is one of the only paths available for those who want to live on the cutting edge.

There is, however, no guarantee that the nightly builds will continue ad infinitum. Unlike Cyanogen OS, CyanogenMod development and support for devices is a purely volunteer-based work of love and enthusiasm. Should maintainers for the Nexus 4 branch meet an insurmountable problem, they are likely to drop work on it. Or wait for Android O.

Slashgear.com



Genesis mining promo code: CZL5k6

Redesigned #BMW i3 Electric Vehicle With Longer Range Tipped For 2017

Bookmark and Share

Genesis mining promo code: CZL5k6

Thursday, October 20, 2016

#Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes

Genesis mining promo code: get your 3% with: CZL5k6 

Bookmark and Share

Thursday, October 13, 2016

Firms Are in Denial About the #EU 's Coming Privacy Law, Survey Suggests. #GDPR

Bookmark and Share

Tuesday, October 11, 2016

#G7 FUNDAMENTAL ELEMENTS OF #CYBERSECURITY FOR THE FINANCIAL SECTOR

Bookmark and Share

Tuesday, October 4, 2016

Think changing your #Yahoo password is enough? Think again…

Like many others, Simon received a notification that his account was included in the breach. Like many others, Simon logged in to his account and changed his password. He then opened his iPhone Mail application since he had configured the app to use his Yahoo account. He expected to be prompted for his new password and was more than a little surprised when he found it was not necessary. Even though he had changed the password associated with his Yahoo account, the phone was still connected.
Upon investigating, it became clear that Yahoo had issued a permanent credential to the device. This credential does not expire and is not revoked when the password changes. In other words, if someone already obtained access to your account and configured the iOS Mail app to use it, they would still have access to the account even after the password changes. What’s worse is that you would likely not even realize someone still has access to your email.
This presents a couple of different problems. First, steps beyond changing your password are not being clearly communicated from Yahoo. This could lead to a situation where millions believe they are protected even though they aren’t. Additionally, even if you are security conscious like Simon and want to review your activity and devices, it’s not easy to find. Associated devices aren’t listed under the “Account Security” tab at all. As shown in Figure 1 (below), the “Account Security” tab has no mention of associated devices.

blog


Figure 1 – Yahoo Security Tab

 The setting actually exists under the “Recent Activity” tab (Figure 2). Here you are able to see which applications are connected to your account with an option to remove them. It’s also interesting to see the apps and devices are just listed by product name – in this case “iOS” – and the date authorized. It’s up to the user to figure out what is legitimate and what’s not.



blgo2








Figure 2 – Yahoo Recent Activity Tab

Looking at the phone settings (Figure 3) is of little help. Looking at the setting shows there is no option via the app to change the password. This is likely by design. When you set up your mail account on the device, it gets permanently credentialed until the credential is revoked through the server.





blgo3



Figure 3 – iPhone Mail Settings
While it’s unfortunate Yahoo’s official advice for securing a hacked Yahoo account makes no mention of checking for or removing associated apps and devices, it definitely should be on your list. In fact, your list should look something like this:
The steps users take after a breach notification often determine whether further account damage occurs. It’s unknown if the attackers will be able to decrypt stolen passwords or how they intend to use other leaked data. Regardless, if you change your password and review the associated devices, you’re less likely to be impacted. By understanding all the actions needed, you can exert some control over your account’s security.











blog.trendmicro.com

Bookmark and Share

Genesis mining promo code: CZL5k6

#FBI Official Explains What To Do In A #Ransomware Attack

Bookmark and Share

Genesis mining promo code: get your 3% with: CZL5k6