iPhone 5s, iPhone 5c and iOS 7 what did we get

Ricky Williams Apple Leave a Comment

On Tuesday of this week, Sept. 10th, Apple held their event. We speculated on what we would get and talked about the other questions that still remained to be answered. Well now we have our answers. The iPhone 5s, iPhone 5c and iOS 7 were shown off so what did we get? Well we’re going to cover some of the details and also talk about some of the questions that are now created about where do they go form here. The video of the keynote is now available on the Apple site, go watch it. So to go through what we got to see at the keynote, there was the iPhone 5c (Android Free) The iPhone everyone thought was going to be cheap turned out to be “less expensive” instead. No one should have been surprised since Apple doesn’t do cheap and yet they were. When netbooks proliferated the computer landscape Apple did the MacBook Air. It was far from cheap but “less expensive” than a MacBook Pro. The iPhone 5c is the same. It is far from cheap but at $99 for a 16GB model on a 2 Year contract(US) it’s cheap enough that it becomes a throwaway phone. …

Ricky WilliamsiPhone 5s, iPhone 5c and iOS 7 what did we get

Star S5 Butterfly, a Knockoff beautiful than original

Bilawal Bashir Android Leave a Comment

There are a ton of Chinese knock offs running around the Android under-markets. Many Asian countries actually have very thriving markets for good looking, yet budget smartphones which ape the famous models. Star S5 Butterfly is another among the growing army of replicas, but it has something really interesting and eye-catching which the other cheap knock offs lack. The Star S5 Butterfly is clearly inspired by HTC’s Butterfly smartphone, as the name blatantly implies, yet it is somehow more stylish than the original. As you can clearly see, the Star S5 Butterfly copies the design aesthetics of the original HTC Butterfly very closely, right down to the red and black colors. But that is where the similarities end, the 5 inch smartphone is actually more acutely styled than the HTC counterpart. While the HTC Butterfly is a very amazing looking smartphone and always turns heads, its bland black front and red slab back are a little too much. The Star S5 Butterfly, ditches the full red back and opted for subtle red highlights making it stand out even more. Make no mistake though, the Star S5 Butterfly is still a shameless doppelganger, the specs are a clear testament of that. …

Bilawal BashirStar S5 Butterfly, a Knockoff beautiful than original

35% of Android Apps Are Secretly Stealing Your Info (In China)

Matthew Weber Android Leave a Comment

According to a report submitted on Wednesday by China’s Engrish-heavy “Data Center of China Internet”, or DCCI for those of us trying to sound articulate, just over 1/3 of all the apps downloaded on Android in their country  are ridden with malware designed to collect and package users info for the open market. “The report looked at each data-tracking function individually and found that, for example, more than half of the apps were tracking user locations, and 13.2 percent were doing so even though user location has no connection whatsoever to the app’s functionality. 21.2 percent of apps will check out your address book, 18.1 percent are reading your call records, nearly 12 percent are reading your text history, and some are even sending texts (14.7 percent) or making calls (14.7 percent) for you. In each of these categories, a significant percentage of the apps are doing these things secretly, even though there’s no reason for them to be doing them at all.” Across the top 1400 apps, the firm found that 75%  were taking everything down from credit card information, to passwords, to emails and text messages. Anything you put on a phone from the contacts list to where you are, who you’re …

Matthew Weber35% of Android Apps Are Secretly Stealing Your Info (In China)

Was China Alone in the Cyberattacks?

Matthew Mallicoat News Leave a Comment

A Java vulnerability that was worn by the Homeland Security Department was responsible for computers and even entire companies to be left vulnerable to the activities of hackers. A multitude of companies, including Twitter, Facebook, the Washington Post, Bloomberg and even the New York Times of all claiming there were attacks on the networks. For some of them, the attacks were relatively minor and no user account information or any other type of confidential information was sacrificed. With all of these attacks, it was believed by many to be the work of none other than China itself. Just yesterday, it was reported that security group in Virginia had discovered evidence that the attacks were centered in the building located near Shanghai.  What was China’s response? China has not taking any of this lying down. Today, the Chinese military denied the hacking allegations made by the tech company in Virginia. Now there are reports that an Eastern European group has also packs such companies as Apple, Facebook and twitter, in addition to several other smaller hacks. On Tuesday, Apple confirmed that some of the employee computers have been compromised after they visit a website for iPhone developers and Facebook said that …

Matthew MallicoatWas China Alone in the Cyberattacks?

Group Mandiat Points Finger at China

Matthew Mallicoat News Leave a Comment

For so long, people in America have been pointing the finger at China for a series of cyber attacks that targeted such places as the Washington Post, Facebook and twitter. For some of these attacks, it was estimated that user account information was compromised. All of these attacks were due to a Java vulnerability, which was hatched earlier this month, or so many have hoped. Things got so severe that the Department of Homeland Security issued a warning to the American people to disable Java until an appropriate patch was released.  Java and China The group that has linked China to the attack is a Virginia-based Mandiant. This company compiled a 60 page report that was published on Tuesday and described a six-year. This group observed a group of hackers stealing hundreds of terabytes of data, from 141 organizations across 20 industries around the world since 2006. All of this activity was traced the four networks near Shanghai. This is also the headquarters of the Unit 61398, which is a secret division of the Chinese military. The sheer size of this operation leaves little doubt that it was at least in part supported by the Chinese military. China, predictably, has …

Matthew MallicoatGroup Mandiat Points Finger at China

Facebook is the Victim of An Attack

Matthew Mallicoat News 1 Comment

Facebook is in one of the unlucky companies. It seems that has been a bad month for companies, as many of them are now vulnerable to hacks. It can be remembered for the Wall Street Journal, the Washington Post, and even twitter have claimed they’ve been the victims of hacks. Now to add to the troubles, Facebook has admitted that they had been the victim of an attack that took place in January. As of now, nothing is known for certain, yet many people are pointing fingers at various groups, one of which is located in China. All of this is merely speculation and Facebook has not released anything who they believe is responsible for these attacks. How is Facebook attacked? According to insiders at Facebook, some employees visited a compromised site and the machines were infected with malware. Facebook then contacted law enforcement and they began an investigation. As of now, Facebook has not released any details related to this case. Twitter announced a similar attack that took place, which had been attributed to a group in China, yet that has yet to be proven. Neither Facebook or twitter has mentioned this. Facebook has found no evidence any user …

Matthew MallicoatFacebook is the Victim of An Attack
New York Times

New York Times victim of cyberattack

Matthew Mallicoat News 1 Comment

Surprisingly, the New York Times has reported that they have been on the receiving end of an attack from Chinese hackers. These attackers were able to crack passwords and use them on a number of computers, even though there was antivirus software installed on them. As of now, the New York Times has yet to answer any questions from other news agencies. According to Candice Garmoe, “Advanced attacks…underscore how important it is for companies, countries and consumers to make sure they are using the full capability of security solutions. The advanced capabilities in our endpoint offerings, including our unique reputation-based technology and behavior-based blocking, specifically target sophisticated attacks.” But even with all the software, there were 45 instances of malware found on these computers and only one of those were identified by the antivirus software. Hopefully, this will not only be a lesson for news agencies, but for developers of antivirus software as well. Sensitive information needs to be protected, otherwise it could put innocent lives at stake. Who was behind the attack on New York Times? The Chinese government has stated they were not behind the attacks, even though the same methods have been used by them in the …

Matthew MallicoatNew York Times victim of cyberattack

T3kd Weekly Sixty Three

Matthew Weber Podcast Leave a Comment

We know what you’re thinking. No title. Don’t worry we had lots of good one liners that would’ve made great titles, but we’re trying something new. A lot of podcasts have great and funny show titles. So we are just going to do the number from now on. If you see a number post on the site, you will know it is a podcast.

Matthew WeberT3kd Weekly Sixty Three