Technology

Essential Home Cleaning Guide

1
Technology

How To Use Hydroponic Ph Buffers & Aids

2
Technology

Easy Party Packages For Every Occasion

3

In parallel to computer and video games, the market for board games is booming. From Thursday, game publishers from all over the world will be showing their latest creations at the Spielmesse in Essen. Digitization is also finding its way here.

The land of Andor is in danger: The enemies, skrals and other evil creatures are moving closer and closer from the forests and the mountains. But Anja, Sabine, Peter and Michael – all around forty years old and employed in their normal lives – have teamed up to fend them off. Every Wednesday the four of them meet in an apartment in Cologne – and slip into roles that couldn’t be further from their everyday lives. As a dwarf, archer, sorceress and warrior. They let the dice roll on the A3-sized and detailed landscape game board and then move their hero figures and those of their enemies on the board.

It’s not just digital games on consoles, smartphones and computers that are booming: the demand for board and card games remains high. For example, the parlor games business in Germany grew by nine percent last year; In total, more than 50 million games went over the counter in this country alone – both of which show that more and more analogue games are being played in Germany.

The main reason for this development: board games connect all generations. They are not only used in this country as a communicative and cooperative, emotional and educational experience, for example during a game evening with friends or family. For some people, in these times when their own smartphone is practically omnipresent, analog gaming is also becoming an exercise in “digital detox”, ie a conscious decision not to constantly stare at flashing displays. For those who are enthusiastic about games, the annual “Spiel” trade fair, which opens its doors in Essen for the 37th time on Thursday, is a must. The event, which has meanwhile advanced to the world’s largest public fair for board games, expects 1200 exhibitors from over 53 nations and five continents this year.

Dominique Metzler, head of the trade fair organizer Friedhelm-Merz-Verlag, based in Bonn, is expecting significantly more this year than the 190,000 gaming enthusiasts from all over the world who came to Essen last year. This means that the analog trade fair is half the size of its digital sister event “Gamescom” in Cologne, which around 373,000 video game players attended at the end of August.
“The more people play and the more positive experiences they have, the more demand and interest in board games grows,” says Hermann Hutter, head of the industry association for games publishers. “The publishers provide the basis for a further boom with innovative ideas on current social issues.” Currently, games such as “Ocean Crisis” (publisher: Shepherd Kit) or “CO2: Second Chance” (author: Vital Lacerda) are taking up the topic Environmental protection and playfully develop visions for a clean future.

 

But the analog gaming world has long since expanded to include numerous digital channels such as social media, blogs and YouTube videos, in which players can discuss the latest game hypes in special forums or find out more about the multitude of board games – one of the most important trends in the analog game world.
For example, there are numerous board game channels and blogs on the video portal YouTube, similar to the digital game world. Here the scene can find out about new releases using Let’s Play or Unboxing videos. The largest YouTube channels in this segment include Tom Vasel’s “The Dice Tower” with 226,000 subscribers and 14,770 videos, Rodney Smith’s “Watch It Played” channel (160,000 subscribers) and Richard “Rahdo” Ham (89,200 subscribers) with his popular “ Rahdo Runs Through “Videos.

 

Boardgamegeek.com, on the other hand, as the world’s largest English-language game portal for those interested in board games, has a database with more than 100,000 registered games. If you believe the nerds and game freaks there, “Maracaibo” from the pen of the Austrian star designer Alexander Pfister from the German publisher DLP Games, “Cooper Island” from the German game developer Andreas Odendahl from the German publisher Frosted Games and “Alubari: A Nice Cup Of Tea ”by the British Tony Boydell (publishers: Studio H, Board Game Box) on the strategic newcomers currently most discussed on the portal.
In all three board games, gamers immerse themselves in the respective epoch – the Caribbean in the 17th century (Maracaibo), the era of seafarers’ discovery (Cooper Island), tea plantation management in Darjeeling around 1840 (Alubari) – and compete against each other in completing their strategic tasks on. The games are aimed at experienced connoisseur players from 10 years of age who are not afraid of particular complexity and a playing time of 60 to 120 minutes.

So-called legacy games continue to conquer the board game market. This genre is about games in which – depending on the respective decisions of the players – the rules and components change and develop from round to round: For example, by discovering new game material, painting and sticking the game board or creating new characters. A currently popular example of this is “Machi Koro Legacy”, the new game by American player inventors Rob Daviau and JR Honeycutt (Pandasaurus publisher).

In addition, so-called cooperative games such as “Cities Skylines” by the Swedish game designer Rustan Hakansson (publisher: Kosmos), a board game implementation of the six million sold PC mega-seller of the same name, are currently booming. Here the players follow a common strategy to build their respective dream city. Other board game implementations of PC classics are “World of Warcraft: Das Brettspiel” (publisher: Heidelberger), “Age of Empires III: The Age of Discoveries” and “Civilization – Das Brettspiel” (both publisher: ADC Blackfire) or “Doom” (Publisher: Fantasy Flight Games).

“Zombicide Evolution-Las Vegas” (publisher: CMON) even merges board games and consoles into a hybrid gaming unit. In the game, players can track their characters using an app that runs on their smartphones. This, in turn, is networked with the manufacturer’s so-called Gamemaster app and is therefore able to surprise gamers with malicious intelligence. The game will be shown as a prototype at the fair and will be financed in the coming year via the crowdfunding platform Kickstarter, which is also interesting for the board game industry.

Meanwhile, the four geeks from the Cologne board game have been playing their fantasy adventure for a good two hours before they know whether they will emerge as winners or losers from the adventure. This time the four heroes successfully defended the land of Andor – all heroes survived, only the dwarf lost a few life points. In the world of Andor, the board game group can now devote themselves to one of the numerous other scenarios, slip into the role of other heroes and master new challenges.

 

Smartphones, tablets or laptops are permanent travel companions for many who are now going on vacation – and are often easy targets for hackers at the holiday destination. With these tips you can protect yourself.

When I went to the Netherlands for a short vacation a few days ago, I made a surprising discovery on my cell phone. Although the Dutch company’s Corona warning app is only just being tested and is still being offered for public download, I found dozens of apps in the app store that promised advice and protection against the Covid pandemic. I didn’t install any, especially not after looking at the partly indefinable functions, but especially in view of the mostly unknown to dubious publishers.

In fact, IT security service providers keep coming across fake corona warning programs these days. Behind this are hackers who use the holiday season that is just starting and want to infect travelers’ mobile phones with malware via an app. 

Just a few days ago , for example, Eset experts discovered a blackmail program disguised as a Canadian Covid app. The encryption software named “CryCryptor” appeared shortly after the Canadian government announced that it would publish an app for contact tracking. 

The malware has now been deleted from the app store. But anyone who, as a corona-conscious traveler, had installed the supposed warning app without checking would have fallen into the trap of the blackmailers. Security experts therefore urgently advise you to check who is the publisher of the mobile phone program before downloading warning apps – abroad, such as in Germany. If you have the slightest doubt, hands off!

False corona programs are the latest, but by no means the only cyber risk that travelers should protect themselves from on vacation. The greatest danger lurks on the way to the network. It is true that the motto “roam-like-home” now applies to trips within the EU, meaning that telephone and data flat rates of the domestic tariff also apply to trips to other EU countries. But even flat rates are running out if you are too eager to send holiday pictures and videos. That is why many travelers switch to free WLAN access in hotels, cafes, airports or pedestrian zones in order to access the network.

This is exactly what online criminals take advantage of in many vacation regions with prepared hotspots. These unencrypted and free internet access are used to access personal login data. They can later resell them or use them to attempt fraud. So if you have to enter sensitive information such as credit card details or the passwords for your Google, Facebook or e-mail account when accessing a public WLAN, you should avoid these offers.

And even if you don’t have to log in with personal data or even use an encrypted WLAN in a hotel, you should be careful. Spies can also lurk in these networks and read the communication between your devices and the network. To avoid this, secure the connection using VPN technology, for example. Mobile phone, tablet or PC establish a tap-proof connection, for example to the router at home.

Setting up a VPN is usually less complicated than it sounds. Owners of a Fritzbox, for example, can at least pair their Android devices with the box via app without any programming knowledge and then activate the VPN with a swipe of a finger on the mobile phone. Devices with Apple’s iOS or Windows can also be docked to the box via VPN . The decisive factor, however, is that the devices must be paired before departure, as long as the owner is still logged into the home WiFi.

The threat to cell phones and the data on them is not only digital, but also traditionally from pickpockets. In the meantime, they often no longer just access the smartphones, but also silver the user information stored on them. This applies, for example, to contact data from the phone book, but also to the access data stored there by many users for bank accounts, credit cards, online access and more. 

To prevent thieves from reading this information and selling it on criminal platforms online, you must activate a password request, unlock the cell phone via the fingerprint sensor or face recognition as a minimum level of security for the device. The unlock code should be at least six digits, so the average pickpockets can no longer crack the phones. 

Even better is the protection provided by security apps that allow the cell phone to be located remotely, all data to be deleted if necessary, or the device to be completely blocked for any further use. If desired, apps can even take photos of the thieves when they try to unlock the phone. Then they send the picture to the rightful owner. You can then use the portrait to report the theft to the police. For an overview of relevant programs in the IT portal Chip.de .

And then there is a very similar tip to protect data and devices while on vacation: Simply switch off the technology, lock the devices in the hotel safe during the day and only look at them in the evening. That leaves pickpockets and cyber gangsters alike in the void – and also makes it easier to switch off personally

Because that’s actually the most important thing on vacation.

The Chinese manufacturer TCL had already quietly buried the Blackberry brand in smartphones. Now there should be a new model.

They simply cannot be killed: Actually, the end of the Blackberry smartphones with their distinctive keyboard had already been sealed – but there should be a new model in the coming year. The Texan company OnwardMobility wants to develop the devices, a subsidiary of the Taiwanese contract manufacturer Foxconn is to build them. OnwardMobility announced on Wednesday that the new model, which is also equipped for super-fast 5G data transmission, should hit the market in the USA and Europe in the first half of 2021 .

Blackberry was once a pioneer in the smartphone market, but with the advance of touchscreens it lost its connection to Apple’s iPhone and phones with the Google Android operating system. Smartphones under the brand were still around until recently – but they were no longer built by Blackberry itself, but by the manufacturer TCL, who had acquired a license for the brand name.

In February TCL announced that it would stop production. The telephones only had a tiny share of the market – but some of them were still used in companies and authorities.

 

Blackberry had already crushed its own operating system years ago – the current smartphones under the brand run with Google’s Android software. The OnwardMobility device will also be an Android smartphone. Blackberry itself focuses on software for businesses as well as for cars.

Ousted by the mass market, on the advance in the niche: music cassettes, retro consoles or Polaroid cameras from the 80s and 90s are back in fashion. But it doesn’t work entirely without modern technology.

Oh yeah, back then … when you jumped up to record your favorite song on the radio; when hearts were conquered with self-made mixtapes; when the tape salad could be tamed again with pencil and patience. Anyone who grew up in the 80s or 90s often raves about the music cassette. Others get nostalgic when they think of the clunky Commodore 64 home computer, the first Nintendo game console or the old party pictures from the instant camera.

All these multimedia products have long ceased to shape the mass market. They have ousted streaming services like Spotify , smartphone games and digital photography from there. According to data from the Federal Association of the Music Industry, sales of cassettes in Germany fell from a low EUR 13 million in 2009 to under EUR 1 million last year. Between 2017 and 2018 alone, it fell by a full eleven percent. Only the record has been making a major comeback among analogue sound carriers for a long time: between 2009 and 2018, sales of vinyl increased sevenfold to around 70 million euros.

But music cassettes and the like have also survived in the niche – and are even enjoying growing popularity there. So much so that start-ups and companies have grown new business models around them – or have been able to maintain old ones.

“Over the years, we have continued to develop both quantitatively and qualitatively in order to meet the steadily increasing demand for cassettes,” says Franziska Kohlhase from the Leipzig company TAPE Muzik. A handful of employees there have been producing “audio cassettes and accessories” since 2004, as it says on the website.

The demand comes mainly from bands, labels or major customers, “mostly for smaller quantities, but sometimes for several thousand units,” says Kohlhase. Customers deliver their pieces as digital files. “These are copied directly onto large tape reels on professional copying machines before the tape is then rewound into the cassettes.” This guarantees a much better sound quality than copying the tape onto cassettes.

The company is not an isolated case. Larger players have also recognized the trend and put corresponding products on offer. The fashion chain Urban Outfitters, for example, which primarily has a young target group in view, sells Walkmen, Eminem tapes and Polaroid cameras in its online shop. The Chinese start-up Ninm is currently collecting money for the development of a portable cassette player with the latest Bluetooth technology. The company also offers an instant camera in the design of analog single-lens reflex cameras.

Because the retro trend in multimedia products also extends to photography. Last year, 460,000 instant cameras were sold in Germany, the Photo Industry Association announced on request – more than four times as many as in 2014. “Generation Z, who make up a large proportion of the instant camera buyer group, is excited about this new experience “Says a spokeswoman. “And of course many nostalgic people can also get excited about the new edition of the instant photo.”

There are also unusual twists and turns. The instant cameras under the traditional name Polaroid are now being built by a company that originally began as a fan project. The “Impossible Project” was formed in the Netherlands after Polaroid announced the closure of the film factory there – with the aim of maintaining production. In 2016 Impossible brought its own newly developed instant camera onto the market. The following year, the main shareholder of Impossible bought the Polaroid brand and the licensing business.

And the modern versions of old game consoles such as the Nintendo Entertainment System or the first Playstation are also well received. “Almost every second gamer (49 percent) in Germany finds the new editions of SNES, Playstation and Co. interesting,” the Association of the German Games Industry recently determined in an online survey of more than 2000 game enthusiasts. Every fourth respondent has already bought one.

“First and foremost, such trends naturally work well with consumers who have witnessed the time themselves,” says Sascha Raithel, Professor of Marketing at the Free University of Berlin. “This is also a psychological phenomenon: Experiences from youth are saved more positively than they actually were.” However, such trends could also work less often with young people who would not have experienced the time directly themselves. However, he warns companies not to grow old with their own target group. It is often overlooked that future generations have different interests and preferences.

This is probably one of the reasons why the suppliers of retro products concentrate primarily on the facade: Old game consoles may be well received, but the graphics from back then certainly not. That’s why modern technology is hidden under the retro plastic cover. The games no longer have to be plugged in, but are installed on the hard drive. The sound quality of cassettes at that time should also no longer convince anyone, and the fact that you can connect a player to the computer will also help sales. The originals may be celebrated, but the younger generation, in particular, cannot do without the digital comforts of today.

The Chinese app TikTok is already banned in India, the US government is considering similar measures, as is the Amazon group for its employees. How serious the deficiencies in terms of data protection, security and espionage actually are. 

The social media app TikTok breaks all records: never before has mobile entertainment software gained so many users in such a short time. According to surveys by the data service provider Sensor Tower , the number of downloads worldwide exceeded the two billion mark at the end of April . In June alone, more than 87 million additional users were added worldwide . TikTok was the most frequently downloaded mobile phone program from app stores worldwide , ahead of Zoom, Facebook , WhatsApp and Instagram . 

This means that smartphone software is not only a global phenomenon , it is also the first social network of global importance to come from a Chinese company. But in parallel with the rapid expansion, criticism of the platform is growing. The US government has been checking the security of the software for a long time, and now President Donald Trump is even threatening a ban in the US . Microsoft officially confirmed on Sunday for the first time that it wanted to buy TikTok’s US business. According to its own information, TikTok has 100 million users in the US.

India has already banned the app, and security gaps have repeatedly been discovered in Germany in recent months. The US group Amazon even published a request to its employees not to install TikTok on company devices – and withdrew them shortly afterwards.

“We are committed to protecting the privacy and security of our users and enabling fulfilling careers for those who create creative content on our platform,” says TikTok itself. Can the app do that? Four questions and answers about the controversial software.

What is TikTok about?

Similar to the Google subsidiary Youtube, TikTok is also a video service that lives from the fact that its users publish their own films on the platform. The program has been known under its current name since August 2018. At that time, the owner, the Chinese company Bytedance, renamed the popular app previously known as musical.ly to TikTok. 

The individual video snippets are usually much shorter than with other video services. The videos, often only around 15 seconds long, often show private karaoke recordings, dances, animals, everyday things or joke scenes – some of them characterized by very robust humor. One film follows the next, in a wild, colorful, almost infinite stream.

In view of its reach, companies and institutions are increasingly using the platform in addition to private users to reach younger target groups. The mail order company Otto and the Bundesliga clubs FC Bayern and Borussia Dortmund are already swimming in the TikTok stream, as are the German offshoots of the US beverage brand Punica and the Swedish fashion retailer H&M . The Tagesschau also regularly publishes short snippets of news via the service and has several 10,000 followers.

The enthusiasm of the user base, consisting mainly of teenagers and young adults, for the service is enormous. TikTok had reached the first billion users after just two years; faster than any other social media service before. It took eight years for the world’s largest network, Facebook , seven years for Messenger WhatsApp and the Chinese provider WeChat, at least six. According to various estimates, the platform has between 500 and 800 million regularly active users. In Germany, the number of users should now be well over nine million people.

Who is behind the app?

The company behind TikTok is Beijing Bytedance Technology , or Bytedance for short, founded in 2012 by the Chinese internet entrepreneur Zhang Yiming . She develops and operates several digital platforms that work with the help of adaptive software. This includes the news website Toutiao (in German: “Headlines”).

After taking over the competitor musical.ly for around 800 million dollars in autumn 2017, Bytedance has been operating the service worldwide under the name TikTok since summer 2018, in China it’s called Douyin.

Bytedance is privately owned, little is known about the exact ownership structure. One of the largest single investors is said to be Softbank founder Masayoshi Son, who invested around three billion US dollars in the company in 2018. Other investors include the large US venture capital firms General Atlantic, KKR and Sequoia Capital.

TikTok founder Zhang Yiming studied electrical engineering and software development at Nankai State University in Tjianjin. After working for several IT and Internet companies, including Microsoft at times , Zhang founded his first online company in 2009 with the real estate platform 99fang.com. With the proceeds from his exit from 99fang, he started Bytedance in 2012.

What allegations are there against TikTok?

There are criticisms of the video platform from different directions. One of the most frequently cited allegations at the moment is that the service may process user data to a large extent in China and that information about users there could therefore come under the control of government agencies.

This concern is thus similar to the criticism that is also raised against the IT and network equipment supplier Huawei . TikTok rejects any suspicions and emphasizes that as a private company it is independent of the Chinese state. However, critics consider such independence – especially against the background of the lack of rule of law in China – to be unenforceable.

In the United States , a possible threat of espionage has been discussed in parliament since last year. According to media reports, investigations by a congress committee into the security of user data at TikTok have been ongoing since autumn 2019. However, the results of the investigations were just as little known as concrete evidence that information has actually flowed to the Chinese government.

At the end of May of this year, it was announced that Bytedance is looking for around 150 employees in California to expand the business there. Market observers also interpret this as an attempt to position themselves more internationally and possibly to make themselves more independent of Chinese influence. Another sign of internationalization is that the company hired the former streaming boss of the Disney group, Kevin Mayer, as TikTok boss at the end of June .

Another reason for criticism is the question of whether and to what extent the service may censor the content distributed there in the interests of the Chinese government. In November 2019, for example , the information portal netzpolitik.org documented the criteria that moderators use to evaluate content and filter it from the video stream. According to this, “TikTok […] operates a sophisticated system to identify, control, suppress and direct content.” It is also noticeable that, for example, videos about the protests in Hong Kong against the expansion of Chinese influence there, on the Portal are barely visible.

TikTok stated that they do not moderate content based on political orientations or sensitivities. “Our moderation decisions are not influenced by any foreign government, including the Chinese government. TikTok does not remove videos related to the protests in Hong Kong, nor are videos related to the protests in Hong Kong suppressed within their reach. “

At the end of June, the Indian government – together with around 60 other apps – banned the use of TikTok in the country. The services would jeopardize the “sovereignty and integrity of India,” said a statement from the Indian government . It is to be feared that the apps would steal the data of Indian citizens and transfer them to servers outside of India without authorization. 

However, the Indian government did not provide any concrete evidence of an outflow of data. Observers therefore suspect a political background to the ban, as tensions between India and China had recently escalated. 

In addition to the discussion about political independence and influence, there has also been criticism of the youth protection settings in the past. TikTok allows users aged 13 and over and initially made it possible for other users to also send them direct messages and digital “gifts”. According to reports from the Reuters news agency, the US Trade Commission (FTC) and the US Department of Justice opened an investigation into allegations of disregard for children’s privacy. 

The fact that TikTok initially set the privacy of its new users to “public” met with criticism from data protectionists. In the meantime, the platform has adjusted the settings and defines at least the accounts of children and young people as “private” by default. In addition, the exchange of direct messages with minors is deactivated, as is the sending of “gifts”.

When iOS 14 comes out, Apple will disable preset tracking. Facebook and Co. have to ask for permission if they want to use and pass on our data for advertising purposes. So will the update change the advertising industry from the ground up? An analysis.

Apple has already released a preview for iOS 14. The new operating system is expected to arrive in autumn 2020 and will make “everything even more helpful and personal”.

For example, we can expect new widgets that give us more information at a glance. A new app media library will automatically organize our apps in a user-friendly view. And a picture-in-picture function lets us continue watching videos if we want to use another app at the same time.

Users can therefore confidently look forward to the new operating system – very different from the advertising industry, because iOS 14 brings other, very important innovations with it.

iOS 14: Apps need to get ad tracking permission

Apple is tightening data protection considerably and switching off automatic advertising tracking. This means that apps must first obtain permission from users if they want to collect, use and pass on data for advertising purposes.

Apple itself exempts itself from this rule. His in-house advertising platform is still allowed to track us and display personalized or interest-based advertising. According to Heise developers who have access to the beta version of iOS 14 report this.

Now, of course, the advertising industry fears that many users will refuse tracking and that they will be able to display significantly less personalized advertising than before.

The British business and financial news broadcaster CNBC has already told Facebook that the iOS update could lead to a collapse of its so-called audience network advertising business – by a full 50 percent.

Facebook is sounding the alarm

With Facebook’s Audience Network, developers can advertise in their apps. This is played on the basis of the data that Facebook has collected from its users.

And so far, Facebook and Co. have been able to use the IDFA provided by Apple to collect this data. This is an identification number for users of Apple devices.

Advertisers could use them to see whether, for example, an advertising campaign resulted in a user installing a particular app.

This identifier from Apple should now be switched off with iOS 14. Users have to activate it manually for each app if they want the corresponding applications to track their data.

In summary, the new operating system can massively restrict the advertising tracking of user data.

How far can iOS 14 change the advertising industry?

So it looks like iOS 14 will be a real boon to users and a real threat to advertisers.

Until now, advertising tracking has been an extremely lucrative business model. Facebook and Co. were extremely dependent on it to display advertising and ultimately make a profit.

In addition, many users were or are not even aware of how valuable their data is. And above all that your data is tracked and used to display interest-based advertising.

Seen in this way, advertising tracking has always been morally questionable. And if the advertisers fail to actively point this out to users and convince them to reactivate the function, they have to come up with something completely new.

The advertising industry seems to be facing a fundamental change – whatever it will ultimately look like.

Even if Twitter is still silent about who is behind the abuse of various celebrity accounts, there are indications that an internal vulnerability was possibly decisive.

ack Dorsey was contrite: “This is a bad day for us and we feel terrible,” wrote the Twitter co-founder late on Wednesday evening. Shortly before, hackers had advertised dubious Bitcoin deals on the Twitter accounts of numerous US celebrities . Among other things, accounts of ex-President Barack Obama, presidential candidate Joe Biden, Amazon boss Jeff Bezos, Microsoft founder Bill Gates, Tesla boss Elon Musk and rapper Kanye West as well as companies such as Apple and Uber were affected. 

The hitherto unknown cyber criminals had called in the tweets to transfer $ 1,000 in Bitcoin to a cryptocurrency account. “Within 30 minutes every payer will get double the amount back,” said the tweets of the same name that were sent via the hacked accounts within a few minutes before Twitter stopped sending them.

“We are investigating the incident and will provide detailed information as soon as we have a better understanding of what exactly happened,” Dorsey promised to clarify in the short term.

He has not yet made any specific statements. However, there are increasing signs that the accounts concerned were not hacked individually, but that the attack took place indirectly via Twitter insiders. There is a lot to suggest that the hackers have gained access to a so-called management account, through which employees of the short message service have direct access to the accounts of Twitter users in the event of malfunctions – including those of prominent customers such as Bezos, Gates or Obama.

Such management access would not only explain why the forged messages were sent at the same time. It also explained why remote control of the accounts was possible even though the majority of celebrity accounts were protected by so-called two-factor authentication. The master accounts with their special access rights should also be specially protected. In fact, there have been reports of cases in the past in which such accounts were accessed illegally, including on Facebook or Snapchat. Former Twitter employees were arrested only last year for allegedly spying on user accounts for an external client.

Human vulnerability

It is possible that there was such an internal vulnerability this time as well: In the meantime , the US online magazine “Motherboard / Vice” reports that members of a group of hackers contacted the medium and stated that they had taken control of the accounts using internal Twitter software. The hackers also said they paid a company employee to gain access to Twitter’s management platform.

Even if there is still no confirmation from the short message service – they say that alternatively a program or operating error is also conceivable – the incident again highlights a cybersecurity problem that experts call “insider threat”: the human weak point.

“The largest group of perpetrators [of security incidents ] are former or current employees,” writes the Federal Criminal Police Office (BKA) in a current recommendation for companies to avert cyber threats . According to the BKA specialists, bribery or disappointed employees who wanted to take revenge on the employer after being dismissed are not even the greatest risk of damage. “Most of the acts [are] not carried out with criminal intent, but rather because of negligence and a lack of awareness of the problem.”

In many cases, employees are simply not appropriately skeptical when, for example, they open messages or file attachments that supposedly come from superiors, colleagues or business partners – but are actually contaminated with malicious or espionage software. Then a careless, hasty click on the attachments or links in the messages activates, for example, a sniffing program that silently logs the user names and passwords entered by the employees in the background and later secretly sends the data to the hackers. A scenario that is apparently still being examined on Twitter.

A study by the market research institute Ponemon   and the IT group IBM from last year also shows how great the risk of damage is from insider threats . Accordingly, the average cost of damage from such security incidents rose within two years by 31 percent to a total of 11.45 million dollars per company affected. The total number of claims rose by as much as 47 percent. 

To be too good to be true

It is unlikely that the latest Twitter hack will be so expensive – apart from the damage to the reputation of the short message service because either the wrong employees had too many access rights or the management software was insufficiently secured. First of all, all those Twitter users who naively trusted the promises of the hacked celebrities and transferred Bitcoin have to pay for the cyber attack. Within a few minutes, security service providers determined, the crypto account specified in the tweets received payments of almost $ 100,000.

And that although such damage could be prevented – with little effort, but with a little common sense: “If a message sounds too good to be true, then it is usually too good to be true,” says Michael Veit, IT security expert at Sophos. If Musk, Gates, Apple, Biden or a well-known company wanted to give away huge amounts of money, they would not require that you first make an advance payment, according to the expert. “Such an offer is not a gift but a trick. And it’s an obvious sign that the person’s account has been hacked. “

After Specter and Meltdown became known , it did not take long for Intel, as one of the major processor manufacturers affected, to quickly focus on security for future processors. The detection of hazards can be very computationally intensive, the CPU load is then not without it and can lead to significant performance losses in large systems. Intel wants to counteract this with Intel Threat Detection Technology.

 

Intel ThreatDetection Technology currently consists of two components, which can also be used separately from one another. For example, Microsoft will use Accelerated Memory Scanning in Windows Defender ATP. The advantage? The CPU load drops to up to 2 percent, from 20 percent with the previously common method. Accelerated memory scanning uses the integrated Intel graphics unit to call up the required computing power.

 

The second point is the Intel Advanced Platform Telemetry, which will be integrated into the Cisco Tetration platform. A combination of platform telemetry and machine learning algorithms to detect advanced attacks, reduce false positives and have less performance degradation.

 

Also new: Intel Security Essentials for Intel Core, Intel Xeon and Intel Atom processors. These are technologies for secure boot, accelerated cryptography, hardware protection and other areas that are of security interest. Manufacturers can offer so much more security without having to do the whole thing at the expense of performance.

For more information on Intel endeavors, please contact Intel directly .

At E3 2019, many manufacturers are not only presenting new games, but also new hardware to accurately display those games. Asus is also there and presents a new ROG (Republic of Gamers) monitor, which has not yet been given a precise name. The technical data are very appealing.

It is a gaming bolide with a 43-inch diagonal, 4K resolution (3840 x 2160 pixels), 144 Hz and also HDR10. As a special highlight, according to Asus, the display is the first of its kind to add Display Stream Compression (DSC) to the scales. This allows you to transmit 4K at 144 Hz, but only requires a single cable for DisplayPort 1.4.

Unfortunately, two DisplayPort connections are usually currently required to use 4K and 144 Hz. Unfortunately, this often leads to complicated driver configurations and also slows down HDR / VRR. Asus wants to deal with this with DSC technology – without chroma sub-sampling, which can otherwise negatively affect image fidelity. According to Asus, DSC does not lead to any noticeable deterioration in image quality.

The new ROG monitor also supports AMD Radeon FreeSync 2 HDR (Adaptive Sync) and VRR, which should both prevent tearing during games and keep input lag as low as possible. In addition, the upcoming gaming monitor has also been certified by VESA with DisplayHDR 1000 . As a result, it masters 1,000 nits and 10-bit image processing.

Asus emphasizes that the optimized local dimming achieves excellent HDR display and excellent black and contrast values. In addition, the ROG monitor covers 90% of the DCI-P3 color space. Everything sounds great, I’m not the only one thinking. Unfortunately, Asus is still hiding both the release date and the price of the upcoming ROG monitor. You will certainly have to dig deep into your pockets for this diagonal and the technical data.

For a long time, Mac users have been able to use the technology preview in addition to the normal version of Safari and test certain functions in front of other users – it’s a beta version, so to speak. Now there is a small, but certainly not unimportant message that is hidden in the release notes of version 99. 

Adobe already announced in 2017 that Flash would be buried – by the end of this year it should be ready. Steve Jobs leaned out the window a long time ago and claimed nobody needs Flash. He got a lot of malice for it, but was proven right. The Technology Preview now completely loses support for the Adobe tool.

The whole thing is certainly not a surprise, because Flash has not been pre-installed on Macs for a long time and also on other platforms and has to be banned onto the computer by hand. However, there are still far too many websites that use this technology and hopefully will soon turn to other, more modern options.