Click the links or donate a small amount if you like this site! It costs a bundle of time and money to run this site!    Before Submitting a comment Read this post!

Acer pushes Chromebooks for business with new Core i5-powered convertible

By Valentina Palladino

Valentina Palladino

Acer has a long history with Chrome OS devices that it continues to propel forward with devices like the Chromebook Tab 10. Chromebooks have found a comfortable home in schools and kids’ rooms, but many are convinced that Chrome OS can be a viable platform for professionals as it continues to evolve. Acer unveiled a Chromebook for such professionals, the Chromebook Spin 13, that looks and feels like it could hold its own next to some high-end ultrabooks.

Both design and internals set the Chromebook Spin 13 apart from other Chrome OS devices, even those already made by Acer. The new 2-in-1 has an all-metal chassis with diamond-cut edges, giving it more substantial feel when you lift it compared to the plastic Chromebooks we’re all used to. The polished hinges on the Spin 13 smoothly facilitate the transition between laptop, tent, presentation, and tablet modes, and the device feels sturdy no matter how it’s positioned.

Read 9 remaining paragraphs | Comments

Source:: Ars Technica Gadgets


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

FBI seizes server Russia allegedly used to infect 500,000 consumer routers

By Dan Goodin

Enlarge (credit: https://en.wikipedia.org/wiki/Flag_of_Russia#/media/File:Flag_of_Russia.svg)

The FBI has seized a key server used to infect more than 500,000 home and small-office routers in a move that significantly frustrates a months long attack that agents say was carried out by the Russian government, The Daily Beast reported late Wednesday.

The takedown stems from an investigation that started no later than last August and culminated in a court order issued Wedesday directing domain registrar Verisign to turn over control of ToKnowAll.com. An FBI affidavit obtained by The Daily Beast said the hacking group behind the attacks is known as Sofacy. The group, which is also known as Fancy Bear, Sednit, and Pawn Storm, is credited with a long list of attacks over the years, including the 2016 hack of the Democratic National Committee.

As Ars reported earlier Wednesday, Cisco researchers said the malware that infected more than 500,000 routers in 54 countries was developed by an advanced nation and implied Russia was responsible, but didn’t definitively name the country.

Read 6 remaining paragraphs | Comments

Source:: Ars Tecnica

Anyone shocked that the commies in Russia are still being…well, commies?

Tim


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Comcast bug made it shockingly easy to steal customers’ Wi-Fi passwords

By Jon Brodkin

Enlarge (credit: Comcast)

A security hole in a Comcast service-activation website allowed anyone to obtain a customer’s Wi-Fi network name and password by entering the customer’s account number and a partial street address, ZDNet reported yesterday.

The problem would have let attackers “rename Wi-Fi network names and passwords, temporarily locking users out” of their home networks, ZDNet wrote. Obviously, an attacker could also use a Wi-Fi network name and password to log into an unsuspecting Comcast customer’s home network.

Shortly after ZDNet’s story was published, Comcast disabled the website feature that was leaking Wi-Fi passwords. “Within hours of learning of this issue, we shut it down,” Comcast told ZDNet and Ars. “We are conducting a thorough investigation and will take all necessary steps to ensure that this doesn’t happen again.”

Read 10 remaining paragraphs | Comments

Source:: Ars Tecnica


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

The New Asus Zenfone 5 Versus the Nuu Mobile G3 When Buying For Your College Student

By Tim

Hopefully you have seen my previous post/videos on what to get your first year college student. We covered the basics of smartphones and the really good, but not overpriced laptops/notebooks. They were each covered in the posts below.

Tonight I am doing a quick post with 2 videos and covering the Nuu Mobile G3 versus the Asus Zenfone 5. The Zenfone 5 is more on the order of a low end mid-range, but what were are really looking at here is bang for the buck. Absolutely one of the best budget smartphones versus one that costs a good chunk of change more.

There are great things about each phone and one overriding factor to consider, which we will get to in the video.

On paper, the Asus is the clear winner, bigger battery, a bit better processor and a larger screen. But there are some downsides such as the fact that you will need to consider ordering it now, to get it in time before college begins! It also has a few issues with display and the huge factor, that I will cover in the video below. Well on second thought, the big factor is price! $199 on the G3, versus the current price of $385 on the Asus!

Other than the basic display differences, these are fairly similar phones. The G3 does not have a headphone connector and that isn’t great, but it does have the adapter. The Asus also includes headphones and an OTG cable, a big plus. Big negative for me, the Asus has a notch!

So let us get to those 2 videos, one by myself and then just one of 5 videos I watched today, this one from Chris over at Techtablets. The first one is from our YouTube Channel.

This is the video from TechTablets, make sure to visit his channel and subscribe, it is first rate!

That is all for now, except please subscribe to our channel or click those big donation buttons on the website here!

Tim

————————————————————————————–
This site formerly ran on either a Chuwi HiBook tablet or occasionally my Chuwi Hi12 tablet. Check the About page for details. Don’t miss our new YouTube Channel!


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

Hackers infect 500,000 consumer routers all over the world with malware

By Dan Goodin

Enlarge / A Linksys WRVS4400N, one of more than a dozen network devices targeted by VPNFilter. (credit: Linksys)

Hackers, possibly working for an advanced nation, have infected more than 500,000 home and small-office routers around the world with malware that can be used to collect communications, launch attacks on others, and permanently destroy the devices with a single command, researchers at Cisco warned Wednesday.

VPNFilter—as the modular, multi-stage malware has been dubbed—works on consumer-grade routers made by Linksys, MikroTik, Netgear, TP-Link, and on network-attached storage devices from QNAP, Cisco researchers said in an advisory. It’s one of the few pieces of Internet-of-things malware that can survive a reboot. Infections in at least 54 countries have been slowly building since at least 2016, and Cisco researchers have been monitoring them for several months. The attacks drastically ramped up during the past three weeks, including two major assaults on devices located in Ukraine. The spike, combined with the advanced capabilities of the malware, prompted Cisco to release Wednesday’s report before the research is completed.

Expansive platform serving multiple needs

“We assess with high confidence that this malware is used to create an expansive, hard-to-attribute infrastructure that can be used to serve multiple operational needs of the threat actor,” Cisco researcher William Largent wrote. “Since the affected devices are legitimately owned by businesses or individuals, malicious activity conducted from infected devices could be mistakenly attributed to those who were actually victims of the actor. The capabilities built into the various stages and plugins of the malware are extremely versatile and would enable the actor to take advantage of devices in multiple ways.”

Read 12 remaining paragraphs | Comments

Source:: Ars Tecnica


Follow Tim on Twitter @tl1000rzx2
Or check out my other Tablet Site: THE Tablet Test Server
Or perhaps you need web hosting for a mere $5.95/month?.
Shop Our Sponsor


Shop Our Sponsor


HP Laptops at Super Low Prices!

This site originally ran on an Asus Memo Pad. Now it is your source for Tablet, Laptop, Mobile computing and security info!