This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, August 27, 2016

Facebook currently testing Express Wi-Fi in India just months after Free Basics rejected

Facebook is launching a new scheme to bring cheap internet access to rural India, just months after net neutrality protestors blocked the company’s plan to provide free internet to millions in the country.

The company is currently testing Express Wi-Fi in India. The service, according to Facebook, will allow people to buy fast, reliable and affordable data packages without shelling out hundreds of rupees each month.

In January, India’s telecoms regulator rejected Facebook’s Free Basics program after more than a million people registered complaints abut the plan, which would have given free access to specific websites chosen by Facebook. 




Hundreds of protestors took to the streets of major Indian cities demanding Free Basics be barred because it would give prominence to certain websites and news sources. They claimed it would also grant Facebook unchallenged control over the information.

Now, many of those who campaigned against Free Basics are celebrating Facebook’s latest venture. Kiran Jonnalagadda, one of the co-founders of the net neutrality activist group Save the Internet, said that the new model could transform rural India.


Facebook still has ambitions to bring Free Basics to India. In an interview with the Verge, Mark Zuckerberg said that Facebook would make another effort to bring the service to India once it was successfully rolled out in other parts of the world.  

Now it seems the company also has plans to bring this service to railway stations and rural regions. The world's largest social media network is in talks with RailTel to provide internet services at railway stations, RailTel chairman RK Bahuguna told Economic Times. Bahuguna added that they have asked Facebook to bring connectivity to smaller railway stations and rural areas in their vicinity. 




Xiaomi Redmi Note 4 is a 10-core smartphone with a 4,100mAh battery

Xiaomi has launched the newest addition to its Redmi Note line, and as expected, it's a large, powerful smartphone sold at a ridiculously low price.

The Xiaomi Redmi Note 4 is a 5.5-inch phone with a 10-core Helio X20 processor, 3GB of RAM, a full HD screen, 16/64GB of storage memory (expandable via microSD cards), a 13-megapixel back camera, a 5-megapixel selfie cam, a fingerprint scanner and a 4,100mAh battery. 


It has a metal, unibody design with slightly curved glass edges (Xiaomi, like several other companies, calls this 2.5D glass), and while it doesn't break any new ground, it looks just as good as any other flagship that came out this year. In fact, you'd have to look closely to find many differences between the Redmi Note 4 and the Redmi Pro that was launched in July.



The Redmi Note 4 has roughly the same set of specs as the Pro (sans the dual camera), it's much cheaper, priced at 899 RMB ($135) for the 16GB version and 1,199 RMB ($180) for the 64GB version. 

Software-wise, the Redmi Note 4 will run on Xiaomi's MIUI 8 Android Marshmallow-based firmware, which started rolling out to newer Xiaomi phones a few days ago.

The Xiaomi Redmi Note 4 comes in three colors: silver, gold and dark grey. It will become available in China, from Mi.com, Xiaomi's Mi Home stores and through China Mobile's retail channels, starting Aug. 26.



Block Malicious Website with OpenDNS

OpenDNS is a company and service which extends the Domain Name System by adding features such as phishing protection and optional content filtering to traditional recursive DNS services

Web Filtering
OpenDNS Umbrella lets you manage the Internet experience on and off your network with acceptable use or compliance policies, putting you in control.

By just pointing DNS to OpenDNS, security is simple to deploy. By enforcing security in the cloud, Umbrella is easy to manage. No hardware to install. No software to maintain. Nothing you need to update!


Normally we  use Public DNS like Google DNS 8.8.8.8 or 8.8.4.4 but if you want more secured use the OpenDNS recommended for offices or computer shop.


FREE  OPEN DNS

208.67.222.222
208.67.220.220






There are two ways to set OpenDNS  

Setup a OPEN DNS via  built LAN or WiFi of your Laptop or PC
1. Go to Control Panel Network and Internet , look for Change adapter settings
2. Right click your  WiFi/ LAN connection click "Properties"
3. Find the TCP/IPv4 then click again the Properties
4. Click Use the following DNS input  the OpenDNS then click OK  save and your all set



Setup your Router Enter your router Basic settings
1.Network Setup 
2.WAN Interface Setting
3.Find DNS Server Setup
4.Used the Open DNS

208.67.222.222
208.67.220.220






For advance pay a visit to OpenDNS and sign up for their free home-user account. Plug in your email, choose a strong password, and then make sure to check your email to confirm your identity and activate the account.


Once you’ve confirmed your account you’ll need to add your home IP to a network. OpenDNS supports multiple networks but all we’re concerned with is making sure that your home network is recognized by OpenDNS.





Click Add a network in your OpenDNS Dashboard, confirm that the IP it suggests you use is the IP address of your home internet connection. Name the connection Home (or the name of whatever network you’re planning on logging the URLs for).



When you’re done if it doesn’t automatically kick you over to the Settings submenu of the dashboard click on the tab to navigate there on your own. There you’ll find the new network you made, listed by the label you gave it and your IP address.


From there you can set your security from custom to high or none.


You can enable logs and stats  too.









Recently Released NSA Exploit Target Latest Version of Cisco System Firewalls

Recently released NSA exploit from "The Shadow Brokers" leak that affects older versions of Cisco System firewalls can work against newer models as well.

ExtraBacon, the exploit was restricted to versions 8.4.(4) and earlier versions of Cisco's Adaptive Security Appliance (ASA) – a line of firewalls designed to protect corporate, government networks and data centers.

However, the exploit has now been expanded to 9.2.(4) after researchers from Hungary-based security consultancy SilentSignal were able to modify the code of ExtraBacon to make it work on a much newer version of Cisco's ASA software.


Both Cisco and Fortinet have confirmed their firewalls are affected by exploits listed in the Shadow Brokers cache that contained a set of "cyber weapons" stolen from the Equation Group.


The ExtraBacon exploit leveraged a zero-day vulnerability in the Simple Network Messaging Protocol (SNMP) code of Cisco’s ASA software that could allow "an unauthenticated, remote attacker to cause a reload of the affected system" and take full control of a firewall.

The Equation Group is an elite hacking group tied to the NSA's offensive Tailored Access Operations (TAO) and linked to the previous infamous Regin and Stuxnet attacks.


However, newly released exploit means that ExtraBacon poses a dangerous threat than previously thought, as the modified exploit now does not prevent it from running on newer versions of Cisco firewalls, allowing an attacker to execute malicious code remotely.

"We have test equipment and custom firmware images that make debugging easier," Varga-Perke of SilentSignal told Ars. "These are most likely available for malicious parties, too; we are quite confident that similar code exists in private hands."


Cisco engineers have provided workarounds that help ASA customers detect and stop ExtraBacon-powered attacks, though the multi-billion dollar company has yet to release software updates to address the flaw completely.



Facebook Live Map - Explore live videos from around the world

Facebook’s interactive map is the best way to discover live videos streaming in real-time. In February, Facebook began rolling out live video streaming capabilities to users worldwide – meaning that there’s bound to be someone streaming video of themselves somewhere on the world.

“People in more than 60 countries can now share live video, and we’ve been inspired by all the different global broadcasts,” wrote Facebook’s Product Management Director Fidji Simo in a press release. “The Facebook Live Map gives you a window into what’s happening in the world right now.”



The Facebook Live Map is a simple gray map with blue pins indicating where live streams are taking place. A quick glance shows activity clusters. For example, the East Coast of the United States has more activity than the West at the time of publication. Users move their cursor to change the position of their map and utilize the zoom function on the upper left side to zoom in or out. 


Link : https://www.facebook.com/livemap/

For every dot there is Live FB videos.





 



You can now stream any Blizzard game live on Facebook

Starting today the live-streaming capability will be available in every Blizzard game in the Americas, Southeast Asia, Australia, and New Zealand, with a complete global rollout expected “soon.” It’s currently only available to PC gamers, but Mac support is also in the works. All you’ll need to do is connect your Battle.net account to Facebook, and then you can stream games like Overwatch or Hearthstone directly to your Facebook page.




Facebook Live streaming is just one part of a broader integration of the social network; Blizzard also previously announced that it would be adding a Facebook login option for all of its PC games in order to “pave the way for new social functionality in Blizzard games."




Tuts How to change the default font in Microsoft Word to the one that you want

If you don't like the default font in Word, there's an easy way to change it to the one that you want.

Today tuts is how to change default font so every time you open your MS Word  the font setting are the one that you want.

1. Open new Blank Document..
2. Go to the home tab, on style section right click the "Normal" box.  


3. Select Modify and this will open the modify style dialog box.



4. Once there choose your prepared font and font size and your all set.



Now every time you open new docs the one want format are the default.



Apple releases 'Emergency' Patch after Exploits Targets Human Rights Activist

You’ll want to be updating your iOS devices to 9.3.5, the version released today by Apple — especially if you’re a prominent human rights activist or journalist. A recently thwarted attack on just such a person employed not one but three zero-day exploits addressed by the patch.

One of the world's most invasive software weapon (Spyware) distributors, called the NSO Group, has been exploiting three zero-day security vulnerabilities in order to spy on dissidents and journalists.

The NSO Group is an Israeli firm that sells spying and surveillance software that secretly tracks a target's mobile phone.


The subsequent investigation suggests these were the work of a shadowy cybersecurity company whose software may have been used for years by governments looking to compromise political targets.


Ahmed Mansoor (pictured above), an award-winning activist based in the UAE, received some suspicious text messages two weeks ago promising information on detainees being tortured — but Mansoor, who has been targeted multiple times in the past by high-profile “lawful intercept” tools, decided instead to send the text to Canadian security research organization Citizen Lab.

Assisted by Lookout Security, Citizen Lab went down the rabbit hole, and found it much deeper than expected.

The text messages were a trap, of course, but one of unprecedented complexity. That single link would have leveraged three separate and highly serious exploits in iOS — executing arbitrary code through WebKit, gaining access to the kernel, and then executing code within the kernel. It’s rare enough to find a zero-day in the wild, let alone three at once.





The result would have been a one-step jailbreak with malicious code injected under the hood — granting complete access to all the phone’s data and communications. This triple threat of exploits building on one another gained the appropriate moniker “Trident.” 


These exploits were immediately sent to Apple, which ten days later — today — issued a patch fixing them. Apple declined to comment beyond the following statement and labeled it "important,":  “We were made aware of this vulnerability and immediately fixed it with iOS 9.3.5. We advise all of our customers to always download the latest version of iOS to protect themselves against potential security exploits.”

You can install the security update over-the-air (OTA) via your iPhone or iPad's settings.






After breaching with Trident, the malware that would have lingered on the device was immediately recognized by the researchers as Pegasus, a piece of commercial spyware software sold by Israel-based cybersecurity company NSO Group. This was the first time it had been caught in the wild. (Perhaps the team working on it should have been called Bellerophon.)

Pegasus was one of the tools that Hacking Team apparently used — and later, inadvertently publicized when its emails were leaked. NSO also showed up when, retrospectively, Citizen Lab’s investigation found traces of the company’s work in a separate threat being tracked in the UAE known as Stealth Falcon. Lastly, the NSO signature was also on malware that had targeted Mexican journalist Rafael Cabrera; he had been working on a story that potentially discredited the country’s president.

NSO is reportedly owned or at least invested in by San Francisco equity firm Francisco Partners, which did not respond to requests for more information.


Spyware firms like NSOGroup want a way to break into an iPhone — but as long as it’s working, they only need one. That lets them pay top dollar to make sure it stays secret and unpatched. "Offense prices are not just paying for the vulnerability or exploit," says Luta Security CEO Katie Moussouris, one of the industry’s leading advocates for bug bounties. "They are paying for the exclusivity and longevity of use of the bug against their targets."

Source: Lookout Security, Citizen Lab

Friday, August 26, 2016

Princeton University have developed a 25-core open source processor called Piton

Princeton University researchers have developed a new computer chip that promises to boost the performance of data centers that lie at the core of numerous online services such as email and social media.

The chip — a 25-core open source processor called "Piton" after the metal spikes driven by rock climbers into mountainsides to aid in their ascent — was presented Aug. 23 at Hot Chips, a symposium on high-performance chips held in Cupertino, California.

Data centers — essentially giant warehouses packed with computer servers — support cloud-based services such as Gmail and Facebook, as well as store the staggeringly voluminous content available via the internet. Yet the computer chips at the heart of the biggest servers that route and process information often differ little from the chips in smaller servers or everyday personal computers.


With Piton, researchers believe that they can create a giant 200,000-core computer stuffed with 8,000 64-bit Piton chips, ensuring the massive collection of cores are in sync when processing different applications in parallel.

Piton can allow thousands of cores on a single chip with half a Billion cores in the data center, and more cores mean more processing power.

Another innovation by the researchers is a 'Memory-Traffic Shaper' that acts as a mediator between the demands of different apps accessing memory on the chip and waving them properly, so they do not block the system.


Piton is an open-source processor based on OpenSparc, which is a modified version of Oracle's OpenSparc T1 processor. The current version of the Piton chip measures 6mmx6mm with over 460 Million transistors (each 32nm), making Piton the largest chip developed by academia in size.



Piton's features are listed below:
  1. 25 modified OpenSPARC T1 cores
  2. Directory-based shared memory
  3. 3 On-chip networks
  4. Multi-chip shared memory support
  5. 1 GHz clock frequency
  6. IBM 32nm SOI process (6mm X 6mm)
  7. 460 Million transistors

Piton is yet a prototype for future commercial server systems that possibly can take advantage of a huge number of cores to speed up processing.

Details about Piton were presented at the Hot Chips: A Symposium on High-Performance Chips conference in Cupertino this week and the Princeton researchers have made the design open source, making it available to the public and fellow researchers.


Source: Princeton.edu


An Eastern European Hackers has stolen over 12 Million Baht from a total of 21 ATMs in Bangkok,Thailand

The Central Bank of Thailand (BoT) has issued a warning to all commercial banks about security flaws in roughly 10,000 ATMs that were exploited to steal cash from the machines.

The warning came shortly after the state-owned Government Savings Bank (GSB) shut down approximately 3,000 of their ATMs following an ongoing police investigation into the recent hack in which hackers were able to infect many its cash machines with malware.

Over 12 Million Baht (approximately US$350,000) from a total of 21 ATMs in Bangkok and other five provinces by hacking a Thai bank's ATM network; police said Wednesday. 



GSB found that millions of Thailand Baht were stolen between August 1 and 8 from 21 ATMs across the provinces of Bangkok, Phuket, Chumphon, Prachuap Khiri Khan, Phetchaburi, and Surat Thani, the Bangkok Post reports.


The hackers made over 12.29 Million Thailand Baht (US$346,000) by inserting cards installed with malware into multiple ATMs to spew out cash, up to 40,000 Baht each transaction. 

GSB President Chartchai Payuhanaveechai told the local media that the bank has reviewed security camera footage and identified potential suspects as foreign nationals who infected their cash machines with malware that forced them to dispense cash.

Thai police suspect a ring of at least 25 Eastern European nationals committed the crime and link them to a similar hacking theft occurred last month when the top eight banks in Taiwan were forced to shut down hundreds of its ATMS after thieves used malware to steal NT$70 Million ($2.17 Million) in cash.

Payuhanaweechai also ensured its customers that they are not affected by the theft as the gang's malware only tricked the bank ATMs to release cash without authorization, not from customers' accounts.


 source: Bangkok Post


Microsoft's Windows 10 Anniversary Update Quick Assist feature allows you to view and control a remote PC

Anyone who works in the computer industry, or has a reputation for being technologically savvy. Windows 10's lets you fix family computer from your desk,  a new feature hidden deep within Windows 10’s Anniversary Update should be welcome news. It’s called Quick Assist.

For years, Microsoft added a feature called Remote Desktop to the Professional versions of Windows, and you could use either it, or a number of other third-party apps, to remotely control your PC. (Remote Desktop Connection is still part of Windows 10 Professional.) Windows Remote Assistance, which is what Quick Assist is based upon, has also appeared in previous versions of Windows.



With Quick Assist, you’re not controlling your own PC from afar, but asking permission from another person to control their PC (or vice versa), and with the understanding that either party can disconnect the connection at any time. It can’t solve any hardware problems, like a mouse that’s out of batteries; however, it does allow a remote user to check if the mouse’s Bluetooth settings are properly configured and the drivers are up to date.

Basically, Quick Assist lets you use your mouse and keyboard to remotely control a friend’s PC, doing everything that you could otherwise do on your own machine.

You can quickly launch Quick Assist by typing the app’s name in the Cortana search box, or by scrolling to Apps > Windows Accessories. (When my father bought his new PC, I simply pinned the app to his Start menu where it would be easy to find.)




From there, Quick Assist makes it simple. Launching the app presents you with one of two choices: give assistance or get it.


It’s important to note that Quick Assist requires two people to initiate the connection; you won’t be able to remotely tweak your aunt’s PC while she’s out jogging. If you choose to give assistance, you’re first asked to log in with your Microsoft account. 


You’re then provided with a six-digit security PIN code that you must provide to the person you’re assisting within 10 minutes. (Both parties must enter the same code.)



Again, Microsoft bends over backwards to help you, offering to email the PIN to your friend or family member, or save it to your clipboard to paste into a chat app.


Let’s assume you’re the one giving assistance. Once Quick Assist is active, you’ll see a window displaying the other person’s desktop, which is surrounded by a border containing several icons. You’ll need to click inside that window to allow your cursor to take control of the other PC.



Keep in mind, though, that Quick Assist opens the front door to your digital world. If you’re asking for help, remember that anything on your desktop or in your folders—be it.



Dropbox is requiring users who have not changed their passwords since mid-2012 to reset

The action appears to be related to continued fallout over the massive hack on LinkedIn in 2012 where credentials for 117 million accounts were posted online. In recent months, treasure troves of user credentials and passwords — in addition to a large MySpace hack disclosed in May — have been discovered. Even though the data for these accounts is old, often passwords remain unchanged for long periods of time and are re-used across multiple accounts, leaving entire online identities vulnerable to hacks.



Dropbox’s intelligence team identified the existence of a file that contained hashed and salted passwords, according to a person familiar with the matter. That file pertains to passwords that were likely obtained in connection to the LinkedIn hack. While the information appears to have been taken from then and quietly held for some time, it is now surfacing, this person said. Dropbox earlier disclosed that usernames and passwords that were obtained in 2012 were used to access some accounts.

Dropbox doesn’t believe that any accounts have been improperly accessed, the company said in a blog post. During the 2012 incident, one Dropbox employee’s account was accessed with a project document that contained email addresses. In connection with the existence of the file, Dropbox is requiring its users to reset their passwords if they have remained unchanged.

source:  dropbox

Future iPhones might capture a thief’s photo and fingerprint

Apple may be interested in an anti-theft measure that involves covertly capturing both a photo and fingerprint of a phone thief without his or her knowledge. This system was detailed in a new patent application published today and suggests Apple may incorporate some version of the technology into future iPhones and iPads. The company imagines a system by which a "trigger condition" would result in the collection of biometric information on whomever is holding the iPhone. These trigger conditions could be unauthorized access from a third-party device or the detection of an unauthorized user attempting to bypass the security features of the phone.

App have tried these Anti-Theft measures before Lookout is an iOS and Android app that automatically snaps photos using a device’s front-facing camera if it detects any suspicious behavior, like any tampering with the device's security settings. Apple could be thinking about implementing something similar in future versions of iOS. The patent also outlines way to both store this information and cross-check it with online databases.



This biometric information "may be one or more fingerprints, one or more images of a current user of the computing device, video of the current user, audio of the environment of the computing device, forensic interface use information, and so on," the patent abstract details. "The computing device may then provide the stored biometric information for identification of one or more unauthorized users."

There are some technical hurdles here. As it stands today, Apple’s TouchID fingerprint-reading technology requires users to hold down their finger numerous times in a variety of different angles to accurately capture the print. It’s unlikely the company would devise a system that depended entirely on a thief inadvertently pressing their thumb on the home button repeatedly. However, future versions of Touch ID and Apple's fingerprint scanners may be able to collect fingerprints in a more efficient manner.



source: United States Patent Application


Thursday, August 25, 2016

Hackers target Leslie Jones of Ghostbusters, post nude photos to her site

This marks just the latest incident in a summer in which Jones has been at the center of a number of online attacks. Ever since the female-led Ghostbusters project was announced, those involved with it have dealt with harassment from a variety of trolls who think it's reasonable to verbally abuse other humans because of a movie.

Leslie Jones, the Ghostbusters and SNL star who has fallen victim to a hack that compromised her personal photos and info.



According to Variety, Jones' website was hacked and nude photos from her iCloud account were published to its front page. Images of her passport and driver's license have also been shared. Jones has yet to offer an official comment on the situation (either on Twitter or anywhere else) but her personal website is currently down entirely.

About a month ago, notorious troll Milo Yiannopoulos led a host of like-minded idiots in an organized Twitter attack on Jones in which she dealt with a huge stream of racist comments. Jones briefly left Twitter, but the company stepped in and permanently banned Yiannopoulous. Jones returned to the platform shortly thereafter


source: Variety


ePLDT bolsters digital learning in Academic Institutions

Gone are the days when learning is limited to browsing an encyclopedia, reading books and attending a formal school set up. Today, digital learning is beyond the four corners of a school, home or office and is now readily available to anyone with internet access. Informative content is easier to find, access, control and distribute through digital technology.

In a bid to support academic institutions, ePLDT, the digital enterprise enabler of the country's leading telecoms and digital services provider PLDT, Inc., continues to strengthen its cloud leadership as it expands its portfolio to include digital learning solutions with its recent inclusion to the Microsoft Authorized Education Partner (AEP) program.



Microsoft's education solutions offer a wide range of benefits to ePLDT's academic customers.  For one, they enjoy a lower cost of investment compared to the standard commercial prices, and pay only for the licenses that are being used by faculty and staff and all their devices on campus. Students and faculty also get free access to Office 365 ProPlus, Windows 10 Education, and Intune. As customers, these academic institutions will also be eligible to access a range of online resources from the Imagine Academy, which include: tech curriculum, certifications, marketing collaterals, and lesson plans among others. Lastly, the schools can also serve as a testing center for Microsoft certification.

Indeed, ePLDT's status as a Microsoft Authorized Education Partner demonstrates its capabilities to fulfill the varying requirements of academic customers, while also helping them maximize creative ICT solutions designed for the education sector.

"Our inclusion to the Microsoft Authorized Education Partner program enables ePLDT to provide higher-value services and solutions for our country's academic institutions," said Nerisse Ramos, ePLDT Group Chief Operating Officer who noted that the partner status further highlights ePLDT's knowledge of and expertise in Microsoft academic products. "As it is doing with other industries, ICT is continuing to rapidly transform the education landscape, and ePLDT is committed to helping academic institutions accelerate their success with the adoption of digital learning solutions."

The Microsoft AEP Program is designed to authorize and equip organizations that deliver academic products and services through the Microsoft platform with the training, resources and support they need to provide their customers with superior experiences and outcomes.

"By becoming AEPs, partners show themselves to be committed and trained in providing value-priced Microsoft academic products to the education market," shared Anthony Salcito, Vice President of Education for Microsoft Corp.'s Worldwide Public Sector. "This authorization, along with our other education partner initiatives, gives our partners recognition of their areas of expertise and our academic customers the confidence that they are buying from academic IT specialists."

 ePLDT's inclusion to the Microsoft AEP program also underscores the company's commitment to enabling customers from various industries and sectors to benefit from cloud technology. "We want to ensure that our customers take advantage of opportunities inherent in adopting cloud solutions for their business," shared Nico Alcoseba, Head of PLDT Group's Disruptive Business Group. "Our cloud services not only enable academic institutions to positively transform their operations; more importantly, it allows them to in turn expand their reach and tap new areas for growth."



About ePLDT
ePLDT is the country’s premiere digital innovator. Since its inception at the turn of the millennium, ePLDT has led the industry in the development of enabling technologies for enterprises across the country and the region. As the digital enterprise enabler of the PLDT Group, ePLDT delivers best-in-class digital business solutions including the country’s first Big Data Analytics service and infrastructure. This, and the company’s numerous other innovative endeavors, are testament to the company’s brand promise of “Enabling Success.”
ePLDT is parent to four distinct business units including: AGS (ABM Global Solutions),¬ a business management solutions enabler focused on Enterprise Resource Planning and Spend Management; CuroTeknika, an IT & business process management outsourcing company; ePDS, a client communications managed service provider engaged in document management and digital printing; and IPC (IP Converge Data Services, Inc.), a leading data center operator and pioneer cloud services provider.
A proud member of the PLDT Group headed by Chairman Manuel V. Pangilinan, ePLDT is led by Group President & CEO Ernesto R. Alberto and Group COO Nerissa S. Ramos.
Press Contact:              Niño Valmonte
ePLDT, Inc.




Wednesday, August 24, 2016

Visa-powered payment ring is now available for pre-order

First worn by the world's greatest athletes at the Rio Olympics 2016. The Visa-based NFC Ring that lets you tap to pay at many store terminals without pulling out your phone or twisting your wrist. Plunk down about $53 (£40) and you can get one in your size around its expected December ship date. As with the Apple Watch, you don't need your phone around once you've set it up -- it uses anonymizing tokens to make payments all by itself. 


The NFC Ring can be used to make access control, unlock & control mobile devices, transfer information, link people and much more. Made with advanced ceramics, a larger operating range and more storage capacity perfect way to upgrade your finger. 

You can pre-order the new NFC Ring today visit : http://nfcring.com/