This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, January 28, 2017

Google Philippines launched, job openings announced

Google on Wednesday launched its Philippine operations in Taguig City's upscale McKinley Hill Village and said it will soon open an office in the business and financial district of Makati City.

"The Philippines is a key country in Southeast Asia in terms of its digital economy. Over 33 million Filipinos access the Internet regularly. And Internet use in the Philippines is set to grow exponentially. Research indicates that the number of Filipinos online will have nearly doubled by 2016," said Julian Persaud, Google Southeast Asia managing director.

At the helm of the Philippine office is country manager Narciso Reyes, a finance and digital marketing and veteran, whose previous companies include Friendster, Komli, and LycosAsia.


 The reception area is patterned after the old limestone houses in Batanes

"The Philippines is the second top user of Internet in Asia. We're also the fastest-growing smartphone market in Southeast Asia. So we're excited to be deepening our investment in the Philippines with our (local) office," Reyes noted.

Like the Google HQ in Silicon Valley, food is also free here in Google PH

The event was also attended by Presidential Communications Undersecretary Manuel L. Quezon III, who spoke on behalf of Presdent Benigno Aquino III to welcome the Internet giant to the country.

"Setting up shop here in the Philippines is a vote of confidence in the country. We hope that Google's entry will encourage more local businesses to go online and tap into international markets," Quezon said.

Both Persaud and Reyes noted the Philippine staff is still small at the moment but the company will be announcing openings soon on its website.

 Of course, there's a recreation area. Yep, that's Pacman




A Google cardboard to help you know more about the Philippines

This conference room has a Pahiyas flavor that is made more colorful by the Cobonpue chairs at the right side

 Pinoy idioms adorn the wall of the pantry area. A few expats also work here from different Google locations around the world.


A map of the Philippines carved out of wood panels can be seen at the office lobby. Seen here are Google PH country manager Kenneth Lingan (left) and DTI secretary Ramon Lopez, who was the guest speaker during the opening. Lingan is from Solana town in Cagayan province.

 Google PH country manager Kenneth Lingan (left) and DTI chief Ramon Lopez try out the VR capabilities of the Google cardboard during the launch
















Friday, January 27, 2017

Solution Windows Defender is Turned off by Group Policy

When I try to access Windows Defender through the Start menu or via the Control Panel, I get a message.  This started when I install a crack software  with malware LOL.

"Windows is Turned off by Group Policy. Windows Defender won't provide protection against harmful or potentially unwanted software and it won't send you alerts because it is off. To protect your computer against harmful or potentially unwanted software, contact your system administrator to enable Windows Defender via group policy"


How to fix this ?
Just to regedit or Press windows Logo and Letter R to run the runbox   and type  regedit

Find this under Microsoft
HKLM\Software\Policies\Microsoft\Windows Defender - Policy


If you see  any Value delete it!!


Facebook Security Key for safer logins with a touch

People ask all the time what they can do to make their online accounts more secure. Like most security professionals, I recommend setting up two-factor authentication (login approvals). That means when you log into Facebook from a new phone or browser, you'll enter a special security code from your phone in addition to your password. That way, it's much harder for someone else to access your account, even if they have your password.


Now we are taking that account  protection a step further with Security Key. Most people get their security code for login approvals from a text message (SMS) or by using the Facebook app to generate the code directly on their phone. These options work pretty well for most people and in most circumstances, but SMS isn't always reliable and having a phone back-up available may not work well for everyone.
Starting today, you can register a physical security key to your account so that the next time you log in after enabling login approvals, you'll simply tap a small hardware device that goes in the USB drive of your computer. Security keys can be purchased through companies like Yubico, and the keys support the open Universal 2nd Factor (U2F) standard hosted by the FIDO Alliance.

 Add security keys to your account from the Facebook Security Settings page

Using security keys for two-factor authentication provides a number of important benefits:
  • Phishing protection: Your login is practically immune to phishing because you don't have to enter a code yourself and the hardware provides cryptographic proof that it's in your machine.
  • Interoperable: Security keys that support U2F don't just work for Facebook accounts. You can use the same key for any supported online account (e.g. Google, Dropbox, GitHub, Salesforce), and those accounts can stay safe because the key doesn't retain any records of where it is used.
  • Fast login: If you use a security key with your desktop computer, logging in is as simple as a tap on the key after your enter your password.
Security keys for Facebook logins currently only work with certain web browsers and mobile devices, so we'll ask you to also register an additional login approval method, such as your mobile phone or Code Generator.To add a security key from your computer, you'll need to be using the latest version of Chrome or Opera. At this time we don't support security key logins for our mobile Facebook app, but if you have an NFC-capable Android device with the latest version of Chrome and Google Authenticator installed, you can use an NFC-capable key to log in from our mobile website.



Mobile login using security key on an NFC-capable Android phone with Chrome and Google Authenticator.
We're excited to offer this additional option for logging into your Facebook account securely, and we're grateful to Yubico for the support and feedback they've provided. You can read more about setting up your security key here.

Brad Hill is a Security Engineer at Facebook.




Tuesday, January 24, 2017

Don't Fall For This Dangerously Convincing Ongoing Gmail Phishing Attack

Security researchers have discovered a new phishing campaign targeting Gmail users, which is so convincing and highly effective that even tech-savvy people can be tricked into giving away their Google credentials to hackers.

The attackers first compromise a victim's Gmail account, and once they are in, they start rifling through inboxes to launch secondary attacks in order to pass on the attack.

The hackers first look for an attachment that victims have previously sent to their contacts and a relevant subject from an actual sent email. Then the criminals will start gathering up contact email addresses, who become the new targets of the attackers.

After finding one, the hackers create an image (screenshot) of that attachment and include it in reply to the sender with the same or similar subject for the email, invoking recognition and automatic trust.




What makes this attack so effective is that the phishing emails come from someone the victim knows.
This new Gmail phishing attack uses image attachments that masquerade as a PDF file with a thumbnailed version of the attachment. Once clicked, victims are redirected to phishing pages, which disguise as the Google sign-in page. But it's a TRAP!

The URL of the fake Gmail login page contains the accounts.google.com subdomain, which is enough to fool the majority of people into believing that they are on a legitimate Google page.

Also, since the browser does not show the red warning icon usually used by Google to point out insecure pages, users fall for the Gmail hacking scheme.

Victims fall for the scam because of a clever trick employed by this attack, and they submit their credentials, which get delivered directly to the attackers. And as soon as the attackers get their credential, they log into the victim's Gmail account.

Protecting against this attack is very simple. Gmail users just need to enable two-factor authentication, and, of course, always be careful while opening any attachment in your email.

source: https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/

Facebook Bug Could Allow Hackers to Delete Any Video On Facebook

A security researcher has discovered a critical vulnerability in Facebook that could allow attackers to delete any video of the social networking site shared by anyone on their wall.

The flaw has been discovered by security researcher Dan Melamed in June 2016, allowing him not only to remotely delete any video on Facebook shared by anyone without having any permission or authentication but also to disable commenting on the video of your choice.

Melamed responsibly reported the vulnerability to the Facebook security team, which patched the vulnerability within two weeks at the beginning of this year.

Shortly after patching the flaw, the social media giant rewarded him $10,000 bug bounty for his efforts.
This is not the very first time when such vulnerability has been disclosed in Facebook that could have allowed attackers to delete any video from Facebook. Bug bounty hunters continuously find and report such bugs to keep the social media platform safe and secure.




Here's how to exploit this flaw:
In order to exploit this vulnerability, Melamed first created a public event on the Facebook page and uploaded a video on the Discussion part of the event.
While uploading the video, the researcher tampered the POST request using Fiddler and then replace the Video ID value of his video with Video ID value of any other video on the social media platform.
Although Facebook responded to this issue with a server error, i.e. "This content is no longer available," but the new video was successfully got posted and displayed just fine.
Once this task was accomplished, Melamed deleted his event post, which eventually deleted the attached video.
 This in turned removed the video from the social networking site and the wall of the victim.

Video Demonstration
For more step by step details about the vulnerability and how it works, you can watch the proof-of-concept video demonstration above which shows the Facebook video deletion attack in action.






Sunday, January 22, 2017

SAP Introduces Jump-Start Enablement Program for SAP® Leonardo IoT Portfolio


Promotional Pricing and Consultative Services Will Help Customers Adopt Successful IoT Strategies;
Global SAP Leonardo Event Announced for July 2017 in Frankfurt

TAGUIG, Philippines – Jan. 18, 2017 SAP SE (NYSE: SAP) today announced a jump-start enablement program for its Internet of Things (IoT) innovation portfolio. The program is intended to help customers connect the emerging world of intelligent devices with people and processes to achieve tangible business outcomes. Following through on SAP’s recently announced commitment to invest €2 billion in IoT over five years, the IoT portfolio combines adaptive applications, Big Data applications and connectivity in packaged solutions across line-of-business and industry use cases ranging from connected products, assets and infrastructure to vehicle fleets, markets and people.
Named SAP® Leonardo, SAP’s IoT portfolio takes its name from a figure known for ushering in a groundbreaking era of science and discovery. For more on the SAP Leonardo brand, please see here.



“Moving from things to outcomes is about new business processes such as Industry 4.0, new business models and new ways for people to live and work,” said Dr. Tanja Rueckert, executive vice president, Digital Assets and IoT, SAP. “With SAP Leonardo, we connect ‘things’ with business processes that are instantaneous and proactive, and with people who can manage more effectively with augmented intelligence and autonomous systems. Our SAP Leonardo IoT portfolio delivers on SAP’s commitment to produce superior business value through enterprise IoT innovation.”  



Easier IoT Adoption: Jump-Start Pilot Program and Introductory Pricing
SAP is introducing a jump-start program as part of its SAP Leonardo Labs global enablement network to help organizations identify and validate IoT pilots and use cases. A consultative service staffed by SAP line-of-business and industry experts, the jump-start program is a multiphase engagement featuring design thinking to match IoT innovations with customer strategies and objectives in achievable pilots with a clear path to business value. Available worldwide, the jump-start program is intended to ease the first steps of the IoT journey, producing pilots that define business cases for full-scale IoT strategies and further deployment.

SAP is also introducing promotional pricing for the IoT jump-start program featuring a simple, fixed cost for software and services to cover the pilot and first year of usage for SAP Leonardo IoT solutions including SAP Connected Goods, SAP Vehicle Insights, SAP Predictive Maintenance and Service and SAP Asset Intelligence Network. By setting a defined price for services and key solutions in the SAP Leonardo IoT portfolio, the introductory offer provides transparency and eliminates budget uncertainty, enabling customers to establish IoT pilots with clear scope, length and pricing. More information on the jump-start program and pricing offer can be found here.
A Unique Ability to Connect People, Things and Businesses
SAP Leonardo reaffirms an innovative value proposition, extending from SAP’s enterprise core into automation and intelligence at the edges where IoT data is created. With SAP HANA® as its platform, SAP Leonardo offers intelligent IoT applications, business services for development, technical services for processing high-velocity data and an intelligent edge to process information at the device level. SAP Leonardo combines SAP’s unique strengths, including 45 years of business process knowledge across 25 industries and leadership in Big Data management, in end-to-end offerings addressing the following areas:
  • Connected products for new insights into lifecycle management, sourcing, response and supply, and digital supply networks; and the design, manufacturing and delivery of smart, connected products across all industries
  • Connected assets to track, monitor and analyze fixed assets, including manufacturing and maintenance business processes, to reduce costs and increase equipment uptime
  • Connected fleet to enable businesses and public service organizations owning moving assets (such as vehicles, robots, fork lifts and autonomous vehicles) to improve services and safety, visibility to logistics and service quality
  • Connected infrastructure for new digital operational intelligence from physical-infrastructure systems, construction and energy grids enabling improved service, efficient operations and compliance and risk mitigation
  • Connected markets to enable new production, and business models of local relevance and at the right timing for customer and marketing insights, digital agribusiness, smart ports and smart cities
  • Connected people for more insightful, collaborative work roles, health management and smart home environments connecting people and communities and providing better, more personalized lifestyle experiences
For more detail on the portfolio, see here
 
SAP Leonardo Event
SAP also announced plans for its first global SAP Leonardo event. Bringing together SAP customers, partners and IoT experts, the event will showcase the latest in IoT innovations and effective business strategies. The event will take place July 11–12, 2017, in Frankfurt, Germany, at the KAP EUROPA. More information about the event, including agenda and registration details, will be disclosed in the coming weeks.
More information on customers achieving business success with SAP Leonardo can be found here.
 
For more SAP news, visit the SAP News Center. Follow SAP on Twitter at @sapnews.
About SAP
As market leader in enterprise application software, SAP (NYSE: SAP) helps companies of all sizes and industries run better. From back office to the boardroom, warehouse to the storefront, desktop to a mobile device – SAP software empowers people and organizations to work together more efficiently and use business insight more effectively to stay ahead of the competition. SAP applications and services enable more than 335,000 business and public sector customers to operate profitably, adapt continuously, and grow sustainably. For more information, visit www.sap.com.
# # #
Any statements contained in this document that are not historical facts are forward-looking statements as defined in the U.S. Private Securities Litigation Reform Act of 1995. Words such as “anticipate,” “believe,” “estimate,” “expect,” “forecast,” “intend,” “may,” “plan,” “project,” “predict,” “should” and “will” and similar expressions as they relate to SAP are intended to identify such forward-looking statements. SAP undertakes no obligation to publicly update or revise any forward-looking statements. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. The factors that could affect SAP’s future financial results are discussed more fully in SAP’s filings with the U.S. Securities and Exchange Commission (“SEC”), including SAP’s most recent Annual Report on Form 20-F filed with the SEC. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates.
© 2016 SAP SE. All rights reserved.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other countries. Please see 
http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark foradditional trademark information and notices.