'Virtual reality has made exciting progress over the past several years. However, developing for VR still requires expensive, specialized hardware. Thinking about how to make VR accessible to more people, a group of VR enthusiasts at Google experimented with using a smartphone to drive VR experiences.

virtual realityThe result is Cardboard, a no-frills enclosure that transforms a phone into a basic VR headset, and the accompanying open software toolkit that makes writing VR software as simple as building a web or mobile app.

By making it easy and inexpensive to experiment with VR, we hope to encourage developers to build the next generation of immersive digital experiences and make them available to everyone.'

https://developers.google.com/cardboard/

Looks cool going to have to try this.

0
0
0
s2sdefault

What Is Mobile Web Hacking, How To Identify The Problem And How To Protect Yourself/Company?

What Is Mobile Web Hacking?

You may suddenly discover that personal information from your mobile is splattered all over the Internet. Possibly your text messages, your pictures and intimate conversations are available for all to see. Not only is this an invasion of privacy, it may also be extremely damaging to your livelihood and personal life.

In the technologically advanced world, sometimes people want to hack into personal details of others for various reasons. For example, there may be people who you have fallen out with in business or love, people who may dislike you for something you have said or done, or friends who have now turned unfriendly. It is prudent to guard your personal information properly, as it is not always possible to predict how some relationships might turn out.

Apart from sour relationships, business rivalry is another reason for mobile web hacking. Your business competitor may want access to your personal information to know what you may be planning next. There may also be the friendly neighborhood attacker who wants to blackmail you over some sensitive information you have in your cellphone. The attacker may also be looking for your financial information to steal from your bank account.

How To Identify If Your Mobile Has Been Hacked?

 

Most users of mobile devices do not think of their cellphones as computers and hence do not take adequate steps to protect them as they do with their PCs and laptops.

Mobile devices are increasingly becoming as powerful and sophisticated as regular computers and hence are equally vulnerable unless protected adequately. When an attacker compromises a system, he has to tamper with the mobile’s system files in some way to prevent detection and to maintain continued access. This may include deleting some files, replacing or altering them or even adding extra files.

Intrusion detection systems or IDS can warn you if there are attempts by attackers to penetrate your cellphone. Periodic file integrity checking is one method of identifying if your mobile has been hacked and/or compromised by an attacker slipping past your IDS.

People are increasingly using smart mobile phones to visit websites and conducting several types of transactions on the web. It is very easy for attackers to compromise a mobile phone after the user has visited an infected or hacked website.

Detecting an infected site is easy with the Google Webmaster Tool or GWT, which has warnings for malware. When the tool detects malware, it sends warning emails to the webmaster and owners can see the warning when they login via the Webmaster Tool.

How Can You Protect Yourself from Mobile Web Hacking?

  • Download apps only from your phone’s store;
  • Update to the latest operating system of your phone and the installed apps;
  • Always have your firewall turned on;
  • Install the latest antivirus software and update it regularly;
  • Install the latest antispyware program and update it regularly;
  • Never download from suspicious websites;
  • Never open suspicious looking attachments to emails;
  • Turn on Bluetooth only when necessary;
  • Turn off your phone when not in use for long.

It is imperative to treat your phone as a computer and protect it in the same way. One of the most important tips is to keep your mobile with you always or in a place where you know it will be safe, and not leave it around in a public place. It is also prudent not to store too much sensitive information in your phone, and keep a track of what kind of data or photos you maintain.

 

Email hacking 

Your email hijackers might have created email forwarding from your email address to other addresses. Those other email addresses will receive everything you receive — including bank statements and personal messages.

"Even if you get back in your email and straighten everything out, unbeknownst to you, it is forwarding every email you are sending and receiving to the hacker," Levin said.

Look at your email account's signature settings to be sure the hacker hasn't changed your automatic signature.

Also look in your email folders, you're going to see things you forgot you had in there.  

Don't forget to report and Alert family, friends and acquaintances.

0
0
0
s2sdefault

Twitter and Password advice

Advice from Twitter in managing your

https://blog.twitter.com/2014/keeping-your-twitter-account-safe

and password advice

https://blog.twitter.com/2013/a-friendly-reminder-about-password-security

They recommend - 'Use a strong password. Your password should be at least 10 characters that include upper and lower case characters, numbers, and symbols. You should always use a unique password for each website you use; that way, if one account gets compromised, the rest are safe.'

However I don't think 10 is enough 12 is better and for those he find it difficult to remember passwords a pass phrase is helpful such as 'Ilikemy1girlfriend'
That's 15 chars long and you could also use password padding to make it extra hard. so for example '///Ilikemy1girlfriend\\\'

You can also use password vaults such as Keepass when it saves and encrypts your username & password so you only have to remember one. 

Hackers don't hack or try one password at a time. They may steal a whole database from a less secure site and at their leisure use software to work out the passwords and if you use the same password for several services they have hit a goldmine. 

 

0
0
0
s2sdefault