Users of Acer computers may be exposed credit cards

Customers who use an Acer computer may be leaked, which may include name, address, credit card.


In the tech world, cyberattacks are no longer a strangest thing, but it will still have a direct impact on organizations, and especially user information.

According to Neowin, a vulnerability known as CardCrypt, discovered by the Wandera security group, shows that 16 global companies have failed to encrypt online payment data and other applications.

And Acer is facing attacks on its corporate database and affecting the operation of commercial Web sites in the United States. Customers who access this site from May 12, 2015 to April 28, 2012 may be subject to unauthorized access by third parties. According to a letter to the US state of California, leaked customer information may include name, address, credit card, expiration date and CCV security code.

"We do not collect social security numbers, nor do we find evidence that our customers' passwords or logins are affected," said Acer. However, Acer still recommends customers check their account, especially the signs of fraud in credit card spending.

Google CEO Larry Page: "Technology is only beneficial when we apply them to practical life"

Larry Page is a great influence on the technology world. He is a co-founder of Google and the CEO of Google, Alphabet. He spent his youth pursuing the dream of changing the technology world.


Larry Page was born on March 26, 1973, the second son of Gloria and Carl Page. His parents are lecturers in computer science at the University of Michigan, USA. This was the environment in which Lary was exposed to computer science at a young age, which gave him a passion at a young age.

At the age of 12, after reading the novel about the life of inventor Nikola Tesla, who died in debt grime, he was determined to strive to change the world of technology. "Inventions are not random things that are good for life," he said. They are only beneficial when we apply them to life in a practical way. "

In addition to the lingering and inquisitive about technology, electronics, Larry also plays saxophone trumpet very well. He studied music in order to study the "Google search speed". While studying at the University of Michigan, he joined the team to build solar powered cars. After graduation, he studied for a doctorate at Stanford University, and met Sergey Brin, CEO of Amazon, who became a close friend.

After a 23-year-old dream, he asked himself: "How can I download all the contents of a web page to my computer?" He started working and researching for the goal of ranking local websites and linking them together. He and Sergey Brin researched the search engine BackRub and domain name Google.com in September 1997.

Omid Kordestani, co-founder of Google, Larry's close friend, said Larry was curious, groping and focused, and he had the desire to change the world through technology.

Larry Page was CEO of Google in 2001. Initially he did not want to be CEO but gradually became accustomed and relaxed when Google grew and developed. During his time as CEO, Larry has been researching and researching new products as a scientist. He is also a talented entrepreneur, having successfully arranged the acquisition and merger of Androi's Andy Rubin.

In 2012, he and his colleagues launched the Google+ product, the first version of Chromebook used on laptops by Google. With high speed Fiber access, this product has achieved the desired effect.

He is CEO of Google until 2015, then in 2016 he became CEO of Alphabet, Google's parent company. In 2016, he was voted by Forbes Magazine as the eighth richest person in the world with net worth of $ 39 billion. He currently lives with his wife and two children at the Palo Alto villa, worth $ 7 million and owns a $ 45 million super yacht.

In 2006, he founded the Carl Victor Foundation to commemorate his father. This fund is used to help people with polio and other complications. He raised $ 1.37 billion in donations.

In 2015, as CEO of Alphabet, he spent $ 3.56 billion to advertise search engines with Project Loon, but the results were not favorable.

According to shared information, Larry and his colleagues are investigating flying cars. He invested about $ 100 million of his money for two researchers Kitty Hawk and Zee Aero to study flying cars.

Broadcom has successfully acquired Qualcomm?

Knowing that Broadcom's acquisition of Qualcomm remains a bargain from price deals to legal barriers, let's take a look at the huge deal seen as a focal point in the emerging technology world. from the beginning of November.

Broadcom can heal Apple's relationship with Qualcomm


Qualcomm's legal battle culminates in 2017 when it faces fines in South Korea and Taiwan, the lawsuit comes from Apple and the US Trade Commission. Apple has paused paying royalties until the court ruled the suit Qualcomm took advantage of its position to get more money from hardware makers.

And with such a situation, Qualcomm revenue has dropped 60% while cash flow dropped 36% in 2017 compared to last year. The legal dispute also caused Qualcomm shares to fall 19% from the beginning of 2017 until there are signs of recovery before sources say Broadcom intends to buy the semiconductor maker.

Qualcomm has tried to reach an agreement with Apple by attempting to temporarily stop selling the iPhone in the United States and China but failed.

Qualcomm executives, at a meeting on earnings in the fourth quarter of 2017, said the lawsuit against Apple would continue in 2018, meaning it could drag on for another year with dismal earnings.

The legal battle could force Qualcomm to change the licensing practice. The company may be required to set a fixed price per device, or to rely on a royalty rate on the cost of components. In both cases, Qualcomm's revenue from licensing is negatively affected. Since more than 70% of the company's current revenue comes from the profitability of the licensing, the company's profits will suffer a great shock.

This compromises Qualcomm's financial fundamentals and the company becomes a prized target.

If Broadcomm acquired Qualcomm, the company's profit after merger would be higher because Qualcomm's operating margin of around 20% would be supported by Broadcom's 40% profit margin.

To stay in the legal battle with Qualcomm, Apple is looking for an alternative to Qualcomm's modems by sourcing from Intel and MediaTek or even designing its own chips.

Some reports suggest that Apple will be able to completely remove Qualcomm chips from its 2018 launch. Even if Apple is discontinuing its Qualcomm-based modem, it will likely return to the negotiating table with Qualcomm on its 5G technology - the near-monopoly power it holds.

So if Apple does not agree to pay royalties now, that will only increase the royalty fees that they pay to Qualcomm in the future, in the face of claims.

Apple could try and run out of Qualcomm in the short term, but they could not shake the semiconductor giant for long periods of time.

Legal troubles can negatively affect Qualcomm's earnings in the short term, but Broadcom claims that they can help make Qualcomm's legal battle easier, though they have not disclosed the deal. that's how.

Do not think the most popular US presidential election in 2018, Bitcoin and Iphone X are the world's most sought after

Google has just announced the list of the most searched keywords in 2017. Just as in previous years, the hot events of the year were the most searched topic.


It is the world's largest online search engine and a symbol of the world of technology. Popular searches on Google also showed a picture of the world in the past year.

Hurricane Irma is the most searched topic on Google in 2017. The typhoon that hit the Florida coast in September 2017 was the strongest storm that has hit the Atlantic for the past 10 years.

Apple's launch of the iPhone 8 and iPhone X has attracted the attention of billions of people around the world. And that is why the iPhone 8 and iPhone X are the second and third most searched keywords on Google.

The sudden departure of rock singer Tom Petty also contributed to his name entered the top ten most searched keywords.

In the top 10 of Google's hot keyword 2017, most of the topics are related to the field of entertainment and technology. List of the 10 most searched keywords on Google in 2017:

1. Hurricane Irma

2. iPhone 8

3. iPhone X

4. Matt Lauer

5. Meghan Markle

6. reasons why

7. Tom Petty

8. Fidget Spiner

9. Chester Bennington

10. India national cricket team

The international news is most interested users

In 2017, the world witnessed many instabilities from North Korea's nuclear missile tests, the events of President Donald Trump taking over with new policies or the bloody terrorist attacks taking place in many places around the world. Especially in the field of finance, investment, perhaps Bitcoin is the hottest keyword worldwide. The "crazy" fluctuations of the bitcoin virtual currency have forced the whole world to search for it.

Google has also shown international news that is of the highest interest to searchers worldwide on search engines in 2017:

1. Hurricane Irma

2. Bitcoin

3. Las Vegas shooting

4. North Korea

5. Eclipse

6. Hurricane Harvey

7. Manchester Terror

8. Hurricane Jose

9. Hurricane Maria

April Giraffe (a giraffe raised in a zoo in New York, has become famous on the Internet with live birth videos on YouTube, attracting 1.2 million views)

Technology keywords searched on Google in 2017

Over the past year, mobile device "blockbuster" continues to be the subject of the world interest. Topping the list are the iPhone 8 and Apple iPhone X. Featured phones like Samsung Galaxy S8, Nokia, Oppo are also hot keywords on Google.List of the 10 most searched technology devices on Google over the past year:

1. iPhone 8

2. iPhone X

3. Nintendo Switch

4. Samsung Galaxy S8

5. Xbox One X

6. Nokia 3310

7. Razer Phone

8. Oppo F5

9. OnePlus 5

10. Nokia 6

Google also categorizes hot keywords by topic so that users can track. Readers can refer to Google's year in search page for more information.

In addition, Google has made a video of the most memorable and memorable moments related to the most searched Google events and topics, as a way to aggregate 2017. end

No one expected: Microsoft overtook Google in terms of market value!


Yes, even if Android has "squeezed" Windows Phone and eclipsed Windows 10, Microsoft still outperformed Google to tens of billions of dollars.

Twenty years ago, beating Microsoft was the illusionist. Software giants at that time dominated the world perfectly. Taking the lead, but stagnating and conservative, Microsoft has become a villain pulling back the technology world.


Then, ten years ago, with two Chrome and Android spikes, Google started downplaying Microsoft. In early 2011, Android became the most popular smartphone operating system in the world. Windows Phone has not been able to hurt the Android market before it was killed by Microsoft itself. In 2012, Chrome surpassed Internet Explorer to become the number one browser in the world.

More than a year ago, Android also toppled Windows to become the most popular operating system on the world. With the tremendous power of the green robot, Google sometimes even surpassed Apple to occupy the No. 1 position in the race to become the first billion-dollar company in the world. As the role of Windows fades, Microsoft's ideas have officially fallen into the past.

Even so, Microsoft has come up again to shine its own overthrow. Ending the session on May 22 in the US, the market value of Microsoft reached 750.5 billion. The market value of the Alphabet / Google reached only 737.7 billion dollars.

What is even more surprising is that during the recent Build 2018 event, Microsoft has almost no noticeable publicity for its "regular" technology fans. Windows is almost absent as Microsoft executives talk about technology concepts that are almost exclusively meant to IT professionals.

Compared with I / O, where Android P and a rather scary version of the Assistant launch, Microsoft Build is a far less fuzzy event. But Microsoft's market value accelerates before Google shows, Silicon Valley and Wall Street are putting more expectations on Microsoft than Android.

It is not difficult to see why they carry such a concept. Despite its size, Google is essentially an advertising and live data company (via search, Gmail, Maps). After the Cambridge Analytica scandal, both users and political organizations are more concerned with privacy and data security.

Looking at other key businesses, Google is unlikely to continue to grow in the future. YouTube continues to burn money; The same branded services (YouTube Red, YouTube Music) have not yet made a good return. Cloud is still amazed by Amazon and Microsoft itself. Hardware sales are still too small when Pixel market share is even lower than ... Nokia.

Even Android, which is indirectly generating revenue, is hardly able to grow. Global smartphone shipments have been steadily declining over the past few years, affecting heavily Android. The average selling price represents a gradual shift towards higher-end segments where Apple is still dominated by sales and profits.

What about Microsoft? When Windows Phone died, Windows 10 faded and even the Xbox cooled down. Microsoft overtook Google by becoming "another human being." No less savvy with the "universal" technology, every Microsoft event is transformed to attract IT circles with vision for the cloud, for AI, for business. Understanding that its unique strength lies in the ability to build infrastructure for the whole hi-tech world, Microsoft's Satya Nadella constantly invest in the technology "under the ground" to beat the opponent.

The impressive financial reports as well as the "terrible" value of today is evidence that Microsoft is on the right track. If you look closely, you will realize that defeating the cloud and Microsoft services is impossible, especially as the company is leveraging its existing strengths and continually expanding its reach into the coin. of the times. The cloudiness of the world is still long, opening up tremendous potential for the growing Azure cloud.

Google's cloud can not withstand the rise of Microsoft. Google is facing a range of core issues, from privacy to future Android and Pixel hardware. No one has looked at how Google is expanding, and so Google has again come back behind the shadow of Microsoft.

Windows Media Player and Internet Explorer as a gateway



Microsoft's June Patchday 2015 comes with eight security bulletins, the only ones that are critical: An update package for Internet Explorer and an upgrade for Windows Media Player. A patch was apparently withdrawn before the release.



The most recent cumulative update for Internet Explorer (IE) fixes several security holes. The worst bugs can allow an attacker to execute code on the vulnerable system (Remote Code Execution, RCE). For this, the user would have to call a specially designed website. Particularly vulnerable are client computers with Windows 8.1, Windows 7 and Vista.

Affected are all browser versions of IE 11 to 6. Amongst other things, the update MS15-056 ensures that an attacker can not access the browser history from a maliciously crafted website. The update also adds additional authorization checks and changes how IE processes objects in memory.

A critical vulnerability has been found in Windows Media Player that is vulnerable to versions 10, 11, and 12. In this case too, remote code execution may occur if the user navigates to a dedicated web page containing malicious media content.Remedy is the security bulletin MS15-057 create. The update addresses the vulnerability by correcting how the Media Player handles DataObject objects.

In the list missing information about the patch with the identifier MS15-058, apparently the update was withdrawn at short notice. The remaining security bulletins are all considered important.

It starts with the patch MS15-059 for MS Office 2007, 2010, 2013 and 2013 RT. This changes how Microsoft Office processes open files in memory, thus preventing a potential RCE. The same is the update MS15-060 , which addresses a vulnerability in Microsoft common controls.

Multiple security issues in Windows kernel-mode drivers and in the Avtive Directory Federated Services may increase elevation of privilege (EoP). This should be counteracted by the security bulletins MS15-061 and MS15-062 .

Additional EoP vulnerabilities were found in the Windows kernel and the Microsoft Exchange Server. These should be a thing of the past with the security bulletins MS15-063 and MS15-064 . Since a vulnerability sometimes affects different products, it may be that in the end significantly more updates come together.

Fluke monitors cloud via SaaS

Fluke Networks announces a product strategy for "the limitless enterprise" and provides a monitoring solution for cloud applications with TruView Live.



Fluke Networks (Fluke) recognizes fundamental changes in the structure of enterprise IT networks and data centers. The manufacturer wants to take into account the trends in cloud computing , mobile users and unified communications with a product strategy for "the unlimited enterprise". The TruView Live monitoring solution, which has now been introduced, fits into these.

Even Software as a Service ( SaaS ) monitors the product as a service-deployed application, platform, and infrastructure. IT managers should with the offer:

track the end-to-end availability and performance of networks in real time with a single dashboard;

Capture alerts and set performance limits to resolve issues before they become a problem for users;

Isolate problems and react proactively to maintain the productivity of the company;

Create accurate reports on SaaS performance and business management SLAs as needed.TruView collects data agentless via an active test sensor. Fluke provides this in three forms: as a physical test device (TruView Pulse), software for Windows and Linux (Virtual Pulse) or in a distributed cloud- hosted application (Global Pulse).

Fluke offers TruView Live usage-based. Further details and a trial version are available against registration.

The present SaaS should not remain the only product access for the "unlimited enterprise". For example, Fluke intends to deliver additional solutions for hosted VoIP, mobile user experience and enhanced security features later this year. In addition, the vendor also refers to its established suite that could detect IT issues across a wide variety of devices, applications, sites, and cloud providers :

Visual TruView - A unified network and application performance tracking solution that enables IT departments to quickly identify and resolve client, network, service, and application issues by including five tools in one.

OptiView XG - A rugged and portable tablet for network engineers that combines analysis of wired and mobile networks to address issues and assess network quality for VoIP / Video / UC implementations.

OneTouch AT 10G Network Assistant - An automated portable tester for network engineers to troubleshoot 10 Gigabit data centers and validate connectivity, service availability and path performance.

AirMagnet - A comprehensive suite of mobile network design, analysis, and security products, including intrusion prevention, network health assessment, and remote troubleshooting.

Arif Kareem, president of Fluke Networks, comments: "Traditional IT has reached a point where a balance of technological and business benefits is essential. With departments playing an increasing role in selecting and integrating cloud-based services across the enterprise, IT managers must act as partners while ensuring the quality of service for all applications. By assuming responsibility for an improved user experience, IT can demonstrate a critical business advantage. "

App security strategy for older Android versions


Mobileiron extends its Appconnect framework to the Android for Work platform so developers can use Appconnect-enabled apps in the secure working environment of the Android for Work app, and provides new resources to protect apps, the network, and data in the cloud.


Android for Work , a Google-introduced method for securing enterprise apps on Android, works in conjunction with an EMM platform, such as Mobileiron, to separate enterprise and private data. On Android 5.0, the combination of Mobileiron and Android for Work makes it possible to install and run Android apps in a safe work environment on the device, without the need to change these apps. Because the security controls were at the operating system level, they could be applied to all apps running on this operating system.

Containerisation for a safe working environment

Devices running the earlier Android versions 4.0 and 4.4 do not have the security controls of Android for Work at the operating system level. Google provides the Android for Work app for these companies . This app creates a safe work environment where other corporate apps can be installed and protected from unauthorized access. However, this is not possible without changes to the respective app. This is where Appconnect from Mobileiron comes into play.

Mobileiron Appconnect containerizes apps to protect stored corporate data without touching personal information. The data of such a containerized app are encrypted. The access to apps and data as well as the execution of operations, eg delete operations, is only possible with an appropriate authorization. By extending Mobileiron Appconnect to Android for Work, developers could now use all Appconnect-enabled apps in the secure work environment of the Android for Work app. With Appconnect already having a large ecosystem of third-party and in-house apps using this framework, this extension will increase the number of apps Android for Work can back up on existing Android devices.Resources for more transparency, protection and control

To protect data in apps, the network, and the cloud , the Visualiron, Visualization, Tunnel, and Key Manager Mobileiron resources should:

Mobileiron Visual Privacy is intended to provide employees with insight into what data the employer can view and what actions the employer company can take on the device.

Mobileiron Tunnel can use an App VPN to secure traffic to corporate apps without capturing traffic from personally-used apps. Mobileiron plans to extend Mobileiron Tunnel from iOS to Windows Phone and Android.

Mobileiron Key Manager could enable organizations to deploy their own hardware security modules to securely store the digital key used by Mobileiron Content Security Service (CSS). CSS support is to be extended to Google Drive.

SME: Stumbling trap CYOD

The IT service provider Prego Services has observed that many medium-sized companies shy away from the risks of "bring your own device" (BYOD) and prefer to provide their own equipment to their employees. But "Choose Your Own Device" (CYOD) also carries some dangers.


The use and deployment of Enterprise Mobility usually leads in the IT way. The use of mobile devices makes the company more flexible and business processes more efficient. Nevertheless, according to the IT services provider Prego Services, which specializes in medium-sized companies, companies are still insufficiently concerned with the topic "bring your own device" (BYOD). Especially the middle class should also hold back when it comes to the professional use of the private mobile devices of its employees.

"Choose Your Own Device" (CYOD)

Due to the known risks associated with BYOD, many SMEs provide their own equipment to their employees. "Choose Your Own Device" (CYOD) is an alternative concept to BYOD. The willingness of companies to provide their employees with more mobile devices is growing steadily. With CYOD, the IT companies meet the wishes of their employees. Employees can select their personal mobile device from a list of shared devices - however, the company retains ownership of the devices. Advantages of CYOD are that the company has control over the contents of the devices and the resulting legal certainty . But CYOD also carries some risks.

How small and medium-sized companies can protect themselves against pitfalls, Pregio Services has summarized in seven tips:1. Select mobile information

Companies should thoroughly and predictively consider in advance which information they would like to make available to their employees on a mobile basis. This decision sets the course for further action. Is it about syncing groupware data, like emails, calendar and contact information, with mobile devices? Or should - perhaps even later - company apps be added, for example, for permits, time tracking or travel expenses?

2. Select devices deliberately

Which mobile devices can be provided depends significantly on the answer to the first question. When it comes to official e-mails, companies have, in principle, free choice. However, if certain business processes are to be placed on smartphones and tablets, this may restrict the selection under certain circumstances.

3. Carry out risk assessment

The information that is to be mobilized must undergo a thorough risk assessment, from which appropriate safeguards can be derived. For example, if order data is handled mobile, it is recommended to encapsulate this data. This is using a so-called container - App possible isolated corporate data. This ensures that other mobile applications can not access it.

4. Allow the employees freedom

When securing devices, companies should not overshoot. If you restrict the use of mobile devices too much, they lose their added value for the employees. For example, if they can only receive official e-mails on iPhones and use some professional apps, they probably will not enjoy it. Therefore, it is important to weigh carefully between security and freedom.

5. Mobile Device Management (MDM) is mandatory

For centralized management of mobile devices, there is no way around an MDM solution (Mobile Device Management). These systems allow enterprise policies to be applied to devices and configured remotely. For example, it can be ensured that manipulated mobile devices or those without a security certificate can not connect to the corporate network. In addition, data can be deleted remotely in an emergency.

6. Consider Enterprise Mobility Management (EMM)

Depending on the data provided on the mobile devices, it may be useful to expand the MDM into a comprehensive Enterprise Mobility Management (EMM) that also includes Mobile Application Management (MAM). For example, if mobile devices access the corporate environment, an MAM can automatically provide the information needed for license management. It may be advisable to integrate the EMM into a comprehensive workplace management system that manages the entire workplace, including its mobile devices.

7. Choose infrastructure wisely

There are MDM, MAM and EMM solutions on the market that can be operated in-house as well as cloud-based or in hybrid environments. Cloud solutions have indisputable benefits. If they are to be deployed, companies must look closely at the underlying infrastructure and whether their own data remain in the country or leave Germany.

More CYOD instead of BYOD

The IDC study "Enterprise Mobility in Germany 2014/2015" shows that CYOD has more resonance than BYOD. Every second company now has a CYOD concept, while BYOD has only about 40 percent. CYOD is a compromise between the needs of users and the demands of IT, which is favored by many IT decision makers. CYOD costs companies more, but provides more control and security than BYOD.

Study: High demands on an Office 365 migration

Centracon has asked more than 200 companies what requirements should be met to justify their use of Microsoft Office 365, and what migration hurdles businesses are looking for. The result: When asked, Germany's companies raise the bar very high.



According to the results of the Centracon study, availability of the service, data protection and data security are top of the requirement profile - more than 80 percent of respondents believe that they must be guaranteed. Economic benefits from a reduction in operating and infrastructure expenses should also be expected to be on the benefit side. For three-quarters of users, a source-cost distribution is important, and 64 percent expected a high flexibility in the usage scenarios, similar to a simple scalability.By comparison, collaborative functions such as collaborating with external parties or co-authoring documents play a minor role, according to the study. Although they are also desired by a majority of companies, they are rather positioned behind the requirements ranking.

On the other hand, given the current cloud discussion, the issue of security is by no means surprisingly at the forefront of possible migration hurdles . For example, 62 percent of IT executives expected that data protection requirements could not be easily implemented. The skepticism to be derived from the results partly also affects the compliance requirements of the companies. Adapting to the individual needs of employees could also be difficult in the eyes of every second respondent.The integration of these services into the existing IT service landscape does not pose too much a challenge for most IT managers. The complexity of such a migration project does not cause much concern. The acceptance of Office 365 among the employees will also not be done as a critical decision aspect, also feared insufficient transparency of the variants of the cloud service, only a few.

However, the employment with the Microsoft world for the time being largely restrained. Only one fifth of the companies surveyed have dealt with it in detail and in a decision-oriented manner. Another 16 percent would also have taken a closer look at Office 365, but currently without migration intent. On the other hand, the cloud-based office product is currently only in every seventh case completely disinterested.

"Of course, IT executives right up to CIOs and CEOs are insecure because of the continuous reporting on intelligence services not only in the US, but also in Europe," interprets Marcus Zimmermann, Senior IT Business Consultant at Centracon AG, the results. "Also recent discussions and criticisms about the planned EU-wide data protection regulationcreate confusion when it comes to the cloud. Many companies are not yet sufficiently concerned with developing a position on cloud services at all. This explains why influencing factors and dependencies on data protection and data security are not yet transparent for a specific cloud offering in companies and are initially seen as the number one obstacle. "