Tuesday, September 8, 2020

Protect Yourself From Common Crypto Scams: Trust a Canadian Exchange

 When you first start your crypto journey, you’ll find yourself asking a ton of questions.

‘How do I buy a Bitcoin?”

“What are the best cryptocurrency exchanges in Canada?”

“Are cryptocurrencies safe?”

And asking questions is great. The world of crypto is daunting to many, especially due to its associations with scams and money laundering. So it’s important to get into the space armed with the right knowledge. It’s fair for people to want to do their due diligence before committing to digital currencies. And to do that, you should know what common scams are out there and what to look out for.

Related: How to Buy Bitcoin in Canada

Here you can get free Bitcoin!

After all, progress in any field means a new territory is available for exploring. And along with all the innovators there will inevitably be scammers. Scammers take advantage of the misinformed within the new financial frontier, unfairly damaging the reputation of cryptocurrencies and blockchain technology. They do this through hacking and fraud. Sadly, the cryptocurrency revolution has not been immune to the plague of scammers tarnishing the system.

Indeed, the overwhelming majority of security breaches are not at all related to the security encoded into the cryptos, but rather the security measures taken by crypto holders in storing, trading, or transferring their cryptocurrencies. There is also scamming involved with Initial Coin Offerings (or ICO) for more on that visit: How to identify ICO scams. For now we’ll focus on online storage and transaction scams.

So what are some common crypto scams and frauds?

Identity Theft

Cryptocurrency exchanges in Canada are targeted with identity theft by scammers, as is common with online platforms. This is a low tech means for the fraudsters to take control of online accounts so they can plunder them.

Financial institutions, including crypto exchanges in Canada, gather detailed information about their clients in order to build a security profile that would authenticate them. This measure is called Know Your Client (or KYC for short) and it helps weed out anyone trying to impersonate a client and access their account. The idea is that in the event a scammer has managed to access some of a client’s personal information, they’ll still not have enough to successfully trick the system.

Naturally this means the more tediously detailed the client profile is with questions the more secure the KYC safeguard will be These are questions like: ‘where was your first ever trip with your parents?’ Of course, the system also has to be reasonably user friendly; there’s a balance to be struck between depth of details for security and ease of use.

Fake Cryptocurrency Exchanges

It turns out identity theft works both ways. Most instances are cases of fraudsters assuming the identity of clients in order to gain access to their funds on a website or platform. However, it can just as easily work the other way around.

There are examples of fraudulent exchanges where the owners of these exchanges stole from clients. They did this by setting up accounts and transferring client funds into their own wallets. Unfortunately, cryptocurrency transfers are irreversible. Therefore it’s not really possible to track the journey of a payment and halt or send it back if fraud is suspected.

So in such cases, even if the scammers are caught, the victims have little chance of recovering their deposits which will have been rerouted and stored offline as soon as the scammers received the funds. The case of BitKRX was a major wake up call to the cryptocurrency sector not too long ago. More on that here: South Korean Government Concerned With Scams in Bitcoin Market, Fake Exchanges

It’s important to apply due diligence when searching for a reputable cryptocurrency exchange in Vancouver, Toronto, or anywhere else in Canada. This means looking for signs of accountability by the crypto exchanges.

For example, the Netcoins cryptocurrency exchange is licensed by the Money Services Business (MSB) Registration, complies with the British Columbia Security Commission standards and is publicly traded, which means regular audits. These detailed factors are evidence of credibility that only a well established and secure exchange could offer. For other such examples you can look here: 10 Best Canadian Cryptocurrency Exchanges

SIM Swapping

As an added measure of protection, online financial services introduced 2 Factor Authentication (or 2FA). This technique makes it even more challenging for identity theft fraudsters to trick security systems by using the stolen information from a client. The system sends a notification to a personal device of the account holder, which normally includes a temporary pin that is then used on the login device to grant access.

However, thieves have countered this by resorting to SIM card swapping for crypto scams. Using the same personal data they’ve gathered on their targeted victim, they trick the victim’s mobile service provider into providing them with a new SIM card that gives them access to all the victim’s communications. This means the 2FA message sent to authenticate an account holder can be intercepted and used by the scammer instead. The key takeaway here is using SMS for 2FA isn’t quite as secure as using a third party app tied to a device (like Google Authentication for example).

For more on Two Factor Authentication check out our blog: What is Two Factor Authentication

https://bit.ly/3mxdMd7

Conclusion Although a great leap ahead in technological advancement, cryptocurrency is still just a tool. It’s therefore limited by the experience and judgement of its human user. It’s paramount for crypto holders to take the time to familiarize themselves with the intricacies of crypto trade, the pitfalls laid out by scammers, and how to best protect themselves from scams.

But the road ahead needn’t be daunting for consumers, because service providers like Netcoins are leading the way into a secure and stable future for cryptocurrency trading in Canada. Visit www.netcoins.ca to safely explore just how easy it is to start trading in cryptocurrency today.

Written by Ayelen Osorio of Netcoins

Bitcoin Is So Famous, But Why?

 Blockchain technology. It’s the underlying technology that Bitcoin and all other digital currencies rely on in order to provide users with a decentralized, democratic platform for exchanging value in a peer-to-peer fashion.

The inventor of Bitcoin (Satoshi Nakamoto) and the community of developers who successfully worked together to launch the network’s genesis block certainly deserve a lot of credit for making blockchain technology and cryptocurrencies a reality. That said, digital currency is only one use case for the blockchain. The reality is, blockchain technology and other exciting decentralized tools like smart contracts are revolutionizing product and service offerings across many different industries and verticals.

Time and time again, learning that blockchain technology applies to so much more than cryptocurrency – ironically enough – inspires Canadians everywhere to buy Bitcoin in Canada and get in on the action. There are many other resources to consider in trying to learn about Bitcoin and other digital currencies specifically. In this post however, let’s focus more on the ways the blockchain is changing other aspects of our lives.

What is Blockchain Technology? What is a Blockchain?

A blockchain is essentially a decentralized database. Decentralization means there is no focal point of attack for hackers to expose. Instead, information stored on the database is secured by computers who validate data as genuine. In the world of digital currency, the data happens to be related to transactions and payment information. In a broader sense however, the data can literally be anything. It can be the deed to a house, the rights to a piece of land, the rights to a rare antique, or an agreement between two parties that stipulates all of the details of a service agreement.

A blockchain can be either public or private. Again, most digital currencies like Bitcoin exist on top of public blockchains. This means everyone can see the data stored on the blockchain and there is no special permission required to contribute to its development or access the information stored on it. In a private blockchain, a central authority or any number of constituents might have special administrative power over who can look at the details stored on the blockchain and what those individuals can access. Some digital currency blockchains, like Ripple, allow partial access to the public while at the same time maintaining ownership of the blockchain as a private entity.

Let’s explore some more specific use cases for blockchains and how public and permission blockchains differ from one another in real-world scenarios.

XRP, Ripple and Central Banks

The Ripple cryptocurrency is represented by the XRP token. Anybody can own the token and profit from its price appreciation. In that sense, Ripple is a publicly funded project. However, the token and the blockchain that facilitates the exchange of its value is owned by a private company called Ripple Labs. Public blockchains that host cryptocurrencies allow the community of users to secure the network and benefit from its improvements or the price appreciation of its token or currency.

The team that owns Ripple however is interested in profiting privately. The goal of the project is to serve central banks, which is something cryptocurrency purists don’t like because serving central banks means serving a centralized authority, which in the minds of many libertarians means facilitating the privatization of value exchanges, not democratizing value. Ripple’s end game is to allow central banks to exchange large volumes of money at a fraction of the costs those banks are used to paying. The goal is to increase profit and put it into the pockets of business people and bankers, not hard-core libertarians.

Ethereum and Smart Contracts

Ethereum is built on a public blockchain and is the world’s second most valuable cryptocurrency according to market capitalization. It was developed by a team including Russian-Canadian programmer Vitalik Buterin.

Related: 10 Canadians to Watch in the Crypto Space

The project introduced the world to the concept of the smart contract. A smart contract is a digital agreement between two parties that lives on a blockchain. In hosting a smart contract, the blockchain stores all the relevant data related to terms and conditions, and outcomes that render the contract fulfilled. With smart contracts, there is no need to use an intermediary or escrow service to guarantee a transaction.

Consider the way a company, like online auction website eBay, guarantees transactions using their payment service, PayPal. PayPal guarantees the product gets delivered to the buyer upon receipt of payment. The seller gets paid once they provide proof of shipping details to the buyer and the shipping company notifies PayPal that delivery is complete. In exchange for facilitating all of this, PayPal and eBay charges as much as 15% in selling fees, and also charge the buyer for withdrawing money into their bank account. Transactions like these occurring on a public blockchain using a smart contract mean fees can amount to mere pennies, because there is no central authority or profiteer taking a cut.

Other Use Cases for Blockchains

As mentioned, blockchain technology doesn’t just store data related to monetary value. There are many other reasons to use it. The space industry will one day be able to use satellites above the atmosphere as nodes for storing or validating information. The industry will also be able to store data related to energy consumption and construction details related to projects orbiting our planet.

IBM already uses blockchain technology to store data related to every aspect of its global supply chain. This allows the company to track the shipment and servicing of every aspect of its business on a permissioned decentralized database that gives key stakeholders access to all of the relevant information they need to do their work.

Blockchain technology is also being used in artificial intelligence as a way of storing machine learning data in a secure fashion. It’s exactly what allows an artificial intelligence robot like Sophia to carry on a detailed conversation with Hollywood actor Will Smith during a dinner date. It also gives her inventors insight into how fast she’s learning and ensures that malicious hackers aren’t manipulating her progress in any way.

The Future of the Blockchain

The number of use cases for the blockchain are virtually limitless. As long as data needs to be secured, stored or quickly transmitted to another party, using the blockchain as a part of the solution is always a possibility. As the world of technology and cryptocurrency continues to evolve, so will broader use cases for blockchains.

Thanks for reading. Written by Ayelen Osorio of Netcoins

The Reasons Why You Should Invest In Bitcoin

There are now 8948 crypto and Bitcoin ATMs worldwide, with Canada hosting the second highest number of any country after the U.S. Canadians can now buy crypto from 819 locations across the country. The number of these machines has exploded worldwide since Netcoins’ president, Mitchell Demeter, helped install the first ever Bitcoin ATM in Vancouver in 2013. There are now crypto ATMs in 71 countries with 544 new ones installed in July alone.

What are Bitcoin ATMs?

Bitcoin ATMs differ from regular ATMs in that they do not allow you to withdraw cash unless you have that amount in your digital wallet, held as cryptocurrency. You can withdraw cash by selling your accumulated cryptocurrencies for a fee. You can also purchase Bitcoin and other digital assets directly through the ATM.

A Bitcoin ATM connects you directly to an exchange. This exchange and its buying/selling fees will vary based on the facilitator, in the same way they do on other exchanges. You can find your nearest bitcoin ATM, its manufacturer, fees and available coins on coinatmradar.com. The price of a coin may be listed on the ATM at a substantially higher rate than the current listed price, which is worth considering before using an ATM out of sheer convenience.

Are Bitcoin ATMs vulnerable?

The primary use of Bitcoin ATMs is to allow the unbanked and other investors easy access to acquire cryptocurrencies. As such, they are placed in locations you might not associate with security – tucked away in convenience stores, shopping malls and even supermarkets. This is a reflection on how cryptocurrencies are designed for everyone, not just the wealthy. Ease of access does not mean lax security, however.

Bitcoin ATMs are safe to use. However, some have found the registration process to be intrusive, with a phone number, scanned driver’s license, password and a selfie required. For some, these drawbacks are worth it if they do not have a bank account or are determined to leave the existing banking system behind.

As with any piece of technology or financial platform, there are those who seek to exploit people through these ATMs. The US government recently took down a $25 million operation, seizing 17 Herocoin machines set up by an unlicensed operator. The man running Herocoin, Kais Mohammad, now faces up to 30 years in prison.

As we mentioned in our last post, Bitcoin ATMs are sometimes used by scammers as part of a larger scheme. They will cold call people and talk them into exchanging their fiat currency for Bitcoin, then send it to the scammers’ own wallet as an irreversible transaction. As an update to that story, two Ontario residents have now been scammed out of almost $80,000 using similar methods.

The takeaway here is to always take time to research and understand a new technology, especially in the world of finance. If you’re new to Bitcoin and looking to buy crypto in Canada, start by educating yourself and using a trusted Canadian exchange (like Netcoins). Never purchase from a Bitcoin ATM or make any transfers before you know what you’re getting into and do not comply with anyone you don’t know demanding payments in crypto.

If you want to read more about buying Bitcoin in Canada, check out our post here or sign up here.

Wednesday, November 6, 2019

Android Protection: 4 Common Android OS Issues, And How to Nip Them All



Google hit the goldmines with its development of Android. Seeing as this is the choice operating system on no less than 2 billion devices out there today, that is no overstatement.
However, the Android market is that big means it is a huge goldmine for hackers too. This is why the average Android user should be put on alert and always make a move to ensure their safety and security at all times.
If you’ve also got an Android device on your hands, here are some vulnerabilities you could be exposed to – and how to nip them all in the bud.

Issue #1 – System Vulnerabilities
No matter how great a piece of software is, there will be some bugs and leaks in the code.
This should be expected for a long body of code that will guide the entire operations of a device. That is not to mention the fact that this single canopy of code was developed by a team of coders, and there could be human errors from each and every part of the board.
When a big company like Google is developing, they try to make sure these issues are as minimal as possible. Even at that, though, it happens.

What to Do
-          System patches will always be sent out to fix issues, in the form of software updates. Google now publishes these security fixes once a month. Ensure you always download and install them as soon as you get them so you are always running on latest security protocols
-          Purchase your units from a manufacturer who has a track record of sending out security fixes. Do your research into this before committing to buying at all
-          Download and install system upgrade packs whenever they become available too.

Issue #2 – App Vulnerabilities
Applications are yet another way by which hackers could gain access to your data and information. The interesting thing here is that app vulnerabilities can happen in a variety of ways.
The first and most common stems from downloading apps from sources other than the Google Play Store. Since they were never on the store, there is a risk that they contain malicious codes that have not been screened out by Google’s engineering and development team.
On the other hand, even trusted apps on the Play Store can be compromised for the wrong reasons. Even WhatsApp was recently a target of such, so the possibility should not be ruled out


What to Do
-          Never sideload apps. If you are not getting the app through the official Play Store, you are better off not getting the app at all
-          Download app updates as soon as they are out. They could be there to fix patches in the system (like in the case of WhatsApp mentioned above)

Issue #3 – Public Wi-Fi connections
You must be wondering what this has to do with anything.
While public Wi-Fi networks bring the sure convenience of browsing the web without incurring data costs, they might be costing you more than you know.
Due to their lack of encryption, these networks have become a haven for hackers to pounce on. All the way from installing malware on the network (which gets into your device without your knowledge) to perpetrating man-in-the-middle attacks, there seems to be no end to how hackers can take minimal to complete control of your units this way.

What to Do
-          The most obvious answer is to stop connecting to public Wi-Fi networks altogether. They are not healthy for your data privacy
-          If you must connect to them, consider having a VPN installed on your Android phone to keep your connection encrypted.

Issue #4 – App Permissions
One thing that Google improved on the Android software from the v5 Lollipop is app permissions, and for good reasons too.
There was a time when apps could set the permissions they required to work on your device, and you had to agree to them. Now, you can edit the apps to have just the permissions you need.
That is helpful in ensuring an app doesn’t have too much access to your personal life and data than needed.


What to Do
-          Check all your apps and see that they have appropriate permissions to work, and no more. For example, a messaging app might require access to your contacts, but that is not same for a third-party camera app.
-          If an app fails to work unless you give it certain permissions (which it doesn’t need), uninstall it in favor of others. Trust us: The Play Store is full of alternatives than allowing yourself to be held ransom by one app.

Credits to @TechWarn.com

Saturday, September 8, 2018

Samsung Galaxy Note 8 set for August?



[MUSIC] What's up? Brian Tong here and welcome to Googlicious for all the Google you can think of. The big drop this week is the official announcement of the OnePlus 5 phone. Now loaded with a snapdragon 835, 8 gigs of ram and a 16 megapixel dual camera this is going to get you the best bang for your buck on the market for a 480 to 540 dollar smart phone. Now it's evolved to a phone that looks ridiculously similar the iPhone from it's curbed edges, it's antenna line, and even a dual lens camera mic and flash setter in the same position. That is just more than a borrowing. Now there's no SD card slot. It's not waterproof, but it's specs and speed are top of the line. But you know what? It just feels like a tweener phone with some high-end specs but the lack of other features and an unoriginal design, but at that price, you know what? You might not care. They offered a code to get the OnePlus 5 right now in their live stream Stream announcement so if you want early access use the code Clearer Photos on their website. Okay Samsung is ramping up for another phone announcement of their own looking to wipe away last year's Note 7. Reuters reports the new Note 8 will be launched in New York City in the second half of August. And that lines up with Galaxy Note announcements from the past. Their source reports the Note 8 screen will be marginally larger, compared to the 6.2 inch display on the Note 7. And there will be dual, rear-facing cameras as well, to bring a 3x optical zoom with optical image stabilization. And a 12-megapixel, wide angle lens alongside a 13-megapixel telephoto lens. Other rumors include a top-of-the-line, Snapdragon 835 or Exynos 8895 Depending on market, but we'll wait until late August for the official details. And remember that Samsung voice assistant, Bixby? You know, the one that received a dedicated physical button for it on the Galaxy S8? It's still not here in the US months after the phone's release, but Samsung has opened up registration for US owners of the S8 and S8+ to receive early access to preview builds of the Bixby voice command interface. You'll just need your email linked to your Samsung account to sign up, and you can do that right now. [SOUND] And as virtual reality continues to grow, and content providers Are really still figuring out the best way to utilize it. The latest update for VR creators on YouTube will now incorporate heat maps for 360 degree and VR videos. Now videos with over 1,000 views will allow creators to see exactly what parts of the video are catching the viewer's attention. And how long they're looking at a specific part of the video. Let me guess it might be where the most action is happening. But there's still other inside to pull from this info. Now they're also launching their first ever VR intensive program. At YouTube space LA, called the VR Creator Lab with the applications open right now. And Google announced their job hunting search to [UNKNOWN] earlier this year. But now, Google for jobs is live. The feature is directly integrated into its search, so You could type something in like jobs near me or something like writing jobs. You can refine it down to full time jobs and search by industry. But once you've found the job posting you're looking for, it will direct you to the site to start that application process. And you know what? That's a Google. Okay, you know what, we like to end things on a high note. Are you on this fidget spinner craze? I'm not, but you know what? It doesn't mean I can't start. Thanks to the mind hive of Reddit, users have discovered Google search has a hidden, virtual fidget spinner. Just search for spinner and voila! Look, hold down your mouse and pull down for a fast spin or take it nice and slow. You can even change it to a number wheel if you'd like and change the wheel number size. Up to 20. And what's the point of this? Who cares? But I know at least half of you already went to check this out at home. And yes your welcome. All right that's gonna do it for this week. You can email me googlicious@cnet.com or tweet me @briantong. Thanks so much for watching and we'll catch you next time for some more of that Googilicious. [MUSIC] Googilicious.

Saturday, May 13, 2017

Global Ransomware Attack 2017: 5 Things To Know

GLOBAL RANSOMEWARE ATTACK

TECH-KNOW-HOW-RANSOMEWARE

The majority of the attacks targeted Russia, Ukraine and Taiwan. But the National Health Service in the United Kingdom and global firms such as Fedex also reported they had come under assault Friday. Experts suggested Saturday that the ransomware's progress had been halted, but new attacks could soon follow.

Cybersecurity experts have been working round the clock to try to halt a malware attack that is unprecedented in scale.

The ransomware's progress has been halted by the accidental discovery late Friday of a "kill switch" hidden within the code by a security researcher, said cybersecurity consultant David Kennedy, formerly of the US National Security Agency.

"The software has actually stopped spreading across the world," he told CNN.
"He actually probably saved lives by accident," Kennedy said, referring to the security researcher who discovered the kill switch.

The ransomware was designed to repeatedly contact an unregistered domain listed in its code. The security researcher -- who uses the Twitter handle @MalwareTechBlog -- registered that domain to collect the ransomware traffic for analysis and to track infections.

"Later we found out that the domain was supposed to be unregistered and the malware was counting on this, thus by registering it we inadvertently stopped any subsequent infections," @MalwareTechBlog told CNNTech. The security researcher has posted an online account of finding the kill switch.

However, a hacker could change the code to create a new variant and try the ransomware attack again.

Michael Gazeley, managing director of cybersecurity firm Network Box, told CNN that the danger is far from over and that a company's security patch on Saturday might not still work by Monday.

"A lot of people are going to go to work on Monday and click on a link in their mail -- completely oblivious that all of this is going on or have heard about it and think that it's over -- and suddenly wipe out their whole company," Gazeley said from Hong Kong.
TECH-KNOW-HOW-RANSOMEWARE

"IT managers need to be extremely aware that new variants of this ransomware attack are being launched almost hourly, so they can't just check that their computer systems are protected, then relax, assuming everything will stay that way," he said.

Cybersecurity firm Avast said it tracked more than 75,000 ransomware attacks in 99 countries Friday. That number is likely to go up, Gazeley said.

European police agency Europol said it was working to support countries, saying the malware attack was at an "unprecedented level and requires international investigation."
What is it?


The Network Box cybersecurity operations center in Hong Kong.
The ransomware, called WannaCrypt or WannaCry, locks down all the files on an infected computer and asks the computer's administrator to pay to regain control of them. The exploit was leaked last month as part of a trove of US National Security Agency spy tools.

The malware is spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March. But computers and networks that didn't update their systems remained at risk.

Those affected see a message on their computer screens demanding payment in the digital currency bitcoin to restore access. The initial demand was for $300 in bitcoins, but it now has gone up to $600 worth of the currency, Gazeley said. Fortune reported Thursday that the price of bitcoin was at an all-time high.

It's having a real-life impact
The cyberattack affected 16 organizations that are part of the National Health Service on Friday, causing some surgical procedures to be canceled and ambulances diverted. But the NHS said Saturday it does not have any evidence that patient data was breached.



Here's what you should do
In the wake of the attack, Microsoft said it had taken the "highly unusual step" of releasing a patch for computers running older operating systems, including Windows XP, Windows 8 and Windows Server 2003. Users should download the patch before clicking on any link in email. Consumers who have up-to-date software are protected from this ransomware. Here's how to turn automatic updates on. And


Outlined 5 Things :

1. Backup now and make regular backups as frequently as you can. Keep offline backups.
2: Run Windows update and ensure your computer stays up to date.
3: Antivirus must be kept up to date, and run a scan.
4: Install Malwarebytes Antimalware and run scans regularly.

5: Always be vigilant. Don't open email attachments unless you are 100% sure they are valid. Don't click popups on Websites.

If your computer has been affected, there's no guarantee that paying the ransom will restore it, Gazeley said. In past ransomware attacks, some victims have paid, only to find the key they are given doesn't work, while others have found their files are corrupted and can't be properly restored, he said.
Managers at many companies and other organizations have not taken steps to put proper cybersecurity systems in place despite talking about their importance, Gazeley said. "Most organizations just keep their heads in the sand," he said.

Who's behind the cyberattack?
No one has yet identified the culprit.
"We see all the finger-pointing at the usual suspects, saying it's probably people in Russia or China, but, to quote Sherlock Holmes, it's not really a good idea to guess without the evidence," Gazeley said. Bitcoin is set up to be untraceable, so investigators will struggle to follow a money trail, he said.
Nonetheless, authorities around the world will be seeking to track down those responsible.
"I think these hackers have to recognize that these authorities will come after them with a vengeance," Gazeley said.

It also may never be known how much the hackers have netted from the ransomware attack. Many firms are unlikely to want to reveal they fell victim to it and whether they paid up.
CNN's Selena Larson, Mariano Castillo and Jessica King contributed to this report.

Thursday, May 11, 2017

Facebook Reduce links To Low-Quality Sites

Tech-know-how


Facebook said it is working to understand which posts people consider misleading, sensational, and spammy so it can show fewer of them in feeds.

“We hear from our community that they’re disappointed when they click on a link that leads to a web page containing little substantive content and is covered in disruptive or malicious ads,” said Facebook.

To address this, Facebook is rolling out an update so people see fewer posts and ads in News Feed that link to low-quality pages.

“This update will help reduce the economic incentives of financially-motivated spammers.”

Facebook has reviewed hundreds of thousands of web pages to identify those which are culprits, and then used AI to find whether pages shared on Facebook have similar characteristics.

“If we determine a post might link to these low-quality web pages, it may show up lower in people’s feeds and may not be eligible to be an ad,” said Facebook.

Friday, May 5, 2017

GLO Has Reduce Their Data Plans (No More Awuff Data)

GLO  Has Review their Data Plans... 


 GLO Nigeria has review their data plans without informing their potential customers and for no reason or what so ever, or maybe recession has also hit our friendly data ISP. for you to continue enjoying the large data volume, you must subscribe before you exhaust the present data.

The new plan are as follows:

#1000 = 1.6GB 

#2000 = 3.75GB 

#2500 = 5GB 

#3000 = 6GB 

#4000 = 8GB 

#5000 = 12GB 


The customer care was call to confirm this review.
 Nigerians what is your view on this data review? 
Now Nigerians can not subscribe at their own convenience!!! 
GLO self don follow change!!


Monday, May 1, 2017

How They Catch Big Snakes in South Africa

i want to share this video here showing how South Africans catches snake, this is very funny and interesting. enjoy as you watch. you can sub to the video channel

Wednesday, March 29, 2017

Samsung's Sleek S8 with Facial Recognition Review

Samsung's Sleek S8 with Facial Recognition Review

tech_know_how

Samsung Electronics Co. knows it needs to get its new flagship smartphone right. Apart from making sure the gadget won't cause bodily harm, the company packed it with a plethora of new features: taller, curved screens, encrypted facial recognition, deeper display colors, system-wide voice control and the ability to turn into a desktop computer.

The Galaxy S8 comes in two sizes, a standard 5.8-inch display model and a Plus version with a 6.2-inch screen. Both are larger than the iPhone 7 and iPhone 7 Plus, the lineup's main competition until Apple Inc. rolls out its 10th-anniversary iPhone later this year. In line with smartphone trends, Samsung's new devices feature slimmer bezels alongside the display and are curved on all four corners. Pre-orders will begin soon after the unveiling, ahead of the S8's April 21 release. It comes in five colors:  midnight black, maple gold, coral blue, arctic silver and orchid gray.
The new Samsung Galaxy S8 and S8+ smartphones.

The S8 represents Samsung's biggest prospect for a turnaround after the Note 7 debacle last year. The bigger-sized smartphone debuted to positive reviews, only to be killed off after some units showed a tendency to catch fire and explode, forcing the South Korean manufacturer to yank the product off shelves. The crisis cost the company more than $6 billion and its global lead in smartphone sales. Samsung accounted for 17.8 percent of global smartphone sales in the last three months of 2016, slightly less than Apple, according to Gartner. While Samsung may be targeting Apple, it also faces challenges from up-and-coming rivals such as Huawei Technologies Co. and Oppo, especially in China, the world's biggest smartphone market.

"We must not only win back customers' trust, but also the high expectations that they have always held for Samsung," said Lee Young-hee, executive vice president of Samsung's mobile business. "We have put our utmost effort to provide customers with ne ar-perfect devices to earn back their trust."
Also casting a shadow over the S8's debut is the trial of Jay Y. Lee, the Samsung group's heir apparent and de facto chief, who was arrested on bribery and embezzlement charges stemming from a national influence-peddling scandal. He has denied any wrongdoing. Still, even with the Note 7  imbroglio and legal troubles, Samsung shares have been trading near record highs, thanks to a robust semiconductor business.

"With the new Galaxy S8, Samsung wants to restore its brand image back in the market as a technology leader after the Note 7 incident," said Jusy Hong, principal analyst for mobile devices at market researcher IHS Markit.

Samsung's corporate logo is now gone from the front of the device, making room for a taller, 18.5:9 ratio screen, which the company is calling the Infinity Display. The new dimensions mean the thin black bars that typically surround widescreen videos can be eliminated, making them look bigger when played. The home button, with vibrating feedback, is integrated into the bottom of the screen. On the software side, users can now clip specific apps to the top of the screen so that, for instance, they can compose emails while reading a web page. 

The S8 will also feature a digital assistant that studies its owner's activities to offer helpful tips and information, seeking to challenge Apple's Siri and Amazon.com Inc.'s Alexa. Called Bixby, Samsung's service can be activated via the phone's side button. The system has a few parts: one is a standard, Siri-like voice control view, another is a list view of upcoming calendar appointments and reminders. The feature is also integrated with the camera so that it can identify objects like buildings, or a particular bottle of wine. Users can operate many of the phone's functions via voice instead of the touchscreen.

While some previous Galaxy models let users unlock their device using a facial scanner, the S8 is the first Samsung phone to encrypt facial data. Combined with iris and fingerprint scanning, that can be used to offer more security for mobile banking and other sensitive applications.

Another new trick: the new Samsung phones can essentially become a full-blown desktop computer via a separately sold docking station called the DeX (an idea introduced by Motorola in 2011). The phone will add upgraded front and rear cameras, and continue to include wireless charging. The camera app will include built-in Snapchat-like stickers that can be placed over images.

Unsurprisingly, Samsung is touting the safety of the S8's battery, given that the cause of the Note 7 fires was due to faulty battery design. A Samsung television commercial released earlier this year shows engineers testing batteries by drilling a hole and apparently heating them in what the company called an "eight-point battery safety check." The company says the standard S8 model has a 3,000 mAh battery while the Plus version has a capacity of 3,500 mAh.

"Success isn't going to come overnight for the S8 and it'll be a while before consumers feel confident the phone has no problems like the Note 7," said Koo Chang-hwan, who researches corporate brands at Seoul-based Korea Reputation Center. "The biggest issue hobbling the company is still the trial of its fact to chief. That will overshadow the S8 and a single product may not be enough to put the risk surrounding the top executive behind."