SwiftKey’s typing predictions may have leaked users’ emails

SwiftKey, a popular keyboard app, has suspended a syncing feature that may have leaked users’ emails to strangers.The problem has been popping up through the app’s prediction bar. A few users on Reddit have noticed that it’s been offering strange suggestions -- including emails they’ve never seen and foreign language terms they’ve never used.“And now, I'm getting someone else's German predictions,” wrote one user, who recently rooted a Samsung Galaxy S6 phone. “I have never typed German in my entire life.”The problem might be related to how SwiftKey collects data on the words and phrases users type. That data is then analyzed and used to predict the customer’s typing habits, including what emails they tend to enter -- only in this case those predictions are possibly being shared to others.  To read this article in full or to leave a comment, please click here

SwiftKey’s typing predictions may have leaked users’ emails

SwiftKey, a popular keyboard app, has suspended a syncing feature that may have leaked users’ emails to strangers.The problem has been popping up through the app’s prediction bar. A few users on Reddit have noticed that it’s been offering strange suggestions -- including emails they’ve never seen and foreign language terms they’ve never used.“And now, I'm getting someone else's German predictions,” wrote one user, who recently rooted a Samsung Galaxy S6 phone. “I have never typed German in my entire life.”The problem might be related to how SwiftKey collects data on the words and phrases users type. That data is then analyzed and used to predict the customer’s typing habits, including what emails they tend to enter -- only in this case those predictions are possibly being shared to others.  To read this article in full or to leave a comment, please click here

RNC attendees expose identity in free Wi-Fi trap

So you go to a political convention. Do a little politicking and listen to some speeches. While taking a break from the handshaking and schmoozing you decide to do a little work on your laptop. Then you get hacked.During the Republican National Convention, IT security company Avast security set up fake Wi-Fi hotspots to see who would fall for their trick. As it turns out, a lot of people fell for it. Avast estimated more than 1,200 people logged into the fake hotspots, some with politically leaning names like "I VOTE TRUMP! FREE INTERNET," and "I VOTE HILLARY! FREE INTERNET," and some with an official ring to them like "Google Starbucks" and ATTWifi at GOP."To read this article in full or to leave a comment, please click here

RNC attendees expose identity in free Wi-Fi trap

So you go to a political convention. Do a little politicking and listen to some speeches. While taking a break from the handshaking and schmoozing you decide to do a little work on your laptop. Then you get hacked.During the Republican National Convention, IT security company Avast security set up fake Wi-Fi hotspots to see who would fall for their trick. As it turns out, a lot of people fell for it. Avast estimated more than 1,200 people logged into the fake hotspots, some with politically leaning names like "I VOTE TRUMP! FREE INTERNET," and "I VOTE HILLARY! FREE INTERNET," and some with an official ring to them like "Google Starbucks" and ATTWifi at GOP."To read this article in full or to leave a comment, please click here

U.S. IT employment grows, with IT services jobs leading the way

The U.S. IT sector added a total of 32,100 new jobs in June, according to an analysis of Bureau of Labor Statistics data by technology industry association CompTIA, and continues to grow at a faster rate than overall national employment. Indeed, every category except technology manufacturing, experienced positive job growth.INSIDER: Network jobs are hot: Salaries expected to rise in 2016 CIO.com talked to Tim Herbert, CompTIA’s senior vice president of research and market intelligence, about what this labor data reveals about the state of the domestic IT services market, digital transformation as employment driver, why automation is likely to have a greater impact on American IT jobs than offshoring, and how IT outsourcing job growth will significantly outpace corporate IT roles.To read this article in full or to leave a comment, please click here

ISP groups appeal net neutrality court defeat

Trade groups representing many U.S. ISPs have filed an appeal challenging a court ruling that upheld the Federal Communications Commission's net neutrality rules.Trade groups CTIA, USTelecom, the National Cable & Telecommunications Association, and the American Cable Association on Friday asked the U.S. Court of Appeals for the District of Columbia Circuit to rehear their challenge of the net neutrality rules after a three-judge panel upheld the rules in June. The challenge isn't to the FCC's rules prohibiting broadband providers from selectively blocking or slowing web traffic, but to the agency's reclassification of broadband as a regulated, common-carrier service, the NCTA wrote in a blog post.To read this article in full or to leave a comment, please click here

ISP groups appeal net neutrality court defeat

Trade groups representing many U.S. ISPs have filed an appeal challenging a court ruling that upheld the Federal Communications Commission's net neutrality rules.Trade groups CTIA, USTelecom, the National Cable & Telecommunications Association, and the American Cable Association on Friday asked the U.S. Court of Appeals for the District of Columbia Circuit to rehear their challenge of the net neutrality rules after a three-judge panel upheld the rules in June. The challenge isn't to the FCC's rules prohibiting broadband providers from selectively blocking or slowing web traffic, but to the agency's reclassification of broadband as a regulated, common-carrier service, the NCTA wrote in a blog post.To read this article in full or to leave a comment, please click here

Windows 10 upgrade: Don’t use Express settings if you value your privacy

When you’re setting up a new or existing PC with Windows 10, Microsoft will offer to install the operating system with "Express settings."Although Windows 10 Express settings will get you up and running quickly, that convenience comes at a cost: By skipping over custom settings, you’re agreeing to all kinds of data collection and behavior tracking, much of which didn’t apply in earlier versions of Windows.INSIDER Review: Enterprise guide to Windows 10 Here’s our advice: Instead of blindly enabling Express settings in Windows 10, take some time to understand what you’re agreeing to. Click the Customize settings link (in tiny text at the bottom of the setup screen), and disable the options you don't want.To read this article in full or to leave a comment, please click here

Service Discovery and Load balancing Internals in Docker 1.12

Docker 1.12 release has revamped its support for Service Discovery and Load balancing. Prior to 1.12 release, support for Service discovery and Load balancing was pretty primitive in Docker. In this blog, I have covered the internals of Service Discovery and Load balancing in Docker release 1.12. I will cover DNS based load balancing, VIP … Continue reading Service Discovery and Load balancing Internals in Docker 1.12

Stuff The Internet Says On Scalability For July 29th, 2016

Hey, it's HighScalability time:


Facial tats to disrupt big brother surveillance systems may actually work. Our future?

 

If you like this sort of Stuff then please support me on Patreon.
  • 40.4 million: iPhones sold this quarter;  7: number of times Facebook has avoided the IRS; 104: new exoplanets; 100: new brain regions found; 2x: HTTPS adoption; 

  • Quotable Quotes:
    • @mat: Apple is doomed: "the nearly $8 billion in profits this quarter is more than twice what Facebook made in 2015"
    • Bruce Schneier: The truth is that technology magnifies power in general, but the rates of adoption are different. The unorganized, the distributed, the marginal, the dissidents, the powerless, the criminal: they can make use of new technologies faster. And when those groups discovered the Internet, suddenly they had power. But when the already powerful big institutions finally figured out how to harness the Internet for their needs, they had more power to magnify. That’s the difference: the distributed were more nimble and were quicker to make use of their new power, while the institutional were slower but were able to use their power more effectively.
    • @mjasay: What AWS does for AMZN: $2.89B in revenue Continue reading

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks.The Trojan app is called SpyNote and allows hackers to steal users' messages and contacts, listen in on their calls, record audio using the device's built-in microphone, control the device camera, make rogue calls and more.According to researchers from Palo Alto Networks, SpyNote does not require root access to a device, but does prompt users for a long list of permissions on installation. The Trojan can also update itself and install other rogue applications on the device.To read this article in full or to leave a comment, please click here

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks.The Trojan app is called SpyNote and allows hackers to steal users' messages and contacts, listen in on their calls, record audio using the device's built-in microphone, control the device camera, make rogue calls and more.According to researchers from Palo Alto Networks, SpyNote does not require root access to a device, but does prompt users for a long list of permissions on installation. The Trojan can also update itself and install other rogue applications on the device.To read this article in full or to leave a comment, please click here

Telco central offices could be in for open source makeover

A first-of-its-kind gathering dedicated to re-inventing telco central offices as open source-infused data centers will take place on Friday at Google's Sunnyvale Tech Campus. CORD The CORD Summit, hosted by the Open Networking Lab (On.Lab) and The Linux Foundation, promotes the use of technologies such as Network Functions Virtualization (NFV), software-defined networking (SDN) and the cloud "to bring datacenter economics and cloud agility to service providers' Central Office." CORD is kind of an acronym for Central Office Re-architected as a Datacenter, and is designed to benefit enterprise, residential and wireless networks. A mini version of this event was held in March as part of the broader Open Networking Summit.To read this article in full or to leave a comment, please click here

Telco central offices could be in for open source makeover

A first-of-its-kind gathering dedicated to re-inventing telco central offices as open source-infused data centers will take place on Friday at Google's Sunnyvale Tech Campus. CORD The CORD Summit, hosted by the Open Networking Lab (On.Lab) and The Linux Foundation, promotes the use of technologies such as Network Functions Virtualization (NFV), software-defined networking (SDN) and the cloud "to bring datacenter economics and cloud agility to service providers' Central Office." CORD is kind of an acronym for Central Office Re-architected as a Datacenter, and is designed to benefit enterprise, residential and wireless networks. A mini version of this event was held in March as part of the broader Open Networking Summit.To read this article in full or to leave a comment, please click here

Telco central offices could be in for open source makeover

A first-of-its-kind gathering dedicated to re-inventing telco central offices as open source-infused data centers will take place on Friday at Google's Sunnyvale Tech Campus. CORD The CORD Summit, hosted by the Open Networking Lab (On.Lab) and The Linux Foundation, promotes the use of technologies such as Network Functions Virtualization (NFV), software-defined networking (SDN) and the cloud "to bring datacenter economics and cloud agility to service providers' Central Office." CORD is kind of an acronym for Central Office Re-architected as a Datacenter, and is designed to benefit enterprise, residential and wireless networks. A mini version of this event was held in March as part of the broader Open Networking Summit.To read this article in full or to leave a comment, please click here