Friday, July 31, 2015

Windows 10 – is now available as a free upgrade – Orebro Tribune

Microsoft Corp. announced that Windows 10 is now available as a free upgrade for existing users or new PCs and tablets.

Windows 10 includes innovations and news as Cortana, an Xbox app and the new browser, Microsoft Edge, for a simple, personalized and more productive experience.

Windows 10, the most secure Windows ever, and delivered as a service that automatically keeps itself updated with the latest innovations and security updates.

Windows 10 provides users with a unified experience of the operating system and will be available over a range of devices including PCs, tablets, phones, Raspberry Pi, the Xbox One, HoloLens others – and has already been tested on over 2000 devices and configurations.

Microsoft also announced a new Windows Store and the Windows Software Development Kit (SDK) is available from Wednesday, July 29, opening the door to innovative new app experiences on Windows 10.

The launch of Windows 10 is celebrated together with people from all over the world and it held special celebrations in 13 countries, while initiating a year-long initiative to honor individuals and organizations that make a difference in the world.

Microsoft urges people to engage around to upgrading to Windows 10 by sharing how they want to change the world in the hashtag #UpgradeYourWorld .

Microsoft also invites his fans to vote for the global nonprofit organization they like to receive a donation from Microsoft in connection with the launch. By tag #UpgradeYourWorld and #Vote on Instagram, Facebook or Twitter.

More information #UpgradeYourWorld initiative is http://www.windows.com/upgradeyourworld

“A new era of Windows begins today. From the outset, Windows 10 was unique – by being built up from feedback from over 5 million users by, delivered as a service instead of a license, and by being offered as a free upgrade, “said Terry Myerson, Executive Vice President Windows and Devices Group at Microsoft.

“Windows 10 builds on our vision of a more personalized technology experience, with a natural, mobile and secure feeling throughout.

Together with our partners, we are pleased to present the best Windows ever. A Windows that will give people and organizations around the world the tools to create, change and do incredible things. “, Said Terry Myerson.

Windows 10 – The best Windows ever
Windows 10 is fast, simple and easy to use – the Windows 10 Start menu, back and Live Panels (Live Tiles) makes it easy for the user to get information about what is important.

Windows 10 is the most secure Windows that Microsoft has ever released. Improvements in Windows Defender and SmartScreen helps users protect themselves against viruses, malware and phishing. And innovations like the new Microsoft hello [3], making it possible to log on to their device quickly, safely and password freely.

With Windows 10 it is also easy to keep their PC, tablet and phone updated with the latest version, as updates are free of charge and takes place automatically during the entire life of the unit.

Windows 10 is more personal and helps you be more productive – by voice, pen and recognition of gestures – for a more natural interaction between the user and the PC. Windows 10 is designed to work perfectly with Office and Skype and makes it possible to quickly switch between applications and programs. Snap and Task View makes it easy to stay organized.

Windows 10 offers the user many new and innovative technology experiences.
Cortana – A personal digital assistant that makes it easy to search and find the right information at the right time.

Microsoft Edge – a new browser that quickly and easily lets you browse, read, select and share things from the web.

Xbox app – an integrated Xbox app delivers the Xbox experience to Windows 10 – that makes it possible to work together with friends to play games on the Xbox and Windows 10 devices.

The Continuum optimizes applications and user experience between the touch and the desktop.
Built-in apps including Photos, Maps, Microsoft new music app, Groove and Movies & amp; TV offering entertainment. With OneDrive files can be easily shared and kept up to date on all your devices.

Microsoft Phone Companion app (Phone Assistant) – allows iPhone, Android and Windows phones work seamlessly with other Windows 10 devices.

Completely new Office Mobile apps for tablets with Windows 10 is from today available through the Windows Store. [4] The apps are designed for you to work where you are, even on the move. Programs such as Word, Excel and PowerPoint provides a consistent experience with touch functions. And with OneNote app pre-installed on Windows 10, it’s easy to take notes on the go. With the upcoming release of Office (Office 2016), we provide our largest set of applications and features to create professional content such as text and presentations. Built for accuracy with keyboard and mouse, and optimized for notebook PCs, 2-in-1 Surface Pro 3, and devices with large screen.

Start – Start Menu and Taskbar lets you quickly access the tools and programs you need. They also feels fast again and are easy to understand whether you are upgrading from Windows 7 or Windows 8th

Windows 10 – the best platform for business
Feedback from millions IT professionals have shaped windows 10, our hardest so far tested version of Windows ever. Windows 10 will be ready for use by companies and their employees and will help companies protect themselves against modern cyber attacks, delivering an experience of technology that employees will love, while Windows 10 enables new innovations with a platform that keeps the company updated with the latest technology.

Companies will also have the ability to control how often they receive updates and customize the features that are right for different groups of employees.

Windows 10 has built-in security of the highest class that make it is possible for companies to replace passwords with more secure solutions to protect corporate data and corporate identities, and just run the software they rely on.

The new management and deployment tool also makes it possible for companies to reduce costs, and operate its business with the strength of Microsoft’s cloud platform Microsoft Azure.

new apps in Windows 10
Microsoft’s new Windows Store will open on Wednesday in connection with the release of Windows 10 and have already begun to accept new apps developed for Windows 10. Windows Store collects all the popular free and paid apps, games, movies, TV programs and the latest music, the one place that works on all devices running Windows 10th

All content in the Windows Store is certified by Microsoft to keep the user’s PC, tablet and other devices secure. Windows Store also previously apps for Windows 8.1, such as Netflix, Mint.com, Flipboard, The Weather Channel and “Asphalt 8: Airborne”. In the Windows Store offers a constant stream of new and updated Universal Windows apps such as: Twitter, “Minecraft: Windows 10 Edition beta”, Hulu, iHeartRadio, USA TODAY, “Candy Crush Saga” and soon WeChat, QQ and many more [5].

Easy to upgrade, now available
Upgrading to Windows 10 is easy for users who currently have Windows 7 or Windows 8.1 on their PC or tablet . Starting Wednesday, July 29, those who reserved their upgrade to Windows 10. To be notified when their upgrade is ready to be installed, which will be done gradually starting on launch day.

For business there Windows 10 ready to begin the upgrade, and starting August 1, organizations that have volume licensing begin to upgrade their devices to Windows 10 Enterprise and Windows 10 Education.

Our partners in retail is now ready to help people upgrade to Windows 10, which is possible with nearly 100,000 trained dealers and tens of thousands of stores around the world. Our upgrade program is available from the 29th of July and the software for Windows 10 will be generally available in the shops from mid-August to September worldwide.

Devices that are already running Windows 10 will be available in some stores the 29 July, but many more will be delivered to stores in the coming weeks and months.

We have also worked closely with our dealers to introduce utility that helps users to upgrade their Windows 7 or Windows 8.1 to Windows 10. This means there are at retailers such as – Best Buy, Bic Camera, Croma, Currys / PC World, Darty, Elkjøp, Fnac, Jarrir, Incredible Connection, Media Markt, Staples, Yamada Denki, Yodobashi, and many more.

LikeTweet

Tuesday, July 28, 2015

Problems with Router settings (novice) – PC for All

Hello

I’ve just bought a new laptop which I so far am very pleased with.

The problem is that when I connect it to my router (D-Link Dir605L) stops Internet on my iPad to work. I can still find and connect to the network but gets no internet.

Internet connected both my iPhone and my new laptop still works.

Have had similar problems with my Xbox past but have seen to play Xbox when no one else is using the Internet.

Have tried to change a variety of things in the router settings but are not completely familiar with it.

Anyone have a clue how I solve this?

Thanks for your time!

Best wishes


LikeTweet

1.4 million called in after hacker attack – Aftonbladet

The fear of more hacker attacks became too great.

Therefore recall now Fiat Chrysler 1.4 million cars to prevent similar attacks in the future.

Models affected include the Dodge Ram, Durango and Jeep Cherokee from 2013 onwards.

Last week we saw how two security researchers managed to control of a Jeep Cherokee. It managed to hack the car so much that the driver could not use the brakes.

Now, forced Chrysler to recall 1.4 million vehicles globally to prevent similar attacks on the Uconnect system.

According to US traffic safety authority, NHTSA, is the first time that concerns over cyber security has led to a recall.

rolled into a ditch

The whole thing was blown up at the end of last week when security researchers Charlie Miller and Chris Valasek showed the world how vulnerable the cars connected infotainment systems could be.

In a video magazine Wired published illustrating the researchers how it can stop when hacking into a Jeep Cherokee, sitting over a mil away from the vehicle.

The hackers go in and remotely control the entire car while the driver sits helplessly behind the wheel and could not do anything when his car rolled straight down in a ditch.

threatened to leak the software

This is not the first time that security researchers highlights the problem of modern vehicles. About two years ago the attempt of a rear seat of the car models Ford Escape and Toyota Prius.

Miller Valasek has worked together with Fiat Chrysler since the month of October to give the company time to plug the vulnerability.

The two experts were not satisfied with Chrysler’s way of handling the situation, and then went out and threatened to leak the software on security exhibition “Black Hat” in Las Vegas.

boosted Fiat Chrysler

It turned out to boost the car giant who decided to recall 1.4 million cars. The models affected are the Dodge Challenger, Viper, Jeep Grand Cherokee, Jeep Cherokee, Chrysler 200 and 300, most pickup models, the Dodge Charger and the Dodge Durango. There are cars of recent model years that that has a 8.4-inch touchscreen with Chrysler’s Uconnect system.

LikeTweet

Monday, July 27, 2015

1.4 million called in after hacker attack | Car | Aftonbladet – Aftonbladet

The fear of more hacker attacks became too great.

Therefore recall now Fiat Chrysler 1.4 million cars to prevent similar attacks in the future.

Swedish car owners to Chrysler and Jeep affected by the recall and will have to get a new software to their cars.

Last week we saw how two security researchers managed to take control of a Jeep Cherokee. It managed to hack the car so much that the driver could not use the brakes.

Now, forced Chrysler to recall 1.4 million vehicles globally to prevent similar attacks on the Uconnect system.

According to the US traffic safety authority, NHTSA, is the first time that concerns over cyber security has led to a recall.



rolled into a ditch

The whole thing was blown at the end of last week when security researchers Charlie Miller and Chris Valasek showed the world how vulnerable the cars connected infotainment systems could be.

In a video magazine Wired published illustrating the researchers how it can stop when hacking into a Jeep Cherokee, sitting over a mil from the vehicle.

The hackers go in and remotely control the entire car while the driver sits helplessly behind the wheel and could not do anything when his car rolled straight down in a ditch.



threatened to leak the software

This is not the first time that security researchers highlights the problem of modern vehicles. About two years ago the attempt of a rear seat of the car models Ford Escape and Toyota Prius.

Miller Valasek has worked together with Fiat Chrysler since the month of October to give the company time to plug the vulnerability.

The two experts were not satisfied with Chrysler’s way of handling the situation, and then went out and threatened to leak the software on security exhibition “Black Hat” in Las Vegas.

boosted Fiat Chrysler

It turned out to boost the car giant who decided to recall 1.4 million cars. The models affected are the Dodge Challenger, Viper, Jeep Grand Cherokee, Jeep Cherokee, Chrysler 200 and 300, most pickup models, the Dodge Charger and the Dodge Durango. There are cars of recent model years that that has a 8.4-inch touchscreen with Chrysler’s Uconnect system.

Swedish car owners to Chrysler and Jeep affected by the recall and will have to get new software. How many car owners to get their cars corrected is not yet known.

Here is the Aftonbladet Bil’s new Facebook page, look in for more automotive news. Note External link.

LikeTweet

Sunday, July 26, 2015

Take nationally grasp of IT in health care “| SvD – Swedish Dagbladet

Sarah Jevrem, Magnus Nordlund and Petter Trillkott. Photo: Private

A fundamental weakness in the current systems is that data is stored in a proprietary format.

Poorly functioning IT systems are since many years a source of despair by health professionals at all levels. Ease and efficiency are conspicuous by their absence. Many counties have stitched together a patchwork of systems that require multiple separate logins and multiple searches to find adequate information and perform administrative measures for the same patient. When we showcase our IT systems in stark use of officers with no previous experience of the user side of the systems we are met by a combination of disbelief and discouragement.

The health professionals are forced to spend more and more time the keyboard means that you get less space for the purpose of medical care – to take care of our patients. Ten years ago, you could as doctor on call in the emergency room to spend most of their time with patients, and only a small part of the administration. Nowadays, it’s the other way around.

After many years has now been at management realized how bad it was addressed and decided to build new systems from scratch. For instance, Region Skåne, Stockholm County Council and Region Västra Götaland initiated a collaboration to jointly prepare the acquisition of a new process core and common system.

The problem is that thus only provide more modern system, with basically the same restrictions the old ones.

A fundamental weakness of the current systems is that data is stored in a proprietary format. This means that it is locked to a certain system and a particular supplier. Data can only with great inconvenience and high costs migrated to a competing system. In this way there is virtually no effective competition once you started using his system.

Another limitation is that the caregiver in the current state stores its own data on your own servers.

When it during a consultation, it appears that the patient previously been treated or diagnosed with a condition of relevance in the current situation it is impossible to obtain real-time examination findings or journal data from another health care provider. This means that the consultation will not be as effective for the patient could be the case.

The solution to these problems would be to create a national database with data in ickeproprietärt standard formats.

Each citizen would which have their own catalog of medical record data, x-ray laboratory values ​​and so on. It would mean that the information is available wherever it benefits the patient.

If you become acutely ill outside the residence, data can be relevant for the treatment of the current state, the old ECG, X-rays and so on quickly obtained. The health center could get a better handle on what actually occurred when the patient was hospitalized. Hospital doctor who is considering offering an elective surgery would be able to quickly see how the patient’s lung function actually been at the controls at the health center.

Through that all relevant information is available, where the patient is raising the quality and safety of care.

Questions regarding medical record confidentiality is naturally present in such a context. In the current situation where healthcare providers access to their own medical records and who is active in the current treatment have the right to read it. These fundamentals could persist, but the patient could provide a new caregiver temporary access to certain information in order to improve the care.

Another obvious profits is that the health authority has full control over their own data and can freely choose the software to manage it. Different suppliers would then have to compete to deliver efficient and affordable software to present and write the current data. If users are not satisfied with the way the medical record information system work, a competing system run in parallel and you can then choose the best. This would of course put pressure on the industry to improve its products.

In this way we would get a future-proof system that ensures that all relevant information about a patient becomes available when needed. We would ensure flexibility in the systems and functioning competition in the industry.

To allow county councils continued to operate their own solutions according to the same principles as before would mean another lost decade. Time for the Ministry of Social Affairs to step into the path?

Sarah Jevrem

The specialist anesthesia clinic, Chairman North Bay läkarförening

Magnus Nordlund

Physician orthopedics, clinic representative North Bay läkarförening

Petter Trillkott

ST-doctors surgery, the former IT consultant with a focus on information and network security

All the NU Hospital, Uddevalla Hospital-North Älvsborg County Hospital

LikeTweet

Saturday, July 25, 2015

Hackers crashed the car several kilometers – Aftonbladet

Hackers took control and crashed a car for kilometers around.

Hundreds of thousands of cars are at risk.

– This could go really bad. It might not happen in real life, but it is terrible that it can be done, says computer security expert Anders Nilsson.

A bunch of hackers have proven that it is possible to take control of a car as much as 15 kilometers. From the sofa, they could through their mobile phone or computer, turn off the brakes as the car drove straight into the ditch.

– I do not think this is the last time we see this happening.



“more vulnerable”

There was security researchers Charlie Miller and Chris Valasek who showed what they can do on public roads in Missouri, United States.

The car that was chopped was a Jeep Cherokee , manufactured by Fiat Chrysler. Now, warn security experts that there is a risk that more than more than 470 000 cars by the manufacturers can be hacked.

But according to computer security expert Anders Nilsson can even more be at risk.

– You know not how many other car models that use the same software. My guess is that there are more people who are vulnerable, but that one just does not know it yet, he said.



Hands with IP address

The car used the software Uconnect built into several hundreds of thousands of cars by the manufacturer since 2013. The software controls the entertainment system, which among other things manages navigation, making phone calls and allows the owner to remotely start the car.

The only thing they need to get in the car’s ip address.

– If your car is going to open up, lock up, or to find via mobile phone, the connection to the Internet. It also means that someone else can take over, and in the worst case also do other things, he says.



made similar attacks

After the hackers contacted Fiat Chrysler, they now have updated their system. But it requires the user to download the update on a USB and install it yourself.

“This update may not sound very important, but trust me, if you can, you should really install it,” writes Charlie Miller on Twitter.

Fiat Chrysler responds in a public statement that they “appreciate the contributions of cyber proponents to increase the industry’s understanding of potential vulnerabilities.” However, they recommend that “in the pursuit of improved public safety not in fact endanger public security”.

– I also think it would have been better to do it here on perhaps a parking lot instead of a public Highway, says Anders Nilsson.

Security researchers have also carried out similar attacks against the Toyota Prius and Ford Escape.

LikeTweet

Wednesday, July 22, 2015

Hackers crashed the car several kilometers | News | Aftonbladet – Aftonbladet

Hackers took control and crashed a car for kilometers around.

Hundreds of thousands of cars are at risk.

– This could go really bad. It might not happen in real life, but it is terrible that it can be done, says computer security expert Anders Nilsson.

A bunch of hackers have proven that it is possible to take control of a car as much as 15 kilometers. From the sofa, they could through their mobile phone or computer, turn off the brakes as the car drove straight into the ditch.

– I do not think this is the last time we see this happening.



“more vulnerable”

There was security researchers Charlie Miller and Chris Valasek who showed what they can do on public roads in Missouri, United States.

The car that was chopped was a Jeep Cherokee , manufactured by Fiat Chrysler. Now, warn security experts that there is a risk that more than more than 470 000 cars by the manufacturers can be hacked.

But according to computer security expert Anders Nilsson can even more be at risk.

– You know not how many other car models that use the same software. My guess is that there are more people who are vulnerable, but that one just does not know it yet, he said.



Hands with IP address

The car used the software Uconnect built into several hundreds of thousands of cars by the manufacturer since 2013. The software controls the entertainment system, which among other things manages navigation, making phone calls and allows the owner to remotely start the car.

The only thing they need to get in the car’s ip address.

– If your car is going to open up, lock up, or to find via mobile phone, the connection to the Internet. It also means that someone else can take over, and in the worst case also do other things, he says.



made similar attacks

After the hackers contacted Fiat Chrysler, they now have updated their system. But it requires the user to download the update on a USB and install it yourself.

“This update may not sound very important, but trust me, if you can, you should really install it,” writes Charlie Miller on Twitter.

Fiat Chrysler responds in a public statement that they “appreciate the contributions of cyber proponents to increase the industry’s understanding of potential vulnerabilities.” However, they recommend that “in the pursuit of improved public safety not in fact endanger public security”.

– I also think it would have been better to do it here on perhaps a parking lot instead of a public Highway, says Anders Nilsson.

Security researchers have also carried out similar attacks against the Toyota Prius and Ford Escape.

LikeTweet

Hackers remote ruled the car in the ditch – DN.SE – Today’s News

     
     
     
 
 
     
 


 
     

         
 

     IT expert Chris Valasek p & amp; # 229; Bilm & amp; # 228; Ssan in Los Angeles in H & amp; # 246; stasis. He and colleague  Charlie Miller & amp; # 228; n a g & amp; # 229; ng shown the s & amp; # 229; PORTABLE modern cars & amp; # 228; r f & amp; # 246; r hacker attacks.


         
         IT expert Chris Valasek at the auto show in Los Angeles last fall. He and colleague Charlie Miller has once again demonstrated how vulnerable modern cars are for hacker attacks.
     


     
 

 
     

     
     
     
     

         

                     

The driver sat helpless at the wheel and could not do anything. His Jeep Cherokee rolled into the ditch, guided by two hackers. The experiment, carried out on a parking, puts the spotlight on how vulnerable modern, connected cars.


                     
                 

         
 
         
         

             
                 
                 
                 

                     

 

The driver sat helpless at the wheel and could not do anything. His Jeep Cherokee rolled into the ditch, guided by two hackers. The experiment, carried out on a parking, puts the spotlight on how vulnerable modern, connected cars.

The US technology magazine Wired that allowed the two IT experts Chris Valasek and Charlie Miller demonstrate how they managed to hack into Fiat Chrysler Uconnect software. The magazine’s reporter was on the road including experience how the climate system, windshield wipers and radio remote ruled.

On a parking lot completed demonstration: The brakes disconnected and the car was guided into the ditch.

 
        
             
     
     
 

It is not the first time the two hackers pointed out the danger of modern cars. Two years ago made experiments with the Toyota Prius and Ford Escape. But when they sat in the back seat, with their computers connected to the car’s diagnostic socket. This time they sat over a mil away.

Miller Valasek has collaborated with Fiat Chrysler since October, to give the company time to plug the vulnerability. But to further put pressure on the automaker, they announced that they intend to publish the code they used in connection with a security conference in Las Vegas in early August.

This means that those who have not updated their software is vulnerable attack from someone who had come across the vehicle’s IP address.

 


                     

                
Correction 2015-07-22 11:21
Earlier it said in the article that the code would be published at a motor show. It is not true, the right should be that it is at the security conference Black Hat.

         

         
         
     
 
         
         
 
 
 
 
 
 
         
     

LikeTweet

Nokia a blow for Microsoft | Svenska Dagbladet – Swedish Dagbladet

Photo: Jeff Chiu / AP Photo

just over a year since Microsoft bought the Finnish Nokia’s phone business. Microsoft is a giant in the software with Windows and Office.

Nokia had great success with their phones in the 1990s and the first years after the turn of the century. Then came the smart phones and Nokia ended up in the back water. Therefore, it attracted attention when Microsoft bought Nokia phones 2014.

Now forced Microsoft write down the value of the phones by 8.4 billion dollars, equivalent to about 68 billion. According to news agency AP impairment loss was expected after Microsoft two weeks ago announced that it will reduce its workforce by 7,800 people.

Microsoft reported a net loss for the latest quarter at 3.20 billion dollars, equivalent to more than 25 billion. That compares with a profit of 4.61 billion dollars, equivalent to about 35 billion, a year earlier.

LikeTweet

Tuesday, July 21, 2015

Hackers remote ruled the car in the ditch | Västerbotten Courier – Vasterbotten Courier

The driver sat helpless at the wheel and could not do anything. His Jeep Cherokee rolled into the ditch, guided by two hackers. The experiment, carried out on a parking, puts the spotlight on how vulnerable modern, connected cars.

The US technology magazine Wired that allowed the two IT experts Chris Valasek and Charlie Miller demonstrate how they managed to hack into Fiat Chrysler Uconnect software. The magazine’s reporter was on the road including experience how the climate system, windshield wipers and radio remote ruled.

On a parking lot completed demonstration: The brakes disconnected and the car was guided into the ditch.

It is not the first time the two hackers mentioned the risk of modern cars. Two years ago made experiments with the Toyota Prius and Ford Escape. But when they sat in the back seat, with their computers connected to the car’s diagnostic socket. This time they sat over a mil away.

Miller Valasek has collaborated with Fiat Chrysler since October, to give the company time to plug the vulnerability. But to further put pressure on the automaker, they announced that they intend to publish the code they used on a motor show in Las Vegas in early August.

This means that those who have not updated their software is vulnerable to attack from someone who had come across the vehicle’s IP address.

LikeTweet

Hackers remote ruled the car in the ditch – Helsingborgs Dagblad – Helsingborgs Dagblad

This is not the first time the two hackers pointed out the danger of modern cars. Two years ago made experiments with the Toyota Prius and Ford Escape. But when they sat in the back seat, with their computers connected to the car’s diagnostic socket. This time they sat over a mil away.

Miller Valasek has collaborated with Fiat Chrysler since October, to give the company time to plug the vulnerability. But to further put pressure on the automaker, they announced that they intend to publish the code they used on a motor show in Las Vegas in early August.

This means that those who have not updated their software is vulnerable to attack from someone who had come across the vehicle’s IP address.

LikeTweet

Hackers have tired – releasing the code to the remote control Jeep Cherokee – Auto … – Auto Motor & Sport

For years, computer experts Charlie Miller and Chris Valasek warned the automotive industry for their cars to be cut. A sufficiently skilled “hacker” can get into cars’ computer systems and wireless remote control functions such as steering, braking and transmission. Now it is over to the warnings, Miller and Valasek think outsource software code online to show how unprotected today’s cars are.



Hackers have tr & # xF6; ttnat & # x2013; sl & # XE4; pper code f & # xF6; r to f & # XE4; rrstyra Jeep Cherokee
Imagine you drive in town and the brakes do not work, the gas is pushed into the ground and then turns the wheel by itself … Nothing fun, but quite possible today!

It is the US Wired magazine who interviewed computer experts Charlie Miller and Chris Valasek and got a hands-on demonstration of how bad the security is of modern cars. First on the road, where the reporter suddenly ice cold air from the AC, windshield washer started and then locked the automatic gearbox in neutral and the car rolled helplessly to the side.

On a parking lot could then Charlie Miller and Chris Valasek show the most dangerous ways to remotely control a car. Again, the reporter sat helpless when the wheel was turned out of his hand and the brakes disconnected. As you look at the car drove the car to the parking lot and down in a ditch, an unpleasant picture of what can happen.

Two years ago showed Miller Valasek how the relatively simple could control the functions of a Toyota Prius and Ford Escape. That time they took into via car diagnostic socket. The reaction from Ford and Toyota were not what they were hoping for, automakers dismissed the demonstration and protested that their cars were safe for hacker attacks.

That is not the warnings were taken seriously inspired Charlie Miller and Chris Valasek to go even deeper into in today’s modern cars and their increasingly frequent connections to the Internet. For a computer hacker is the network port that is the way into a computer and there are lots of ways to trick firewalls and virus software.

In the US Chrysler brands “Uconnect Systems” for To connect to the cars wirelessly to the Internet via the mobile network. It rolls today nearly half a million cars from Chrysler with Uconnect and there is a method of using a cellular phone find cars IP number, a so-called “personal” for each device connected to the Internet.


  

Charlie Miller (left) and Chris Valasek has worked for years trying to get the auto industry to take the threats seriously . Now think of publishing software code to put pressure on Chrysler to really improve security.

  

The vulnerability that Miller Valasek found at Uconnect thought the first would only exist within the car’s wifi reach, since they believed that it would be limited to the same mobile phone mast. But they discovered that Chrysler Cars IP number can be traced up anywhere in North America where there is mobile coverage. “When we were terrified.” says Charlie Miller and Chris Valasek Wired, “it is pure dream location for hackers.”

During the nine months the two computer experts collaborated with Chrysler to clog the escape hatch. There is now an upgraded software but it must be installed physically in each car, which means that many car owners will not do it.

Charlie Miller Chris Valasek is not satisfied with this but believes that car makers must fully take responsibility for their vehicles so they can be remotely controlled by hackers. To really put pressure on Chrysler thinks they publish the code on the security exhibition “Black Hat” in Las Vegas in early August.

“The automotive industry has been thought that this kind of program and threats never become a reality,” says the professor, security expert Stefan Savage at Wired. “But that time is over now.”

Another security expert, Josh Corman, tells Wired that the automotive industry must not make the same mistakes that the computer business did. Where banned and chased it all the hackers with police assistance for 15-20 years before it was realized that cooperation was the right path. Best way to secure computer systems is that in the pre-letting hackers to test them and clog the deficiencies before products come out to the consumer.

What do you think readers? Do you feel insecure and should auto industry hiring hackers to improve safety?

Hack into Tesla Model S and the disappearance of 70,000 SEK

   

Keep up to date with the newsletter!

I feel insecure, shredded cars will lead to more thefts and other concerns.

 
 
 
 
 

LikeTweet

WikiLeaks: Thailand intercepting cell phones – News (echo) | Radio Sweden – Swedish Radio

In Thailand, it has been revealed that the Thai police and the military bought the software for millions of dollars to secretly have the ability to monitor mobile phones and computers. The revelation came in connection with Wikileaks released over a million emails and documents between an Italian company and the military and police.

In the documents that WikiLeaks has come over and now the newspaper the Bangkok Post has noted, we read that the Thai police and the military during the years 2013 and 2014 purchased the software to be able to listen to the call by mobile phone, reading text messages sent, and the computers to read including e-mail and to copy the contents of hard drives.

The price to be paid software is almost six million. In the documents it says among other things that the military explicitly want to use the opportunity to eavesdrop on ordinary people’s mobile phones and computers to “support our operations and missions.”

The last known purchase of the software was done in December 2013 and, according to the documents approved by the then Supreme Commander Genaral Prayut Chan-O-Cha, now Prime Minister of Thailand after the military coup in May 2014.

Neither the Prime Minister or military spokesperson would comment on the findings but said that the government has the law on his side, because you have the right to intercept individuals, after a court decision if it is suspected plans of terrorist offenses or other activity that could harm the country. While revelation comes so keeping the Thai government to push through a new law that radically increases the authorities’ capacity to electronic monitoring.

The National människorättskommisionären in Thailand Niran Pitakwatchara says to the Bangkok Post of the revelations and the proposed law that “It is a violation of democratic principles, which the state has no right to threaten individual privacy”, and that it is an abuse of power. “

In documents WikiLeaks has published so use other than Thailand also Vietnam and Singapore the software to monitor their citizens.

LikeTweet

Monday, July 20, 2015

Breakit – Antique-starting lineup Auctionet doubles sales – aiming for Germany – Breakit (press release)

This spring, it was clear that the online auction site Auctionet brought in SEK 25 million in venture capital from, among other things, the owners of the retail giant Otto Group and the venture capital company D Ax.

The money will now be used to expand Germany.

According to the company’s CEO and founder Niklas Söderholm, the German initiative, which began last year, weighed on the company’s earnings. Auctionnet made in 2014 an operating loss of 6.8 million.

“The result is that we are expanding. In the Swedish market, we earned 2.5 million crowns, “says Niklas Söderholm, who previously co-founded the auction house Bukowskis Market.

Auctionet founded by Niklas Söderholm 2011 along with a bunch of colleagues who dropped out of the auction house Bukowskis . Among the partners are also Jonas Nordlander and Filip Engelbert who started the Russian block-copy Avito.

The company’s business model is based on the auction can connect to Auctionets platform to sell antiques and gadgets via the site. In Sweden, the company managed to become the biggest selling so-called everyday activities – often less valuable things from the estates.

Last year Auctionet increased its turnover from 10.5 million in 2013 to 16.3 million.

“We will grow in this speed, while we were actually a little doped last year. Then we had a nonrecurring item of software that we had sold. So really it’s almost exactly 100 percent growth, “says Niklas Söderholm.

” Because the German market is quite close to the Swedish. Germans like Swedish objects and Swedes like German, so there is consistency in the taste of the subject. It facilitates. Since the German market is also extremely large, eight to ten times as large as the Swedish. “

” I would say it’s mixed. One sees that the German in general are more careful than the Swede. Here at home, we throw ourselves probably quite a lot with that, ‘Oh well, this one can shop’ – and so do men put to. You trust the site and to test forward, while the Germans are very much more cautious and want to ensure that everything is as it should be. “

” There is a higher threshold, but once they begin shopping , then cut orders twice as high as the Swedes. And last week sajnade the three auction houses, so it starts to take off. “

In addition to the Axel Johnson Group (major owner behind the Hemköp and Willys) venture capital company D Ax also joined the investment firm Recapex and the family that owns the Otto Group to the ownership ranks in the spring.

The Otto Group is the world’s largest mail order group and owns a variety of companies in the retail, based in particular Germany and France.

LikeTweet

Sunday, July 19, 2015

Mikael Kosk: The work is no longer in the industry | Hbl.fi – Hufvudstadsbladet

The solution is not that all laid-off starting your own business. More importantly, new business grows, develops and recruits.

Salo met Prime Minister Juha Sipilä industrial structural change brutality. The closure of Microsoft’s mobile phone unit is a nostalgic end point of one of the biggest industrial success stories in Finland.
Prime Minister’s message to the redundant is that they will become entrepreneurs. To give the stick and little carrot he throws out that unemployment benefits could be converted to a start-up grant for based company.
A prime minister who himself has a background as an entrepreneur is suited to speak for enterprise and encourage people to become entrepreneurs. Credibility is based on experience, then it is also possible to line up objective facts that show why it is necessary to get away from the fixation on large companies that employment rescuers.

According to a report by the Economy and Policy Forum EVA from 2014 Finland industrial base on the way to erode. Industrial production share of GDP during the 2000s has fallen from over 25 percent to under 15 percent. But still employ the 130 largest companies as many as 300 000 smallest companies.
According to a comparison of OECD countries are the newly established companies’ share of the total employment lowest in Finland. Despite the boom in start-up companies, it is only a thin layer of new companies that manage to grow and develop in the longer term. But it is in them the new jobs must be born. In Finland, the absence of such medium-sized companies that are the engine for example the German economy.

Much has after all made right in Finland. According to EK’s survey of production and investment in Finland despite all the difficulties in recent years to countries been successful in globalization. Many Finnish companies have managed to become global peaks in their niches, and there is a particular expertise in areas such as energy and environmental technology. Companies’ investments in research and development is well on the international level.
It is in the private service jobs increased the most. Much of the reduction in the workforce in the industry is about to industrial companies outsourced their service functions in service. Education and social and health services are the fastest growing industries in Finland.

In a recent report by ETLA on occupational structure breaks describes how especially industrial and office workers have experienced that they are in a shrinking profession . Information technology has replaced a large part of office work, but in contrast to the industrial workers are office workers and higher educated relatively easily been able to reposition itself in new professions.
The situation is most difficult for older people who are affected by unemployment. It is no longer for them to invest in a new profession.

Those who lose their jobs at Microsoft in Salo, Tampere and Espoo hardly hear those hardest hit by structural change in the economy. They have an expertise in IT technology and product development that there is a persistent craving for. Programming know-how is one of Finland’s strengths and the companies that develop software are growing, becoming more and need more manpower.

For those who come on their own business, it is an excellent solution to drive a lonely business. But it is teeming already by companies not ever be bigger than one person. The solution is not to every or even every other of the laid-off starting a business. No one is served by a hype that each one will become his own entrepreneur.
Much more important is that the companies are based grow, evolve and recruits.

The idea of ​​converting unemployment benefits to a start-up grant seems who picked out of the hat at least as long as it does not specify which conditions in that case. It is in any case not a real possibility for a majority of the unemployed to start their own business. It is hardly conceivable that make it a condition for continued unemployment allowance to the unemployed setting up a business.
Government’s plans to shorten the time for the earnings-related allowance associated with it. How is it going to create incentives to seek and accept work, or start their own, without set a most poverty trap for the unemployed? It’s just a fact that it can take time to find a new job.
And cuts in education is counterproductive. It is merely a competitive knowledge that gives Finland’s success.

Mikael Kosk

mikael.kosk@gmail.com

LikeTweet

WikiLeaks: Thailand intercepting cell phones – News (echo) | Radio Sweden – Swedish Radio

In Thailand, it has been revealed that the Thai police and the military bought the software for millions of dollars to secretly have the ability to monitor mobile phones and computers. The revelation came in connection with Wikileaks released over a million emails and documents between an Italian company and the military and police.

In the documents that WikiLeaks has come over and now the newspaper the Bangkok Post has noted, we read that the Thai police and the military during the years 2013 and 2014 purchased the software to be able to listen to the call by mobile phone, reading text messages sent, and the computers to read including e-mail and to copy the contents of hard drives.

The price to be paid software is almost six million. In the documents it says among other things that the military explicitly want to use the opportunity to eavesdrop on ordinary people’s mobile phones and computers to “support our operations and missions.”

The last known purchase of the software was done in December 2013 and, according to the documents approved by the then Supreme Commander Genaral Prayut Chan-O-Cha, now Prime Minister of Thailand after the military coup in May 2014.

Neither the Prime Minister or military spokesperson would comment on the findings but said that the government has the law on his side, because you have the right to intercept individuals, after a court decision if it is suspected plans of terrorist offenses or other activity that could harm the country. While revelation comes so keeping the Thai government to push through a new law that radically increases the authorities’ capacity to electronic monitoring.

The National människorättskommisionären in Thailand Niran Pitakwatchara says to the Bangkok Post of the revelations and the proposed law that “It is a violation of democratic principles, which the state has no right to threaten individual privacy”, and that it is an abuse of power. “

In documents WikiLeaks has published so use other than Thailand also Vietnam and Singapore the software to monitor their citizens.

LikeTweet