tomorrow'snews today! and info...

Welcome to Dteo.net!

We continually search the net and find the latest breaking information and articles and list them here for you!

Find out what is "Trending now", the latest news for Technology, Celebrities, World News, and more! We have hundreds of thousands of pages of articles all updated with the latest content. If you don't see the article readily available, just perform a simple search and you will be able to find everything you need.


Stop what you’re doing and download a password manager right now
Whether you know it or not, today is Safer Internet Day. That might sound like a silly, made up name for a random day in February, but rather than laugh it off, we might as well take the time we'd spend crafting some sarcastic tweet to actually make ourselves safer on the internet. There are plenty of ways to do that — let's focus on just one: Downloading a password manager. READ MORE:  How to get 2GB of free cloud storage from Google right now We talked about password managers just last week when The Wall Street Journal published a extensive piece about staying safe from hackers, but let's dive a little deeper into the subject for Safer Internet Day.
Akamai beats revenue estimates; unveils $1 billion share buyback plan
Online content distributor Akamai Technologies Inc reported better-than-expected quarterly revenue, helped by higher demand for its security services, and announced a $1 billion share buyback program. Akamai's shares rose 16 percent to $45.90 in after-hours trading on Tuesday. The upbeat results soothed investors' nerves after a selloff in the broader tech sector in the past few days, which was triggered by disappointing sales outlook from LinkedIn Corp and Tableau Software.
Concerned by cyber threat, Obama seeks big increase in funding

President Obama meets with his national security team in WashingtonBy Dustin Volz and Mark Hosenball WASHINGTON (Reuters) - President Barack Obama on Tuesday sought a surge in funding to counter cyber security threats, as his top intelligence official warned Congress that computer attacks were among the most imminent security challenges facing the United States. In his fiscal 2017 budget proposal, Obama asked for $19 billion for cyber security across the U.S. government, an increase of $5 billion over this year While the White House's overall fiscal plan faces tough going in the Republican-controlled Congress, increased cyber security funding has won bipartisan support of lawmakers in the past. The request comes as the Obama administration has struggled to address the growing risk posed by criminals and nation states in the digital world.



Obama seeks cybersecurity boost to replace 'ancient' tech

President Barack Obama meets with members of this national security team and cybersecurity advisers in the Roosevelt Room of the White House in Washington,Tuesday, Feb. 9, 2016. At right is Lisa Monaco, assistant to the president for Homeland Security and Counterterrorism. (AP Photo/Pablo Martinez Monsivais)WASHINGTON (AP) — The federal government is relying on archaic computers systems to protect reams of critical data from cyberattacks, President Barack Obama warned Tuesday as he announced a new, centralized effort to boost cybersecurity.



Hackers are offering to pay $23,000 for valid Apple employee login details
Apple has a high regard for security and secrecy, but that doesn’t mean hackers have simply given up the dream of accessing this particular fortress. In fact, a new report says that in Ireland, hackers are ready to pay up to €20,000, or approximately $23,000, to Apple employees willing to sell their login details. DON’T MISS:  5 secret features hiding inside your iPhone "You'd be surprised how many people get on to us, just random Apple employees," a source told Business Insider . "You get emails offering you thousands [of euros] to get a password to get access to Apple. I could sell my Apple ID login information online
Here’s one iPhone lock screen security exploit you shouldn’t worry about
A newly discovered iPhone vulnerability can bypass your lockscreen code, but it will probably not affect you anytime soon. Security researcher Benjamin Kunz Mejri from Vulnerability Laboratory stumbled upon an authentication issue that affects iPhones and iPads running iOS 8 and iOS 9 . DON’T MISS: Fresh iPad Air 3 leak reveals more details about Apple's most exciting tablet in years Using this security hole, hackers could in theory access the data behind your lockscreen password. But in practice, the procedure is a little more complicated than that, as hackers would have to gain physical access to the iPhone or iPad in question. Furthermore, they would have to be able to manage an unlocked
US peacekeeping expert to coordinate sexual abuse response
UNITED NATIONS (AP) — Jane Holl Lute, a U.S. security expert who has held top posts in U.N. peacekeeping, was appointed by Secretary-General Ban Ki-moon on Monday to coordinate improvements in the United Nations' response to allegations of sexual exploitation and abuse by peacekeepers.
Justice, Homeland Security probe hack of U.S. agency employee data
By Mark Hosenball WASHINGTON (Reuters) - The U.S. Department of Homeland Security and the Justice Department are investigating a claim that personal data related to thousands of DHS and FBI employees was hacked and has been posted online, an agency spokesman said on Monday. The tech website Motherboard reported on Sunday that a hacker, who Motherboard said wished to remain anonymous, intended to dump onto the Internet names, job titles, email addresses and official phone numbers of over 9,000 DHS employees and another 20,000 Federal Bureau of Investigation workers.
Awesome list of 17 ‘Breaking Bad’ references hidden in ‘Better Call Saul’
I'm not typically a fan of TV spinoffs, but Better Call Saul has seemingly broken the spinoff curse that plagues shows looking to capitalize off of the success of previous hits. To be sure, following up Breaking Bad would be a daunting task for any show, but Better Call Saul works precisely because it's not trying to perfectly mirror all the elements that made Vince Gilligan's meth-fueled drama so addictive and compelling. Rather, Better Call Saul seeks to carve out its own unique and independent nook within the larger Breaking Bad universe, and it does so quite successfully. DON'T MISS:  Intern caught sleeping on his second day of work gets trolled by the entire Internet At the same time,
Exclusive: Top cybercrime ring disrupted as authorities raid Moscow offices - sources

View of building which houses an office of 25 Floor Film Company in MoscowBy Joseph Menn WASHINGTON (Reuters) - Russian authorities in November raided offices associated with a Moscow film distribution and production company as part of a crackdown on one of the world’s most notorious financial hacking operations, according to three sources with knowledge of the matter. Cybersecurity experts said a password-stealing software program known as Dyre — believed to be responsible for at least tens of millions of dollars in losses at financial institutions including Bank of America Corp and JPMorgan Chase & Co — has not been deployed since the time of the raid. Experts familiar with the situation said the case represents Russia’s biggest effort to date to crack down on cyber-crime.



Unhackable brain scans may some day replace passwords
Security breaches affecting millions of users have come to light in recent years, yet we’re no better at protecting our personal data, or at picking good passwords , than we were before. But some companies are already looking at new ways to secure customer data that go beyond passwords and PINs. Fingerprint sensors are found on more and more smartphones in recent years, and retina scanners are coming too. But in the future, we may have an even more advanced way of logging into online services and protecting our data: Brain scans. UP NEXT:  20 paid iPhone and iPad apps on sale for free right
Lawyer: New York-born man was mistreated after terror arrest
NEW YORK (AP) — The lawyer for a New York City-born man serving a 15-year prison sentence for supporting al-Qaida urged a judge Friday to find the U.S. government liable for failing to quickly diagnose a medical condition after his 2010 arrest, but a federal prosecutor said he was treated properly.
In Obama's final year, Senate is slow to act on his nominees

This April 17, 2014, photo, provided by the U.S. Army, shows then-Maj. Gen. John W. Nicholson, Jr. speaking to his senior leaders at Fort Bragg, N.C. If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you’re likely in for a long wait. In just a week, senators confirmed Nicholson to be the next top American commander in Afghanistan. (Sgt. Mikki L. Sprenkle/U.S. Army via AP)WASHINGTON (AP) — If you wear combat fatigues to work, then your nomination is almost sure to sail through the Senate. If not, you're likely in for a long wait.



How to play the secret chess game hidden in Facebook Messenger
Hundreds of millions of people spend hours of their lives on Facebook every week, but there are some secrets that only a few of them have discovered. For example, last December, a member of the Chess subreddit community found a secret, playable chess game hidden in Facebook Messenger that anyone can play. READ MORE:  Follow these 5 steps to keep yourself safe from hackers In order to start a game, just open a Messenger conversation with a friend and type "@fbchess play" to begin. A chess board will suddenly appear in the chat box and the player with the white pieces moves first. But despite the fact that a visual representation of the board appears on screen, you'll have to
Follow these 5 steps to keep yourself safe from hackers
No matter how secure you think your devices are, someone could access your data if they put their mind to it. It's just the reality of the Information Age, but you should still do everything in your power to make yourself less of a target for hackers . DON'T MISS:  20 paid iPhone and iPad apps on sale for free right now In an extensive piece for The Wall Street Journal this week , Geoffrey A. Fowler laid out a five-step checklist that shouldn't take more than an hour to complete, and might be the difference between having your data stolen or not. Here are just a few of the most important steps you should take: First, update everything. Start with the operating
Rice aides, Powell got classified info on personal email accounts

Former U.S. Secretary of State Powell salutes the audience as he takes the stage at the Washington Ideas Forum in WashingtonBy Mark Hosenball WASHINGTON (Reuters) - Former U.S. Secretary of State Colin Powell and aides to his successor, Condoleezza Rice, both received classified information a handful of times via personal email accounts, the top Democrat on a congressional oversight panel said on Thursday. The findings come after nearly a year of controversy over Democratic presidential candidate Hillary Clinton's decision to set up a private email server for her work as secretary of state. Representative Elijah Cummings said the disclosures about Powell's and Rice's aides' emails were made by the State Department's inspector general, who is reviewing the email practices of the last five secretaries of state.



Senators grill personnel office nominee over data hack

Beth Cobert, President Barack Obama's nominee to head the Office of Personnel Management (OPM), testifies on Capitol Hill in Washington, Thursday, Feb. 4, 2016, before the Senate Homeland Security and Government Affairs Committee hearing on her nomination. Cobert promised to strengthen the agency’s cybersecurity and information technology systems after what’s believed to be the largest data breach in U.S. history. (AP Photo/Manuel Balce Ceneta)WASHINGTON (AP) — President Barack Obama's nominee to head the Office of Personnel Management on Thursday promised to strengthen the agency's cybersecurity and information technology systems after what's believed to be the largest data breach in U.S. history.



Hackers attack 20 million accounts on Alibaba's Taobao shopping site

A logo of Alibaba Group is pictured at its headquarters in HangzhouHackers in China attempted to access over 20 million active accounts on Alibaba Group Holding Ltd's Taobao e-commerce website using Alibaba's own cloud computing service, according to a state media report posted on the Internet regulator's website. Analysts said the report from The Paper led to the price of Alibaba's U.S.-listed shares falling as much as 3.7 percent in late Wednesday trade.



Unpatched eBay vulnerability leaves shoppers at risk of downloading malware
Be extra careful the next time you visit a suspicious-looking eBay store page. According to Help Net Security , researchers from the Check Point security firm have discovered a vulnerability in the eBay platform that allows criminals to distribute malware by bypassing the site's code validation process and control the code themselves. MUST SEE:  15 paid iPhone apps on sale for free right now Here's how it works: an attacker sets up a store page with listings for products. On the page, a pop-up message will appear telling customers that they can receive a limited-time discount if they download the eBay mobile app. By clicking the
Apple ordered to pay $625 million in patent dispute with VirnetX

An Apple logo hangs above the entrance to the Apple store on 5th Avenue in the Manhattan borough of New York CityApple Inc must pay VirnetX Holding Corp more than $625 million for using the patent licensing company's Internet security technology without permission in its FaceTime and iMessage features, a federal jury in Texas said on Wednesday. The jury said Apple's infringement was willful. Apple was down 45 cents to $95.90 in after-hours trading.



Guilty plea in attempted cyber-attack on US govt. computers
WASHINGTON (AP) — A former Nuclear Regulatory Commission scientist pleaded guilty Tuesday to a federal computer crime, admitting that he attempted to launch a cyber-attack on government computers by sending employees emails that he thought contained a virus.
BT suffers temporary network problems

A BT logo is seen on a building in LondonBritain's BT Group said large numbers of its customers had lost connection to the Internet on Tuesday, but most were back online in a matter of hours and there were no indications that the failure was due to a malicious attack. "We've been working hard to fix the issue and are glad to report that nearly every customer affected is now reconnected, approximately two hours after the problem started," it said.



Something new to worry about: Connected toy security

This photo provided by Mattel shows the Smart Toy Bear. Your smartphone or tablet is most likely pretty secure, and unlikely to be hacked, but the same can’t be said for any Internet connected toys you may have purchased for your kids. (Mattel via AP)NEW YORK (AP) — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it.



OPPO, Vivo snap at Apple's heels in China mobile market

File photo of a commuter using his mobile phone passing an advertisement of Chinese smartphone maker Oppo at a train station in SingaporeBy Miyoung Kim and Yimou Lee SINGAPORE/HONG KONG (Reuters) - Beyond China few may have heard of OPPO or Vivo, but these local handset vendors are rising up the rankings in the world's largest smartphone market, using local marketing savvy and strong retail networks in lower-tier cities. Industry experts say these cities - there are more than 600 of them and some are bigger than many European capitals - are the next smartphone battlefield as China's major cities are saturated. International brands such as Apple and Samsung Electronics have mostly not yet reached this part of the market - which accounts for more than 56 percent of China's overall consumption, according to Beijing All China Marketing Research.



Google will reportedly exert ‘Apple-like’ control over future Nexus phones
Given how far Microsoft has moved in Apple's direction by designing its own hardware with the Surface Pro and Surface Book , we shouldn't be too surprised to learn that Google is considering similar moves with its Nexus line of smartphones.  The Information is reporting that "Google CEO Sundar Pichai and his lieutenants have signaled to colleagues and outsiders that the company wants to take greater control over its program for making 'Nexus' smartphones" and that "the change would effectively reduce the level of involvement of hardware partners that make the phones with Google, a group which has included Samsung, Motorola, LG and Huawei." MUST READ:  How the Iowa caucus works, as explained with Legos The idea here
The 2,001 things we like most in the world, according to Facebook
Facebook is the most popular social network in the world. With over 1.4 billion users, Facebook has something for everybody and most users come back for more and more multiple times per day. Sure, the company mishandled user privacy in the past, but it’s getting better all the time. And Facebook has plenty of other interesting services under its umbrella, including the Messenger and WhatsApp chat apps, the Instagram photo-based social network, and even the Oculus Rift VR initiative. To pay for all that, Facebook serves ads from third-parties to all of its users, and that’s why it needs to collect plenty of data about users like and dislike. This way, the service can target ads more effectively. So, what do
It takes 2 seconds to give your Android phone a speed boost and improve battery life by 20%
Given how much time smartphone users on the whole spend using Facebook , it's not all that surprising that the app tends to consume its fair share of battery. The problem, however, is that Facebook's mobile apps have a bad tendency of tearing through battery life much quicker than what one might reasonably construe as "fair." DON’T MISS:  This site ranks VPN speeds so you know which service will stream Netflix the fastest Speaking to this point, Reddit user pbrandes_eth last week decided to test the notion that running and even having Facebook installed on an Android device can have an adverse impact on performance. Using his
Cuba says it will launch broadband home internet project
HAVANA (AP) — Cuba announced Sunday night that it is launching broadband Internet service in two Havana neighborhoods as a pilot project aimed at bringing home access to one of the world's least connected nations.
A look at federal cases on handling classified information

FILE - In this March 5, 2015, file photo, cables are connected to a server capable of handling an email server at the Washington bureau of The Associated Press. News that Hillary Clinton’s home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information. The new disclosure, and the question of whether it exposes her to more serious legal problems, was certain to escalate political heat on the Democratic presidential candidate just days before the first ballots are cast in Iowa in the 2016 nominating process. (AP Photo/Jon Elswick, File)WASHINGTON (AP) — News that Hillary Clinton's home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information.



U.S. to withhold some Clinton emails with top secret information

U.S. Democratic presidential candidate Hillary Clinton speaks during a campaign stop at Grand View University in Des MoinesBy Arshad Mohammed and Jonathan Allen WASHINGTON (Reuters) - Seven private email chains of former U.S. Secretary of State Hillary Clinton will be withheld from the public in their entirety because they contain top secret information, the U.S. State Department said on Friday. The material, amounting to 37 printed pages, contained information U.S. intelligence agencies said was classified as top secret, State Department spokesman John Kirby said. "These documents were not marked classified at the time that they were sent," Kirby said, adding that the department would investigate whether the information in them was classified at the time.



Judge rejects challenge in FBI child porn website probe
U.S. District Judge Robert Bryan in Tacoma, Washington, on Thursday rejected arguments by Jay Michaud, one of 137 people facing U.S. charges in the probe, that a search warrant that enabled the FBI to conduct the sting was unconstitutional. The Federal Bureau of Investigation had in February 2015 seized the server hosting Playpen, a child porn website that operated on the Tor network, which is designed to facilitate anonymous online communication and protect user privacy. In order to identify its 214,898 members, authorities sought a search warrant from a Virginia judge allowing them to deploy a "network investigative technique" that would cause a computer to send them data any time a user logged on while the FBI operated the website for two weeks.
Blackshades malware co-creator gets five years of probation
By Nate Raymond and Brendan Pierson NEW YORK (Reuters) - An Arizona man who co-created software distributed by an organization called Blackshades that was used to hack into a million computers worldwide was sentenced on Friday to five years of probation. Michael Hogue, who online was known by the moniker "xVisceral," was sentenced by U.S. District Judge Kevin Castel in Manhattan after pleading guilty in 2013 to distributing malware and conspiring to commit computer hacking. Hogue, 25, first came to the attention of the U.S. Federal Bureau of Investigation in 2010, when, in an effort to advertise the malware, he contacted an undercover agent running a website established as part of a sting operation targeting the illegal trade in credit card numbers, court papers said.
HSBC says internet banking services down after cyber attack

HSBC logo is seen above a branch of the bank in the Sao Paulo financial centre, BrazilBy Sinead Cruise LONDON (Reuters) - HSBC is working with law enforcement to catch those behind a cyber attack that forced its personal banking websites in the UK to shutdown, its second major service outage this month, the bank said on Friday. Europe's largest lender said it had "successfully defended" its systems against a distributed denial of service (DDoS) attack but it was experiencing fresh threats, impeding full restoration of its services. "HSBC's internet and mobile services have partially recovered, and we continue to work to restore a full service," John Hackett, UK Chief Operating Officer, said in a statement.



6 ways Android outshines my iPhone 6s
On Thursday, I published a piece titled 8 reasons I still can’t leave the iPhone and switch to Android , in which I discussed what I believe to be the main benefits Apple's iPhone and iOS platform have over Android. I've been shocked at the feedback I've received since then. The Android vs. iOS argument typically draws all sorts of irrational and illogical "fanboys" out of the woodwork, but the overwhelming majority of emails I received after running that article were well composed and astute. I responded to as many as I could and I ended up having a few worthwhile conversations as a
Chinese military force to take lead on cyber, space defense

A map of China is seen through a magnifying glass on a computer screen showing binary digits in SingaporeBy Megha Rajagopalan BEIJING (Reuters) - A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and analysts said. Senior People's Liberation Army (PLA) officials and other observers have begun to give details of the country's new Strategic Support Force (SSF), whose establishment was announced at the end of last year as part of a major overhaul of the armed forces. "It's going to make them far more effective," said John Costello, a Washington-based analyst who focuses on China's cyber capabilities.



China charges Canadian with spying, stealing state secrets: Xinhua

A boy looks up as he walks past the closed coffee shop owned by Canadian couple Kevin Garratt and Julia Dawn Garratt in Dandong, Liaoning provinceCanada said on Thursday it was monitoring developments closely after China indicted a Canadian citizen detained since 2014 on charges of spying and stealing state secrets. Kevin Garratt was detained in August 2014 near China's sensitive border with North Korea along with his wife, who was also detained for months before being released last year. Xinhua state news agency said Garratt was indicted in Dandong, a city in China's northeast where the Garratts had operated a cafe since 2008.



Congress to probe Juniper 'back door' exposure, possible U.S. involvement
By Joseph Menn SAN FRANCISCO (Reuters) - A U.S. congressional probe into the impact of a hack of Juniper Networks Inc software will examine the possibility that it was initially altered at the behest of the National Security Agency, a lawmaker said in an interview on Thursday. The House Committee on Oversight and Government Reform this month sent letters asking some two dozen agencies to provide documents showing whether they used Juniper devices running ScreenOS software. Rep. Will Hurd, a Texas Republican who heads the committee's technology subcommittee and formerly worked for the Central Intelligence Agency, said his initial goal in pursuing the probe was to determine whether government agencies, many of which use Juniper gear, had been compromised by the hackers.
Computer expert gets no jail time in extensive spamming case
A computer expert was sentenced Thursday to two years' probation for helping send millions of spam messages that allowed computer marketers to illegally harvest email addresses and phone numbers. Naveed ...
U.S. utilities worry about cyber cover after Ukraine grid attack

An illustration picture shows projection of binary code on man holding aptop computer in WarsawU.S. utilities are looking hard at their cyber vulnerabilities and whether they can get insurance to cover what could be a multi-billion dollar loss after hackers cut electric power to more than 80,000 Ukrainians last month. The Dec. 23 incident in Ukraine was the first cyber attack to cause a power outage, and is one of just a handful of incidents in which computer hacking has caused physical effects on infrastructure rather than the loss or theft of electronic data. A similar attack in the United States could cripple utilities and leave millions of people in the dark, costing the economy more than $200 billion, an insurance study estimated last year.



8 reasons I still can’t leave the iPhone and switch to Android
While Apple's iPhones have been my main handsets since shortly after the first model was introduced in 2007, I used to carry an Android phone with me at all times until recently. Carrying two phones seems odd to most people, but there were so many important Android features that weren't mirrored in iOS for a period of time, and I also enjoyed the variety. Then last year, I ran out of reasons to keep using Android . DON'T MISS:  Apple and the Terrible, Horrible, No Good, Very Bad, Record-Breaking Quarter Yes, of course there are still plenty of Android features that are nowhere to