Candlelites

Everything from Everywhere

zdNet

Latest headline news from zdNet with momentary update to provide the online news, world news, sports news, family news, health news, video news, national news, food news and politics news from zdNet.



how to make touch id better at recognising your fingerprint on the iphone and ipad

isn't it annoying when you pop your finger on the touch id button of your iphone or ipad only to have it rejected? here's a quick and simple way to improve the accuracy and reliability of touch id.must read : how much power does your smartphone charger waste? it's really simple - since ios allows you to register multiple fingers, what you do is register the same finger multiple times. by doing this you can press your finger (or thumb) on the sensor in different ways so it gets registers from a variety of angles. another thing you can do is since dirty of damp fingers fail to pass muster with touch id because it sees them differently to clear, dry fingerprints, you can also register a finger when it's damp (not soggy or wet) and dirty. this can be a real timesaver if you have sweaty fingers or operate your iphone or ipad with dirty hands.touch id & passcode to do this click on settings and go to touch id & passcode . you'll be prompted to enter your pin or passcode and from there you can add more fingerprints by clicking add a fingerprint. you can add as many prints as you want, and you can give each enrolled fingerprint a unique name (which might come in handy for fine-tuning this trick).how to make sure your charger or power bank...see full gallery1 - 5 of 8 next prev see also:





survey: what's on your company's tech budget for 2018?

image: istock/ktm_art it's that time of year, when technology decision makers are looking ahead to the 2018 fiscal and calendar year. zdnet's sister site, tech pro research, is conducting a survey to find out where companies are directing resources, and how this compares with the it budget from last year.if you're familiar with how the budget is created in your organization, please share your thoughts about your company's plans and top priorities for the next year by filling out this survey by august 15, 2017. the survey contains 15 multiple choice questions, and should take less than five minutes.you'll be asked questions about how your company's budget for fiscal or calendar year 2018 compares to fiscal or calendar year 2017, how important it spending is within your organization, what your company's top budget priorities are, and who makes recommendations for it budget items.all respondents will have a chance to enter their email at the end of the survey and receive a free copy of the resulting research report, which is normally only available to tech pro research subscribers.take tech pro research's survey on it budgets for the upcoming year before august 15, 2017 and you can request a free copy of the resulting research report.





doogee mix smartphone hands-on: great performance with a fabulous screen review

prosscreen size maximized for body size useful doogee 'smart box' controls tools for one-handed operation protective case and screen coverconspoor english in some ui dialogs strange branding on phone accessory ring pad one-handed operation for right hand only i was not looking forward to looking at the doogee mix phone. i reviewed the doogee shoot 2 and was underwhelmed by its performance and features. the mix, on the other hand, is completely different, right from the get go.doogee mix screen size compared with samsung galaxy s7. (image: eileen brown) doogee has managed to squeeze a full 5.5-inch samsung super amoled display screen with gorilla glass 5 from corning into a bezel-less body, which is the same size as a 5-inch smartphone.this gives a massive amount of screen real estate compared to other 5-inch phones i have tried. the full-width screen also stretches to full length. its dimensions are 144mm x 76.2mm x 7.95mm, and it has the same screen size as the meizu pro 6 plus but in a shorter body (the pro 6 plus is 155.6mm x 77.3mm x 7.3mm).float gesture feature. (image: eileen brown)inside there is an octa-core helio p25 cpu -- four cores at 1.6ghz and four that clock at 2.5ghz. top zdnet reviewsdell latitude 11 50007.9apple iphone 7 plus9.3amazon echo9.0google pixel xl8.0it has 6gb of lpddr4x ram and has up to 128gb of internal storage on some models.the standard phone is 4gb or 6gb ram with 64gb storage. you can also put a micro sd (tf) card into the s...





3d printing hands-on: modding the ultimaker 3 with 3d printed accessories

welcome to the latest edition of the diy-it 3d printing discovery series here on zdnet. as the accompanying video shows, we're going to build some mods. diy-it project: 3d printing discovery series whether you're new to 3d printing or an old hand, zdnet's 3d printing discovery series will help you understand and get the most out of this amazing, accessible technology. i've been really enjoying exploring the ultimaker 3, but i needed some mods to make working with it in the shop easier. fortunately, there were some great designs already up on thingiverse, so i downloaded them, printed them, and put them to use. first, there's the holder for spare print cores. the ultimaker 3 is a dual-filament printer. it uses different cores for regular pla printing and printing dissolvable supports for pva. when you get the printer, you get three cores, but only two live inside the printer at any given time.spare print core holder that's where the ultimaker printcore holder by thingiverse contributor logan rose comes in. it was a quick, easy print. as you can see, it hangs from the side of the ultimaker and fits the spare print core like a glove.how filament loads on the ultimaker 3 up next is a brilliant and incredibly useful design by thingiverse contributor jason powell. i'll describe the problem i needed to solve, then i'll show you the prints i made to solve the problem. at issue is the fact that the ultimaker 3 loads filament from the back. it uses what's called a bowd...





watch your bitcoin vanish: blockchain split may be imminent

file photo cryptocurrency traders have been warned that any bitcoin received after the end of this month may vanish from their wallets or be rejected outright as a "chain split" takes place.what's hot on zdnetbitcoin.org, a community related to the virtual currency, said on thursday that the bitcoin network has facilitated hundreds of millions of transactions to date.the blockchain, the electronic ledger which records and tracks the exchange and trade of cryptocurrency, relies on this network, which is made up of thousands of bitcoin nodes running bitcoin software.however, network improvements planned for the next few weeks may disrupt this network, leading to what is called a "chain split" -- an event in which some bitcoin nodes will run on software that other nodes are suddenly not compatible with for a time."as a result, some nodes may propagate confirmed transactions that other nodes may not accept or recognize," bitcoin.org warned. "this may result in unreliable confirmation scoring for an unknown length of time. this means that any bitcoins you receive during this period could disappear from your wallet or be a type of bitcoin that other people will not accept as payment until the situation is resolved."as noted by the register, the event is bitcoin improvement proposal 148 (bip 148), an attempt to introduce revised code known as segwit for increased bitcoin blocksize and the scripting upgrade streamlining.once the updates have taken place, confirmatio...





trump voter commission releases voter complaints — and their personal data

(image: file photo)the trump administration has published over a hundred emails submitted to the white house's election integrity commission -- and not everyone's happy.the document, posted late thursday in an unredacted form, is available directly from the white house's website.it follows a request by the administration to submit comments from the public by email to the voter integrity commission, which was set up through an executive order signed by president trump earlier this year. the commission is focused on investigating alleged reports of voter fraud and improper voting, despite a recent report that showed the average american "will be struck by lightning than that he will impersonate another voter at the polls."nearly all of the emails contained the senders' names. many of the emails contained full names in the email headers, and in some cases, email addresses and home addresses, as well as phone numbers of senders who included the data, such as in their email signatures.several of the emails were extremely graphic in language."the most, um, the most transparent administration in history, i guess," joked privacy activist parker higgins in a tweet.we got in contact with some of those whose information was released. one person we spoke to, who did not want to be named (despite having their information posted), said they were surprised to hear that their information wasn't redacted.another person we spoke to confirmed they had sent an email, but they were not a...





microsoft issues fix for new surface pro hibernation issue

microsoft is confirming that a firmware update the company released on july 13 is meant to fix the hibernation/sleep bug reported by some owners of the newest surface pro devices.microsoft rolled out a firmware update for the surface pros yesterday, july 13, that was labeled as revising system power reporting. there is/was no additional information about what that meant.but on the microsoft answers thread about the surface pro 2017 random hibernation problems, microsoft provided an update on july 14 as to what's in that firmware update."7/14 update: the fix for this issue has completed testing and is now live, please go update your surface pro via windows update to get the latest download. you can obtain this fix by checking settings > update & security > windows update," said microsoft representative "bryanh."on july 10, microsoft officials said they had identified the issue causing some users' surface pro machines to randomly hibernate/sleep. officials said at that time they were testing a fix for it which they'd deliver via windows update. on july 12, bryanh said on the microsoft answers forum that microsoft had not yet included the fix in the latest bunch of updates delivered this week on patch tuesday.microsoft introduced the newest member of its surface family, the surface pro -- which it is positioning as its "most versatile laptop" -- in late may. the device is the successor to the intel-based surface pro 4.some unknown number of surface pro users began repor...





drone racing league sets world record for fastest quadcopter

the drl racerx drone weighs just 800 grams. drone racing league the drone racing league (drl), one of the preeminent groups working to make organized drone racing an official sport, has set a guinness world record for the fastest ground speed by a battery-powered quadcopter.what's hot on zdnetthe drl says its hand-built racerx drone reached a never-before-seen top speed of 179.6 miles per hour. in order to set the guinness world record achievement, the drone needed to fly back and forth across a measurement course of 100 m (328 ft.). the actual record is set as the average top speed achieved on each of those flights, which clocks in at 163.5 miles per hour.on earlier flights, drl said prototypes of the racerx drone burst into flames due to the extreme battery heat at top speed."we're thrilled to put our proprietary technology to the test, as we're all about speed and pushing the limits of drone design here at drl," said drl founder and ceo nicholas horbaczewski. "the record-setting racerx represents the culmination of years of technological innovation by our team of world class engineers, and we're very excited to unveil the fastest racing drone on earth."drone racing is still a niche interest among tech enthusiasts, but it's starting to gain momentum with mainstream audiences. last year, the drl snagged a deal with espn and espn2 to broadcast a full season of races, which are elaborate productions that mimic mainstream racing events. the group hopes to some ...





at&t eyes media, telecom split after time warner merger

at&t is mulling major organizational changes following its proposed $85 billion takeover of time warner. what's hot on zdnetaccording to the wall street journal, at&t will separate its wireless and satellite tv business from newly acquired time warner media assets, which includes hbo, warner bros., cnn, and more.under the new structure, at&t chairman and ceo randall stephenson will maintain his post and have two segment chiefs working beneath him, similar to the executive setup over at comcast. at&t subsidiary directv will be combined with the company's telecom business under at&t veteran john donovan. at&t executive john stankey will run the time warner business, according to the wsj report. at&t first announced plans to buy time warner last october. at the time, at&t said the combined company would strive to become the first us mobile provider to compete with cable companies nationwide with bundled mobile broadband and video. the telco also said the deal would usher in new forms of original content built for mobile and social platforms."this is a perfect match of two companies with complementary strengths who can bring a fresh approach to how the media and communications industry works for customers, content creators, distributors and advertisers," stephenson said in a statement at the time the merger was announced. at&t acquired directv in 2015 for $49 billion to become the nation's largest pay-tv subscriber.





how machine learning is taking on online retail fraud

alamy amazon prime day (apd) was a huge success, they say. at an estimate 60 percent increase in sales over 2016 and nearly $2 billion in revenue, it's hard to argue otherwise.if you want to talk numbers though, let's consider this. what would you say if you were told that amazon could lose nearly 5 percent of that revenue, or $100 million, due to fraud?that's a lot of money. and it's not just amazon on its prime day, it's every online retailer that is exposed to online fraud every single day.retail hallmarks like apd or christmas make things worse. what can be done to prevent this? machine learning (ml) to the rescue. zdnet talked to fraud prevention startups fraugster and riskified to get their insights.the anatomy of fraudwhat's hot on zdnetaccording to industry blog retail minded, there are two main types of fraud -- chargeback fraud and card-testing fraud. chargeback fraud involves purchases that are reported as never delivered and then charged back to the merchant by the credit card company.card-testing fraud happens when thieves with a list of stolen card numbers essentially "play the slots" by attempting purchase after purchase from an online store with different numbers until they find a card number that succeeds. they then use this number to make fraudulent purchases at other stores.it takes both expertise and resources to be able to identify fraud. behemoths like amazon may be able to deal with this in-house, but most retailers are not. and in any ...





3d printing hands on: modding the ultimaker 3 with 3d printed accessories

welcome to the latest edition of the diy-it 3d printing discovery series here on zdnet. as the accompanying video shows, we're going to build some mods. diy-it project: 3d printing discovery series whether you're new to 3d printing or an old hand, zdnet's 3d printing discovery series will help you understand and get the most out of this amazing, accessible technology. i've been really enjoying exploring the ultimaker 3, but i needed some mods to make working with it in the shop easier. fortunately, there were some great designs already up on thingiverse, so i downloaded them, printed them, and put them to use. first, there's the holder for spare print cores. the ultimaker 3 is a dual-filament printer. it uses different cores for regular pla printing and printing dissolvable supports for pva. when you get the printer, you get three cores, but only two live inside the printer at any given time.spare print core holder that's where the ultimaker printcore holder by thingiverse contributor logan rose comes in. it was a quick, easy print. as you can see, it hangs from the side of the ultimaker and fits the spare print core like a glove.how filament loads on the ultimaker 3 up next is a brilliant and incredibly useful design by thingiverse contributor jason powell. i'll describe the problem i needed to solve, then i'll show you the prints i made to solve the problem. at issue is the fact that the ultimaker 3 loads filament from the back. it uses what's called a bowd...





dell latitude 5285 2-in-1 review: a business-class surface pro clone with a clever kickstand review

proslight and compact all-day battery life mobile broadband support clever kickstand mechanismconstravel keyboard and active pen are separate purchases keyboard is disappointingly flexible moderate screen resolutionthe dell latitude 5285 2-in-1 belongs to the growing army of surface pro clones, and is designed for business users who want a small, light two-piece windows 10 system that's very capable and will travel well.given that the 2-in-1 mode of working requires both the tablet and a keyboard, it's irritating that dell follows microsoft to the point of selling these items separately. we'd be interested to know how many buyers go for a tablet-only purchase. assuming you've bought both components, you'll find that the 12.3-inch latitude 5285 2-in-1 is neatly designed, with a robust docking system. the keyboard and tablet hitch together by magnets alone, but they're strong: at no time during the week-long test period did the two sections come apart unless i physically forced them to.the 12.3-inch tablet section weighs 860g, while the travel keyboard, which is a separate £175 (inc. vat) purchase, brings the system weight up to 1.19kg. image: sandra vogel/zdnet the keyboard section has a rough material backing that's visually distinctive and helps with grip when you're carrying the 2-in-1 system around. however, it could be prone to staining -- i managed to avoid spilling coffee on my desk during testing, but can imagine the mess such an acciden...





luxury smartphone maker vertu collapses

vertu vertu is going to liquidate after last-minute attempts to save the struggling luxury phone maker failed.what's hot on zdnetthe british handset designer, which produced expensive devices for a niche luxury market, has recently faced serious financial difficulties which appear to have proven fatal.as reported by the bbc, vertu's problems lay within "an accounting deficit of £128 million," which has not been resolved despite being sold by the company's owner, a chinese holding company, to turkish businessman murat hakan uzan.uzan intended to pay £1.9 million for the brand to come out of administration, but with the company running with so much debt on the books, failure seemed inescapable without serious investment.unfortunately for vertu, liquidation means that almost 200 employees will lose their jobs.founded by nokia in 1998, the handset maker was known for creating handsets out of the ordinary. vertu used leather, alligator and lizard skin, precious metals, titanium, and jewels, as well as synthetic sapphire for its screens.these hand-made smartphones, however, came with very high price tags. the signature range, for example, costs between £11,100 and £39,100 for a single smartphone.the handsets were touted as being made from "only the most exquisite materials and cutting-edge technology."speaking to the bbc, ihs technology analyst ian fogg explained that vertu's business model was highly unusual."they hand make the phone at incredibly low volumes...





windows 10's new fluent design gets a smoother, sleeker look

some of the first elements of microsoft's fluent design are coming to the fall creators update due around september. image: microsoft ahead of the windows 10 fall creators update, microsoft is refining the look of key elements of its fluent design makeover on the desktop. more windows 10fluent design system, introduced at microsoft's build conference, is the company's new "design system" for windows, akin to google's material design for android and its apps for non-google platforms.eventually fluent design will be the basis for microsoft's ios and android apps too, but some of the first elements are coming to the fall creators update due out around september.the design overhaul will take place gradually as microsoft updates its apps and as more windows developers adopt the various tools microsoft is releasing to bring a focus on light, depth, motion, material, and scale in apps. the tools include acrylic material, which offers apps an opaque layered effect to add depth, connected animation for creating transitioning scenes, while parallax creates a 3d effect, and reveal offers a lighting effect that draws attention to interactive elements of an app. acrylic design got some minor adjustments in the fast ring windows 10 insider preview build 16241 for pcs released yesterday. as seen in the image below, microsoft has softened the "noise layer" of acrylic material at the request of windows insiders. microsoft's side-by-side comparison shows the changes it's mad...





watch out for this money stealing macos malware which mimics your online bank

macos is increasingly being targeted by cybercriminals. image: istock a recently discovered strain of apple mac malware has begun mimicking major banking websites in an effort to steal login details from victims.first uncovered in may, osx.dok affected all versions of apple's older os x operating system and was initially used to spy on victims' web traffic. the malware was later modified to infect macos users, and its latest variant has been updated to steal money and financial credentials, say researchers at check point.more security news this new dok campaign is distributed via phishing emails relating to financial or tax matters, with the payload deployed via a malicious zip file that victims are urged to run. this latest attack specifically targets macos users, with the malware partnered with a man in the middle attack that enables the perpetrators to spy on all victim communications, even if they're ssl encrypted. dok appears to be highly sophisticated malware, shown by mutations in its code that make it more difficult to detect and remove -- especially as dok modifies the os' settings in order to disable security updates and prevent some apple services from communicating. once installed on a system, dok downloads tor for the purposes of communication with a command and control server over the dark web, which helps to geolocate the victim and customise the attack according to location -- with evidence suggesting the malware mainly targets users in europe. a ...





watch your bitcoin vanish: blockchain split may be imminent

file photo cryptocurrency traders have been warned that any bitcoin received after the end of this month may vanish from their wallets or be rejected outright as a "chain split" takes place.what's hot on zdnetbitcoin.org, the community behind the virtual currency, said on thursday that the bitcoin network has facilitated hundreds of millions of transactions, but it is now time to optimize the system.the blockchain, the electronic ledger which records and tracks the exchange and trade of cryptocurrency, relies on this network, which is made up of thousands of bitcoin nodes running bitcoin software. however, network improvements planned for the next few weeks may disrupt this network, leading to what is called a "chain split" -- an event in which some bitcoin nodes will run on software that other nodes are suddenly not compatible with for a time."as a result, some nodes may propagate confirmed transactions that other nodes may not accept or recognize," bitcoin.org warned. "this may result in unreliable confirmation scoring for an unknown length of time. this means that any bitcoins you receive during this period could disappear from your wallet or be a type of bitcoin that other people will not accept as payment until the situation is resolved."as noted by the register, the event is bitcoin improvement proposal 148 (bip 148), an attempt to introduce revised code known as segwit for increased bitcoin blocksize and the scripting upgrade streamlining.once the upd...





windows, linux distros, macos pay for kerberos 21-year-old 'cryptographic sin'

an attacker sitting between server and client can exploit the orpheus lyre bug to impersonate some services to the client. image: getty images/istockphoto a bypass bug present in the kerberos cryptographic authentication protocol for 21 years has now been fixed in patches from microsoft, samba, fedora, freebsd, and debian. the discoverers of the ancient kerberos bypass bug have called it orpheus lyre after orpheus, the musician from greek legend who bypassed cerberos, the three-headed hound guarding the gates of hades. orpheus pacified the dog with the music of his lyre. kerberos, which is named after cerberos, is implemented as a cryptographic authentication protocol in products like microsoft's active directory. microsoft fixed the bug in this week's patch tuesday update. more security newssamba, debian, and freebsd are also affected through the open-source heimdal implementation of kerberos v5. heimdal before version 7.4 is vulnerable. it appears apple's kerberos implementation in macos is also vulnerable to orpheus lyre. however, the mit implementation is not. orpheus lyre was discovered by jeffrey altman, viktor duchovni and nico williams. they explain in a post that orpheus lyre can be used by a man-in-the-middle attacker to remotely steal credentials, and from there gain privilege escalation to defeat kerberos encryption. instead of public-key cryptography's use of digital certificates from certificate authorities, the kerberos protocol relies on a trusted ...





google wants you to stop using its sms two-factor sign-in

anyone who uses sms for two-step verification will soon see an invitation to try google prompts when they sign in. image: google starting next week, google will make a significant step towards moving users off two-step verification sign-in delivered by sms. google has continued to support sms for two-factor authentication despite the national institute of standards and technology last year deprecating it from its preferred list of out-of-band authentication methods. the main reason for deprecating sms is that it isn't safe. an attacker could, for example, con a mobile network operator to redirect the sms to their phone. there are also numerous malicious android apps that capture sms codes sent from banks to users.more security news in place of sms, google will be pushing android and ios users towards its prompts-based 2-step verification (2-sv) sign in. google launched this in june 2016, with a key advantage over sms being that the process occurs over an encrypted connection. in february, it also improved prompts with additional contextual information, such as the device, location, and time of the attempt to sign in to a google account. starting next week google will display an invitation to people who use 2-sv sms to switch to prompts. google isn't dropping support for familiar sms just yet, but it is signaling it may eventually do so. for now, google is pitching the switch as a "better experience" for 2-sv. users can chose to keep the prompt-based sign-in flow ...





this cheap password-stealing malware just added to your security headaches

the creators of ovidiy stealer offer support to users. image: proofpoint a new form of credential-stealing malware -- complete with slick marketing and support from its authors -- is available for as little as $7, providing wannabes with a worryingly easy entry point into the world of cybercrime.first appearing a month ago, ovidiy stealer is regularly updated by its russian-speaking authors and the malware has hit targets around the world including the uk, the netherlands, india, and russia. more security newsdespite its low price of 450-750 rubles ($7-13), the malware comes with code designed to avoid analysis and detection.uncovered by researchers at proofpoint, the malware is spread via a number of methods, including malicious email attachments, file-hosting websites, and even within software packages. it comes with functionality to target multiple applications, but buyers are able to purchase a version of the malware which only focuses on a single browser if they so wish.if the malware is able to find passwords in its targeted applications, it will send them to the gang using it, putting the victim and their organisation at risk of compromise, especially if the same password is used across multiple accounts.ovidiy stealer is openly sold on a domain which boasts support and features -- including the ability to view statistics and logs of infected machines -- to potential customers. payment for the malware is taken by robokassa, the russian equivalent of paypal.in o...





this cheap password-stealing malware just added to your security headaches

the creators of ovidiy stealer offer support to users. image: proofpoint a new form of credential-stealing malware complete with slick marketing and support from its authors is available for as little as $7, providing a worryingly-easy entry point into the cybercriminal world for wannabees.first appearing a month ago, ovidiy stealer is under regularly updated by its russian-speaking authors and the malware has hit targets around the world including the uk, the netherlands, india and russia. despite its low price of 450-750 rubles ($7-13), the malware comes with code designed to avoid analysis and detection.uncovered by researchers at proofpoint, this malware is spread via a number of methods, including malicious email attachments, file-hosting websites and even within software packages. it comes with functionality to target multiple applications, but buyers are able to purchase a version of the malware which only focus on a single browser if they so wish.if the malware is able to find passwords in its targeted applications, it will send them to the gang using it, putting the victim and their organisation at risk of compromise, especially if the same password is used across multiple accounts.ovidiy stealer is openly sold on a domain which boasts support and features - including the ability to view statistics and logs of infected machines - to potential customers. payment for the malware is taken by robokassa, the russian equivalent of paypal.in order to help drive sale...