Skip to main content

Posts

Technology in Farming & requirements for on-boarding farmers to your agtech solution - BY: John Buju

The world of technology has only recently begun to design services for farmers. But the numbers show that this line of business is already growing rapidly. Investment records are broken every year. Underlying this development is the boon of the huge amount of data that a farm now generates. Like every other human being, farmers do book keeping, are active online, and use smartphones. They use such tools to solve problems on the farm, and by doing so, they’re generating data. There is also farm machinery, loaded with sensors generating lots of data. By combining such farm operations data with other data repositories, like open satellite data on water tables, precipitation, and nutrition data from the feed manufacturer, etc, data can be combined into useful applications that can help with farm management. Despite the opportunity for the developer to build valuable solutions, there are also barriers that significantly obstruct adoption of digital solutions for farm manag...

Yahoo Admits Mails were Hacked

Have your friends recently texted you about spam originating from your Yahoo Mail account? If so, that may be because you (and many of your friends) were hacked. Yahoo acknowledged Thursday that attackers now own an undisclosed number of usernames and passwords to Yahoo Mail accounts. In a blog post, Jay Rossiter, the senior vice president in charge of Yahoo’s platforms and personalization products, wrote that the attackers had most likely hacked an external, third-party database and obtained the information there. “We regret this has happened and want to assure our users that we take the security of their data very seriously,” Rossiter wrote. Yahoo did not say how many accounts had been compromised, nor when the attacks had taken place. However, the company says it began notifying users that the attacks had taken place, and had begun using second sign-in verification to allow users to re-secure their accounts. Users who have been affected, unsurprisin...

BEWARE :: See who viewed your profile scam and what really happens

I'm increasingly being asked by folks on Facebook if it's possible to tell who has been viewing their Facebook profile. A number have been attracted to webpages and Facebook applications that claim to be able to give you a secret insight into who is spying on your profile. Well, if you're one of those people who are curious about who might be watching you online, take care. Right now we're seeing a significant number of Facebook users posting messages such as: OMG OMG OMG... I can't believe this actually works! Now you really can see who views your profile!!! WOAH and See who views your Facebook profile in real-time!!! However, like the "Justin Bieber cell phone number" scam and the "This mother went to jail for taking this pic of her son!" scam, the links pointed to in your friends' status updates are not to be trusted. If you make the mistake of clicking on the link to one of these pages offering...

Hacker Fundraising raises &12,000 to the researcher who hacked Mark Zuckerberg's Facebook Page, after facebook refused to pay

Facebook may have refused to pay researcher Khalil Shreateh a bug bounty after he posted a message on Mark Zuckerberg’s Facebook page , but that doesn’t mean he’s going to go away empty-handed. Shreateh posted the message on Zuckerberg’s Facebook page, exploiting the vulnerability he had discovered, after he become frustrated by the poor response from the social network’s security team. Irritated by their claim that he wasn’t reporting a bug, he effectively “went to the top” in order to get their undivided attention. Shreateh lost the chance of receiving $500 or more from Facebook by breaking their guidelines for responsible investigation and disclosure of flaws on the site, much to the annoyance of many fellow security researchers and hackers online. Well, if you were one of them, don’t despair. A fundraising campaign started by researcher Marc Maiffret has already raised over $12,000 for Shreateh. Shreateh may have been unwise to have posted messages onto the Facebo...

Facebook admits mistake and still won't pay the researcher who hacked on Zuckerberg's page

The frustrated researcher, who failed to get an adequate response from Facebook’s security team and so hacked Mark Zuckerberg’s page to get their attention, is not going to receive a bug bounty for his discovery the social network has confirmed. In a posting made on the social network’s security page, Facebook chief security officer Joe Sullivan admitted that his team made mistakes in its interactions with Palestinian researcher Khalil Shreateh and failed in its communication with him. As a result, the site is going to make some changes in how it responds to potential vulnerability reports. “We should have explained to this researcher that his initial messages to us did not give us enough detail to allow us to replicate the problem. The breakdown here was not about a language barrier or a lack of interest — it was purely because the absence of detail made it look like yet another misrouted user report.” “We will make two changes as a result of this case: (1) We will ...

4 Best ways to Hack Facebook Password

In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password, I will cover 4 methods over here: 1. Facebook Phishing 2. Keylogging 3. Social engineering 4 . Primary email address hack 1. Facebook phishing: I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learn't it without any difficult...

SHOCK, John McAfee:: infected laptops with malware, spied and stole passwords

Twenty years ago, John McAfee ran an anti-virus company. He's not had anything to do with the company that bears his name (and was subsequently acquired by Intel) since the early 1990s, but that doesn't mean that his involvement with malware has come to an end. Many people have been following the bizarre story of John McAfee, who has been on the run from the Belize police since mid-November, had his location leaked to the world in a photo's EXIF meta-data, and was hastily deported from his Guatemala hide-out to the United States. Throughout his escapades, John McAfee has been keeping the internet entertained and informed of his swashbuckling exploits via his blog. Most recently, John McAfee claims that he gave Belize officials cheap laptops that had been deliberately pre-infected with keylogging spyware. I purchased 75 cheap laptop computers and, with trusted help, installed invisible keystroke logging software on all of them - the keind that calls home (to me) and d...