Gadget Gestures

Lets Gesture about Gadgets

Thursday, January 28, 2021
Log in
  • News
  • Tablets
  • SmartPhones
  • Laptops
  • Cameras
  • Games
  • Apps/Softwares
  • iPad/iPhone
  • Latest News
    • Lenovo A10000, A30000 and A60000
    • TV Has Never Been this Smart – the New Motto of Samsung Smart TVs
    • Nokia Lumia 1020 on Sale at AT&T
    • How Can a Sniffer Help in Detecting Lost or Stolen Mobile Phones?
    • Amazon expected to launch FireTube TV box before Christmas
    • Nokia Lumia 521 Release Date,Features, Specs, Price- Will be Available through T- Mobile
    • New Mercedes-Maybach S600, Priced At 200,000 dollars
    • Intel unveils Jarvis, Edison and dual-OS processors
    • Blackberry Z10 Problems of over heating, Rebooting: Even New BB 10 OS is not Helping
    • Samsung Galaxy Note 2 Vs Samsung Galaxy Note 3 – Compare Possible Price, Design, Display, Features
    • Evernote Integration of New Google Drive Button
    • White Nexus 4 Release Date Subdue Possibilities of Verizon Nexus 4 LTE

Why Would Zuckerberg Cover His Mac’s Cam and Mic with Tape?

By Leave a Comment

Mark Zuckerberg speaking at F8 Facebook’s founder Mark Zuckerberg may have just unwillingly unveiled some of his privacy protection techniques in a recent image celebrating the 500 million user milestone for Instagram.

In the photo, it is quite evident that Zuckerberg placed tape over his Macbook’s webcam and jack microphone. Plus, he doesn’t use Microsoft’s Outlook as an email client but Mozilla’s Thunderbird.

Cyber security experts explained that the Facebook CEO is far from paranoid. In fact, hackers can take over a computer so they are able to “see” through its webcam and “hear” through the microphone everything you do or say.

Experts recommend Zuck’s tactics as a Security 101 against hackers.

Yet some netizens suggested that the laptop might not be his which is highly unlikely since Zuckerberg had admitted that he doesn’t usually work in a fancy office but along with his staffers on the floor.

So, if the Macbook is his this means that even the Facebook boss is overly concerned about his privacy.

According to Snowden leaks, the U.K.-based Government Communications Headquarters (GCHQ) ran a surveillance program dubbed the Optic Nerve which captured the faces of millions of Yahoo chat users through their webcams.

FBI head James Comey admitted earlier this year that he too secures his laptop’s camera with tape. But because Zuckerberg now does it too, Facebook users may become alarmed that the rumors that Facebook may spy on them may be real.

A few weeks ago, Facebook had to dismiss accusations that it eavesdrops on its users’ phone conversations through the microphone to better target advertisements.

Security experts explained that cyber criminals can easily infect a vulnerable system with malware such as trojans which can take control over the computer’s camera, microphone and even keyboard.

Users can protect themselves through anti-virus solutions, firewalls and staying away from suspicious e-mail messages asking them to access a link. Desktop users can also unplug the camera. But laptop users have only tape or stickers on their hands.

You can also buy special stickers from The Electronic Frontier Foundation’s website. The EFF is a non-for-profit group that advocates for digital rights such as privacy and personal freedom on the Internet.

Yet in Macbooks’ case, users should be prompted if their camera is on through a green light. But hackers can bypass that system too, experts caution.
Image Source: Flickr

Filed Under: Cameras Tagged With: cyber-security, Hackers, Mark Zuckerberg, online privacy

IBM Teams Inspur to Provide Services for Growing Chinese Companies

By Leave a Comment

The Chinese server market faces increasing challenges, as IBM teams Inspur and change their market approach. IBM was affected by China’s latest policy addressed to U.S. companies. The Chinese Government wants to achieve informational independence. To gain it, the government wants to only rely on Chinese information administration firms.

The policy affected IMB, while Chinese server producing companies such as Lenovo, Huawei increased their market share. Dell remains the leader of the category of x86 servers with 20 percent market share. Lenovo owns 13 percent, while Huawei holds 14 percent of the Chinese server market.

The Chinese government announced concerns over server security recently. IBM managed to find a solution to continue doing businesses in China. IBM and Inspur, aka I2I, will offer a new product. Inspur produces the TS K1 systems and IBM will contribute with software packages, DB2 and WebSphere Application Server. Moreover, IBM will provide POWER8 processors to Inspur and other technical assistance to Inspur to help the company grow.

IBM teams Inspur because of the latest political decisions

Chinese companies are growing and need improved technology to analyze big data, this is the reason backing the new I2I allegiance declared on Friday. IBM sold the low-end server division to Lenovo at the beginning of 2014, although the take-over is not yet finished. By selling the low-end server business, Lenovo dropped its Chinese market share to just 12 percent, equaling Inspur’s market share. The Jinan-based Chinese company increased its market share from just 5 percent a year before.

IBM teams Inspur to regain Chinese market share

Servers are now an important political technology. Russia demanded recently that all data belonging to Russian citizens must be stored on servers placed on Russian soil. China accused Apple of producing hardware that is easy to use for spying. As well, some Chinese produced smartphones that were allegedly storing private data of U.S. users and sending it back to China. Undeniably, the latest events can be properly understood through a political economic lens.

However, neither IBM, nor Inspur, made any reference to cyber-politics and security in their announcement on Friday, according to Reuters. The Snowden affair complicated politics, as well as businesses. The reasons behind the new alliance are undeniably linked to the political environment. However, even if IBM teams Inspur, most companies prefer to avoid political discourse, at it is usually seen as a drawback in efficiency, because of future implied stability risks.

Filed Under: Apps/Softwares Tagged With: China, cyber-security, ibm, inspur, servers

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5 other subscribers

Recent Articles

GitHub stickers displaying a cat-octopus with a human face

Microsoft Acquires GitHub for $7.5 Billion’s Worth of Shares

By Leave a Comment

Teenage girl browsing her smartphone while sitting at the table

Facebook Is No Longer the Top Social Media Platform Among Teenagers

By Leave a Comment

Fake news headline on a laptop screen

Facebook Is Taking Its Fight Against Misinformation to a Whole New Level

By Leave a Comment

Unsolved Rubik cube on a black background

An Australian Professional Speedcuber Broke His Own Record at Solving a Rubik Cube

By Leave a Comment

Cambridge Analytica logo on a computer screen

Soon After the Facebook Scandal, Cambridge Analytica Is Going Bankrupt

By Leave a Comment

Windows restore disk placed in a paper envelope for CDs

Renowned E-Waste Recycler Goes to Jail for Distributing Free Windows Restore Disks

By Leave a Comment

nasa globe and emblem outside a building

NASA Announces its Investments in Future Tech Concepts Such as Biobots and Shapeshifters

By Leave a Comment

YouTube app opened in browser with the logo on top of it

YouTube Increases the Number of Ads to Trick Users into Subscribing to Its Paid Streaming Platform

By Leave a Comment

Facebook dislike button

Facebook Stock Falling for Second Straight Day amid Data Scandal

By Leave a Comment

Permanently Delete Facebook

WhatsApp Founder to Facebook Users: ‘Delete Facebook’

By Leave a Comment

Uber driverless car

Uber Driverless Car Kills Woman in Arizona

By Leave a Comment

Windows 10 Update reaches 35%

Microsoft: Windows 10 Updates To Take No Longer than 30 Min

By Leave a Comment

The Apple Watch

Apple Watch User Awakened by 3 Cops In His Bedroom after Accidental Call

By Leave a Comment

Pokemon Go Character

Pokemon Go Player Attacks Other Player IRL for Losing Gym

By Leave a Comment

Pages

  • About Us
  • Contact Us
  • Privacy Policy GDPR
  • Team

Recent Posts

  • Samsung Tablet 10.1 Review: Perfect for Your Entertainment Needs
  • Take Better Pictures Today With These 9 Helpful IPhone Camera Settings
  • The 6 Best Gaming Desks to Give You a Great View
  • How Much RAM Do I Need for Gaming? Here’s the Sweet Spot for Optimal Performance
  • Lenovo Ideapad Yoga 11s Review: A Teaser
  • Basic Computer Skills – 6 Tips You Need to Know!
  • Why is my Laptop Fan so Loud? Six Possible Reasons for the Noisy Nuisance

Copyright © 2021 GadgetGestures.com

About · Privacy Policy · Terms of Use · Contact

This website uses cookies to ensure you get the best experience on our website. Learn more.