Android Auto and Apple CarPlay to be used by Ford’s 2016 models

Ford today is releasing a software update to its model-year 2016 vehicles with SYNC 3 so that the entire fleet will be able to use Android Auto and Apple CarPlay.



You can get the update in three different ways:

  1. by downloading over the air for Wi-Fi-connected vehicles
  2. by bringing your car to a Ford dealership
  3. by downloading the update to a USB drive then manually plugging into the car

Android Auto is supported for smartphones running Android 5.0 and higher, while CarPlay is compatible with iPhone 5 or later, updated to iOS 7.1 or higher.

Russian man creates transformer

If you dream it you can build it

A father and son team inspired by the ‘Transformers‘ film have created their own car-robot, built from a Russian-made ‘Lada‘ vehicle. The Russian version of the Optimus Prime Transformer was demonstrated at a stunt show in Oryol, Thursday.

The transformer is using real gun but fake bullets to mimic the effect of a machine gun as we can clearly see a lot of effort has been put into this project .  Using hydraulics and a lot of time the father has build an astounding piece of engineering , if one man can do imagine if a factory was was building things  like this. Could we see a Robot apocalypse any time soon ?

Zomato Hacked With 17 Million User Records Stolen

Time to change your passwords again !

Zomato was attacked by hackers compromising 17 million users accounts . The Zomato team had this to say :

The reason you’re reading this blog post is because of a recent discovery by our security team – about 17 million user records from our database were stolen. The stolen information has user email addresses and hashed passwords.

We hash passwords with a one-way hashing algorithm, with multiple hashing iterations and individual salt per password. This means your password cannot be easily converted back to plain text. We however, strongly advise you to change your password for any other services where you are using the same password.

Zomato has alot of work to do

According to the Zomato team “6.6 million users had password hashes in the ‘leaked’ data, which can be theoretically decrypted using brute force algorithms.”  The Zomato team managed to contact the team of hackers and the data has been pulled off the deep web , this incident is being presented as something along the lines of a teachable moment .  Zomato had this to say :

The hacker has been very cooperative with us. He/she wanted us to acknowledge security vulnerabilities in our system and work with the ethical hacker community to plug the gaps. His/her key request was that we run a healthy bug bounty program for security researchers.

We are introducing a bug bounty program on Hackerone very soon. With that assurance, the hacker has in turn agreed to destroy all copies of the stolen data and take the data off the dark web marketplace. The marketplace link which was being used to sell the data on the dark web is no longer available.

Zomato is now trying to increase their security measures to avoid these kind of attacks in the feature .  Lets hope they make the correct choices and this never happens again.

How to Protect Yourself From Ransomware

The Big Issue: Ransomware

With the wanna cry ransomware outbreak this week and many people vulnerable to the attack  many people are very paranoid in using their computer fearing they might get infected as well. Not to worry though here are some steps you can take in order to protect yourself:

Step 1: Install Anti-Virus / Anti-Malware


Install a good anti-virus and anti malware  software on you computer . You don’t have to break the bank to have a good anti-virus and anti – malware software there are many out there that are free to use such as Sophos home and Malware bytes . Having one install can mostly likely stop the virus or block before it runs but that all depends on the virus off coarse . Both Sophos and Malware byte integrate with your browser and filter the web-pages blocking any websites that might contain viruses or malicious javascript  .

Step 2 :  Stop Clicking Suspicious links

Stop opening suspicious links  or attachment sent to you by email or instant messages . Think about for a bit do you really order something from UPS/DHL etc that they need you to check it out via email ? Hackers are sending these emails that try to convince users to open suspicious attachments that contain the virus . Don’t be stupid think twice before opening any email attachment especially if its from some random person you don’t even know .

Step 3 : Upgrade your system

Install the latest updates for your system and consider upgrading your system . Most of the users affected by the Wannacry ransomware are people using outdated operating systems such as windows XP and windows 7 which Microsoft has stopped rolling out updates a while ago . Since the attack Microsoft was forced to release patches for the Operating Systems to stop the virus from spreading . Its quite logical that many companies might still use older operating systems because of driver issues with older hardware which still work and there is no need to change them , if that is the case then proper network security should take place that will prevent a virus from spreading if the older system does manage to be infected.

Step 4 : Switch to Linux

I can not stress how much more secure Linux is and how stable it is . Sure there are viruses out there for Linux and Mac but they are much less in comparison to Windows Os and for good reason , since the user base is much smaller . Linux might not be for everyone but there is a Linux Distribution out there that can fit the needs of any individual be it playing games, composing music , running a server etc.



Types of Web Hosting

Web hosting is a service that allows individuals or business to host a website on the internet to promote their service and reach a broader audience from around the world. This allows the user to find information about a service with a simple search on the web. Web hosting allows businesses to grow by promoting their services and making them available to people almost 24/7. To host a website we must first buy a domain, most hosting providers will assist the user in buying a domain name. Domain names should be short and easy to remember and be relevant to the content they will host. There are different types of hosting shared hosting , dedicated hosting and co-location hosting.

Web-hosting is not only limited to websites, it can be a website that also hosts a number of services like FTP, VPN , Email server, E – commerce website and even video hosting . Services like E-mail services are crucial for any business that need to be more professional in setting an image for itself for example a business is more reputable if it uses its own email provider than a free one like gmail ( than

Types of web hosting

Shared hosting is hosting on a server that is shared by multiple users at the same time pricing is much cheaper but lacks in resources and cannot function with a heavy load and also has limited storage space to build large websites with multiple services ,although there are multiple plan with more storage space and computing power they might still not be enough to host heavy usage websites.

Dedicated hosting is hosting on a dedicated server that is only used by one person and is easy to to expand and load with more services as it will have its own physical server . You have the entire web server to yourself and is recommended for High traffic and resource intensive websites and it offers more security options .

VPS hosting (Virtual private server) is an advanced variation of shared hosting , essential you are still sharing a physical server with other users but you website has its own partition on the web server taking up more CPU power and Ram. Websites using VPS hosting does not compete for resources with other websites , what that means is if there is a large amount of traffic into a VPS websites that shares the same physical server with you your bandwidth will not be affected .

Managed Word press hosting are specialized services that offer hosting for only worpress sites. They give an excellent hosting environment to the user with rich features and staff with lots of expertise to help the use fix any issues it might have with the website. But it the most expensive since you have a dedicated team of support for you website .