VSCO Open Studio, Oakland, Calif. VSCO Afraid of missing out on the latest photo industry news while you’re out, well, actually taking pictures? Photo FOMO is all the news you might have missed this week, published on the weekends. Alongside the biggest stories of the week, like the Olympus PEN E-PL9, Apple ProRes Raw, Premiere Pro’s A.I.-powered color matching, Lightroom’s new camera profiles and Gnarbox 2.0, find briefs on the latest in accessories and photo industry news from this week with Photo FOMO. VSCO’s new open studio in Oakland is totally free to use Real estate in the Oakland, California area is expensive — but mobile photo editing company VSCO is launching a space that photographers can use for free. The VSCO Open Studio is available for non-commercial projects, allowing photographers to reserve a four-hour slot in the space. The space, located inside VSCO headquarters, has a mounted seamless background and also includes gear to borrow. VSCO says the studio helps support the company’s mission to equip creators with the tools they need. VSCO had a similar studio in New York but closed the space when the New York offices closed last year. At the time, the company said it was planning to reopen the studio at the company headquarters — and now that day is here. Camera sales are dropping — again Camera sales finally showed signs of stabilizing in 2017 after years of decline but the latest Camera and Imaging Products Association numbers show early 2018 sales aren’t as promising. Sales for all cameras in January were about 70 percent of the sales during the same time last year, with February slightly better at about 73 percent of last year’s numbers. Eliminate the compact point and shoots and those numbers are less depressing — with 80 percent in January and 94 percent of the 2017 sales for the first two months of the year in interchangeable lens cameras only. In February, camera sales for fixed lens cameras were nearly half of the number sold the previous year at 55 percent. MIOPS latest trigger is just for splash photography MIOPS A single drop of water can create a visual photo subject — and camera remote company MIOPS is making it easier to control everything from the size of that water droplet to when it falls. The MIOPS Splash is a water drop kit photographers can control with a smartphone. The Splash controls the water droplet while also triggering the camera or a flash. Using the app, photographers can control the size and timing of a single drop or two subsequent drops of water. The MIOPS Splash retails for $79, with the mount adding another $20. Google’s computer vision is probably better than you are at classifying bowls of ramen Computer vision can recognize faces and label objects but one researcher recently created a program that can tell just from a photo which restaurant a dish of ramen came from. Using Googles AutoML Vision, Kenji Doi, a data scientist, decided to see how well the artificial intelligence could recognize different bowls of ramen. After just a day of training, the computer was able to guess correctly 95 percent of the time which location of a Tokoyo-based chain ramen restaurant came from. Doi suggests the software distinguishes on the chains different locations by looking at topping placement and the meat on top. Free stock photo platform Unsplash now has an iOS app Unspalsh is known for its selection of free stock images and now those images are easier to browse from an iPhone or iPad. This week, Unsplash launched an iOS app. Unlike the platform’s earlier apps for wallpapers and for Apple TV, the new iOS Unsplash app allows users to browse and download stock images from the platform, including a drag-and-drop download option. Photographers could win a free photo trip with the #CaptureDedication contest Photo software Capture One is hosting a free photo contest on Instagram and the grand prize winner gains a photo workshop trip. The grand prize in the #CaptureDedication contest is a trip to either Shanghai or California with photographer Paul Reiffer. During the trip, the photographer will also have access both Reiffer’s expertise and Phase One XF gear. The winner will also get a Capture One Pro license. The second place prize is a Wacom MobileStudio Pro 16 and Capture One Pro software, while the third prize is a Wacom Intuos Pro and the software. To enter, photographers simply need to share an image on Instagram with the hashtag #CaptureDedication with an explanation of why the image is special and how it shows your dedication. Winners will also need to follow @Captureonepro on Instagram. The contest closes at the end of the day April 23. Spark now supports square videos Square aspect ratios just fit better inside that social media scroll, so Adobe Spark Video is enabling the 1:1 aspect ratio. Adobe cited a recent study suggesting square videos see around 30 percent more views and between an 80 and 100 percent increase in engagement. The new aspect ratio is under the resize option inside Spark Video. Editors’ Recommendations https://www.digitaltrends.com/photography/photo-fomo-april-6-2018/
Posts by :
Cambridge Analytica’s use of data mined from a third-party app is drawing scrutiny to Facebook’s privacy practices in what the network now says could affect as many as 87 million people. So what should users know? The post 9 things to know about Facebook privacy and Cambridge Analytica appeared first on Digital Trends.
Malarie Gokey/Digital Trends Malarie Gokey/Digital Trends LG pulled out all the stops to deliver one of 2017’s best smartphones in the G6. With its breakthrough design, massive display for its size, excellent wide-angle camera, and dependable performance, it was a return to form for the company that had something of a misstep with 2016’s G5. Almost as soon as the LG G6 hit the market in March 2017, rumors began to swirl about the company’s next top-of-the-line handset. With just weeks until it’s anticipated announcement it looks like the LG G7 ThinQ is going to be a huge departure from it’s predecessor. Here’s what we know about the LG G7 so far. Specs This is interesting. Article/video from an Israeli journo at MWC showcasing the LG G7 (Neo). May be the device LG scrapped in favor of Judy. [h/t: @Hanan_haber]https://t.co/fNng7jw9As — Evan Blass (@evleaks) February 28, 2018 Will the LG G6 replacement be a flagship phone, with Galaxy S9-challenging specs? A report from Venture Beat has shed some light on what we should expect from the phone, stating it will use a Qualcomm Snapdragon 845 processor, along with dual rear-facing camera, water resistance, and stereo speakers. This corroborates previous reports. LG worked with Qualcomm on the chipmaker’s current Snapdragon 845 processor, industry sources told South Korea’s Aju Business Daily. According to the report, the two companies started working together in May 2017. The Snapdragon 845 processor will provide a “25-percent performance uplift” over last year’s Snapdragon 835. The chip features an X20 LTE modem, which will offer provide gigabit connectivity on supported networks. In addition to the Qualcomm processor, this source suggests other specs for the LG 7 ThinQ, including 4GB of RAM and 64GB storage, plus a 3,000mAh battery. An LG G7 Plus may have 6GB of RAM and 128GB storage space. Tech Radar LG appears to be focusing heavily on A.I. in the upcoming G7 if we can trust rumors from GSMArena. The site reports the G7 will have deep Q voice and Q lens integration. There will also be a dedicated A.I. key on the phone, which we’re assuming may serve a similar function as Bixby Key. The most recent leaked images, courtesy of Tech Radar appear to confirm the key. While an early report from The Investor claimed the G7 would have an OLED display, like Samsung’s Galaxy S8 and the iPhone X, newer reports indicate this may not be the case. Older rumors suggested LG may adopt a new type of display, called “MLCD+”, being capable of a high brightness while saving on battery life. However, the most recent reports say LG may be ditching that idea too, in favor of much cheaper LCD panels. The industry trend has shifted toward OLED technology, which offers improved contrast, power efficiency, and thinner screens — but at the expense of, well, expense. A 5.8-inch OLED panel for the iPhone X costs over twice as much as a 5.5-inch LCD display for the iPhone 8 Plus, and it’s clear that a shift back to LCD technology is a cost-cutting move from LG. A report from Chinese tech site ETNews suggests the LG may actually release two different versions of the LG G7: An LCD budget model, and a more expensive OLED model. The site claims LG will release two devices to offer more options for users and increase revenues for the company. Other than display differences, ETNews claims the phones will be largely the same. While this rumor is definitely possible, we’re taking it with a grain of salt for now. Design Techno Buffalo With the LG G7 ThinQ likely weeks away, plenty of renders have made their way online. One of the most recent, created by Ben Geskin for Techno Buffalo, shows the G7 taking serious design inspiration from the iPhone X. While it is not official, Geskin based the renders on current rumors as well as information gleaned from the LG device spotted at MWC 2018. This isn’t the first time we’re seeing what may be the LG G7 ThinQ though, Despite reports that the LG G7 ThinQ would not make an appearance at MWC 2018, it seems that some people did manage to sneak a look at what is being assumed is the LG G7. The device seen by Ynet sports a weirdly large 19.9 resolution, and — unfortunately for notch-haters — features a notch at the top of the screen. However, recent reports suggest that the notch may be “optional”, and users may be able to turn those portions of the screen completely off. Still, the 6-inch display seems set to impress regardless of design controversies, with Ynet reporting that LG has managed an incredibly high pixels-per-inch measurement of 900 — making this an exceptionally sharp display. The design has two vertically aligned cameras on the rear, with a fingerprint sensor just below it. If this was the design for the LG G7 ThinQ then it may explain why LG pulled the phone, citing a redesign — it looks very similar to the iPhone X. We’re not the only people to think that, as Evan Blass of Venture Beat postulated that this could well be the previously pulled LG G7 design. However, that begs the question of why LG would bother to bring a failed design to a trade show, even if it was to only show to a select few. The veracity of these claims also must wait to be seen, as it’s not at all clear how reliable these claims are. Camera There’s little to report on at this stage, save for the rumors of a device with dual 16-megapixel cameras and a front-facing wide-angle 8MP selfie camera. According to a rumor from GSMArena, the rear-cameras on the LG G7 ThinQ will have a 1.5 aperture, meaning the phone will take good shots in low-light. These are impressive specs for a camera phone, but there’s little to back up these particular rumors at this date — especially if this is the model of the G7 that was cancelled in favor of the “Judy” update. Name Tech Radar While we’ve listed the phone as the “LG G7,” earlier rumors from The Investor said that’s unlikely to be the name of the successor to the LG G6. LG was reportedly looking into retiring the “G” part of the name in favor of a double-digit name that would bring the LG phone parallel with the higher numbers on the iPhone X and upcoming Galaxy S9. That rumor however appears to be unfounded now Tech Radar has leaked an image of the boot screen of the upcoming phone showing its name as the LG G7 ThinQ. This seems to confirm the early leak, also spotted by Techradar that showed a now-deleted part of the LG website that listed “Future LG G7” as being compatible with QuickCharge 4.0. Clearly, this wasn’t meant to be made public as the link is now dead. An LG spokesperson said in a statement to PocketNow that device names are never set in stone before a product launch, in response to the apparent gaffe. Android Police also noticed an app listing for LG Pay mentioned the LG G7, adding more fuel to that particular fire. That listing has now been removed. Release date and availability When will the LG G7 ThinQ arrive? The phone didn’t launch at Mobile World Congress in February, with LG choosing to show the LG V30S ThinQ instead. If the latest report from the Chinese paper The Chosunilbo are correct, we should see the LG G7 at the end of April or beginning of May. The Chosunilbo claims the unveil date was garnered from an unnamed LG executive This seems to line up with an earlier rumor from South Korean source ETNews, which claims LG is showing the completed phone to networks in March, although it’s also possible the phone will be revealed at the end of April. A launch event location is also still being finalized. That’s all the information we have on the LG G7 at the moment, but we’ll continue to update this article over the coming months as we hear more. Updated on April 6: Added leaked images. Editors’ Recommendations https://www.digitaltrends.com/mobile/lg-g7-news/
If you tried to log into your Tinder account yesterday, you likely saw an error message that reads, “Facebook Permissions. Tinder requires you provide additional Facebook permissions in order to use a Tinder account.” The post Hearts broke because Facebook made it hard for Tinder users to log in appeared first on Digital Trends.
Social Media Management
More business’s today are realizing the importance of Social Media. Not only does it expand the visibility of your company on the internet but many gain new clients and revenues through social media that they never would have reached in the past.
Did you know that search engines now use social media as a major factor in ranking a company’s website? The problem most businesses find however is either lack of time and sporadically post, not knowing what and when to post or not posting at all.
We do the posting of viral content to 19 of the leading social media platforms. The goal of this strategy is to help in gaining exposure and brand awareness for you, your company, your products and/or your clients. This do it for you solution allows you to use your time more productively and not have to worry about your social media presence.
Cyber Security and System Management
Cyber Pros Consulting is a proud Certified Partner with Comodo Security Products. We offer total security solutions to our clients protecting them from all virus and malware including Zero-Day Threats and Ransom-ware protection at an enterprise level without the enterprise price.
Did you know your FREE antivirus does not usually protect you from RANSOMWARE? Every so called FREE antivirus I’ve seen does not protect you from ransomware unless you buy their premium product. If you are relying on one of these FREE antivirus platforms you are at risk and I prime target for hackers to infect your system and steal your files.
Do you know how your current antivirus software detects virus’s on your computer? Most antivirus programs work on a default allow platform. What this means is when a new virus is created they learn about it at your expense. They rely on computers to become infected to find the new virus’s and then find a solution to protect you from it. Your computer could be next.
Default Allow Antivirus just does not cut it in today’s world of Cyber Terrorists! Comodo uses a default deny platform to keep you safe. If Comodo doesn’t know the file it will run it in our containment platform until it passes our Valkyrie and human threat assessment. keeping your computer safe from all unknown threats. Your systems could never be safer! With over 85 Million endpoints protected with ZERO infections the proof is in the pudding.
Comodo Protection just can’t be beat!
Coupled with our computer maintenance services your computer will be safe and fast all the time.
We maintain your computers daily and monitor any issues that may arise on your computer systems including virus monitoring. With this service we offer basic remote repairs at no extra charge. If you are experiencing issues with your computer, contact your dedicated technician who will assess the problem and if he can repair the issue remotely he will do so at no extra charge. It’s all part of your package.
It’s like having your own computer technician on staff without paying the large price to hire one.
Web Design and Web Hosting
Our sister company Easy Hosting 123 offers the world’s most affordable web hosting on the planet.
Easy Hosting 123 also offers web design services. We have been making custom websites for clients for over 6 years. With Hundreds of happy clients, we are confident we can build you the site of your DREAMS!
Why do we have satisfied clients? First, WE CARE WHAT YOU THINK! We don’t just make a website and bam there you go thanks for your money like other designers. Our job isn’t done until you are happy and we will keep going until you are! We work closely with you through the whole process, Design, Pictures, and Content.
Business VOIP Phone Systems
Our other sister company PBX Planet offers world class affordable business phone systems to home, small, and large businesses alike.
Our cloud PBX revolutionizes your office phone system allowing for better, call management, user and caller experience, and smooth device integration. —all at a fraction of the cost of outdated PBX hardware. Your NEW PBX is easily administered across all your locations without having to pay for any of the expensive equipment. Just checkout some of the great new features you will be able to look forward to in your new system!
Voicemail to Email
Music on Hold
Caller ID Block
Cell Phone Integration
Set Caller ID
Toll Free Numbers
Do Not Disturb
Dynamic Caller ID
International Long Distance
Local or Geographic Number
Multiple Devices on One Extension
Phone Number Porting
Work from Anywhere
Better & More Affordable, PBX Planet prides itself in providing the best and most reliable PBX service in the market. See why we’re CONNECTING THE PLANET.
Protect yourself! Visit www.cyberprosconsulting.com today! A lot of social engineering draws its plausibility from current events. Some of these are as predictable as the calendar. Valentine’s Day? Here’s a quick link to get you those flowers and candy you forgot about. Tax season? Hey, it’s us, the IRS. March Madness? Click here to share your bracket (come on, it’ll be fun). We’ve warned about all of these elsewhere. But other, more serious and less predictable events also shape phishbait. International conflict increasingly plays out in cyberspace as well as physical space. And nation-state hacking units work social engineering as much as any common criminal. The hackers, probably Russian, who intruded into the Winter Olympics networks got there by phishing. Other Russian hackers who’ve taken down sections of the Ukrainian power grid over the last few years got into the utilities’ networks by phishing. Currently an Iranian threat group, called variously “MuddyWater” or “TEMP.Zagros,” is phishing targets in the Middle East and Asia. The goal appears to be strategic intelligence. The means by which MuddyWater accomplishes its cyberespionage is a phishing email baited with a plausible, malicious Word document. When gullible recipients open the email and click the attachment, they install the spyware payload. It pays for any business to keep abreast of geopolitical events if only for this reason: they can help keep their employees aware of some likely forms social engineering will take. You may not be interested in geopolitics, but geopolitics is interested in you. One of the larger crises with significant implications for cyberspace is the current conflict between the UK and Russia over Russia’s apparent attempt to assassinate a spy and his daughter in England. Both sides are threatening cyber retaliation. Security awareness training should be as realistic and timely as possible. KnowBe4 has a Current Events phishing template category that is kept up to date with today’s breaking news items. See Comodo’s take on the correlation of attacks with current events here:
Protect yourself! Visit www.cyberprosconsulting.com today! Last summer, a petrochemical plant in Saudi Arabia was the target of a cyber attack that investigators believe was designed to sabotage the plant’s operations and cause an explosion. Iran is probably behind it. Bug in code prevents deaths The only reason the explosion did not occur was that there was a bug in the attack code. The incident is being investigated by Mandiant, Schneider Electric, the NSA, the FBI, the US Department of Homeland Security (DHS) and the Pentagon’s Defense Advanced Research Projects Agency (DARPA). Generally the Iranians use spear phishing attacks to get into their targets. The story is in the NY Times and a recommended read. Also excellent to send to your management because stories like this illustrate the need for increased IT security budget: https://goo.gl/uNs7JD
Found this article on canadianunderwriter.ca and found it very interesting thought I’d share.
The potential for “destruction of service” (DeOS) attacks is greatly concerning and organizations would be well-advised to adopt a proactive cyber stance in their protection efforts to combat increasingly sophisticated attackers, warns a new report from Cisco.
“Cyber incidents such as WannaCry and Nyetya show the rapid spread and wide impact of attacks that look like traditional ransomware, but are much more destructive,” the firm cautioned Thursday in releasing the Cisco 2017 Midyear Cybersecurity Report.
“These events foreshadow what Cisco is calling destruction of service attacks, which can be far more damaging, leaving businesses with no way to recover,” the company notes. “These could eliminate organizations’ back-ups and safety nets, required to restore systems and data after an attack,” it explains.
The WannaCry and Nyetya attacks show “adversaries are becoming more and more creative in how they architect their attacks,” Steve Martino, vice president and chief information security officer at Cisco, says in the statement.
“How DeOS attacks will play out and what they will look like depends on the threat actors’ core motivations and the limits of their creativity and capabilities,” the latest report adds.
“While the majority of organizations took steps to improve security following a breach, businesses across industries are in a constant race against the attackers. Security effectiveness starts with closing the obvious gaps and making security a business priority,” Martino comments in the statement.
Examining the latest threat intelligence gathered by Cisco Collective Security Intelligence, it offers data-driven industry insights and cyber security trends from the first six months of 2017, along with recommendations to improve security posture.
Cisco recommends that organizations take a proactive stance in their protection efforts, by doing the following:
- keeping infrastructure and applications up to date, so attackers cannot exploit publicly known weaknesses;
- battle complexity through an integrated defence and limit siloed investments;
- engage executive leadership early to ensure complete understanding of risks, rewards and budgetary constraints;
- establish clear metrics and use them to validate and improve security practices;
- examine staff security training with role-based training versus one-size-fits-all; and
- balance defence with an active response (do not “set and forget” security controls or processes).
Experience in the first half of the years shows that use of malware is evolving, with Cisco security researchers identifying “shifts in how adversaries are tailoring their delivery, obfuscation and evasion techniques. Specifically, Cisco saw they increasingly require victims to activate threats by clicking on links or opening files,” the statement explains.
“They are developing fileless malware that lives in memory and is harder to detect or investigate as it is wiped out when a device restarts.”
Related: One in four hide cybersecurity incidents from employers, global Kaspersky survey finds
Also of concern are developments around the Internet of Things (IoT), which could put certain key industries in harm’s way if steps are not taken to “improve security posture as information technology and operational technology converge,” the statement notes.
With IoT, Cisco reports key industries are bringing more operations online, thereby increasing attack surfaces and the potential scale and impact of these threats.
IoT “continues to offer new opportunities for cyber criminals, and its security weaknesses, ripe for exploitation, will play a central role in enabling these campaigns with escalating impact,” the statement notes.
“Recent IoT botnet activity already suggests that some attackers may be laying the foundation for a wide-reaching, high-impact cyber-threat event that could potentially disrupt the Internet itself,” it continues.
The report also identifies other threats that are on the rise:
- spam volumes are significantly increasing, as adversaries turn to other tried-and-true methods, like email, to distribute malware and generate revenue – the expectation is the volume of spam with malicious attachments will continue to rise while the exploit kit landscape remains in flux;
- spyware and adware bring risks to corporate environments, including stealing user and company information, weakening the security posture of devices and increasing malware infections;
- growth of ransomware-as-a-service make it easier for criminals, regardless of skill set, to carry out attacks; and
- business email compromise (BEC), a social engineering attack, involves an email designed to trick organizations into transferring money to attackers and is becoming highly lucrative.
“Revenue generation is still the top objective of most threat actors,” the report notes. “However, some adversaries now have the ability – and often now, it seems, the inclination – to lock systems and destroy data as part of their attack process.”
Related: Less than half of polled respondents confident in their company’s IT security: Cisco
“The dramatic increases in cyber attack frequency, complexity and size over the past year suggests that the economics of hacking have turned a corner,” the report notes.
Citing observations from Radware, the modern hacking community is benefiting from the following:
- quick and easy access to a range of useful and low-cost resources;
- a dramatic increase in the number of high-value, increasingly vulnerable targets putting more and more valuable information online;
- a level of maturity in the shadow economy, and with the Internet, that provides malicious actors with efficiency, security, and anonymity.
“As criminals continue to increase the sophistication and intensity of attacks, businesses across industries are challenged to keep up with even foundational cybersecurity requirements,” the statement notes.
“Malicious actors are taking advantage of that ever-expanding attack surface. The breadth and depth of recent ransomware attacks alone demonstrate how adept adversaries are at exploiting security gaps and vulnerabilities across devices and networks for maximum impact,” the report states.
“It is important for defenders to understand changes in adversaries’ tactics so that they can, in turn, adapt their security practices and educate users,” the report further advises.
Cisco’s Security Capabilities Benchmark Study – which involved surveying almost 3,000 security leaders across 13 countries – found that “across industries, security teams are increasingly overwhelmed by the volume of attacks. This leads many to become more reactive in their protection efforts,” the statement notes.
Even in the most responsive industries (such as finance and healthcare), businesses are mitigating less than 50% of attacks they know are legitimate, the findings show.
Related: Cyber-related disruption as business advantage developing in manufacturing sector: Verizon
Across most industries, breaches drove at least modest security improvements in at least 90% of organizations, the survey found. That said, some industries (such as transportation) are less responsive, falling slightly more than 80%.
Other findings include the following:
- for the public sector, 32% of the threats investigated were identified as legitimate threats, but only 47% of those legitimate threats are eventually remediated;
- for the retail sector, 32% of respondents report they had lost revenue as a result of attacks in the past year with about a quarter losing customers or business opportunities;
- for the manufacturing sector, 40% of security professionals there say they do not have a formal security strategy, nor do they follow standardized information security policy practices; and
- for the utilities sector, security professionals note that targeted attacks (42%) and advanced persistent threats (40%) were the most critical security risks to their organizations.
“Complexity continues to hinder many organizations’ security efforts,” suggests David Ulevitch, Cisco’s senior vice president and general manager of its Security Business Group.
Related: Employee awareness, training key to building a solid cyber security culture: Echols
“To effectively reduce time to detection and limit the impact of an attack, the industry must move to a more integrated, architectural approach that increases visibility and manageability, empowering security teams to close gaps,” Ulevitch advises.