CEO of Turkish Crypto Platform Flees Country as Users Say They're Locked Out

Federal police in Turkey are investigating Thodex, a cryptocurrency trading platform that handles hundred of millions of dollars in trades every day, after users complained they’d been locked out of their accounts, according to new reports from Reuters and Turkey’s TRT World news service. CEO Faruk Fatih Ozer…

Read more…

Source: Gizmodo – CEO of Turkish Crypto Platform Flees Country as Users Say They’re Locked Out

Ali Zar Discusses How To Market Your Business Online

Today, the lion’s share of marketing happens online. People look online for nearly every product and service they buy. Television, radio, and print ads still have their place, but online marketing is the wave of the future. Ali Zar explains how to market your small business online, pointing out some of the issues you may encounter and offering suggestions for avenues you should try.

Promoting Your Business on Google

Google takes 90 percent of the search engine marketing share, so, understandably, you would want to use Google for a large chunk of your online marketing. The first thing you should do to set yourself up on Google is to create and verify your business profile. This listing will be the basis for your listing on Google Maps, the local section of Google Search, and the right-side panel in search results, also known as the Knowledge Panel. This listing is free, and it has innumerable benefits for every small business.

Verifying the ownership of your listing can allow you to optimize it and receive more relevant searches. If your business shows up in the featured set of local search results on Google’s first search results page, you are ahead of the game and able to market yourself 24/7.

Build a Website

While search engines and social media are great, your company absolutely must have a website. Companies without a working, up-to-date website may be shunned in favor of companies with a respectable online presence. Even if you feel that your audience won’t want to find your website, it is foolish to cut off this important source of marketing hits.

Good business websites serve as promotional tools. They tell the story of your company and the services you offer. They have up-to-date hours, locations, menus, and contact information.

Running an online ad campaign means that you will need website landing pages. Any social media posts you make should also link back to your website. With all of this potential traffic, you can put into place easy-to-use website traffic analytics to see where your visitors are coming from, how long they stay, and whether they spend money.

Search Engine Optimization

If you are not familiar with how search engine rankings work, it is very important to learn about search engine optimization (SEO). SEO helps to align your pages with Google’s algorithms. SEO has evolved a great deal over the past twenty years, and Google and other search engines now punish techniques that worked at the inception. Take the time to read primers on SEO and look into ways to put it into use on your own website.

Social Media

Ali Zar believes that every discussion of online marketing needs to include social media. Facebook, Twitter, Instagram, and Snapchat, as well as LinkedIn are excellent ways to promote your company for free or at an affordable cost.

With social media’s advertising features, you can target your message to as narrow or as wide of a demographic as you wish. For example, you could reach female pet owners aged 45 to 54 in a certain zip code.

Running sponsored ads means that they will show up in more feeds, and while this can get expensive, the significant improvement in return on your ads will quickly be noticed.

Work on cultivating a friendly, informative social media persona. You want to relate to your customers on a personal level, or at least make it seem like you have. Your company should have a solid brand that is in alignment with your principles and your audience. Any time you can enhance your branding by posting on social media, you should do it.

Local businesses have exciting opportunities on Facebook and Instagram in particular. Many casual surfers find themselves visiting local business social media posts, clicking on the links, and buying something at their stores.

Email Marketing

The art of email marketing has also developed a great deal over the past 20 years. Today, the primary goal of many websites is to collect your contact information to add you to their email list. They may tempt you into joining the email list by giving you a special coupon, discount, or giveaway. Once you are on their mailing list, you can receive promotions that are targeted to you.

Be sure that you use a good email list manager and pay close attention to your message opening rates, reading rates, and click-through rates to judge your campaigns’ effectiveness.

Marketing Your Business Online

These are the five most basic aspects of marketing online. If you can master these five techniques, whether on your own or with a marketing agency or consultant’s help, you will be well on your way to running a successful business. Whether you are running a software company or a pizza restaurant, the basics of marketing remain the same. Ali Zar wants readers to understand that they cannot leave online marketing to chance. Keeping close tabs on your online reputation and search results can be a huge help in keeping your company afloat.  

Written by William Jones

Source: TG Daily – Ali Zar Discusses How To Market Your Business Online

NASA's Mars Helicopter Makes Second Flight

NASA successfully carried out a second flight on Mars on Thursday of its mini helicopter Ingenuity, a 52-second sortie that saw it climb to a height of 16 feet. Phys.Org reports: “So far, the engineering telemetry we have received and analyzed tell us that the flight met expectations,” said Bob Balaram, Ingenuity’s chief engineer at NASA’s Jet Propulsion Laboratory in southern California. “We have two flights of Mars under our belts, which means that there is still a lot to learn during this month of Ingenuity,” Balaram said in a statement. The US space agency conducted the first flight of the four pound (1.8 kilogram) rotorcraft on Monday, the first powered flight ever on another planet. That time Ingenuity rose to a height of 10 feet and then touched down after 39.1 seconds.

For the second flight, which lasted 51.9 seconds, Ingenuity climbed to 16 feet, hovered briefly, tilted and then accelerated sideways for seven feet. “The helicopter came to a stop, hovered in place, and made turns to point its camera in different directions,” said Havard Grip, Ingenuity’s chief pilot. “Then it headed back to the center of the airfield to land. “It sounds simple, but there are many unknowns regarding how to fly a helicopter on Mars.”

Read more of this story at Slashdot.

Source: Slashdot – NASA’s Mars Helicopter Makes Second Flight

Tesla's Autopilot System Is 'Easily' Tricked Into Operating Without Anyone at the Wheel

Consumer Reports said Thursday its researchers “easily” tricked a Tesla’s Autopilot system into driving without anyone at the wheel. The publication’s worrying demonstration comes as officials continue to investigate a fatal crash in Texas involving a Tesla that authorities believe had no one in the driver’s seat at…

Read more…

Source: Gizmodo – Tesla’s Autopilot System Is ‘Easily’ Tricked Into Operating Without Anyone at the Wheel

American Honey Is Radioactive From Decades of Nuclear Bomb Testing

An anonymous reader quotes a report from Motherboard: The world’s nuclear powers have detonated more than 500 nukes in the atmosphere. These explosions were tests, shows of force to rival nations, and proof that countries such as Russia, France, and the U.S. had mastered the science of the bomb. The world’s honey has suffered for it. According to a new study published in Nature Communications, honey in the United States is full of fallout lingering from those atmospheric nuclear tests.

For the study, researchers collected honey samples from more than 100 hives and soil samples from 110 locations across the Eastern United States. The scientists found elevated levels of cesium in both the soil and honey samples. “While most of the radiation produced by a nuclear weapon detonation decays within the first few days, one of the longest-lived and more abundant fission products is [cesium] , which has a radioactive half-life of 30.2 years,” the study said. Previous research after the Chernobyl nuclear disaster identified elevated levels of cesium in European honey and pollen. The good news is that, according to researchers, most of this honey is probably safe for humans to consume. “While the concentrations of [cesium] we report in honey today are below the…dietary threshold level of concern observed by many countries, and not evidently dangerous for human consumption, the widespread residual radiation…is surprising given that nearly 2 half-lives have elapsed since most of the bomb production of [cesium],” they said. Interestingly, the researchers “also found an inverse relationship between the amount of potassium naturally occurring in soil and the amount of fallout found in honey,” the report says. “Southern states contained three times the amount of fallout that the northern states did. Southern soil doesn’t contain much potassium while soil in the north is rich with the stuff. While this honey is probably safe for human consumption, it may not be for the bees who generate it.”

Read more of this story at Slashdot.

Source: Slashdot – American Honey Is Radioactive From Decades of Nuclear Bomb Testing

Consumer Reports Shows Tesla Autopilot Works With No One In the Driver's Seat

Rei_is_a_dumbass shares a report from Ars Technica: Last Saturday, two men died when a Tesla Model S crashed into a tree in a residential neighborhood. Authorities said they found no one in the driver’s seat — one man was in the front passenger seat, while the other was in the back. That led to speculation that the car might have been under the control of Tesla’s Autopilot driver-assistance system at the time of the crash. Elon Musk has tweeted that “data logs recovered so far show Autopilot was not enabled.” Tesla defenders also insisted that Autopilot couldn’t have been active because the technology doesn’t operate unless someone is in the driver’s seat. Consumer Reports decided to test this latter claim by seeing if it could get Autopilot to activate without anyone in the driver’s seat. It turned out not to be very difficult.

Sitting in the driver’s seat, Consumer Reports’ Jake Fisher enabled Autopilot and then used the speed dial on the steering wheel to bring the car to a stop. He then placed a weighted chain on the steering wheel (to simulate pressure from a driver’s hands) and hopped into the passenger seat. From there, he could reach over and increase the speed using the speed dial. Autopilot won’t function unless the driver’s seatbelt is buckled, but it was also easy to defeat this check by threading the seatbelt behind the driver. “In our evaluation, the system not only failed to make sure the driver was paying attention, but it also couldn’t tell if there was a driver there at all,” Fisher wrote in a post on the Consumer Reports website.

Read more of this story at Slashdot.

Source: Slashdot – Consumer Reports Shows Tesla Autopilot Works With No One In the Driver’s Seat

Flaws In John Deere's Website Provides a Map To Customers, Equipment

chicksdaddy shares a report from The Security Ledger: Websites for customers of agricultural equipment maker John Deere contained vulnerabilities that could have allowed a remote attacker to harvest sensitive information on the company’s customers including their names, physical addresses and information on the Deere equipment they own and operate, The Security Ledger reported. The researcher known as “Sick Codes” published two advisories on Thursday warning about the flaws in the website and the John Deere Operations Center website and mobile applications. In a conversation with Security Ledger, the researcher said that a he was able to use VINs (vehicle identification numbers) taken from a farm equipment auction site to identify the name and physical address of the owner. Furthermore, a flaw in the website could allow an unauthenticated user to carry out automated attacks against the site, possibly revealing all the user accounts for that site. Sick Codes disclosed both flaws to John Deere and also to the U.S. Government’s Cybersecurity and Infrastructure Security Agency (CISA), which monitors food and agriculture as a critical infrastructure sector. The information obtained from the John Deere websites, including customer names and addresses, could put the company afoul of data security laws like California’s CCPA or the Personal Information Protection Act in Deere’s home state of Illinois. However, the national security consequences of the company’s leaky website could be far greater. Details on what model combines and other equipment is in use on what farm could be of very high value to an attacker, including nation-states interested in disrupting U.S. agricultural production at key junctures, such as during planting or harvest time. The consolidated nature of U.S. farming means that an attacker with knowledge of specific, Internet connected machinery in use by a small number of large-scale farming operations in the midwestern United States could launch targeted attacks on that equipment that could disrupt the entire U.S. food supply chain, researchers warn. The Agriculture sector and firms that supply it, like Deere, lag other industries in cyber security preparedness and resilience. A 2019 report (PDF) released by Department of Homeland Security concluded that the “adoption of advanced precision agriculture technology and farm information management systems in the crop and livestock sectors is introducing new vulnerabilities” (and that) “potential threats to precision agriculture were often not fully understood or were not being treated seriously enough by the front-line agriculture producers.”

Read more of this story at Slashdot.

Source: Slashdot – Flaws In John Deere’s Website Provides a Map To Customers, Equipment

UK Court Agrees to Hear Copyright Lawsuit Brought by Self-Proclaimed Bitcoin Inventor

Many people have claimed to be Satoshi Nakamoto, the anonymous creator or creators behind the digital cryptocurrency bitcoin, over the years. Now London’s High Court has agreed to hear out one of the most vocal (and disputed) claimants to the pseudonym in a lawsuit over alleged copyright infringement, according to a

Read more…

Source: Gizmodo – UK Court Agrees to Hear Copyright Lawsuit Brought by Self-Proclaimed Bitcoin Inventor

Man Sues Apple For Terminating Apple ID With $24K Worth of Content

According to a complaint filed on Tuesday, Apple user Matthew Price spent nearly $25,000 on content attached to his Apple ID, which was terminated by the company for unknown reasons. The lawsuit targets a clause in Apple’s media services terms and conditions, which states a user with a terminated Apple ID cannot access media content that they’ve purchased. AppleInsider reports: “Apple’s unlawful and unconscionable clause as a prohibited de facto liquidated damages provision which is triggered when Apple suspects its customers have breached its Terms and Conditions,” the lawsuit reads. Additionally, the complaint claims that users with Apple devices will find their products “substantially diminished in value” if their Apple IDs are terminated, since they won’t be able to access Apple services or purchased content.

According to the complaint, the $25,000 worth of media included apps, in-app purchases, programs and platform extensions, and related services. The plaintiff also alleges that Apple prevents users from accessing unused funds attached to an Apple account. Price, for example, had about $7 in iTunes credit. The lawsuit doesn’t specify why Price’s account was terminated. However, it does claim that Apple shut down the Apple ID “without notice, explanation, policy or process.” It goes on to claim that Apple’s conduct — specifically, the clause and resulting terminations — are “unfair, unlawful, fraudulent, and illegal,” and alleges that Apple is in violation of several consumer regulations in California. The lawsuit is seeking class action status, with a Nationwide Class consisting of people in the U.S. who have had their Apple IDs terminated.

Read more of this story at Slashdot.

Source: Slashdot – Man Sues Apple For Terminating Apple ID With K Worth of Content

Look, Apple Isn't Going to Put macOS on the iPad

After Apple announced this week that both its new iMac and iPad Pro lineup were getting its stellar M1 processor, a lot of people speculated if that meant the company was getting ready to put macOS on the iPad. And look, maybe that would be a great thing—a touchscreen Mac at long last!—but Apple is definitely not…

Read more…

Source: Gizmodo – Look, Apple Isn’t Going to Put macOS on the iPad

Samsung's New Upcycling Program Allows You To Turn An Old Galaxy Phone Into a New IoT Device

An anonymous reader quotes a report from Gizmodo: Today, with the expansion of its Galaxy Upcycling at Home service (which is still in beta), users in the U.S., U.K., and South Korea will get access to an experimental feature in the SmartThings app designed to give an old Galaxy handset new life as a useful smart home accessory. By using the app to reconfigure the device’s battery usage and optimization, Samsung says even older devices will still be able to deliver good longevity, while the phone’s usual assortment of wireless connectivity features makes it easy to pair the phone with other devices in your home.

In the SmartThings app, Samsung provides a range of functions that an old smartphone can perform, including serving as a light sensor that can automatically turn on your smart lights or even your TV when it gets dark. Alternatively, you can also convert an old Galaxy phone into a sound sensor, with the phone using AI to detect common household noises like a barking dog, crying baby, or a knock on the door. In this way, you can also repurpose an old Samsung phone as a baby monitor of sorts […]. And of course, even without much fiddling, upcycled Samsung phones can also be used as universal remotes, providing an easy way to control your streaming video box, play music on your smart speakers, control your lights, and more.

Read more of this story at Slashdot.

Source: Slashdot – Samsung’s New Upcycling Program Allows You To Turn An Old Galaxy Phone Into a New IoT Device

The Fantastical First 10 Minutes of Netflix's Shadow and Bone Are Here

The much-anticipated series adaptation of Leigh Bardugo’s Shadow and Bone arrives tomorrow—which is really only a few hours away at this point—but superfans can get a sneak peek at the first 10 minutes right now. Netflix just streamed a cast event that was capped with the big reveal.

Read more…

Source: Gizmodo – The Fantastical First 10 Minutes of Netflix’s Shadow and Bone Are Here

A New Facebook Bug Exposes Millions of Email Addresses

Still smarting from last month’s dump of phone numbers belonging to 500 million Facebook users, the social media giant has a new privacy crisis to contend with: a tool that, on a massive scale, links Facebook accounts with their associated email addresses, even when users choose settings to keep them from being public. Wired reports: A video circulating on Tuesday showed a researcher demonstrating a tool named Facebook Email Search v1.0, which he said could link Facebook accounts to as many as 5 million email addresses per day. The researcher — who said he went public after Facebook said it didn’t think the weakness he found was “important” enough to be fixed — fed the tool a list of 65,000 email addresses and watched what happened next. “As you can see from the output log here, I’m getting a significant amount of results from them,” the researcher said as the video showed the tool crunching the address list. “I’ve spent maybe $10 to buy 200-odd Facebook accounts. And within three minutes, I have managed to do this for 6,000 [email] accounts.”

The researcher […] said that Facebook Email Search exploited a front-end vulnerability that he reported to Facebook recently but that “they [Facebook] do not consider to be important enough to be patched.” Earlier this year, Facebook had a similar vulnerability that was ultimately fixed. “This is essentially the exact same vulnerability,” the researcher says. “And for some reason, despite me demonstrating this to Facebook and making them aware of it, they have told me directly that they will not be taking action against it.”

In a statement, Facebook said: “It appears that we erroneously closed out this bug bounty report before routing to the appropriate team. We appreciate the researcher sharing the information and are taking initial actions to mitigate this issue while we follow up to better understand their findings.” A Facebook representative didn’t respond to a question asking if the company told the researcher it didn’t consider the vulnerability important enough to warrant a fix. The representative said Facebook engineers believe they have mitigated the leak by disabling the technique shown in the video.

Read more of this story at Slashdot.

Source: Slashdot – A New Facebook Bug Exposes Millions of Email Addresses

In Sci-Fi Short Muse, an Android Finds Good Reason to Rebel

Kay (Taj Atwal) may be an android, but her moral compass proves stronger than the increasingly unstable artist (Paul Ready) who claims she’s his muse—even though his eerie paintings hint at something far darker lurking behind his methods. That’s the set-up for Muse, a new sci-fi short by Azhur Saleem.

Read more…

Source: Gizmodo – In Sci-Fi Short Muse, an Android Finds Good Reason to Rebel

Astronauts are about to launch on a used rocket, inside a used spacecraft

SpaceX and NASA say they are ready for the launch of four astronauts to the International Space Station early on Friday morning.

This Crew-2 mission—comprising NASA astronauts Shane Kimbrough and Megan McArthur, Japanese astronaut Akihiko Hoshide, and European astronaut Thomas Pesquet—is scheduled to launch from Kennedy Space Center at 5:49 am EDT (09:49 UTC) on Friday. Weather conditions appear favorable, but if there is an issue SpaceX has a backup opportunity on Monday at 4:48 am EDT (08:48 UTC).

With this mission, SpaceX will be seeking to fly astronauts into orbit for the third time, following the Demo-2 mission in May 2020 and the Crew-1 mission in November. Notably, this launch will seek to reuse the Falcon 9 rocket first stage (from the Crew-1 launch) and the Crew Dragon spacecraft (from Demo-2).

Read 9 remaining paragraphs | Comments

Source: Ars Technica – Astronauts are about to launch on a used rocket, inside a used spacecraft

'Mozilla Is Hellbent On Making Their New Firefox UI Unusable'

Artem S. Tashkinov writes: Over the past ten years, Firefox market share has decreased substantially and the web browser has lost its appeal and coolness. Seeing that, someone at Mozilla probably decided that the best way to entice people back is by changing its UI, thus Firefox has already seen quite a huge number of changes despite other major web browsers staying relatively the same in terms of their visuals; i.e. Google Chrome and Apple Safari look almost the same as they did a decade ago. The most substantial redesign, which is being prepared for the next release, called Proton, promises to drive most power users away because it’s broken on a number of levels and makes using the browser a very unpleasant experience.

So, what has changed:
– The compact density option for the address bar is now gone, and not only that, the title bar is now a lot taller than before. Overall, vertically, the title bar and address bar now take almost a dozen pixels more than previous Firefox releases, which steals very precious vertical space.

– The floating tabs. The active tab is now totally disconnected from the active web page and it looks out of place.

– The inactive tabs now completely lack a delimiter between them; and in the case of websites lacking a favicon, all inactive tabs look like one, which makes understanding what’s open and what to click very difficult and time consuming.

– Mozilla has removed icons from menus, which makes navigating them slower and more difficult. Human beings can easily recognize and memorize icons, and now instead you have to read 20 menu items and try to understand what you actually need to click. Just to illustrate it, check how Firefox 88 looks and what is up and coming.

It surely looks like whatever UX studies Mozilla has done were either not run properly, or the data being collected was not properly understood. Mozilla has disabled feedback for Firefox, they’ve made it abundantly clear that you cannot leave comments in their Bugzilla, and considering they want to deprecate userChrome.css, it makes it impossible to restore the semblance of a good web browser experience. The Slashdot crowd loves free and open-source web browsers, so the question is, how can we make the company stop maiming and destroying their most important product?

Read more of this story at Slashdot.

Source: Slashdot – ‘Mozilla Is Hellbent On Making Their New Firefox UI Unusable’