Back to Top

Tech, Web, Cloud & Cabling Services

Category: News

End of Support: Server 2003

end windows server 2003

 

A large number of businesses still run Microsoft MSFT -1.71% Windows Server 2003 and it’s unlikely they all will upgrade before Microsoft Corp. ends support on July 14, 2015, say analysts. Companies that don’t upgrade increase their cyber security risks because the company will no longer issue security updates and these systems will be more vulnerable to hackers.

Businesses worldwide run an estimated 23.8 million physical and virtual instances of Windows Server 2003, according to data released by Microsoft in July 2014. Analysts say the technology is more prevalent in industries such as health care, utilities and government. Yet it’s also still used in about 7% of retail point of sale systems, according to a report Thursday by Trend Micro Inc.4704.TO -1.11%

“Microsoft does not plan to extend support for Windows Server 2003 and encourages customers who currently run Windows Server 2003 and have not yet begun migration planning to do so immediately,” said Vivecka Budden, a Microsoft spokesperson, in an email.

South Jersey Techies offers various migration options to include Windows Server 2012 R2, Microsoft Azure, hosting partners and Office 365.

“It is going to be difficult to get this done in time,” said David Mayer, practice director of Microsoft Solutions at Insight Enterprises Inc.NSIT -1.12%, a provider of IT hardware, software and services.

Many of these same industries were impacted by the end of service for the Windows XP operating system on April 8.  Microsoft broadcasts these sorts of moves years in advance, so it shouldn’t come as a surprise to anyone. But, the product was stable and for many companies there simply wasn’t incentive to update.

“In general, everyone has been slow to migrate, especially those with servers that are running applications,” said Rob Helm, vice president of research at Directions on Microsoft consulting firm.

The problem in industries such as health care and utilities is that companies run legacy apps written by vendors who still require Windows Server 2003. For example, there are smaller vendors in health care that have not kept up with development and application modernization, said a health-care CIO who asked not to be identified. A hospital may have an inventory of 100 to 500 different applications and many applications will still require Windows Server 2003, he added.

Electric utilities, for example, widely use Windows Server 2003. There hasn’t been much movement to upgrade those systems, said Patrick C. Miller, founder of the nonprofit Energy Sector Security Consortium and a managing partner at The Anfield Group, a security consulting firm. Instead, utilities are working to better secure and isolate those systems.

“I’m concerned about directory services such as application authentication and user permissions,” said Mr. Miller. “If you compromise an Active Directory server, you get access to everything.”

For now, analysts are recommending that companies work out their risk of exposure and make plans to first migrate those applications that will be most difficult. Companies should make plans to harden servers that can’t be updated. That might entail putting those systems on an isolated network, where they’d be less prone to outside attack, said Mr. Helm.

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.

 

Mac Office 2011 Support Ends Oct 10

End of support is sneaking up on enterprise employees running Office on a Mac

Companies that have employees running Office for Mac 2011 have just over 100 days to replace the suite’s applications with those from last year’s upgrade, Office for Mac 2016.

Support ends for Office for Mac 2011 on Oct. 10, a date that Microsoft first stamped on the calendar two years ago, but has not widely publicized since. As of that date, the Redmond, Wash., developer will cease supplying patches for security vulnerabilities or fixes for other bugs.

The individual applications — Excel, PowerPoint, Outlook and Word — will continue to operate after support ends, but companies will be taking a risk, however small, that malware exploiting an unpatched flaw will surface and compromise systems.

To receive security and non-security updates after Oct. 10, IT administrators must deploy Office for Mac 2016 or instruct workers covered by Office 365 to download and install the newer suite’s applications from the subscription service’s portal.

Office for Mac 2011’s end-of-support deadline was originally slated for January 2016, approximately five years after the productivity package’s release. But in the summer of 2015, when it was clear that 2011’s successor would not be ready by early 2016, Microsoft extended its lifespan by 21 months. At the time, Microsoft cited the long-standing policy of supporting a to-be-retired product for “2 years after the successor product is released” when it added time to 2011.

Mac users: Steerage Class

The impending cutoff for Office for Mac 2011 is an issue only because Microsoft shortchanges Office for Mac users. Unlike the Windows version of Office, which receives 10 years of security support, those that run on macOS are allotted half that. Microsoft has repeatedly classified Office for Mac as a consumer product to justify the half-measure, even for the edition labeled “Home and Business.”

Nor does Microsoft update and service Office for Mac for corporate customers as it does the far more popular Windows SKU (stock-keeping unit). The latter will be upgraded with new features, Microsoft said in April, twice each year for enterprise subscribers to Office 365 ProPlus, with each release supported for 18 months before giving way to a pair of successors.

Mac editions, however, are refreshed with new tools at irregular intervals, often long after the same feature debuts in the same Windows application. (Recently, for example, Microsoft added a delivery-and/or-read receipt option to the Mac version of Outlook; that functionality has been in Outlook on Windows since 2013.) And because there are no regular, large-scale feature upgrades to Office for Mac, support is not curtailed by the release schedule as with Windows.

The difference between Offices — the behemoth Windows on one side, the niche Mac on the other — has been put into even starker relief recently: Microsoft has adopted March and September dates for launching new upgrades to Windows 10, Office 365 ProPlus, and last week, Windows Server, but made no similar promises for Office for Mac 2016.

It’s clearly the odd app out.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft Dictate Lets You Type by Voice

Dictate with your voice in Office

This feature is available to Office 365 Subscribers only.

 

Dictate in Word or PowerPoint

1) Turn on your microphone and make sure it works. Troubleshoot microphone settings

2) In Word 2016 or PowerPoint 2016, select Home > Dictate.

3) Wait for the icon to turn red.

4) Start talking. As you talk, text appears in your document or slide.

5) Speak clearly and conversationally. Insert punctuation by saying the name of the punctuation mark you want to add.

6) If you make a mistake while dictating, move your cursor to the mistake and fix it with your keyboard. No need to turn off the microphone.

7) When finished, select Dictate again to stop typing.

 

Dictate in Outlook

1) Turn on your microphone and make sure it works. Troubleshoot microphone settings

2) Open a new email message and select Message > Dictate.

3) Wait for the icon to turn red.

4) Start talking. As you talk, text appears in your email message.

5) Speak clearly and conversationally. Insert punctuation, by saying the name of the punctuation mark you want to add.

6) If you make a mistake while dictating, move your cursor to the mistake and fix it with your keyboard. No need to turn off the microphone.

7) When finished, select Dictate again to stop typing.

 

Troubleshooting

I don’t see Dictate, or it’s not working

If Dictate isn’t working, make sure you’re connected to the Internet.

You can enable or disable Dictate by going to File > Options and look for Office intelligent services on the General tab.

 

Important information about Dictate

Dictate is one of the Office Intelligent Services, bringing the power of the cloud to Office apps to help save you time and produce better results.

Your speech utterances will be sent to Microsoft to provide you with this service, and may also be used to improve speech recognition services. For more information see, What are Intelligent Services?

Office Dictate is not HIPAA (Health Insurance Portability and Accountability Act) compliant.

World’s Largest Meat Supplier Attacked

The breach is the latest targeting of a crucial supply chain and comes three weeks after the Colonial Pipeline hack disrupted fuel operations in the U.S.

Here’s what we know:

What is JBS?
JBS USA is part of JBS Foods, one of the world’s largest food companies. It has operations in 15 countries and has customers in about 100 countries, according to its website. Its customers include supermarkets and fast food outlet McDonald’s and in the US, JBS processes nearly one quarter of the county’s beef and one-fifth of its pork. JBS’s five biggest beef plants are in the US, and the shutdowns have halted a fifth of meat production there, according to Bloomberg.

Its brands include Pilgrim’s, Great Southern and Aberdeen Black. The US headquarters is based in Greeley, Colorado, and it employs more than 66,000 people.

What happened?
Hackers attacked the company’s IT system last weekend, prompting shutdowns at company plants in North America and Australia. IT systems are essential in modern meat processing plants, with computers used at multiple stages including billing and shipping.
JBS hack shuttered nine US beef plants but normal operations to resume Wednesday
The hack, which the White House described Tuesday as ransomware, affected all of JBS’s US meatpacking facilities, according to an official at the United Food and Commercial Workers union that represents JBS employees. The cyberattack resulted in the closure of all nine of the company’s US beef plants, which are located in states including Arizona, Texas, Nebraska, Colorado, Wisconsin, Utah, Michigan and Pennsylvania, the union official said. The company said on Monday that it suspended all affected IT systems as soon as the attack was detected, and that its backup servers were not hacked.

The White House has said that the ransomware attack was likely carried out by a Russia-based criminal organization, and that it is dealing with the Russian government on the matter.
JBS’ operations in Australia were also affected. The Australian Meat Industry Council, a major trade group, said in a statement that “there is no indication whatsoever that this cyberattack will cause a major impact on Australian domestic red meat and pork products supply.”

What is ransomware?
In a ransomware attack, hackers steal an organization’s data and lock its computers. Victims must pay to regain access to their network and prevent the release of sensitive information.
Some sophisticated ransomware hackers, such as the Russian hacker group Darkside, sell their ransomware technology and take a cut of any ransoms paid to their customers.

Experts generally encourage ransomware victims not to pay any ransom. But a company’s ability to get back online without paying hackers may depend on whether it has protected backups of its data. In some cases, hackers can delete their target’s backups before locking its files, leaving the victim organization with no recourse.

JBS did not comment to CNN about details of the ransomware attack, including whether it paid the ransom.

This kind of cyberattack sounds familiar. Where have I heard that?
The hack comes a few weeks after a ransomware attack targeted Colonial Pipeline, which forced a six-day shutdown of one of the United States’ largest fuel pipelines. That May attack resulted in gas shortages, spiking prices and consumer panic. Colonial Pipeline has confirmed it paid a $4.4m (£3.1m) ransom to the cyber-criminal gang responsible.

Similar to JBS, Colonial Pipeline’s systems were hit with ransomware. Once a company has been hit by ransomware, its first course of action is usually to take much or all of its systems offline to isolate the hackers’ access and make sure they can’t move into other parts of the network.
That may be among the reasons why JBS shut down its operations and Colonial shut down its pipeline — to disconnect the companies’ operations from the IT systems that hackers breached. People briefed on the Colonial attack have said that the company halted operations because its billing system was also compromised and feared they wouldn’t be able to determine how much to bill customers for fuel they received.
The pipeline has since returned to normal operations.

Don’t be the next victim of a ransomware attack. Contact South Jersey Techies to discuss how your critical information can be secure.

If you have any questions, please call us at (856) 745-9990.

 

 

Chrome Labels HTTP Sites ‘Not Secure

Google sends a nudge toward the unencrypted web

Starting in July, Google Chrome marked all HTTP sites as “not secure,” according to a blog post published today by Chrome security product manager Emily Schechter. Chrome currently displays a neutral information icon, but starting with version 68, the browser is warning users with an extra notification in the address bar. Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign.

Google has been nudging users away from unencrypted sites for years, but this is the most forceful nudge yet. Google search began down-ranking unencrypted sites in 2015, and the following year, the Chrome team instituted a similar warning for unencrypted password fields.

The Chrome team said the announcement was mostly brought on by increased HTTPS adoption. Eighty-one of the top 100 sites on the web default to HTTPS, and a strong majority of Chrome traffic is already encrypted. “Based on the awesome rate that sites have been migrating to HTTPS and the strong trajectory through this year,” Schechter said, “we think that in July the balance was tipped enough so that we can mark all HTTP sites.”

HTTPS encryption protects the channel between your browser and the website you’re visiting, ensuring no one in the middle can tamper with the traffic or spy on what you’re doing. Without that encryption, someone with access to your router or ISP could intercept information sent to websites or inject malware into otherwise legitimate pages.

HTTPS has also become much easier to implement through automated services like Let’s Encrypt, giving sites even less of an excuse not to adopt it. As part of the same post, Google pointed to its own Lighthouse tool, which includes tools for migrating a website to HTTPS.

 

Beware downloading some apps or risk

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Critical iPhone Spyware Fix Released

Apple has updated its software for iPhones to address a critical vulnerability that independent researchers say has been exploited by notorious surveillance software to spy on a Saudi activist.

Researchers from the University of Toronto’s Citizen Lab said the software exploit has been in use since February and has been used to deploy Pegasus, the spyware made by Israeli firm NSO Group that has allegedly been used to surveil journalists and human rights advocates in multiple countries.

The urgent update that Apple (AAPL) released Monday plugs a hole in the iMessage software that allowed hackers to infiltrate a user’s phone without the user clicking on any links, according to Citizen Lab. The Saudi activist chose to remain anonymous, Citizen Lab said.

Apple credited the Citizen Lab researchers for finding the vulnerability.

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals,” Ivan Krsti?, head of Apple Security Engineering and Architecture, said in a statement.

Krsti? said Apple rapidly addressed the issue with a software fix and that the vulnerability is “not a threat to the overwhelming majority of our users.”

Still, security experts encouraged users to update their mobile devices for protection.

In a statement, NSO Group did not address the allegations, only saying, “NSO Group will continue to provide intelligence and law enforcement agencies around the world with life saving technologies to fight terror and crime.”

The firm has previously said its software is only sold to vetted customers for counterterrorism and law enforcement purposes.

Researchers, however, say they have found multiple cases in which the spyware was deployed on dissidents or journalists. In 2019, Citizen Lab analysts alleged that Pegasus was used on the mobile phone of the wife of a slain Mexican journalist.

In a lawsuit filed in 2019, Facebook accused NSO Group of being complicit in a hack of 1,400 mobile devices using WhatsApp. (NSO Group disputed the allegations at the time.)

The proliferation of easy-to-use mobile hacking tools has given governments around the world a new and stealthy means of targeting adversaries. Sophisticated spyware made by NSO Group and other vendors has been reportedly used from Uzbekistan to Morocco.

The surge in spyware prompted a United Nations panel of human rights experts in August to call for a moratorium on the sale of such surveillance tools. The UN panel said the ban should remain in place until governments have “put in place robust regulations that guarantee its use in compliance with international human rights standards.”

Apple’s Red iPhone 7 Supports Charity

iPhone SE gets a storage boost, too.

Apple just made upgrading to an iPhone 7 a philanthropic decision by adding a red special edition to the lineup. The new red aluminum finish, which is available to order for both iPhone 7 and 7 Plus in-store and online on March 24, is a fundraising effort for the Global Fund. Apple will contribute a portion of red iPhone sales to the fight against AIDS and HIV.

The two new red iPhones will come in 128GB and 256GB storage variations and start at $749 in the U.S. Apple will sell the special editions in more than 40 countries by the end of March, with Brazil, Chile, Colombia, India, and Turkey to come in April. If you live in the U.S., U.K., or China and are part of the iPhone Upgrade Program, you’ll be able to snag an unlocked red iPhone with AppleCare+. In the U.S., the 128GB iPhone 7 will start at $37 a month with the ability to upgrade every year.

Apple has a long-standing relationship with the Global Fund and has a variety of products in its red lineup, including iPod’s, cases, headphones, and speakers. Last December, Apple celebrated its decade-long partnership with the Global Fund by donating proceeds from in-app purchases, exclusive downloads, and newly launched accessories to the nonprofit. The company has so far donated more than $130 million to the Global Fund, making it the organizations’s largest corporate donor.

You can snag a flashy new red iPhone 7 on March 24, starting at $749.

iPhone SE gets a bump, too

Apple hasn’t forgotten about the littlest phone in its lineup, the iPhone SE. The company just doubled the 4-inch phone’s storage to 32GB and 128GB, up from 16GB and 64GB. Those models will be phased out and the roomier new options will start at $399 beginning March 24.

While the flashy new color and iPhone SE upgrade aren’t the biggest iPhone news of the year—that will come in September with the 10th anniversary iPhone 8—it’s nice to see Apple add a little something extra to both its existing flagship and its entry-level phones.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Tim Cook: FBI Wanted iOS Backdoor

The most important Tech Case in a Decade

Customer Letter – Apple

February 16, 2016

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

Answers to your questions about privacy and security

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

Tim Cook

Answers to your questions about privacy and security

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

8 Ways iPhone 8 Beats Galaxy S8

The Galaxy S8 might be the best phone of 2017, but the year’s not over until the next iPhone makes its debut. Here’s how Apple can take the crown back from Samsung.

If there wasn’t already a mountain of pressure on Apple to deliver something spectacular with this year’s iPhone update, there surely is now. If you haven’t noticed, Samsung has released the Galaxy S8 and S8+, and they’re pretty remarkable. As a former iPhone 7 Plus user, the S8+ might very well be the best phone I’ve ever used, with a stunning screen, speedy processor, and, yes, a gorgeous design.

But what makes the S8 so amazing is how unique it is. For the first time in a while, Samsung is standing alone on the cutting edge with a phone that needs to be seen to be believed. From its barely there bezels to its brilliant wraparound screen, the Galaxy S8 truly gives Apple a run for its money. No joke, it actually makes the iPhone 7 look pretty stale.

But there’s still a lot of time between now and the release of the next iPhone. According to rumors, the lineup this year will consist of the usual S models along with a fantabulous iPhone 8, which looks to adopt a similar aesthetic to the Galaxy S8, with an edge-to-edge OLED display and the removal of the physical home button. But just because it might look similar doesn’t mean it can’t still be better. Here’s how Apple can still steal the crown from Samsung:

The Galaxy S8 has a killer camera but the iPhone 7 is no slouch.

Killer camera

The Galaxy S phones has always had a camera on par with the iPhone, so it was a little surprising that Samsung didn’t upgrade the S8’s all that much. The iPhone 7 Plus is already a step ahead here, with 2X optical zoom and the sublime Portrait Mode, but the iPhone 8 could really separate itself from the S8 by taking it even further. Along with a megapixel bump, Apple could add optical image stabilization to the second lens, which will go a long way toward increasing photo and zoom quality. But what would really set it apart would be a larger sensor and greater ISO range to make it a low-light leader.

The Gear VR is a big part of the S8, but AR could be the iPhone 8’s big play.

AR not VR

While Samsung is going all-in on virtual reality with the Galaxy Gear and the S8, rumors suggest that Apple is more interested in augmented reality. And that could be one of the features that sets the iPhone 8 apart. Smartphones have been slow to incorporate AR into the interface, but if Pokémon Go has taught us anything, it’s that people are way more interested in seeing the world through their screens than strapping a headset to their faces. An AR-fueled iPhone 8 could connect us to the world in fun new ways without separating us from reality.

The Galaxy S8’s fingerprint sensor is just in the worst place.

Well-placed fingerprint sensor

While the Galaxy S8 is one of the best smartphones ever made, one tragic flaw prevented it from being perfect: the placement of the fingerprint sensor. For some god-awful reason, Samsung put it right next to the camera, all but ensuring your finger will not only miss it, but also repeatedly smudge the lens. If the rumors are correct that Apple will also be removing the home button in the iPhone 8, it has two options: under the screen or on the back. A first-of-its-kind in-panel sensor would be revolutionary, but if it’s on the back, Apple needs to learn from Samsung’s mistake and put it lower, like on the Pixel.

Bixby hasn’t exactly exploded out of the gate, but it does a lot that Siri doesn’t do.

Expanded Siri

When Samsung unveiled the S8, a major part of the presentation was spent introducing its new AI assistant, Bixby. However, the new service wasn’t just a competitor to Siri, Alexa, and Google Assistant. Samsung integrated Bixby deep into the interface to let it access apps, fetch information, and cut down on how often we need to touch our phones. It’s a cool idea, except the only problem is it doesn’t really work. If Apple could do something similar with Siri and expand its reach to work inside apps while we’re using them, it could beat Bixby at its own game.

The Galaxy S8’s screen is pretty, but It also uses its software to accentuate it.

iOS 11

One of the biggest gripes people have had about Samsung’s phones has always been its TouchWiz interface. But that’s changed with the S8, as Samsung has crafted an intuitive, refined system that takes full advantage of its superb hardware. If Apple is going to release a radically redesigned iPhone with curved edges and a wraparound screen, the same old iOS isn’t going to do it justice. It might be time to rethink iOS for modern times and give it more than new features and a fresh coat of pixels.

Samsung’s wireless charging supports Qi and PMA standards, and the pad stands up or lies flat. But it’s not long range wireless.

True wireless charging

While Samsung has had wireless charging in the Galaxy S since the S6, Apple has been slow to adopt it for the iPhone. All signs indicate that’s going to change for the iPhone 8, but if Apple wants to top the Galaxy S8 and not just keep pace, it’s going to need something a little more exciting than a pretty charging pad. One of the rumors we’ve read suggests that Apple could adopt true long-range wireless charging for the next iPhone, which would power up the battery whenever you’re within range of the charger, even if it’s in your pocket. That alone would be an S8 killer.

The Galaxy S8 includes a pretty great pair of earbuds.

Bundled AirPods

Samsung didn’t just resist the trend to ditch the headphone jack on S8, it embraced the 3.5mm jack in a big way. Inside the S8 box is a pair of premium AKG-tuned earbuds that are a few steps above the usual build and sound quality you get for free—certainly better than what Apple gives us. But if Apple really wants to embrace the wireless future of the iPhone, it needs to stop including a wired set of EarPods, even if they are Lightning. A pair of AirPods in the box (or a cheaper Beats alternative) would really set it apart from the 3.5mm S8 and make a strong statement.

The battery life on the S8 is really good, but the iPhone 8’s could be even better.

Blow-away battery

Samsung has had its share of battery issues, but the S8 looks to put them in the past with a long-lasting battery that hopefully won’t blow up. But while it can get through the whole day for the most part, the S8 didn’t deliver the the real breakthrough we were hoping for. We’re still waiting for a phone that lets us completely forget about the battery until our day is over, and we’d love to see the iPhone 8 deliver something in the range of 12 hours and truly change the game.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!