Huawei P10 Renders Leaked; Specifications Spotted on Benchmark Site

Huawei silenced all rumours by confirming that the P10 smartphone is launching at MWC 2017 on February 26. The device is largely expected to sport a dual camera setup, and come in different colour variants as well. Now, a new leak has come in showing renders from all angles, whilst the device was reportedly also spotted on benchmarking site GFXBench.

Huawei P10 Renders Leaked; Specifications Spotted on Benchmark Site

Tipster Onleaks (in collaboration with 91 Mobiles) has released what re claimed to be official renders of the Huawei P10, giving us a look at the device from all angles. The leaked renders show that the Huawei P10 is heavily inspired by the iPhone 7 Plus with its dual camera setup at the back, the antenna bands at the edges, and the metal frame with rounded corners. The Huawei P10 now has a Home Button in the front with the fingerprint sensor underneath. The predecessor Huawei P9, on the other hand, had no Home Button, and the fingerprint scanner was mounted at the back. The dual camera setup at the back comes with the Leica branding, just like its predecessor.

Furthermore, the Huawei P10 was also spotted on GFXBench, and it is listed to sport a 4GB RAM and run on Android 7.0 Nougat out of the box. This is in line with previous leaks that claim the smartphone will launch in various bundles. The fresh leak reveals that the Huawei P10 will launch in – 4GB RAM / 32GB storage, 4GB RAM / 64GB storage and 6GB RAM / 128GB storage – bundle variants. It is expected to be priced at CNY 3,488 (roughly Rs. 34,200), CNY 4,088 (roughly Rs. 40,000) and CNY 4,688 (roughly Rs. 45,930) respectively.

The Huawei P10 is tipped to support wireless charging, and sport a dual curved screen as well. The Huawei P10 specifications have also been leaked earlier, and it is expected to feature a 5.2-inch display with QHD resolution, and Kirin 960 octa-core processor with Mali G71 octa-core GPU. It is tipped to pack a 3100mAh battery and sport 20-megapixel and 12-megapixel dual rear sensors. At the front, there will be an 8-megapixel selfie camera setup.

The big-screen version of Huawei P10 – Huawei P10 Plus – is also reportedly incoming, and it is expected to have an 8GB RAM. This variant will supposedly be available in two configurations: 4GB RAM / 64GB storage and 6GB RAM / 128GB storage, and is expected to be priced at CNY 4,988 (roughly Rs. 48,870) and CNY 5,688 (roughly Rs. 55,730) respectively.

At its event, Huawei is also expected to launch the Huawei Watch 2 smartwatch. The big rumour about the device is that it is expected to come with a built-in SIM card slot, and run on Android Wear 2.0.

Cyber Grinches Could Disrupt Holidays’ Biggest Shopping Weekend

Online spending last year exceeded US$5.8 billion on Black Friday and Cyber Monday, according to Adobe, and that figure is expected to be even higher this year.

“If you want to mess with the economy, that’s the most disruptive time to do that,” said John Wu, CEO ofGryphon.

“A lot of retail sales have shifted from brick and mortar to online these days,” he told TechNewsWorld. “Cyber Monday is a huge day for a lot retailers.”

Easy Target for Bot Herders

If hackers want to disrupt shopping during the Black Friday-Cyber Monday weekend, they’ll likely use a botnet composed of devices connected to the Internet of Things to do it. Such botnets recently attacked DNS server provider Dyn, disrupting Internet service in the United States.

Attackers also used them to launch one of the largest DDoS attacks ever on the website of security blogger Brian Krebs.

“The reason IoT devices are being used now is because they’re so easily attacked,” Wu said. “They also have enough processing power on them to carry out these kinds of attacks.”

What’s more, devices like routers and DVRs are always on, so they’re always available for enlistment in an assault on a website.

“You can have a huge effect because you can control lots of the devices — in some cases hundreds of thousands — and flood a server,” Wu said, “and it’s very difficult to prevent these attacks, because they’re coming from IP addresses around the world. You can’t scale your bandwidth fast enough to prevent it.”

During Black Friday-Cyber Monday weekend, the situation will be exacerbated by a legitimate surge in traffic.

“Some sites went down last year because they couldn’t handle the spike in traffic to them,” Wu explained. “You could compound that effect with a denial of service attack.”

 Cyber Grinches Could Disrupt Holidays' Biggest Shopping Weekend

10 Million Logins an Hour

Botnets can do more than disrupt shopping traffic during Black Friday-Cyber Monday weekend. They can crack into user accounts at e-commerce sites, using the millions of username and password pairs available on the Internet from hundreds of recent data breaches.

“Because human beings resuse their passwords, that attacker is going to be successful when he uses a password stolen from another website,” said Omri Iluz, CEO of PerimeterX.

“On average, a person uses six passwords for all their online activity,” he noted.

“These attacks are very successful,” Iluz told TechNewsWorld. “With 10,000 bots, thousands of accounts can be compromised in a matter of hours.”

Automation is crucial to those kinds of attacks, however, he said. “It’s only meaningful if they can run 10 million or more login attempts in an hour to get the success rate they need.”

Gift Card Scams on Steroids

Digital desperadoes also have brought the power of bots to another holiday scam: compromising gift cards. After figuring out how gift card numbers are generated for a retailer, an attacker can write a script for the botnet to execute to determine if there’s a balance on the card.

A hacker could check tens or hundreds of millions of combinations in that way and then register and sell cards discovered to have a balance.

Unsafe mobile apps also might victimize Black Friday-Cyber Monday shoppers.

Researchers found 5,198 Black Friday apps in global app stores for a recent RiskIQ study. Of those, one in 10 already had been tagged as malicious and unsafe to use.

Be Paranoid

Online bandits also are exploiting the reputation of some of the largest e-commerce sites on the Web to prey on consumers.

The top five brands leading in e-commerce have had a combined total of more than 1,950 blacklisted URLs that contain their branded terms as well as “Black Friday” and are linked to spam, malware or phishing, the RiskIQ report notes.

The same is true of apps from those brands. More than 1 million blacklisted apps reference one of the leading e-commerce brands in either their title or description, according to the study.

While consumers can’t do anything about a DDoS attack on one of their favorite shopping sites, they can protect themselves from attacks aimed directly at them.

“Consumers need to be paranoid about what kinds of things people might do to lure them into scams,” said Venkat Rajaji, senior vice president for marketing at Core Security.

“You’ve got to keep your guard up during the holiday season. Don’t click on any link in a consumer email unless it’s a highly, highly trusted source,” he told TechNewsWorld.

“You’ve got to be paranoid,” Rajaji added. “You’ve got to assume the worst when you’re shopping.”

Breach Diary

  • Nov. 14. Data breach at Friend Finder Network places at risk personal information in more than 412 million accounts.
  • Nov. 14. Adobe agrees to pay $1 million to 15 states to settle case stemming from 2013 data breach at the company, which resulted in unauthorized access to accounts of some 552,000 people.
  • Nov. 15. Seventeen-year-old boy pleads guilty in UK to data breach last year at telecommunications provider TalkTalk, which resulted in unauthorized access to personal data of nearly 160,000 people.
  • Nov. 15. TalkTalk reports profits more than doubled to $75 million from $31 million during the 12 months following a data breach at the telecommunications provider.
  • Nov. 15. Kryptowire discovers several models of Android mobile devices sold through major U.S.-based online retailers, which contain firmware that collects sensitive personal information without the owner’s knowledge or consent, and sends it to third-party servers.
  • Nov. 16. Workers at Indian security firm AI Solutions discovered selling phone records of Australians from call centers of Optus, Telstra and Vodaphone.
  • Nov. 16. Database configuration error exposes to public Internet personal information of nearly 25,000 members of Sheet Metal Workers Local Union No. 104 in California.
  • Nov. 16. Protenus reports month-to-month decline in healthcare data breaches to 35 in October from 37 in September, although the number of patient records compromised increased to 776,533 from 246,876.
  • Nov. 16. Personal records of more than 34 million residents of the Indian state of Kerala were posted to Facebook by a hacker disenchanted with the security of the state’s computer systems, GulfNews reports.
  • Nov. 17. Chicago Public Schools notifies families of some 30,000 students that confidential information about them was shared improperly with a charter school operator for use in a mail advertising campaign.
  • Nov. 18. The Three mobile network in the UK reports personal information of more than 130,000 customers was compromised by data breach made public earlier in the week and for which three men were arrested on Wednesday.
  • Nov. 18. Michigan State University announces it will notify some 400,000 current and former students and staff of data breach that has compromised their personal information.
  • Nov. 19. Russian telecom watchdog Roskomnadzor discovers data breaches at 55 websites that contain personal information of children who have written to “Father Frost,” the Russian Santa Claus.

Upcoming Security Events

  • Nov. 28-30. FireEye Cyber Defense Summit 2016. Washington Hilton, 1919 Connecticut Ave. NW, Washington, D.C. Registration: through Sept. 30, general admission, $495; government and academic, $295; Oct. 1- Nov. 21, $995/$595; Nov. 22-30, $1,500/$1,500.
  • Nov. 29, Secure Your Enterprise to Maintain Quality of Care. 5 a.m. ET. Webinar by Alto Networks, Free with registration.
  • Nov. 29-Dec. 1. Gartner Identity & Access Management Summit. Caesars Palace, 3570 Las Vegas Blvd., South Las Vegas, Nevada. Registration: $2,850; public sector, $2,350.
  • Nov. 30. Smart Cities & Critical Infrastructure Cyber Attack Vulnerabilities. 9 a.m. ET. Webinar by Cyber Education Centre. Free with registration.
  • Nov. 30. How is Data Analytics Reducing Payments Fraud? 10 a.m. ET. Webinar by BrightTalk and Fiserv. Free with registration.
  • Nov. 30. Cyber Attackers and the Law – Threats, Challenges & Regulations. 11 a.m. ET. Webinar by Centre for Strategic Cyberspace + Security Science. Free with registration.
  • Nov. 30. Threat Hunting for Command and Control Activity. 2 p.m. ET. Webinar by Sqrrl. Free with registration.
  • Nov. 30. Securing the Cloud: Trends in Cloud, Collaboration & Security. 2 p.m. ET. Webinar by Dropbox. Free with registration.
  • Nov. 30. Cyber-Intelligence: Protecting Yourself Against Your Own Worst Enemy. 2 p.m. ET. Webinar by Centre for Strategic Cyberspace + Security Science. Free with registration.
  • Nov. 30. Intelligence: The Planners Strategic Edge. 3 p.m. ET. Webinar by Centre for Strategic Cyberspace + Security Science. Free with registration.
  • Nov. 30. Cyber Supply Chains: Risks & Protection. 4 p.m. ET. Webinar by U.S. Cyber Defence Advisor to NATO. Free with registration.
  • Nov. 30. How Artificial Intelligence Supports Security Science in Security Operations. 5 p.m. ET. Webinar by Centre for Strategic Cyberspace + Security Science. Free with registration.
  • Nov. 30. Best Practices for Preparing for Breaches. 1 p.m. ET. Webinar by Centre for Strategic Cyberspace + Security Science. Free with registration.
  • Dec. 1. The Big Challenge of Big Data: Untangling the Security Conundrum. 11 a.m. ET. Webinar by Gemalto. Free with registration.
  • Dec. 2-3. B-Sides Phliadelphia. Drexel University, 3141 Chestnut St., Philadelphia, Pennsylvania. Free.
  • Dec. 6. The 2017 Threatscape. 9 a.m. ET. Webinar by ISF Ltd. Free with registration.
  • Dec. 6. Storm on the Horizon — 2017 Threats Both Foreign and Familiar. 2 p.m. Webinar by OCD Tech. Free with registration.
  • Dec. 7. Insider Threats and Critical Infrastructure: Vulnerabilities and Protections. 10 a.m. ET. Webinar by @LKCyber. Free with registration.
  • Dec. 7. Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing. Webinar by ZeroFOX. Free with registration.
  • Dec. 7. Quantum Threats: The Next Undefended Frontier of Cybersecurity. 1 p.m. ET. Webinar by Isara Corporation. Free with registration.
  • Dec. 7. Trends in Email Fraud, and How to Prevent Enterprise-Facing Email Attacks. 2 p.m. ET. Webinar by Agari. Free with registration.
  • Dec. 8. Cybersecurity Trends — Security Analytics Is the Game Changer. 1 p.m. ET. Webinar by Interset. Free with registration.
  • Dec. 8. I Heart Security: Developing Enterprise Security Programs for Millennials. 5 p.m. ET. Webinar by NCC Group. Free with registration.
  • Dec. 12. How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO. 5 p.m. ET. Webinar by City of San Diego, California. Free with registration.
  • Dec. 13. You CAN Measure Your Cyber Security After All. 1 p.m. ET. Webinar by Allure Security Technology. Free with registration.
  • Jan. 12. FTC PrivacyCon. Constitution Center, 400 7th St. SW, Washington, D.C. Free.
  • Jan. 16. You CAN Measure Your Cyber Security After All. 1 p.m. ET. Webinar by Allure Security Technology. Free with registration.

$5 PoisonTap Tool Easily Breaks Into Locked PCs

Proving once again that you can do a lot of damage with a little investment and a lot of ingenuity, security researcher Samy Kamkar recently managed to take down a locked, password-protected computer armed with only a US$5 Raspberry Pi.

The low-tech cookie-siphoning intrusion is one of Kamkar’s simplest hacks ever. He previously has unlocked car doors, garages, wireless remote cameras and other devices, with MacGyver-like precision.

raspberry-pi-poisontap-samy-kamkar-hacking-tool

Kamkar’s latest hack, PoisonTap, uses a Raspberry Pi Zero, a micro SD card, and a micro USB cable or other device that emulates USB, including USB Armory or LAN Turtle.

Windows, OS X and Linux recognize PoisonTap as an Ethernet device, load it as a low-priority network device, and perform a DHCP request across it, even if the computer is locked or password-protected, Kamkar explained.

PoisonTap provides the computer with an IP address. However, the DHCP response tells the machine that the IPv4 space is part of PoisonTap’s local network, rather than a small subnet, he said.

If a Web browser is running in the background, one of the open pages will perform an HTTP request in the background, noted Kamkar. PoisonTap responds with a spoof, returning its own address, and the HTTP request hits the PoisonTap Web server.

When the node Web server gets the request, PoisonTap’s response is interpreted as HTML or JavaScript.

The attacker is able to hijack all Internet traffic from the machine and siphon and store HTTP cookies from the Web browser or the top 1,000,000 Alexa websites.

 Low-Cost Havoc

“The PoisonTap project is an extremely clever and creative attack that can have serious consequences,” said Mark Nunnikhoven, vice president for cloud research at Trend Micro.

“The code is public, and hardware required to run it is only a few dollars, which increases the risk to average users,” he told TechNewsWorld. “However, it still takes some effort for an attacker to steal the user’s data.”

For the device to work, the attacker needs physical access to the machine while a Web browser is running in the background, noted a Symantec researcher in comments provided to TechNewsWorld by spokesperson Jenn Foss.

The risk is lower when a machine has restricted physical access. The risk is higher when a machine is in the public domain, where anyone potentially has access to it — for example, at a sidewalk cafe.

Open Source Factor

It might be easier to build a solution to the hack, given that Kamkar’s attack was conducted over an open source language, suggested the Symantec researcher. “If someone slips a secret backdoor into an open source project, chances are someone will find it quickly. Often open source is quicker to address vulnerabilities as an open source community can be very large.”

In addition, if someone creates a tool and the source code is publicly available, anyone can read the code and develop proper protection for the future, the Symantec researcher pointed out.

“It’s certainly very creative work, and it shows just how many attack vectors exist that we’ve yet to really consider,” remarked Troy Hunt, Microsoft MVP-Developer Security.

“However, it also requires physical access — and once you get to that point, there’s a lot of avenues available to an attacker,” he told TechNewsWorld.

The use of HTTPS could have crippled this particular attack, Hunt noted, and we don’t normally think of that as being a defense against an adversary with physical access.

Google Maps for Android Redesigned for Easier Access to Useful Features

Google has redesigned its Maps app for Android to provide users with easier access to some of the most useful features within the app. With the latest design overhaul, three tabs – Places, Driving, and Transit are accessible right from the bottom of app’s home screen with a simple tap. Google says that the real-time information from these bottom bar navigation tabs will help users in finding a nearby restaurant, beating the traffic, or catching the next available bus.

Google Maps for Android Redesigned for Easier Access to Useful Features

With a quick swipe up from the Places tab, users will be able to find places to eat or drink with curated lists like ‘best dinners’, ‘cheap eats’, or ‘business dining’ around their current location or the location they choose, the search giant said in its blog post. Google Maps for Android can also choose to search for ATMs, pharmacies, or gas stations with just a tap.

The other two tabs on the bottom bar are concerned directly with commute needs of the app users. If you feel like driving and have saved your work and home address already in the app, you can go to the Driving tab and you will get real-time ETAs to home and work. Further you get the traffic conditions nearby as well as the expected delays on your route. “If you don’t need turn-by-turn directions but want real-time traffic info as you take your usual route, you can tap on “start driving” to go directly into driving mode,” Google added about the update to Maps for Android.

If you feel like taking public transport, you need to head to the Transit tab on Google Maps for Android and you will get recommendations for buses or trains as well as ETA to your work or home. You can of course swipe down and check out schedules if you are headed somewhere else.

Considering that the options were a little scattered in the earlier version of Google Maps, it is a welcome design change that makes the interface look clean and easy-to-use. Google says that it has started rolling out the update, but hasn’t clarified whether it’s a new version of the app or a server-side change. However, there has been no word regarding the design overhaul on the iOS counterpart of the app as of now from the company.

LG G6 Launch Invite Teases Bezel-Less Display; Release Date for Select Markets Rumoured

LG’s next flagship smartphone, the G6, is all set to be unveiled at a pre-event on February 26 ahead of MWC 2017. The South Korean company after a ‘save the date’ confirmation for the event has now started sending official media invitations for the February 26 event. Additionally, prolific tipster Evan Blass has claimed availability details of the LG G6.

LG G6 Launch Invite Teases Bezel-Less Display; Release Date for Select Markets RumouredLG’s official invite, shared by CNET, shows “Big Screen. That Fits” tagline with two images. One of the images shows a large screen with no bezels while another image shows how easily the device will fit into the hands. The new teaser image seemingly confirms that the LG G6 may sport a bezel-less design at the front. Earlier leaks have pointed that the LG G6 will feature a 5.7-inch – which was shown off by LG Display last month – and will sport an unusual aspect ratio of 2:1. One of the biggest highlights of the design is said to be the sleek bezels and the upcoming flagship is expected to feature screen-to-bezel ratio of over 90 percent.

In a separate news, Blass reports LG’s flagship will be going on sale soon after the MWC 2017 trade show at least in the homeland, South Korea. According to planning material reviewed by VentureBeat, the LG G6 will go on sale on March 9 in South Korea. In US, the smartphone however will be slightly delayed and will go on sale only on April 7.

Several leaks have pointed that the LG G6 will sport metal design which will be a departure from the company’s current plastic body in the LG G5, which sports a modular design. LG is also rumoured to run additional safety tests on the G6 ahead of its actual launch. Some of the highlights of the handset are said to be the first non-Pixel smartphone to come preloaded with Google Assistant out-of-the-box; dual-rear camera setup; waterproofing capability with IP68 certification, and featuring latest Snapdragon 835 processor.

LG’s G6 flagship smartphone will be unveiled at the company’s February 26 event which will begin at 4.30pm IST (12.00pm CET).

Uber Hires Veteran NASA Engineer to Develop Flying Cars

In 2010, an advanced aircraft engineer at NASA’s Langley Research Center named Mark Moore published a white paper outlining the feasibility of electric aircrafts that could take off and land like helicopters but were smaller and quieter. The vehicles would be capable of providing a speedy alternative to the dreary morning commute.

Uber Hires Veteran NASA Engineer to Develop Flying CarsMoore’s research into so-called VTOL-short for vertical takeoff and landing, or more colloquially, flying cars-inspired at least one billionaire technologist. After reading the white paper, Google co-founder Larry Page secretly started and financed two Silicon Valley startups, Zee Aero and Kitty Hawk, to develop the technology, Bloomberg Businessweek reported last summer.

Now Moore is leaving the confines of the US National Aeronautics and Space Administration, where he has spent the last 30 years, to join one of Google’s rivals: Uber Technologies. Moore is taking on a new role as director of engineering for aviation at the ride-hailing company, working on a flying car initiative known as Uber Elevate. “I can’t think of another company in a stronger position to be the leader for this new ecosystem and make the urban electric VTOL market real,” he says.

Uber isn’t constructing a flying car yet. In its own white paper published last October, the company laid out a radical vision for airborne commutes and identified technical challenges it said it wanted to help the nascent industry solve, like noise pollution, vehicle efficiency and limited battery life. Moore consulted on the paper and was impressed by the company’s vision and potential impact.

Moore acknowledged that many obstacles stand in the way, and they’re not only technical. He says each flying car company would need to independently negotiate with suppliers to get prices down, and lobby regulators to certify aircrafts and relax air-traffic restrictions. But he says Uber, with its 55 million active riders, can uniquely demonstrate that there could be a massive, profitable and safe market. “If you don’t have a business case that makes economic sense, than all of this is just a wild tech game and not really a wise investment,” Moore says.

Uber’s vision is a seductive one, particularly for sci-fi fans. The company envisions people taking conventional Ubers from their homes to nearby “vertiports” that dot residential neighborhoods. Then they would zoom up into the air and across town to the vertiport closest to their offices. (“We don’t need stinking bridges!” says Moore.) These air taxis will only need ranges of between 50 to 100 miles, and Moore thinks that they can be at least partially recharged while passengers are boarding or exiting the aircraft. He also predicts we’ll see several well-engineered flying cars in the next one to three years and that there will be human pilots, at least managing the onboard computers, for the foreseeable future.

His move to Uber is a risky one. Moore says he’s leaving NASA one year before he’s eligible for retirement and walking away from a significant percentage of his pension and free health care for life “to be in the right place at the right time to make this market real.” (Though it’s probably safe to say that Uber, with some $11 billion on its balance sheet, is making it worth his while.) Moore seems to be disillusioned with NASA, saying the agency is leaving promising new aviation markets to the private industry. “It’s the federal government who is best positioned to overcome extremely high levels of risks,” he says.

While NASA is larded with layers of bureaucracy and management, Uber Chief Executive Officer Travis Kalanick has been closely involved in hatching his company’s flying car plans, Moore says. That is, when he’s not distracted with his own political crises, such as his role on President Donald Trump’s advisory council, which he relinquished last week after criticism from customers, drivers and employees.

Kalanick’s bet on Uber Elevate is another indication that while Silicon Valley seems on the surface to be consumed with politics and protests these days, the march into the future continues apace.

Trump Immigration Ban: US Government Urges Appeals Court to Reinstate Order

The US government on Monday defended President Donald Trump’s travel ban as a “lawful exercise” of his authority, and urged an appeals court to reinstate the suspended measure in the interests of national security.
Uber Hires Veteran NASA Engineer to Develop Flying Cars
Three days after a federal judge put the controversial measure on hold, Justice Department lawyers filed a court brief challenging the nationwide injunction as “vastly overbroad.”

An hour-long telephone hearing has been set for Tuesday at 3:00pm (11:00pm GMT) in a high-stakes case that looks increasingly likely to be settled by the Supreme Court.

Two new polls show a majority of Americans now oppose the travel ban on refugees and travellers from seven mostly-Muslim nations, which sparked airport chaos and condemnation around the world – but Trump has shown no sign of bending, pushing back late Monday in a new Twitter salvo.

“The threat from radical Islamic terrorism is very real, just look at what is happening in Europe and the Middle-East. Courts must act fast!” he wrote.

Earlier in the day, during a visit to US Central Command in Tampa, Florida, Trump accused the media of downplaying the terror threat which his administration cites to justify its ban, saying they purposefully ignored jihadist atrocities.

Asked to explain Trump’s comments, White House spokesman Sean Spicer promised to “provide a list” of attacks that had been “underreported.”

Trump’s decree summarily denied entry to all refugees for 120 days, and travelers from Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen for 90 days – a move critics charge will damage US interests. Refugees from Syria were blocked indefinitely.

The president says the ban is needed to tighten US security against foreign terror threats, citing the September 11, 2001 attacks despite the hijackers having no links to the named countries.

In its filing to the Ninth Circuit Court of Appeals in San Francisco, the government argued that the federal court which temporarily rolled back Trump’s directive had “erred in entering an injunction barring enforcement of the order,” asking that the ban be reinstated.

The Justice Department argued that “the executive order is a lawful exercise of the president’s authority over the entry of aliens into the United States and the admission of refugees.”

“Even if some relief were appropriate, the court’s sweeping nationwide injunction is vastly overbroad,” it said.

The government again denied that the order specifically targets Muslims, defending it as a means to review and revise screening procedures in order to “protect against terrorist attacks.”

And it said non-US citizens seeking to enter the United States for the first time have no constitutional rights to be upheld.

Friday’s decision by a federal judge in Seattle has allowed the many travelers who were suddenly barred from US soil to start trickling back in.

The State Department has said visa holders from the seven countries are allowed to travel to the US as long as their documents have not been “physically canceled.”

On Sunday, the appellate court refused to overrule the federal judge.

Attorneys general for the states of Washington and Minnesota, which won the temporary stay of the ban, have asked the appeals court to refuse to reinstate it. They were backed Monday in a court brief filed by attorneys general from 16 other US states.

Several legal and rights groups have filed in support of the states, including the Southern Poverty Law Center, Americans United for Separation of Church and State and the American Civil Liberties Union.

And in an additional blow, a slew of Silicon Valley giants led by Apple, Facebook, Google, Microsoft and Twitter have filed a brief in support of the lawsuit, arguing that the ban threatens their ability to attract crucial foreign talent and investment to the United States.

Tesla and SpaceX were among another 30 companies that added their names to the filing late Monday, pushing the total to more than 120.

A group of prominent Democrats including former secretaries of state John Kerry and Madeleine Albright added their voices to the criticism, arguing that Trump’s ban could endanger US troops in the field, disrupt counterterrorism cooperation and feed Islamic State group propaganda.

Spicer insisted the administration was “absolutely not” planning to back down on its plan for extreme vetting at US borders, saying: “Once we win the case, it will go right back into action.”

But top Republicans have shown renewed signs of discomfort with the president as the controversy escalates – specifically over Trump’s virulent attacks on James Robart, the Seattle federal judge.

Supreme Court Asks Centre for Mechanism to Verify Identities of All Mobile Users

In a move to end fake mobile phone users, the Supreme Court on Monday asked the Centre to put in place within a year an effective mechanism to scrutinise the details of identity of over 100 crore existing and future mobile telephone consumers.

Supreme Court Asks Centre for Mechanism to Verify Identities of All Mobile UsersA bench comprising Chief Justice J S Khehar and Justice N V Ramana took note of the statement of Attorney General Mukul Reheated, appearing for the Centre, that a mechanism will be put in place to scrutinise identity of mobile users and new subscribers will be required to fill up Aadhaar-based eKYC forms to ensure correct identity.

“It is submitted that an effective system will be put in place and the process of scrutiny will be completed in one year… We are satisfied that the prayers made in the writ petition have been substantially dealt with,” the bench said and hoped that the process would be completed in the near future and latest before completion of one year.

During the hearing, the bench suggested that existing prepaid mobile users, who are 90 percent of the total mobile users, may be asked to give identity details at the time of recharge as done while giving fresh SIM cards to users.

Rohatgi said that it would be difficult as even small kiosks across the country recharge prepaid mobile phones.

Earlier, the court had asked the Centre and the Department of Telecommunications (DoT) to apprise it about the steps which can be taken to scrutinise the existing and future mobile users in the country.

The bench was hearing a PIL filed by NGO Lok Niti Foundation which has sought a direction to the Centre to put in place a proper mechanism to check the authenticity of information provided by mobile users.

The verification has become more important in view of the fact that mobile phones are now being used for banking purposes also, it had said.

The plea said that proper verification of mobile phone subscribers was necessary to avoid fake identities which caused grave risk to national security too.

The court had asked DoT and the Telecom Regulatory Authority of India (TRAI) to also respond to the letter written to them by the petitioner NGO giving suggestions on the mobile phone verification issue.

The petitioner had written the letter to DoT and TRAI on August 7, 2014, saying there was a grave risk to national security because of lack of verification of mobile phone subscribers and had given suggestions for making systemic improvements to ensure the same.

In its petition before the apex court, the NGO has sought directions to DoT and TRAI to ensure 100 percent verification of mobile phone subscribers with regard to their identity, addresses and that no fake or unverified identity is accepted for subscription of mobile phones.

It also sought that Aadhaar Card or other biometric identification may be made compulsory for verification of the mobile phone users.

It claimed that around 5.25 crore mobile phone subscribers (about 5 percent of the total) are unverified, despite the directions given by the apex court and instructions issued by DoT itself from time to time to ensure mobile phone subscriber verification.

“Unverified SIM cards pose a serious threat to the country’s security as these are routinely used in criminal and terrorist activities,” the petition said.

The plea has sought strict implementation of subscriber verification guidelines and that physical verification be made compulsory in future and physical re-verification of existing subscriber base be conducted in a transparent manner.

How to Convert a Color Photo into a Black and White Photo with Movavi Photo Noir

Movavi Photo Noir is a black and white photo editor that can convert your color photo into a professional black and white photo. There are many types of black and white presets created from different parameters. Some of the different black and white presets are Americano, Macchiato, and Latte. You can download Movavi Photo Noir from the Movavi site. After it is downloaded, you must run the setup to get the black and white photo editor installed on your computer. When you launch Movavi Photo Noir, you must drag the color photo that you want to convert into black and white into the drag and drop area to open it.

To make an image black and white, you must select the first tab called Noir to go to the black and white photo editor. Here, you will see two tabs including presets and adjustments. Under presets, you must choose a preset. You can preview how your picture look in the preset you select in real time in the preview screen. The preset that you have selected will have a blur border around the thumbnail. After selecting a preset, you have the option to go to the adjustment tab to adjust the overall color tone of your black and white photo.

You can click the save preset button if you want to use the same preset for all other photos. In this way, you don’t have to readjust the coloration sliders for the other pictures. To reset the adjustment back to the default settings, you simply have to click on the reset button. Movavi Photo Noir gives you the ability to highlight a certain part of the photo in color with the rest of the areas in black and white. To highlight a subject in color in the black and white photo, you must click the brush button under Black and white.

After clicking the brush button, your mouse cursor will be converted into a brush tool which you can use to paint the area that you want to highlight in color. If you accidentally paint outside the boundary, you can click the eraser button and erase away the excess markings. The painted area will appear to be in blue color. When you let go of your mouse, the object that is painted with the brush tool will appear in color.

Movavi Photo Noir comes with an additional of three basic photo editing tools including rotate, crop and resize. The rotate tool allows you to flip a photo to the left or right horizontally. You can also flip a photo up or down vertically. The rotate tool also allows you to rotate the photo to any angle that you need for your project. The crop tool allows you to crop a photo by moving the square crop frame to the area you want to retain. The resize tool gives you the ability to resize the photo by entering the width and height dimension manually or entering a percentage. When you are done editing your black and white photo, make sure you click the Export button to export your photo in the most convenient picture format for your needs.

How Growth Hormone can help in bodybuilding

The human Growth hormone is produced by the pituitary glands in adequate amounts to promote healthy growth and wellness. Human Growth Hormone injections can be used to treat children and adolescents or males, who are deficient in this hormone. But there is again a huge population of people who aspire to become body builders, athletes are always on the look- out for supplements that could help them to build muscle mass. Develop muscles, increase their stamina and endurance and to boost their athletic performance and starting an HGH cycle could help them in achieving their expectations.

Image result for How Growth Hormone can help in bodybuilding

How does HGH act?

Human Growth Hormone also known as HGH is produced by the pituitary gland, which is situated at the base of the brain. The release of this hormone is regulated by the hypothalamus. The hypothalamus is the master key that regulates various functions in the body of physiological and psychological nature. It regulates the increased production and secretion of the growth hormone into the body, by releasing a Neuro hormone called Growth Hormone Releasing Hormone (GHRH). The release of this hormone will signal the pituitary gland to increase the production of growth hormone.

HGH supplements for bodybuilding

HGH is a natural endogenous growth hormone that is produced naturally in the body and is very important to regulate the growth and development of muscles, bones and other organs. The synthetic form of this hormone is used in the form of injections or supplements to treat people who are deficient in this hormone and also to increase muscle gains by bodybuilders. HGH supplements are formulated in a way, that they do not stimulate but by providing additional support to the gland in the body, they can boost the hormone production and secretion and starting an HGH cycle can also help you maintain the level of hormones such as the testosterone, estrogen and growth hormone that can decline due to aging.

Benefits of HGH Supplements

What benefits HGH hormone, considered as a peptide hormone, can do to your body are as follows

  • It stimulates muscle growth
  • It acts as a stimulant for protein synthesis
  • It is capable of accelerating the recovery time between workouts
  • It helps to burn fat
  • It helps to achieve a leaner well-defined frame.
  • HGH supplements contain amino acids that help to boost HGH levels

HGH supplements are over the counter products which means that they can be obtained online without any prescription. But the benefits you can expect will vary depending on the essential amino acids that have been used in the manufacturing of the supplement, as the functioning of the pituitary gland is dependent on the amino acids ingested through food or supplements for its optimal functioning. Some of the important amino acids are

  • Tryptophan
  • Lysine
  • Histidine
  • Valine
  • Leucine
  • Phenylalanine

Buy HGH enriched with essential amino acids online and avail special offers of the day. The HGH can promote muscle growth, which is essential for body building and athletics and also tackle psychological symptoms such as depression, anxiety and others associated with deficient growth hormone secretion.