Amazon Stops Giving Refunds When an Item’s Price Drops After You Purchase It

Amazon has for years issued refunds to users when the price of an item drops after they’ve purchased it. But lately the e-commerce giant hasn’t been doing that on a number of products, except for televisions, according to price-tracking companies. Recode reports: The move may have something to do with the rise of startups that track prices for Amazon customers and automatically request refunds when appropriate. One of them, a Santa Monica-based startup called Earny that is backed by the startup incubator Science, first pointed out the change. Earny scours a customer’s email inbox for digital receipts, and then continuously checks the price on a retailer’s website to see if it drops. Read more of this story at Slashdot.

Continue Reading:
Amazon Stops Giving Refunds When an Item’s Price Drops After You Purchase It

Service bot is an on-demand PA for offices

Add / Remove In the past, when an office needed to order ice cream for their upcoming team meeting, the task fell upon a real-life employee — most likely a PA or lowly intern. But now, treat-seekers can order ice cream, as well as request for help on office admin tasks via a service bot called Large , which is accessible through Slack , the team messaging app for businesses. Large is a team assistant that will take care of tasks such as scheduling an office cleaner, arranging a handyman, organizing team outings or sourcing food. To begin, users invite Large to a designated channel in their Slack network. Then, any team member can make a request by sending a message to @large detailing what they need. The service is powered by a combination of software and people, who research the request and reply to the user with a potential solution. Large is free to use and all costs are detailed to the user before the task is confirmed, with a tip included in the price. Ice cream, for example, costs USD 3.50 per person. All payments are processed via credit card, and receipts and invoices can be integrated into various expensing systems. Large is only available for business use, but luckily Magic — the much hyped on-demand PA service — has people covered during their downtime. What other tasks could be completed by Large? Website: www.hirelarge.com Contact: help@hirelarge.com

View article:
Service bot is an on-demand PA for offices

Phone and laptop encryption guide: Protect your stuff and yourself

The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg. Using strong PINs or passwords and various Find My Phone features is a good place to start if you’d like to limit the amount of cleanup you need to do, but in this day and age it’s a good idea to encrypt your device’s local storage if at all possible. Full-disk or full-device encryption (that is, encrypting everything on your drive, rather than a specific folder or user profile) isn’t yet a default feature across the board, but most of the major desktop and mobile OSes support it in some fashion. In case you’ve never considered it before, here’s what you need to know. Why encrypt? Even if you normally protect your user account with a decent password, that doesn’t truly protect your data if someone decides to swipe your device. For many computers, the drive can simply be removed and plugged into another system, or the computer can be booted from an external drive and the data can be copied to that drive. Android phones and tablets can be booted into recovery mode and many of the files on the user partition can be accessed with freely available debug tools. And even if you totally wipe your drive, disk recovery software may still be able to read old files. Read 29 remaining paragraphs | Comments

More:
Phone and laptop encryption guide: Protect your stuff and yourself

Everything We’ve Learned About Mummies Using 21st Century Technology

Researchers in fields from epidemiology to genetics are studying mummies, using the latest imaging technology. Now we know more than ever before about what lies beneath the mummies’ wrappings — and these long-dead people are telling us a lot about ancient lives and cultures. Read more…

View article:
Everything We’ve Learned About Mummies Using 21st Century Technology

Flickr’s New Tools Automatically Upload and Organize All Your Photos

Windows/Mac/iOS/Android: Flickr has rolled out a ton of updates and new photo tools to make organizing and accessing your entire photo collection much easier. Flickr Uploadr sends selected folders to Flickr from your desktop, and Flickr Camera Roll lets you mass edit photos in your collection. Read more…

See original article:
Flickr’s New Tools Automatically Upload and Organize All Your Photos

1Password for iOS Gets Extension Improvements for Faster Logins

iOS: 1Password for iOS got an update today that drastically improves the extension and makes it easier to use 1Password with other apps. It’s now about as feature-packed as the desktop extension. Read more…

Read the original post:
1Password for iOS Gets Extension Improvements for Faster Logins

"It’s Not My Job to Plug Things In," and Other Nightmare IT Stories

We asked for the worst stories you had about working in IT. You rose to the challenge and then some. We may need to wipe and reboot our brains to recover from these. Read more…

Visit site:
"It’s Not My Job to Plug Things In," and Other Nightmare IT Stories

Blur Uses One-Time Use Credit Card Numbers to Deter Hackers

After all the recent credit hacking news , many people are a little more hesitant about using plastic. Blur is a service that makes your shopping a little more secure by generating “fake” credit card numbers to deter hackers. Read more…

Read the original post:
Blur Uses One-Time Use Credit Card Numbers to Deter Hackers

13,000 Passwords, Usernames Leaked For Major Commerce, Porn Sites

The Daily Dot reports that yesterday a “group claiming affiliation with the loose hacker collective Anonymous released a document containing approximately 13, 000 username-and-password combinations along with credit card numbers and expiration dates.” Most of the sites listed are distinctly NSFW, among other places, but the list includes some of the largest retailers, too, notably Amazon and Wal-Mart. Read more of this story at Slashdot.

See the original post:
13,000 Passwords, Usernames Leaked For Major Commerce, Porn Sites

Russian Hackers Stole Millions From Banks, ATMs

An anonymous reader writes Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals. Group-IB and Fox-IT, in a joint research effort, released a report about the Anunak hackers group. This group has been involved in targeted attacks and espionage since 2013. Anunak targets banks and payments systems in Russia and CIS countries. In Europe, USA and Latin America criminals were mainly focusing on retail networks as well as mass media resources. Anunak is unique in the fact that it aims to target banks and e-payment systems. The goal is to get into bank networks and gain access to secured payment systems. As a result, the money is stolen not from the customers, but from the bank itself. If they manage to infect governmental networks, they use the infrastructure for espionage. Read more of this story at Slashdot.

Continue reading here:
Russian Hackers Stole Millions From Banks, ATMs