Monday, 17 December 2018

The Chinese Invasion On Apple And Amazon Servers

The world is getting smaller and smaller as technology continues to advance forward. Things that used to be a dream in the past are now our reality today. We are able to do many things that were once considered impossible several decades ago. While many of them benefits society at large, some are considered detrimental to humans in some aspects. Not only have we become addicted (and virtually slaves) of many tech gadgets but we also excessively share personal information on the web. Hackers can have access to this sensitive data and use it without your consent.

Now, there’s one juicy piece of news that you can’t afford to miss today. We all know that most products are now made in China because of cheap labor and stuff but intelligence associates recently discovered that a Chinese military team has now access to millions of data by inserting a microchip on Apple and Amazon servers based in China. These chips are barely visible to the naked eye but they hold so much power since they can’t just steal data but even remotely manipulate it. Moreover, those who planted these chips also have access to the servers where these chips are planted. Imagine having 100% access on Amazon and Apple servers. That’s just wild and a little scary too.

A Chinese military unit has been inserting tiny microchips into computer servers used by companies including Apple and Amazon that give China unprecedented backdoor access to computers and data, according to a new Bloomberg report.

The tiny chips, as small as the tip of a sharpened pencil and designed to be undetectable without specialist equipment, were implanted on to the motherboards of servers on the production line in China, the report in Bloomberg Businessweek said.

Technology shares in Hong Kong fell sharply on Friday led by Lenovo, which lost 23% in morning trade. The Hong Kong-listed shares of Chinese telecommunications equipment maker ZTE Corp lost more than 14%. 


It is not new to industry insiders and even Amazon and Apple themselves denied the allegation proving otherwise that there are no such things happening in their turfs but we all know that if there’s smoke, there’s fire, right? Even the Chinese government refutes such malicious claims and reiterates the fact that they are firm supporters of cybersecurity as well.

It is mostly big talk for ordinary people and we can’t really tell for sure what is happening but it is not comforting to hear news like this because it only goes to show that if big companies with high-security precautions in place can be breached, how much more the data of ordinary individuals who know so little about what’s really happening in the world wide web.

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”


It may sound like its straight out of the movies but it is actually a part of our reality. By now, we are no longer as shocked by tech problems like ransomware and other malwares but this is on another level considering that it is the hardware that is now involved. In an ideal world, breaches on computer hardwares are more threatening and usually more complex than any other type of virus you may encounter on the web.

It makes perfect sense that a country like China can pull off a stunt like this because most computer and smartphone manufacturers for parts or as a whole have factories in China enabling them full access to a variety of physical products that they choose to infiltrate. These allegations are not entirely without basis so we’d likely hear more about it in the coming years as this intricate attack continues to unfold right before our very eyes.

On a smaller scale, servers are also prone to external attacks that can lead to server failures. Check out and for more information on the different server recoveries you may require when problems happen.

The blog post The Chinese Invasion On Apple And Amazon Servers See more on: The Hard Drive Recovery Group Blog


Friday, 14 December 2018

Can You DIY Data Recovery?

Almost everyone right now owns a tech device or two or even more. Whether it is a smartphone, tablet or iPad, laptop, or computer, you store different types of data on these devices that can prove disastrous once they break down and you are no longer able to access them. It’s worse if you don’t have a backup in place because data recovery is your last resort in getting some, if not all, of your lost data back. These data can be anywhere from text files and documents to photos and videos that have different storage requirements.

But since you constantly use these devices in your day-to-day, it is inevitable for them to wear out and get corrupted or broken. Hence, you can never truly consider these devices for permanent data storage or at least save another copy in an external flash drive or hard drive for added security. There’s also the cloud that has made our lives even easier and more convenient these days. It is easier said than done, though, and we still go back to our old ways of storing almost all our data on one device because of convenience on our part. Once it gets broken and your data is gone, you’ll be full of regrets but it won’t still get you anywhere.

Modern laptops and desktops can hold a massive amount of information, including tens of thousands of pictures and millions of pages of text. Despite their storage capacities, these devices should not be used as a means to permanently store digital information because they’re prone to breakage and data corruption. Recovering data from one of these failed devices is difficult, and requires a high-level of expertise that’s not always accessible to the person that likes to fix things themselves.

Older laptops that were constructed with traditional hard drives were fairly simple to pop open and fix. You could unscrew a few screws holding the case together, and then plug into the drive via a universal SATA port to retrieve the data. Opening the actual drive itself is not without risk or advisable as dust could and will enter the drive causing contamination and it can always cause additional damaged during the process. 


When it comes to tech problems, the best decision is to always take the particular device to an expert for help because you may end up causing more damage than what was previously. You need to be knowledgeable and skilled in data recovery and have an in-depth knowledge of computers itself and its various parts and functions to ensure that you do nothing wrong to compromise your already unfortunate situation.

The question now is whether it is possible to DIY a data recovery procedure even if you are now well-versed in the field of computer yourself. Well, it depends on the device and just how well you know computers, or technology as a whole, yourself. You can use software tools to help you recover lost data but there is no 100% assurance that you can truly retrieve all files.

Consumers are often advised to not go the “DIY route” when it comes to working on their laptop or desktop computer or other devices such as digital cameras. They typically shouldn’t try to pop the back off the machine and extract the hard drive in an attempt to access missing or corrupt files. Laptops are built really thin and they’re nearly impossible to open, and in many cases the person attempting the recovery might damage the computer’s internal parts.

Despite these warnings, there are often ways to retrieve files from such devices without causing any harm by utilising a recovery software program. Many users conduct a quick “Googling” of “file recovery software” and then are faced with a range of choices, including many free utilities that promise fast and easy recovery. Unfortunately, these programs are more likely to infect the user’s devices with malware than they are to actually recover any content. And these programs are usually only offered in English, which leaves out billions of other potential users.


Remember that even the experts view data recovery as a last resort. If you are doubtful yourself of your own capabilities, better not risk losing your data for good and just consult a data recovery specialist for assistance. It may cost you some money but you can still earn it. The data you lose will be gone for good, in your inexperienced hands.

Data recovery not only requires expertise but also the use of the right tools and a clean environment where data recovery should take place. For sure you don’t have one at home and it can make a world of difference to your end results. Spare yourself all the hassles and entrust your data issues to an expert before you can cause more lasting damage.

These are just some of the data recovery services you can try and that can be used even on devices with much bigger storage capacity such as servers and not just your average smartphones and computers.

Can You DIY Data Recovery? was originally seen on Hard Drive Recovery Group


Wednesday, 21 November 2018

The Myth, The Legend: Trump – Conspiracy Theories, Anyone?

You may think that conspiracy theories only happen in the movies, right? Well, most of the time it does but who says it can’t happen in real life too. You’d be surprised how more colorful and exciting true-to-life stories are than those works of fiction. Let’s just take for instance the last US election wherein the citizens of this land elected Donald Trump to the highest position in the country, the President of the United States of America. For someone who hasn’t served in public office at all, this is an astonishing feat and suffice it to say that his candidacy is also just as filled with fanfare and so many scandals.

The resurfacing of the issue on missing servers among others has been brought up recently. This is most likely related to the hacking of Russian Intelligence officers on the very same missing DNC servers on that fateful election that is arguably one of the most intense this nation has ever witnessed. It has segregated people into political parties: whether you are a Democrat or a Republican supporter. What’s concerning in this whole picture is the fact that sensitive channels like these apparently can be broken and hacked is really alarming. It may be just another campaign strategy for some but this is a big concern especially that we practically rely on the web and on the many tech contrivances we own on a lot of things.


"Where is the server, I wanna know, where is the server? And what is the server saying?" Trump asked Monday during a joint news conference in Helsinki with Russian President Vladimir Putin.

"We have groups wondering why the FBI never took the server, why haven't they taken the server?" Trump added. "Why was the FBI told to leave the office of the Democratic National Committee? I've been wondering that."


It is disconcerting to find out that scandals like this can happen to the government and on popular people, meaning it can happen to everyone else. Any computer hardware can be hacked and your data can be stolen and used by others without you knowing. Imagine how many of your sensitive data is at risk if you don’t do something about it. Even backing up your data won’t be sufficient because data can be stolen and used in a variety of ways without your consent. Installing firewalls or antivirus won’t stand a chance against persistent bugs. Even President Donald Trump claims to have no knowledge about these servers yet perhaps the damage has said and done.

The DNC server

On July 13, the Justice Department charged 12 Russian intelligence officers with hacking the Democratic National Committee, the Democratic Congressional Campaign Committee, and Hillary Clinton campaign staffers.

Special counsel Robert Mueller’s indictment confirms previous findings from the U.S. intelligence community. In April 2016, Russian intelligence officials installed spying software on the computer network of the Democratic Congressional Campaign Committee, which works to elect members of the U.S. House of Representatives. The hack in turn allowed them access to 33 Democratic National Committee computers. The emails obtained through the hack were pushed out on social media beginning in June 2016, and Wikileaks soon joined that effort.

At some point, the FBI and DNC started working together to fight the hack and investigate how it happened, but DNC was slow to react to the FBI’s initial warning that their server had been compromised.


If a country as rich and powerful as the US faces these problems, other poorer and most likely less industrialized countries face problems like this one on their day-to-day. How can you feel safe anymore if all your pertinent details on the web are only one click away by a hacker or a cybercriminal? The least you can do is to safeguard your own device and ensure all private information can only be accessed by you all the time. If you aren’t careful enough, you won’t only end up with lost data but with a broken device too. Once broken, getting your hard drive fixed, for instance, can cost a fortune. You’ll have to look for contractors that charge reasonably but have the facility and expertise needed to do the job right like and because there are plenty of scammers littered across the web who are only out for your money.

The following blog article The Myth, The Legend: Trump – Conspiracy Theories, Anyone? Find more on:


Wednesday, 14 November 2018

Ransomware Attacks Everywhere

Modern life afforded us with so many conveniences and luxuries. Things we have only dreamed about in the past are now realities we continue to enjoy at the present. Who would’ve thought we can do so much with a device that fits the palm of our hands? It sounds absurd right if you told it to your own self, say, 15-20 years ago. Yet, that is the reality we are living in now. We live differently from way back then but we somehow thrive off this new and much more virtual lifestyle except for at times sacrificing our health because of too much exposure to technological gadgets that emit harmful blue light and all. Unfortunately, this new lifestyle has opened us up to a new vulnerability and it continues to threaten us until today.

Ransomware was the talk of the town last year. These apps took the world by storm and left in their wake hundreds of thousands of losses and even crippled organizations for days on end. This type of malware is not new to us but it keeps on evolving with the passage of time. It becomes more damaging too as it spreads quickly and takes on different forms. How many people have been scammed already and the list is expected to grow with new versions of ransomware malwares coming out.

Paying the ransom does not even offer any assurance. Messages you may get from these criminals may actually appear to be coming from government agencies like the FBI in an attempt to intimidate you, but don’t be mistaken:

Ransomware scams may attack a computer near you soon, the FBI warned Monday.

The computer software is malicious. It secretly installs itself and encrypts files only to hold the data hostage in return for payment of a ransom.

Home and business, banking, academic and government computers can be impacted.

In recent cases, victims have paid anywhere from hundreds to thousands of dollars.

Usually the computer screen freezes and a pop up message warns that the user has violated some federal law and the computer will remain locked until money is paid, the FBI warned.


These malwares no longer ask for just ransom anymore because some can be used in cryptocurrency mining like bitcoin and other alternative currencies. Fortunately, there are measures you can take to protect your device from these shady practices on the web if you are well-informed about these issues at all. Hence, it makes sense to back up your data if you want to spare yourself from all the hassles of data loss and paying a hefty price for it. If you find yourself in this difficult situation, these services may help and for reasonable prices but ensure the job is done 100% right.

An ever-evolving form of malware has added a new tactic which sees it choose to deliver ransomware or a cryptojacker depending on the circumstances of the infected victim.

If an infected computer contains a bitcoin wallet, the malware will install file-encrypting ransomware -- if there's no pre-existing cryptocurrency folder and the computer is capable of mining cryptocurrency, a miner will be downloaded and installed for the purposes of exploiting the PC's power to generate cryptocurrency.


Ransomware these days aren’t always just out for a ransom. There are bugs that can now hack your system and take advantage of its computing power in order to mine for cryptocurrencies. It’s already a known fact especially when these vicious virtual bugs don’t find any type of Bitcoin wallet in your system. An example of this malware is that of the Rakhni Trojan that has been causing problems since 2013. It is even more understandable now as the popularity of bitcoins and other digital currencies have skyrocketed and continues to gain public acceptance and support. Be especially wary of phishing emails because this is the most common trap that the public falls for. It is why anyone who uses or owns a computer must exercise extreme caution because threats are all over the web and don’t tell that you haven’t been warned when the unfortunate times comes you fall for it.

Ransomware Attacks Everywhere See more on: HDRG Blog


Wednesday, 7 November 2018

Data Recovery Is Never Easy

It is so amazing how one device can hold so much data all at the same time and still enable you to do more without compromising speed, performance, and efficiency. Modern computers are indeed lifesavers since they allow us to multitask and take advantage of every opportunity out there so we don’t get left behind by the competition. Over the past few years, individuals, businesses, and organizations alike have all made a concerted effort in centralizing everything to ensure that all important files can be accessed in a click of a button whenever the need for it arises.

Unfortunately, things aren’t always smooth sailing. As much as we love technology, it has flaws that aren’t just costly but can give you headaches for days, too. This is an entirely new territory for many of us. Only a few have advanced technical knowledge who are well-versed on the digital lingo and has an extensive understanding of the ins and out of most modern contrivances as well as the World Wide Web. The majority of us are innocent consumers who know so little that we end up just believing whatever we read or hear about. If you aren’t careful enough, you may find yourself worrying about getting a broken device fixed and lost data recovered.

Modern laptops can hold an amazing amount of data, including hundreds of thousands of files, hours of video, and thousands of photos. Given their storage capacity, it’s no surprise that millions of users treat their laptops as long-term storage devices. They see the machine’s still have an ample amount of free space, so they pack them full of work files and personal data. Even though the laptop is built with ample storage, it certainly is not built as an ideal storage container.

One spilled cup of Earl Grey, a drop down a flight of stairs, or even static electricity can all damage a laptop and the trove of data it contains. These machines are prone to damage and aren’t built to withstand drops or spills. Once they’re damaged, the data within is also often inaccessible, which poses a particular problem for those who store their entire digital lives on one machine.


As much as possible, it is better to back up data than have it recovered. For starters, there is no assurance that lost data can still be recovered. Add to that the fact that data recovery services are usually expensive. You have the option of submitting your device for data recovery service but learn to manage your expectations because some data are just lost forever. So before that happens, take advantage of technology as well to protect your most important files from oblivion. Back up your data on flash drives or external hard drives or other forms of data storage devices as well as the cloud. It may be time-consuming having to transfer files on a regular basis but it can save you a lot of trouble once the time comes that your device starts to fail or in case an online bug like malwares or ransomware infect your device and starts corrupting it.

What if all these attempts fail? Even in that case, your precious data may still be safe (unless the primary cause of your startup troubles is a damaged hard drive). Of course, in an ideal world, you won’t need to retrieve that data, because you’ve already backed up all your files. However, if you don't have available backups, then you’ll want to pull your data from your hard drive.

On the simplest level, you can remove the drive from your laptop or desktop and access it from another computer. For example, you could set it up as an external drive, but to do that, you’ll need an enclosure like the models from Inateck ($9 on Amazon) or Sabrent ($9 on Amazon). Just make sure to purchase an enclosure that matches the hard drive you're extracting from your old machine.

Once you have an enclosure, you'll need to power down your computer, remove the side or bottom panel, and disconnect the drive from its enclosure and cables. You’ll want to follow an online guide, which you can find by searching for your computer’s make and model along with the phrase “remove hard drive. If you're not exactly comfortable working on hardware, we recommend that you leave this task to a professional repair shop.


You don’t always need to panic whenever you encounter a problem with your computer. They may be bothersome and cause significant delays in your work and life but there are measures to address them. Not all the time the device can be salvaged and that is a major problem already but don’t let your precious data go down the drain too. Both hardware and software issues can pose a big threat to all the files stored in your device. If you want to spare yourself from all the difficulties of data loss, one of the first things you need to find out is the pricing because you have got to prepare your wallet first, right? Check out: and, which will give you an idea about data recovery pricing that is very reasonable.

Data Recovery Is Never Easy Find more on: HDRG


Wednesday, 31 October 2018

The Future With Robots and Smartphones

You can no longer ignore the direction the planet is taking. Everything has gone technical, digital, and virtual if you know what I mean. Wherever you look, there is some sort of tech advancement that runs the place and ensures everything is in order. Even in our homes, it is also now filled with various tech contrivances that promise to enhance efficiency and make our lives easier and more comfortable.

This has its limitations, though, given that modern tech gadgets cost a lot and not everyone can afford them. But still, the demand continues to grow as other businesses come up with cheaper variants that the masses can afford using the existing technology that is taking the world by storm right now. While some argue that the existence of smartphones has rendered other technologies obsolete, it actually is the exact opposite.

Smartphones will continue to be a staple many can’t live without and demand for parts and other similar technologies are just as popular too. It is a domino effect that isn’t entirely bad for the automation market where other tech gadgets like robots will also benefit from as the public becomes increasingly dependent on these pieces of machinery in doing just about every task they have in their day-to-day. Can you remember the last time you didn’t use any piece of technology and survived a day without it? It’s likely a long time ago, right? For the past years, smartphones have become increasingly popular and the rise of the web and of social media made people even more interested in owning a smart device because it is our ticket to the world.

The smartphone hasn’t killed machinery makers after all. Apple Inc. has yet to release a new version of its iPhone, but the trough in demand looks to be ending anyway. The business cycle lives.

Exhibit one: Fanuc. The Japanese automation giant gave a rosier outlook than three months ago, raising its estimates for full-year operating and net income by more than 5 percent. Costs are expected to be down 2 percent. The company, which is typically conservative in its forecasts, predicted a more than 15 percent gain in net income for the first half through September.

That’s a turnaround from a severely downbeat outlook in April. Then, Fanuc said operating profit would fall 34 percent for the year versus consensus estimates of 9 percent growth. Investors took it to mean the smartphone boom was over. Fanuc’s stock plunged as much as 14 percent the next day.


Despite if any problems with the economy or trade concerns, it is impossible to picture out the world without robots and smartphones in it anymore. Not only does it satiate our desire to enjoy the many wonderful things the world has to offer, it is also a practical choice since a lot of opportunities can be found on the web. People have now taken their business online because that is where everybody is. Can you imagine all the machines powering countless servers that make the World Wide Web go round? Or the innumerable devices that people personally own or use in their schools and offices? These technologies are undoubtedly our present and future and there is no changing that anymore.

Investors have been dumping shares of Japan’s industrial automation leaders, fearing a sustained slump. The reality is that a more nuanced picture is emerging, as fiscal first-quarter earnings may show starting this week: Demand for smartphones, robots, construction machinery and farm equipment isn’t in sync, causing customers’ capital-expenditure cycles to diverge.

Key to the current pall is an imminent retreat in smartphone demand, a key driver of sales for machinery makers. Shares of Fanuc Corp., the biggest supplier to the companies that make and assemble handsets, have dropped almost 40 percent from their January peak.  Japan’s orders from the precision equipment industry in China, the category that includes smartphone makers, plummeted by more than 60 percent in May. 

Suppliers to Apple Inc. buy Fanuc’s machines to produce iPhone casings. So when the Japanese company provided depressing guidance last quarter, the stock tumbled along with those of peers. Fanuc reports Wednesday.


While it is expected that some industries go up and down because of trade concerns and demand going down, the thing is that it will likely recover and keep up with the changes because technology is no longer just a luxury but a necessity in our daily lives. There may be slumps now and then but they do not usually last and recovers after a few months or so. Of course, unlike other commodities, people do not change cellphones after a few months of use although there are people who are like that because they can afford it. The majority do not necessarily follow smartphone trends and make use of their devices for several years before actually changing to a newer model.

It is not only smartphones that require technical parts but computers too especially in the unfortunate situation wherein your device gets broken and you’ll need one fixed or replaced. These mistakes can lead to hard drive failure and the need for data recovery services like that can hopefully revive your device or at least salvage whatever data they can.

The Future With Robots and Smartphones See more on: The Hard Drive Recovery Group Blog


Wednesday, 24 October 2018

AI Is The Future

Technology is all around us today that we can only wonder just how far we can take it further in the coming years. A few years back, smartphones were still a luxury and only the elite can afford it but today, the masses have their own smartphones that allow them to access the web whenever and wherever. This has been made possible when cheaper and more mass-produced handsets are marketed and sold to reach a wider demographic. Hence, even ordinary individuals own a smart gadget that offers more or less the same features as popular brands like Apple and Samsung but only at a fraction of the price.

The technology that we know today continues to move forward and traverse uncharted territories. Let’s take artificial intelligence for example. We are already quite familiar with the concept of artificial intelligence (AI) per se even if the details are still a little vague to most people. It is even available in some technologies we are using. Think of Alexa and Siri and the likes. However, AI may eventually go mainstream with news about Google adding their AI chips to computers within the year. Imagine how many people can now use artificial intelligence technology from the comforts of their own homes, schools, and offices.

Google, one of the top companies in the hot area of artificial intelligence, will begin letting customers directly use its custom processors for the technology starting in October.

Google's TPUs, or tensor processing units, accelerate AI tasks like understanding voice commands or recognizing objects in photos. Today, Google will let you pay to do that kind of work on its cloud-computing infrastructure. But through a program called Edge TPU announced Wednesday, Google will let programmers install the TPUs in their own machines.

"There are also many benefits to be gained from intelligent, real-time decision-making at the point where these devices connect to the network," without having to wait for a trip over the network to Google's machines, Injong Rhee, vice president of Google Cloud's internet of things work, said in a blog post. "Your sensors become more than data collectors -- they make local, real-time, intelligent decisions."


Machine or deep learning is still in its infancy and there are still a lot of questions left unanswered but making a part of the technology readily available to the public may hasten progress and even give answers to some of the questions raised in the past regarding this highly advanced technology. Soon enough, we may even come across announcements informing us that AI will hit the smartphone industry too full-blown this time. That will likely happen sooner rather than later at the rate these advancements are progressing and being developed right now. Competition is also instrumental here since companies want to beat each other so they double their efforts.

“We see there are emerging needs for edge computing, which is essentially running data analytics and intelligence services in locations where data is collected or what we call at the edge,” he said. “This is important as sometimes moving all data to the cloud from sensors can be very expensive.”

The setup is also underpinned by the Cloud IoT Edge software stack. This can run on Android Things or Linux-based devices and equips them with the capabilities they need to carry out machine learning-related data processing tasks.

Rhee said the setup has already been adopted by the IT services arm of electronics giant LG, which is using it to cut the amount of manpower needed in its product testing procedures and predict it could help the organisation save the organisation around $1m a year per product line.


Change is the only constant thing in the planet, so we can expect for more changes to take place right before our very eyes. The Internet of Things is rapidly spreading in different parts of the globe and more and more home and office appliances and gadgets readily connect to the web making this transition even easier and more convenient for the majority. AI and edge computing may be the future but it is already a part of our present. Experts are hoping that the use of AI can reduce problems like failing hard drives which are major headaches to computer users these days. A failing hardware array eventually leads to costly data recovery services but and can definitely help you with your server issues.

The following article AI Is The Future is republished from


The Chinese Invasion On Apple And Amazon Servers

The world is getting smaller and smaller as technology continues to advance forward. Things that used to be a dream in the past are now our ...