Brazilian gang hacks and leaks nude photos of female police officer in revenge

Brazilian gang hacks and leaks nude photos of female police officer in revenge

Brazilian gang leaks female police officer’s nude photo’s by hacking her social media account for arresting their boss

In what seems to be a crude revenge, a criminal gang in Brazil has leaked nude images of a female police officer for arresting their bossman by hacking into her private social media account.

According to Media Takeout website, one of the most notorious gangs in Brazil, has lived up to its billing by engaging in a new sort of revenge warfare by leaking the nude photos of a senior female police officer as a way of avenging the arrest of some of their members by the police.

The boss was arrested by a police posse which included the female officer whose name is given as Julia. Julia has been named as a top police officer of Brazilian Military Police of Rio de Janeiro. In revenge the gang hacked into Julia’s private social media account and stumbled on very personal and intimate selfies of the female cop.

The gang, upset at the arrest of its members including their leader who was arrested by police, they promptly released the naked photos.

Media Takeout has not named the Brazilian crime boss nor the name of his gang.

read more

R.I.P. Richard Sapper, IBM’s ThinkPad Designer Has Died

R.I.P. Richard Sapper, IBM's ThinkPad Designer Has Died

Richard Sapper who designed IBM’s Thinkpad, espresso maker and Tizio Lamp passes away at the age of 83

Richard Sapper, a highly influential industrial designer who created everything from award-winning kitchenware and radio sets to cars and computers, has died at the age of 83. He died in Milan on December 31, one of his publishers, London-based Phaidon, said on their website.

Sapper was born and educated in Munich, Germany but spent most of his working life in Italy. He is best known for designing IBM’s gamechanger laptop in 1992, and iconic espresso makers, in both their stovetop and electric, capsule-based forms, for upmarket kitchenware manufacturer Alessi.

“[Good design] has to transmit a message to whomever is looking at it, or who has it in their hand,” Sapper said in a 2013 interview with Dezeen. “What message is another question, but it has to tell them something.”

Sapper was quite a prolific designer. He helped Fiat in designing futuristic bus and car concepts. He also designed Tizio Lamps, 2 million of which were built.

His funeral was held in Milan’s Lutheran church on Tuesday. His daughter Carola told the New York Times that her father had died of complications resulting from cancer.

His publisher, Phaidon described Sapper as “one of the most influential industrial designers of his generation”, saying his best work synthesized a “formal simplicity and rigor, technical understanding not to mention a poetic humour.”

Sapper’s designs were acknowledged in many forums and 15 of his designs are now showcased in New York’s Museum of Modern Art or in London’s Victoria and Albert and Design Museums.

The son of an artist of the same name, Sapper was born in Munich in 1932 and began his career working on car styling for German auto giant Mercedes-Benz. He moved to Milan in 1958, initially to work for architect Gio Ponti and then the department store group La Rinascente.

Sapper designed the first ThinkPad laptop after being appointed principal industrial design consultant to US computer giant IBM in 1980.

In his latter years, Sapper chose to teach students at Yale, the University of Beijing and the Royal College of Art in London, among others.

read more

Drone owner sues neighbour for shooting down his aircraft with a shotgun

Drone owner sues neighbour for shooting down his aircraft with a shotgun

Drone owner files federal lawsuit after neighbor downs aircraft with a shotgun

A Drone owner whose aircraft was shot down by his neighbour had filed a federal lawsuit. John David Boggs, the owner of the drone has filed a lawsuit against William Meredith for shooting down his $1800 drone.

Boggs has demanded that Merideth pay for the cost of the drone and he also wants the United States to clarify federal law related to the operation of drones. The case assumes importance because it specifically asks the federal government to rule on emerging issues related to how a “drone” is defined, as well the relationship between drones, airspace boundaries, privacy rights, and the laws against trespass.

Readers will remember Boggs from the old report we had filed in October 2015. A judge had ruled that Merideth was right in shooting down the drone at that time. Merideth has allegedly shot down the $1800 drone because it was spying on his family. The Bullit County District Court judge determined that Merideth was within his rights when he pulled out a shotgun and shot down a drone that was allegedly spying on his family.

The court went on to dismiss all charges against Meredith. Merideth said the operator was violating his privacy and spying on his family.

WDRB 41 Louisville News

Now Boggs, has filed a lawsuit on Jan. 4 against William Merideth, the man who shot it down. Both men are Bullitt County residents.

The incident in question took place on Sunday, July 26, at a home on Earlywood Way, just south of the intersection in Bullitt County. Hillview Police say they were called to Merideth’s home after someone complained about a firearm. When they arrived, police say Merideth told them he had shot down a drone that was flying over his house. The drone was hit in mid-air and crashed in a field near Merideth’s home.

Police said Boggs, the owner of the drone, claimed he was flying it to get pictures of a friend’s house — and that the cost of the drone was over $1,800.

At that time, the police had charged Merideth with first degree criminal mischief and first degree wanton endangerment. As stated in our earlier report, both charges were dismissed by the judge in October 2015.

“Well, I came out and it was down by the neighbor’s house, about 10 feet off the ground, looking under their canopy that they’ve got in their back yard,” Merideth told WDRB News, the day after the incident. “I went and got my shotgun and I said, ‘I’m not going to do anything unless it’s directly over my property.’”

That moment soon arrived, he said.

“Within a minute or so, here it came,” he said. “It was hovering over top of my property, and I shot it out of the sky.”

“He didn’t just fly over,” he said. “If he had been moving and just kept moving, that would have been one thing — but when he come directly over our heads, and just hovered there, I felt like I had the right.”

“You know, when you’re in your own property, within a six-foot privacy fence, you have the expectation of privacy,” he said. “We don’t know if he was looking at the girls. We don’t know if he was looking for something to steal. To me, it was the same as trespassing.”

Meanwhile Bogg has denied that his drone wasnt spying. Boggs categorically denied Meridith’s allegation that his drone was flying “10 feet off the ground.”

“The bottom line is we didn’t do it,” Boggs said in an interview with WDRB later that week. “We didn’t hover, we didn’t go down, we didn’t do any of that. There’s no way I’m going to fly below the trees the second day I owned it.”

Boggs says he bought the drone just a few days before it was shot down. He said he was planning on using it to shoot video of his kids riding motocross. He says Sunday was a practice session.

“There’s no other explanation other than the truth,” Boggs said.

Video that Boggs claims shows the flight path an altitude of the drone does not corroborate Merideth’s claim that the drone descended to an altitude of just 10 feet from the ground.

“We are now 193 feet above the ground,” Boggs described as he showed us the flight path. “This area here is the world-famous drone slayer home, and this is a neighbor’s home, and our friends live over here, and over here, and over here. You will see now that we did not go below this altitude — we even went higher — nor did we hover over their house to look in. And for sure didn’t descend down to no 10 feet, or look under someone’s canopy, or at somebody’s daughter.”

In support of Boggs, the track shows that the drone hovered for around 30 seconds near Merideth’s home but was at an altitude in excess of 200 feet.

The lawsuit filed Monday pits Boggs’ claim to airspace rights against Merideth’s claim to privacy rights — and asks the federal government to settle the matter.

“This turn of events has set the stage for a conflict between state-based claims of trespass of property, invasion of privacy, and trespass to chattles and longstanding exclusive federal jurisdiction over the national airspace and the protection of air safety,” the lawsuit says. “The tension between private property rights and right to traverse safely the national airspace was resolved during the formative days of manned aviation. The issue is now arising in the context of unmanned aircraft, also known as ‘drones.'”

Specifically, the suit requests that the court issue a declaratory judgment recognizing the drone as an “aircraft,” defined by federal law, and finding that any unmanned aircraft operating in what the law calls “navigable airspace” does not violate a homeowner’s “reasonable expectation of privacy” and thus cannot be shot down.

The suit goes on to criticize Merideth, arguing that he “vows to do it again,” based on a cover photo that appears on Merideth’s Facebook page. The cover photo reads, in capital letters, “NOT ONLY DID I DO IT. BUT I MEANT TO DO IT. AND I’D DO IT AGAIN.” The profile picture on the Facebook page also bears the caption “THE DRONE SLAYER.”

Additionally, the lawsuit includes images of t-shirts the suit alleges were sold by Merideth. The t-shirt bears the words “Team Willie” on the front. The back contains the likeness of a drone in crosshairs with the words, “#DRONESLAYER” and “We the People… have had enough!” The lawsuit alleges that, through these actions, Meredith “implicitly encouraged others to engage in the same conduct.”

Boggs also wants Meredith to pay  “such equitable relief as it deems appropriate, including monetary damages, prejudgment interest, and the cost of filing this action.”

read more

Pirates admit that games are becoming harder to crack

End Of Piracy In Sight? Pirates  Are Worried That PC Games Are Becoming Too Hard To Crack

If you have been pirating games for the longest time ever, then chances are that you will actually have to start paying for titles in the future. Why; because several pirates have admitted that cracking games in 2015 is not what it is cracked up to be (no pun intended). This is thanks to the emergence of sophisticated anti-copy protection, which has become extremely effective in putting pirates at bay that it has become quite difficult to make cracked games playable. Sure, through enough perseverance, crackers are able to make games work, but they have also outlined their long list of instructions and tweaks that you will have to follow in order to make the game work properly.

The latest form of security that games are using is called Denuvo, and thanks to this security, it is taking pirates months in successfully crack a game. Dragon Age: Inquisition was one of the titles that took advantage of this level of security and it almost paid off for them because it took more than a month to get a working crack release for the title. Same is the case with FIFA 2016 and Just Cause 3, which used the same protection, which would explain why their pirated release haven’t reached the gaming community as yet.

There was even a quote on a forum post that states the following regarding the future of pirated titles:

“I still believe that this game can be compromised. But according to current trends in the development of encryption technology, in two years’ time I’m afraid there will be no free games to play in the world.”

Does this really mean that piracy will be completed finished. Not exactly, because where there are pirates, there is always a way to get the games cracked, albeit with significant amounts of difficulty. Since piracy is prevalent around the globe, we highly doubt that it will be finished anytime soon, but thanks to Denuvo, their progress has received quite a bit of hammering in these last 12 months.

read more

Now wake up to the smell of coffee with this scent-producing alarm clock

Now wake up to the smell of coffee with this scent-producing alarm clock

Sensorwake Alarm Clock Wakes You With the Smell of Fresh-Brewed Coffee And Just-Baked Croissants

Do you get annoyed with all the crazy alarms that use beeps, flashing lights, and vibrations to wake you up in the morning? This may now become a thing of the past. You can now wake up to the smell of chocolate, peppermint, fresh-brewed coffee, and just-baked croissants.

Currently, debuting at the Consumer Electronics Show (CES) in Las Vegas, Sensorwake, takes a vastly different approach to getting your attention when it’s time to wake up. Thanks to the “timed release of an aroma of your choice”, the clock uses smell instead of sound to wake you.

Sensorwake is a Paris-based startup that has become part of an incubation program with Google France after winning a Google Science Fair competition.

The brainchild of Guillaume Rolland, a 19-year-old engineering student from France, the Sensorwake was successfully crowd-funded last year to the tune of US$200,000 (AU$284,412).

With reusable scent capsules inserted into a slot along the top edge of the clock, the device functions a little bit like a toaster. Each cartridge has a lifespan of thirty uses and can be purchased on the Sensorwake website. They cost $10 for two, so that’s two months’ worth of smelly wake-up calls, and they are 100 percent recyclable.

Six aromas will be available at launch such as “Espresso,” “Hot Croissant,” “Chocolate,” “Invigorating Peppermint,” “Seaside” (monoi, tiare flower) and “Lush Jungle” (cut grass, leaves).

“Human beings were not meant to wake up to iPhone alarms,” Rolland said. “We are proud of everything we’ve accomplished so far, and we want to keep bringing happiness to our customers’ mornings.”

The alarm clock works by using a cartridge, similar to how some plug-in air fresheners work. When the alarm goes off, it diffuses the scent for three whole minutes.

But do scents work as well as a regular audio alarm in terms of waking you up? Rolland claims that the Sensorwake is just as good as audio alarms, with internal testing showing his scent-based alarm wakes 99 percent of people in 2 minutes.

The Sensorwake could be as effective as Rolland claims; however, previous research on the rousing abilities of scents hasn’t been so positive. A study in 1997, conducted by fire and rescue workers in Irondale, Alabama was designed to test whether adults woke up in the presence of smoke, water and citrus odours. It showed only two out of 10 sleeping adults woke up when they were exposed to smoke or aromas.

A subsequent study at Brown University in 2004 also found that scents were not particularly effective at waking sleepers. Pepperment and pyridine scents were presented in different concentrations to sleepers at different stages of sleep. The odours scored mixed results, while audio tones played over a speaker were significantly more effective at rousing the sleepers, leading the researchers to conclude that “human olfaction is not reliably capable of alerting a sleeper”.

In addition, a subsequent study at Brown University in 2004 suggests scents of both peppermint and pyridine were not effective in waking sleeping participants. However, Sensorwake has been designed with a backup audio alarm that can be activated if the person does not wake up after three minutes with the aroma.

The Sensorwake comes with an insurance policy for any sleepers who aren’t roused by its primary feature. For extra-heavy sleepers or those with stuffed noses, there is a backup sound alarm that you can program to ring if you don’t hit the off button after three minutes of scent.

Available for pre-order now, it’s expected to ship in June 2016 and to hit retail stores in November 2016. It costs $109 in the US (about AU$151 or £74 converted). Pricing and availability in Australia and UK have not yet been announced.

read more

Netflix comes to India, plans start at Rs. 500 with one month free subscription

Netflix comes to India, plans start at Rs. 500

Netflix CEO announces launch of services in 130 countries including India at CES 2016

Netflix plans to start at 500 ($7.50) per month with one month free subscription as promo offer

While television viewers around the world have been able to view free to air television networks such as CNN and BBC News, they could now view specialized channels like Netflix until now.

Starting today, around 130 countries around the world will be able to see Netflix according to CEO Reed Hastings. India figures prominently among the 130 countries where Netflix has launched operations on Wednesday. According to its website, Netflix plans will start at Rs. 500 ($7.50) per month.

Shares of the company, whose popular shows include Unbreakable Kimmy Schmidt, Daredevil and Narcos, jumped 9.3 percent to close at $117.68.

The move confirmed months of speculation on the launch of the service in the second-most populous country in the world.

The company will also offer two other plans priced at Rs. 650 rupees and Rs. 800 rupees, it announced on its website.

Netflix is aggressively moving into new markets and aims to reach 200 countries by the end of 2016, as slowing domestic growth puts pressure on the company.

The news means that Netflix’s total nation count will stand at 190. Netflix has also added Arabic, Korean, and Chinese language support in addition to the 17 languages that were previously supported.

Hastings announced that Netflix is now available in countries that include emerging markets such as India, Russia, Nigeria, Indonesia, Azerbaijan and developed markets such as Poland, Turkey Singapore and South Korea.

Users can access Netflix through an app on a smart TV, gaming console, a streaming player, a smartphone or a tablet.

read more

Here is the world’s first drone that can carry a human inside it

Human carrying drone

Meet the world’s first drone with enough space to accommodate a human being

For the longest time, we have heard of drones being controlled remotely, but thanks to the efforts of a Chinese company called Ehang, all that is about to change. The company unveiled the world’s first drone that can carry a human being inside it and the flying machine was shown off at CES 2016. The name of the drone is Ehang 184 and has four doubled propellers spinning parallel to the ground, which is similar to the functionality of other drones. The drone will require electricity to function, and can be completely charged in two hours. However, you must be wondering what is the maximum weight this drone can carry?

Chinese drone maker unveils human-carrying drone

Turns out quite a bit because Ehang 184 can carry up to 220 pounds of additional weight and fly for 23 minutes at sea level, according to the company. The drone can only accommodate one passenger, but has additional space to fit in a small backpack and even has its own air conditioning and a reading light. With its propellers folded up, the aerial machine has been designed to easily fit in a single parking spot. However, the drone will still function on commands because as soon as the individual sits inside it, he will have to take control of the drone through voice recognition functionality which involves two commands: ‘take off’ and ‘land’.

Chinese drone maker unveils human-carrying drone

Its top speed is 63 miles per hour and has been designed to fly about 1,000 to 1,650 feet off the ground with a maximum altitude of 11,500 feet. While this is a major breakthrough in technology, this piece of hardware will definitely not go under the nose of U.S. authorities, who will probably decide later on if the drone will be able to fly with a human being present inside it, in the country’s own airspace. According to the co-founder and CFO of the company, Shang Hsiao, Ehang 184 is being aimed to sell at a price range of $200,000-$300,000 at the start of this year.

Now here is where the scary part starts. The passenger will have no control over the aerial machine and in case there is a problem, a backup will be in the form of a remote control center that would take over the vehicle and ensure that it lands safely. While a passenger who will sit inside the vehicle for the first time will be nervous knowing that he or she will not be able to control the vehicle, Chief Marketing Officer Derrick Xiong has provided some sort of comfort by saying that the drone has been flown more than a 100 times at low altitudes and that too in a forested area in Guangzhou, China.

While this is comforting to know, the company will have to release various number of footages before passengers start feeling remotely safe over their maiden aerial voyage.

read more

World’s first electricity blackout caused by hackers in Ukraine

World's first electricity blackout caused by hackers in Ukraine

First Ever Power Outage Caused By Hackers With Malware Attack On Electrical Grid In Ukraine

Thousands of people in Ukraine experienced power outage after hackers hit electrical substations during holiday season, say researchers, signalling a worrying sign of potential cyberattacks to come.

“This is the first incident we know of where an attack caused a blackout,” said John Hultquist, head of iSIGHT Partner’s cyberespionage intelligence practice. “It’s always been the scenario we’ve been worried about for years because it has ramifications across broad sectors.”

The power outage in the country first took a regional control center offline resulting in half of the homes in Ukraine’s Ivano-Frankivsk region to be left without power for several hours reported Ukrainian news service TSN in an article posted a day after the December 23 failure. The report went on to say that the outage was the result of malware that disconnected electrical substations.

Researchers at iSIGHT on Monday said their analysis of malware found on the systems of at least three regional electrical operators confirmed that a “destructive” cyberattack led to the blackouts across the Ivano-Frankivsk region of Ukraine.

According to security experts who have long cautioned about the possibility for cyberattacks on the power grid said that electrical outages can lead to ripple effects that leave communities struggling with things like communication and transportation.

If confirmed, this would be the first known instance of a hacker group or individual using malware to cause a full-fledged power outage.

“It’s a milestone because we’ve definitely seen targeted destructive events against energy before—oil firms, for instance—but never the event which causes the blackout,” said Hultquist. “It’s the major scenario we’ve all been concerned about for so long.”

The attackers in this case have used a kind of malware that cleaned files off computer systems, shut them down leading to the blackout, Hultquist said. It’s believed that the trojan known as BlackEnergy, which started out as a tool to create denial of service (DDoS) attacks in 2007 has since been developed into sophisticated malware and is the reason behind the blackout. However, the Trojan was updated two years ago to add a host of new features, including new functions that had the ability to render infected computers useless.

According to ESET, the malware was recently updated again to add a new component called KillDisk, a tool that destroys critical components found within hard drives and contains a deadly function that could “sabotage industrial control systems.” The BlackEnergy malware also contains a backdoored SSH utility that lets attackers gain direct access to the infected machine.

A closer look into BlackEnegry malware indicates that it has mainly been found carrying out spying activities on targets associated with news organizations, power companies and other industrial-based groups. Though iSIGHT has yet to confirm the malware was the culprit, ESET did not tie the malware to the most recent blackout. However, it did state that new BlackEnergy features had more than the necessary capability.

“Our analysis of the destructive KillDisk malware detected in several electricity distribution companies in Ukraine indicates that it is theoretically capable of shutting down critical systems,” said Robert Lipovsky and Anton Cherepanov, both malware researchers for ESET, in a blog post published Monday. “However, there is also another possible explanation. The BlackEnergy backdoor, as well as a recently discovered SSH backdoor, themselves provide attackers with remote access to infected systems. After having successfully infiltrated a critical system with either of these trojans, an attacker would, again theoretically, be perfectly capable of shutting it down. In such case, the planted KillDisk destructive trojan would act as a means of making recovery more difficult.”

Ukrainian authorities have begun investigating a suspected cyberattack on the country’s power grid. iSIGHT believes the attacks that caused the blackout were the work of a hacking group dubbed as “Sandworm” believed to have ties to Russia. However, neither claims have yet been proven. In a 2014 report, iSIGHT said the group was targeting NATO, energy sector firms and U.S. academic institutions as well as government organizations in Ukraine, Poland and Western Europe.

“Operators who have previously targeted American and European sensitive systems look to have actually carried out a successful attack that turned the lights out,” Hultquist said.

In the meantime, cheap attack tools and widespread insecurity across critical infrastructure technology make a devastating attack on energy companies feasible. Recent reports that an American dam was targeted by Iranians showed no country can be complacent.

“[The Ukraine attack] is fairly significant,” Williams added, who described general industrial control system security as a “train wreck as far as security goes”. “The odds are good that you could pop into ICS networks… and replicate this kind of attack.

“I do think this is a wake up call for a lot of energy companies and not just energy companies.” There is certainly a growing list of companies severely damaged by destructive attacks, from Sony Pictures to Saudi Aramco to the Sands Casino. All industries are vulnerable.”

Cyberattacks against infrastructure, such as electricity grids, have also been cause for alarm for politicians. In November, UK chancellor George Osborne confirmed almost £2bn in funding to help protect the UK from cyberattacks and so that it could develop its own.

“If the lights go out, the banks stop working, the hospitals stop functioning or government itself can no longer operate, the impact on society could be catastrophic,” Osborne said at the time.

The coming 2016 is going to be critical for the world of attacks headed for Internet-connected industries, with the first massive attack already causing power outage for hundreds of thousands of naive residents. Malware and its growing capabilities are only going to become more deadly this 2016.

read more

Hackers rejoice, Kali Linux NetHunter 3.0 Android Mobile Penetration Testing Platform released

Hackers rejoice, Kali Linux NetHunter 3.0 Android Mobile Penetration Testing Platform released

Kali Linux developers release the Kali Linux NetHunter 3.0 Android Mobile Penetration Testing Platform

Security researchers, ethical hackers and pentesters can now rejoice. The ultimate pentesting tool for Android smartphones and tablets, Kali Linux NetHunter 3.0 Android application has been released by Offensive Security, the company behind Kali Linux. The application that was in development for over a year was released today by Offensive Security.

Kali NetHunter 3.0 boasts of a completely redesigned user interface which has been application centric. Offensive Security said that the new appliation will support for new and complex attacks while providing support for managing your Kali chroot independently, including the ability to delete and rebuild the chroot, along with support for selecting individual metapackages in the respective chroot.

Offensive Security’s presser on the release says,

“NetHunter has been actively developed for over a year now, and has undergone nothing short of a complete transformation since its last release. We’ve taken our time with v3.0, and the results are a complete overhaul of the NetHunter Android application, with a more polished interface and a fully functioning feature set.”

Kali NetHunter 3.0 will also support Google’s latest Android 6.0 Marshmallow mobile operating system, along with support for the Android 5.0 Lollipop series. It will also support the OnePlus One phone.  Moreover, the application features new build scripts based on the Python dynamic programming language, and it can be easily ported to new devices.

You can read the entire official NetHunter documentation which includes new topics like downloading, building and installing NetHunter, along with overviews of the application’s features and the available attacks.

Last but not least, there’s now a NetHunter installer that successfully runs on GNU/Linux and Mac OS X operating systems, supporting Nexus and OnePlus One devices.

You can download the Kali NetHunter 3.0 from Offensive Security’s official website. You can also access all the relevant documentation and tutorials on the website.

Also read: How to Install and run Kali Linux on any Android Smartphone

read more

Facebook Messenger will soon get bots that will chat with you and follow your command

Facebook Messenger will soon get bots that will chat with you and follow your command

It’s like having your own personal assistant bot in Facebook Messenger

Knowing that the competition is extremely stiff, Facebook Messenger might have something new and exciting coming up in the form of bots. These bots will be able to expand your messaging capabilities beyond the boundaries of texting, sending video clips and GIFs. It looks like the social networking company has given developers access to an unannounced Chat SDK. This Chat SDK will allow them to seamlessly build an army of bots in the Messenger app and these bots will be responsible for carrying out a multitude of tasks.

Ranging from your travelling assistant to your personal shopping cart, these bots will be able to do it all. Not only this, but it looks like sources who are close to this valuable information have stated that the Chat SDK will also allow developers to create bots that in turn, will allow users to send text messages that automatically respond to things such as the following:

• Images
• Location services
• Product prices
• Buy links

Since Facebook Messenger already includes an option to send payments to other people, there is also a possibility that these bots will allow you to make purchases effortlessly through online websites ranging from Amazon to Newegg.

Only recently, Uber announced that its service is going to be integrated into the application that will allow users to call for a call ride with just a tap of a button; similarly, the primary of function of bots could be to bring a whole new level of flexibility for a variety of things. Since Facebook has currently kept this venture private, we will wait for future updates to come through and wait for the company to make this epic announcement.

Imagine having bots present in your application that will allow you to carry out majority of your everyday tasks with a simple push of a button? It definitely sounds too good to be true.

read more