x

Top FBI, CIA, and NSA officials all agree: Don’t use Huawei Phones

Feb 21, 2018 | Blog

When the heads of all three U.S. intelligence agencies reach the same conclusion: “Don’t Buy Huawei phones”, we should probably listen. CBS News is reporting that FBI Director Chrostopher Wray, CIA Director Mike Pompeo, and NSA Director Dan Coats, each gave testimony on Capitol Hill this week to address the cyber security threats facing the nation and all admitted that they would never willingly use a Huawei handset. The intelligence community has been warning about the risk of Huawei for years, but the timing of the message here is clear: buy the new Huawei, Mate 10 Pro at your own risk.

Google Chrome says “Goodbye Ads”

Feb 13, 2018 | Blog

Earlier this year Google announced that it will be integrating an ad blocker into Chrome in order to allow users better experience and cut down spammy or intrusive advertisements. That being said, we now have an official date for this update which will be on February 15th, 2018. However, Google Chrome won’t be removing all ads, just ones that are considered aggressive, such as full page ads, ads with auto-playing sound and video as well as flashing ads. This way Google will try to clean up the web with Chrome, as Chrome is already a Browser leader by the number of users. Websites that contain these unwanted ads will be notified by Google and of a potential blocking through its Ad Experience Report tool. Sites that ignore or fail to meet those standards for 30 days will have all their ads blocked by Google, even the ones “owned or served by Google”, after which they will be able to submit for manual review to have ads re-enabled once the bad ones are removed.

Microsoft claims that Google Chrome is worse than Microsoft Edge

Feb 09, 2018 | Blog

A recent report backs up the company's claims about its browser offering better protection from phishing attacks. Microsoft is clamming that Microsoft’s Internet browser Edge is safer to use and better for battery life than Google Chrome. Chrome is far more popular than Edge, and Microsoft has long struggled to close the gap between these two browsers. Chrome had a 55.08 per cent share of the global market over the past 12 months, compared to less than three per cent for Edge, which was less popular than Safari, UC Browser, Firefox, Opera, and even Internet Explorer. Microsoft, however, argues that Edge outperforms Chrome in several key areas. It has released an ad that reveals the results of a battery test – conducted by Microsoft – in which 720p video was streamed on a loop on three identical laptops, using Edge, Chrome and Firefox.

What is Cryptocurrency?

Feb 07, 2018 | Blog

Cryptocurrencies have become a global phenomenon known to most people. While still somehow geeky and not understood by most people, banks, governments and many companies are aware of its importance. A cryptocurrency is a virtual currency (it only exists on computers) designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled. Satoshi Nakamoto, the unknown inventor of Bitcoin, the first and still most important cryptocurrency, never intended to invent a currency. His goal was to invent something; many people failed to create before digital cash, which was to found a way of how to build a decentralized digital cash system. But how does a cryptocurrency works?

What are the best ways to store your passwords?

Jan 30, 2018 | Blog

It is always highly recommended that we all need to have different passwords for every online accounts that we are using, whether that is our Facebook account, emails or even finance ones. That being said, we have to agree that sometimes it is hard to keep up with all those different passwords especially if we make passwords as randomly possible with so many combinations of letters and numbers. So how should we do it? How to memorize all of them? Should we write them down in our diary, or save it on the PC, or always try to click on ‘Forgot your password?’. The good news is there are plenty of tools out there to secure our passwords and remember them for us. And here five of the easiest to use:

Over 500,000 Users Impacted by Malicious Chrome Extensions

Jan 16, 2018 | Blog

Most of the browsers today offer users ability to install extensions, a web based applications that can enhance the user’s overall experience, but they can also pose a threat with the ability to inject and execute a malicious code. Recently, ICEBRG detected a suspicious spike in outbound network traffic from a custom workstation which prompted an investigation that led to the discovery of four malicious Chrome extensions which managed to infect over half a million users worldwide, including employees of major organizations. Security researchers from US cyber-security firm ICEBRG have spotted four Chrome extensions featuring malicious code that were available through the official Chrome Web Store. The extensions were likely used to conduct click fraud and/or search engine optimization (SEO) manipulation, but they could have also been used by threat actors to gain access to corporate networks and user information, the security company warns.

Tips on How to Secure Your Phone

Dec 22, 2017 | Blog

Smartphones became a necessary part of our lives. Some might say that they are more precious than our wallet, keys or actual computers when it comes to sensitive information. We are using them not only for personal use, but also for shopping, socialising, browsing, banking, playing all kinds of games and more. While doing all of that, our accounts always stay logged in for easier use, which means whoever has access to it or try to access it, essentially has access to our whole lives too. Securing data on your smartphones is becoming more critical than securing your PC or laptop. One the most worrisome issues that can occurred is if your phone gets infected with malware, which can gain access to your phones via the apps you download from third-parties. Needless to say that nobody can properly protecting our own mobile phones but us.

US blames North Korea for cyber-attack

Dec 19, 2017 | Blog

White House homeland security adviser Tom Bossert, said that United States believes North Korea was behind the “WannaCry” cyber-attack earlier this year. This is the first time that the accusation of another country for the cyber-attack was made officially. The US has evidence to support this, while UK and Microsoft came to similar conclusions in their analyses of the attack. The “WannaCry” attack was one of the most devastating acts of cyber-terrorism in recent times. In May, Windows computers that were hit by this cyber-attack had their contents locked, with users asked to pay a ransom in order to have their data restored. This fast-spreading malware locked down several computers in the UK’s NHS hospitals and displayed a message prompting users to pay $300 in Bitcoin to decrypt the files and restore them to working order.

Why YouTube is not for kids

Dec 01, 2017 | Blog

Most parents are letting their children watch something on YouTube just to keep them amused. That being said, we might as well be calling YouTube the babysitter of this generation, which it most certainly shouldn't be. There are thousands of videos on YouTube that may look like popular cartoons but in fact most of them are animated by amateur, being fake versions of it with disturbing and inappropriate content and images that are not suitable for children. And that is not the worse part. Most of these videos despite being violent and weird are insanely popular with millions of views and likes.

Facebook is Using AI to try to Prevent Suicide

Nov 28, 2017 | Blog

Facebook is using artificial intelligence to address one of its darkest challenges: stopping suicide broadcasts. The software is designed to look for users who may be contemplating suicide. After testing the software for the past couple of months, the company announced today it will now be rolled out more broadly. This new initiative will help users who are expressing thoughts of suicide using “pattern recognition”. Which means that it will scan Facebook posts and live videos for words and phrases that could signal suicidal intent. It will also monitor how users respond to these posts. For example, comments like “Are you OK?” and “Can I help?” are particularly useful signs for identifying problem posts. Users will also be given information to contact law enforcement if necessary.

Google Adds New Features in Chrome to Fight Malvertising

Nov 10, 2017 | Blog

Google announced plans today for three new Chrome security features that will block websites from sneakily redirecting users to new URLs without the users or website owner’s permission. One of these features will have a potential to stop malvertising attacks. Google said that these features will be focusing on preventing malvertising campaigns and that it could potentially disrupt the malware scene in the next few months. The company said that the feature will be released in January 2018 with new Chrome 64.

Fake WhatsApp App Attacks 1M Downloads

Nov 07, 2017 | Blog

The Google Play Store has always been filled with malicious and copycats of legitimate apps. The most recent case was with fake Android app that was pretending to be WhatsApp. This App managed to deceive over 1M people using the name “Update WhatsApp Messenger “ while copied the developer’s title “Whats App Inc”, the same title that actual Facebook-owned chat messenger uses on Google Play.

Internet Security Tips for Dummies

Oct 31, 2017 | Blog

No matter if you are a junior or senior PC user, the Internet is full of interesting sites, and tons of information that is available to you at any time, but it is also full of suspicious characters you need to guard against. No matter if you are a casual Internet user or experienced one you should read our security tips and tricks in order to stay safe on the Internet, and to understand better to how the Internet works.

Google will pay you $1,000 to hack Android’s popular apps

Oct 20, 2017 | Blog

Google is well known for maintaining various reward programs for its own apps and services like Chrome and Android. Today, Google has launched a bug bounty program for popular apps available on its Play Store. This will encourage researchers to poke around and look for vulnerabilities in some of Android’s most popular apps, including those built by Google and those built by third party developers.

Samsung’s Device Can Track Your Kids and Pets For You

Oct 17, 2017 | Blog

Samsung’s GPS smart tag called Connect Tag, and first of its kind to use narrowband technology can help you track your kids and pets for you for 7 days on a single charge. Narrowband network technology uses a small amount of data, has a low power consumption rate and has the ability to securely connect online for location services. The Samsung Connect Tag provides location information both indoors and out using GPS, Wi-Fi based positioning and cell ID for location tracking.

Don’t Be an On-line Victim: Top 5 On-line Scams

Oct 13, 2017 | Blog

We can’t imagine life without Internet. It is something that we are all using on a daily basis, and something that is making our life easier to accomplish many things such as banking, research, travel, personal interests and shopping. But wherever we go, and whatever that we do on the Internet, we are leaving our virtual fingertips which scammers, hackers, con artists and other online miscreants can use to take advantage of.

Google Chrome will soon provide “Man in the middle” attack warnings

Sep 12, 2017 | Blog

The search giant never cease to surprise us, this time with new Google Chrome security update which will come with new version of Chrome 63 browser, set to be released on December, 5th. With the upcoming update Chrome browser will be able to detect if the third-party software is performing a “Man in the Middle” attack that intercepts communication between two systems, in other words hijacks the user’s Internet Connection. “A Man in the middle attack” happens when a malicious actor through an application installed on a user’s computer intercepts the user’s web traffic, making it available for him to send, and receive data meant for someone else.  This isn’t an easy thing to prevent, mainly because most of the "Man in the Middle" toolkits fail to correctly rewrite the user’s encrypted connections, causing SSL errors that Chrome can detect. This new Chrome63 feature will be in the form of a new warning screen and it will appear whenever Chrome detects a large number of SSL...

Future Computer Security Trends

Jul 07, 2016 | Blog

Computer security is latest and greatest topic discussed nowadays due to the rapidly evolving technology and the huge amount of sensitive information we store in our computers and other devices. Unfortunately there are a lot of hackers and other cyber threats that are out there to get a hold of this data. So to counter this security threat, new trends are always coming up and changing for the better. Therefore we bring some information security trends that you should keep an eye out for: Cloud service is expanding and so are the attacks on private and corporate data   The use of cloud service is constantly expanding meaning that people and businesses are storing more and more valuable data wirelessly. This provides a good opportunity for hackers to crack the code and target endpoints. This can include stealing your passwords, gaining access to mobile devices or the treat to confidential information that these hackers can tamper with or make public. So the best way...

Your Heavy Antivirus Program Can be the Cause of several PC problems

Jun 22, 2016 | Blog

An Antivirus software (and a good one at that) is absolutely essential for your computer’s security. To protect your computer’s important files and sensitive data it is important that you defend your PC and all other devices in the best way possible. Therefore hundreds and thousands of people turn to antiviruses for protection. Now this is a very good decision indeed but can sometimes do the very opposite, rather than improving your computer it can actually affect its performance drastically. Choosing an excellent, well thought out antivirus is as important as any other thing for your computer and below are some disadvantages we want to warn you of as heavy and bulky antiviruses are not as great as you might be led to believe. Your computer’s memory is limited. This means that there is a limit to the resources you can use on your computer. By installing a heavy antivirus program you can actually be slowing down the entire running speed of your computer as a whole. Either this or...

The most important computer security threats that you need to be aware of

Jun 15, 2016 | Blog

Security threats to computers are always evolving. Therefore we need to constantly change and innovate on how we protect our devices and keep them safe and secure. Here in this blog post, we mention some of the most important threats that you need to be aware of. This is so you can better equip yourself and not fall prey to these dangerous problem causing issues. So what are the threats? Viruses: In terms of frequency, viruses are the most widely prevalent. Viruses infect the computer without the user’s knowledge. They keep on replicating themselves and grow to vast sizes. In the worst of cases they damage the computer by deleting files or formatting the hard disk. These viruses also clog up the computer’s memory to slow it down and cause erratically abrupt changes in its functioning. Even after removing a virus, its after effects can still be very dangerous as many viruses leave back doors for their counterparts or other codes to exploit. So using this back door, another...

Why is malware harmful for your computers?

Jun 08, 2016 | Blog

Why is malware harmful for your computers? In this rapidly evolving world of technology, computers are used more and more to process and save endless amounts of valuable data. This data requires enhanced security as there are many hackers and other threats out there that will do everything to get a hold of your confidential data. So we will educate you about the several aspects of malware that help you better protect your personal devices such as your PCs, mobile devices and other important intellectual properties. The Basics: What is malware? Malware includes a range of a malicious software that directly attack your computer and install themselves to infect your devices. The range includes several programs that can be as insignificant as annoying every day pop ups to deadly viruses that take your machines as hostage and disrupt their daily functions. How Does It Affect Computers? The most commonly known type of threat: viruses lie in the malware category....

Facebook is Taking Security to a Whole New Level

Mar 28, 2016 | Blog

Anyone who uses modern technology today understands the importance of security. This not only concerns your mobile devices, but also includes all your different application accounts - be it Facebook, WhatsApp , and your email too. Even with a social media platform as large as Facebook that connects millions of people around the globe, impersonation and harassment continue to be a major issue that springs up far too frequently. Therefore, issues like these also need to be dealt with on a higher level and priority basis. Why Does Facebook Need to Increase Its Security? Facebook needs to increase its security because harassment and impersonation is definitely a cause of concern. Even though not everyone’s accounts are affected by this at least, a lot of people are being targeted and put at risk. It is generally believed that women are most vulnerable to such mal-practices and it is never a bad idea to increase your security. Even Facebook itself announced that the purpose of...

Apple Users Hacked for the First Time by Ransomware

Mar 14, 2016 | Blog

The need for security has never been felt this critically as one of the most powerful and secure operating systems: Apple’s Mac computers got hacked by a malicious transmission program over the weekend. This incident occurred for the very first time and the reason it shocked many around the world is because Apple’s system is not easily susceptible to such attacks or viruses. What Exactly is the Malware Virus? The malicious software called “ Ransomware ” falls under the class of malware which works by hiding in applications and programs one may hastily download. Its main point of attack is that it encrypts a user’s files and hard drive which locks the victim’s computer unless the user sends the hackers ransom money. In order for users to retrieve control of their data, they are required to send money in hard-to-trace digital currencies which gives these users access to a specific key. The amount usually adds up to 1 Bitcoin which is around $400 before the hackers release the...

3 Tips on Keeping Your PC Cleaner

Mar 13, 2016 | Blog

PC cleanup is the one thing you can do daily that will offer you more disk memory space and assist in freeing up your valuable system resources. In addition, actual physical cleanup, such as dusting will actually help your computer breathe easier and in turn, extend the life of your PC. Here are a few practical tips that you should know on how to keep your PC cleaner . Uninstall Unnecessary Applications Even if you are extremely careful about the websites you visit and the applications you install on your computer, unnecessary programs or apps will still without a doubt creep their way in. Whether through unpatched exploits in the operating system or via widely used apps, user indifference, or even an accidental “OK” click in a dialog box may eventually lead to multiple unnecessary programs showing up on your Windows-based system. Scan your PC now to find out which programs are slowing your PC down. Getting rid of unnecessary programs will free up your system’s...

The Finest List of Mobile Security Apps

Mar 01, 2016 | Blog

Just as mobile usage is increasing, so too is the need for greater and more superior mobile security. For this purpose, numerous security apps are being developed day in and day out to help us stay safe on our cellphones and the innovation for advanced mobile security continues to blossom. These security apps protect your Android devices and tablets from harmful malware , corrupted apps and risk of other infections. These apps offer top-notch malware prevention and detection along with an array of privacy and anti-theft features. Are You Ready For The List? For this very reason, we have gathered an exhaustive list of the absolute best mobile applications that will not only keep your cellphone device secure but also prevent it from being at risk from malicious downloads. These apps have both paid and free versions, however, it should be kept in mind that both these versions are not created equally as the paid apps offer premium services. These apps are rated on their...

Use Two-Step Verification to Strengthen Your PC’s Security

Feb 23, 2016 | Blog

Just as no one can deny the importance of computers in this technologically progressing world, no one can also deny the importance of security for all the valuable information these computers contain. This is why there’s a need for ever new and advancing techniques for keeping your PCs (with all their information) as safe and secure as possible. In this blog we’re going to discuss some of the latest emerging 2-step verification techniques that give you enhanced security for your personal accounts and devices. This added level of security costs nothing and may even help prevent prying eyes from gaining full access to your Facebook, Gmail, or other private information when you step away for a few minutes. It may sound complicated, but it’s really simple. Here’s how it works. You Will Need a Mobile Phone for This The 2-step verification process is broken down into two simple steps, that’s right, 2 steps. The first is setting your main password which is further protected by a...

Why Do We Need an Antivirus Service?

Feb 04, 2016 | Blog

Nowadays, numerous aspects (both positive and negative) have accompanied the technological advancements in the telecommunication sector. Some of the positive aspects include increased Internet accessibility, development of super programming languages and consequently the invention of better software and programs. On the negative side, there has been an increase on cybercrime and the probability of young kids being exposed to extremely harmful content. More alarming is the invasion of viruses with the ability to cause total system damage. This calls for a counteractive measure and an antivirus program such as PC Cure+ and Viracure Antivirus which are proven to serve and protect their users best. Top 3 Advantages of a Good Antivirus Service 1. Protection from viruses – of course Viruses are the most common form of threats known to harm and infect people and their PC systems. Viruses come in multiple forms and are contracted from many different sources as well. A few...

The Simplest Way to Remove Malware From Your PC

Jan 20, 2016 | Blog

The term “malware” is an abbreviation for what is known as “malicious software.” Malware is used to attack computers and steal sensitive information from unsuspecting PC users. You never know who’s on the other side of the internet and trying to steal your personal information, which is why it’s always advised to scan your PC on a regular basis. Scan. Scan. Scan. Malicious and invasive software comes in many different forms and can be contracted via hostile programs, code or even web content. Malware can also serve many different functions such as logging your keystrokes, installing adware and enabling viruses to attack your computer. You should scan your PC for malware all the time just to be safe. Scan Your PC Now with PC Cure+ Using an Antivirus Getting a virus can be easy. However, it can be very hard to detect if your PC has been compromised by malware without a quality antivirus software. But, often times even having a good antivirus program may not be...

One Million New Computer Viruses Are Created Every Day

Dec 22, 2015 | Blog

Here’s how to protect your PC. Earlier this month, the global tech community was astonished to learn that the amount of malware in circulation on the Internet has increased by an astounding figure of 500 times over the course the past ten years. Evgeny Kaspersky, the chairman and CEO of Kaspersky Lab, revealed the frightening statistic during a special conference at the National Polytechnic University of Armenia. Shield Your PC From Viruses Kaspersky’s tech security firm specializes in collecting and studying millions of viruses on the Internet. The company’s virus collection consists of a massive cache of 260 million unique virus samples. When commenting on the breadth of the company’s virus collection, Kaspersky stated that the number of viruses in circulation is constantly increasing and that his company is undergoing a huge burden collecting, “thousands and even millions of malicious files a day." The verification of this daunting data paints a dire picture...

Mozilla Firefox ditching Flash – Should you?

Dec 22, 2015 | Blog

The time has finally come… Mozilla Firefox has officially ditched Flash… and you should, too! Now, if you’re thinking: “Whaaaaaaaaaat?!” let us make it clear… it’s about time to stop considering Adobe Flash as a necessity when it comes to enabling animation and watching media online. Why? We’ll tell you why. Due to recently discovered dangers, Mozilla has unilaterally declared war against Flash by blocking every version of the plugin from running in Firefox, while Facebook wants to stamp it out. Although Google is still using it , it has drastically limited its importance and weakened its impact. This means that if you still want to read content of a Flash-based website, you’ll have to agree to enable it by accepting a warning that “Flash is known to be vulnerable. Use with caution”. And this is a risky business for you to try. Why you should ditch it But why would you want to use an outdated language that can only cause trouble and frustration? There are plenty of ...

5 Reasons Why Your Antivirus Sucks

Dec 22, 2015 | Blog

1. It doesn’t care about you Yes, that’s right. Your current antivirus doesn’t actually care about you, the user. The time has come to meet one of today’s newest security tools for your precious PC. Okay, so maybe an antivirus isn’t supposed to have feelings, but sit tight because you definitely haven’t seen a tool like this before. After a lot of hard work spent on analyzing, strategizing, developing, implementing and running some serious assessments (coffee breaks included), the new Viracure Antivirus is ready to smash up the market and this is why you should know about it. You can help. 2. It doesn’t help others Your antivirus might be just fine, and I’m sure it is... But, who wants “just fine”? Viracure however, is a revolutionary new PC brand that revolves around the idea of helping others while covering important aspects of computer protection. YOU get a worry-free user experience while giving back to the community and staying protected. Since we are a young...

Use Google safe search to ensure your kids are safe as they surf

Dec 22, 2015 | Blog

Google, being the top search engine, is everyone’s best friend when it comes to digging up prime information. However, this doesn’t apply to your children. They might come across some offensive websites as well as upsetting images and videos as they browse through the internet. No need to keep the children in the dark , thanks to this small negative aspect. Just use the Google safe search feature and let the kids stay informed. Here are more tips and tricks to make sure your kids are protected when they conduct searches online. Working with the PC There are numerous other ways of limiting your children’s access to ‘mean’ sites. Windows and iOS operating systems have alternative ways as well. Internet browsers also have an option where you can blacklist the sites you feel aren’t good for the consumption of your kids. You can also discuss with your children and come up with a list of the ‘friendly ‘sites. Once you have this list put in place you can bookmark all of the...

Best Online Shopping and Banking Precautions

Dec 22, 2015 | Blog

Two decades after e-commerce was introduced back in the 1990’s, IT security issues such as fraud, theft among others are still a hindrance to this wonderful innovation. Despite an aggressive digital evolution, as well as a whole industry based on IT security, digital criminals such as hackers and phishers still terrorize users of these services. Despite these challenges, many people are still turning to online shopping as well as banking. With this increasing popularity, it leads us to ask, how do we enhance our safety to facilitate the best online shopping experience? Avoid using Auto-fill features and cookies Most people prefer to login using cookies and auto-fill features since it is easy and faster. However, it is important to note that when you login into any sites that have your user info, or into your banking site, easy and fast never equates to safe and secure . To lower the risk of sensitive info from being pilfered, it is always advisable to take time and login to...

Social media websites allow freedom of speech

Dec 22, 2015 | Blog

Facebook, Twitter, Google+, Linked In, Pinterest and Instagram are some of the most popular social media websites of this day and age. So we thought we’d ask, how are all these wonderful sites alike? You might quickly respond by saying something about a user profile and sending messages. Well, that is quite accurate but have you ever taken time to think about the amount of freedom of speech enjoyed on social media? When “freedom of speech” is mentioned, some of us can’t help but be reminded by the privacy policy. That couldn’t be farther from the truth, but how these social giants are also alike is their inability to provide their users with 100% privacy, no questions asked. Any time you write something online, you always leave digital footprints that are traceable back to you. This means that your online reputation can be easily jeopardized leave you facing some unwanted consequences for your spontaneous posts. Well, this might not be the case any longer. Freedom of speech...

How Do Marketers Use Advertisements to Attract Kids?

Dec 22, 2015 | Blog

You might be fully resistant to advertisements - But see who isn’t. If you are a grown up, it’s very likely that you'vebecome immune to manipulative advertisements that surround us wherever we go, but there are still the ones that have yet to develop the sense for what’s good and what’s not. We’re talking about our kids, of course. As much as we would like to protect them from various powerful and influential commercials, we can’t. There just has to be a reasonable solution for this problem, without having to turn the TV off, or banning them from using the computer. Advertisements for kids are used quite frequently, but do kids really understand them? Why do advertisers target kids more and more each day? Kids that were born in the new millennium are the first generation that is being surrounded with web ads since birth. They were born in a time where traditional ways of advertising are also still present, but since kids have been using more and more internet...

Travelers Beware! Hackers Attack Hotel Rooms, Too! Here Are Top Travel Safety Tips

Dec 22, 2015 | Blog

Yes, it could happen to you too So far, the only worry you’ve had on a vacation was if you brought everything you needed and whether it will be safe under lock and key. Today, hacking has reached a higher level that you can’t even imagine what hackers are capable of doing. Hackers can control all the devices in your hotel room, from the lighting, TV sets, thermostats, to the window blinds. This might be uncomfortable to experience, and a little bit scary, because you have no control, unless you know how to stop them. That’s why you need to stick to some general travel safety tips, even though sometimes you can’t control what’s happening, you absolutely have to know what could happen to you too.   Here’s one AMAZING STORY about what happened in St. Regis Shenzhen hotel After staying in the five star, St. Regis Shenzhen hotel, in China, a guest from Spain, Jesus Molina, accidentally discovered a new way to manage the devices in the rooms . He almost...