Alleged sheep gives birth to a human lamb

Alleged sheep gives birth to a human lamb

    IMMA NIKE
By imma nike
Reports have it that an alleged sheep delivered a human lamb in South African on Thursday. This however generated lots of arguments and environmental concern perhaps a quiz from anonymous Facebook friend threw me into confusion.
He asked, Is this not a consistent rape by a man that caused this? Things are changing and the world is coming to an end. The rate at which human beings have sexual intercourse with different animals troubles me, he said. 

Am not a Doctor neither an animal attendant to answer his questions, but this viral social media (Facebook) incident and photos have been confirmed to be real by the Eastern Cape Department of Rural Development and Agrarian Reform,(ECDRDAR), in South Africa, hitherto have some answers to his questions.
According to the department’s Chief Director of Veterinary Services, Dr Lubabalo Mrwebi, “We call on the local community not to panic over this deformed lamb. We can confirm that this deformed lamb is not a progeny of sheep ovum and a human sperm.
“Virus infections in early stages of pregnancy may infect the foetus and lead to the development of malformations in the growing foetus. It is likely that this is what happened to the Lady Frere sheep‚”
“The gestation period for a sheep is five months. This means that this particular sheep conceived in late December 2016 or early January 2017‚ which was warm with plentiful rainfall in the Chris Hani district‚ conditions which are favourable to the proliferation of mosquitoes and midges known to be the vectors of viruses that cause such diseases such as the Rift Valley Fever (RVF).”
“The resultant circulation of the virus in the blood found its way through the maternal blood into the uterus and the foetus‚ which was at a very critical stage of development‚”
“The infected foetus then‚ as a result‚ failed to form properly‚ leading to the deformity that it became.”
The deformities include: – a deformed head due to abnormal accumulation of fluid in the brain cavity; – a smaller brain than normal; and – an underdeveloped lower jaw.
“The department’s veterinary officials will conduct a postmortem on this deformed lamb and its results will be communicated to the public by the department once complete‚”
“The lesson we are learning from this experience is that small stock farmers must keep their animals protected against diseases like the Rift Valley Fever with a correct vaccine‚ which is best given long before the mating season so that by the time the females get pregnant they are already protected against this disease.”
Fake doctor who sucks patients’ sperm, discharges them without treatment arrested

Fake doctor who sucks patients’ sperm, discharges them without treatment arrested

  1. Fake doctor who sucks patients’ sperm, discharges them without treatment arrested
    Imma nike
Police have arrested a 50-year-old fake doctor working at the Out Patient Department of the Minna General Hospital, Niger state, Usman Umaru, for allegedly indulging in massaging the penis of patients at the hospital and then sucking their sperm when they discharge.
The fake doctor who has reportedly been indulging in the act for over two years before he was caught was arrested after he tried it on a 40-year-old patient who could not release even after several minutes of massaging.

Fake doctor Usman Umaru who sucks patients’ sperm, discharges them without treatment

The inability of the 40-year-old man whose name was given as Sani Baitachi to release infuriated Umaru who, it was reported, angrily slapped him for not being able to release sperm so he could suck.

Sperm

Arguments and quarrelling however ensued between the two men, attracting the attention of even the hospital’s management and Umaru was apprehended.
Confirming the news to newsmen, the Deputy Chief Medical Director of the Minna General Hospital, Dr. Hussaini Yabagi said, “Management will follow the case to its logical conclusion so that it will serve as deterrent to others.”
The reports had it that Umaru was a hospital attendant and had been carrying out the act of sperm licking since his days as an attendant. It also said that the fake doctor has sucked at least, 10 patients’ sperm so far.
On his tactics, the report said Umaru would lure the patients away from the real medical doctor in charge of their cases, take them into one of the hospital wards and massage their penises. Then, when they discharge on his palm, he would lick the sperm and then discharge them without administering further treatment.
Confirming the arrest, the state Police Public Relations Officer (PPRO), DSP Bala Elkana, said that investigation had commenced into the incident.

What does your phone's airplane mode actually do? This is why it's important to use it during a flight

What does your phone's airplane mode actually do? This is why it's important to use it during a flight

Most people think planes will fall out of the sky if their phones are switched on - while this isn't true, the real reason is still significant

By imma Nike

We're all told to switch our phones to airplane mode when we board a flight - or turn them off completely - but why?
You might have been told that the signal interferes with the vehicle's electronics, causing you to have horrible thoughts of the plane falling out of the sky.
While you might have realised this isn't true if you've accidentally left yours on, the real reason behind airplane mode is still important.
According to a pilot's blog on AirlineUpdates.net , mobile phones do interfere with electronics - just not in the way we think.





They actually cause interference on the aircraft's radios, which pilots can then hear in their headphones. It's the same noise you'll be familiar with if you put your mobile too close to a speaker.


The pilot wrote: "It is not safety critical, but is annoying for sure.
"If say 50 people on board are inconsiderate enough who can’t be bothered to switch their [mobile phone] off, there will be 50 phones constantly looking for cell towers at maximum power. That is a lot of radio pollution.
"It is common courtesy. By switching your phone to airplane mode you show your appreciation to the people doing their job to get you where you want to be."
Apparently it's fairly rare, as the pilot added: "I hear it maybe once or twice a month, and I fly about 50 flights every month."
Airplane mode stops this interference from occuring, meaning happy pilots in the cockpit.
So next time you're on a plane, consider who you might be annoying when you're told to switch your phone off - and definitely switch it into flight mode.
Where does toilet waste go on a plane? This is what happens when you hit the flush

Where does toilet waste go on a plane? This is what happens when you hit the flush

Where does toilet waste go on a plane? This is what happens when you hit the flush

Clearly the waste isn't dropped out of the plane (or we would definitely know about it) - so how does it all work?
By imma Nike
definitely know about it if that happened - but instead there's a very effective system in place for disposing of all waste products.
For over 30 years, planes have used vacuum toilets so that they don't have to carry unneccessary water, which would drastically add to the weight.
According to Gizmodo : "Pressing the flush button opens a valve in the bottom of the bowl, exposing the contents to a pneumatic vacuum.

Close-up of airline lavatory door with sign reading 'occupied' 

"That vac sucks the load down the plane's sewer line into a 200-gallon holding tank."
The toilets also have a sort of Teflon non-stick coating to assist in pulling the waste down.
Waste remains in the tank for the duration of the flight and is vacuumed out by crews on the ground.
How do they ensure pilots don't accidentally drop the waste in mid-air? Apparently there's a latch on the exterior of the tank, so it can only be opened from the outside.
So, there you have it. Next time you're on a plane and pop to the loo, you know exactly what's happening.
Just try not to think about the fact there's a 200-gallon tank of excrement under your feet.

10 advanced tips and tricks

10 advanced tips and tricks

These hidden tricks that will help you find what you need faster.



Credit: Rob Schultz / IDG



No matter how good you may be with Google search, there’s always something new to learn given Google’s constant tweaks. This perpetual state of change is most noticeable in Chrome, where Google can integrate search capabilities with its own browser. To advance your search game, or just discover hidden tips, check out these master tips.

View the cached version of a page



Hop into Google’s time machine to see how a site looks when Google last captured it.
google search cached

Google’s all-knowing powers reach back to the previous versions of a website. If you click the arrow below the search result on a specific link, you can view the cached version of the page. This will take you to a static view of the last time Google’s robot snapped a picture of that site.
It’s useful for getting a quick peek, because you’ll only need to load a screen grab from Google’s servers instead of the usual advertisements. I’ve also used this if the site is having network problems.
You probably noticed an option for similar. We’ll tell you what that’s about next.

If you type “related:searchterm” into the search bar, Google will look for similar websites. The results could flesh out your research or give you a broader view on a topic. If nothing else, it’s way better for killing time than checking Twitter.

Look up that image



IDG
Who needs words? Google can find other instances of an image with its search powers.
image search

There’s a neat tool available when you right-click an image in Chrome. From the popup menu, select Search Google for this image and Google will pull up what it thinks is the same image found elsewhere online.
It can be hit-and-miss: In our example above, Google mistook an Acer Chromebook for a MacBook Pro. However, when you're searching for a needle in the Internet's vast haystack, every little bit could help.

Search by voice

To chat with Google search on the desktop, open a new tab, click the microphone, and speak your query. It's as simple as that. 
You don’t yet get the artificial intelligence powers of Google Assistant or the smart home integrations that come with Google Home, but it will save you the extra keystrokes.

Search for results nearby



IDG
Adding the word, “nearby” can put local suggestions front and center.
coffee nearby

Sometimes just one word can make all the difference. For example, adding the word “nearby” to your search will tell Google you’re more interested in finding a local coffee shop than learning the history of the world’s most popular bean. Try it when searching for restaurants or other neighborhood venues, and you may greatly improve the results of your search.

Find your Google Docs faster



IDG
Find that file you’re working on right from Google search.
google drive search

Instead of firing up Drive, you can search it directly. To make this happen, go to Settings > Search > Manage search engines and type 
https://drive.google.com/drive/search?q=%s 
into the list of other search engines. Take a few moments to see which other integrations are present, as some will get added to your browser over time based on the sites you visit.

Find more on Google



playoffs on google

Google’s Knowledge Graph is one of the tools the search giant uses to give you information related to a desktop search. In this example from the NBA, you'll see several posts of recent articles beneath the main search result. 

What’s that word, again?



IDG
Looking up a word on Google is the fastest way to get the meaning and other tidbits about it.
define

As good as Merriam-Webster and other major dictionary sites are, the fastest way to get a word is often right through Google. Type define: and then the word you want to know about.
Click the arrow for some word geekery. You’ll see a line graph of the word’s popularity over time, and you can translate it into a different language. It’s just one more way that Google can be your all-knowing research companion.

Find by file type



IDG
If you’re after a PDF, tell Google so it knows what to look for.
file type

Teachers, students, or others conducting research may be after a PDF, Word document, or another file that’s easy for sharing. If there’s a particular type you want, add in filetype: and then add in pdf, docx, or another format after the search term. 

Have a little fun



IDG
A session of Breakout may break up the monotony of the work day.
breakout

Take a break from research drudgery by firing up the old-school Atari Breakout game. Type Breakout Google into the search bar, then click the result labelled, “atari breakout - Google Search - G.co.” The screen will morph into a mosaic of tiles to be broken apart during your Breakout session. 
WhatsApp's support for BlackBerry platform extended yet again

WhatsApp's support for BlackBerry platform extended yet again

WhatsApp's support for BlackBerry platform extended yet again

Back in February last year, WhatsApp announced that it will stop supporting versions of BlackBerry OS - including BlackBerry 10 - by the end of 2016. That, however didn't happen, and the date was pushed back to June 30, 2017.
Now, the Facebook-owned service has confirmed that the support has been extended yet again - till 31 December 2017 this time.
In fact, WhatsApp's Blackberry client has started receiving a new update, with change-log clearly saying: changed client end-of-life date to December 31, 2017.
Aside from BlackBerry, support for the Nokia S40 has also been extended to end of this year. The app, however, will stop working on Nokia S60 devices after June 30 2017.
'I Want To Expose Google's Mistakes': The Russian Hacker Blamed For A Big Android Fraud Problem

'I Want To Expose Google's Mistakes': The Russian Hacker Blamed For A Big Android Fraud Problem

'I Want To Expose Google's Mistakes': The Russian Hacker Blamed For A Big Android Fraud Problem



Google’s proud of its track record in protecting more than one billion Android phones and tablets from malevolent hackers. But in the last 12 months, it’s been dealt a few blows, including the biggest ad fraud to ever hit its mobile operating system and the most significant single theft of Google accounts thanks to an Android malware called Gooligan.
Those alarming events were set off via networks of cybercriminals focused on the platform, where coders combine their technical skills with the will and financial backing of organized gangs. Sometimes, the latter group don’t even have to pay for the former’s digital tools. Sometimes, the technically-savvy types open their minds for free.
That’s just what a character calling himself Maza-In did just before last Christmas, when he or she posted an in-depth guide on the Exploit.in hacker forum for creating Android ”bankers” — malware designed to steal bank login details from users of Google’s platform. The post not only included directions, but source code for a banker too. There was also a description of the required backend infrastructure, all of which combined could deliver realistic-looking bank pages designed to trick victims into handing over their usernames and passwords.

Forbes' screenshot

And now, Android security experts have pinned a spike in banking malware on Maza-In and that post. They claim that Maza-In, in one fell swoop, caused a sudden leap in Android banking fraud, as cybercriminals took that open sourced code and adapted it to spread both in and outside Google’s official Play store. According to an independent researcher going by the moniker b0n1, as many as 60 variants of malware containing the Maza-In banker have been pushed out into the wider world by hackers hoping to make some easy money.
Check Point, which has been tracking the mini-explosion in Android bank fraud with ElevenPaths, a Telefónica security unit, told Forbes it had records of several dozen servers operating Maza-In’s malware, the largest of which controlled close to 3,000 bots. ElevenPaths said that, from Google Play alone, downloads of apps based on Maza-In’s code stood at above 10,000 and expected to rise, not to mention the number of downloads outside the store.
Those aren’t massive numbers. But what Maza-In and those who adapted his work for their own machinations have proven repeatedly are flaws in Google Play’s security, namely the Bouncer technology that’s supposed to keep bad apples out. Just two weeks ago, a sample of BankBot, based on Maza-In’s creation, was seen inside Google Play initially disguised as a video downloader tool. On June 13th, a very similar looking video downloader was up on the market; underneath was, again, a banker using Maza-In’s work. Going further back to April, a malware called Charger, which also borrowed heavily from Maza-In, was doing much the same, but masquerading as a flashlight app inside the official store, ESET reported. All were removed from Google Play as soon as the tech giant was alerted, but not before thousands were infected.

Check Point

“Before this Maza-In code, there were a lot of Android banking Trojans, for sure,” said ElevenPaths security researcher Sergio de los Santos. “But accessing the source code was not easy and this helps all kinds of people create variants and even get into Google Play. Giving a very simple and effective framework to create and manage your own banking Trojan opens the door to hundreds of profiles of attackers that want to get into business the easy way.
“Maza-in made it very simple to add different banks to attack, so you may see people from Latin America with they own samples focused on banks in there, UK people, Russians.”
A hacker responds
Maza-In says he is no cybercriminal, though. (As Maza-In uses a profile picture of Bob Marley, Forbes has chosen to refer to the hacker in the masculine). In an interview over encrypted chat, he said he only wanted to highlight weaknesses in Google’s operating system, not spawn a spike in Android cybercrime. He claimed, for instance, that despite security firms’ claims he was behind the BankBot banker, another individual was responsible.
Yet he was aware of the criminal use of his code, revealing others, whether they’d given the malware additional features or not, were selling it for between $2,000 and $3,000 a pop on the web’s underground markets. “I did not expect it to work out that way, that it would spread so much,” he told me in Russian (translated by Google Translate).
“I did not write an article to harm people… I’m interested in studying the holey Android, since Google is not able to make a good operating system…. by this I wanted to show the vulnerability of the Android and thought that Google would take care of security.” Unlike security pros who disclose bugs in return for credit or monetary reward, Maza-In said he didn’t contact Google.
In describing just what he thought was wrong with Android security, he added: “The biggest problem is that the device can install any application, get full access to the device and can be substituted for fake banking applications [that can] intercept SMS [and] manage the device. In general, everything is possible.”
As for Check Point and ElevenPaths’ assessment he was a malware creator supporting criminal operations, Maza-In said they’d exaggerated. He even claimed to be working on an Android anti-virus application.
But whilst analysts from both firms agree there’s no evidence he’s actively exploiting Android devices, they say it’s clear he is a malware creator who’s not followed best practise in highlighting security issues. “The blog contains explicit evidence that Maza-in is indeed behind the malware. He also boasted about his malware not being caught until January on one forum,” said Daniel Padon, mobile security researcher at Check Point. According to Lookout Mobile Security researcher Michael Flossman, Maza-In is just one handle used by a crew of Android fraudsters running all the aforementioned fraud malware.
“If you really want to show how unsecure Android is, you write an article about it, you code a proof of concept, you contact the right people to spread t said de los Santos, explaining his disbelief at Maza-In’s claims to innocence.”But creating a Trojan? Oh, c
Whatever the hacker’s involvement in the murkier parts of the internet, he and those who took advantage of his guide have given Google a headache. The company didn’t respond to requests for comment. But with the frequent appearances of these bankers on Google Play, it’s apparent the company has some work to do to keep ne’er-do-wells out of the market and users’ Android devices.



Amazon May Owe You Cash For In-App Purchases Your Kids Made 6 Years Ago

Amazon May Owe You Cash For In-App Purchases Your Kids Made 6 Years Ago


Amazon May Owe You Cash For In-App Purchases Your Kids Made 6 Years Ago


Filed to:AMAZON



There’s no denying that using Amazon’s Kindle is easy. A few years ago; however, it was a little too easy when it came to making in-app purchases, and a ton of kids managed to run up high bills on Mom and Dad’s credit card without anyone realizing until it was too late.
Recently, the FTC announced that it will be offering refunds for some of those unauthorized purchases, specifically in-app purchases that happened on Amazon devices between November 2011 and May 2016. The ease of purchase was cited as one reason, as was the fact that some in-app purchases made it hard for people to realize they were spending real money rather than a game-specific currency. If your kiddo went on a spending spree on your Kindle during that roughly five year time span, then you could potentially get some if not all of that cash back.

If you’re eligible for a refund, then Amazon should have sent you an email letting you know. If you didn’t get a note; however, you can still check to see if you’re owed any cash.
To do so, click here and then log into your Amazon account. Once you do, you’ll either see all of the purchases that are eligible for a refund on the page, or a note letting you know none of your purchases qualify. Amazon is giving out up to $70 million, so there’s a decent chance if you bought apps around then you’re entitled to at least a few dollars.
Once you discover what you’re entitled to, follow the steps on the page to apply for a to a refund sometime between now and May 28, 2018.


Beware! Over 800 Android Apps on Google Play Store Contain 'Xavier' Malware's

Beware! Over 800 Android Apps on Google Play Store Contain 'Xavier' Malware

Over 800 different Android apps that have been downloaded millions of times from Google Play Store found to be infected with malicious ad library that silently collects sensitive user data and can perform dangerous operations.

Dubbed "Xavier," the malicious ad library, initially emerged in September 2016, is a member of AdDown malware family, potentially posing a severe threat to millions of Android users.

Since 90 percent of Android apps are free for anyone to download, advertising on them is a key revenue source for their developers. For this, they integrate Android SDK Ads Library in their apps, which usually doesn't affect an app's core functionality.

According to security researchers at Trend Micro, the malicious ad library comes pre-installed on a wide range of Android applications, including photo editors, wallpapers and ringtone changers, Phone tracking, Volume Booster, Ram Optimizer and music-video player.

Features of Xavier Info-Stealing Malware


The previous variant of Xavier Ad library was a simple adware with an ability to install other APKs silently on the targeted devices, but in the latest release, the malware author has replaced those features with more sophisticated ones, including:
  • Evade Detection: Xavier is smart enough to escape from being analyzed, from both static and dynamic malware analysis, by checking if it is being running in a controlled environment (Emulator), and using data and communication encryptions.
  • Remote Code Execution: The malware has been designed to download codes from a remote Command & Control (C&C) server, allowing hackers to remotely execute any malicious code on the targeted device.
  • Info-Stealing Module: Xavier is configured to steal devices and user related information, which includes user’ email address, Device id, model, OS version, country, manufacturer, sim card operator, resolution, and Installed apps.
According to the researchers, the highest number of infected users are from Southeast countries in Asia such as Vietnam, Philippines, and Indonesia, with a fewer number of downloads are from the United States and Europe.

Here is a list of 75 infected Android apps that Google has already removed from its Play Store, and if you have installed any of these apps on your device, you are advised to remove it immediately.
Android malware continues to evolve with more sophisticated and never-seen-before capabilities with every passing day. Just last week, we saw first Android malware with code injecting capabilities making rounds on Google Play Store.

How to Protect Yourself


The easiest way to prevent yourself from being targeted by a clever malware like Xavier, always beware of fishy applications, even when downloading them from official Play Store and try to stick to the trusted brands only.

Moreover, always look at the reviews below left by other users who have downloaded the app and verify app permissions before installing any app and grant those permissions that have are relevant for the app's purpose.

Last but not the least, you are strongly advised to always keep a good antivirus application on your device that can detect and block such malware before they can infect your device, and keep your device and apps up-to-date.