welcome to TECHNO WORLD

Friday 24 January 2014

Another News about ' SEA ' CNN website,Facebook,twitter was hacked by Syrian Electric army and showed their unsatisfaction about CNN's fake news of All time




A well-known pro-Syrian hacker group known as Syrian Electronic Army (SEA), aligned with PresidentBashar al-Assad, who successfully attacked The New York Times, Huffington Post, and Twitter, BBC, National Public Radio, Al-Jazeera, Microsoft, Xbox, Skype and responsible for cyber-attacks against various other U.S media companies in the past.

Last evening, the Group claimed the responsibility for hacking another big media outlet “CNN”, compromised their Twitter, Facebook account and the website.

CNN’s twitter profile with 11.6 million followers saw a number of fake tweets from hackers, including allegations that the Central Intelligence Agency (CIA) is behind the Al-Qaida network.

Hackers Tweeted, "Tonight, the #SEA decided to retaliate against #CNN's viciously lying reporting aimed at prolonging the suffering in #Syria."

Following fake tweets were posted:
Syrian Electronic Army Was Here … Stop lying … All your reports are fake!” 
"Obama Bin Laden the lord of terror is brewing lies that the Syrian state controls Al Qaeda."
They also hacked into CNN's "Security Clearance" blog, and posted a new fake article, titled "US declares a state of national emergency, State Department reportedly out of reach."

Within 5 minutes, CNN took control back and deleted all the fake contents. CNN confirmed that some of their social media account were compromised via third-party social publishing platform. "We have secured those accounts and are working to remedy the issue." they said. source by hacker news .. 





Sunday 19 January 2014

Get Alert notification when some unfriend you from Facebook - how to see some one unfriended me




Unfriend Notify is a free extension available for both Chrome and Firefox that alerts you when someone has unfriended you on Facebook. Addictive Tips originally covered it as a Chrome extension, but as it turns out by visiting the extension's Web site, you'll also find a Firefox extension.
Without an extension such as Unfriend Notify, there isn't a straightforward method to discovering who has deleted you as a friend on Facebook. The only two methods available from Facebook directly are to browse through your friends list and try to figure out who is missing, or you can search for someone specifically if you suspect they have deleted you. Neither method is user-friendly, and both can take up a fair amount of your time.
By installing the Unfriend Notify extension you'll find a "Lost Friends" link is placed at the top of your friends list. The link, after someone has unfriended you, will include a number indicating how many people have recently unfriended you.
When Chrome or Firefox is running and the extension discovers someone has unfriended you it will even display an alert, letting you know of the tragic event.
The extension is free, requires no setup other than installation, and starts working instantly. Unfortunately there's no way for the extension to tell you who has unfriended you prior to installing it, but going forward it should work as advertised. source by cnet.
You can find the Firefox version here, or the Chrome version here.



Friday 17 January 2014

What is Malware ? and Types of Malicious Software's and Trojan Horse , Logic Bomb , Back Door or Trap Door , Virus, worm , rabbit, spyware, adware, Zombies of different virus and malware Documentation




What is Malware ? 

Malware is a malicious software. This software include the program
that exploit the vulnerabilities in computing system. The purpose of
malicious software is harm you or steal the information from you.



Types of Malicious


Softwares:

There are three characteristics of malwares:
1 Self-replicating malware actively attempts to propagate by creating
new
copies, or instances, of itself. Malware may also be propagated
passively,
by a user copying it accidentally, for example, but this isn't self-
replication.
2 The population growth of malware describes the overall change in
the number
of malware instances due to self-replication. Malware that doesn't
selfreplicate
will always have a zero population growth, but malware with a
zero population growth may self-replicate.
3 Parasitic malware requires some other executable code in order to
exist.
"Executable" in this context should be taken very broadly to include
anything
that can be executed, such as boot block code on a disk, binary code




Trojan Horse :


Self-replicating: no
Population growth: zero
Parasitic: yes
The most famous malicious software is Trojan
Horse.
There was no love lost between the Greeks and the Trojans. The
Greeks had
besieged the Trojans, holed up in the city of Troy, for ten years. They
finally
took the city by using a clever ploy: the Greeks built an enormous
wooden horse,
concealing soldiers inside, and tricked the Trojans into bringing the
horse into
Troy. When night fell, the soldiers exited the horse and much
unpleasantness
ensued.
In computing, a Trojan horse is a program which purports to do some
benign
task, but secretly performs some additional malicious task. A classic
example is
a password-grabbing login program which prints authentic-looking
"username"
and "password" prompts, and waits for a user to type in the
information. When
this happens, the password grabber stashes the information away for
its creator,
then prints out an "invalid password" message before running the real
login
program. The unsuspecting user thinks they made a typing mistake
and reenters
the information, none the wiser.




Logic Bomb:

Self-replicating: no
Population growth: zero
Parasitic: possibly
The oldest type of malicious software. This
program is embedded with some other program. When certain
condition meets, the logic bomb will destroy your pc.
It also crash at particular date which is fixed by attacer. It will be
included in legitimate or authorized person like this:
legitimate code
if date is Friday the 13th:
crash_computerO
legitimate code
Eg:
if some antivirus trying to delete or clean the logic bomb. The logic
bomb will destroy the pc.


Back Door or Trap Door :     
                       


Self-replicating: no
Population growth: zero
Parasitic: possibly
A back door is any mechanism which bypasses
a normal security check. Programmers
sometimes create back doors for legitimate reasons, such as skipping
a time-consuming authentication process when debugging a network
server.
As with logic bombs, back doors can be placed into legitimate code or
be
standalone programs.
username = read_username()
password = read_password()
if tisername i s "133t h4ck0r":
return ALLOW^LOGIN
if username and password are valid:
return ALLOW_LOGIN
e l s e:
return DENY^LOGIN
One special kind of back door is a RAT, which stands for Remote
Administration
Tool or Remote Access Trojan, depending on who's asked. These
programs
allow a computer to be monitored and controlled remotely;


Virus:            

                                   
Self-replicating: yes                    
Population growth: positive
 Parasitic: yes                                           
A virus is malware that, when executed, tries to replicate itself into                  
other executable                                                
code; when it succeeds, the code is said to be infected. The infected
code, when run, can infect new code in turn. This self-replication into
existing
executable code is the key defining characteristic of a virus.


Types of Virus

1.Parasitic virus:
Traditional and common virus. This will be attached with EXE files
and search for other EXE file to infect them.

2. Memory Resident Virus:
Present in your system memory as a system program. From here
onwards it will infects all program that executes.

3. Boot Sector Virus:
Infects the boot record and spread when the system is booted from
the disk containing the virus.

4. Stealth Virus:
This virus hides itself from detection of antivirus scanning.



Worm:    

                                               Self-replicating: yes 

Population growth: positive                                       
Parasitic: no                                                              
A worm shares several characteristics with a        
virus


The most important characteristic                                
is that worms are self-replicating too, but self-replication of a worm
is distinct in two ways. First, worms are standalone, and do not rely on other                                          
executable code. Second, worms spread from machine to machine
across networks.                                                





Rabbit:

Self-replicating: yes
Population growth: zero
Parasitic: no
Rabbit is the term used to describe malware that multiplies rapidly.
Rabbits
may also be called bacteria, for largely the same reason.
There are actually two kinds of rabbit.The first is a program which tries
to consume all of some system resource, like disk space. A "fork
bomb," a
program which creates new processes in an infinite loop, is a classic
example
of this kind of rabbit. These tend to leave painfully obvious trails
pointing to
the perpetrator, and are not of particular interest.
The second kind of rabbit, which the characteristics above describe, is
a
special case of a worm. This kind of rabbit is a standalone program
which
replicates itself across a network from machine to machine, but deletes
the
original copy of itself after replication. In other words, there is only
one copy
of a given rabbit on a network; it just hops from one computer to
another.
Rabbits are rarely seen in practice.




Spyware:


Spyware is software which collects information
from a computer and transmits
it to someone else.
The exact information spyware gathers may
vary, but can include anything
which potentially has value:

1 Usernames and passwords. These might be harvested from files on
the
machine, or by recording what the user types using a key logger. A
keylogger
differs from a Trojan horse in that a keylogger passively captures
keystrokes
only; no active deception is involved.

2 Email addresses, which would have value to a spammer.

3 Bank account and credit card numbers.

4 Software license keys, to facilitate software pirating.
Definitions



Adware:




Self-replicating: no
Population growth: zero
Parasitic: no
Adware has similarities to spyware in that both
are gathering information about
the user and their habits. Adware is more
marketing-focused, and may pop up
advertisements or redirect a user's web browser to certain web sites in
the hopes
of making a sale. Some adware will attempt to target the advertisement
to fit
the context of what the user is doing. For example, a search for
"Calgary" may
result in an unsolicited pop-up advertisement for "books about
Calgary."
Adware may also gather and transmit information about users which
can be
used for marketing purposes. As with spyware, adware does not self-
replicate.


Zombies



Computers that have been compromised can be used by an attacker for
a
variety of tasks, unbeknownst to the legitimate owner; computers used
in this
way are called zombies. The most common tasks for zombies are
sending spam
and participating in coordinated, large-scale denial-of-service attacks.

Signs that your system is Infected by Malware:

Slow down, malfunction, or display repeated error messages
Won't shut down or restart
Serve up a lot of pop-up ads, or display them when you're not
surfing the web
Display web pages or programs you didn't intend to use, or send
emails you didn't write.










New ASUS ROG Poseidon GTX 780 graphic



The Taiwanese firm has announced the official launch of new graphics dedicated ASUS ROG Poseidon GTX 780, a model enthusiast with faster NVIDIA graphics chip and a specially designed hybrid cooling solution to reduce the temperature up to 140 percent and be three times quieter than the reference design, which adds a yield 12 per cent higher, according to the manufacturer.

The interest component of the ASUS ROG Poseidon GTX 780 is DirectCU H2O cooling system. A hybrid design which allows to dissipate via liquid and air temperature efficiently. The result is a reduction of the temperature to 24° c with respect to the design of reference and with the increase of yield referred to in games like Assassin completo Creed IV: Black Flag and BattleField 4.

Under the elite range ROG, the graph incorporates technologies ROG DIGI +, a few fans resistant to dust accumulation, Thermal Armor to improve the cooling of the MOSFET, Super Alloy, Black Metallic capacitors components, a design of power by 10 phases and the GPU Tweak utility for adjusting graphics performance and reproduction of games live via streaming.




A DIGI + VRM with 10 supply phases of Super Alloy Power, Black metallic capacitors manufactured in Japan, most use and temperature-resistant Super Alloy Power choke and a MOSFET coils, show the level of a graph that includes functions such as GPU Tweak which allows you to make the most of the potential performance of the GPU using controls as the setting of the clock speed, and the voltage of the GPU and video memory, the fan speed and energy consumption thresholds.

Specifications ASUS ROG Poseidon GTX 780

Graphics engine: NVIDIA GeForce GTX 780
Bus: PCI Express 3.0
Core frequency: up to 1006 MHz
Memory frequency: 6008 MHz (1502 MHz GDDR5)
Installed memory: 3 GB GDDR5
Memory interface: 384 bits
CuDA cores: 2304
Outputs: DVI-D, DVI-I, HDMI, Display Port
Consumption: Up to 300 Watts






Intel prepares Haswell renewal and Refresh processors for 2Q14 with 20 new processors


Intel prepares the renewal of Haswell with 20 new processors for desktop computers, including models Celeron, Pentium, Core i3, i5, and new top of range of series: Core i7-4790.

Which Intel marketed this spring (shipments in April 2014) are at least 20 different SKUs. No improvements in the overall architecture of the originals presented at Computex last in sight.

They will use the current socket LGA 1150 and although the launch of new chipsets Z97 and H97 is planned, will be compatible with motherboards today, surely with a simple BIOS update.


Listed models include :-  
 
  •  Core i7-4790 
  •  Core i5-4690 
  •  Core i5-4590 
  • Core i3-4360 
  •  G3450 Pentium Celeron G1840,  and


 versions of low-power :- 
  •  Core i7-4790S 
  •  Core i5-4590S 
  •  Core i3-4150T.


To highlight the new top of range of Haswell platform, Core i7-4790. A micro-processor with four cores and eight threads of native processing, frequencies of 3.6 to 4 GHz, 8 MByte of third level cache, graphics integrated Intel HD 4600 frequently maximum core-to 1200 MHz and a controller for DDR3 memory up to 1600 MHz.

Remember that since the launch of the Haswell last summer, Intel has updated the series with models such as the Celeron G1820, G1820T and G1830, the cheapest you'll find with the most advanced Intel architecture and between 48 and 56 dollars selling prices which focuses them to basic desktop PCs, mini-PCs or computers for home theater.

Already in the third quarter, we will have the renewal of the ' k ' of the Haswell versions with unlocked multiplier. On another level, also the Haswell-E, the first processors of the firm for the consumer sector with 8 physical cores and 16 threads of native  Processors 

And also 

Intel's next-generation Haswell Refresh processors are expected to become available in the retail channel in May, and the CPU giant will also start shipping its Z97 and H97 chipsets in April in order to enable motherboard players such as Asustek Computer and Gigabyte Technology to start selling related products at the end of the month.

Intel will then release its Haswell Refresh K series and Haswell-E in the third quarter and phase out its 

•  Core i5-3350P 

•  Core i3-3225  and

•  Core i3-3210 processors in the first quarter.





Microsoft to employ Halo voice actress for Siri rival, and also to to bring Cortana voice-assistant with Windows Phone 8.1 in April .report says


Jen Taylor, who played the role of AI character Cortana in the Halo video game series, will reportedly be the voice for Microsoft's personal assistant, set for a beta release on Lumia devices in April.


Video game fans became giddy last fall upon hearing that Microsoft was developing a Siri competitor for Windows Phone code-named Cortana, after the AI companion of protagonist Master Chief in the Halo series. Now, it looks like Microsoft is going all in on that sci-fi vision for its personal assistant: Jen Taylor, the actress who played Cortana, is onboard to become the voice behind the information service, Microsoft blog MSFTnerd reported Thursday.

Little else has been dug up regarding the progress of the Cortana project or its arrival other than that it would likely come in one form or another with Windows Phone 8.1 sometime in early 2014. MSFTnerd is claiming as much, slating a Cortana beta launch on Lumia devices for this April, which coincides with Microsoft's annual Build conference in San Francisco.
MSFTnerd is also saying that Cortana will make its way to the Bing app for iPhone this fall and American Xbox One and Windows users in 2015 with the release of Windows Threshold, Microsoft's next-generation OS currently in the works.

With the rise of personal assistants like Siri and more ambitious plans to weave them into much more than our phones -- as Google is doing with Google Now -- it's no wonder Microsoft is trying to differentiate its service with a pop-culture staple and a commitment to making it as true-to-the-original as possible.
And with films like Spike Jonze's "Her" popularizing the notion that our personal computing futures will be abound in human-like AI companions, a personal assistant with a distinct name, recognizable voice (at least to gamers), and well-developed personality thanks to multiple Halo releases has an undeniably cool factor. While it may not create an excess of Windows Phone converts, it will certainly influence the AI landscape if it does in fact arrive soon on desktops andtablets with Windows Threshold.
Earlier this month -- when Microsoft announced that the Xbox One had surpassed 3 million units in sales -- it omitted Halo when discussing upcoming Xbox One titles to celebrate. That caused many fans to bemoan the wait for what is presumably Halo 5, a flagship Xbox One title that currently has one ambiguous trailer, shown last May, to its name. A Microsoft PR spokesperson quickly confirmed that Halo would in fact be arriving by the end of the year.
As the Cortana personal assistant is built out, and most likely retains that moniker from code-named beta to full-fledged service, we can only assume that the Halo series and its iconic characters will become an even larger cornerstone of Microsoft's greater voice and AI efforts in 2014. Though for those privy to the Halo universe and the nature of Cortana's character, it will surely be interesting to see how Microsoft juggles the rollout of its service alongside this new Halo release and its potential plot points.



Additional information has reportedly been revealed about Microsoft's rumoured voice-assistant expected to act as Siri's counterpart in Windows Phones - Cortana.
According to MFSTNerd, the Twitter handle of a purported Microsoft source, the proposed voice-assistant is said to reach Nokia Lumia models by April this year and will be voiced by Halo's Jen Taylor, who is the voice behind the game's artificial intelligence (AI) character, Cortana.
Microsoft has been rumoured to be working on its voice-assistant feature since September, based on the character of the firm's own published gaming title.
The rumoured app made its first appearance back in September 2013, when screenshots of an early Windows  Phone build leaked online, listed as 'zCortana'. Reports by The Verge also showed some screenshots of Cortana which indicated that the service will offer weather information, notifications, and calendar, in addition to alarms and phone calls. The screenshots also indicated that the app will be location-aware, as well.
It has been also speculated that Cortana might arrive with the latest Windows Phone 8.1 OS for smartphones. Last month's report revealed that the Redmond-based company is gearing up to ship itsupcoming Windows  Phone 8.1 with two new features - a notification centre that can be accessed by swiping down from top of the screen, just like Android and iOS, apart from a voice-based assistant believed to be codenamed 'Cortana'.
It's worth pointing out that Windows  Phone already offers the TellMe voice-based assistant, although it's nowhere close to Apple's Siri or Google Now in terms of functionality and accuracy. It is yet to see what Cortana has in store for the Windows  Phone users.



Thursday 16 January 2014

Google reveals smart contact lens prototype that tracks glucose for diabetics



Google unveiled Thursday a contact lens that monitors glucose levels in tears, a potential reprieve for millions of diabetics who have to jab their fingers to draw their own blood as many as 10 times a day.
The prototype, which Google says will take at least five years to reach consumers, is one of several medical devices being designed by companies to make glucose monitoring for diabetic patients more convenient and less invasive than the traditional finger pricks.
The lenses use a minuscule glucose sensor and a wireless transmitter to help those among the world's 382 million diabetics who need insulin keep a close watch on their blood sugar and adjust their dose.
The contact lenses were developed during the past 18 months in the clandestine Google X lab that also came up with a driverless car, Google's Web-surfing eyeglasses and Project Loon, a network of large balloons designed to beam the Internet to unwired places.
But research on the contact lenses began several years earlier at the University of Washington, where scientists worked under National Science Foundation funding. Until Thursday, when Google shared the project with The Associated Press, their work had been kept under wraps.
"You can take it to a certain level in an academic setting, but at Google we were given the latitude to invest in this project," said one of the lead researchers, Brian Otis. "The beautiful thing is we're leveraging all of the innovation in the semiconductor industry that was aimed at making cellphones smaller and more powerful."
American Diabetes Association board chair Dwight Holing said he's gratified that creative scientists are searching for solutions for people with diabetes but warned that the device must provide accurate and timely information.
"People with diabetes base very important health care decisions on the data we get from our monitors," he said.The device looked like a typical contact lens when Otis held one on his index finger. On closer examination, sandwiched in the lens are two twinkling glitter-specks loaded with tens of thousands of miniaturized transistors. It's ringed with a hair-thin antenna.
"It doesn't look like much, but it was a crazy amount of work to get everything so very small," Otis said at Google's Silicon Valley headquarters. It took years of soldering hair-thin wires to miniaturize electronics, essentially building tiny chips from scratch, to make what Otis said is the smallest wireless glucose sensor ever made.
Other non-needle glucose monitoring systems are also in the works, including a similar contact lens by Netherlands-based NovioSense, a minuscule, flexible spring that is tucked under an eyelid. Israel-based OrSense has already tested a thumb cuff, and there have been early designs for tattoos and saliva sensors.
A wristwatch monitor was approved by the FDA in 2001, but patients said the low level electric currents pulling fluid from their skin was painful, and it was buggy.
"There are a lot of people who have big promises," said Dr. Christopher Wilson, CEO of NovioSense. "It's just a question of who gets to market with something that really works first."
Palo Alto Medical Foundation endocrinologist Dr. Larry Levin said it was remarkable and important that a tech firm like Google is getting into the medical field, and that he'd like to be able to offer his patients a pain-free alternative from either pricking their fingers or living with a thick needle embedded in their stomach for constant monitoring.
"Google, they're innovative, they are up on new technologies, and also we have to be honest here, the driving force is money," he said.
Worldwide, the glucose monitoring devices market is expected to be more than $16 billion by the end of this year, according to analysts at Renub Research.
The Google team built the wireless chips in clean rooms, and used advanced engineering to get integrated circuits and a glucose sensor into such a small space.
Researchers also had to build in a system to pull energy from incoming radio frequency waves to power the device enough to collect and transmit one glucose reading per second. The embedded electronics in the lens don't obscure vision because they lie outside the eye's pupil and iris.
Google is now looking for partners with experience bringing similar products to market. Google officials declined to say how many people worked on the project, or how much the firm has invested in it.
An early, outsourced clinical research study with real patients was encouraging, but there are many potential pitfalls yet to come, said University of North Carolina diabetes researcher Dr. John Buse, who was briefed by Google on the lens last week.
"This has the potential to be a real game changer," he said, "but the devil is in the details."
Among those is figuring out how to correlate glucose levels in tears as compared with blood. And what happens on windy days, while chopping onions or during very sad movies? As with any medical device, it would need to be tested and proved accurate, safe, and at least as good as other types of glucose sensors available now to win FDA approval.
About 35 miles from Google in the beach town of Santa Cruz, high school soccer coach and university senior Michael Vahradian, 21, is ready for less invasive glucose monitoring.
He has been pricking himself up to 10 times a day for the past 17 years. A cellphone-sized pump on his hip attaches to a flexible tube implanted in his stomach which shoots rapid-acting insulin into his body around the clock.
"I remember at first it was really hard to make the needle sticks a habit because it hurt so much," he said. "And there are still times I don't want to do it; it hurts and it's inconvenient. When I'm hanging out with friends, heading down to the beach to body surf or going to lunch, I have to hold everyone up to take my blood sugar."
Karen Rose Tank, who left her career as an economist to be a health and wellness coach after her Type 1 diabetes diagnosis 18 years ago, also is encouraged that new glucose monitoring methods may be on the horizon.
"It's really exciting that some of the big tech companies are getting into this market," she said. "They bring so much ingenuity; they're able to look outside the box."




Samsung Electronics Co. Ltd successfully tested super-fast fifth-generation ( 5G ) wireless technology of 1GB per Second over 2 KM and planning to develop on or before 2020




Samsung Electronics Co. Ltd said on Monday it had successfully tested super-fast fifth-generation ( 5G )wireless technology that would eventually allow users to download an entire movie in one second.
The South Korean giant said the test had witnessed data transmission of more than one gigabyte per second over a distance of 2km.
The new technology, which will not be ready for the commercial market before 2020 at the earliest, would offer transmitting speeds “up to several hundred times faster” than existing 4G networks, it said in a statement.
That will permit users to “transmit massive data files including high quality digital movies practically without limitation”, it said.
“As a result, subscribers will be able to enjoy a wide range of services such as 3D movies and games, real-time streaming of ultra high-definition (UHD) content, and remote medical services,” it added.
Samsung said it had found a way to harness millimeter-wave bands which have proved to be a sticking point for the mobile industry to date.
The test used 64 antenna elements, which the tech titan said overcame the issue of “unfavourable propagation characteristics” that have prevented data travelling across long distances using the bands.
One of the most wired countries on earth, South Korea already has around 20 million 4G users.



South Korean tech giant Samsung says it has developed a wireless transmission standard hundreds of times faster than today's 4G LTE, one that could see users downloading entire movies in seconds.

Samsung on Sunday announced that it had developed a core component of its 5G  network by solving a problem that has stymied the wireless industry, Yonhap News reported. Using the 28GHz waveband, Samsung says it has achieved download and upload speeds of tens of gigabits per second (Gbps). Current 4G LTE networks top out at around 75 megabits (Mbps). 

In practice, that speed would allow wireless users to download a full HD movie in seconds. Samsung executives see the technology enabling a wide range of rich applications. 

Samsung used 64 antenna elements in order to accomplish the high-speed data transfer, and said the company expects that it can commercialize the technology by 2020. 

That deadline conforms well to a European Commission goal to have 
5G wireless technology in place by the same year. China, too, has been pouring funding into next-generation wireless technology, with hopes to roll out such technology around the same time.

Samsung for years has regularly pioneered in the area of wireless transmission technologies. Some of its wireless advances the company has been able to patent, and some of those patents have been used against Apple in the two companies' ongoing litigation struggles. Samsung's wireless patents, though, are typically standard essential, meaning the company must grant licenses in a fair, reasonable, and non-discriminatory fashion. 

Samsung is not alone in developing next generation wireless technology, nor is its recently announced demonstration the fastest of its kind. NTT DoCoMo in February announced that it had successfully conducted a 10Gbps wireless test in Japan last year using the 11GHz band.

High data transmission rates are a constant goal for wireless carriers as well as mobile device makers. Higher transmission speeds were a major selling point for a number of Android handsets in the years before Apple added 4G connectivity to its iPhone. Upon moving to 4G, customers tend to like the extra speed, but a survey last year found that nearly half of American consumers felt they don't need 4G LTE. Most carriers are still transitioning to 4G technology, and even those with established 4G networks typically must wait until their customers upgrade their devices in order to get them online with the standard.