Important notice about Perfect365

A security flaw caused by external malware has affected a number of apps in the Apple store including Perfect365. We have already developed and submitted a repair to fix all vulnerabilities, and the fix is now available in the Apple store. We encourage all users to upgrade to the newest version of Perfect365 in iOS (5.2.77).

Please note: Perfect365 never asks users for their credit card information. Users will always be routed through the app store for credit card or other payment authorizations.

Did you enjoy this post? If so, share it!

Tips to keep your data safe in the cloud

Computing is going to the cloud.

Keeping cloud data safe begins with you.

Cloud computing is no fair-weather fad, with analysts estimating approximately 75 billion devices will be connected to the Internet of Things by 2020. (Still dubious? See: Predictions 2015: The Days Of Fighting The Cloud Are Over).

In an environment of increasing connectivity and the booming presence of ‘smart’ devices in our everyday lives, a lesser known but equally dangerous cyberthreat is social engineering, which uses predictable patterns from consumers (especially when it comes to passwords) to hack into their accounts. You may have heard of phishing emails (such as what happened to The Onion’s Twitter account last week), yet there are other ways hackers can get you to reveal your information.

Password safety practices are key to keeping your online data secure.

But don’t sweat it! Safeguarding your online data is largely a matter of being proactive, and arming yourself with the right knowledge. Here are our favorite basic pieces of advice for doing just that.


1. Your passwords are the gateway to all your online information. Make them strong and unique. 

Password safety practices are key to keeping your online data secure.

  • We know, it’s easier for you to pick something you’ll never forget (the name of your pet iguana + your lucky number) and use that, or variants of that, for every online account. But you wouldn’t use the same key to unlock your office, house, car, mailbox, safe deposit box and briefcase – so why would you use the same password for those equivalent online tools? Make sure to use a different password for each of your crucial online accounts, especially your email.
  • Each of your passwords should be at least 12 characters, and contain at least one of each: upper case letter, lower case letter, special character, and number.
  • Do not share your passwords or write them down. Memory is always your safest bet. If you absolutely need to write your password down, don’t keep it next to the computer.


2. The security of your Internet connection is equally important.

Public Wi-Fi is not the safest.

  • When setting up your home or office Wi-Fi network, follow the password guidelines listed above.
  • Never connect any Internet-enabled device or gadget (cell phone, smart watch, camera) to an open or public Wi-Fi network (meaning, a network that is not password protected). If you share a network with someone, it’s much easier for them to find your data.
  • If you must use an open Wi-Fi network, be sure any emails or information you send over that network are encrypted. Look into free tools that can encrypt emails and text messages. This will ensure your information can only be accessed by the intended recipient with the same encryption tool.


 3. And while we’re on the subject of encryption…

Take advantage of free tools that will encrypt your text messages and emails.

  • Research your connected devices before you buy. When data is stored in the cloud, is encrypted, and transmitted over an encrypted connection, it’s actually safer than if it were stored on a local hard drive in your house!
  • A home monitoring camera like simplicam, for example, employs bank-level encryption on top of using a proprietary video format that can only be unscrambled by the company’s software. Pair that with a secure Wi-Fi network and a good password for your app login, and your video stream is as secure as it can get.
  • Finally, use common sense. If you wouldn’t give a stranger on the street your address or credit card information, be equally careful about sharing that sensitive data online.


By putting these best practices to use, you’ll be taking a proactive approach to keeping your online data safe and secure.

Safe computing in the cloud largely relies on your own best practices for taking steps to ensure your data is secure.

About the author

Caroline Tien-Spalding

Caroline Tien-Spalding is Senior Director of Product Marketing for ArcSoft consumer imaging applications.


Did you enjoy this post? If so, share it!

Tips and tricks for dynamite July 4 smartphone pics

ArcSoft blog - Tips and tricks for taking firework photos

Get ready to take some awesome Fourth of July photos. It’ll be a blast.

Independence Day weekend is just around the corner, which means three days of heat, hot dogs and hometown pageantry. Photo ops abound on this patriotic holiday, but when you throw in ketchup stains, sweat and combustible entertainment, things can get messy. In this article, you’ll find a roundup of tips, gadgets and apps to not only capture great fireworks images, but also also snap stellar portraits of you and your friends during those festive block parties and beach barbecues. So go forth, seize your photographic freedom and liberate your Fourth of July photos from oppressive mediocrity! Continue reading

Did you enjoy this post? If so, share it!