Quantcast
Channel: Digital Information World
Viewing all 28682 articles
Browse latest View live

Still Using Windows 7? Malware Is Out to Get You

$
0
0
Windows 7 was a revolutionary operating system. It has garnered users’ attention and love thanks to its many innovative features. When it came out, it was a comprehensive software solution. It was modern, interactive, and had a great design. But that was more than ten years ago.

Microsoft has been upgrading and updating its operating systems, but Windows 7 is no longer the users’ favorite. And since it’s not compatible with the latest technological advances, the company decided to end Windows 7 support.

But some people are still using this operating system. For them, the end of Windows 7 support will bring on a lot of security issues and vulnerabilities.

Windows 7 Security Issues and How to Fix Them

Microsoft has announced that they have ended Windows 7 support on January 14, 2020. That means Windows 7 users will no longer receive security and software updates. It leaves them exposed and vulnerable.

It is particularly worrisome for companies that have a large number of computers that still run on Windows 7. If they haven’t migrated to Windows 10 by now, they will have to work extra hard to keep their data safe. Here are some tips on how to do it:

1. Educate Your Employees (or Family)

If employees aren’t careful when operating older systems, then the risk of breaches is a lot higher. Another common reason for data theft is the fact that users often save the files in unprotected locations. It’s easier for hackers to install viruses and malware to unpatched systems, so employees need to be even more alert. In the end, the number of vulnerabilities in Windows 7 is only going to increase.

Educating employees (or family) will ensure that they are following the best cybersecurity practices. They will know how and where to save sensitive information or how to spot phishing attacks and understand the impact of malware.

2. Run Remaining Patches

Microsoft ended its support for Windows 7 operating system on January 14. But you can still install the patches that have been published before. Many companies suffer from data breaches and hacks because they don't install system updates and run patches often enough. In fact, according to Security Boulevard, 60% of data breach victims could have prevented the attack by installing patches that had already been available.

3. Back-Up All Your Data

Cybercriminals usually rely on the fact that paying a ransom is the easiest option to regain access to one’s files. That’s why digital exploits, such as ransomware, are so common. But by backing up your data in a secure location, you can ensure that your files are safe and accessible at all times.

Moreover, even if you decided to pay the ransom, the chances of getting your data back are very slim. That is yet another reason to consider file backup. And using encryption along with it is the ultimate solution.

4. Use Cybersecurity Solutions

Everyone still using Windows 7 should also employ cybersecurity software, such as a VPN service and antimalware programs.

VPNs will create an extra layer of security by encrypting your internet connection and masking your IP address. It leaves less room for exploitation. Meanwhile, antimalware and antivirus software scans your devices for malware and viruses and deals with these threats.

There are many different solutions out there. You can test the software through an antivirus or VPN free trial and purchase the most suitable option.

Why You Should Consider Upgrading to Windows 10

It can be expensive, bothersome, and complicated to migrate devices to newer software. Especially if you need to upgrade the computers of the entire company. But it is still vital to do so because that way, you will have fewer issues in the long run.

In today’s era of ransomware, be mindful of how you treat your data. WannaCry is a perfect example of how outdated software can have severe consequences for a company. In fact, nearly all WannaCry victims were using computers that were running on Windows 7. So even if you implement all security measures listed above, the chances of getting attacked are reasonably higher.

Windows 10 is a more comprehensive solution in many ways. It follows all the latest industry standards. Plus, and it often gets security updates and patches that mitigate risks and keep the users safe. Moreover, Windows 10 has terrific built-in security features. They can often reduce the need for purchasing additional software. Also, Windows 10 is much faster, more secure, has a better UI/UX, and all newer devices support it.

The Bottom Line

Operating systems are so prone to exploitation, and everyone should be diligent with how they handle their data. Data breaches happen all the time. They have enormous negative impacts on the reputation of businesses. And they can do much damage to individuals too.

So update your Windows 7 operating system as soon as possible. Before you do, be extra alert about what you click and download online. Malware is out there to get you, and it has a lot more chances of succeeding if you are still using Windows 7.


Photo: Reuters/Shannon Stapleton

Read next: Microsoft Finally Revealed Its Stance On Paying Ransomware Demands

YouTube Now Offering Facebook Page Style Channel Permissions for Creators

$
0
0
Part of YouTube’s overall business plan since its very beginning has been encouraging and facilitating the various brands, influencers and creators that were using the platform because of the fact that the content that these people were making was a big part of the reason why users were starting to check YouTube out in the first place. Hence, YouTube has been adding a lot of features that are meant to make the work that creators do a lot easier than it might have been otherwise, and this includes the addition of paid channel subscriptions, tipping systems in live videos as well as a lot more things all of which have been quite positively received by the YouTuber community.

The newest feature that has been added is probably going to be quite well received as well because of the fact that it will help creators to delegate responsibility to other people that they work with. Most big name creators on the platform have people that work for them, people that handle editing and uploads and responding to comments so that the original creator can end up focusing on the creative side of things while leaving the hectic work that they don’t want to do to their employees.

The new feature, as announced by YouTube team in a community help page, will basically make it so that you can give people permission to access your channel in a more limited capacity. There are four levels of access that you would be able to grant people. The manager level is the highest and people with this level of access will have quite a bit of power. Not only will they be able to edit whatever they want but they would be able to control other people’s permissions as well. The only thing managers won’t be able to do is delete the channel which only the channel owner would be able to do.

The next tier has Editors who can basically do everything a manager can except edit other people’s channel permissions. This is followed by the viewer tier that would allow people to see all of the metrics and analytics data but not change anything in the channel. There is a further restricted viewer tier that would not allow the person holding this permission to look at revenue data.


These permissions are a lot like what you see on a Facebook page and it works quite well there. Hence people should realize that YouTube’s changes are going to benefit the creator community and make it more likely that a higher amount of content would end up being published which therefore is going to result in more users flocking to the platform all in all.

Rejoice social media managers! Google finally Introduced Channel Permissions in YouTube Studio

Read next: YouTube on Android Now Has Profile Cards

Strong Passwords and 2FA Not Enough to Keep Your Accounts Secure

$
0
0
Use strong passwords and two-factor authentication (2FA) to protect your accounts.

How many times have you heard this? For the last few years, that was the general security advice. But industry experts now note it is no longer enough.

A hacker armed with an ordinary desktop computer can attempt 1000 password guesses per second. With more sophisticated technologies, that number can be even higher. So as cybercriminals gain access to more advanced tools, it poses your security a more significant risk. Having random passwords and 2FA enabled is not enough to protect yourself.

What's in a Password?

Most websites require you to use 8+ characters long combination of upper and lowercase letters, numbers, special characters as your password. These passwords may be a hassle to remember, but they usually make users feel safe. The key word is “feel.”

Since people have a hard time remembering such passwords, they're more likely to reuse them in different places online. If hackers crack one password, they've now unlocked several accounts.

Weak and reused passwords are already easy enough for hackers to crack. But cybercriminals can compromise even the most robust passwords. There is still an inherent flaw in the way sites store users’ passwords.

IT experts have noted that most of us "overestimate the ability of websites to protect their passwords." It only takes one data breach to put all your data at risk.

If you take a step back, you can see the issue. From the end-user to the website platform and even at the host/ISP level, passwords have security flaws. The solution is to move away from this type of authentication.

Isn’t Two-Factor Authentication Good Enough?

No. Two-factor authentication has increased in popularity in the last few years. Both 2FA and Multi-factor authentication (MFA) attempt to increase account security. They use a one-time password (OTP) number via email or SMS message as the second step of logging into an account.

It may feel like 2FA enhances your security by a lot. But it is, primarily via SMS message, much easier to trick than you realize.

In targeted attacks, hackers use SIM jacking or SIM swapping tools to access OTP numbers. To do this, cybercriminals convince the mobile company to port your phone number onto another device. They use data they’ve already accessed via social media and other channels to convince them it’s you who’s asking. Then they enter your email address and can receive your OTP number.

In other cases, hackers can look into session cookies and other information to see 2FA details almost entirely in the open. No matter how you approach it, 2FA is susceptible to attack.

Moving Towards Greater Security

Cybercriminals can beat every mainstream security tool in use today. You can’t blame only the issues in human memory and the common mistakes people make. There are inherent flaws in systems like 2FA and how websites store data. It's time to move to new solutions.

You can already use biometric fingerprint (https://nordpass.com/features/biometric-fingerprint/) or facial recognition to unlock your phone. In China, two of the most prominent technology players, Tencent And WeChat, have already rolled out systems that allow users to pay through facial scans. You don’t even need a mobile phone for it to work.

Most experts consider China to have the most advanced and secure payment system in the world. Western countries can learn a lot from this model. The technology is already available, but adoption rates are still pretty low. For reference, the US didn't even have widespread use of chip payments until 2015— that’s 20 years after Europeans.

Despite everything, passwords won't go away anytime soon. In the meantime, people should use password managers for safe storing. They also cut the need to create or remember passwords. You can use them to generate random credentials and autofill in login info on your browser.

There's no reason to abandon 2FA, either. Especially if a website doesn't have alternative security methods. Google, Apple, and many other companies have a variety of tools to help users log in via smartphone apps instead.

USB or hardware security keys are excellent options too. They also have features that ensure a site is legitimate before users input their credentials.

Finally, it’s time to embrace biometric authentication. Most banking apps already allow you to log in with the stored biometric fingerprint and facial data on your phone. It's not only secure but also fast and convenient. More platforms are adopting the tool, so keep an eye out on where else you can use it.

You Can’t Be 100% Safe, But You Can Get Close

Cybercriminals have a massive arsenal of weapons. They use these tools to gain access to login credentials, harvest data, and steal identities. But for the most part, they prey on easy targets. If you do a few simple things like using USB security keys or password managers and enabling biometric authentication, you will have a strong shield of protection around you and your data.


Illustration: Slidesgo / FreePik

Read next: Microsoft Office Products Are Considered Favorite Among Hackers

Tim Cook’s Swipe at Mark Zuckerberg – ‘AR does not isolate people like other technologies’

$
0
0
Tim Cook was recently in Dublin to receive an award for Apple’s investment in the country. Tim Cook, Apple’s CEO gave a small interview to journalists in which he ‘might’ have taken a swift at Facebook’s CEO, Mark Zuckerberg.

Apple’s CEO was asked about the future of technologies in coming 10 years by an interviewer on which Tim Cook replied that he saw augmented reality (AR) as the future and next big thing. Apple is heavily investing in AR and producing applications to help developers to develop such apps.

Cook mentioned how AR has a great chance in gaming as well in other sectors due to its great effects and close connection with the human.

Cook further mentioned that AR does not isolate people like other technologies, which might be virtual reality (VR) where Facebook investing the most at the moment.

Even though Cook did not mention it explicitly, but he might be taking a dig at Mark Zuckerberg when he referred to other technologies. Even though both these technologies are the same, but there are slight differences between them.

Facebook bought VR company Oculus in 2014 for $2 billion, which shows Mark Zuckerberg’s interest in VR.


Photo: Getty Images for RFK Human Right

Read next: Germany and US tops the list to request user data, Apple Reveals in its Transparency Report

Instagram is Reportedly Planning on Releasing Map Sticker for Stories!

$
0
0
If there’s one social media service that has been on roll for quite some time now in regards to introducing exciting new features, it’s Instagram. Whether it’s about hiding like count from posts or testing group stories, Instagram has been striving on making its platform as enjoyable for its users as it can get. Well, today isn’t any different either!

According to renowned App Researcher Jane Manchun Wong, the Facebook-owned social media service is reportedly working on a Map Sticker for Stories. Wong also attached a screenshot with her tweet through which we can get a better idea about the feature in question.

As stated by her, she posted the tweet from Hong Kong International Airport. The Map Sticker in her Story shows a mark placed on her location. So, basically the particular feature, if released, will allow us to share our location through an Instagram Story.

According to Wong, the feature hasn’t been released yet. However, she get access to it as well as other unreleased Facebook features by reverse engineering the app.

There’s no word yet regarding when we can expect the general release of Map Sticker or even get access to it in the Beta version. Judging by Wong’s screenshot however, it’s safe to assume that it is close to being ready and witnessing a global roll-out within the next few months. Stay tuned for further updates.



Read next: You'll Soon Be Able To Choose Who Can Mention You On Instagram

Google’s New AI Update Is Ready to Blow Your Mind

$
0
0
Ever since technology has become mainstream, everyone is busy exploring if machines can replace the human mind. They wanted to explore if there will be a time when machines and computers will be able to comprehend and process information as we do. One of the basic challenges that the language-based machine learning models were facing has to do with understanding the context or reference. It seems like Google has come quite close to provide a solution, recently it has introduced a new model which is named as Reformer. This artificial-intelligence-based model has the capability to comprehend a book of 1 million lines by using just 16 GB space. The new model, "Reformer" is a better version of the Transformer that was just using neural networks for comparing words in a paragraph and then it was understanding the relationship between these lines. However, Reformer has a better way of understanding the information as it can comprehend a few lines or paragraphs that are written on the text that is in focus.

The older version of the language-based AI model, "Transformer" used pair matching for understanding sentences, it took a lot of data space in case it was required to process a text of more than a few thousand words. In short, it was quite difficult for the older AI to process even a long article or a book. To resolve this issue, Google launched its improved version of the language-based AI model and named it Reformer. The current model was designed to solve the data space issues as well as the attention span issue. For the attention span, "Reformer" model uses locality sensitive hashing or LHS.

With the use of locality-sensitive hashing, the model is no longer comparing words with each other instead, it is using a hash function to band the identical or rather similar words in one place. These words are then compared with each other and later with the identical words that have been placed in another place. This reduces the time limit as well as prevents processing overload. For solving the memory issue, the researchers tried reversible residual layers with the use of activation of one layer which is layer used at another layer. For testing purposes, Google used images that were read by Reformer and it later created full-frame images out of that. With the new model, processing books is easier, which will open huge opportunities in the future.




Read next: Americans Trust Amazon and Google More than the Government and Oprah: Survey

How Data Privacy Is Changing Online Marketing

$
0
0
Internet technology has revolutionized how businesses market their products and services. Today, it's much easier for companies to interact with their consumers and give them personalized offers. This helps improve consumers' shopping experience while enabling businesses to sell more.

However, the data collection and sharing capabilities that come with internet technology also come with a challenge: cybersecurity. Digital interactions between businesses and consumers often involve the sharing of sensitive information by the latter.

As demonstrated by recent data breach scandals involving large corporations and millions of their customers, there is a genuine risk of data falling into the wrong hands.

This is why different jurisdictions such as California and the EU have passed strict laws that guide how businesses collect, store, use, and secure customer information.

With the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) in effect and other such laws set to be implemented, there’s a question of how online marketing will be affected.

In this article, you’ll get an overview of the things you need to know about the CCPA and learn how you can make your online marketing campaigns compliant with such regulations.

Data Regulation In The US

In the US, data protection is primarily regulated by respective industries and states. In this regard, California has led the way with its CCPA, which seeks to protect the personal information of the residents of California.

Under the regulation, consumers have the right to opt-out of having businesses process their information. If a consumer allows your business to process their information, they have the right to ask what you do with the data and who you share with it.

The CCPA only applies to for-profit organizations that meet one of the following criteria:
  • 50% of revenue comes from selling customer data
  • Annual revenues of $25 million and above
  • Companies that handle the data of at least 50,000 Californians, devices, or households
Failure to comply with the CCPA can attract fines of up to $ 7,500 for intentional violations.

Data Regulation In The European Union

Unlike the US, the European Union implemented the GDPR, which standardizes data protection rules across all EU member states. Each country is then required to adjust their national data policies to mirror the GDPR.

With the GDPR, businesses must first ask for permission before processing consumer data, and the consumer must then confirm their approval via email. Also, GDPR applies to all businesses that offer their services in the EU.

Data Protection And Laws Online Marketing

Data plays an essential role in the success of digital marketing campaigns. By analyzing consumer data, online marketers are able to understand what the market wants based on customer behavior.

This also allows them to understand the unique preferences of each customer, thus allowing them to conduct targeted marketing campaigns. By using personalized marketing techniques, over 80% of marketers are able to gain a return on investment (ROI) on marketing spend of up to 5 times.

With data regulations set to affect marketers' access and use of data, there are concerns that digital marketing may be greatly affected. However, this may not necessarily be true.

Though the CCPA and GDPR may differ in some ways, they operate on the same principles. Their main aim is to ensure that the personal information of customers is secure. This is achieved by giving consumers control over their data.

Though for a digital marketer, this may sound limiting as consumers may decline to have their data processed, research suggests otherwise. Recent findings indicate that over 60% of Americans would rather receive personalized offers than restrict companies from accessing their data.

This suggests that your challenge is not actually accessing customer data, but using it well and ensuring that unauthorized parties do not access it. In essence, these regulations only put in writing what you should already be practicing as a good digital marketer.

Compliance To Data Regulations

In the first half of 2019, there were 3,183 reported breaches, which resulted in the exposure of approximately 4.1 billion records. To ensure that companies dedicate more resources towards protecting consumer data, the GDPR and CCPA impose hefty fines on violations.

To ensure that you are compliant with data regulations, be keen on the following areas.

1. Permission
As with the CCPA and GDPR, expect the data regulations that will also follow to give consumers more control over their data. Therefore, you should put measures in place to ensure that you only use the data you have been allowed to use.

Automate processes where possible to avoid any unnecessary human-data contact and work towards gaining your customers' confidence by:
  • Creating a page for your security policy where all your data security tools, techniques, and certifications are displayed
  • Informing customers of how their data will be used
  • Complying with customer requests to access their data or requests not to use it
To ensure that you are able to give consumers access to their data when needed, have the data in your possession well cataloged. This will make tracking specific files easier.

2. Data Focus
Businesses collect vast amounts of data daily, and most of it ends up unused. Even with the best data security measures in place, keeping data that you do not use in an unnecessary liability.

The first thing you should do is assess the data currently in your possession. Have all data that’s not necessary deleted. Once this is done, define your data needs to know which sets of data to collect and the ones to discard.

It would be best if you then structured your data collection processes to only focus on the necessary data. By taking such measures, you will not only eliminate unnecessary liability but also make data cataloging and protection easier.

Does Data Security Stand In The Way Of Marketing?

Digital marketing revolves around data. Though data regulation policies have some restrictions on how companies should handle customer data, they do not necessarily inhibit marketers.

All you have to do is make sure that data is handled accordingly from collection to processing and storage. In addition, review all your data security measures from time to time to ensure all requirements are met.



Read next: Study Shows That Despite Being Tech-Savvy, Millennials Are More Likely To Sell Their Personal Data!

Tired of Instagram Stories Pacing at the Speed of Light? You Will Soon Be Able to Pause Them Without Any Hassle

$
0
0
Instagram continuously keeps on releasing new and advanced updates for a better experience. Recently, Jane Manchun Wong tweeted about Instagram to introduce a new feature to pause stories. Those who use WhatsApp are already aware of this feature, but on Instagram, you will be able to pause stories even after letting go of your finger.

It is a special feature for those people who like to consume stories for a long time, or you can say who love to stalk other people or check out every corner of the image!

Currently, Instagram users can pause a story by tapping/clicking and holding on the content for as long as they prefer, but soon they'll enjoy a better experience with a single tap.

It is a special good news for them!

Before this update, Instagram released new features for Boomerang along with new updates for its users as well, such as the collage-inspired story feature.

We hope that this feature rolls out soon so we can enjoy stories as long as we want!

Good news Instagram stalkers, the app is testing the ability to pause a Story forever by just a single tap of your finger. Handy feature for those users who consume certain Stories for a prolonged period of time.
Screenshot of current IG Story pause feature when viewed from web.

Read next: Instagram says Good-bye to IGTV icon from home screen, now allows users to upload long videos from the plus button

These 3 apps will stop you from using your phone continuously, thanks to Google

$
0
0
Google is coming up with more and more apps to support their digital wellbeing initiative, which is much appreciated. Recently, Google launched three apps that will keep you on the clock and will help you restrict your phone usage.

Here are the three apps released by Google.

Envelope

Envelope is only available for Pixel 3a as of now, however, the app might roll over to other devices as well. The app transforms your phone into an envelope by following certain instructions. You will receive all these instructions from the app that you must follow to enter this mode. The app will only allow you access to dialer and camera.



It takes a lot of effort to make this envelope, which is why you will mostly avoid doing it again and again. It is a much better app than other of Google’s digital wellbeing apps.

Activity Bubbles

Activity Bubbles is a rather interactive and straightforward app that creates bubbles wallpaper on your phone. When you unlock your phone, the app will appear on the screen and will keep growing until you use your phone. When you lock your phone, the bubble will stop growing. You will get a clear picture of phone usage by the end of the day.


Screen Stopwatch

Almost like Activity Bubbles, but with a live wallpaper of stopwatch will give you serious anxiety. When you unlock your phone, the stopwatch will start and will not stop unless you lock your phone. By the end of the day, you will know the exact number of how much you used your phone in the day.



These apps are very amusing as well as beneficial if you are seriously looking to control your time spent on social media through smartphones. Try these apps out by Google, you will be amazed by their result!

Read next: Are People Really Concerned About Their Screen Time?

TikTok now Allows you to Hide Certain Videos from your Feed; a New Search Page on the Horizon?

$
0
0
If there’s one social media app that has amassed widespread recognition in a surprisingly less amount of time, it’s TikTok. Ever since the service’s launch back in 2017, it has downloaded by millions of users. In order to keep things fresh and enjoyable for its users, TikTok often tests and rolls out new updates and features… and today isn’t any different either.

Recently, renowned social media consultant Matt Navarra posted a couple of tweets centered on TikTok. The first tweet mentions a newly added functionality that will help viewers gain control of the content they come across on the platform. Basically, TikTok will now be allowing users to either hide all videos posted by a particular creator, or better yet, all videos with a specific sound.



As the screenshot in Navarra’s tweet indicates, you will be able to hide the desired posts by tapping on the screen first, then tapping on the “Not Interested” button and following it by choosing the hiding option that suits you better.

The second tweet by Navarra is about a design revamp that is still in testing phase. In case everything goes on smoothly, we can soon be witnessing a new and improved search page on TikTok which will sort all videos by their categories. Navarra also included a screenshot in his tweet to give us a better look at the new (potential) search page. Users will be able to choose if they would like to only view dance videos, pop-culture, gaming content or other categories’ clips.



As stated above, the option to hide specific videos has already been rolled out and you are informed to update your TikTok app to the latest available version to access it (in case you are still running an outdated version of the app). As for the change in search page, it might take at least a few weeks before it gets rolled out. Stay tuned for further updates in this story.

Read next: TikTok will beat Instagram as it's a talent-based platform, claims Evan Spiegel

Advertisers Reluctant to Invest in Non-Newsfeed Instagram Ads, Cowen Reports

$
0
0
Although we see a lot of ads on Facebook and Instagram, but that does not mean that the company is booming with dollars by it. The growth of Facebook’s advertising business is slowing down, which is why it is encouraging advertisers to invest in Instagram stories and Explore tab ads.

Cowen, a financial services firm reported (as cited by BusinessInsider) that the advertisers are reluctant to invest their advertising dollars in the Instagram Explore tab and stories ads.

To come to a conclusion, Cowen surveyed about 50 advertisers in the US who spent about $12.5 billion on advertising in 2019.

Cowen found that only 64% of the advertisers invested in the Stories ads in 2019. From the data, it is evident that 72% of the Instagram ads will be seen on newsfeed this year. A lot of advertisers appreciated Instagram as it is affordable and directly target the consumer, which is the best thing.

However, when it comes to Instagram Stories, advertisers are reporting challenges related to results.



Despite the reluctance to Instagram Stories, they are still more favored than the Snapchat Stories.

Cowen also mentioned that Instagram Explore tab is not much favorable as compared to news feed ad as only 24% of advertisers is willing to invest in them in 2020.



Read next: Instagram Can Become The Next Favorite Destination of Shopaholics - But The Start Is Slow

The Annual Mobile Shipment Is Expected To Grow Over the Next 2 Years Due To 5G Devices: Report

$
0
0
Smart gadgets have become an important part of our lives and this is the reason that the shipment of devices like PCs, tablets and mobile phones is expected to reach 2.16 billion units this year. It will be a 0.9% increase in the shipment of devices from 2019, which is mainly due to 5G handsets, says Gartner report.

In 2020, 12 percent of the mobile shipments will be of 5G models and by 2022, it will increase to 43 percent.

Ranjit Atwal, Senior Director Analyst at Gartner, said there will be a minor market recovery in 2020. Mobile phone replacement will grow with the availability of 5G handsets and the global device shipments will grow this year.

Last year, the total global shipment of devices was 2.15 billion units, whereas, in 2020, the mobile phone market is expected to grow by 1.7 percent.

There was a 2 percent decline in the shipment of mobile phones in 2019 from the previous year but the shipment is expected to grow in 2020, especially in China and the emerging markets in Asia/ Pacific.

This year, prices of 5G might lower and more people will adopt it. The 5G services coverage will also increase and users will enjoy an improved experience with 5G devices.


In about three years, the market will grow even more and in 2023, 50 percent of the shipment of the mobile device will account for 5G handsets.

Though in 2019 there was a growth in PC shipments but this year again it is expected to decline. According to the report, in 2020 the market will be affected due to the migration to Windows 10

There will be a growth in the professional PC market over the next three years after which the replacement level will decrease.

Almost one billion PCs will migrate to Windows 10 in 2020, which is 80 percent of all the total Pcs in use.

According to Atwal, it is difficult to predict the future of the PC market as there is no chance of Windows 11, in fact only a few systematic regular updates for Windows 10 will be seen.



Read next: According to Parents, 12 to 15 Is the Appropriate Age Bracket for Kids to Have Smartphones (Survey)

Finally, a Reverse Engineer Revealed That Microsoft Wordpad Will Soon Be Updated, but It May Annoy You

$
0
0
WordPad was the last app that we ever imagined to change, but that’s over. Rafael Rivera recently posted on his Twitter account that WordPad will be updated, but you might not like the new change.

WordPad was the simplest app by Microsoft that you allowed users to create documents without any hassle. WordPad never created any issues or delayed the process due to intrusive pop ups or anything, but not anymore. After years, WordPad’s new change is focused on adding adverts to the app – not actually a change, but a fuss.

Now you will see adverts on WordPad that are mostly directly towards Microsoft Word, Excel, PowerPoint and others. You might see ads like, ‘Try Word for free’ or other ads directing users to other Microsoft office web apps.

Microsoft is probably getting its inspiration from Facebook when it comes to blatant advertising practices.

Fuss-free days are over, time to see ads on WordPad as well.

Finally, a Reverse Engineer Revealed That Microsoft Wordpad Will Soon Be Updated, but It May Annoy You

Read next: Microsoft Office Products Are Considered Favorite Among Hackers

Google Chrome may soon block Not Safe For Work Themes and Extensions for Child Users

$
0
0
Google is all set to block chromes's adult themes and extensions for child users.

Google Chrome may soon get filters that don't allow the installation of "Mature" marked themes and extensions for child accounts, not even with the option of parental approval.

Chrome browser will also restrict the mature addons if the user is identified as a student.

A request of code change was spotted in the Chromium Gerrit which says that Google could soon block the 'Not Safe For Work' content from Chrome Web Store.

The request's description has all the details like after this CL, child users, won't be able to install mature extensions and themes.

The user won't be able to ask for parental permission as the option isn't available in the first place.

Though it has a few bugs, for example, only extensions and themes will have restrictions, and the child user would still be able to see the images in Chrome Web Store (CWS).


The Rating Guidelines, released by Google Chrome, include all the information about how the company decides, whether a product should be marked as mature or not.

As per Google Guideline, the content that shows close up images of inappropriate clothes, adult themes and apps that include detailed sex descriptions are considered as "mature content".

Google marks those apps as mature that display images of men and women that pose in sexually aggressive ways and also the dating applications that show sexual content.

However, images and apps that show people hugging and kissing aren't considered as mature by Google.

Moreover, this feature could take a considerable amount of time to reach the Chrome browser as no information about its official release is available.



Read next: Google Chrome Web Store Apps Will Soon Be No More

WhatsApp Dark Mode Finally On Its Way to Becoming a Reality - Update Available as Beta Testers for Android Users

$
0
0
WhatsApp is finally on the way of giving out the best feature to its users – the dark mode. Months before the official update, the users were seeing some highlights of the dark mode in the form of an app interface and code, but now that the feature is up for the update – what are you waiting for?

The new dark mode update of WhatsApp is available as the ‘Dark’ in the theme section from where you can easily turn on the new dark mode. After long waiting, WhatsApp is finally available in a dark theme. The whole application is now dark green in color with little contrasting colors here and there.

Before you move on to believe that it might be a permanent update, but it is only a beta tester for now. If you are not a beta tester, then you can register yourself as one from Google Play Store until the update is finally rolled out from a proper channel. Although that might not take a long time, hang in there!

We tested the dark mode on a Samsung device and found it super easy on eyes, however some finishing touches are still required from developer end, as the icon for "touch the fingerprint sensor" on lock screen page is still not clearly visible. (Update: In version 2.20.15 Whatsapp has made the touch icon more visible).

Much awaited dark mode feature is finally here

WhatsApp is one of the most versatile app of today’s time, making conversations and media-sharing hassle-free for people all over the globe. With over billions of users, the app is famous for introducing new emojis, updates and other features for user’s feasibility.

Also, Story sharing has further made life easier for people. Now everything is bundled in one single app – WhatsApp. Recently, it was in the news that the WhatsApp will be fueled with adverts that enraged users. Some went to an extent of saying, they will leave WhatsApp and move to other apps if adverts come to WhatsApp as well.

Being number one app, it was the only messaging platform that was missing a dark mode. From Instagram update to Facebook Messenger – dark mode is enabled in all the apps now, except for WhatsApp.

Zuckerberg realized it later, but at least he did!

All the fans of low light will love the new update due to excellent User Interface (UI) that comes with a dark mode. If you love dark mode, then it is definitely good news for you.

If you are thinking about how you can activate this feature in WhatsApp, then here are the details.

Enable Dark Mode in WhatsApp

Enabling dark mode in WhatsApp is extremely simple, just follow these simple steps and get your WhatsApp’s dark mode on.
  • Download the latest WhatsApp beta app (version 2.20.13)
  • Open the app and click on the three dot menu
  • Tap on Settings
  • Tap on Chats, then click on the Theme option
  • Once there, tap on the Dark option to activate the theme
It takes only a few steps to enable the dark mode, also you can choose the System default to let your WhatsApp choose between dark and light mode according to the system settings.

WhatsApp’s dark mode arrives in latest Android beta. Here's how to enable it

Although the theme is only available for beta users right now, but it is expected to release pretty soon for everyone. Until it is not released, beta testers can enjoy it and other users can wait for its release.

Read next: WhatsApp Is Now The Second Non-Google Android App To Complete Five Billion Downloads On Play Store

Vodafone Leaves Facebook’s Libra Initiative & Joins Visa, eBay, MasterCard, PayPal and others

$
0
0
Vodafone has come out as the latest company to leave Facebook’s Libra initiative. For those who do not know, Libra Association is a group of members supporting Libra– a cryptocurrency initiative by Facebook.

We have seen in the past how Bitcoin faced severe consequences, yet Facebook has embarked on the mission to help businesses and other entities on Facebook by giving them their own payment method.

When Facebook started this mission out, many companies and top names were onboard with them; however, the seats at the table are one by one emptying.

Recently, a spokesperson for Vodafone mentioned that Vodafone will mostly focus on M-Pesa digital payment service rather than Libra. The M-Pesa is expected to grow and move to newer regions and nations as it is only operating in Africa as of now.

Although the supporters are leaving Facebook’s initiative one by one but the company stays on its ground by saying that the members keep changing with time, but the Libra’s governance and the roll-out of this payment system will remain resilient.

Vodafone is not the first to leave Libra– eBay, MasterCard, PayPal, Booking Holdings, Stripe, and Visa is others that left Libra before Vodafone.

The list of companies to join Libra is long, but these were some of the best payment service companies to leave Facebook in between.


Photo: Chesnot via Getty Images

Read next: Tim Cook’s Swipe at Mark Zuckerberg – ‘AR does not isolate people like other technologies’

12 Reasons to Strengthen Your Security Posture Now (And How to Do It)

$
0
0
Are you confident that your organization can anticipate all the digital threats it’s likely to face this year? That it can reduce the harm associated with those threats, if one or more come to fruition?

If you’re being honest with yourself, the answer on both counts is “no.” The threat landscape is too diverse and fast-moving to keep a bead on.

Critical data security measures such as comprehensive cloud backup and top of the line anti-malware protection certainly help. However, you can and must do more. We’ll discuss some of the steps you should take to protect your company’s digital assets in a moment, but first, let’s review the latest cybersecurity trends for 2020 and beyond.

1. Ransomware Is a Pervasive and Growing Threat in 2020

Ransomware is so 2019. Or is it?

Think again. Despite growing awareness of the threat, ransomware continues to pose serious risks for organizations. In fact, as the sophistication of ransomware vectors and sponsors increases, even organizations with adequate defenses may find themselves vulnerable to attack.

The threat posed by ransomware isn’t merely one of annoyance. In many cases, ransomware attacks result in massive data loss or corruption, setting organizations back months or years. The reputation hit is nothing to wink at, either. Prepare accordingly.

2. AI Is Improving Faster Than You Realize — And That’s Helping the Bad Guys, Too

The next frontier in threat delivery is inhuman, literally. AI-assisted malware is already causing headaches for ill-prepared organizations, and as the quality of deep learning and natural language processing algorithms improves, it’s likely to affect even the best-prepared companies and individuals.

One of the most concerning AI-assisted malware vectors is the dreaded deepfake. Today, deepfakes remain discernible to careful observers, but it’s just a matter of time before they’re able to fool the best among us. When that day comes, watch out — you’ll never know for sure whether that video message from your boss is what it purports to be.

3. Phishing: An Oldie, But a Goodie

Next to the deepfake, phishing is a comparatively ancient form of digital impersonation. Somehow, some way, it remains effective.

Whatever the reason, it’s crucial to educate your workforce about phishing. That means how to spot it, how to avoid falling victim to it, and what steps to take if you fail to do the first two. One easy thing you can do is ensure your email suite is set up to warn recipients about external messages, and that said recipients are educated about the dangers of opening attachments or viewing images in such messages.

4. Spearphishing: Phishing 2.0 (Back and Better Than Ever)

Spearphishing is, in a nutshell, phishing 2.0. Whereas phishing is a numbers game that relies upon credulous recipients, spearphishing actively exploits recipients’ vulnerabilities.

A common example of spearphishing is the “boss email.” These messages purport to come from a higher-up in the organization, often a C-level executive, and ask for specific, sensitive information (passwords or bank account numbers, most often) that the recipient would know. If the recipient looked closely, they’d see that the sender’s email address was subtly different than the actual boss’s email, but they often don’t (and may not know the boss’s email, anyway).

It’s easy to see how a message like this can compromise an organization. How are you working to prevent that from happening?

5. Vendors Are Still Vulnerable, And You Might Not Know Until It’s Too Late

Many of the worst data breaches in history occurred through poorly defended third parties. The infamous Target hack happened because a regional HVAC supplier lacked adequate cyber protections, for example.

Third-party breaches can do just as much damage as direct attacks. Ultimately, it doesn’t matter how the breach happens — it’s all about the results. So it’s crucial that you hold your vendors to the same high standards that you hold your own company. If they refuse, take your business elsewhere.

6. State-Sponsored and -Affiliated Attacks Are Growing More Sophisticated

What could your organization possibly offer to a sophisticated nation-state attacker? You’re just a lowly digital services startup or tech company!

Perhaps. But, unless your company is completely shut off from the global Internet (and it’s not), it’s vulnerable to attacks from nation-state actors and hackers affiliated with nation-states. Some of the fastest-spreading malware programs in history, including the infamous WannaCry bug, were thought to originate with nation-state baddies.

7. Organized Criminals Are Upping the Ante, Too

It’s sometimes difficult to distinguish between nation-state actors and organized cybercrime rings. In some countries, the two groups exhibit grotesque symbiosis — working hand-in-glove for mutual benefit, with organized hacker groups using stolen data (such as credit card numbers) to fund their host governments’ illicit activities.

These bad guys are becoming more ambitious and sophisticated by the year. The name of the game is deterrence — staying one step ahead of the enemy.

8. BYODs Are Ticking Time Bombs, And You Can’t Do Without Them

Do you allow your employees to use their own devices for company business?

Most organizations do allow what have come to be known as “BYODs” — bring your own devices. Providing hardware for hundreds or thousands of employees is expensive and cumbersome. Combining an annual technology allowance and a strict BYOD security policy is much more elegant.

It’s the latter that’s the problem. BYODs come in all shapes and sizes, and what’s best for the security of one isn’t always best for the security of another. It’s therefore crucial that you make a comprehensive, detailed BYOD security policy a top priority, preferably one led by an in-house CISO (more on which below).

9. IoT Is the Next CyberSecurity Frontier

And no one seriously thinks we’re prepared for what to come. Connected cars, medical devices, critical infrastructure — all are vulnerable to sabotage, with potentially deadly consequences. If your organization isn’t prepared for the worst-case scenario, it needs to be. The bad guys already are.

10. MitM Attacks Can Strike Without Warning

And, sometimes, without leaving a trace. At least, until you wake up to find your company’s crown jewels in the wrong hands.

Combating so-called “man in the middle” attacks is a matter of fastidious network security and impeccable version control. Even these countermeasures might not be enough, but all you can do is try.

11. Patches May Not Protect Against Unknown Zero-Day Exploits

Your organization is fastidious about applying the latest software updates and patches. Which means you don’t have to worry about known vulnerabilities in the cloud and desktop products you use every day. Right?

Wrong.

By definition, zero-day exploits are unknown unknowns: users and publishers alike don’t know about them until they begin causing problems. If you’re using an operating system or software program version with an unknown zero-day exploit, you might not realize it until it’s too late.

Strict version control is, therefore, absolutely essential. As soon as a new version becomes available, update all your devices (and your BYODs) with it. The longer you let old, corruptible versions languish in your digital ecosystem, the greater your risk of exploitation.

12. Human Error Remains a Leading Cause of Breaches and Data Loss

Back in the day, stories about key employees leaving laptops or Blackberries in airport terminals or taxicabs seemed to break every week. These cringe-inducing failures were cathartic to hear about, in a way — the old “at least it’s not me” defense.

Of course, they caused real harm to the affected organizations, not to mention the unfortunate employees’ careers. And “at least it’s not me” only holds up so long as, well, it’s not you.

People still lose laptops in airports, restaurants, Ubers, and hotel rooms. And your luck isn’t guaranteed to hold forever.

Impeccable device security may limit the damage caused by a lost device, but if a determined and capable hacker really wants to breach those defenses, he or she will succeed.

What’s needed is a comprehensive security posture that erects a clear perimeter around your corporate cloud and ensures only those employees who absolutely need critical access permissions are able to obtain them. We discuss these and other posture-strengthening tactics in greater detail below.

How to Strengthen Your Security Posture Now - An Abbreviated Guide

Your security posture won’t strengthen itself. To stay one step ahead of the bad guys, protect your most sensitive bits of data, and keep your company out of the headlines, you need to take these proactive steps as soon as possible.

Unfortunately, it won’t be enough. This is by no means an exhaustive accounting of the steps necessary to keep your digital assets out of harm’s way. But it’s a start — and a vital one at that.

1. Invest in a Top of the Line Cloud Backup Solution

We’ve already harped on the importance of a top of the line cloud backup solution, but we really can’t stress it enough. On top of all the threats enumerated above, cloud backup can prevent or mitigate data loss from a host of others, including natural disasters, fires, physical security breaches, power interruption, and other events that could compromise the integrity of your internal IT systems (and data stores).

2. Tighten Your Encryption Requirements (And Ask All Employees to Use VPNs on BYODs)

Your device encryption policy could use an upgrade, especially if you haven’t looked at it in years.

Encryption is pretty technical, which is why it’s important to work with IT consultants you truly trust, or better yet hire a CISO to spin up and oversee an internal IT security team (more on that in a moment). One non-technical step you can take right away is to update your company’s BYOD policy to require virtual private network (VPN) usage on all BYODs storing company data. This is a low-stakes, low-cost measure that can (and probably will) prevent opportunistic attacks.

3. Institute Two-Factor Authentication Across the Board

Another non-technical step you can take to limit the risks associated with data theft and loss is to institute two-factor authentication across the board, for all company and company-associated personal accounts to which employees have access.

Two-factor authentication, or 2FA, means that employees trying to access protected accounts must supply two separate credentials, rather than just one. Typically, one credential is a traditional password, while the other is a numeric code, security question answer, or biometric reading. What’s important is that these credentials are uncorrelated, meaning knowledge of one does not imply or promote knowledge of the other.

Many accounts offer 2FA as a matter of course. If you currently have mission-critical accounts that don’t require 2FA, consider moving your business elsewhere — your data is more important than any one business relationship.

4. Educate Your Employees Around Email Hygiene

As we’ve seen, phishing is still a thing. Spearphishing, meanwhile, is growing in popularity and sophistication. Before one of your team members gives bank account information to an intrepid attacker pretending to be your company’s controller or CFO, develop policies around how and when to share information over email. Hint: share as little as possible, and never transmit passwords or account information, even when you trust the sender. You can always pick up the phone or walk down the hall.

5. Constrain Permissions and Account Access to the Smallest Possible Circles

Keeping permissions to a strict “need to know” basis is a vital security measure for any organization. It’s especially important when it comes to financial information, such as bank account numbers — let those fall into the wrong hands and your accounts could be drained before you know what hit you.

6. Hire a CISO

Lastly, hire someone who knows more about all this stuff than you. Yes, a Chief Information Security Officer is a highly compensated role that you’ll need to spend considerable resources to fill. But it could be the most important hire you make this decade. Don’t put it off any longer.

The Work Is Never Done

As we’ve made clear, neither the potential security threats above nor the posture-strengthening measures below comprise comprehensive lists.

The digital world abounds with threats, many of which remain unknown to even the most intrepid security professionals. And the work of countering them is never done.

All the same, it must begin. If you’re to have a fighting chance amid the digital turmoil your company and its team face, you’ve got to go all in on a new approach to cybersecurity. The stakes are simply too high to do otherwise.


Photo: Getty Images / Blackjack3d

Read next: Study, 78 Percent People Forget Their Passwords And Then Go For Reset!

Facebook's Top Executive Gets Tough Question From Amazon's CTO at DLD Conference, Reveals Details Regarding Facebook's Preparation for US Presidential Elections Too

$
0
0
What happens when two giants from the tech industry stand head to head for a question-answer session? Well, such has happened recently when one of Facebook’s top executives had to reply back to a tough question by Amazon’s CTO at the Digital Life Design (DLD) Conference in Munich.

Last Monday, Facebook head of communications Nick Clegg was invited for an interview at DLD and out of sheer courteous-ness, he took questions from the audience at the end of his talk. However, little did he know that this move would land him up to a question by Amazon's chief technology officer, Werner Vogels who blatantly asked that as a majority of the users on Facebook don’t really understand that they are being treated as a product for the company, does Facebook really care about making them aware of the fact that such users are actually selling their data without their consent?

While this did put Clegg in an awkward situation for a few seconds, but he then straightforwardly denied the claim and in fact argued that Facebook advertising model works on transparency surrounding data sharing. To cover things up, Clegg even had to agree that the relationship between data sharing and targeted advertising should become more explicit. Hence, Facebook now prefers to let users know in clear terms about how their data is being shared and used for business purposes.

Moreover, according to Clegg, soon there will also be a new tool by Facebook called “Off Facebook Activity” which will enable users to see all the signals that Facebook receives through cookies and pixels when someone walks past a shop or shoe store to be exact.



That being said, Amazon is also not clean. Although their business doesn’t run much on social media advertisements, the company still earns billions of dollars through ads in general on the internet. Amazon depends on a lot on knowing what people purchase and the sites they visit to put their card forward with related products to the end-user.

Besides that, Amazon also owns the security firm Ring that is already facing the criticism of building up an unofficial and huge surveillance network, all with the help of its attached doorbells.

A recent report also predicts that Amazon’s ad business will only grow big to take up the market share of Google and Facebook.

The test of tough questions didn’t end at Werner for Clegg as the former Cambridge Analytica employee Brittany Kaiser also considered this an opportunity to criticize Facebook’s decision of running the political ads without really checking the facts. She stood up to ask why Facebook wants to moderate political content and yet call it censorship?

Clegg, in return, took support of the standards that Facebook has developed along with the law and called it a way to balance things. But yes he also had to agree that Facebook can do much better in order to catch up with cultural, legal, and ethical balances in any modern society.


Going beyond the questions, Clegg also made one big claim that Facebook will not let bad actors abuse its platform and manipulate the results of this year’s US Presidential elections. The company has been very much responsive to any such threat ever since it got plunged into the crisis two years ago; when British political consultancy Cambridge Analytica came out stating that they had used data gathered from millions of unsuspecting users to target US election ads.

Facebook will take strict actions to stop the fake news from being spread across the platform and therefore most extreme political content will be taken off before it gets to the public’s eyes.



Read next: Facebook Will Send Notification for Logins Through Third-Party App

Featured photo: Lino Mirgeler/dpa/Alamy Live News

Apple takes Action to Support Legal Authorities – Drops the Encryption Plan of iCloud Accounts Data

$
0
0
If you have an iPhone, there is nothing that you should worry about. Strong privacy is one feature of Apple that is famous all over the world. Even if your iPhone gets snatched, your data is safe in the thief’s hands as well. The tech giant's executives repeatedly boasted their privacy practices on several occasions.

Apple receives thousands of requests from all over the world to gain access to the user’s data. Recently, Apple also released a report in which they mentioned the names of countries asking for multiple user data for various reasons.

However, the recent clash of Facebook with the FBI on unlocking the device was a serious hit that brought Apple in the public’s eye. Apple planned to bring end-to-end encryption to iCloud backups, but that plan is postponed for now.

The encryption would have held legal agencies to get their hands to user data, which is worrisome on so many levels. The backlash from the FBI has led Apple to rethink their options and look for better alternatives.

FBI’s cybercrime team argued that iCloud backup is the only way to get their hands on the user’s data. By encrypting it, Apple will be taking away the last single opportunity from intelligence agencies to investigate crimes conducted through, with or in involvement with Apple phones.

All of this the fuss started when the FBI asked Apple to unlock the phone of a gunman, but Apple declined to say they have provided the FBI with everything they have. Apparently, Apple can only get access to the data that is saved on the iCloud.

After the FBI’s strong statement against Apple not helping law enforcement, Apple decided to drop its iCloud data end-to-end encryption. Let’s see what’s in the store in the future.


Photo: Georgeclerk via Getty Images

Read next: iPhone users can also get the privilege of using their devices as Google security keys for two-factor authentication purpose

The iOS users will have a special feature rolling out specifically from them by Google Maps

$
0
0
Today's generation relies on social media platforms, smart devices, and the internet for the majority of the tasks as compared to the earlier days.  People prefer searching for content over the internet instead of going places themselves.

Google is one the largest tech giant that always bring out unique services and a variety of new features to help make the user experience further better and that is why it is now one of the largest tech company with billions of active users.

One of the revolutionary products by Google is its Maps services as now people don’t have to wonder when it comes to exploring new places.

The launch of Google Maps made the life of Android and iOS so much better as now they can easily find a variety of new restaurants and different tourist spots or nearby gas stations all few clicks away within a single app.

Google Maps for iOS will now be rolling out a new timeline for iPhone users for better-curated travel history as compared to previous versions.

If you take a look at Google Maps, one of its best features is its ability to combine the visits of users with their Location history and it is one of the most useful features Google offers.

According to 9to5Google The iOS users of Google Maps are now gaining some modified timeline specifically aimed to help the users browse past travels more easily as compared to previous versions.

This new Timeline feature is already available on the Android version of Google Maps but now this feature is rolling out to iPhones and iPads this coming week.


To access this new feature on your Google Maps, you can access it from the navigation drawer under the option of ‘Your Timeline’ but instead of displaying a single day view about the activities of users, this new timeline will be showing three new tabs to users.

The tab of ‘Places’ in the timeline will display users a combination of all the restaurants and a variety of other locations the user visited under the categories of Shopping, Culture, and Attractions.

The tabs of ‘Cities’ and ‘World’ also work pretty similarly to the tab of ‘places’ available in the new updated timeline of Google Maps.

If you open grouping in the new updated timeline, it will display a variety of individual locations against a map.

The carousal of filter options allows the users to browse the same categories found in Places with the options of sorting it out with ‘Most recent’ and ‘Most visited’ categories as well.

The locations available in the timelines of users can also be bookmarked and added into private lists like ‘Starred places’ or ‘Want to go’ etc. This new feature is useful for users who want to mark their past favorite locations and now they can also save them with a note as well.

This new Timeline in the Maps for iOS users is a way by Google to enable its users to relive the memories of their visits and also share recommendations with other users as well.

The iOS users will have a special feature rolling out specifically from them by Google Maps
Screenshot: 9to5Google.

Read next: These 3 Android apps will stop you from using your phone continuously, thanks to Google
Viewing all 28682 articles
Browse latest View live