Xoom is a money transfer service own by PayPal that allow users to send funds to locations worldwide, including Nigeria, with instant deposit in Naira account or having the option to pick cash by simply presenting an ID card and the Xoom transaction number at any of the designated cash pickup locations.

It offers three options to the recipient collecting the cash: cash pickup, bank deposit and home delivery, while the options available may varies depending on where you are receiving the funds.

The service requires that you register a free account with your personal contact information before you can send the funds, but you don’t need a Social Security number to sign-up for Xoom, just a government-issued ID, like drivers license or international passport.



Additionally, you can reload phones and pay utility bills right from your mobile device with Xoom, paying either via credit card, debit card or bank account.

How to integrate Paypal with Xoom Money Transfer



If you already have a fully verified PayPal account, you can use it to sign up for the Xoom service, and you will be able to choose whether to pay with your Debit/Credit Card or PayPal account under payment information.

Note that is is the most important part of this process because you are using your PayPal account for the transaction.

And you can choose from the following options: Cash Pick up, Bank Deposit or Door-to- Door Delivery, which options availability may be location dependent, just fill in the required information to process the transfer.

Steps to Transfer Funds to Nigeria local banks using Xoom Money Transfer service



Irrespective of whether you have a PayPal account or not, you can use the Xoom service to transfer money to local banks in Nigeria. To send money, simply sign up for the Xoom service here and once you have signed up, login to your Xoom account and from the button on the upper left corner of the web page select Nigeria as the country you want to send the funds.



Then choose to pay with your Debit/Credit Card or bank balance under payment information and scroll down to add the card information.

You can opt for text updates or email notifications, whereby you can review the transfer status on the platform. Alternatively, you can call the Xoom Customer Service for information on your transfer status. While most of the transfers are completed within few minutes, it may take a maximum of four business days.

How to transfer PayPal Funds to Local Bank accounts in Nigeria using Xoom Service



A newly discovered vulnerability in hardware-based motion sensor, known as accelerometer, which comes in-built on most Android devices can allow hackers to have unrestricted access to loudspeaker data by using app installed on a device even without permissions.

The accelerometer is supposed to allow apps to sense the movement of a device, such as shaking, rotation, or swing actions, by measuring the rate of change in the velocity with regard to magnitude, but some app developers have come to abuse the collection of data, through phone identifiers, and MAC addresses by exploiting side channels.

According to security researchers, there has been a successful demonstration of a new side-channel attack that allow malicious apps to eavesdrop on the speech coming out of the loudspeakers without requiring any express permissions.

The vulnerability dubbed Spearphone, is tied to apps that collect sensitive data even when explicitly denied the required permissions by the users, using the in-built loudspeaker of an Android device to produce aerial speech reverberations in the smartphone with the loudspeaker mode enabled.

It is triggered when a phone or video call is placed with the speaker mode activated, or there are attempts to listen to media, or interaction with Google assistant; while the researchers as a proof-of-concept, created an app designed to record speech reverberations and send captured data back to a controlled server.

The Spearphone attack can also be used to know the contents of the audio played by any device, either selected from the gallery over the Internet, or voice files received over messaging applications like WhatsApp and Telegram.

Albeit, the security team have recommended possible mitigation techniques that can prevent such attacks, which includes lowering the sampling rate and variation in volume and voice quality of devices that could negatively impact the accelerometer.

How Android hardware-based vulnerability allow hackers to capture Loudspeaker data without permission



Microsoft originally built its browser, Edge with a rendering engine called EdgeHTML, designed to be lightweight, fast and secure, but since launch the browser has been plagued with a plethora of issues resulting to low adoption by Windows users.

The company, however had later switched its browser engine to the Blink rendering engine, which is forked from WebKit and currently used by Google Chrome and Opera browser, now Microsoft has went ahead to release a catalog of group policies for IT admins in managing the Chromium Edge browser, and to allow them have a preview of what will be available on the browser.

While the technical progress it's made in the transition from EdgeHTML to Chromium has been well chronicled, the company has for the first time made a strong case as to why enterprises should switch to the new Edge.

Microsoft made available attachments in .zip format containing ADMX and ADML files, which outlined what is to be implemented as group policies on Windows device and a doc in HTML that describes the policies for both Windows and Mac computers; with the supposed group policies, even as incomplete as it is, been tailored to convince enterprises for a change in their browsers.

Albeit, as the chromium edge is still a work in progress, also the list is expected to undergo some changes before the final release, which could mean that new policies may be added or removed based on feedback from the communities.

It should also be noted that Microsoft has implemented an Edge tracking prevention designed to protect users from websites that track their online surfing habits which is perhaps the company's boldest statement and of course, Microsoft's looking to distance its browser from the creepiness already associated with Google Chrome.

Microsoft pitches the new chromium Edge browser to Enterprises with group policies



OpenJDK Mobile is concerned with providing same APIs in the OpenJDK source repository to iOS and Android, albeit with more focus on iOS for its lack of traditional support for Java, given that Apple disallows the Java Virtual Machine (JVM) from running on the iOS platform.

Now, there is a proposal within the OpenJDK community seeking to jumpstart Java on iOS, which will result to restarting work on the OpenJDK Mobile project, with the new plan entailing the use of the GraalVM ahead-of-time (AOT) compilation for code at build time, even as just-in-time compilation is never an option for iOS.

This procedure has already been successfully used on Java 11, so employing OpenJDK classes and the GraalVM Native Images, Java developers will be able to create applications that run within the Apple rules.

Though, Java was used for Android development from the very beginning, but now Android is currently not Java 11-compliant and requires Android Studio, if it must be run, which procedures many developers find as tedious in using Java projects and libraries on Android. As such, the plan will also include a synchronized fork of OpenJDK master, using Project Skara.

The Skara-based repository would be employed in the building of the OpenJDK Mobile for iOS and Android; thus Java developers wouldn't have to learn Objective-C or Swift to write their software for the iOS platform.

And the fact that Java is cross-platform compliant, with security as a key cornerstone, it allows for secure connectivity with cloud services, makes it a big deal for mobile development.

How OpenJDK Mobile can run Apple-approved executables without the JVM using AOT Compilation



TensorWatch, a debugging tool with many advanced capabilities that researchers and engineers will find pretty helpful in their work, introduced by Microsoft at the 2019 ACM SIGCHI Symposium on Engineering Interactive Computing Systems, is now open source.

While the tool is also helpful in reducing the complexities of AI projects, with more focus on the crucial part of the development process, which includes debugging, making it easier to get rid of errors and thus minimize one of the most time-consuming jobs in software projects.

As deep learning is increasingly accompanied by model complexity, like large datasets and training times for models, researchers will often need to understand the training metrics when working on novel concepts, and available tools for machine learning training have hitherto focused on a rather garbage in, garbage out approach.

But with TensorWatch, it will become easier to spot bugs by visualizing the models in interactive graphs, and through the data made available by the AI model during testing. The tool is a Python library, and also allow users to build own custom UIs or use it within the vast Python data science ecosystem, with support for several standard visualization types, such as bar/pie charts, histograms, and 3D variations.

Additionally, there is the lazy logging mode, which doesn’t require explicit logging of information.

TensorWatch reduces overall processing overhead by cutting down on the amount of data that's processed to find problem patterns. If you wish to give it a spin, the code for TensorWatch is available on GitHub.

Microsoft’s AI debugging & visualization tool, TensorWatch now open source



Microsoft is working on what it calls 'tracking prevention' for the Chromium-based version of Edge, which will serve same purpose as the cookie blockers put in place on both Firefox and Safari browsers.

While Google Chrome remains the only browser without actual implementation of ad blockade, which reason is very much obvious, Google is the single biggest advertising company on the Web; Microsoft is looking to distance its browser from the creepiness already associated with Google Chrome.

The Edge tracking prevention is designed to protect users from websites that track their online surfing habits which tracking is especially beneficial for ads targeting, and Microsoft touted the feature after Mozilla switched on its hugely anticipated Enhanced Tracking Protection (ETP).

Microsoft Edge implementation of the privacy mechanism is available by typing edge://flags in the address bar; same as the chrome://flags command which has been long known to techy Chrome users. And the user will have to select "Enabled" for "Microsoft Edge tracking prevention" settings option, then relaunch the browser; after which Edge will stymy all the trackers.

Albeit, the tracking prevention feature is currently available only in the "Canary" build, the least reliable of the four channels, and expected also for the macOS Canary build; and eventually, the Windows 10 and macOS Dev builds will follow.

The "full-Chromium" Edge which launch is expected this year - and also to run on older Windows 7, 8 and 8.1, may perhaps be getting the blocking mechanism. But it remains unclear when the tracking prevention feature will be ready for prime time, given that Mozilla which boasts of the most comprehensive anti-tracking scheme on its browser, took quite sometime in working out the rough edges.

Mozilla had initially made it available via Firefox's privacy mode, and then afterwards, moved on to integrate it wholly into the browser.

Microsoft Edge's tracking prevention has been seen as the company's loudest statement on its independence from Chrome creepiness, and perhaps, taking a leaf off Firefox is all it needs to reposition Edge to the top of browsers chart, once again.

Microsoft toes the line of Firefox with Chromium Edge push for anti-tracking mechanism



Google’s attempts at building social networks is replete with spectacularly failed social networking sites, with some projects that never lived up to its potential, or even those that caused needless angst for its users, and never did quite took off at all.

But still, the Internet giant hasn't given up yet, with Shoelace app - an experimental social app that is meant to connect users more like actual shoelaces by engaging in those activities they share in common.

Shoelace is developed by Area 120, Google’s brainchild company that is saddled with experimental projects, which is also behind apps such as Uptime, Shortwave, Touring Bird and Supersonic, among others.

Albeit, the Shoelace app is currently open to users in New York City, United States only as invite-only, and available on the Play Store and Apple App Store. The app functions more as community driven and interest based hub allowing users to look up activities and events in the given area. It will notify users if their interests are within the listed activities and help them to meet new people with same interests.

They can also create own events on Shoelace and invite people who share same interests, making it easier to get along with each other in the process. And perhaps, the Shoelace app will eventually become available for all soon, but like every other experimental projects there are also likelihood it may not see the light of day!

No! Google hasn't given up on own Social Network, experimenting with Shoelace App



FinFisher, also known as FinSpy, is a spyware that is covertly run on target's system often by government law enforcement, through security flaws in the underlying system update of the devices.

The infamous spyware was created by Gamma International, a German security company, with the sole purpose of serving as government-grade commercial surveillance software that target various systems, including mobile platforms like iOS and Android. FinSpy is fully capable of infiltrating target mobile devices to steal personal information, such as from SMS Messages, Phone calls, emails, files, contacts and GPS data, extensively deployed in the targeting of human right activists in many countries by rogue governments.

Kaspersky researchers uncovered an ongoing cyber-espionage campaign involving the infamous spyware that's targeted at users in the Southeastern Asian country of Myanmar with implants via iOS and Android smartphones.

The security researchers spotted the new versions of FinSpy that specifically target mobile operating systems and also capable of recording calls via third-party apps like WeChat, Viber, Skype, and LINE, among others. Even, the so-called secure messaging applications such as WhatsApp, Signal, and Telegram are not spared by the spyware.

Albeit, there are some setbacks given that FinSpy require root privileges on a targeted device to work properly, it's unable to function on iOS devices without jailbreaking, which is achievable only with physical access or remotely, in the possibility of zero-day vulnerabilities.

The new versions of the FinSpy spyware were exploited in the wild in almost 20 countries, which according to Kaspersky, Gamma Group have recreated parts of the original implants, through extended support functionality, making it harder to analyze and detect the new implants in order to retain its position in the market.

FinFisher Spyware covertly installed on iOS and Android devices in Southeastern Asian countries



Linux latest kernel release version 5.2 is pivotal in the open source OSes goal of spreading across the world, with the long awaited Sound Open Firmware (SOF) support which provides an open source audio firmware and SDK for modern Digital Signal Processing.

The Sound Open Firmware Project is powered by Intel to enable developers with tools to adapt operating systems for audio devices, while the Linux Foundation had earlier announced the Firmware as part of Linux Foundation project.

Intel Corporation is credited for engineering and code contributions for SOF, including digital signal processing (DSP) firmware and SDK that provide infrastructure and development tools for developers working on audio or signal processing, with support from other contributors.

These tools comprise of scripts to help developers evaluate tradeoffs between processor load, memory and audio quality, with GNU Debugger integration, contributed by Google.

The new Linux Kernel 5.2 release includes support for many other Intel chips such as Cherry Trail, Broadwell, Cannon Lake and Ice Lake, with Sound Open Firmware to accelerate the development of new features that simplify system integration of the DSP hardware and software.

And the Sound Open Firmware currently support the Cadence Tensilica Xtensa instruction set architecture on Intel platform-based devices and can be ported to other platform architectures.

Linux 5.2 debut with support for Open Source audio DSP firmware and SDK for audio



For those hearing it for the first time, DeepNude is the name of a rather infamous app that took the capabilities of the emerging AI technologies to a new heights, allowing its users to create unerring nude images of women from any picture with just a click.

While the official website of DeepNude has already been taken down, as it attracted criticism from different sectors, this post is meant to highlight what went wrong and how the app created around 3 months ago by an unknown developer by the nick “technology enthusiast” could have presented a better returns.

Ironically, the DeepNude App targeted women, which according to the creator, was because images of undressed women are pretty easy to find anywhere on the internet. But this is certainly not the first instance of technology haven been used to ruin people’s lives on the web platforms.

Adobe's Photoshop has even wrought greater harms, with uncountable fake images been photoshopped to fuel the increasing fake news menace. But why didn't Photoshop go into oblivion, and why is DeepNude facing such a huge backlash, when such utilities like Photoshop are still been heavily patronized and used in creating fake porn videos of celebrities and even for revenge porn.

DeepNude is a prove of the advancement in machine learning algorithm which is happening at a rate faster than we can ever imagine. And with the latest AI capabilities, there are huge possibilities that are both exciting and horrifying at the same time.

The caveat is that even though the original app has been taken down, there are myriads of exact copies already sworn into circulation on the web, and as more people are becoming curious by searching to find the download links of the supposed app, bad guys can also leverage on it to spread malware to unsuspecting web users.

Albeit, some developers claimed to have tweaked the original DeepNude app, but the threat posed by the deepfake technology isn’t just limited to online platforms, the impending reality is that if regulations and policies are not implemented to prevent the harm that technologies like DeepFakes and DeepNude are capable of doing, nothing else can stop it.

Lessons from the DeepNude App fiasco and why it is hard to completely eliminate