OpenJDK Mobile is concerned with providing same APIs in the OpenJDK source repository to iOS and Android, albeit with more focus on iOS for its lack of traditional support for Java, given that Apple disallows the Java Virtual Machine (JVM) from running on the iOS platform.

Now, there is a proposal within the OpenJDK community seeking to jumpstart Java on iOS, which will result to restarting work on the OpenJDK Mobile project, with the new plan entailing the use of the GraalVM ahead-of-time (AOT) compilation for code at build time, even as just-in-time compilation is never an option for iOS.

This procedure has already been successfully used on Java 11, so employing OpenJDK classes and the GraalVM Native Images, Java developers will be able to create applications that run within the Apple rules.

Though, Java was used for Android development from the very beginning, but now Android is currently not Java 11-compliant and requires Android Studio, if it must be run, which procedures many developers find as tedious in using Java projects and libraries on Android. As such, the plan will also include a synchronized fork of OpenJDK master, using Project Skara.

The Skara-based repository would be employed in the building of the OpenJDK Mobile for iOS and Android; thus Java developers wouldn't have to learn Objective-C or Swift to write their software for the iOS platform.

And the fact that Java is cross-platform compliant, with security as a key cornerstone, it allows for secure connectivity with cloud services, makes it a big deal for mobile development.

How OpenJDK Mobile can run Apple-approved executables without the JVM using AOT Compilation

TensorWatch, a debugging tool with many advanced capabilities that researchers and engineers will find pretty helpful in their work, introduced by Microsoft at the 2019 ACM SIGCHI Symposium on Engineering Interactive Computing Systems, is now open source.

While the tool is also helpful in reducing the complexities of AI projects, with more focus on the crucial part of the development process, which includes debugging, making it easier to get rid of errors and thus minimize one of the most time-consuming jobs in software projects.

As deep learning is increasingly accompanied by model complexity, like large datasets and training times for models, researchers will often need to understand the training metrics when working on novel concepts, and available tools for machine learning training have hitherto focused on a rather garbage in, garbage out approach.

But with TensorWatch, it will become easier to spot bugs by visualizing the models in interactive graphs, and through the data made available by the AI model during testing. The tool is a Python library, and also allow users to build own custom UIs or use it within the vast Python data science ecosystem, with support for several standard visualization types, such as bar/pie charts, histograms, and 3D variations.

Additionally, there is the lazy logging mode, which doesn’t require explicit logging of information.

TensorWatch reduces overall processing overhead by cutting down on the amount of data that's processed to find problem patterns. If you wish to give it a spin, the code for TensorWatch is available on GitHub.

Microsoft’s AI debugging & visualization tool, TensorWatch now open source

Microsoft is working on what it calls 'tracking prevention' for the Chromium-based version of Edge, which will serve same purpose as the cookie blockers put in place on both Firefox and Safari browsers.

While Google Chrome remains the only browser without actual implementation of ad blockade, which reason is very much obvious, Google is the single biggest advertising company on the Web; Microsoft is looking to distance its browser from the creepiness already associated with Google Chrome.

The Edge tracking prevention is designed to protect users from websites that track their online surfing habits which tracking is especially beneficial for ads targeting, and Microsoft touted the feature after Mozilla switched on its hugely anticipated Enhanced Tracking Protection (ETP).

Microsoft Edge implementation of the privacy mechanism is available by typing edge://flags in the address bar; same as the chrome://flags command which has been long known to techy Chrome users. And the user will have to select "Enabled" for "Microsoft Edge tracking prevention" settings option, then relaunch the browser; after which Edge will stymy all the trackers.

Albeit, the tracking prevention feature is currently available only in the "Canary" build, the least reliable of the four channels, and expected also for the macOS Canary build; and eventually, the Windows 10 and macOS Dev builds will follow.

The "full-Chromium" Edge which launch is expected this year - and also to run on older Windows 7, 8 and 8.1, may perhaps be getting the blocking mechanism. But it remains unclear when the tracking prevention feature will be ready for prime time, given that Mozilla which boasts of the most comprehensive anti-tracking scheme on its browser, took quite sometime in working out the rough edges.

Mozilla had initially made it available via Firefox's privacy mode, and then afterwards, moved on to integrate it wholly into the browser.

Microsoft Edge's tracking prevention has been seen as the company's loudest statement on its independence from Chrome creepiness, and perhaps, taking a leaf off Firefox is all it needs to reposition Edge to the top of browsers chart, once again.

Microsoft toes the line of Firefox with Chromium Edge push for anti-tracking mechanism

Google’s attempts at building social networks is replete with spectacularly failed social networking sites, with some projects that never lived up to its potential, or even those that caused needless angst for its users, and never did quite took off at all.

But still, the Internet giant hasn't given up yet, with Shoelace app - an experimental social app that is meant to connect users more like actual shoelaces by engaging in those activities they share in common.

Shoelace is developed by Area 120, Google’s brainchild company that is saddled with experimental projects, which is also behind apps such as Uptime, Shortwave, Touring Bird and Supersonic, among others.

Albeit, the Shoelace app is currently open to users in New York City, United States only as invite-only, and available on the Play Store and Apple App Store. The app functions more as community driven and interest based hub allowing users to look up activities and events in the given area. It will notify users if their interests are within the listed activities and help them to meet new people with same interests.

They can also create own events on Shoelace and invite people who share same interests, making it easier to get along with each other in the process. And perhaps, the Shoelace app will eventually become available for all soon, but like every other experimental projects there are also likelihood it may not see the light of day!

No! Google hasn't given up on own Social Network, experimenting with Shoelace App

FinFisher, also known as FinSpy, is a spyware that is covertly run on target's system often by government law enforcement, through security flaws in the underlying system update of the devices.

The infamous spyware was created by Gamma International, a German security company, with the sole purpose of serving as government-grade commercial surveillance software that target various systems, including mobile platforms like iOS and Android. FinSpy is fully capable of infiltrating target mobile devices to steal personal information, such as from SMS Messages, Phone calls, emails, files, contacts and GPS data, extensively deployed in the targeting of human right activists in many countries by rogue governments.

Kaspersky researchers uncovered an ongoing cyber-espionage campaign involving the infamous spyware that's targeted at users in the Southeastern Asian country of Myanmar with implants via iOS and Android smartphones.

The security researchers spotted the new versions of FinSpy that specifically target mobile operating systems and also capable of recording calls via third-party apps like WeChat, Viber, Skype, and LINE, among others. Even, the so-called secure messaging applications such as WhatsApp, Signal, and Telegram are not spared by the spyware.

Albeit, there are some setbacks given that FinSpy require root privileges on a targeted device to work properly, it's unable to function on iOS devices without jailbreaking, which is achievable only with physical access or remotely, in the possibility of zero-day vulnerabilities.

The new versions of the FinSpy spyware were exploited in the wild in almost 20 countries, which according to Kaspersky, Gamma Group have recreated parts of the original implants, through extended support functionality, making it harder to analyze and detect the new implants in order to retain its position in the market.

FinFisher Spyware covertly installed on iOS and Android devices in Southeastern Asian countries

Linux latest kernel release version 5.2 is pivotal in the open source OSes goal of spreading across the world, with the long awaited Sound Open Firmware (SOF) support which provides an open source audio firmware and SDK for modern Digital Signal Processing.

The Sound Open Firmware Project is powered by Intel to enable developers with tools to adapt operating systems for audio devices, while the Linux Foundation had earlier announced the Firmware as part of Linux Foundation project.

Intel Corporation is credited for engineering and code contributions for SOF, including digital signal processing (DSP) firmware and SDK that provide infrastructure and development tools for developers working on audio or signal processing, with support from other contributors.

These tools comprise of scripts to help developers evaluate tradeoffs between processor load, memory and audio quality, with GNU Debugger integration, contributed by Google.

The new Linux Kernel 5.2 release includes support for many other Intel chips such as Cherry Trail, Broadwell, Cannon Lake and Ice Lake, with Sound Open Firmware to accelerate the development of new features that simplify system integration of the DSP hardware and software.

And the Sound Open Firmware currently support the Cadence Tensilica Xtensa instruction set architecture on Intel platform-based devices and can be ported to other platform architectures.

Linux 5.2 debut with support for Open Source audio DSP firmware and SDK for audio

For those hearing it for the first time, DeepNude is the name of a rather infamous app that took the capabilities of the emerging AI technologies to a new heights, allowing its users to create unerring nude images of women from any picture with just a click.

While the official website of DeepNude has already been taken down, as it attracted criticism from different sectors, this post is meant to highlight what went wrong and how the app created around 3 months ago by an unknown developer by the nick “technology enthusiast” could have presented a better returns.

Ironically, the DeepNude App targeted women, which according to the creator, was because images of undressed women are pretty easy to find anywhere on the internet. But this is certainly not the first instance of technology haven been used to ruin people’s lives on the web platforms.

Adobe's Photoshop has even wrought greater harms, with uncountable fake images been photoshopped to fuel the increasing fake news menace. But why didn't Photoshop go into oblivion, and why is DeepNude facing such a huge backlash, when such utilities like Photoshop are still been heavily patronized and used in creating fake porn videos of celebrities and even for revenge porn.

DeepNude is a prove of the advancement in machine learning algorithm which is happening at a rate faster than we can ever imagine. And with the latest AI capabilities, there are huge possibilities that are both exciting and horrifying at the same time.

The caveat is that even though the original app has been taken down, there are myriads of exact copies already sworn into circulation on the web, and as more people are becoming curious by searching to find the download links of the supposed app, bad guys can also leverage on it to spread malware to unsuspecting web users.

Albeit, some developers claimed to have tweaked the original DeepNude app, but the threat posed by the deepfake technology isn’t just limited to online platforms, the impending reality is that if regulations and policies are not implemented to prevent the harm that technologies like DeepFakes and DeepNude are capable of doing, nothing else can stop it.

Lessons from the DeepNude App fiasco and why it is hard to completely eliminate

The brick-and-mortar store have lost its mainstream appeal, with online shopping now the norm; you don't ever have to leave your sitting room to do shopping anymore - right in your pajamas, you can go shopping at any online store via your mobile device at your convenience.

Now, how about getting even the option of customizing or having your jewelry personalized at a relatively cheaper price and delivered at your convenience? That's exactly what the good people at has done, bringing you designs made with a lot of passion. And the piece can equally be personalized by name, initials, lettering type, metal and stones to meet your sense of style.

Getnamenecklace is a specialist jewelry manufacturer with fashionable and gorgeous personalized jewelry collections. They comprises a professional team of designers who are hugely talented in the art of turning personal names and initials into lovely piece of jewelry.

Their collections include: necklaces, monogram chocker necklaces and family pendants, all coming with good quality and competitive pricing via the latest jewelry making technology. And the Factory procedures are well organized to bring efficient service delivery - from the technical team to shipment agents, the check out and packaging processes are done with utmost precision, to ensure professional and timely delivery.

Among their specialty collectors item are the Single Infinity Name Necklace In Sterling Silver and other Infinity-branded necklaces, with each piece having the option of been personalized or customized according to your preference.

The personalized Single Infinity Name Necklace offers you the appeal to show off what the word "forever" truly stands for and it is the perfect infinity necklace to gift to loved ones, as you can get your name and your significant other on it. You can also get inspirational words, or anything else you can think of in customizing the infinity necklace.

What more can you ask for from You can head to the online store right away to shop now for yourself and perhaps you'd really enjoy the designs made with passion just for you. - Get Customized & Personalized Jewelry at Cheap prices via the Online Store

The infamous Remote Access Trojans, SpyNote and Remcos is reported to have been actively exploited through Facebook pages tied to hackers resident in Libya, since 2014 to infect targeted systems, with the malware hidden in links posted by the pages.

While the crafty links were made very tempting to click, following claims that it contains leaked intelligence reports, like a page ran in the name of Libya’s national army commander, Khalifa Haftar, found to be the focal point for the spreading of the malware.

According to Check Point Researchers, the malware were hosted on public servers that include public providers like Dropbox and Google Drive, and not just one single page was responsible for spreading the malware — as it involves a network of different, but similar campaigns operating on numerous platforms.

Through the Khalifa Haftar Facebook page, the researchers were able to trace the malicious activities all the way to the attacker and also able to find out how they've been taking advantage of the social networking platforms, by compromising legitimate websites to host malware, and haven successfully made their way to thousands of victims mainly in Europe, the United States and Canada.

Albeit, the Facebook page impersonating Khalifa Haftar was created in April 2019, it has since managed to attract more than 11,000 followers, with the page sharing politically themed posts which include URLs to download files marketed as leaks from Libya’s intelligence units.

It is interesting to note that the attackers opted for open source tools and infected victims with known remote administration tools (RATs) such as Remcos, and SpyNote, often used in run-of-the-mill attacks. And there are over 40 unique malicious links employed by the attacker over the years, many of which were shared from the pages.

The connections between the pages and the URLs used in the different phases of the operations, shows that the malicious activities were highly intertwined as many of the links were spread by more than one page.

Facebook has again and again validated its perceived inability to contain malicious activities carried out via its platform, even though it has launched several program to tackle the menace. Admittedly, the social networking sites have become the bait of identity scams, a development which has engaged the better part of the security concerns over the past years, coupled with incessant privacy issues.

How Hackers are spreading Remote Access Trojans via Multiple Facebook Pages

Apple announced the availability of "Sign In with Apple" button at WDDC 2019, which feature presents new option of accessing applications now that everyone is more concerned about privacy; but the safety of the sign-in button is currently being questioned by the OpenID Foundation.

According to the OpenID Foundation, there isn't much difference between Apple’s implementation of the “Sign In With Apple” and OpenID Connect protocol, with the former implementation taking some clue from the latter, though it isn't completely aligned.

The major differences between OpenID Connect and Sign In with Apple reduces only in places where users can use Sign In with Apple, and it exposes them to greater security and privacy risks, with unnecessary burdens saddled on developers of both the OpenID Connect and Sign In with Apple.

Apple will be required to adopt the OpenID Connect Relying Party software, the identity protocol built on OAuth 2.0 to become interoperable in order to close the current gaps, and enable third-party login to applications in a standard way.

The OpenID Foundation, however applauds Apple’s efforts in allowing users to login to third-party applications with the Apple ID, and calls on the company to implement the OpenID Connect Self Certification Test Suite to improve the interoperability and security of Sign In with Apple.

Apple Sig-in button is coming on the heels of the single sign-on (SSO) buttons of Google and Facebook, which are other options available for web users in accessing third-party web and mobile applications.

How Apple’s implementation of the "Sign In With Apple” button exposes users to more security risks

Microsoft's cloud storage service, OneDrive offers file sync, sharing, collaboration and storage for personal and business users; and with the growing emphasis on privacy, the company has incorporated a Personal Vault feature to protect sensitive files, which requires two-factor authentication.

While it is important to have the right tools for effective business support, it is even more so to have the right protection and safeguard for your files, such as personal information, which the OneDrive Personal Vault offers a layer of security to further protect your most sensitive and important files.

According to Microsoft, data in the secure vault will be encrypted just like all other files on OneDrive, but additional security is provided through different 2FA options like face unlock, fingerprint, PIN, Microsoft Authenticator, or OTP sent via SMS to your mobile phone.

The OneDrive offering itself runs on the trusted Microsoft cloud, which already boasts of many security measures that ensure that users files are safe, the company, however understands that some people need even more protection for their most important and sensitive files, which is why the Personal Vault feature was introduced.

It adds to the robust privacy and security features that are already available on OneDrive, including file encryption at rest and in transit, monitoring for suspicious activities, ransomware detection and recovery, with mass file deletion notification and recovery, virus scanning for known threats, and history for all file types.

Going forward, Microsoft users can use the OneDrive for mobile app to scan documents, like important travel docs, identification, vehicle, insurance files or even take pictures/video shooting directly to the Personal Vault, with those personal items kept off less secure areas of your device, for instance the camera roll.

And you’ll also have access to these documents wherever you go, across all devices, just as applicable to your other files on OneDrive, albeit you'll require extra security measure, as the Personal Vault uses more than just two-step verification to help keep your files safe and private.

Microsoft adds a privacy and security feature, Personal Vault on OneDrive to protect important and sensitive files

Everyone knows how strongly guarded the Apple garden is, and it can be a real piss off for users who wish to play their favorite songs or movies on other devices, such as Android phones. Now, you can easily convert DRM video to DRM-free file formats like M4V, AVI, HD MP4, MPEG, MKV, and H264 with DRmare M4V Converter, so you can conveniently save and enjoy them on your Android media player.

While there are many DRM removal software in the market, DRmare M4V Converter brings a little extra to the table, the ability to remove DRM encryption which prevent movies purchased or rent via iTunes to be played outside of Apple’s ecosystem has never come this easier.

So, if you want your iTunes purchased movie titles playable on other devices or simply saved for later viewing, you need to remove the Digital Rights Management (DRM) encryption by converting it to a DRM-free format that can be freely played or stored on a player other than the iTunes.

Unique Features of DRmare M4V Converter

  • UI is pretty simple and user-friendly
  • 30 times faster in converting or removing DRM Encryption
  • Allows easy conversion of non-DRM and DRM videos and audios to different formats like MP3, MP4, AAC and more
  • Retains AC3 5.1 Audio or Closed Captions or subtitles or any other feature
  • Supports bigger collection of formats means it will be supported on many devices

How to Convert iTunes M4V Videos to other formats using DRmare M4V Converter

DRmare M4V Converter for Windows is pretty straightforward and easy to use in removing DRM from iTunes M4V videos, and you don't need any technical knowledge to use it. Even a newbie can use it for the first time without hassles. Simply see the instructions on how to convert iTunes videos as illustrated step by step below:

Step 1. First download and install DRmare M4V Converter on your Windows PC.

Step 2. After installing, open the software, and you will see the main screen. From there add the iTunes Videos you wish to convert to the software.

Alternatively, you can also drag the video files from iTunes to DRmare M4V Converter main screen. And it supports batch conversion, so you can easily add as many files as you wish.

Step 3. Now, Set the output format as lossless M4V.

If you wish to keep the original quality, it is advised that you choose the original iTunes video format lossless M4V or MP4. But it won't change any quality of your video content, only the DRM will be removed and it also keep the AC3 dolby 5.1 surround and subtitles.

Step 4. Finally, apply the settings to remove the DRM Encryption.

And on clicking the button at the bottom right, the settings is applied and DRmare M4V Converter will remove the DRM protection and export new videos you requested.

Additional tips: If the Videos are all on the iTunes library, you just click 'Add Files' button at the bottom left, the software will be able to detect the files and pop up a window for selecting the right files to convert.

Our Recommendations

DRmare M4V Converter offers a faster service compared to other related software programs, and the user friendly interface means that you won’t need any learning curve to get it running at all. We adjudged it the best solution for Removing DRM from iTunes Videos given that it allows you to backup the videos just like the iTunes rental movies forever and also transfer them wherever you wish.

DRmare M4V Converter Review: Easily convert DRM files to other formats playable on all devices

Microsoft had initially pegged support for the Edge browser to only Windows 10, but the move to ditch its own browser engine, replacing it with the Chromium open-source project, has also opened it up for support on older Windows version, including going cross-platform, with promised editions for macOS as well.

The main benefits for the jumping on board the Chromium project, whose rendering engines also powers Google's Chrome, and other several niche browsers, remains the fact that when it reaches the Stable version it will quicken up how the Chromium-based Edge gets security fixes.

The company had last week unveiled the preliminary versions of the browser for Windows 7, 8 and 8.1, which builds for the older Windows versions were marked as the "Canary" channel, with the other more reliable channels, marked as "Dev" and "Beta" to lead the production build, dubbed Stable.

Chromium Edge's Stable build when finally ready will synchronize with Chrome's release cycle, though it's still unclear how Microsoft will deal with providing security updates for the browser. Albeit, there is a likelihood that if Google issues out patches for Chrome, Microsoft Edge will have to be updated as well, because the vulnerabilities will be exploitable on the browser given that they share same engine.

The current reality is that Edge will eventually support the older Windows versions 7, 8 and 8.1, with cross-platform expansions expected later.

Microsoft's planned support for Chromium-based Edge browser on Windows 7, 8 and 8.1

OpenBSD Secure Shell (OpenSSH) is a suite of networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel in a client–server architecture over an unsecured network.

While there have been several side-channel vulnerabilities in modern processors and DRAMs, such as the infamous Spectre and Meltdown, which side-channel attacks leveraged the OpenSSH application installed on PC, whereby an attacker-owned process exploits memory read vulnerabilities to steal secret SSH private keys from the restricted memory of the system.

An OpenSSH agent keeps a copy of SSH key in the memory to make it easier for you to connect to the same remote server, instead of typing your password every time you want to access the server; and with modern operating systems storing sensitive data, like encryption keys and passwords, in the kernel memory; since SSH keys live on the CPU memory in plaintext format, makes it susceptible to attacks involving memory read vulnerabilities.

Now, the OpenSSH developers has released an update that resolves this rather huge security flaw by introducing new security feature that encrypts private keys before eventually storing it in the system memory, thus protecting it against all the known types of side-channel attacks.

The new update encrypt private keys in OpenSSH using a symmetric key derived from a relatively large "prekey" consisting of random data, and it's to serve as an effective mitigation against the threat rather than a permanent solution.

OpenSSH will now Encrypt Private Keys with relatively large "prekey" consisting of Random data

Apple's CryptoKit is perhaps the first step in the company's effort to enable the exchange of private and public keys that allow iPhone users to store and use cryptocurrencies, like bitcoin for mobile purchases.

The new CryptoKit will be available starting with iOS 13, and will enable developers to create digital signatures for public and private keys that will be stored and managed via Apple's Secure Enclave, with the keys representing cryptocurrencies, that can be exchanged as a form of payment by iPhone owners.

While Apple doesn't include all cryptography algorithms in CrptoKit, like the secp256k1 signature algorithm, which is essential in completing a Bitcoin transaction, there is the present of an abstracted interface that will make it easy to bring additional algorithms, which strategy Hyperledger Ursa also employs for making pluggable cryptographic algorithms.

The cryptographic library, Hyperledger Ursa is a repository which allow developers to easily create a layer of encryption, both for private and public keys, in order to increase the security of apps.

Apple, with its CryptoKit is looking to give iOS app developers a framework for creating secure hashes that will be operational for services like message authentication and cryptographic keys, and enables a second security layer via encryption for iOS applications with private and public keys, which addresses issues such as SIM jacking and hardware hacking.

Albeit, the company has been silent when talks about its future products and services are aired, it already filed patents related to cryptocurrencies; and most of which have been made public covering ethical sourcing of materials for its building of mobile devices.

Apple prepping a crypto wallet for iPhone, CryptoKit for the exchange of private and public keys

Ubuntu, arguably the most popular open source operating system, will be dropping support for 32-bit packages starting with the 19.10 release, while users who wish to continue running the outdated architecture can opt for Ubuntu 18.04 LTS up until 2023.

Canonical, the company behind the Ubuntu distribution has also disabled upgrades for Ubuntu 18.04 to Ubuntu 18.10 to forestall users from running interim release with just six months support, which decision follows the fact that next LTS release, Ubuntu 20.04 won’t have support for 32-bit systems, as Ubuntu 18.04 is the last LTS version to support 32-bit systems.

At the moment there isn't much information on the features and changes that will be coming with the next release, but it’s certain that GNOME 3.34 upgrade will add to its performance improvements.

However, the official Ubuntu 19.10 release schedule has not been made public, though there is certainty that it will be arriving in October 2019. And the Testing weeks will most probably occur in July/September, before the release date. Albeit, the Ubuntu desktop development team have commenced the Testing weeks from Ubuntu 18.10 and each release will be preceded by just one Beta milestone.

The Ubuntu 19.10 development process, on the other hand, had set the Beta release for September 26, 2019, which will be followed by the final release on October 17, 2019.

Update: Canonical has made a u-turn about its plans regarding the ditching of 32-bit i386 packages for Ubuntu 19.10 and 20.04 LTS, following feedback from the open source community — specifically WINE and Ubuntu Studio users.

Finally, Canonical applies the kill switch on 32-bit with Ubuntu 19.10 (Updated)

A joint project between Adobe and UC Berkeley researchers, led to the development of an AI (artificial intelligence) tool that can detect images edited with Photoshop’s Liquify feature, which can be helpful in image forensics, the science of analyzing changes to digital images.

While Photoshop's Face Aware Liquify tool offers set of human-doctored photographs, whereby the original image and the doctored version seem undifferentiated to human inspection with spotted fakes only successful 53 per cent of the time, but with the Adobe AI it easily hit a 99 per cent accuracy.

The researchers trained a Convolutional Neural Network (CNN) on a set of modified images using the Face Liquify feature of Photoshop and artists were hired to train the AI for human-made alterations and techniques. Adobe is aiming to make it easier to spot a fake, thereby making the web world safer from misinformation as the issue of fake news has been blown out of proportion with the aid of professionally edited pictures becoming harder to smoke out.

It is coming as a part of a broader effort to better detect image, video, audio and document manipulations by Adobe. With past research haven focused on image manipulation detection from splicing, cloning, and removal; this present effort focuses on the use of Face Aware Liquify feature in Photoshop as it’s the most popular for adjusting facial features, including making adjustments to facial expressions.

The effects can be delicate which made it an intriguing test case for detecting both drastic and subtle alterations to faces, according to Adobe. Albeit, a magical ‘undo’ button won't turn up overnight, but the AI tool is perhaps a major step forward in spotting doctored images that spurs the spread of fake news.

How Adobe's experimental AI is able to detect Photoshopped Picture from the real

Facebook is finalizing plans to launch into the booming cryptocurrency verticals, with its cryptocurrency which is set to make debut next week, amidst ongoing consultations with several financial institutions for support on Project Libra, its blockchain-based payments network.

Project Libra is reportedly backed by government currency, while Facebook will be employing actual financial firms to help with the launch of the project, which companies include Mastercard and Visa, along with several other web-based payment systems like PayPal, Stripe, and

The plan to develop a cryptocurrency has been on the burner for Facebook since December last year, and the company aimed to create the cryptocurrency for payments on all its platforms, which according to internal leaks is to be called Libra, and will be launching on June 18, with full rollout planned for 2020.

It will serve as a “stablecoin” - which means that it will be pegged to government-issued currencies - so as to limit the volatility associated with such cryptocurrency offerings like Bitcoin. As stability will be a key concern, Facebook is hoping to woo users in the more developed economies with alternatives to the volatile local currencies.

Facebook, however will need to overcome the obvious regulatory hurdles before it can be able to launch the crytocurrency, and also be required to address concerns such as money laundering and fraud before the full takeoff.

Facebook’s Libra to debut with support for Mastercard, Visa, and other online payment systems

The Firefox maker, Mozilla is looking to revolutionize the modern browser offerings, with new approach that includes securing the personal information of its users by deploying a VPN service add-on to avert issues like data breaches.

While Mozilla has partnered with the Switzerland-based ProtonVPN, whose VPN service will be made available for Firefox on Windows, MacOS, Linux, iOS and Android; though the service offering is currently in testing with a small portion of Firefox users in the United States.

The company has also released a brand new logo for Firefox to go along with the fact that it is now more than just a browser, as Firefox has got traits not common in earthly foxes: stretchiness, which according to Mozilla, that fabled flexibility enables Firefox to adapt to a changing environment.

Albeit, the change is more than just logos, as the Firefox design system includes everything that marks the product and web experiences today and long into the future, which design is derived from the geometry of the logos making beautiful background patterns, spot illustrations, motion graphics and pictograms.

Mozilla had earlier launched some new products such as Password manager, file sharing service and Firefox Monitor, with the later serving as a security tool that alert users when their online accounts are at risks of possible breach, all in the line to facilitate the new monitization scheme.

The issue of privacy is equally one area that has overtaken most of the Internet service providers lately, and Mozilla is harping on it's new approach to secure the personal information leakable in scenarios like data breaches and the eavesdropping.

However, how Mozilla intends to make the new proposition of browser-as-a-service to appeal to the vast users of the Firefox browser remains to be seen.

Mozilla looks to subscription based Browser service with extra-value propositions

VideoProc is a specialized video editing software with full support for both 4K and 8K videos, including the latest HEVC / VP9 / ProRes codecs, 3D and 360° VR videos in any file format.

It is perhaps best for processing video exports from DJI OSMO Action / GoPro Hero 7, Camcorders, Drone, DSLR, iPhone, monitoring systems, and so forth. While the output does not result in a highly compressed video, and it still retains the best image quality.

With the conventional video editing processes, often very expensive, and involving rather complicated piece of software, such as Adobe Premiere, VideoProc takes away the complexity off those tools that require lots of training or self-teaching to get the better part of them. In fact, whenever it comes to video processing for beginners – be it from an iPhone, a GoPro, a DJI, or any other device you choose to edit video on the go with – the overriding aim is to arrive at a solution that’s affordable, pretty fast, and easy to use; that’s exactly what VideoProc represents.

Unique Features of VideoProc Software

  • Remove or reduce unwanted background/wind noise easily
  • Build M3U8 playlist with single or multiple .ts files for HTTP streaming
  • Turn video into GIF, extract jpg/png from video, resize image
  • Force a/v sync, adjust playback speed and audio volume
  • Pass through video streams into MKV with no encoding

Additionally, VideoProc integrates various other features, like video cutting, merging, A/V synchronization, shaky video stabilization, and noise reduction.

Step by Step Guide on How to Use VideoProc

VideoProc is pretty easy, so much so that without even looking at the manual, you can master it so easily. And to get started is only a few clicks away, and within a few seconds you’d be done with your video processing: including resizing, adjusting, transcoding, or recording.

Firstly, Download & Install VideoProc on your Mac (or Windows computer), then open the program, and choose either "Video", "DVD", "Downloader" or "Recorder" from the home screen based on your preference.

Then add and load your media file from your Mac to the application. And choose a format according to your requirements.

Select any item from the toolbar or Toolbox and edit the source file as needed.

Finally, now tap on the RUN button to get the target file.

Our Verdict

VideoProc software is feature-packed to cover the needs of beginners that has little to no abilities in professional video editing. So, if you don't buy into complicated processes, this is perhaps the best tool for you, most especially if you are looking for an all-in-one video software of great capabilities without breaking the bank.

Try it FREE by downloading from this Giveaway page and leave a review.

VideoProc Review: What’s Amazing about this 4K Video editing Software for Mac?

Apple at its WWDC 2019 developer conference announced new software for iPad, called iPadOS, while the new iOS 13 will now be available expressly for the iPhone line of devices. The new iPadOS comes feature-packed with such capabilities like enhanced multitasking to take full advantage of the large screen of the iPad.

The move seems to have drawn a parallel line between the iPhone line of devices and iPads, with separate features for the two hardware platforms to cater for the needs of the different userbases.

As already mentioned, the biggest difference is in the new homescreen with improved multitasking abilities – which includes gestures and ability to drag and drop apps side-by-side so that you can be able to work with multiple apps from the same homescreen at a time.

Some of the best iPadOS Features are as follows:

Files app & Keyboard Shortcuts

The new iPadOS comes with a redesigned Files app system, with new column-view that allow users to preview files without actually opening them. And the iCloud drive now offers additional folder sharing capabilities.

Full Desktop-like browsing experience

With enhanced Safari browser on the new iPadOS, users can now enjoy full desktop-class browsing experience, coupled with a new Download Manager.

Plug-in USB Drives

This is perhaps the most prominent of all the new features on iPad, allowing users to simply plug in any storage drive, such as a flash drive, SD card, or even a camera into the USB-C port. You can also access the storage devices via the Files app.

Other new features include the gesture control, which allows the use of the new multitouch gestures for text editing by simply sliding the finger diagonally over text to select it and then use a pinch to copy&paste it.

Beyond doubts, Apple is sure blurring the lines between the iPad and laptops, with the new iPadOS, as it reflects the company’s goal of promoting the iPad as more of a full-blown computer, instead of just an entertainment device.

What are the features that set Apple's new iPadOS apart from iOS?

With the increasing technologically focused world, a whole digital hub has been created, and working remotely is now very much a possibility. Besides, not everyone loves the office politics and being glued to a chair all day long while silently hoping for the day to end.

There are plenty of non-office jobs worldwide that you can venture into. Whether you are looking for a part-time or full job, you have the guarantee of finding the right home job. The good news is that you can make any place to be your workspace. With just the right tools and a sound work mindset, working from home will be pretty easy for you.

Here are the top five jobs that you can easily execute at the comfort of any place, including at home:

1. Proofreading jobs

With the increasing number of write works, the demand for editors is also surging. While most students write assignments and handle different academic papers. As good as they are, they are never perfect writers and do encounter errors in grammar when writing these papers. Paper editors proofread the papers making them flawless and readable to even young readers. You can find paper editing jobs at top online freelancing sites such as Paper Editing or Upwork.

How to become a paper editor- To become a paper editor a bachelor’s degree in English, Journalism or Communication will give you the job. However, anyone with a college degree can also train for the job.

2. Freelance Writing

Freelance writing is now more luxurious and accommodating than it was a decade ago. With plenty of sites for getting work such as Fiverr and Freelancer, you will always find the platform to market your gigs. These sites provide an easier way for you to create your own gig and market your services to clients worldwide who have several projects. Besides every project comes with its own specifications including the pay and the time of delivery.

This enables you to choose a project that is worth your time and effort. To succeed in the writing venture, you should look for more projects from multiple sources and work on them timely. If you have more work than you can handle- Outsource the work to someone you trust with the task.

How to become a Freelance writer- Typical good writing skills, a computer and internet access are the necessities for the job.

3. Web developer

According to the latest statistics from the Bureau of Labor Statistics, one in seven US web developers is a freelancer. This means that web developers can avoid the office experience and work from their homes. Besides, some companies also allow their web developers to work from home on a part-time or full-time basis. Web developers can also look for work on popular freelance websites such as Upwork or Fiverr.

How to become a web developer- To become a web developer one typically requires some entry-level education or a degree in computer science or related courses.

4. Virtual assistant

A virtual assistant is simply someone who assists in performing simple administrative tasks such as answering emails and making travel arrangements. The job is quite simple and is effective for anyone out there. Virtual assistants are in high demand right now and most companies want someone to assist their staff to undertake some duties remotely. You can apply for a virtual assistant job directly through different companies or look for such jobs in popular freelance sites like Upwork.

How to become a virtual assistant- Knowledge of current technology software and strong interpersonal skills are the top requirements for the job.

5. Online Tutor

As a tutor, you can avoid the daily bungle and jungle that comes with commuting to your institution. Online tutors provide students with the technical assistance of different fields of their subject by using an e-learning platform. Training for online tutors is rare, and most of the online tutors in the market now are either classroom instructors or in-person tutors. Besides, to get the job one must prove that they are experts in the subject they intend to teach. As a tutor, you can also do extra freelance academic writing on sites like Freelance Jobs.

How to become an online tutor- A high school diploma in a particular field will do, though most employers prefer tutors with a bachelor’s degree in their areas of specialization.

A teaching license can be a prerequisite too depending on the employer or job. Working from an office can be a strenuous task sometimes but with some jobs, you can enjoy working anywhere without the necessity for a fixed routine or workplace. Whether it is your sofa or bed, these jobs allow you a flexible and convenient routine- Besides you will enjoy being your own boss while cutting on your commuting costs.

Top 5 Best Freelance Jobs for Beginners with little or no experience

Google's proposal to change Chrome’s extensions system, otherwise known as Manifest V3, could be implemented soon, which will halt the current ad blocking capabilities of Chrome, and may mean that modern ad blockers would not work again.

Chrome offers the great feature of cross-platform syncing, with extensions that are pretty fast and of course, free – but it isn't all that perfect. But, the browser users have come to make do with the rather crummy memory management because of its overall good experience; Google is about to take it all away.

With Manifest V3, there will be a major change to the extensions system, including the permissions system and fundamentally, the way ad blockers work on the browser, particularly: modern ad blockers, like uBlock Origin and Ghostery, that uses Chrome’s WebRequest API to block ads before even downloading it.

Google, however has responded to the issues raised by the community, by sharing more details on the permission changes, with the most notable aspect been the single sentence: "Chrome is deprecating the blocking capabilities of the WebRequest API in Manifest V3, not the entire WebRequest API" - clarifying the changes to ad blocking and privacy blocking extensions.

What the lines entails is that Chrome will still have the capability to block some contents, though this is restricted to only paid, enterprise users of the browser.

The ad blockers will switch to more rules-based system, called “declarativeNetRequest” - while Chrome currently imposes limit of 30,000 rules, popular ad blocking rules like EasyList use up to 75,000 rules. Google has maintained that they are looking to increase the numbers, depending on the performance tests, but there is no commitments to any specifics.

Google plans to deprecate Ad blocking capabilities of the WebRequest API in Chrome

Google Maps does not only allow you to locate restaurants around you, but now, it will also allow you to navigate popular dishes available in the restaurants, with "dish-covery".

The dish-covery feature, though currently rolling out to Android phones and will be coming to iPhones soon, employ crowd-sourcing to help spotlight popular dishes to make it easier for you to know what meals to order.

As you use Google Maps to scan the menu, you’d probably be wondering, “What’s good?” - with the new dish-covery feature, Google Maps will make it pretty easy to discover a restaurant’s most crowd-pleasing meals.

How does the feature Work?

Once you bring up a restaurant on Google Maps, you’ll find “Popular dishes” section in the overview. Simply tapping it will take you to the new “Menu” tab, where you’ll see pictures and ratings from other people who have tasted the dishes.

The feature is powered by a machine learning algorithm that matches the dish names provided by users, with relevant pictures and reviews. And it creates a handy arrangement of a restaurant’s most popular meals right in Google Maps.

You can easily scroll through all the most-talked about meals, or tap on a popular dish to explore more photos. While in any country where you are not able to read the language, Google will provide the translation of the reviews.

Google has also launched a new Lens feature that users can use with phone camera to point at a menu to automatically highlight popular dishes using Google Maps. Additionally, there is a new discovery and recommendation tools to help users find new places and spotlight nearby events in their locality.

How to easily navigate Popular Dishes in Restaurants using Google Maps

Linux systems haven’t been targeted as broadly as Windows, and such rare incidence often go undetected by enterprises, as they aren’t always too severe to enjoy wide reportage by security researchers. But lately, Linux ecosystem has become crowded with DDoS botnets and crypto-mining malware, albeit it isn't very common to spot the trojans or backdoors in the wild.

The cybersecurity firm, Intezer reported a malware with sophisticated techniques, which utilizes the already available open source code, dubbed HiddenWasp. And the malware is marked as high risk and dangerous at the moment, more so as it has a zero detection rate in all the popular anti-malware systems.

HiddenWasp code reveals close tie with the various publicly available open-source malware, such as Mirai and Azazel rootkit, while there are more similarities between the malware and some Chinese malware variants, though the attribution is quite of low confidence.

Unlike malware on Windows, open-source ecosystem like Linux has a high ratio of publicly available code that can be duplicated by attackers, and the malware authors invest less effort in the rewriting of their implants.

The malware involves the running of the initial script for the deployment, which script user is named ‘sftp’ with a hardcoded password; it clears the system in order to get rid of older versions of malware in case the machine is already infected.

HiddenWasp isn't focused on DDoS activity or crypto-mining, as the Trojan is purely used in targeted remote control. And the researchers still hasn't unraveled the actual infection vector, rather it is suspected that the malware spreads in systems already controlled by the hackers, which could mean that HiddenWasp is used merely as a secondary payload.

Linux Machines targeted by the Sophisticated Malware, HiddenWasp

There are tons of transcription software, both speech-to-text and vice versa, for Windows which are very helpful in speech conversions, but certainly not all of the software can guarantee that your information is secure and encrypted, with quality transcripts delivery. is perhaps the best free speech recognition software, offering the simplest ways to convert speech into plain text, and even text-to-voice conversion at the same time, with your information fully secured and encrypted, supporting high-quality natural voice to improve work efficiency.

While the use case for voice-to-text software are quite numerous, ranging from the ease of using your voice to create documents instead typing, and expedite workflow, which makes is faster with improved efficiency. But before we delve right into how to setup for guaranteed best free voice-to-text or dictation for content creation and productivity, let’s outline some unique features of the software.

Unique Features of EasySpeech2Text Software

  • Fully Automated process
  • Easy recognition of voice from audio to convert to text
  • Advanced ASR-TTS technology for guaranteed high-quality results
  • Non manual intervention for increased productivity
  • Ability to choose from any of the four available voice options

Easy Steps to Convert Text to Speech using EasySpeech2Text Software

First, you'll have to download and install EasySpeech2Text software on your Windows system, it currently supports Windows 10/8.1/8/7/XP/Vista (32/64 bit), with minimum memory requirements of 512MB or above (but 1GB is recommended), and NVIDIA GPU support. Once, you've successfully installed the software, launch the application and copy the text that you wish to convert into voice.

Then, paste the copied text and proceed to the next level by clicking on the "Play" button to start the conversion process. You have the options of choosing between four types of different voices on converting the text to audio.

Steps to Convert Speech to Text using EasySpeech2Text Software

Given that you've already downloaded and installed EasySpeech2Text Software on your system, simply follow the steps below for the mp3 to text conversion process.

Launch the program and once the application is opened, add your desired mp3 file which you wish to convert as text. Once the file has been added, now you can start the conversion process by clicking on the "Convert" button. That's it!

The conversion will start immediately and the final output will be shown as text. You can also find the output from the "Text" field area of the program interface.

Our Verdict!

The key advantage of EasySpeech2Text program remains that the text to audio (or voice to text) conversion process is very efficient and accurate, with no manual intervention. Review: Best Free Speech to text Software for Windows

Kali Linux NetHunter, the penetration testing platform with Android ROM overlay that was initially available for Nexus devices and OnePlus One, as well as Samsung models has been updated to include more mobile devices.

With Kali Linux 2019.2, which is the second update for 2019 of the Debian-derived Linux distribution designed for penetration testing and digital forensics, the most notable feature is the revamped Nethunter 2019.2 supporting over 50 new mobile devices, and fully capable of running on Android 4.4 (KitKat) to the latest version 9.0. for all supported devices.

Offensive Security had adopted a release model that rolls over a few years ago and has continuously kept up-to-date with existing Kali installations, with the first update for 2019 bringing a bevy of new features, which included support for Metasploit version 5.0, Linux kernel 4.19.13 and several bug fixes.

The Kali Linux NetHunter project was the first Open Source Android penetration testing platform, created in 2014 as a joint effort between the Kali community member “BinkyBear” and Offensive Security, the company behind the Kali Linux distribution.

While the announcement of Kali Linux Nethunter 2019.2 specifically mentioned 13 images for new Android versions for popular devices like Nexus 6, OnePlus 2, and Samsung Galaxy Tab S4, other latest images for supported Android devices are listed on the NetHunter page.

Kali NetHunter - Pen Testing Platform for Android gets support for more devices

Before now, it was only possible to access Tor via Orbot/Orfox on Android smartphone, with the Tor capabilities hugely limited as the browser wasn't fully integrated to the network.

Almost eight months in testing, the Tor Project has finally launched the first stable release for the Tor browser (v8.5) on the Play Store, with the new Android browser bringing the full Tor capabilities directly to a mobile standalone browser, including the routing of web traffic through the Tor network — a network of encrypted computers spread around the world.

The Tor browser for Android bypasses geographic restrictions to provide access to contents or sites blocked in the given region, with traffic bouncing between several nodes on the network before arriving at the destination for full anonymity and privacy.

It is based on Firefox v60, which makes the UI pretty familiar to those who are used to the Mozilla browser, with conveniences like tabbed browsing, albeit it doesn't quite connect directly to sites. Instead, it relies on a network of encrypted servers that requests multiple intermediate links, while hiding your IP address and identity.

According to the official Tor Project blog, there are some feature gaps between the Android Tor Browser and the desktop version, but still, Tor Browser for Android provides essentially the same protections that's available on desktop platforms.

The Tor Browser is useful for activists or journalists to avoid government surveillance, as it makes it harder to track its users and also helps to bypass geographical blocking. But using the browser isn't entirely hassle-free, since many other folks are also using the servers.

And currently, there isn't any version of Tor Browser for iOS because Apple has apparently blocked the process as it requires all browser meant for the platform to run WebKit, its own browser engine. So, it is recommended that iOS device users should turn to the Onion Browser for iPhone and iPad instead.

Tor Browser for Android: Full Proxy bypass and first-party Isolation comes to the smartphone

GitHub Sponsors is a new program launched by the popular web-based Git hosting service, to allow anyone to support the open source developers or contributors through a new ‘Sponsor Me‘ button on their repositories to receive funding.

While the ‘Sponsor Me‘ button is available only to the open source developers, there will be no charges by GitHub for supporting the work of the developers, for the first year of participation; GitHub will also cover the payment processing for all the payments made via the platform.

The Microsoft owned web service, GitHub intends to help circulate funding amongst the developers with the new tool by allowing recurring payments to other members of the community, much like a crowdfunding service, and whenever a developer solves issues or answers queries on your repository, you can visit their profile by hovering over their username to make a donation.

GitHub will match up about $5,000 in contributions for each sponsored developer, for the first year, but the company won't be taking any cut of the funds paid out through the service, at least for now.

What this means is that 100% of the sponsorship funds will go to the developer, with GitHub Sponsors payouts spread across every country where the GitHub service is supported.

Albeit, there's likely to be a problem of keeping track of where all the code in a given application comes from, as libraries often rely on others, but GitHub will be adding new features to make it easier to see who contributes to the software, and then be able to sponsor the projects developer.

The company also announced some other new features that will make it easier for developers to keep track of all the open source projects they've contributed or rely on and to be able to incorporate security fixes.

GitHub Sponsors: Open source devs gets new ‘Sponsor Me‘ button to receive funding

The risks associated with using unsecured public Wi-Fi are enormous, ranging from the danger of third-parties intercepting your emails, even encrypted messages and login information are not spared. And it could be possible for a cyber-criminal to use the login details to access your other accounts as well.

Nowadays, Wi-Fi access are available in more places than ever, enabling everyone to keep in touch or surf the Web from wherever they happen to be, but definitely, getting online via public Wi-Fi hotspots isn't as safe, as it is simple.

Top 5 Risks associated with Public Wi-Fi hotspots

  • Man-in-the-middle (MITM) Attacks: In this attack scenario, an attacker secretly relays or possibly alters a supposed communications between two parties who believe they are communicating directly with each other. And this is mostly possible via public Wi-Fi, because hackers can leverage the unsecure connection to position themselves between the person who is using the Wi-Fi and the connection point.
  • Malware over unsecured Wi-Fi: With unsecured Wi-Fi connection, hackers are able to distribute malware easily, and having infected software on your device can be crippling for your business.
  • Snooping: This is the act of cybercriminals trying to access everything you are doing online, potentially monitoring all your activities and able to capture login credentials or even hijack your accounts.
  • Attacks via ad hocs: Peer-to-peer networks that connect two computers directly are known as ad hocs, and when used over a public Wi-Fi network, the machines are likely to be compromised making it possible for hackers to directly connect to them.
  • Exposure to other attack vectors: Asides malware, viruses can wreak havoc all by themselves, especially when connected to a public Wi-Fi.

How to ensure you are protected over Public Wi-Fi Hotspots

While it is generally recommended that businesses should switch their sites and applications to the more secure HTTPS, as HTTPS-enabled websites provide the more critical security and protection against personal information theft.

But making use of a VPN (Virtual Private Network) is the sure thing for individual users, as VPN acts like a tunnel that keeps out prying eyes from interloping into your online activities. It affords you a secure connection to the network, of course, at the same time shielding your activity from cybercriminals on public Wi-Fi hotspots.

What is Ivacy VPN?

Ivacy VPN is a one-size-fits-all solution, that allows you to skip all the hassles associated with finding more than one VPN for the type of experience you crave. It guarantees maximum protection with advanced 256-bit encryption to protect you from hackers, snoopers and even government surveillance.

It offers the most diverse of servers across 50 countries, numbering over 1000 servers in 100+ locations to make your activities undetectable and to access restricted content without any hassles. It comes as a premium software, though there is a free test version, while the premium is pretty cheap, as low as $1.33 per month (for 5 years activation) or $2.25 (for a two year activation).

And the best part, Ivacy has a strict ZERO LOG policy, giving you the total online freedom you've always desired!

What Steps are necessary to Protect You On Public Wi-Fi Hotspots?

WebRender, also known as Quantum Render, is a GPU-based renderer for the web which promises performance increase for the given components, built using the programming language, Rust.

Mozilla has been tinkering with the new web technology, and has finally began the rollout to select Firefox users, running version 67 of the browser, which feature was supposed to launch with Firefox Quantum, but the WebRender technology wasn't ready at the time.

While Firefox Quantum brought many performance improvements, including the Servo super fast CSS engine, albeit the big piece of Servo technology, WebRender was omitted in Firefox Quantum, with Mozilla promising that it is coming soon, which is now being added to Firefox as part of Quantum Render project.

According to Lin Clark, a programmer at Mozilla, WebRender runs at a silky smooth 60 frames per second (FPS) or better no matter how big the display is or how much of the page is changing from frame to frame, and pages that chug along at 15 FPS in Chrome or today’s Firefox run at 60 FPS with WebRender.

Firefox 67 beta release notes has it that the WebRender feature is only been tested for desktops equipped with an NVIDIA GPU, and running on Windows 10, but it's not clear whether the feature will be coming to other platforms or even to older versions of Windows.

Mozilla begins the push of WebRender (Quantum Render) to users on Firefox 67

There is a vulnerability on WhatsApp that could allow hackers to send spyware to mobile phones, which is exploitable in the audio call feature of the app. The spyware is called ‘Pegasus’ - traced to the Israeli cyber-intelligence company, NSO, and its fully capable of infiltrating all mobile phones, including iOS and Android devices, with the messaging app.

It was specifically targeted at a London lawyer involved in lawsuits that accused the Israeli Group of providing tools to hack the mobile phones of Omar Abdulaziz, a Saudi dissident in Canada; and also a group of Mexican activists, which according to the researchers, made up the list of the initial targets.

The vulnerability in WhatsApp aided the group to insert malicious code that steal data from the target phone by simply placing a call through the messaging app, and it is even portent when the target fails to pick up the call.

According to WhatsApp researchers, the NSO Group operated the spyware in secret for years, and it was only discovered in 2016 on the iPhone of a now-jailed human-rights activist in the UAE through an undisclosed Apple security vulnerabilities. WhatsApp had promptly responded by issuing a fix as soon as they discovered the flaw, and have recommended that its users should update to the latest version of the messaging app.

The company had also alerted the U.S. Department of Justice (DOJ) about the attack, which was as a result of the WhatsApp flaw first reported by The Financial Times.

How WhatsApp Flaw could allow Hackers to Send Spyware Via Voice Call

Java Development Kit (JDK) 13 has been scheduled for September 17 release, with the release candidate stages beginning in the coming months. While Java 12 launched without the much anticipated Raw String Literals, it is a no-brainer that the supposedly enhancement to ease Java development will be coming with the Java Development Kit (JDK) 13.

The OpenJDK reference page for Java Development Kit (JDK) 13 doesn't however list new features for the upgraded standard Java, albeit some few proposals covering packages, unused heap memory, and application class-data sharing, are cited as being targeted for the new release.

Along with the Raw String Literals, JDK 13 has been slated to come with a tool for packaging self-contained Java apps, which tool is called jpackage and would be based on JavaFX javapackager toolkit with support for native packaging formats that give users natural installation experience. It will also allow for launch-time parameters specification at packaging time, which can be invoked programmatically through the ToolProvider or directly from the command line.

Although, most applications will need to be installed natively on a “first-class” way instead of being placed on the class or module path. And the packaging tool is able to fill gaps left by the Java Web Start technologies, which were removed ostensibly as part of JavaFX from JDK 11.

JDK Enhancement Proposals also include, the extending of application-class data sharing (AppCDS) which enables dynamic archiving of classes at the application execution. With archived classes comprising all library classes not present in the default, base-layer CDS archive and loaded applications. The proposal, however is still in the early stage, and intended to improve the usability of AppCDS by eliminating the need for users to run trials in creating a class list for application.

Admittedly, the ZGC (Z Garbage Collector) enhancement to restore unused memory to the operating system, which proposal is cited as integrated into JDK 13, billed as a scalable, low-latency collector, currently doesn't restore unused memory even when the memory has been unused in a long period.

However, this is not optimal for most applications and environment, as those where memory footprint is really a concern, like containers or environment where applications are idle for a long period or are sharing or competing with other resources.

What new features are coming to the Java Development Kit (JDK) 13?

The newly introduced GitHub Package Registry, is package management integrated right into GitHub to allow developers to publish privately for their team, or publicly for the open source community alongside their own source code.

While GitHub Package Registry supports most other package management tools like Maven, Docker, NPM and NuGet; the multiple package types can be hosted in a single registry, devops workflow includes code and deployment solutions, coupled with APIs, and for workflow automation, GitHub Actions and webhooks.

It provide downloads backed by global CDN powering GitHub, though Packages can be hosted publicly or privately, and also used as dependencies in other projects.

The integration with GitHub will enable developers to utilize the familiar GitHub UI to work on public packages from the site or private packages within the organization.

And the full API and webhooks support, means that you can extend your workflows to work with GitHub Package Registry, and packages inherit the permissions of the repository, and no longer need third party solutions to manage and sync permissions across systems.

To start publishing your packages to GitHub, simply sign up for the beta waitlist, and be among the first to use the GitHub Package Registry. You can also check out the documentation to get a head up on what to expect.

GitHub Package Registry to enable developers to publish packages alongside source code

Podcast (also known as Netcast), is a series of digital audio files or videos which can be downloaded in order to listen, or the single component of such a series. While podcasting which often requires a subscription model, is whereby new episodes of podcasts are automatically downloaded and syndicated to users mobile apps or media player.

Google has made it possible to play podcasts in search results so that users can listen to their favorite podcasts without the need for any standalone podcast app. The podcast access on Google search is now live for both desktop and mobile search, with a search of relevant podcast surfacing a card of the most recent three episodes.

The Podcasts experience is possible without even signing in to Google account, though logging in will allow you to sync your playback across all your devices, but there is no dedicated page to view your subscriptions, unlike what is obtainable on the Podcasts app.

Steps to access and play podcasts on Google search results

Simply search for a podcast, and you will be presented with a card of the most recent three episodes. Then click the ‘play’ button, the podcasts can be played right on the search result. But if you tap on the link, it will take you to, with offerings of a feed for all the episodes.

And selecting ‘play’ bring up a basic audio player, with available controls to play/pause, rewind/forward, and adjust playback speed.

Albeit, to access your subscribed podcasts for the time being is only through the Google search bar. The podcasts in search will mostly benefit iOS users who use Google Assistant from the platform, as Google has not launched any standalone Podcasts app for iOS.

Google had earlier given a means to discover and listen to podcasts with Google Play, whereby people can have access to a wider variety of podcast apps, but the company eventually released Google Podcasts, which was rather a back stab at podcasting services.

How to replay your Favorite Podcasts directly on Google Search