Before now, it was only possible to access Tor via Orbot/Orfox on Android smartphone, with the Tor capabilities hugely limited as the browser wasn't fully integrated to the network.

Almost eight months in testing, the Tor Project has finally launched the first stable release for the Tor browser (v8.5) on the Play Store, with the new Android browser bringing the full Tor capabilities directly to a mobile standalone browser, including the routing of web traffic through the Tor network — a network of encrypted computers spread around the world.

The Tor browser for Android bypasses geographic restrictions to provide access to contents or sites blocked in the given region, with traffic bouncing between several nodes on the network before arriving at the destination for full anonymity and privacy.

It is based on Firefox v60, which makes the UI pretty familiar to those who are used to the Mozilla browser, with conveniences like tabbed browsing, albeit it doesn't quite connect directly to sites. Instead, it relies on a network of encrypted servers that requests multiple intermediate links, while hiding your IP address and identity.

According to the official Tor Project blog, there are some feature gaps between the Android Tor Browser and the desktop version, but still, Tor Browser for Android provides essentially the same protections that's available on desktop platforms.

The Tor Browser is useful for activists or journalists to avoid government surveillance, as it makes it harder to track its users and also helps to bypass geographical blocking. But using the browser isn't entirely hassle-free, since many other folks are also using the servers.

And currently, there isn't any version of Tor Browser for iOS because Apple has apparently blocked the process as it requires all browser meant for the platform to run WebKit, its own browser engine. So, it is recommended that iOS device users should turn to the Onion Browser for iPhone and iPad instead.

Tor Browser for Android: Full Proxy bypass and first-party Isolation comes to the smartphone



GitHub Sponsors is a new program launched by the popular web-based Git hosting service, to allow anyone to support the open source developers or contributors through a new ‘Sponsor Me‘ button on their repositories to receive funding.

While the ‘Sponsor Me‘ button is available only to the open source developers, there will be no charges by GitHub for supporting the work of the developers, for the first year of participation; GitHub will also cover the payment processing for all the payments made via the platform.

The Microsoft owned web service, GitHub intends to help circulate funding amongst the developers with the new tool by allowing recurring payments to other members of the community, much like a crowdfunding service, and whenever a developer solves issues or answers queries on your repository, you can visit their profile by hovering over their username to make a donation.

GitHub will match up about $5,000 in contributions for each sponsored developer, for the first year, but the company won't be taking any cut of the funds paid out through the service, at least for now.

What this means is that 100% of the sponsorship funds will go to the developer, with GitHub Sponsors payouts spread across every country where the GitHub service is supported.

Albeit, there's likely to be a problem of keeping track of where all the code in a given application comes from, as libraries often rely on others, but GitHub will be adding new features to make it easier to see who contributes to the software, and then be able to sponsor the projects developer.

The company also announced some other new features that will make it easier for developers to keep track of all the open source projects they've contributed or rely on and to be able to incorporate security fixes.

GitHub Sponsors: Open source devs gets new ‘Sponsor Me‘ button to receive funding



The risks associated with using unsecured public Wi-Fi are enormous, ranging from the danger of third-parties intercepting your emails, even encrypted messages and login information are not spared. And it could be possible for a cyber-criminal to use the login details to access your other accounts as well.

Nowadays, Wi-Fi access are available in more places than ever, enabling everyone to keep in touch or surf the Web from wherever they happen to be, but definitely, getting online via public Wi-Fi hotspots isn't as safe, as it is simple.

Top 5 Risks associated with Public Wi-Fi hotspots



  • Man-in-the-middle (MITM) Attacks: In this attack scenario, an attacker secretly relays or possibly alters a supposed communications between two parties who believe they are communicating directly with each other. And this is mostly possible via public Wi-Fi, because hackers can leverage the unsecure connection to position themselves between the person who is using the Wi-Fi and the connection point.
  • Malware over unsecured Wi-Fi: With unsecured Wi-Fi connection, hackers are able to distribute malware easily, and having infected software on your device can be crippling for your business.
  • Snooping: This is the act of cybercriminals trying to access everything you are doing online, potentially monitoring all your activities and able to capture login credentials or even hijack your accounts.
  • Attacks via ad hocs: Peer-to-peer networks that connect two computers directly are known as ad hocs, and when used over a public Wi-Fi network, the machines are likely to be compromised making it possible for hackers to directly connect to them.
  • Exposure to other attack vectors: Asides malware, viruses can wreak havoc all by themselves, especially when connected to a public Wi-Fi.


How to ensure you are protected over Public Wi-Fi Hotspots



While it is generally recommended that businesses should switch their sites and applications to the more secure HTTPS, as HTTPS-enabled websites provide the more critical security and protection against personal information theft.

But making use of a VPN (Virtual Private Network) is the sure thing for individual users, as VPN acts like a tunnel that keeps out prying eyes from interloping into your online activities. It affords you a secure connection to the network, of course, at the same time shielding your activity from cybercriminals on public Wi-Fi hotspots.

What is Ivacy VPN?



Ivacy VPN is a one-size-fits-all solution, that allows you to skip all the hassles associated with finding more than one VPN for the type of experience you crave. It guarantees maximum protection with advanced 256-bit encryption to protect you from hackers, snoopers and even government surveillance.



It offers the most diverse of servers across 50 countries, numbering over 1000 servers in 100+ locations to make your activities undetectable and to access restricted content without any hassles. It comes as a premium software, though there is a free test version, while the premium is pretty cheap, as low as $1.33 per month (for 5 years activation) or $2.25 (for a two year activation).

And the best part, Ivacy has a strict ZERO LOG policy, giving you the total online freedom you've always desired!

What Steps are necessary to Protect You On Public Wi-Fi Hotspots?



WebRender, also known as Quantum Render, is a GPU-based renderer for the web which promises performance increase for the given components, built using the programming language, Rust.

Mozilla has been tinkering with the new web technology, and has finally began the rollout to select Firefox users, running version 67 of the browser, which feature was supposed to launch with Firefox Quantum, but the WebRender technology wasn't ready at the time.

While Firefox Quantum brought many performance improvements, including the Servo super fast CSS engine, albeit the big piece of Servo technology, WebRender was omitted in Firefox Quantum, with Mozilla promising that it is coming soon, which is now being added to Firefox as part of Quantum Render project.

According to Lin Clark, a programmer at Mozilla, WebRender runs at a silky smooth 60 frames per second (FPS) or better no matter how big the display is or how much of the page is changing from frame to frame, and pages that chug along at 15 FPS in Chrome or today’s Firefox run at 60 FPS with WebRender.

Firefox 67 beta release notes has it that the WebRender feature is only been tested for desktops equipped with an NVIDIA GPU, and running on Windows 10, but it's not clear whether the feature will be coming to other platforms or even to older versions of Windows.

Mozilla begins the push of WebRender (Quantum Render) to users on Firefox 67



There is a vulnerability on WhatsApp that could allow hackers to send spyware to mobile phones, which is exploitable in the audio call feature of the app. The spyware is called ‘Pegasus’ - traced to the Israeli cyber-intelligence company, NSO, and its fully capable of infiltrating all mobile phones, including iOS and Android devices, with the messaging app.

It was specifically targeted at a London lawyer involved in lawsuits that accused the Israeli Group of providing tools to hack the mobile phones of Omar Abdulaziz, a Saudi dissident in Canada; and also a group of Mexican activists, which according to the researchers, made up the list of the initial targets.

The vulnerability in WhatsApp aided the group to insert malicious code that steal data from the target phone by simply placing a call through the messaging app, and it is even portent when the target fails to pick up the call.

According to WhatsApp researchers, the NSO Group operated the spyware in secret for years, and it was only discovered in 2016 on the iPhone of a now-jailed human-rights activist in the UAE through an undisclosed Apple security vulnerabilities. WhatsApp had promptly responded by issuing a fix as soon as they discovered the flaw, and have recommended that its users should update to the latest version of the messaging app.

The company had also alerted the U.S. Department of Justice (DOJ) about the attack, which was as a result of the WhatsApp flaw first reported by The Financial Times.

How WhatsApp Flaw could allow Hackers to Send Spyware Via Voice Call



Java Development Kit (JDK) 13 has been scheduled for September 17 release, with the release candidate stages beginning in the coming months. While Java 12 launched without the much anticipated Raw String Literals, it is a no-brainer that the supposedly enhancement to ease Java development will be coming with the Java Development Kit (JDK) 13.

The OpenJDK reference page for Java Development Kit (JDK) 13 doesn't however list new features for the upgraded standard Java, albeit some few proposals covering packages, unused heap memory, and application class-data sharing, are cited as being targeted for the new release.

Along with the Raw String Literals, JDK 13 has been slated to come with a tool for packaging self-contained Java apps, which tool is called jpackage and would be based on JavaFX javapackager toolkit with support for native packaging formats that give users natural installation experience. It will also allow for launch-time parameters specification at packaging time, which can be invoked programmatically through the ToolProvider or directly from the command line.

Although, most applications will need to be installed natively on a “first-class” way instead of being placed on the class or module path. And the packaging tool is able to fill gaps left by the Java Web Start technologies, which were removed ostensibly as part of JavaFX from JDK 11.

JDK Enhancement Proposals also include, the extending of application-class data sharing (AppCDS) which enables dynamic archiving of classes at the application execution. With archived classes comprising all library classes not present in the default, base-layer CDS archive and loaded applications. The proposal, however is still in the early stage, and intended to improve the usability of AppCDS by eliminating the need for users to run trials in creating a class list for application.

Admittedly, the ZGC (Z Garbage Collector) enhancement to restore unused memory to the operating system, which proposal is cited as integrated into JDK 13, billed as a scalable, low-latency collector, currently doesn't restore unused memory even when the memory has been unused in a long period.

However, this is not optimal for most applications and environment, as those where memory footprint is really a concern, like containers or environment where applications are idle for a long period or are sharing or competing with other resources.

What new features are coming to the Java Development Kit (JDK) 13?



The newly introduced GitHub Package Registry, is package management integrated right into GitHub to allow developers to publish privately for their team, or publicly for the open source community alongside their own source code.

While GitHub Package Registry supports most other package management tools like Maven, Docker, NPM and NuGet; the multiple package types can be hosted in a single registry, devops workflow includes code and deployment solutions, coupled with APIs, and for workflow automation, GitHub Actions and webhooks.

It provide downloads backed by global CDN powering GitHub, though Packages can be hosted publicly or privately, and also used as dependencies in other projects.

The integration with GitHub will enable developers to utilize the familiar GitHub UI to work on public packages from the site or private packages within the organization.

And the full API and webhooks support, means that you can extend your workflows to work with GitHub Package Registry, and packages inherit the permissions of the repository, and no longer need third party solutions to manage and sync permissions across systems.

To start publishing your packages to GitHub, simply sign up for the beta waitlist, and be among the first to use the GitHub Package Registry. You can also check out the documentation to get a head up on what to expect.

GitHub Package Registry to enable developers to publish packages alongside source code



Podcast (also known as Netcast), is a series of digital audio files or videos which can be downloaded in order to listen, or the single component of such a series. While podcasting which often requires a subscription model, is whereby new episodes of podcasts are automatically downloaded and syndicated to users mobile apps or media player.

Google has made it possible to play podcasts in search results so that users can listen to their favorite podcasts without the need for any standalone podcast app. The podcast access on Google search is now live for both desktop and mobile search, with a search of relevant podcast surfacing a card of the most recent three episodes.

The Podcasts experience is possible without even signing in to Google account, though logging in will allow you to sync your playback across all your devices, but there is no dedicated page to view your subscriptions, unlike what is obtainable on the Podcasts app.

Steps to access and play podcasts on Google search results





Simply search for a podcast, and you will be presented with a card of the most recent three episodes. Then click the ‘play’ button, the podcasts can be played right on the search result. But if you tap on the link, it will take you to podcasts.google.com, with offerings of a feed for all the episodes.

And selecting ‘play’ bring up a basic audio player, with available controls to play/pause, rewind/forward, and adjust playback speed.

Albeit, to access your subscribed podcasts for the time being is only through the Google search bar. The podcasts in search will mostly benefit iOS users who use Google Assistant from the platform, as Google has not launched any standalone Podcasts app for iOS.

Google had earlier given a means to discover and listen to podcasts with Google Play, whereby people can have access to a wider variety of podcast apps, but the company eventually released Google Podcasts, which was rather a back stab at podcasting services.

How to replay your Favorite Podcasts directly on Google Search



Workplace by Facebook, the collaboration platform launched in 2016, that offer both standard chat functions and ability to share files, like photos, videos, voice clips, emoji and GIFs, between employees within an organization has undergone a revamp, making it quicker and easier for employees to communicate.

Facebook announced the update to the platform at its F8 Conference; the redesigned interface makes it less cluttered, and offers a faster and easier navigation, with greater focus on chat and group elements for Workplace’s users.

Albeit, the first major update to Workplace, is allowing users to interact with external partners, suppliers and agencies, along with the possibility of 50 participants to interact via text, voice and video in one-to-one or group conversations within the application.

Workplace new UI adds the ability to jump between notifications, groups and Workplace Chats more quickly, with shortcuts on left-hand navigation bar. The changes in user interface made the Workplace platform look like a refresh from the old design and more akin to the main Facebook platform.

The groups feature had been moved to the right hand side of the application, which is more prominently placed, to help users keep track of their groups. It is now possible to collapse the left and right-hand navigation bars for better focus on contents, like items on News Feed and group posts.

Additionally, the Workplace admin panel, is now easily accessible from the left-hand navigation bar, with a People tab to manage users, including adding and deactivation. Workplace already boasts of about two million paid users, according to the latest statistics from the company, with customers including: Telefonica and Virgin Atlantic.

Workplace by Facebook: Gets a revamp for quicker and easier Navigation with group chats



Microsoft's virtual assistant, Cortana has already found its way to the smart home, as core to a smart speaker from Harman Kardon. But Satya Nadella, the company's CEO, is also looking at how Cortana can leverage the voice recognition, speech synthesis, and natural language processing (NLP) to power the office.

At Microsoft Build developer conference, the company offered a glimpse of Cortana's inroad to the workplace, with the virtual assistant support for more fluid, back-and-forth conversations.

The keynote was a demo of an office worker managing calendar via a mobile device powered by Cortana. While Cortana provided answers to numerous questions and was also able to carry out specific actions in continuous interaction that lasted for over 30 “turns” - including a view of upcoming plans, schedules and rescheduling of meetings, checking for availability and booking of rooms.

It isn't coming as a surprise, as Gartner Research has predicted that 25 percent of digital workers will be using virtual assistants on daily basis in 2021; this will provide an opportunity for SMBs to use virtual assistant technology to take care of more auxiliary office processes, which in turn will give customers more time to attend to other issues, as it will reduce delays in office communications.

Cortana's ability to engage in complex and dynamic interactions has greatly improved following Microsoft’s acquisition of Semantic Machines, a conversational AI startup which has lend to keeping track of context on iterations.

Semantic Machines input helped Microsoft to push forward to the boundaries of what is possible in natural language interfaces, and further expanding in conversational AI with its digital assistant Cortana, while using machine learning to enable users to discover and access information and services in a much more natural way, with less effort.

Microsoft is in a vantage position to win the race for Office dominance, as it already boasts of the most popular business apps with Office 365. But Microsoft will still need to prove it can deliver on the promise of more natural conversations.

Microsoft offers a glimpse of the virtual assistant, Cortana in the workplace



Mozilla’s bug tracker, Bugzilla first suggested the sudden failure in the code signing certificate built into the Firefox browser, which lapsed just after midnight on May 4, causing the re-installation of extensions to fail — with users getting different error messages.

While the company neglected to renew the certificate, Firefox browser treated the extensions as no longer trusted and potentially a malicious program, so disabled any already installed add-on on the browser for that same reason.

The resultant effect was that the extension is listed as a “legacy” extension, with warning that it “could not be verified for use in Firefox and has been disabled” for security reasons.

Mozilla, however promptly crafted a temporary fix for the desktop versions of Firefox and pushed out the patch to the browser using the Studies system. It uses Studies to push out test code to a subsection of the Firefox user base, and also to collect data on users' reactions to its sponsored content.

The issue has now been fixed in the standard desktop version of the browser, though some versions (like Firefox for Android) will still require a separate update. And the patch will be automatically applied in the background with no active steps needed to be taken from the users to make add-ons work again. Albeit, it is recommended that users should not delete and/or re-install any add-ons in attempt to fix the issue.

It is worth to mention that Firefox gained a full percentage point this past April, ending the month with 10.2% user share, the highest since March 2018 and the first above 10 points since mid last year. This is nearly two years since Firefox has had a sustained period of rise (about five months, from March to July 2017).

Mozilla fixes the lapsed Certificate issue that affected Firefox extensions



All Apple fans knows how difficult it is to replay Apple Music/iTunes on the common MP3 players or other non-authorized devices. As a result of the DRM (Digital Rights Management) tools or rather the technological protection measures (TPM) set to restrict the use of these proprietary copyrighted works.

Therefore, if anyone wants to access these protected contents, they’ll need an Audio DRM removal program to help in breaking the restrictions on the specific files.

AudFree DRM Audio Converter for Windows is perhaps the leading software in that direction that can act as an all-in-one solution in converting DRM or non-DRM audios to other formats like: MP3, FLAC, M4A, M4B, WAV and so forth. In fact, it also serves as iTunes DRM Audio Converter Free to any of the widely used audio file formats, both encrypted and unencrypted, while maintaining high quality sound reproduction.

And it retains the original metadata and ID3 tags in the converted files, such as title, album, artist, covers, chapters and much more. And you can equally improve on the audio quality by using custom parameters like bit rate, audio codec, among others.

Some Unique Features of AudFree DRM Audio Converter for Windows


  • Conversion of DRM and DRM-free audios to MP3, WAV, M4B, and M4A, and FLAC, formats
  • Ability to split large audio tracks into smaller parts by chapters or fixed time frames
  • Convert DRM-protected and non-DRM Audio files at up to 30X faster speed
  • Ability to retain and edit ID3 tags for output audios, including title, artist, genre, etc.
  • Bypass DRM from protected audios with 100% lossless quality retained


Steps to convert Apple Music to MP3 with Audfree DRM Audio Converter for Windows



First, you’ll need to install the latest iTunes on your Windows PC to use the Audfree DRM Audio converter. Once you have downloaded and installed the software, then Launch the program on your computer.

Step. 1 Select the audio files to convert from the iTunes library.



Step. 2 Click on the icon “sound profile” at the bottom right, and you’ll see a pop-up on the screen, then follow the options on the format setting, which shows you what to edit in the next section.



Step. 3 Now, select the audio format on the next screen, note you can also select the codec, Channel (mono and stereo), and Sample rate. The Bit rate of 320KBPS is the highest audio bit rate that you can select. Click okay to save the setting.



Step. 4 Click on the setting icons so that you can increase and decrease the Volume, Pitch, and Speed.



Step. 5 Select the SPLIT options in the tab, and click “OK” to save. And to give the audio file composer information your desired image, Click on “TAGS” or click on the “ROUND PINK” button to begin the conversion.



Additional tip: You’ll need to adjust the output format and parameters before conversion for best possible results.

Our Verdict



AudFree DRM Audio Converter for Windows is the one-stop converter for both DRM-ed and non-DRM audios, which is fully capable of freely converting all popular audio formats and supported on all devices for offline listening, including: Apple Devices like iPod, iPhone, Apple Watch, and Chromecast, Google Home, Amazon Echo, Sony Walkman, Zune, PSP, etc.

AudFree DRM Audio Converter for Windows Review: Easy Conversion from DRM to non-DRM Files



Mozilla has something to cheer about, as Firefox browser has recorded what is perhaps its biggest rise in user share per month for a year, even when the browser vendor has held its own, when all others, including Microsoft have opted for Chromium.

It was a pretty bad month for Google Chrome, losing a record amount of user share, which is a measurement of user activity for one month, with month-over-month user share hitting an all time low, according to internet analytics vendor, Net Applications.

Chrome recorded a fall of 2.2 percentage points in April to end on 65.6%, which is its lowest percentage point since October, 2018. And that's half a point more than the August 2013 record, when the browser accounted for only 16% of all user share; whilst Microsoft's Internet Explorer (IE) still held sway, as the leading browsers with 57.6% user share.

For last 12 months, Chrome went up four percentage points, been the highest of any browser by far. As the last previous times Chrome lost user share, it did add a percentage point more to its total the following month, which erased the earlier decline.

Mozilla Firefox gained a full percentage point this April, ending the month with 10.2% user share, the highest since March 2018 and the first above 10 points since mid last year. This is nearly two years since Firefox has had a sustained period of rise (about five months, from March to July 2017).

Also, Microsoft's browsers, IE and Edge recorded a rise, hitting 1.4 points to end at 14%. The increase is the largest-ever for Microsoft in nearly 12 years, and the current month-end record was the highest since September, 2018.

Microsoft's brightest spot, however remains Edge, which it has already concluded plans to switch to Chromium rendering engine. Albeit, it isn't only did the browser gain user share, about three-tenths of a percentage point rise in April, ending at 5.5% user share, but it rose in share for all Windows 10 PCs.

Browser Wars 2019: Google Chrome drops in user share; Firefox records a leap



Facebook Dating matches up users on the platform who opted for the service, and connect them by common events; while also allowing the users to see other “daters” who unlocked the same event.

The dating service was first announced at the Facebook's F8 annual conference last year, with initial five countries. But at this year event, Mark Zuckerberg announced that the dating service will be coming to 14 additional countries, bringing the number of supported countries to 19, though still not supported in the United States.

Facebook also added a feature to the dating service, called Secret Crush, that will help users to express what they feel if perhaps they are having a crush on a friend, and don't know how to go about wooing the person.

The feature allows a user to select up to 9 people on the “Secret Crush” list, with each member of the list sent a notification that someone has a crush for them; the idea is that you’ll have somethings in common with the person to match, and you are able to chat with anyone of your “crush” via a text-only messaging within the Facebook Dating app.

Albeit, the messaging feature only work if the selected crush has also activated his/her dating profile, note that the service is different from the regular Facebook profile. But you can add Facebook friends to your crush list even when they are yet to join the dating service.

And the messages sent on the dating service will not open via Messenger, rather there is a new messaging section expressly for Facebook Dating.

Facebook is making a Join Group button to embed on websites so people can easily join from outside the social network. Perhaps, Facebook Dating is a way to woo more young people unto the platform, even as it is only available to users above 18 years of age, and on the mobile app.

Facebook Dating extended to 14 more countries, with new ‘Secret Crush’ Feature



Oracle WebLogic Server was reported to have been actively exploited to distribute a new strain of ransomware, dubbed "Sodinokibi" which can trigger the deserialization of code to allow attackers to run arbitrary commands remotely on affected servers by sending a specially crafted HTTP request, without authorization.

While hackers are taking advantage of the newly discovered flaw, making it the primary attack vectors, to carry out cyber crimes like cryptomining, phishing, and ransomware attacks, as the ‘Sodinokibi’ ransomware attempts to encrypt all data in a directory.

Sodinokibi ransomware variant is more dangerous because it doesn't only encrypt files and ask for ransom, but also delete all backups from the system to prevent the victim from recovering their data. And other ransomware require some form of interaction from the user such as clicking on a malicious link, or downloading and running the malicious code to infect the system, Sodinokibi requires no form of interaction from the user to infect a system.



According to the researchers, after about eight hours of deploying Sodinokibi on a system, the attackers leverage the same WebLogic Server vulnerability to install a second piece of ransomware known as GandCrab.

The ransomware encrypts the target systems, showing a ransom note demanding about $2,500 in Bitcoin before granting the user access to their data. If the ransom isn't paid within a specified number of days, which timeline varies between 2 to 6 days, it then doubles the amount to $5,000.

The vulnerability marked as CVE-2019-2725, which affected all versions of the WebLogic software was given a severity score of 9.8 out of 10, but Oracle has now rolled out an out-of-band security update, just a day after it was made public. It is recommended that all organizations using the Oracle WebLogic Server should update their installations to the latest version of the software.

WebLogic RCE Flaw triggers the deserialization of code to Spread Ransomware



Google has been working on alternative Mechanisms to the regular Password, and just recently, it launched Titan keys, the phishing-resistant two-factor authentication devices that help protect high-value customers from the most sophisticated cyberattacks.

While the user experience for the Titan keys is rather not pretty convenience, and since you have to connect a physical key to your device, the downside remains the fact that you'll need to carry the physical key, which is liable to get lost, and in such situation can get you locked out from your online activities. Albeit, Google assured that there are backups with an extra key that can help you gain access to your account, but the recovery process can take days or even weeks.

Now, the company has also made it possible for Android users to turn their gadgets into a physical security key, which feature requires devices running Android OS version 7+ with Bluetooth and location services fully enabled.

The setup process isn’t any different from that of a regular security key, as you’ll still need to have a replacement second or third key in case your phone get lost or destroyed. So you’ll be able to gain access into your account, as the new feature works for both G Suite enterprise customers and personal Google accounts.

To set up the physical security key using your Android phone (it requires Android 7+), simply switch on the Bluetooth and connect it to your computer, then open Chrome browser on your computer and sign into your Google account. Go to https://myaccount.google.com/security and select two-step verification - on the menu choose add a security key and select phone. That's it!

However, the service is currently available for Google accounts only, and there is no timeline when Google will expand it to cover other online accounts. But you can still avail yourself the use of the Google Authenticator app with 2-step verification for services like Facebook and WordPress security.

It is also expected that Google will integrate it into other browsers, even as it has enabled support for signing into its own service using the Titan security keys on Microsoft Edge and Firefox.

How to set up a physical Security Key using your Android Smartphone



Mozilla Fenix is a new browser currently in the works based on GeckoView, which has been marked as a possible replacement for Firefox mobile browser in both Android and iOS platforms.

While Mozilla had outlined its plan for replacing Firefox (also known as 'Fennec' in its document), Firefox 67 and 68 for Android slated for May 14 and July 9 release, respectively, will continue to receive security patches, with Firefox version 68.1 coming on September 3, and followed by version 68.2 October 22, according to the document.

Mozilla had to divert resources meant for Fenix development to fix bugs in the current Firefox version, with the Android browser upgrade pegged on version 68 to help accelerate Fenix development, but also, it means no new features will be arriving to Firefox for Android.

The current Firefox for Android browser End-Of-Life cycle will be sometime next year, after which Fenix will be replacing it. Albeit, it runs a completely different architecture, Gecko Quantum from Mozilla, the only alternative browser engine available now, outside Chromium.

Mozilla has once again holds its own, when all other browser vendors, including Microsoft have opted for Chromium and it has assured on speed and performance as with Quantum Firefox, more smarter memory management and nifty new capabilities.

Early preview of Fenix, shows that it changes tabbed-browsing significantly, even as all the major mobile browsers support tabbed-browsing. Fenix is akin to desktop browsers tabs, though users are allowed to open multiple tabs and tabs are retained across different browsing sessions.

The idea of changing tab management in Fenix is quite interesting, with such benefits as using less RAM as other browsers on mobile devices since tabs are kept open only during browsing but not across all sessions.

Mozilla, however did not say when Fenix will make debut in the document, but certainly when Fenix is ready, users of the legacy version of Firefox for Android will be migrated to the new mobile browser.

Mozilla Fenix: The upcoming mobile browser to replace Firefox for Android



Google's browser, Chrome has reached its peak in popularity, dwarfing even the closest rival, while sitting comfortably with two-third of the browser user share worldwide according web analytics vendor, Net Application.

Chrome browser latest release is a big deal, so also each upgrade as every web user is poised to know what's in the latest Chrome release, which equally holds true for Google's plan for the browser in the future.

Google has made available a set of release notes highlighting some of the upcoming feature additions to the browser, as well as substitutions, which enhancements and modifications are definitely planned for future release. Since the browser's future are already in profile, we've made it easier by collating the most important of these latest releases in Chrome's upcoming category tagged, Coming soon.

However, it is pertinent to note that, "they might be changed, delayed, or canceled before launching to the Stable channel" as Google had themselves pointed out.

Chrome 75/76 brings Better Privacy and Security with Incognito Mode & Site isolation



Google is looking to change the ways of restricting websites from collecting users data as they surf the Web, with a new implementation of Filesystem API flag to thwart crafty sites from tracking a user in incognito mode.

The Filesystem API flag in Chrome 75 will disallow sites from discovering contents a user is browsing in incognito mode, however it isn't enabled by default, you'll need to enable it for your track to be untraceable.

While Site Isolation is technological defense system that separate pages from sites into different processes. With each process running in a "sandbox" and restricted from one another, as part of effort to isolate malware infested contents from the browser from affecting the device.

Though, it was first unveiled in Chrome 63, then isolation was enabled in stages for virtually all users and managed devices were able to opt-out. But with Chrome 75, Google will remove the ability to opt out of site isolation on desktop using the IsolateOrigins or SitePerProcess policies.

Finally, Google will be disabling Flash by default, starting with Chrome 76. While individual users will still be able to switch back to a default "Ask to use Flash" in settings (until support will be halted from the Chromium project in December 2020), and enterprise users can control Flash usage by employees via the DefaultPluginsSetting, PluginsAllowedForUrls and PluginsBlockedForUrls policies.

Chrome latest release: What's coming in the Future versions of the browser?



The navigation applications, iTrack and Protrack GPS tracking system usually come with the default password ‘123456‘ which most users don’t bother to change, and coupled with some inbuilt functions, allowing hackers to remotely kill automobile engines with just a flick of a button.

While the proof-of-concept exploit released by a group known as L&M involve only the weak default passwords and the inbuilt function integrated by the developers.

The group got access to the username, phone number, e-mail and other personal information, which as confirmed by the manufacturer of the hardware, the automobile engines can be switched off remotely using the GPS.

According to L&M, they created an opportunity window waiting to be exploited, and tested both of the navigation apps using the default password ‘123456’ to see if there's any security changes made in the hardware. And there was no forewarning to inform the user that the password is weak and can easily be exploited in the iTrack app, but the ProTrack App was immediately able to inform user that the password is weak and therefore, the security was at risk.

The hacking group were able to replicate this exploit in several countries like South Africa, India, and Philippines, among others. Though the car GPS hack has actually been possible since 2015 with the instances of digital hacking of cars first reported, but the trend is expected to rise in 2019.

Albeit, the ProTrack and iTrack hardware makers, iTryBand Technology and SEEWORLD respectively, which are both based in China, are believed to have bundled the possibility of turning off car’s engine as an inbuilt function in the hardware themselves.

How iTrack and Protrack navigation apps can be exploited to kill the automobile engine



Running a small business isn’t an easy task by any means. You have a lot of different pieces of the puzzle to juggle at once, so how do you make sure you have the right tools at your disposal to make the process a bit smoother? While in the past, managing your finances might have been limited to your pen and pencil, today the options are endless.

Not all businesses will need the same tools. Like most parts of running a small business, you need to decide on your goals and how your tools will help you reach the target. From managing your invoices to keeping up with marketing strategies, this tool stack will grow with your company.

  1. Freshbooks for Invoicing: When it comes to keeping track of your business finances, you want to keep everything in one place. While many small businesses make the mistake of thinking they have to continuously fight for payment, it’s actually possible to optimize your invoicing so the money comes automatically. Not all businesses have a full-time team of accountants on their side to make sure the money flows smoothly and on time.

    Think of Freshbooks as your all-in-one invoicing and accounting solutions. It’s easy to use, secure, and it helps you optimize the money side of your small business without the hassle. With automated invoicing, scheduling, and more, you don’t have to worry about tracking down your paying clients anymore.


  2. Market Your Business with Infusionsoft: It’s hard to find an all-in-one marketing solution today. Most marketing software does one type of marketing or automates a single line of your sales funnels. Infusionsoft does it all and more. It can track up to 10,000 contacts for you so you never lose a lead again. It also has comprehensive, smart email campaign builders so you can target the right customers at the right time.

    One of the biggest challenges with Infusionsoft, if you can call it a challenge, is that it does have a learning curve. You’ll need to enroll in a training program when you first get started so you can make sure you’re familiar with all of its features. However, depending on your needs, it might be worth the extra effort.


  3. Google Drive for Collaboration: We all know how great Google Drive is for daily tasks, but have you tried using it for your small business? It’s an affordable solution for businesses, and it’s fully customizable. Use only what you need, from spreadsheets to slideshow presentations. Google Drive is also great for teams that are always on the go or business owners who like to work from home.

    You can’t beat how collaborative and easy to use Google Drive is. There’s virtually no learning curve, it’s easy to use in any browser, and you can even download the mobile app of your favorite extensions. Cloud storage is undoubtedly the future, so what are you waiting for?


  4. Salesforce for Boosting Your Revenue: Salesforce is a program that helps you sell more with less effort. It’s all about working smarter, not harder, and that’s something all business owners could use. With this CRM software, your leads are all in one easy dashboard. See the details of your latest sales, track your calls, and plan your meetings with ease.

    Because you don’t have to spend as much time on busy work like data entry, you’re able to focus on more important areas of your business. Salesforce does the automation for you, and you can easily allocate work to the right member of your team. Finally, there’s software that will grow with you and help you better meet customer needs.


  5. Solarwinds for IT Infrastructure Security: Your directories need to be monitored at all times to keep your company’s data secure. Only when you have the overview of your team’s access rights to your IT infrastructure. Also, access rights don’t have to be hard to audit and report on.

    With the SolarWinds access rights manager, you never have to worry about your monitoring suspicious account activity and creating custom permission reports. Automate access rights management, analysis, and enforcement through identification of insecure accounts while providing audit trails. It helps to enhance productivity by reducing IT workload through self-service portal and delegation of access rights management to data owners. Managing access rights is one part of a successful app management structure. To learn more, check out this great article from Stackify on 10 APM Features.
  6. Monday for Project Management: You already have enough on your plate. It’s hard to keep deadlines, important details, and meetings under control when you’re already doing so much. Monday is a new way to manage your work all in one place. With the visual dashboard, you can keep all of your client or customer projects in a single place.

    Monday also has messaging features for keeping your comments and questions within your projects. Say goodbye to endlessly going back and forth in emails and meetings. Now, you never have to second guess where your valuable information is stored. Monday is the closest you’ll get to finding more time in the day for the things that matter most in your business.


As a small business owner, you should take your choice of software seriously. As the right software will make your day easier, while the wrong ones will get in the way and add up to the complexity. The above tools cover all aspects of running a small business without breaking the bank.

However you choose to optimize your business in 2019, you'll need to find time to do more with these options. In this day and age, you sure need all the tools you can get to take your business farther.

Top 6 Productivity Tool Stack for Small & Medium Businesses in 2019



Kodi, the free open-source media software that's capable of running on virtually all the platforms, including iOS, Android, Windows, macOS and Linux, has hit version 18.2 bringing with it improvements and bug fixes, especially for the Android app.

While Kodi is an excellent way to access media content across all devices, with compatibility for numerous video and music formats, and offering a handy picture gallery, Kodi 18.2 includes new codec factory for Android which can be used to configure HW-Decoder usage systematically, into both human-readable and XML format.

The XBMC-owned media player had an early release of the Kodi 18.2 RC (Release Candidate) last week, and now the stable version of the latest Kodi update is available for download.

Kodi 18.2 major bug fixes comprises of improvements in the GLES rendering path and AML platform, with VAAPI on Intel config for interlaced content. Also, it offers improved database access speed to enhance the music streaming and playback experience.

Kodi Foundation also unveiled the name of the upcoming Kodi 19, following a round of polls, it has been unanimously voted to be called Matrix. As its the norm, all the different versions are named after some fictional characters or objects, with Kodi version 18 known as Leia - named after Princess Leia the famous character from Star Wars.

There are several new add-ons which can be used to personalize your experience on the Kodi app for Android, which really sets it apart from other media players, and for the entire changelog, see the Github Milestone repository to learn more about the Leia update of Kodi.

Kodi 18.2 Leia brings a host of Bug fixes to the Open-source media software



Google Cloud Code offer a set of plug-ins for Visual Studio Code and JetBrain's IntelliJ, with the aim of speeding up the building, deployment, and debug cycle of cloud-native applications.

While the Microsoft Visual Studio Code editor and the JetBrains IntelliJ Idea IDE makes it easier for developers to build apps that can run on Google Kubernetes Engine (GKE) and also the Kubernetes container orchestration platform.

The Google Cloud Code, still in beta for Visual Studio Code and in alpha stage for IntelliJ, will accelerate the development lifecycle, with the command-line container tools which include: Kubectl, Skaffold, and Jib, enabling developers to analyze projects even during the build stage.

Cloud Code extension of the edit-compile-debug loop to a local/remote Kubernetes environment, leveraging the infrastructure as code concept, with configurations managed as a repo, would allow reproducible environments and quicker spotting of errors.

The support for local deployment of profiles, for defining targets such as local deployment, shared development, testing or production, will enable debugging from the workstation or in the cloud.

And Google Cloud Code integration with existing development tools and services, such as Google’s own Cloud Build and Stackdriver, means that developers can perform pull requests or commits, to trigger Cloud Build for the building, testing, and deployment of application.

The pairing of Cloud Code with Cloud Build will make it easier to edit and test Kubernetes config changes. With Templates, linting, and error highlighting provided for Kubernetes yaml files.

Additionally, Google APIs can be integrated to apps, and application logs viewable from any environment directly from the IDE.

How Google Cloud Code can help in boosting the development of Kubernetes



Incognito mode in Chrome is one of the ways to restrict websites from collecting your data as you surf the Web, but it isn't much effective as some sites are still able to track users even when browsing in incognito mode, and have their cookies follow them all over to coerce into paying for a service.

Google is looking to change all that, as it is testing a new implementation of Filesystem API flag to thwart those rogue sites from tracking a user in incognito mode.

The Filesystem API flag in Chrome 75 will disallow websites from discovering what a user is browsing on the web in incognito mode, however it isn't enabled by default, if you opt for incognito mode, you'll need to enable the feature for your track to be untraceable. To enable the feature, simply enter chrome://flags as URL and find the “Filesystem API in Incognito” flag, once enabled, you should restart the browser and viola, no websites would be able to track your browsing in incognito mode.

And you can check if the API is working by navigating to the test website, where you can detect if you are in incognito mode and enabled the Filesystem flag.

But, Chrome isn't the only browser getting this enhancement to user’s privacy, as Firefox has already rolled out advanced content blocking back in January, with the support for DNS over HTTPS, DoH and Anti-tracking mechanism able to thwart third-party web trackers from following Firefox users across sites.

The advance restriction option for Firefox disables all web tracking and cookies, thus prevents the profiling of your browser usage, which tracking is beneficial for ads targeting.

Google bringing better Privacy and Security with Incognito Mode on Chrome 75



Cryptocurrency is perhaps the most widely discussed topics around payment methods in seminars, meetings, and elsewhere nowadays. Since its inception, the technology of cryptocurrency has revolutionized the world of information technology.

While cryptocurrency serves as the alternate payment method using the digital transaction based peer to peer networking, Bitcoin remains the most innovative technology of the 21st century. With cryptocurrency and bitcoin technology providing the financial world with a safer, more technical, and decentralized payment method that doesn’t involve any legal monetary system.

As one of the most amazing and innovative technologies ever, bitcoins, and other forms of cryptocurrency are the most widely discussed topics from students to industry experts, crypto-nerds, and everyone else who is enthusiastic enough about how technology can be used for general goods.

In fact, everyone is crazy about crypto, and so are we. "We have adopted an out of box approach to show our love for cryptocurrency. Such a trend surely deserves appreciation, and that is precisely what we have done. We have introduced a blend of creativity and innovation with an added flavor of uniqueness and fun to create a range of products for cryptocurrency users", stated the people at Crypto wardrobe.

"What we have done is to adopt a brand new approach and create something for people who are fond of technology. Crypto wardrobe provides a wide range of clothing, apparel, and accessories with cryptocurrency prints on it. From the complete range of crypto merch to bitcoin t-shirt, we have made everything look extra cool; besides, we also have a full range of crypto clothing and accessories with symbols of bitcoin and cryptocurrency."

With our unique and crazy range of t-shirts, mugs, cool hoodies, and crypto merch, you can show your love for cryptocurrency crazily and excitingly. Stay fashionable and show off being a crypto nerd with our range of crypto clothing and bitcoin t-shirt. Get your favorite accessories and apparel and enjoy the unique apparel ideas.

Crypto wardrobe is the number one crypto clothing company and surely one of the pioneers. We are the first one to launch a complete collection of apparel and crypto clothing based on bitcoins, cryptocurrency, and their symbols. We have had a few ideas about creating something special for crypto lovers. Designing around cryptography can be annoying if you are not innovative. We used our imagination and innovation to create something that is good for everyone. From kid to industry experts, and nerds, we have an apparel for everyone. Not only garments, but we have a complete range of crypto merch and bitcoin t-shirt.

Our designs are undoubtedly unique as we are the first to design such products. Besides individual and innovative designs, our material are professionally crafted and stitched into perfection using the best quality fabric.

Thus, our range of crypto clothing is perfect for everyone. With a bit of fun and innovation, we have paved the way for everyone's success. Show your love for crypto and get the fantastic crypto theme range of clothing for an entire different outlook in your appearance.

Crypto Wardrobe - Pioneer in Concept of Crypto Clothing Online



Android dominance makes it a target for malicious activities; with over 1.4 billion people using an Android smartphone or tablet per day, coupled with the fact that it’s open source and free for manufacturers to use, means it's a big deal.

While Google has been battling to keep off these malicious actors from its already-huge Android ecosystem, malware apps still happen to find their way into the Play Store. But Google had recently made changes in the Play Store policies, adding new restriction for Android APIs to make it mandatory for every new application to undergo some rigorous security testings and reviews before been accepted into the Play Store.

And some of the new rules include, the restriction of developers from abusing the Android accessibility services, and access to certain permissions such as call logs and SMSes; with adding trait-based malware scanner, and employing human reviews for apps before acceptance to the Play store.

The review process for app from new developers with no proven track record within the ecosystem will take days, and in some cases weeks, allowing the company to thoroughly check for suspicious activities before approving the apps to be published on the Play Store.

Google had been busy with keeping Android secure over the years, pushing out security updates monthly, but still, not every single Android smartphone and tablet receives these security updates.

The potential damage could be frightening, as Android fragmentation problem is not easily solved, which means that the question of Android security comes down to device. However, Google has taken a step to ensure that Android OS is up-to-date with Project Treble, the remodeling of the architectural framework establishing a modular base for lower-level code created by vendors as separate from the operating system.

Project Treble could help to ramp up the number of phones running Android Pie, as it will give manufacturers a clear-cut way to update from Android Oreo to next version without much fuss.

How Google is making it harder for Rogue Apps to get into Android Play Store



Technical writing is one of the most lucrative areas in the freelance enterprise. From editing, writing, drawing rewriting to reviewing, you will never run out of jobs. However, it is not everyone that gets it right. Without appropriate tools or gadgets, doing any of these tasks can be another nightmare in your quest for earning money working from home. When it comes to creating WebPages, editing videos, creating plans and manuals, you need the best tools.

Therefore, a rookie in technical writing may want to ask questions such as the following:

  • Which are the best tools for creating products webpage?
  • Is there a gadget I can use to summarize content and create a more catchy pictorial/inforgraphics representation of ideas and plans?
  • Where do I find the best gadgets for technical writing?


Well, the above questions can go on and on, but with this post coming hot on the heels of your quest for the best tools for technical content creation, you’ve got everything in one place. Most importantly, it explores gadgets of the future. Take a look.

Notepad++

Sometimes creating technical content is all about what you see is what you get (WYSIWYG). And with Notepad ++, a rich software for technical writing, you can straightaway start creating documents for an online product. It is not useful now, but is also a gadget that technical writers will need in the unforeseeable future. The most notable aspect of Notepad++ is the fact that is a beginner’s surefire bet on learning basic HTML and with plenty of plugins, there is no limitation to creativity.

WordPress

WordPress isn’t just a blogging platform. It is also a gadget for amateur and experienced technical writers. It is free and open to everyone who would wish to create content in the form of blogs. Whether you choose to use word or HTML editor, WordPress comes with plentiful gadgets for a writer who wishes to explore realms of creativity. In the end, everything you create is appealing to the eye.

Adobe Illustrator

Adobe products keep getting better. And for technical writers, Adobe illustrator is not only a multifaceted gadget for creating great content but also an indispensible companion. Whether you want to scale images while maintaining their quality, create logos or play around with vector graphics, Illustrator is a technical writing gadget of the future. However, given that it is costly, you want to explore best alternatives such as Affinity Designer or Inkscape.

oXygen XML Author

OXygen XLM Author is another gadget for future technical writers. It is DITA (document information typing architecture) compliant and available as open source. Moreover, it is a cheap alternative to Adobe Framemaker. Also take note that you will need to use oXYgen XLM author alongside oXygen developer for the best results.

Doc-To-Help

Doc-To-Help is a gadget for creating technical content in XML format. The product owner, ComponentOne in collaboration with Microsoft, makes it accessible for use with most Microsoft’s products. The good news about Doc-To-Help is that it makes it possible to deliver content in varying formats.

Final Words

There are lots of gadgets from which to choose the best for technical writing. And with a future that is set to become more advanced, others like MediaWiki, Whatfix and Microsoft Visio are worth mention. You can always request Thesis Geek for a paper on this topic and learn more. Do not forget to pay attention to promising gadgets that will change the way writers who create technical content go about their day to day businesses of helping businesses grow.

Top Most & Promising digital gadgets for Technical Writing of the future



Google announced a number of new G Suite enhancements, with some features still in beta, many of which are aimed at improving enterprise security.

G Suite comprises productivity and collaboration tools, software and products developed by Google, especially for enterprise customers, which includes: Gmail, Hangouts and Google+ for communication; Docs, Sheets, Slides, Forms, Drive for storage; and Sites for collaboration, all applications running in the Cloud.

The enhancements for Gmail include support for SMTP MTA Strict Transport Security (MTA-STS), which standard help to improve email security by requiring valid public certificate for authentication and strong encryption for email in transit (requiring TLS 1.2 or higher).

While turning on MTA-STS for domain and SMTP TLS reporting, a new standard also introduced to G Suite customers, businesses can ensure that all external mail servers connecting to their server will report connection problems, so as to enable the administrators to identify and fix any security issues.

Also, administrators now have even more controls with advanced anti-phishing and malware protections, with security sandbox adding secure execution for malicious attachments, and analyzes the effects it may have on the operating system.

And there is a new beta program to help admins assess organization’s exposure to security issues and have the ability to collaborate with other colleagues in the remediation, through new automated processes.

Google had earlier launched macro recording to provide a way to automate repetitive tasks within the G Suite spreadsheet, potentially to save enterprises hours spent on the job.

These updates are coming as Google aims to attract more enterprise customers to its productivity suite, which now boasts of over three million paying customers worldwide.

Google beefs up G Suite with more enhancements to improve Enterprise security



Google AdSense is becoming more and more difficult for publishers, especially those in Nigeria and India, to get approval for the ads program, simply because of the massive number of applications coming from the regions. And to compound the situation even further, after the sweat out to get AdSense application approval, getting the account verified is another huddle that is currently a serious challenge.

As Google has implemented the so-called new policy for these region, instead of express approval for additional sites on AdSense, you'd have to undergo a manual approval before ads can start running on the sites.

Starting around January, 2019, all new AdSense account are now required to upload a government issued ID for verification, which has replaced the age long PIN verification method, whereby Google sends a PIN number to your address. While many publishers have been encountering difficulties in scaling this requirement, as most of the times the ID verification fails without any wrong input on the part of the publisher.

Requirements for ID Verification on Google AdSense



Google requires a government issued ID for AdSense verification, which documents are accepted as proof of identity. And it serves to protect the security of your account and make it easier to find account-specific details.

The image must display payee name and mailing address as they appear in AdSense account.

But after 3 failed attempts in the ID verification, ads serving will be halted on the site. And it will require manual reconsideration form, before ads serving can be resumed for the publisher.

How to submit reconsideration form manually for Google AdSense



For now, there is no official medium to contact AdSense for failed ID verification, but a little hack via the old Adsense help’s Personal Identification Number (PIN) page presents a way to reach the AdSense team for manual reconsideration.

Simply fill out and submit the form with your Full Name, AdSense Gmail Address, Publisher ID, and a proof of identity document. If perhaps you're unable to access the form, you can email the AdSense team directly using this address: adsense-support@google.com and if you are lucky, you'll receive a mail response that you’ve fulfilled the ID verification requirement for Google AdSense, with ads serving restored on your site.

Failed ID Verification: How to submit reconsideration form manually for Google AdSense



Adblock Plus and uBlock are perhaps the most popular ad blocking extensions in the market, with the former exploding in popularity in China and India. While many Web surfers are increasingly favoring ad blockers, with over 100 million users already using these tools.

But latest findings reveals that the $rewrite filter available on AdBlock, Adblock Plus and uBlock enables filter list maintainers to inject malicious code into web pages.

The $rewrite feature is supposed to allow changing of the filter rules in deciding which content get blocked and which to allow, which often there are content elements that are hard to block. And the feature can be exploited in a trivial order to attack even complex web service, like Google services, with attacks almost undetectable.

While the $rewrite filter option is employed by ad blockers to alter the tracking data and thus block ads requests by redirecting traffic. It allows rewrites only within the origin, and requests of SUBDOCUMENT, SCRIPT, OBJECT and OBJECT_SUBREQUEST types are not supported.

The exploit, however is possible with the help of the filter option when used with XMLHttpRequest or Fetch to download code snippets for execution, allowing requests to arbitrary origins and also a server-side redirect.

According to the researcher, Armin Sebastian, Google services like Google Maps, Gmail, and Google Images, are exempt from the exploitable requirements. Albeit, other web services could be exploited by the flaw.

But since the potential security issue is considered to be present solely in the browser extensions, and the exploit is made up on a set of browser extension and web service vulnerabilities chained together, it is worth keeping in mind these conditions.

How Ad Blocker can be Exploited to transfer Malicious Code unto PCs



Anthos platform, formerly known as Google Cloud Services, is a Kubernetes-powered service for building and managing hybrid applications, which is now available on Google Cloud with GKE, adding to the Kubernetes infrastructure.

While the erstwhile Google Cloud Services Platform uses Kubernetes to manage hybrid applications on-premises or on the cloud, Anthos takes things a step further making it possible to manage workloads even on third-party clouds, such as Microsoft Azure and Amazon Web Services.

Anthos will avail IT administrators a more consistent framework for development, management and control of resources, with tasks automated across on-premise and Google Cloud infrastructure.

Besides Kubernetes, Anthos also incorporates Istio, an open source service that reduces the complexity of cloud deployments, and a Kubernetes platform for serverless workloads, known as Knative.

Anthos boasts of features such as ability of applications to run anywhere, including Google Cloud, and other third-party clouds or even the user’s data center, where Anthos can run on existing hardware with no need for forced stack refresh. Additionally, APIs are made available for users to work with at their own pace.

Google also introduced Anthos Migrate, a beta version of the platform as part of the roll out, in order to help automigrate virtual machines from other clouds or on-premises to containers in the Google Kubernetes Engine (GKE). The migration to Anthos will require a GKE Cluster On-Premise and running new cloud-native apps, or migrating existing applications into a cluster, which can handles such tasks as OS patching and VM maintenance.

Google launches the production version of Anthos for managing multicloud applications



The Wi-Fi Alliance launched WPA3 Protocol with offering of more resilient, and password-based authentication for WiFi users, even when they choose passwords that fall short of typical recommendations.

But the WPA3's Simultaneous Authentication of Equals (SAE) handshake, the secure key protocol between devices which ensure stronger protection against password guessing attempts by third parties has been reported to have a flaw that could allow hackers gain access to non-encrypted traffic between the device and the access point.

The report credited to security researchers, Mathy Vanhoef and Eyal Ronen, which they dubbed Dragonblood revealed that WPA3’s Simultaneous Authentication of Equals (SAE) handshake, known as Dragonfly, is susceptible to password partitioning attacks, with the possibilities of also breaking the encryption.

This flaw could be leveraged by an attacker to crack the WiFi users passwords or even get access to the encrypted traffic exchange taking place between the devices.

As the increase of transmission of sensitive information over the Wi-Fi connections has made it mandatory to secure this important gateway, the Wi-Fi Alliance has made a number of improvements to ensure stronger protections for the data exchanged between computers, phones or smart home devices.

The researchers promptly forwarded their findings to the Wi-Fi Alliance, and the organization worked closely with the security team to release a fix, which software patch will be made available through the regular software update for all devices.

It is highly recommended that all WiFi users should update their devices by installing the latest software patches as they are made available, so as to avoid becoming victims of password hack.

WPA3’s Secure handshake, Dragonfly affected by Password Partitioning Attacks



While Opera browser boasts of free unlimited VPN proxy added some years ago, but the VPN was pretty slow which makes it rather usable for many tasks. Opera 60 (also known as “Reborn 3"), the latest browser version has speed up things a bit, making the free VPN more of a delight, and currently, it also allows you to view Netflix shows, which support was blocked in the former versions.

This means that if, for instance, you're in a region with unsupported Netflix shows, you can use the Opera VPN to watch movies and TV shows that's only accessible for U.S. viewers.

The new Opera 60’s VPN is entirely free, and you can browse different Netflix shows in other supported regions, such as South American soap operas, as well as other selection of movies and TV shows, including Rick & Morty and Spiderman: Homecoming, that are supposed to be unavailable on the Netflix U.S. service.

Albeit, the VPN feature doesn’t offer anonymity for your web connection, that is to say that your connection is non-encrypted; what it does is to simply show your physical location as been somewhere else. Opera, however offered users a choice of an “optimal location” nearby, or the option to choose between servers in “America,” Europe, or Asia.

Opera 60 also introduces a cryptocurrency wallet, which is built on the Ethereum Web3 technology. But the free and unlimited VPN service remains the rallying point of the browser; and perhaps it will help Opera’s browser to rise back to prominence once more.

Opera Software releases Opera 60 with a free, faster VPN and Cryptocurrency wallet