Opera Software has launched a new platform for Small and Medium Enterprises (SMEs), Oleads that will help them to leverage on web presence to increase awareness about their business and ramp up sales.

While Opera OLeads brings unique tools to SMEs to maximize their online presence for rapid digital transformation and to scale their business, as most SME operates offline business models. With Opera OLeads, Nigerian SMEs can easily create mobile websites and landing pages for marketing campaigns, which integrates seamlessly with their contextual advertising platform.

OLeads does not require programming or design skills, and the user-friendly interface allows just any business owner to create website from scratch, with the large number of free templates, and drag and drop components that even non-techies can use to create website in less than five minutes.



SMEs can also choose from a wide variety of custom-made website templates to personalize their website according to the individual needs and goals of their business. The easy drag and drop text inputs, images and call-to-action modules, means that SMEs can have their business running in minutes, and they are able to manage the data generated from their website.

The platform which made debut in September 2019, now has about 3,000 Nigerian businesses onboard in just one month. This milestone by OLeads is an indication of Opera's strong position in the Nigerian advertising market as a hugely trusted platform that has won the heart of its users in a relatively short period of time.

Opera's ambitions for accelerating the digital transformation of African is insatiable, with a user base of nearly 120 million African users out of its global user base of 350 million. This stats include those using the popular Opera Mini and Opera browsers, and also the standalone news application, Opera News.

The company's new growth plans for Africa includes the expansion of its product portfolio beyond mobile apps and the introduction of new innovative online marketing services such as Opera Ads and OList.

Opera launches Oleads to Empower SMEs with Multi-dimensional leads



Google always accompany Chrome updates with release notes aimed at highlighting the upcoming changes, additions, enhancements and modifications, especially for enterprises that are planned for the browser.

While Chrome has continued to dominate the browser market, with about 69% of the world's user share, which is calculated as a measure of monthly browser activity by Net Applications. Google's browser, Chrome has eclipsed even the closest rivals like Firefox, with Mozilla now fighting for left overs, and the erstwhile browser leader, Microsoft haven adopted Chromium technology to align with Google in order to still remain relevant.

Chrome is currently used same way that Microsoft's Internet Explorer (IE) 6 was back in the days, where developers primarily optimize their web contents for Chrome, leaving out later tweaking for rivals.

Google is the undisputed champion of modern web standards, and in its effort to make the web standards to work across the different browsers, have led the industry effort to modernize the web, and that effort is what has enabled Google to advance its services like Gmail, G Suite (formerly, Google Apps) and other productivity tools.

What's coming in next versions of Chrome?



Google promised to launch a baked-in hacked-password alert system in Chrome, that will automatically alert users whose details have been compromised, which feature may be similar to the Firefox Monitor which functions more like Troy Hunt’s "Have I Been Pwned", allowing users to search for login details on the service to see if the details are released in a data breach.

The Chrome build that leads to Stable, Chrome 78 Beta, also the less-reliable Chrome 79 Canary for Windows and macOS, already sports the new password checker system, though hidden behind a setting in the options menu.



Google has joined the DNS-over-HTTPS (DoH) bandwagon, which protocol is hyped as a new way to secure communications between DNS (Domain Name Service) server and the browser. The company has announced plans to implement DNS-over-HTTPS (DoH) in the next version of its browser, Chrome 78 with option of choosing the corresponding DoH server to use for DNS resolution.

This is coming on the heels of Mozilla's already running support for DoH in the main Firefox release for a small percentage of its users, and promise of making it available for all users. While the support for DoH started with Firefox 62 to improve the way the browser interacts with DNS, using encrypted networking to obtain DNS information from the server.

Starting with Chrome 79, Google will commence the trial for DoH, whereby DNS requests from users will automatically be switched to pre-selected DNS provider's DoH service if available.



Google has also laid out plans to deprecate legacy versions of the Transport Layer Security (TLS) 1.0 and 1.1 cryptographic protocol that is used to encrypt communications between the browsers and website servers. Beginning from Jan. 13, 2020, Chrome 79 will start displaying "Your connection to this site is not fully secure" whenever a user connects to a site running the outdated protocols.

Google will equally stop supporting FTP (File Transfer Protocol) which is an outdated protocol that transfers files over unencrypted connection, starting with Chrome 80 and recommends that IT administrators should move to native FTP clients instead.

What's new in the latest Chrome update & Google's plans for the future



EdTech is now commonplace in the world of education, and with each passing year, educators have come to embrace more of EdTech tools for use in the classroom. Educators who haven't embraced technology in the classroom are missing out on so much functionality, as these tools give teachers much ease when teaching big classes.

The tools are designed to engage and inspire students in the class. Unlike the traditional classroom setup, now, educators can ensure every student in their class participates. This is because the tools enable personalized learning. The one-fits-all paradigm no longer works for a teacher who's working towards exclusivity.

Nowadays, teachers are able to provide their students with the right information at the right time and in the right way. Technologies like AI, as well as analytics gives educators the insights they need to personalize learning for every student. Private as well as public institutions are banking on EdTech because it has shown great potential in the few years it has been around.

As a college student, you have access to every resource you need to make your college life less challenging. Click here if you want to take a break from writing.

Top 3 Technological Trends in Education for 2019



1. Smartboards: Smartboards help teachers make classes as interactive as possible. This tool allows the educator to apply different styles of writing to achieve their end goal. Students can interact with the Smartboard for better retention of information. The board accommodates both visual and tactile learners who are in a given class.

Teachers can use images and videos to illustrate complex concepts. The best part is the board accommodates audio contributions from the class. This way, a student can later listen to lessons to get what the teacher was trying to explain. These digital whiteboards eliminate the hassle of using chalks and markers.

This is a versatile tool that every school should consider investing in because it customizes learning for all students.

2. Artificial Intelligence (AI): AI continues to thrive in the educational sphere as it’s the key to personalized learning in classrooms. Teachers can easily streamline instructions to ensure every student understands what is required of them. Thanks to AI, Machine Learning (ML) can be used to evaluate the competence of different students.

Identifying each student’s weak areas is how teachers can help improve the overall performance of an institution. Educators now have an easy time introducing supporting materials to schools.

AI also helps teachers as they can offload many of the mundane tasks to machines. This way, every teacher has enough time to track the progress of each student. Technology companies are introducing Machine Learning algorithms that help educators develop personalized study guides.

With interactive questions, students don’t just do tests to pass, but to find out their weak areas. This way, every student knows which areas require further reading. Every student today can create their own digital bookshelf and read from the comfort of their dorm rooms.

3. Augmented and Virtual Reality: Thanks to Augmented and Virtual Reality, teachers can use realistic scenarios to illustrate concepts in class. VR helps educators establish a digital environment that can transform into whatever a teacher wants it to be.

This is exactly what a class needs for students to achieve high comprehension and better information retention.

Conclusion



Every school needs to have these three trending technologies to enhance the learning environment. Students need technologies that prompt interaction, so they can learn from one another.

Top 3 Exciting Educational Technology Trends to Watch in 2019



The Rich Communications Services (RCS), a robust messaging standard comes as an upgrade to SMS and MMS, bringing features found in third-party services like WhatsApp to basic text messaging, such as real-time typing and read notifications, location update, and emoticons support.

While the standard was initially formed by group of leading mobile industry players in 2007, and officially adopted by GSMA in 2008 with a Steering Committee established, the GSMA later entered into partnership with Google and 15 global carriers to push the adoption of Rich Communication Services (RCS).

Now, the following mobile carriers in the United States, namely Verizon, Sprint, AT&T and T-Mobile have finally gotten the approval to offer a universal cross-carrier communication standard for the next-generation RCS messaging service.

The leading mobile carriers will replace SMS with RCS mobile messaging standard, and are already working with interest groups and other connected mobile companies to deploy the new RCS standard in text messaging app for Android phones which is expected to be fully launched by 2020.



This joint venture is dubbed the Cross Carrier Messaging Initiative (CCMI), and meant to deliver the Rich Communications Service (RCS) industry standard to consumers of the four carriers in the United States and subsequently to the global markets.

But RCS-based messages aren't end-to-end encrypted, and Apple, one of the leading mobile player, seems to have no interest in RCS as it already offers more than the technology is promising on iMessage.

The above points have hindered the general adoption of the standard, coupled with complicated mobile carrier and phone maker policies, with carriers and service providers offering to implement non-universal specifications for RCS standard, which limits the RCS-based messages only to the subscribers of the networks.

On the security front, RCS involves message verification and certification mechanisms which ensures that users interact with legitimate brands, thus protecting them from fraudulent activities from impersonators, or phishing attacks. Additionally, RCS message traffic via the device and network can be protected using SIP-over-TLS encryption protocol.

The new RCS technology is really exciting because it brings the capabilities of messaging systems like Apple's iMessage and special services such as Telegram to basic SMS regardless of device. Also, the RCS capabilities expand beyond messaging, as it works with contacts app, for instance, it can enable you to see who else in your phonebook has got support for the new technology.

GSMA moves to replace SMS/MMS with RCS Messaging Standard by 2020



Google had earlier promised the ability to search for items on Google Drive directly from the browser, and now, with Chrome 78, the feature will be rolling out to G Suite customers to search for files on Google Drive from the address bar.

The latest version of the world's most popular browser, Chrome 78, also include patches for about 37 security vulnerabilities, and new customization options for the tab page. Chrome 78 replaces the pointer's position with text boxes when hung over the tab, which is dubbed "tab hover cards" - and helpful when the tab bar is overloaded and there isn't a room for distinguishing the labels.

As Google's norm for new features, they are distributed in stages; as such the rolling out of the new functionality will come in stages so if any problem occurs, it won't impact everyone.

G Suite users will be able to search for Google Drive files that they've got access to from the address bar, which according to Google their input will search through both titles and document contents, and the most relevant documents will surface based on their history, as contained in the Chrome-in-the-enterprise documentation.

It includes all the following business accounts: G Suite Enterprise, or G Suite Enterprise for Education, and G Suite Business, while the feature will be active by default, but can be changed from the 'Google Drive search suggestions' setting in the G Suite admin console.

Among the expected new features, is the "Force Dark Mode" which is enabled for those who don't seem to have enough of the dark mode, and would rather have all websites support it from an operating system's dark mode setup; and by simply flipping from light to dark — Chrome will invert all websites to dark mode.

G Suite customers gets access to Google Drive from Chrome address bar



Mozilla has gone all out against social media trackers, with Firefox 70 blocking all cross-site tracking cookies from social media sites like Facebook, LinkedIn, and Twitter; also allowing you to view everything that has been blocked through the Privacy Protection report.

The latest version of the open source browser, Firefox 70 builds on the Enhanced Tracking Protection that made debut on the previous version Firefox 69, where Mozilla turns the protection on by default for all the browser users. Now, the security and privacy features have been expanded to thwart all social media trackers.

While the social media trackers will be blocked by default on Firefox 70, you’ll also get to see what trackers are blocked and a quick overview of data breaches that your associated email address has been involved in recently.

The Lockwise integration continuously scans for password and database dumps that might contain your leaked credentials by comparing a hash of your passwords to passwords in the leaks, and also makes sure that you don't have to worry about the Firefox maker, or its workers, having access to your password.

Additionally, Mozilla has made it easier to generate secure passwords with Firefox 70 for new accounts, or secure saved passwords when logging in via the Lockwise feature. You’ll be prompted to allow Lockwise auto generate a safe and secure password, which can be saved directly in the browser.

And for already existing accounts, you can simply right click in the password field to access the securely generated passwords through the fill out option.

Also, Firefox 70 afford Windows users to get to use WebRender, as the feature has been opened up by Mozilla to those with PCs running Intel integrated graphics and display resolution lower than 1920-by-1200 pixels; and bringing improvements for battery life on Mac.

All other new features, and security fixes on Firefox 70 are available in the Release Notes, and given that Firefox update happens at the background, the changes will be automatic, but users can manually upgrade the browser via the hamburger menu to Help —> About Firefox, which the download should begin immediately.

Firefox 70 kills Facebook tracking and lets you track all Social media trackers



Google uses the build tool called Blaze internally for automated building and testing of software; and the company later released it as an open-source project with the name Bazel, which is an anagram of Blaze.

Bazel will allow developers to build and test software for multiple platforms across a wide range of languages, with supported platforms including: Windows, MacOS, and Linux. While the major difference from other such build tools is that Bazel rebuilds only what is essential, and does it faster, with incremental builds enabled, allowing advanced local/distributed caching, dependency analysis, and parallel execution.

The new tool leverages on the uniform extension language called Starlark, which was formerly known as Skylark, and it's positioned for faster build speeds, with builds that are fully scalable.

Additional to the open source build tool support for a variety of languages and platforms, is also support for TensorFlow machine learning library and the Angular web framework, with semantic versioning that starts from Bazel 1.x releases that will be backward compatible to Bazel 1.0.

There will also be window of at least three months between new releases of Bazel, with some minor monthly releases.

Bazel was born of Google's needs for highly scalable builds, and was open sourced back in 2015, the company hopes that Bazel could fulfill similar needs in the broader software development landscape.

Google Bazel to enable Developers Automate the building and testing of software



Opera 65 Beta released on October 17 supports DNS-over-HTTPS (DoH) protocol, which feature helps to encrypt DNS traffic, and increase users' privacy and security by protecting against eavesdropping and manipulation of DNS data through man-in-the-middle attacks.

While Cybersecurity Experts have vehemently opposed the DNS-over-HTTPS protocol because actually, DoH doesn't prevent ISPs from tracking its user, and it renders enterprise cyber-security set ups weak, as it overwrites the centrally-imposed DNS settings to allow employees to use DoH to bypass any DNS-based traffic filtering solutions.

And the fact that DNS traffic is centralized to a few DoH resolvers, there's the problem of DoH's impact on the DNS ecosystem itself, with the decentralized network of servers giving way to new layer of DoH resolvers, which sits on top of the existing DNS layer.

Opera also decided to default the DNS resolver to Cloudflare for the test, which path was equally followed by Mozilla, the Firefox browser maker, having Cloudflare to power the DNS over HTTPS functionality of the Firefox browser, which was received with lots of criticism, as most security researchers believed the idea of domiciling all the DNS traffic to Cloudflare, is a bad idea.

Google took a different route in implementing DNS over HTTPS on Chrome browser, by allowing the availability of several DNS providers in the test, instead of domiciling all DNS traffic to Cloudflare.

The DNS queries on Opera browser will go through Cloudflare servers, and for requests that cannot be handled by Cloudflare, will have to go through the local DNS server by allowing the browser to connect to local resources.

Albeit, the Opera DNS-over-HTTPS feature is not enabled by default, the user will have to enable it by navigating to opera://flags/#opera-doh in the web browser's address bar. Then the right experimental flag will be loaded on the internal opera://flags page directly.

But you can also load opera://flags and directly search for Secure DNS to set the Secure DNS (DNS over HTTPS) flag to Enabled. And you'll have to restart the Opera web browser for it to take effect.

Opera Software, however did not prioritize privacy in the documentations, rather the company has only entered into a deal with Cloudflare to limit data exposure, usage and retention when a user enables the service.

Opera 65 beta default of DNS-over-HTTPS to Cloudflare’s 1.1.1.1 server



Bike hailing business is gaining a huge traction in Lagos, as Nigeria's commercial nerve center with a population of over 20 million people is notorious for traffic congestion. And how best for commuters to beat the traffic, if not through a good old bike ride -popularly known as Okada, in the local parlance!

While there are about half a dozen bike hailing services in Nigeria, the bike hailing startups are still saddled with the problem of unregulated market in Lagos, and as such, are vulnerable to some issues that may affect their future operations, if nothing urgent is done about it.

Okada, on the other hand, are not quite difficult to pick up anywhere in Lagos; as they are everywhere and you just have to wave at them to stop and haggle with the riders until an agreed price that's acceptable is reached.

Top Bike hailing Service in Lagos



ORide



ORide is a bike hailing service launched under Opera OPay, which aims to make commute around Lagos more easier. The service was officially launched on May 27, 2019. But unlike the taxi hailing services like Uber and Taxify, it is not designed with the convenience of peer-to-peer ride sharing, rather ORide is only a means to navigate the Lagos traffic.



To access the ORide service, you'll have to go through the OPay app, which though the UI is not a very user-friendly, sure gets the job done. It requires that you first download the OPay app from the Play store to your Android phone, and create an account, which will send SMS code for authentication when you try to log into the app for any extended period.

The obvious advantage of ORide over others is that they have a more spread of riders, making it easy to get a rider on any commute. But the fact that it uses the OPay wallet can be a bit stressful, given that you must create an account, even when you want to take just a short trip.

MAX



Max is a bike hailing service that assures a stressful experience as the app is pretty easy to use and ensures good user friendly interface. Though the maps integration appeared a little scrumpy, but on the good side, you'd only have to wait about three minutes to be connected to a rider, referred to as "Champion” on the service.



The con of this service is mainly the dearth of riders, as getting a champion can take as much as 25 minutes, which if you’re in a haste or stranded at a place, that could be a problem, but waiting in the comfort of your house may not be the worst proposition.

Gokada



Gokada is yet another bike hailing service in Lagos that promises an easier experience with their recent re-branding. You simply download and install the app, and you are good to go!



Gokada works more with verified and trained professional bikers to provide better service experiences to riders. In other words, you know exactly what you'll be getting, unlike the regular okada bikes who are largely unpredictable and mostly untrained in good service delivery.

Bikes will long remain relevant, as mainly due to unsuitable road networks and unavailability of effective traffic planning, commuters will always tend to find alternative transport systems to ply through the deplorable roads, which also adds to the fact that they'd get to beat the frantic traffic jam as well.

Top Bike Hailing Service in Lagos to make your Commute easier



Microsoft has announced the general availability of Tamper Protection, a security addition designed to protect Microsoft ATP customers against unauthorized changes to their security settings.

While there are growing attempts by bad actors to disable Windows Defender Antivirus to stop the security service all together, or turn off behavior monitoring and script scanning by going after real-time protection settings like the OnAccessProtection policies.

The tamper protection feature is designed to protect against such malicious and unauthorized changes to the security mechanisms, and thus ensure that endpoint security is maintained against malware and threats that are directed at the Enterprise.

Enabling the Tamper protection will prevent unwanted changes to security settings such as the core anti-malware scanning feature of Microsoft Defender ATP next generation protection, Cloud-delivered protection, IOAV (IE Downloads and Outlook Express Attachments initiated), and Behavior monitoring, which also works with real-time protection to analyze and determine threat scenarios.

Additionally, the Security intelligence updates used by Windows Defender Antivirus to detect latest threats are protected from modification, either by local admins or by any malicious application.

The new security feature, which has been in testing for sometime now within Windows Insider program, is a result of extensive research into modern attack patterns and the evolving threat landscape, along with consistent engagement with partners and feedback from Microsoft customers.

Tamper Protection is deployed and managed centrally through Microsoft Intune, which procedure is similar to how endpoint security settings are managed, and can be enabled for an organization, user groups or through devices.

Microsoft releases Tamper protection for Defender ATP Enterprise customers



Google introduced 'Site Isolation' in Chrome for desktop in 2018, which feature brings additional line of defense by ensuring that the pages from different websites are opened in different sandbox processes on the browser.

The security feature was enabled by default in the web browser starting with the release of Chrome 67, in a bid to thwart the infamous Spectre and Meltdown attack, and also protect against many other online threats. With the browser getting its own isolated process, it will become harder for malicious websites to access cross-site data using such side-channel vulnerability.

While the Google research team in a proof-of-concept demonstrated how an attacker could employ JavaScript to read the address space of a Chrome process, via the open tab, and also access site credentials that was opened. The Site Isolation feature will help to protect all types of sensitive data, including cookies, stored passwords, network data, stored authentication, and also cross-origin messaging that aid sites to securely relay messages across domains.

The availability of the feature for Android starts with Chrome 77, and has been enabled for about 99% of users running Android devices with a RAM of at least 2GB, and a 1% holdback for monitoring performance.

Albeit, the site isolation in Chrome for Android doesn't sandbox all the websites, unlike what is the case with Chrome for desktops; it protect only highly-sensitive information websites where users credentials are entered or accessed. But you can forcefully enable the protection to isolate all sites by an opt-in to full Site Isolation on chrome://flags/#enable-site-per-process settings page.

And once the feature is active for a user, Chrome will keep list of isolated sites stored locally on the user's device, which will help the browser to automatically turn on the feature whenever the user revisit any of the sites.

Google extends Sandbox Security mechanism to Chrome for Android



Facebook introduced the "Data Abuse Bounty" program as a reward system last year, which anyone that reports valid incidence of its apps collecting users' data in violation of its data policies, gets a price reward.

But given its vast ecosystem with millions of third-party apps, only a few of the developers have implemented a vulnerability disclosure program, thereby making them unable to offer bug bounty rewards to security researchers for responsibly reporting bugs in the apps, which in turn has limited the program.

Now, Facebook in a move to encourage the developers of third-party apps to take security more serious by setting up a vulnerability disclosure program, has expanded the program to include third-party apps and to pay security researchers for disclosing bugs in third-party apps.

Facebook's earlier expansion of the bounty program for third-party apps was only valid on submissions for exposure of Facebook users' tokens that compromises the login details for a third-party app using Facebook.

The expansion now include all third-party apps on its ecosystem, and requires that all such third-party app developers should set up vulnerability disclosure policy to help the researchers to be eligible for rewards when bugs are found in their code and claim it from Facebook.

While the scope is to reward valid bug reports in third-party apps or websites that directly integrate with Facebook if the bugs are discovered through pen-testing authorized by the third-party rather than just passively observing the vulnerability.

Facebook promises to issue rewards based on the validity of bugs reported and some other factors which are indicated in their terms, with minimum reward of $500 Bounty.

Facebook to pay Security Researchers for disclosing Bugs in Third-party apps



Mozilla has disabled the execution of inline JavaScripts on Firefox as a defense against code injection attacks, by implementing strict Content Security Policies (CSP) that ensure all scripts are executed only when loaded from a packaged resource within the internal protocol.

The execution of inline scripts and also the potentially dangerous eval-like functions for Firefox inbuilt "about: pages" have often served as gateway to very sensitive preferences and settings on the browser, which in turn presents huge security risks. So Mozilla's blockade is an effort to mitigate such class of potential cross-site scripting (XSS) issues in the browser.

And given that web pages are written in HTML/JavaScript which in the security context of the browser, are also prone to such code injection attacks, and fully capable of allowing remote attackers to inject and execute arbitrary code by cross-site scripting attacks.

Albeit, the changes won't directly affect how websites work on the Firefox browser, but according to Mozilla, it will closely audit and evaluate the usage of harmful functions in third-party extensions and other inbuilt mechanisms.

Mozilla has promptly rewritten all use of eval-like functions from the system privileged contexts and parent processes in the codebase of Firefox browser. Additionally, the company has also added eval() assertions to disallow the use of eval() function and its derivatives in system-privileged script contexts.

Mozilla disables Inline JavaScript Execution on Firefox browser



There is a zero-day vulnerability affecting a component that comes inbuilt with Apple's software, iTunes and iCloud for Windows, which exploitation causes it to evade detection by antivirus.

While the vulnerability stems from Bonjour updater, the zero-configuration networking (zeroconf) implementation of communication protocol that works in the background to automate low-level network tasks, such as downloading future updates of Apple software.

The protocol is a set of technologies which automatically creates usable computer network based on the TCP/IP when PCs or other network peripherals are interconnected, without requiring special configuration servers or any manual operator intervention. Bonjour updater is installed as separate program on PCs, so simply uninstalling Apple iTunes and iCloud doesn't actually remove it, that is the more reason it remain installed on numerous Windows PCs still not updated, and silently running behind the scene.

The zero-day vulnerability exploitation of the Bonjour was disclosed by researchers from Morphisec Labs, made possible when an attacker targeted an unnamed organization in the automotive industry with the BitPaymer ransomware.

And the component was exploitable by the unquoted service path vulnerability, which is a common software flaw that occurs when an executable contains spaces in filename and so, it's not enclosed in the quote tags ("") as required. Therefore the unquoted service path vulnerability is exploitable by simply planting a malicious file to the parent path to trick legit applications into executing the malicious programs to evade detection.

Apple, however has released the fix in iCloud for Windows 7.14, iCloud for Windows 10.7, and iTunes 12.10.1 for Windows to patch the vulnerability. It is recommended that all Windows users with either iTunes or iCloud installed should update to the latest software to ensure their security.

Why You need to Update Apple iTunes and iCloud on Windows PC?



Facebook launched Workplace in 2016, as a collaboration platform that offer standard chat functions and the ability to share files, including photos and videos, also voice clips, between employees within an organization.

And the first update to Workplace allow users to interact with external partners and agencies, with the capability of up to 50 participants to engage in group conversations within the application, via text, voice and video. While the next update to the chat app, was support for communication between workers in separate organizations.

Facebook subsequently launched features such as pinned threads, to make it easier for users to keep track of chats, coupled with the ability to pin important messages at the top of the app, up to 15 messages. And the “do not disturb” mode to allow employees turn off alerts and notifications when busy or away, with “replies” feature that enable direct responses to individual chat within a broader conversation.

Now, Facebook is working on bringing its Portal video hardware to the office with a dedicated Workplace app, which is one among a handful of other updates to the enterprise collaboration platform.

The Portal video display supports video calls between Facebook Messenger and WhatsApp, and utilizes an AI powered “smart camera” that tracks both body movements of the speakers engaging in the call. With the incorporation of Workplace app, Portal would be able to connect workers in an organization as well.

What that means is that Workplace on Portal will facilitate communication not only with friends, but with colleagues at work, in a more secure and safer platform; also users will be able to call other Portal device right from their mobile phone if they are on the go or via their PC or iPads in the office.

The first Portal device shipments started with 54,000 units in 2018, with the period measured from the time those devices were first released in November, meaning that shipments was completed at the end of the year.

Facebook has scheduled next shipment as demand has gone up in 2019, the company announced new devices last month and harping on the potential for the displays to come in handy in the office, as more Workplace customers have requested trials of Portal devices and have commenced testing in their organizations.

Facebook continues its push for Workplace adoption with Portal in the Office



The modern camera offerings with many megapixels, not withstanding, you'd still need a nifty image resize tool to bring out the exact copy of image required for professional image processes.

That is where AI Image Enlarger comes to play, available for Mac and Windows, the super-unique tool uses artificial intelligence (AI) capabilities to enhance small or low-resolution images/photos, making it easy for you to upscale your images. And the beauty of the AI capabilities is that your resized images does not loose its original quality, as it guarantees an even smarter and sharper image than what's obtainable before, and the best part - it's available for FREE.

The AI Image Enlarger software which comes absolutely free, is fully capable of enlarging any small definition image to high definition without losing quality, based on machine learning and AI technology which it packs into its processes.

Unique Features of AI Image Enlarger Software



  • Easy to use User Interface
  • Utilizes Machine learning and AI technology
  • Simple Drag & Drop Option for uploading image
  • Easily Convert Images from Low Definition to High Definition
  • Support for Windows and Mac Computer


AI Image Enlarger software employs hundreds of thousands HD photos to teach its deep learning system, thereby enabling the AI solution to analyze images and be able to add missing details during the enlargement process.

Steps to Convert Images from Low Definition to High Definition



First, go to the official AI Image Enlarger software website and download the software to your Windows or Mac computer. And note that the software is fully compatible with Windows 7/8/10 & Mac OS X and newer versions.

Then create an account for the software and log into your account on the Windows/Mac software.



Now, it is time to upload your image, but before that you should note the file limits as follows:

1. Image must be less than 3MB
2. Image should not be more than 800 width x 750 height
3. And Only .jpg, .jpeg, and .png extensions are currently supported

Once you upload your image, then choose from the styles namely: Artwork, Photo, Face, and High-Grade. You can also enlarge it twice or 4x the size of the original uploaded image, without loosing the original image quality.



After you have chosen a style, then click on submit which will provide a preview of your image. If you are satisfied with the final output, then click on the Download button to get your enlarged image, all for free.

Our Verdict!



The AI Image Enlarger software is perhaps best for quick and easy image enlargement, with the great perk of AI capabilities that makes the procedure almost effortless, and the best part is that you don’t need to pay for the software.

Additionally, you also get to enlarge your image without having to go through any rigorous study on how to use the photo editing software, as the tool is so easy to use, that even a newbie in photo editing won't have an issue.

AI Image Enlarger Review: Freely Enlarge Low Resolution Images with AI Solutions



Opera Software has hopped unto the browser tracking protection bandwagon with Opera 64 bringing the open-source EasyPrivacy Tracking Protection support to bolster privacy.

While EasyPrivacy is an open-source and optional supplementary filter list that removes all forms of tracking from the Web, including bugs, tracking cookies/scripts and data collectors, thereby ensuring better protection for users information, and bolster online privacy.

The growing issue of privacy violations with latest web tracking technologies evading browser privacy add-on has been rampant, which tracking is especially useful for ads targeting campaigns despite that it invade users privacy.

Opera's tracking protection system powered by EasyPrivacy Tracking Protection, is comparable to a similarly-named ad blocking list that support AdBlock and AdBlock Plus extensions, though the new tracking protection employed by Opera will emphasize more on the performance rather than just privacy.

The Opera browser is known for its speed, so any component that will undermine that fastness isn't going to be supported, hence Opera 64 is more private and at the same time more faster, which the company touted as helping users save a lot of time simply by switching on the tracker blocker.

Albeit, that's truly a general reality for all such browsers with ad blocker, as using an advertisement filter or blocker usually ensures speed bolster by not downloading the chunk of ads content, such as images or other components of the display advertisements.

Opera Software claims the speed gain for Opera 64 is up to 23% - and coupled with Opera's built-in ad blocker, which feature also improves on the users' privacy.

Opera 64 brings open-source EasyPrivacy Tracking Protection to bolster privacy



Microsoft has commenced the testing of Phone app for Windows 10 with Windows Insiders, which feature is to allow users to make phone calls right on their PCs without the use of mobile phone.

While the company had earlier explained the functionalities of the phone app for Windows 10 at the Samsung Unpacked event in August, and also demonstrated it in a live demo at last week’s Surface event.

Now, Microsoft has begun testing it with the Windows Insider community, and the feature will gradually roll out on 19H1 builds or newer, so may likely take a few more days to be available inside the Your Phone app.



The phone call feature adds to the growing list of capabilities Microsoft is bringing to Your Phone app, which includes; ability to receive incoming phone calls on PC and initiating same from your PC using only the in-app dialer or contact list. And easily decline any incoming phone calls on PC with custom text or directly sent to your phone’s voicemail.

Additionally, you can access all your recent call history on PC, and by clicking on specific call, it will auto populate the number on the call dialer screen, and you can seamlessly transfer calls between your PC and mobile phone.

For a peek at what build is in the Insider ring, simply head over to Flight Hub or check out the documentation here including a complete list of features and updates that have rolled out as part of the Insider flights for current development cycle.

The feature is expected to roll out to all users in Fall 2020, when Your Phone app would be running all the latest additions, and the fact that Microsoft will be opening up the new features without limiting it only to its own devices, is perhaps a thing of delight.

Microsoft begins testing of Phone app call for Windows 10 with Insiders



The earlier reported flaw in Signal Messenger that allowed just anyone, including malicious actors to initiate an auto-connect call without the receiver's interaction, has now been fixed.

While Signal boasts of a cross-platform encryption system that's touted as one of the world's most secure, but the recent flaw proved that no application is completely hackproof, which according to Google’s Project Zero team, the bug affected audio calls only, as the video option requires manual enabling for incoming calls.

The flaw could only be exploited when the receiver fails to answer audio call over Signal, which eventually will enforce the incoming call to be automatically answered from the receiver's end.



Google’s Project Zero team, which discovered the flaw, added that Signal experienced the remote attack surface due to the limitations in WebRTC, which design flaw also affected the iOS version of the app, but was unexploitable because the call is not completed owing to an error in unexpected sequence of states in the user interface.

Signal has now fixed the crucial flaw for the Android app, as the eavesdropping flaw couldn't be exploited on the iOS version of the messaging app, so it is recommended that all users should update to the latest version of the app on the Play store.

Signal fixes the Messenger bug that allow Hackers to Auto-connect calls



Mozilla and Google have scheduled to implement DNS-over-HTTPS protocol on their respective browsers, with Firefox already rolling out the feature and for Chrome, it has been scheduled to roll out later this year.

While the DNS-over-HTTPS (DoH) protocol works by altering the normal DNS, which queries are made in plaintext from a given app to the DNS server, using settings on the local operating system received from network provider. But DoH attempts to change all these, as it encrypts the DNS queries, disguised as regular HTTPS traffic and sent to DoH-capable special DNS servers, which then resolve the DNS query and reply back in an encrypted form to the user.

The experts think DoH isn't foolproof in ensuring users' privacy, as actually DoH doesn't prevent ISPs from tracking a user, and it weakens enterprise cyber-security set ups, which in turn helps criminals. And the fact that DoH centralizes DNS traffic to a few DoH resolvers, there's the problem of DoH's impact on DNS ecosystem itself, with the decentralized network of servers, giving way to created new layer of DoH resolvers, which sits on top of existing DNS layer.

The main point against DoH is its impact on enterprises, with system administrators using local DNS servers or DNS-based software to monitor local traffic, which prevent users from accessing non-office related sites, and also minimizes malware domains. As DoH creates a mechanism that overwrites the centrally-imposed DNS settings to allow employees to use DoH to bypass any DNS-based traffic filtering solutions, effectively separating DoH from the operating system's regular settings.

Thus, IT administrators will need to keep an eye on the DNS settings across the various operating systems to prevent DNS hijack attacks, with hundreds of apps running their own unique DoH settings, this will be a herculean task for the administrators.

Additionally, If DoH is widely deployed, bypassing enterprise filters by employees to access blocked content, as traffic to certain malware domains are blocked within the enterprises, will become easy.

Albeit, the security researchers understand the need to protect DNS queries from snoopers, and have recommended DNSSEC and DNS-over-TLS (DoT), which is a similar protocol to DoH, but encrypts the DNS connection rather than hiding the traffic within HTTPS.

Though, DoT have its own disadvantages, but the researchers believe DoT would cause far less problems, and all ISPs deploying DoT will significantly help ensure better privacy and security with the decentralization, while advising companies to look at alternative methods of blocking its outgoing traffic that doesn't rely only on DNS data.

Why Cybersecurity Experts oppose the DNS-over-HTTPS protocol?



Google has released a web-based password checker as part of its efforts to help identify when a user's login details is compromised, and thus alert the affected individual.

While Google had earlier made available a Chrome plugin dubbed Password Checkup, that also alert users when their login details have been compromised, whose information is found in their recent “Collections” leak, and prompt a warning for them to update their information. But the new password checker service will examine the username and password combinations saved in Chrome's password manager to be able to report on the authentication of the pairings whether it has been compromised in any third-party data breach made public.

Google will return the password checker results in an organized list of the accounts with already-compromised username-password pairs, with accounts for which the user have a shared password and accounts that are having very weak passwords, so as to show to the user where actions are required to safeguard the accounts.

It can be accessed at passwords.google.com, available for Chrome users who run the browser after logging into their Google account, which required them to synchronize data between their different devices.

The company also promised to launch a baked-in Chrome hacked-password alert system, that will automatically alert users whose details have been compromised, though it is not yet clear, if Chrome would have a similar to the Firefox Monitor which functions much like Troy Hunt’s Have I Been Pwned, allowing users to search login details on the service to know if their details were exposed in a data breach.

Troy Hunt's "Have I Been Pwned" service catalogs billions of emails exposed in data breaches, which Firefox Monitor API is granted access to the database, to afford users the ability to search their email address, and if exposed in a data breach, will be informed specifically, where and when the compromise took place.

Chrome 78 Beta, which is the build that leads to Stable, and the less-reliable Chrome 79 Canary for Windows and macOS, already sports the new password checker system, though it is hidden behind a setting on the options screen.

Google releases a Web-based Password Checker for Chrome browser



The leading social network, Facebook is under pressure from the UK, US and Australia governments to create backdoor into its encrypted messaging systems to allow the governments access to encrypted users messages.

According to an open leter signed by US attorney general and acting secretary of homeland security, with UK home secretary, and the Australian minister for home affairs, the collective governments are urging the CEO of Facebook, Mark Zuckerberg to Consult with them on how to implement end-to-end encryption on its messaging services.

While on already deployed end-to-end encryption, it must enable law enforcements access to the messages in a usable format, which in other words means providing a lawful access to the content of messages by creating a backdoor for the governments to access them.

Again, the letter raises more concerns about Facebook’s plan to enable end-to-end encryption in its messaging apps to prevent anyone, including law enforcement agencies from finding out the activities of its users by intercepting communications on the platform.

The arguement is that Facebook should prioritize public safety in the designing of its encryption system by creating a backdoor for law enforcements to gain access to illegal contents in a readable format and by duely consulting with relevant government agencies ahead of the implementation to ensure that such changes will not impede their access.

Facebook, however in a statement, said that it will strongly oppose government attempts to build backdoors into its messaging systems, and that deployment of end-to-end encryption is the right thing to do to protect people’s privacy, so it’ll defend it when the time is right.

Facebook under pressure to create “Backdoor” for Encrypted Data access



Dropbox, the San Francisco-based Cloud Storage company, has launched a new collaboration tool dubbed Spaces, that will enable co-workers to share a variety of documents within an organization, which is perhaps another addition to the file-sharing and productivity ecosystem.

The revamped Dropbox app will allow users connect with a variety of third-party video and text messaging platforms. While Dropbox Spaces consist of a shared folder for groups that include documents from different sources, with the ability to chat with co-workers and also share a task among the team.

Albeit, Dropbox Spaces isn't the only collaboration tool, with competitors like Slack, and Microsoft Teams, among others - which all are striving to be the leading collaboration platform for co-workers to share their daily tasks.

Dropbox is offering an enterprise platform that will create a smart work-space and supporting ecosystem, with Spaces, which changes to its core platform will enable office workers to manage the influx of data, instead of relying on the numerous applications that organizations are forced to implement.

It will incorporate artificial intelligence-based capabilities to help workers stay on top of their tasks working in Spaces. And Microsoft Team highlights will offer an overview of activities, such as documents update, with Dropbox’s machine learning capabilities to suggest content, for instance, what might be needed ahead of a meeting.

Dropbox's AI initiative, DBXi, will come handy, with the ‘graph’ that leverages signals from connections and integrations, resulting in a more smarter workspace.

The evolution of collaboration tools will culminate into a new type of app that enable all other apps work together, which means it will be able to organize itself, allowing users to focus more in solving the daily office tasks.

That is what Dropbox wants to achieve, with the accessibility of Google Docs and Microsoft Office in the new collaboration tool.

The company have also promised the integration of Atlassian’s work management application, Trello, which allow users add content to Trello cards, and e-signature app, HelloSign, to Spaces.

What Dropbox Spaces will bring to Office Collaboration tools space?



The emergence of malvertising campaigns is a growing concern in online marketing, that even heavy-weights like Google are still grappling with it. And there is a recent case of exploitation in Chrome for iOS, that allowed malware sites to successfully bypass the browser's inbuilt pop-up blocker on iOS devices to hijack over 500 million mobile sessions to show pop-ads.

While the hacking group, eGobbler was responsible for some massive malvertising campaigns in the past; the new campaigns that exploited Webkit-based browser vulnerabilities to run intrusive pop-up ads by forcefully redirecting users to malicious sites, have also been traced to the hacking group.

The hackers through the exploits were able to run several ad campaigns for free, evading what would have cost a very high budgets to display the ad impressions on high profile sites via legit ad networks.

According to security firm Confiant, the eGobbler hacking group started exploiting the new vulnerability in WebKit, which is the browser engine used by Apple Safari browser on both iOS and macOS, with Chrome for iOS and also earlier versions of Chrome browser for desktop, as it doesn't require clicking anywhere on legit websites they visit, neither spawns any pop-up ad.

The sponsored ads by eGobbler simply uses the WebKit exploit to redirect visitors to websites hosting the fraudulent malware immediately they press the "page down" or "key down" button on the keyboards when reading the content on legit websites.

This is possible because the Webkit vulnerability resides in a JavaScript function, known as the onkeydown event which happens each time a user presses key on the keyboard, allowing ads within iframes to break out of the security sandbox protections. Even the iOS pop-up on Chrome was not spawning as before, but the redirection on WebKit browsers still happens upon the 'onkeydown' event, according to the researchers.

However, Apple has fixed the WebKit flaw in the released iOS 13 and in the Safari browser 13.0.1, but Google is yet to fix it in Chrome.

Apple WebKit Flaw that opened up the browsers to Malvertising campaigns



Microsoft has rolled out its Windows Virtual Desktop service globally with capabilities like multi-session for Windows 10 and support for the Windows Server Remote Desktop Services, among others.

While enterprises will be able to leverage on the virtualized applications and remote desktops, including the provision for multi-session Windows 10 experiences, which is perhaps what sets Microsoft's offering apart from other vendors of virtualized Windows desktops environments, in addition to the Windows desktop client app availability for Mac and iOS devices.

The acquisition of FSLogix by Microsoft, which company also specializes in the provisioning of virtualized Windows environments, may have given Microsoft an edge, allowing it to incorporate FSLogix know-how to ensure better user experience for Windows Virtual Desktop.

Along with Windows 10 virtualization, the service will provide Enterprises support for Windows Server RDS desktop and apps, allowing them to virtualize Windows 7/10 and Microsoft Office 365 ProPlus apps, with some other third-party applications by simply running them remotely in the Azure virtual machines.

Microsoft also provide the ability to virtualize Windows 7 desktops, given the validity of the Extended Security Update support which is through to January 2023, allowing enterprise customers who license and purchase Windows Virtual Desktop to continue getting security updates for Windows 7 even after officially ending support at no additional cost.

The Windows Virtual Desktop service will be available directly, and also through Microsoft Cloud Service Providers (CSPs), with partners such as VMware and Citrix, albeit Microsoft will be talking up storage solutions from other partners specially tailored for the Windows Virtual Desktop service.

Additionally, Microsoft plans to bring support for its Teams group-chat service to reduce latency issues. and the Windows Virtual Desktop-support preview, which employs WebRTC technology, soon.

How Microsoft Azure-based Windows Virtual Desktop will benefit Enterprises