What is my IP
What is my IP

Search results: open

Results (28)
Approximately 28 results of open

Interpol opens its first office in the Metaverse
Interpol opens its first office in the Metaverse
07/11/2022

Interpol, the International Criminal Police Organization or International Police, has presented its first office in the metaverse through which they intend to improve the fight against crime in the digital universe.  The digital police station, which is a copy of the General Secretariat of Interpol in Lyon (France), will offer training for investigators and police officers and will allow the collaborators of this international organization to interact through their avatars, without geographical or physical limits.  The inauguration of this new virtual center had been accompanied by the announcement of the creation of a group of Interpol experts that will advise police forces around the world about the risks on the global stage.  Also, it has been announced that the International Police Organization has joined Meta, Microsoft and other technology giants to define the metaverse and protect communities from cybercrime, including globally recognized and criminalized crimes, such as sexual harassment, 'phishing', financial fraud or 'ransomware', among others. The objective of this joint work, they explained, is to create regulatory frameworks "and eliminate future criminal markets before they are fully formed." According to a study by the technology company Gartner, in over three years, in 2026, one of four people will spend at least one hour a day in the metaverse to work, shop and interact with other users.

[ ... ]

What is Worldcoin and what does scanning the iris involve?
What is Worldcoin and what does scanning the iris involve?
04/03/2024

Worldcoin was introduced in summer of 2023 as a revolutionary project with the mission of creating a 100% secure digital identity, essentially a kind of fortified "digital passport," based on the verification of a unique and non-transferable element inherent to each human being—the iris. According to its developers, World ID will help distinguish human online activity from that generated by machines. In the first phase of the project, the creation of this secure digital identity is planned for 2 billion humans. To make this possible, Worldcoin has called on the global population to scan their iris. In return, Worldcoin compensates participants with a few tokens of its successful cryptocurrency, WLD, which has quadrupled in value within a few weeks of its initial launch. The payment in WLD tokens is not coincidental; it is part of Worldcoin's strategy, aiming to leverage the new digital passports to create a comprehensive ecosystem that provides universal and equitable access to advanced financial services for the entire global population. To achieve this, they encourage "iris sellers" to use the Worldcoin cryptocurrency on its fee-free blockchain, unlike Bitcoin, Ethereum, or other cryptocurrencies that do charge transaction fees. How does Worldcoin work? Worldcoin aims to address the issues of bots, rapid creation of fake identities, and content with artificial intelligence. It is designed, according to its developers, to provide every individual in the world with a unique digital identification. Additionally, Worldcoin promises to ensure the financial inclusion of each person in a fair and equitable ecosystem through a universal basic income. Users receive this income in exchange for allowing their iris to be scanned. To create the secure digital passport with Worldcoin, users must undergo an iris scan, which serves as proof of humanity and a unique identity on the blockchain. This process ensures that the individual on the other side of that identity is a human and not a fake profile created with artificial intelligence. In pursuit of the success of their proposal, the company offers users a small amount of their own Worldcoin tokens in exchange for iris scanning. The initial incentive of receiving free cryptocurrency, in the form of a universal basic income, is emphasized by Worldcoin advocates as the basis for the inclusive and universal nature of their initiative. This approach allows anyone to scan their iris, and the WLD tokens received in return can assist people without access to traditional financial services in starting to save and invest. How to Scan the Iris with Worldcoin? The registration process with Worldcoin involves scanning the iris with an orb, the central hardware device of Worldcoin developed by Tools for Humanity. The orb is spherical and processes all the information. Currently, Worldcoin has installed orbs in different countries, including Spain, where users can scan their iris in exchange for Worldcoins. To do this, it is necessary to download the Worldcoin mobile application, World ID, generate a QR code with it, and display it in front of the orb. The orb, upon recognizing it, will scan the user's iris, while a Worldcoin collaborator remotely oversees the operation. The orb takes less than a minute to perform the scan and validate the subject's identity. In exchange for their iris, the user receives a unique number called "IrisHash" and a cryptographic wallet with Worldcoins. "This digital passport is accepted as proof of unique humanity, which people can use in the digital world without the need to share any other data," assure its developers. What happens with my scanned iris in exchange for Worldcoins? Once the iris scan is completed, and digital identity is granted to the user, Worldcoin assures that the orb quickly eliminates the images unless the user requests their preservation. Only the set of numbers called "IrisHash" is stored for identification, without any additional biometric data. Worldcoin also commits to ensuring that users share only the necessary information they wish to share, providing verification options through linked devices or the additional facial authentication orb for high-security cases. Despite these commitments, the collection of biometric data through iris scanning for the unique proof of humanity continues to raise significant questions regarding privacy and information security. Some countries such as Brazil, France, India, or Kenya have halted Worldcoin's iris scanning. How much do you get paid for scanning your iris? Worldcoin pays 25 WLD for scanning your iris, which, according to the cryptocurrency's exchange rate in February 2024, has translated to an average of between 50 and almost €160 for iris sellers, depending on the value of Worldcoin on the day they scanned their iris. At the beginning of February, the value of each WLD unit was around two euros, and by the end of the month, it had risen to nearly seven euros. What can I spend my WLD on? 'Iris sellers' have the freedom to use their Worldcoins from the moment they receive them. They can exchange the payment for other cryptocurrencies, withdraw them in euros from a specialized ATM, or hold onto the tokens in the hope of an increase in their value. Additionally, WLD payments are already accepted on platforms such as Discord, Shopify, Minecraft, Telegram, Mercado Libre, or Reddit, among other places. Who is behind Worldcoin? Worldcoin bears the stamp of two innovative minds: Sam Altman and Alex Blania. Altman is the CEO of OpenAI and a key figure in artificial intelligence development, leading projects like ChatGPT. Blania, on the other hand, is the co-founder of Tools For Humanity, contributing his experience in creating technological tools for a more equitable economic system to this new and successful cryptocurrency.

[ ... ]

Cookies
Cookies

A cookie is a file that is downloaded to your computer to access certain web pages. Cookies allow a website, among other things, to store and retrieve information about the browsing habits of a user or their equipment and, depending on the information they contain and how you use your computer, they can be used to recognize the user. However, this only means obtaining information related to the number of pages visited, the city assigned the IP address from which you accessed, the number of new users, frequency and recurrence of visits, time of visit, the browser or the operator or terminal type from which the visit takes place. In no event will data be obtained about the full name or address from which the user is connected. The cookies used on this website and the specific purpose of each one are: UTMA Cookie: We use this cookie to count how many times a unique user visits the site. UTMB Cookie: We use this cookie to calculate how long a user stays on a page. UTMZ Cookie: This cookie stores the visitor's origin, the path followed to access the web, either the direct access from a link on another website, from an email link using certain keywords in a search engine, through a display campaign, or through an AdWords ad. UTMC Cookie: The current JavaScript code that Google Analytics uses does not require this cookie. This cookie is used, along with the utmb cookie, to determine if after more than 30 minutes on the same page a new session should or should not be established for the user. This cookie is still written to ensure compatibility with the websites where you installed the old urchin.js tracking code. PHPSESSID Cookie: We use this cookie to identify the relevant user. You can allow, block or delete cookies installed on your computer by setting your browser options. You can find information about how, in relation to the most common browsers, on the links listed below: Explorer: http://windows.microsoft.com/es-es/windows7/how-to-manage-cookies-in-internet-explorer-9 Firefox: http://support.mozilla.org/es/products/firefox/cookies Chrome: http://support.google.com/chrome/bin/answer.py?hl=es&answer=95647 Safari: http://support.apple.com/kb/ph5042 Please note, however, that there is the possibility that disabling any cookie may prevent or hinder navigation or the provision of services offered on this website.

[ ... ]

MSI
MSI
MSI

MSI GAMING, is a leading brand of high-end hardware for the demanding world of video games and eSports. Supported by the spirit of gaming, MSI creates and manufactures innovative gaming equipment to nurture its ever-growing community of adept gamers, always open to encourage gamers around the world to network and share their collective gaming wisdom. At MSI, they remain faithful to apply all the latest developments in design and technological innovation, to achieve that extreme performance so sought after and appreciated by gamers.

[ ... ]

SSD laptops
SSD laptops

SSD laptops are the ultimate solution to laptop slowness and inefficiency. With an SSD laptop, you will no longer have to wait forever for the operating system to start up, you will eliminate the lag in opening and saving documents, and you will be able to open programs and applications almost immediately. Choose the SSD laptop configuration that suits you best. You'll find gaming and 2-in-1 laptops, ultrabooks, workstations, and more - the choice is yours!

[ ... ]

Google Integrates Gemini AI into Google Ads
Google Integrates Gemini AI into Google Ads
29/01/2024

Google has commenced the integration of Gemini's Artificial Intelligence (AI) into the conversational experience of its Google Ads service. This integration aims to assist marketing professionals in creating more effective advertising campaigns through the generation of specific content. Conversational Experience Empowered by Gemini Initially available for English-speaking advertisers in the United States and the United Kingdom in beta, this expansion will roll out globally in the coming weeks, with plans to include other languages in the near future. By providing the website's URL, the AI generates relevant advertising content, including creative pieces and keywords, facilitating the creation of optimized campaigns. Suggestions for Tailored Images in Captivating Visual Campaigns In an upcoming development, Google Ads' conversational experience will also include the ability to suggest images tailored to the campaign through the use of generative AI and materials from the advertiser's landing page. This feature, scheduled for implementation in the coming months, will provide advertisers with a comprehensive solution for creating visually appealing campaigns. Google has emphasized that all images generated by AI in Google Ads will be clearly identified, thanks to the SynthID technology that places an invisible watermark accompanied by open standard metadata.

[ ... ]

Private Internet Access
Private Internet Access
Private Internet Access

They call it PIA, which is the same as Private Internet Access but shortened. At PIA, it's all about online privacy. As a good VPN provider, it strives to give users online privacy, security, and freedom. To do so, they abide by strict and reliable open-source VPN protocols and a clear no-logging policy. Based in the United States, PIA has more than 10 years of experience leading the VPN industry, and they are considered true experts when it comes to providing online security and anonymity.

[ ... ]

How can I hide my IP?
How can I hide my IP?

Accessing the Internet involves connecting our computer, smartphone, tablet, etc. to a communications server that is responsible for providing access to the network. This connection involves the identification and exchange of data about our identity, IP address, and online activities that are recorded forever as a trace of our navigation. Can I be tracked through my IP address? Yes, it is possible to trace an IP address and for those who consider privacy a priority, this is a major problem because, in addition to being exposed throughout the network, the increasingly intensive use of the Internet has led to this type of data becoming an object of interest for cybercriminals seeking personal or confidential information that can be used for their benefit. To safeguard against all this, there are several methods to hide the IP address, ensure our online privacy, improve our security on the Internet, and prevent anyone from knowing what pages we visit, the time we have spent on every connection, or what we are downloading. What are the advantages of hiding my IP?  Apart from everything related to privacy and security already mentioned, hiding the IP offers different advantages for users in multiple circumstances: There are IP hiding services that prevent IP geolocation when we travel and allow us to connect to the network as if we were doing it from our own country, overcoming, for example, any network access limitations that may exist in the place where we are. We will be able to download files anonymously avoiding that the rest of the users can see our IP location. If our IP is not "in sight", the possible limitations and blockages of the Wi-Fi network and even of our ISP (Internet Service Provider) disappear. Thanks to the data encryption system of the most advanced IP hiding services, our vulnerability in connections to public Wi-Fi networks is minimized. When the system detects a location different from the real one, this can give us advantages to buy in online stores with different offers according to the country or to avoid the blocking of games, maps, and online game add-ons that may have restrictions on our location. How can I hide my IP? IP hiding is achieved through the use of specific services and tools to hide the IP and encrypt our traffic, those services allow us to hide the real communications we make during our navigation. Besides those techniques that are based on the modification of network protocols and require certain skills to carry them out, there are several technologies within the reach of all users: VPN or Virtual Private Network Proxy or Web proxy Tor Public Wifi How to hide the IP address with a VPN? VPNs are services that connect us to the Internet through intermediate servers, in which our original IP address is " masked " by the IP address of that secure server. This concealment ensures that anyone tracing our connection will only see the IP address and location of the VPN server, but not our own. In addition, to safeguard our activity on the network, VPNs use tunneling and data encryption, encrypting the information we exchange with the VPN server, hiding it, and preventing third parties from being able to read it during its transit. The security of VPN connections is determined by proprietary VPN protocols, based on different standards and encryption and authentication methods, which depend on each developer. The range of options is wide and this allows us to choose between, for example, options that prioritize speed over security, options that do the opposite, options with a greater or lesser degree of reliability, etc. VPN applications always run in the background and do not hinder browsing. How to use a proxy server to hide the IP address? Unlike VPN services, proxy servers focus their activity solely on hiding the IP, without performing any type of concealment on our network traffic or any other data that could reveal our identity. Proxy servers act as intermediaries between our device and the destination server to which they transmit our requests on our behalf. Therefore, our IP will be hidden and the only one they will see will be the proxy one. There are different types of proxy services, from the simplest ones that only help us to hide the IP to others with extra functionalities such as blocking cookies, scripts, and other files hosted on websites and sent to the user.   Browsers or applications based on the HTTP protocol offer the manual proxy configuration function so that we can indicate the proxy web address and port to which we want to connect before browsing. In this way, any activity that we perform through that browser will always be routed to the proxy. Alternatively, you can also opt for the automatic proxy format that searches through DNS or DHCP for the URL from which to download the wpad.dat file that runs and allows the proxy connection with automatic authentication on your computer. How to hide your IP with Tor? Tor is a free software developed to ensure anonymous browsing of users on the Internet. To mask the IP Tor uses a network of volunteer computers or nodes through which it redirects our traffic and encrypts it before it reaches its destination. At least this redirection goes through three of these nodes, achieving repetitive re-encryptions so that any possible clue about our identity disappears. In this process, Tor assigns a random and geographically different IP to our connection so that the location by third parties is impossible (if you are curious to know the IP you have been assigned you can check it through our tool). This system allows different configurations depending on whether we are using a firewall, if our ISP is blocking Tor connections or if we navigate through proxy for example. Can I hide my IP with a public Wi-Fi connection? The answer is yes. A public Wi-Fi network can also be used to hide our IP address, although if we do not have it constantly at our disposal, the IP hiding is limited to the time we have access to a public network. As this type of network is a connection shared by many other people, this makes it impossible to trace a particular user or identify them on the destination server. However, it is precisely this general access that also makes us more vulnerable. And although through a connection to a public Wi-Fi we will solve the issue of IP hiding, security will never be total, because being an open network, we can be exposed to the will of hackers and other threats, including malware and viruses. And if I want to hide my IP address, how can I change it? It may also be the case that instead of masking the IP all we need to do is change our IP address at a given moment. Then, the solution is as simple as disconnecting the modem from the power supply and restarting it after a few minutes. In that time, if your IP address is dynamic (you can check it through the network connections tab on your computer), it will be deleted and your Internet provider will give you a new one. To make sure that everything went well, we recommend doing something as simple as writing down the IP address before turning off the router and checking it again once it is up and running again. Another possible way to achieve the same result if you have a smartphone with a data plan is to turn this device into a wireless access point to which you can connect your computer, thus hiding your usual connection. There are many options to hide the IP or to change it and now that you know how each of them works you will be able to decide which one suits you best.

[ ... ]

Trust
Trust
Trust

Trust is a well-known Dutch brand founded in 1985. Today, it is the No. 1 supplier of digital accessories. They define themselves as a value-for-money brand. At its inception, it imported accessories for computers, game consoles, and video games, but given the niche market that was opening up at that time in the world, it began to manufacture its own products. Its purpose is to simplify everyday life by providing smart solutions for the home, office, and almost any environment. They offer a wide range of quality products and have very competitive prices.

[ ... ]

Google incorporates Artificial Intelligence into its search results
Google incorporates Artificial Intelligence into its search results
05/06/2023

During Google's annual developer conference, Google I/O, the company has publicly announced its commitment to Artificial Intelligence to improve its search results. Similarly, Google will introduce the generative AI collaboration tool, Duet AI, in Cloud and Workspace. The objective in this case is to assist in programming and generating personalized content in services like Gmail, Slides, or Meet. Google has opened generative AI support in Vertex AI and has also announced the Text Embeddings API for applications that require semantic understanding of text or images. At the developer conference, Google's Vice President and General Manager of Search, Elizabeth Reid, gave a live demonstration of how they are applying Artificial Intelligence in their search engine. The AI results will be displayed in a box at the top of the page with links to verify the provided information. Below the box, the rest of the results will be listed as usual, although Reid also mentioned that thanks to AI, they will now be more relevant.

[ ... ]

Proton Mail improves email tracking protecti
Proton Mail improves email tracking protecti
02/12/2022

Privacy continues to be one of the areas that concentrate most attention and efforts from IT companies  and Protron Mail, Proton's end-to-end encrypted mail service, developed by CERN engineers, after learning about mass surveillance of US security agencies, has announced a new level of protection in this regard. Proton will reinforce the protections against the tracking of 'emails' with the aim of offering users a highly privacy service and neutralizing any gap that may have been opened since the creation of this service nearly a decade ago. Proton Mail guarantees their clients, an encryption system that no one except the sender and receiver can access the message. The new version, which will be included by default in iPhone and iPad, also implements new functions that will allow you to schedule the sending of messages, set reminders to answer  important emails, and postpone emails that can wait. Proton is also working on the possibility of replying to messages without having to open the text composer and is also finalizing the details of a faster new version for Android

[ ... ]

Google presents its new augmented reality search experiences
Google presents its new augmented reality search experiences
21/11/2022

Google presents its new augmented reality search experiences From this week, Google users in London, Los Angeles, New York, Paris, San Francisco and Tokyo will be able to enjoy the new Live function on their Android and iOS terminals, View Live, an immersive augmented reality (AR) experience that offers to explore the environment that surrounds us from our mobile.  With Live View, Google has explained, users will be able to use their mobile phones to discover the shops and other establishments that they have around, from which they we will receive information about their open hours, type of sale, etc.  To do this, it is necessary to install the application, which will soon be available in more cities than those included in this first launch, and focus the mobile camera on the buildings and stores that we have in view. Then,  the information available for each one will appear.  Google has also announced the global launch of a functionality that is currently only operational in Australia, Japan, the United Kingdom and the United States, which reports on accessibility to shops and other establishments and premises for people with reduced mobility.  The accessible places are marked with a wheelchair icon and the users can access to relevant information is displayed, such if that place have adapted bathrooms, if interior mobility in a wheelchair is possible, or if they have accessible parking spaces. The third novelty announced by Google is a new tool for electric vehicle drivers, with real-time information on the nearest charging stations.

[ ... ]

Google will retire Hangouts in November
Google will retire Hangouts in November
04/07/2022

From today, all Hangouts users when they open the messaging app, will see a message inviting them to switch to Chat. The reason is that  continuing with its plans to migrate all its users to this tool, Google has confirmed that Hangouts will not  be longer operational this coming November.  As they has explained on its official blog, users who still use Hangouts in Gmail will automatically switch to Chat, The change includes the transfer of conversations, history and contacts.  Those who access Hangouts through the web or the mobile application must carry out this transfer with the help of Takeout, Google's data download tool.

[ ... ]

The Spanish, the European citizens who know more about metaverse and virtual reality
The Spanish, the European citizens who know more about metaverse and virtual reality
27/06/2022

The Spanish are the European citizens who most claim to know what the metaverse, virtual reality and augmented reality are. In fact, the results of the report presented by Ipsos in collaboration with the World Economic Forum, ensure that this knowledge would be not only above the European average,  also the worldwide. Thus, 63% of Spaniards say they know the metaverse, compared to 52% of the world population, 30% of germans or 28% of France citizens. At the other extreme we find Turkey (86%), India (80%), China (73%) and South Korea (71%), which are presented as the countries with the largest population knowledgeable about the metaverse. "The results of this research work give a very optimistic view of the potential of the metaverse and show that many people are open to the technological change that is taking place," says Jame Ferrand-Gutiérrez, head of Data Intelligence at Ipsos in Spain. The director, however, points out that “we cannot ignore that the metaverse is still a concept that has not been fully realized […] Although it is planned as a parallel reality where everything has a place, in reality it is not. Well, at least at present. We will see in the future where it evolves". About the augmented and virtual reality, 77% of Spaniards say they know the first one well, and 85% the second, being, once again, Turkey, the country in the world where the percentages of familiarity with these technologies are more high, 94%. According to the report 'How the world sees the metaverse and extended reality', which collects data from 29 countries, obtained between April  and May through the Ipsos Global Advisor platform, citizens expect that applications that use the metaverse will have a growing impact on their lives over the next decade and, according to the document, in Spain the greatest impact is expected in the field of virtual education and training (63%), entertainment (61%), video games (57%), work meetings (55%) and way of socializing and resources related to health (both with 54%).

[ ... ]

Microsoft Explorer is already history  Microsoft stops supporting
Microsoft Explorer is already history Microsoft stops supporting
17/06/2022

After 27 years, Microsoft has definitively disconnected the Internet Explorer web browser and Microsoft Edge becomes, from now on, the only reference browser of this technologic company.  Since last wendsday, June 15th, Microsoft is  only supporting Microsoft Edge and any user who tries to access to the old browser or open any service that only works with Internet Explorer will be redirected to Microsoft Edge.  Between 2002 and 2003, Internet Explorer was the most widely used browser in the world, 95% of users, although it was gradually losing market share. In fact, since 2016, Microsoft had already suspended the development of new features for this browser.  After a first phase of redirection to Microsoft Edge over the next few months, Microsoft has already announced that it will release a Windows update that will make virtually all traces of the old browser disappear permanently, although it will remain active within Microsoft's Internet Explorer mode Edge, until the end of 2029.  The withdrawal of support for Internet Explorer 11, the latest version available, will not affect server-based browser applications or the Windows 10 Long Term Servicing Channel (LTSC) or the Trident MSHTML engine.

[ ... ]

The use of magnetic tapes to store data is growing
The use of magnetic tapes to store data is growing
11/05/2022

Although cloud storage continues to be a growing resource for many companies to promote hybrid work environments, for security reasons, many other companies have decided not only to return to hard drives, SD cards or pen drives, but even to magnetic tapes.  According to the Swedish firm Sweclockers, storage on this format skyrocketed in 2021 and grew, compared to the data recorded in the previous year, by 35%. Being a format that is not connected to the internet and therefore free from the threats of ransomware and malware, magnetic tapes are increasing their popularity again and companies such IBM, HP or Seagate/Quantum have already launched updated versions of these tapes on the market that include Linear Tape-Open (LTO) technology and high storage capacity, according to the current needs of companies. The main difference from other digital storage media is that magnetic tapes can only read and write data sequentially, and this cannot be done simultaneously.

[ ... ]

Video calling apps listen when the microphone is off, according to a study
Video calling apps listen when the microphone is off, according to a study
25/04/2022

A group of researchers from the University of Wisconsin-Madison (United States) has determined that video conferencing applications can continue accessing audio data even if the user has disabled the microphone.  To demonstrate this, they have studied the most popular video conferencing applications and have analyzed the behavior of the mute button until they has determined that all the applications that they has tested whether the microphone was open or closed, occasionally collected raw data and delivered it to the servers of their services.  In their research they have worked with binary analysis tools to see how the audio was transferred from the application to the audio drivers of the computers and then to the network.  They aslo have created, through machine learning models ( 'machine learning'), a classifier of daily activities that, with 82% accuracy, has determined which activities users were doing while their microphones were, theoretically, silenced. In relation to this, the authors of this work recall that beyond muting the microphone, you can turn off the microphone of a device through the settings menu, a safer option to limit access to confidential information and sensitive data.  All the conclusions of this study will be known next July in the Privacy Improvement Technologies Symposium.

[ ... ]

Google Maps will use AI to update store hours
Google Maps will use AI to update store hours
14/04/2022

Google Maps will update the hours of more than 20 million businesses around the world in the next six months. To do this, they will use Artificial Intelligence (AI) and a self-developed machine learning model, which identifies shop hours that are not updated.  Through this system, the AI ​​will update the hours according to itsel predictions based on parameters such  the last update of the shop's profile, the hours of nearby stores and the busiest hours in that location. In addition, the algorithm will take datas from Google Business, information from the store's website, if it has one, and images from Street View.  In some countries, Google will also use Google Duplex conversational AI technology to make calls with the quality of a human voice to the stores and confirm their opening hours. In this list of countries, France will be the only European country where the telephone verification will be carried out. The rest of the countries are Argentina, Australia, Chile, Japan, Mexico, New Zealand, Peru and the United States.

[ ... ]

WhatsApp improves security in its desktop version
WhatsApp improves security in its desktop version
14/03/2022

In accordance with the growing use of WhatsApp in the desktop version and with the aim of guaranteeing users maximum security, Meta has announced that has implemented in this app, a new security layer called Code Verify that acts as an open source browser extension verifying automatically the authenticity of the web code of this application.  According to Meta, which has offered this utility to other services to use it, Code Verify allows web browsers to verify that the resources they obtain have not been tampered with.  "When someone uses Code Verify, the extension automatically compares the code that is executed in WhatsApp Web with the version of the code verified by WhatsApp and published in CloudFlare", has said the company, who also explains that if any violation or inconsistency is detected , the user will receives a notification, immediately.  This new WhatsApp code verification, which Meta has confirmed does not record metadata or user data or share information with the application, will be available in the official browser extension stores for Google Chrome, Microsoft Edge and Mozilla Firefox.

[ ... ]

Mozilla allows the simultaneity of accounts in their VPN service
Mozilla allows the simultaneity of accounts in their VPN service
09/02/2022

Mozilla has expanded the functionalities of the VPN function in Firefox, and from from now,  will allow users to protect their browsing from different accounts. This function will prevent users from having to open new windows or applications to access their digital work tools and will not mix them with those for personal use. The new functionality allows is prepare to create containers with specific tabs that can be related to different environments, such as personal, work, shopping, banks and social networks, and even customize them with a different color and logo. Once this is done, the browsing histories and the 'cookies' of the pages, for example, will remain isolated from each other, offering an additional layer of privacy by protecting the browsing activity and allowing a different exit server to be set in a different location for each one of the containers. In addition, from now it will  becomes possible for the same person to be register in two accounts in the same service. This new functionality of Mozilla VPN is first launched for the version for Android and iOS mobiles, and in September it will be available for desktop computers.

[ ... ]

What's new in Google for Android?
What's new in Google for Android?
10/01/2022

Google opens the year with news and has already presented in CES 2022 some of the most importants ones, such the new option for locking and unlocking devices and for the remote control of actions on all devices compatible with their Assistant. This means that from now on, you can unlock and use a Chromebook, mobile or tablet from a Wear OS smartwatch. To be successful, of course, the devices must be close to the clock. It is also available the option of unlocking - opening or start the car - BMW vehicles through a compatible Samsung phone or Pixel and, also, the function of transferring and managing content between devices through an integrated Chromecast that allows users to  send content from the smartphone to televisions and monitors as well  to speakers. Google has also announced the upcoming launch of a new device connection function that will allow, for example, to configure a Chromebook from the mobile phone and access all the saved data,. The new feature will also incorporate 'Fast Pair' pairing with Bluetooth accessories.

[ ... ]

DuckDuckGo introduces a feature to protect Android smartphones from trackers
DuckDuckGo introduces a feature to protect Android smartphones from trackers
26/11/2021

DuckDuckGo goes a step further in terms of security and has just announced a new tool for Android Smartphones that block the tracking of user data. In fact, it is an extension that can be already  tested in its beta version -with a waiting list- and that according to DuckDuckGo was born to stop the theft of information ( according to AndroidRank.org, 96% of the most popular free Android applications contain trackers. A 87% send data to Google, and 68% to Facebook). This free extension is called 'App Tracking Protection' and it is integrated into the search engine's 'app', so it is not necessary to keep it open for it to work. Trackers blocking can be reviewed in real time through DuckDuckGo and it can also detect which networks are tried to keep users personal data to. In addition, one can activate the notifications service to receive summaries of its operation.

[ ... ]

End-to-end encryption of Facebook Messenger and Instagram delayed until 2023
End-to-end encryption of Facebook Messenger and Instagram delayed until 2023
25/11/2021

Security and privacy have become two of the main  worries of the new virtual world. Meta, the new name of Mark Zuckerberg's company, has been working on end-to-end encryption system for  Facebook Messenger and Instagram platforms and has just reported that finally this protection will not be ready until 2023. The delay, they explain, is due to their effort to ensure that end-to-end encryption will be the protection that all their messaging applications have by default, but at the moment only WhatsApp offers it. This technology means that only the sender and the receiver can know the content of a conversation. It's also known that end-to-end encryption has open the debate about  privacy and collaboration with police investigations, specially in cases of child abuse. "As we implement end-to-end encryption, we will use a combination of unencrypted data in our applications, account information, and user reports to keep them secure in a way that protects privacy while assisting in public safety efforts" , has assured the Security director of Meta, Antigone Davis.

[ ... ]

OPPO joins the Connectivity Standards Alliance
OPPO joins the Connectivity Standards Alliance
21/10/2021

Oppo has announced its membership on the Board of Directors of the Connectivity Standards Alliance (CSA), the organization with more than 400 technology companies working together to increase compatibility in IoT through simpler technology standards.  One of Oppo's main objectives in his new role, explained Neil Yang, director of OPPO's Standards Research Department, is to promote Matter, the base protocol for the Internet of Things (IoT), offering a simplified user experience that allows connecting different devices "We want to create a highly compliant IoT ecosystem, and drive the development of the Alliance's advancements together with other partners through proposals for new protocols, setting new standards and developing new Matter-based products”, says Yang. For the CSA, Oppo's commitment is an open door to promote Matter in China and throughout Asia, offering the possibility of providing better IoT experiences to more than one billion users.

[ ... ]

YouTube allows  to continue watching a video started on your mobile on your PC
YouTube allows to continue watching a video started on your mobile on your PC
11/10/2021

YouTube continues improving and expand its streaming services to allow users to continue watching on the computer a video that they had previously stopped on their smartphones.  This function requires having the Google account synchronized and in case of computers it is essential to have Chrome installed.  Then, if the user pauses the video while it's playing in the YouTube app for Android or iOS, it will be possible to continue watching it from the same point on the computer.  When YouTube is opened on the computer, a pop-up window will show in the lower right corner, with the playback line of the video, right where it was stopped, so the user can keep playing it when he decides.

[ ... ]

A fraudulent email simulates a WhatsApp Backup and installs a Trojan
A fraudulent email simulates a WhatsApp Backup and installs a Trojan
29/09/2021

WhatsApp users, Internet users' associations and also some police officers have alerted through social networks about a new virus that arrives by email with the subject "Backup of WhatsApp messages. This email offers a link to download the history of conversations in this application, which should not be clicked if you don’t want to install a Trojan on your device.  The message arrives with the same appearance and usual colors of WhatsApp and provides supposed information about the number of messages deleted, restored and read through the application, looking like a real information and causing confusion in the victims  If we receive the message but we don`t use the link, the Trojan will not run and we only need to delete the message to get rid of the virus. But if we have opened the link, or downloaded and opened the zip file that arrives in some emails, then the device will be infected, and we will need to use an antivirus to detect the malicious software and destroy it.

[ ... ]

Ransomwhere, new platform to track cyberattack payments
Ransomwhere, new platform to track cyberattack payments
13/07/2021

This week was made known the unveiling of Ransomwhere, a new collaborative data platform born with the intention of being able to track 'ransomware' ransom payments to cybercriminals wallets. The platform launched by cybersecurity researcher Jack Cable, allows data to be entered into the Ransomwhere website in an open and transparent format, so that users can easily report on the cryptocurrency wallets used in their ransomware attack payments, often included in the ransom notes of the attacks, and through this data the figure obtained in extortion payments to cybercriminals is obtained. As these payments are made with cryptocurrencies, the transactions can be traced as they are opened by the use of the blockchain or Blockchain. According to the first data obtained in these first weeks of operation, Ransomwhere has reported that it has already recorded more than $33 million paid this past year in ransomware and accumulated data of about $28 million more satisfied previously. This information also shows that the ransomware with the highest income so far is Netwalker, with more than 27 million dollars, followed by REvil / Sodinokibi, with more than 11 million.

[ ... ]

How to set up a digital marketing strategy?
How to set up a digital marketing strategy?
16/06/2021

As our daily life Internet gains prominence in our physical world, companies selling products and services are increasing their online presence. To do so, they resort to strategies and tactics that ensure their omnipresence in both worlds, with the main task of attracting and retaining customers who buy their products. In this race for customers' attention, strategies such as Inbound Marketing and Outbound Marketing have emerged as protagonists and although they are radically different in their forms, both techniques have found in online communication an ideal medium through which to achieve their goals. What is Inbound Marketing? Inbound Marketing is based on attracting customers through non-intrusive techniques that use content related to the needs and interests of our target audience to attract them to our brand and products. Inbound Marketing Strategy In Inbound Marketing, content is the king and the strategy to get the user to approach the brand is to create, through these contents, links with the customer and establish a relationship of trust and support that favors their interest in our products and services, as well as their loyalty. To achieve this attention on the contents, it is basic and essential to optimize the SEO search engine, which makes our website, our contents and brand visible, makes us relevant and also contributes to our authority. To achieve this optimization and positioning, SEO will be in charge of indicating which words are trending in searches related to our content, will improve the structure of the web to allow a correct user experience, will implement a good strategy of referral links or link building and will take care of other aspects such as the integration of CRM tools or user metrics. All this will make it possible for our content to be positioned and that in a totally "natural" way and without any intrusion, all those contents written according to the interests of a certain group of customers, awaken their interest and attract them to our brand. Inbound Marketing Tools Throughout the whole process of customer attraction and loyalty, the Inbound Marketing strategy has a wide variety of tools to achieve its goal: Blogs Landing page Lead Creation Calls to action Intelligent content Workflows, ... What is outbound Marketing? Unlike Inbound Marketing, outbound Marketing is based on a totally traditional commercial approach, in which the product or service being sold is the only protagonist of the communication. Outbound Marketing Strategy To reach the public, outbound strategies use invasive methods that address broad audiences, without a specific target, with the intention of reaching the maximum number of possible interested parties. Outbound Marketing strategies are based on one-way communication, from the brand to the customer. The company shows the value of its products and services and tries to convince the public to buy them. All this operation is implemented without the customer's request, even before he has made a search or has shown previous interest in a specific product or service. Outbound Marketing Tools In Outbound Marketing, since there is no specific target audience segment, the communication reaches many users, although it may not be of interest to any of them. To achieve this massive distribution, companies use resources such as: Pop-ups Advertisements inserted in videos Banners Email campaigns for which companies use powerful email marketing software in Spanish, with multiple integrated tools that allow from automating mass mailings to A/B testing, comprehensive monitoring of the actions of each recipient (open rate, clicks on links,...) or even advanced segmentation based on interactions and / or user behavior detected in previous actions. Newsletter, inbound or outbound marketing? Now that we know the differences between Inbound and Outbound Marketing, we will finish by looking at a very useful and versatile tool that, unlike those previously mentioned is used interchangeably by both strategies. We are referring to the Newsletters. If we look at the Newsletter of Which is my IP, for example, we would be talking about an Inbound strategy, because to receive the electronic newsletter you must first register (by the way, if you have not done so yet, do not miss it and you will receive timely information on news and updates to get the most out of your Internet connection). On the other hand, if we look at newsletters like the ones we have all surely received at some time, in which we are offered, for example, a telephone offer from a company that is not our own, we are dealing with an electronic newsletter included in the marketing plan of an Outbound strategy. At this point, we can only conclude that knowing our priorities as a company, analyzing the degree of knowledge we have about our target and assessing our objectives, we will have all the necessary answers to start working and designing our digital marketing strategy.

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x