Microsoft’s Windows 10 May 2019 Update to give users better control over updates

The previous Windows 10 feature update rollouts were automatically installed on Windows 10 devices. We are taking further steps to be confident in the quality of the May 2019 Update. This will give us additional signals to detect issues before broader deployment. The May 2019 update will be available in the Release Preview ring of the Windows Insider Program next week. source: www.techworm.net

April 7, 2019 · 1 min · 63 words · Michelle Bailey

150 million Xiaomi smartphones has pre-installed app that put it at security risk

The app receives its updates through an unsecured HTTP connection. For more information about the vulnerability, you’re able to read theCheck Point blog. source: www.techworm.net

April 6, 2019 · 1 min · 25 words · Angela Walker

Data of hundreds of millions of Facebook users found on Amazon cloud servers

As Facebook faces scrutiny over its data stewardship practices, they have made efforts to reduce third party access. Data about Facebook users has been spread far beyond the bounds of what Facebook can control today. Not enough care is being put into the security side of big data. The company said it will notify users if they find evidence that the data was misused. Facebooks policies prohibit storing Facebook information in a public database, a spokeswoman said in a statement....

April 4, 2019 · 1 min · 139 words · Heather Cooper

Facebook asking new users for their email passwords for using the site

The issue was first noticed by e-Sushi, a well-known anonymous security researcher, and reported by theDaily Beast. A form below the message asked for the users email password. However, in a statement, Facebook said prompt was only seen by a small number of users. They claimed it was meant to save people from an additional step while signing up for a Facebook account. These passwords are not stored by Facebook....

April 4, 2019 · 1 min · 87 words · Kevin Clark

Cloudflare’s 1.1.1.1 DNS adds a free VPN with Warp

The company claims that most VPN services are lousy because users are experiencing a slower internet connection. Cloudflare has added Warp to the already existing 1.1.1.1 app that can be used with the Cloudflare DNS. The secure connection not only applies to the online window, but also to internet traffic via apps. Technically, Warp is a VPN. However, we think the market for VPNs as its been imagined to date is severely limited....

April 3, 2019 · 2 min · 310 words · Jason Kirby

DApps Are Set to Hit the Mainstream, All Thanks to LiquidApps

The underlying Blockchain technology that powered Bitcoin started getting attention after Ethereum debuted in 2013. The mass market adoption of decentralized applications has been frustrated byseveral technical challenges. Some of those challenges relates toscalability, speed, and transaction costson Blockchain networks. Unfortunately, Blockchain technology will continue to be criticized until it gains practical applications beyond cryptocurrencies. DApps have had many interesting starts but the aforementioned trio of problems often surface to cripple its growth....

April 2, 2019 · 2 min · 251 words · Christopher Hanson

Facebook CEO Mark Zuckerberg calls for stronger regulation of internet

Technology is a major part of our lives, and companies such as Facebook have immense responsibilities. These are important for keeping our community safe. Facebook was criticized for failing to stop the spread of footage of the Christchurch killings. Internet companies should be accountable for enforcing standards on harmful content, Zuckerberg said. Zuckerberg also called for governments to pass legislation that was important for regulating political ads on the Internet....

April 1, 2019 · 1 min · 133 words · Christopher Rice

FireEye’s “Commando VM” Turns Your Windows PC Into Hacking Machine

This automation installation script turns a Windows operating system into a hacking system. Penetration testers commonly use their own variants of Windows machines when assessing Active Directory environments. Commando VM was designed specifically to be the go-to platform for performing these internal penetration tests. reads thepostpublished by FireEye. Just running a single command automatically updates all hacking software that you have installed. However, it allows installing more features in Windows 10....

March 31, 2019 · 1 min · 88 words · James Carter

FB’s new settings make it easier for hackers to pentest its mobile-owned apps

This feature allows security researchers to bypass Facebooks Certificate Pinning security measure. These tweaks are configured in two places. The first is via the Web UI and the second is via the app UI. you’re free to also find additional details and video tutorials on thisSupport Page. Currently, the Whitehat options feature is supported only on Facebooks Android apps, and not on iOS platform. source: www.techworm.net

March 30, 2019 · 1 min · 66 words · Lori Snyder

Samsung Galaxy Fold can survive 200,000 folds and unfolds

The Galaxy Folds display can be folded and unfolded 200,000 times without any problem. It took a full week for the company to complete the test. The company will be releasing both an LTE version and also a 5G version of the unit. Further, the gear is expected to arrive in an additional 15 countries by May 3. source: www.techworm.net

March 30, 2019 · 1 min · 60 words · Lisa Berry

10 Best Equalizer Apps For Android

Smartphones have now become the primary source of media consumption. Gone are the days when people relied on iPods and MP3 players for listening to music. An equalizer allows users to customize their audio experience. So these are the best Equalizer apps for Android that are worth checking out. ALSO READ:10 Best Free Android Games Table Of Contents Best Equalizer Apps For Android 1. Bass Booster & Equalizer The first best android equalizer on the list is Bass Booster & Equalizer....

March 28, 2019 · 3 min · 514 words · Autumn Yates

Hackers remotely hijack Android phones by exploiting insecure UC browser ‘feature’

As a result, the web client will access a malicious server to download and launch a Trojan module. However, due to the MITM substitution, the web client downloads and launches a different library. This library then creates a text message that says, PWNED!. It also fails to comply with the Play Store policy, as it tries to bypass the Google servers. This violates Googles rules for software distributed in its app store....

March 27, 2019 · 1 min · 122 words · Robert Green

12 Best Kodi Addons You Should Install Right Now

Kodi is one of the most popular open-source media player software software. Well, if you have been scouting for the best Kodi add-ons, then this article might help you. So in no particular order, these are best and legal Kodi add-ons that are worth checking out. ALSO READ:best ways to unblock Kodi Table Of Contents What Is Kodi Addon? In simple words, Addons on Kodi can be compared to applications on smartphones....

March 26, 2019 · 4 min · 731 words · Kara Fox