Anti-Spam Protection Appeared in Android SMS Application


Google developers updated the Messages application, designed to work with SMS by default. Now it has two new features: Verified SMS and Spam Protection.

As indicated by the name of the first feature, Verified SMS confirms the message sender's identity. Verification will only be done to assess the validity of SMS messages sent by businesses, but will not function for ordinary user messages.

You can see their name and logo in the message thread for confirmed companies as well as a verification icon.

The developers emphasize that Verified SMS does not send messages for verification to Google's servers, and explain that the function was created to additionally protect such things as one-time passwords, account alerts, and so on.


So the user can be sure of receiving an SMS from the service, not from scammers.

Although the manufacturer does not explain how the technology works, Google engineers say they can detect SMS messages sent from random numbers that have not previously been associated with a particular company, thereby avoiding any phishing attacks.

The new feature already extends to users from nine countries: the United States, India, Mexico, Brazil, Britain, France, the Philippines, Spain, and Canada.

Spam Protection, the second feature with a speaking name, is designed to provide spam protection.

The feature shows a special alert panel at the top of the Messages if the software believes that there are signs of classic SMS spam in the newly received email.

 Spam security is also reported to work without sending user SMS messages to Google servers while retaining contact privacy.

Google said this feature is already running in several countries, but is now open to U.S. users.

You Can Now Forward Email as Attachments to Gmail


Google has added a new feature to Gmail that allows you to provide attachments to an existing email or multiple emails.

This helps the sender to open the attached email and display it with full mail headers in its original form.

While this function is useful to forward multiple emails at once, it is also very useful for administrators of mail servers, network administrators, and security professionals who need to see email headers.

"We’ve heard from you that there are situations where attaching emails makes more sense than forwarding separate emails, like wanting to forward multiple messages related to a single topic. With this new functionality, you can do exactly that. Sending emails as attachments allows you to write a summary email message to your recipients, and attach the set of supporting emails that recipients can directly open in their mail client. "

Best VPN Service

You can do this in two ways when adding emails as attachments.

1. The first approach is to pick multiple emails and then drag them into your writing open email message.


2. Second way to insert emails in a new thread is to select the emails and then from the overflow (three-dot) menu select “Forward as attachment”.


The email will be sent as an EML file when you connect and send an email, which is accepted by most mail clients, and you can send as many emails as you like.

When you receive EML attachments, it will open in a new window if you click on the attachment.

This feature is rolling out at the moment and is not yet available for all Gmail accounts.

Google says you're going to know when it's activated as you'll see the option "Forward as attachment" in the More three-dot list.

WhatsApp New Feature: Allow Android Phones to Dial The Waiting facility

HIGHLIGHTS

  • WhatsApp has added several new features recently in its latest update
  • WhatsApp is yet to start call hold facility now
Now WhatsApp has added call waiting facility to a list of new apps, and you will know if otherWhatsApp users are also trying to call you at the same time when you are speaking to a WhatsApp consumer already.

Earlier, when someone was trying to call you on WhatsApp while you were talking, they'd hear it ringing, but nobody would respond. Then the call would be disconnected and you would later see a "Missed Call." But now, in the middle of the call, you'll get a warning as well as an opportunity to disconnect the current call and talk to the next caller. Additionally, the latest caller can also be dismissed.

Given that Facebook-owned WhatsApp is now about to start call keeping, you either have to disconnect the call or chat again, if your mobile receives a new call warning.
"When you're on another line, you can also add call waiting support to accept an incoming WhatsApp message," reads WhatsApp's latest update for Android version.

There is a call waiting in v2.19.352 of the WhatsApp stable (APK Mirror) and above the WhatsApp, and the Android Police reportsv2.19.128 (APK Mirror). The feature for iPhone users was recently launched for WhatsApp.
Best VPN Service

Most mobile operators tell you if you already speak on your telephone, and another person attempts to call you, that you've got a call waiting. Very few services supported by Voice over Internet Protocol, however, and WhatsApp has not yet been one of them.

In its latest update, WhatsApp recently added several new features. Privacy settings allow you to check what fingerprint you can add to WhatsApp groups while you can also enforce the WhatsApp unlocking requirement. It prevents unwanted access to your personal data.

Last update of the WhatsApp beta, three new options for dark mode introduced in the Instant Messaging feature. A white background would be the light subject. The Dark Theme is a fan website that follows WhatsApp updates in the dark mode of WhatsApp, according to WABetaInfo.

How To Increase Internet Speed by 20% Without Any Software


Best VPN Service

If you have a slow connection speed or your internet connection does not work properly, you will be irritated by the internet speed and your work will not be done properly at the time.

So, I'm trying to give this article the few steps to overcome this problem and increase your internet speed to 20 percent without using any software on your computer.

Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc.
By Unreserving this bandwidth, you can make your internet connection faster.


Increase Internet Speed Without Any Software

By 20%. The steps to be followed are:

1. Click Start then [Win+R] Run and type "gpedit.msc" without quotes.



2. Then go to Local Computer Policy>Computer Configuration>Administrative Templetes>Network>QoS Packet Scheduler. Click on QoS Packet Scheduler.
In the right side , find Limit Reservable Bandwidth and double click on Limit Reservable Bandwidth.



3. It will say it is not configured but the truth is under the ‘Explain’ tab. Select ‘Enable’ and set Reservable bandwidth to zero.


4. Click on ‘Apply’ and your internet speed will boost up by 20%.

5. Restart your computer again and check your internet speed, now your internet speed will boost up by 20%.

Windows 10 Can Still Be Upgraded for Free, Here's How



After the first release of Windows 10, Microsoft allowed Windows 7 or Windows 8.1 users to upgrade to Windows 10 free of charge. Microsoft officially ended the free upgrade offer in December 2017, but there is still a method that allows you to upgrade to Windows 10 for free.

Microsoft is no longer talking about the free upgrade offer of Windows 10, but devices with Windows 7 or Windows 8.1 licenses could be upgraded to Windows 10 free of charge using the Windows 10 Media Creation Tool.

Best VPN Service

To order to receive Windows 10, the Media Creation software must be installed and running Windows 7/8/8.1 and Windows 10 upgradeed. After update, you will be upgraded to a Windows 10 license with your older Windows license.

How to Upgrade to Windows 10 for Free


1. Visit the Windows 10 download page from here.

2. Click the 'Download Tool now' button to download the Windows 10 Media Creation Tool



3. Open the Media Creation Tool and accept the license terms.


4. Select the 'Upgrade this PC now' option and click Next




5. If you want to keep it or start from scratch, the app will prompt you. Select and continue to Keep all applications and files.



6. Once you press the Install button, it will continue to install Windows 10. This method will take a long time, and numerous times the machine must restart.



7.  After Windows 10 is finished installing, connect to the internet and open Settings > Windows Update > Activation and the PC will be activated with a digital license. You can also enter your Windows 7 or Windows 8.x product key and activate Windows 10 if the device is not already activated.

Note the deal only works if you use a valid Windows 7 or Windows 8.1 license. You will receive a digital license valid for the hardware's life by following this guide.

Windows will connect to Microsoft's activation servers during the upgrade process, and your PC will acquire a Windows 10 digital license or entitlement.

On the activation page of Windows, you will see "Windows is enabled with a digital license" message (Settings > Update & Security > Activation).

The digital license is compatible with the computer and, unless the hardware is changed, you can use Media Creation Tool or ISO files to perform a clean installation of the same version of Windows 10 and enable it automatically.


Google Chrome's 'close other tabs' Option is Back In


Google just updated Google Chrome 78.0.3904.108 with the return of the feature ' Close other tabs ' that Google mistakenly took out in previous versions.

With the update of Chrome 78, Google removed the context menu options ' New tab, ' ' Close other tabs, ' ' Reopen closed window, ' and ' Bookmark all tabs, ' because they claimed that these functions could be done using other methods or were not used enough.
Old Chrome 78 right-click tab option


For people like me who have been using ' Close other tabs ' throughout the day, Google has suggested that users drag the tab they want to hold to the first tab and then right-click it and pick ' Close tabs to the right. '
'Close other tabs' is back


The good news is that in the latest version of Chrome 78 released today, ' Close other tabs ' is now back.

Microsoft Edge Beta Channel of Insider First Update Launch





Microsoft has updated the Beta build of Microsoft Edge—the first since the channel was opened for Insiders just a little over a month ago on Windows and macOS.

Microsoft has pushed a handful of new features in the new update to improve the overall experience and make the browser feel closer to complete, in addition to the typical security and performance improvements.

Howdy insiders, our first Beta channel update 78.0.276.8 was released today!

For those who are already on the Beta channel, perhaps the most noteworthy change that most will notice is the new favorites button. Users will be able to access their favorite web-pages much more easily from the cascading menu that expands after a click or tap.

Additionally, Microsoft has finally enabled auto-fill synchronization of passwords and form data between Windows devices as well as Macs. The company says it’s working on bringing this to its apps for Android and iOS in the future.

And for those privacy enthusiasts, Microsoft has also enabled tracking prevention by default. This means only the websites you visit directly will gain access to your online data by default, instead of third parties from within those sites.

If you're interested in giving those new features a shot, you can download the latest update of the Beta channel straight from the Microsoft Edge Insider

Game of Thrones Fans Attacked by Malware at the End of the Season

A highest cyber security company has witnessed a significant increase in malware attacks against users trying to download Game of Thrones's final season.

Kaspersky Lab found in a report that many users who were trying to download seasonal episodes were infected with malware or malicious software.

Each episode of Season 8 of HBO's Game of Thrines, as this is the end of the fantasy medieval epic after almost a decade, was anticipated by fans in many parts of the world, including the Philippines.

Researchers from the Kaspersky Lab detected approximately 3,000 assault attempts a day and these vary according to episode.

" A long line of attacks targeting users who tried to download the newly released episode was accompanying the premiere of each episode. The fans received malware disguised behind the show name rather than getting the latest episode, "the report said."

In the third episode called "The Long Night" almost 1,500 users attacked and triggered the greatest number of detected attempts.
After the final episode "The Iron Throne" was released, the lowest number of attacks ranged from 500 to 1,000 with fewer than 500 victims.

"The average daily number of assaults by malware disguised as Game of Thrones attacks by Kaspersky laboratory researchers was around 300-400. For the three to four days after each new episode: a three to four-fold increase in malicious activities, this number has jumped up to around 1,200, "said Kaspersky researchers."


These scamming events also occurred during the Avengers: Endgame premiere.

Streaming free websites were also referred to as ' another vector to attack, ' as they were ' designed to extract sensitive data from users. '

The researchers explained the similarities between the current and recent Avengers films.

"We see common TTPs across phishing websites, where scammers try to rob the details of their users by promising a pirated film before the official debut. We believe that some threat actors are the methodological category for fans of popular films and TV productions, which dynamically adjust the programs according to pop-cultural events, "said Tatyana Sidorina, a Kaspersky Lab security researcher."


How to keep your computer safe from hackers and Malware:

If you follow these simple tips, it is easy to keep your computer malware free.
Up to date your System: We encourage our clients to allow automatic updates on their Windows computers in addition to running updates for programs like Adobe and Java. Many of these updates include security patches that fill the security holes in the Windows system. They always seem to come up at the wrong time. Simply update it when you're about to leave the System.


Back up your System: Regular and regular backup helps you to keep your data-secure in case a virus or infection infects the system. It always backups important files on a cloud drive or external hard drive regularly. There are three fundamental backup features: external hard disk, online backup or cloud storage. Use a service such as Google Drive to continuously back up your files to the cloud. Free for up to 5 GB of data The price is correct.

Use a pop-up blocker: Cyber criminals or developers with the core intent of spreading malicious programs use pop Ups and ads on websites as the most popular tactics. So, avoid clicking on unspecified websites, software offers, pop - ups, etc and install a powerful Chrome, Mozilla and IE ad blocker.


Installation of third parties: Try to avoid downloading freeware sites as they usually install software packages that have an installer.

Install an anti - virus/anti-Malware software: The use of advanced antivirus software that monitors your system will protect you from common malware and other risks of security. We recommend that you install an antivirus like Malwarebytes or a good Malware Removal Tool like Mcafee.

This Simple Tips Protect Your System life Time.


Chromium based Microsoft Edge Beta Leaked:Here’s How To Download

Earlier this week, Microsoft announced a series of new features in its Build 2019 Build 2019 Chromium-powered Edge browser. Edge was demoted for mac-OS at the event, followed by popular leakster Walking Cat.

Edge Beta is now also leaked for Windows 10. We shared the download links with Twitter User ADeltaX before Microsoft officially announced and were able to try it out on one of our PCs.

When you visit the official website, you will find that Microsoft is testing Edge Insiders on the new browser. From one of the three different channels, Windows 10 users can choose: Edge Canary, Edge dev and Edge Beta.

The Edge beta, and it's a bit like Slow Ring in the program Windows Insider. So, every six weeks, users installing the beta get an update. Even if this is a long interval, the beta channel has the advantage of providing insiders with the most stable edge construction version.


How To Download Chromium-based Edge Beta Leaked For Windows 10?

The leaked Edge beta is now available for all users running Windows 10. Click on these links to install it on your PC:

Now you can update Chrome to Android without going to the Google Play Store

Google adds a new feature to Chrome for Android that allows users to upgrade directly from the browser instead of first going to Google Play.

When an update for Google Chrome is available, an upgrade button will be displayed to users as shown below.
Update available
The Chrome for Android Nightly build as first spotted by Techdows.com has added a chrome:/flags flag called "Enable Google Play Inline update flow" that causes the upgrade flow to occur directly in the browser when enabled.
Enable Google Play Inline update flow Flag

When this flag is enabled and you tap the Chrome Update button, the browser will display a prompt showing the download size and asking if you want the update to be done.
Prompt to install update
If you click the Update button, the background update will be downloaded by the browser. Once downloaded, the Chrome menu will show that the update is nearly complete and prompt you to restart the browser.
Clicking on the restart button will close the browser and install the update through Google Play.
Once the installation is complete, the browser will start the new updated version automatically.


How to keep your computer safe from hackers and Malware:

If you follow these simple tips, it is easy to keep your computer malware free.

Up to date your System: We encourage our clients to allow automatic updates on their Windows computers in addition to running updates for programs like Adobe and Java. Many of these updates include security patches that fill the security holes in the Windows system. They always seem to come up at the wrong time. Simply update it when you're about to leave the System.


Back up your System: Regular and regular backup helps you to keep your data-secure in case a virus or infection infects the system. It always backups important files on a cloud drive or external hard drive regularly. There are three fundamental backup features: external hard disk, online backup or cloud storage. Use a service such as Google Drive to continuously back up your files to the cloud. Free for up to 5 GB of data The price is correct.

Use a pop-up blocker: Cyber criminals or developers with the core intent of spreading malicious programs use pop Ups and ads on websites as the most popular tactics. So, avoid clicking on unspecified websites, software offers, pop - ups, etc and install a powerful Chrome, Mozilla and IE ad blocker.


Installation of third parties: Try to avoid downloading freeware sites as they usually install software packages that have an installer.

Install an anti - virus/anti-Malware software: The use of advanced antivirus software that monitors your system will protect you from common malware and other risks of security. We recommend that you install an antivirus like Malwarebytes or a good Malware Removal Tool like Mcafee.

This Simple Tips Protect Your System life Time.

Firefox 66.0.4 Released with Disabled Ad-dons Fix

Update: Mozilla released version 66.0.4, including fix for expired certificate and disabled addons. You can use or download Firefox's automatic update feature here. To reflect this, this article has been updated.

Mozilla Firefox 66.0.4 was released on the Stable channel and contains a fix for the expired intermediate signing certificate that disabled all ad-dons on Friday.

On Friday, Mozilla allowed the expiry of an intermediate certificate used to sign addons from Firefox. Since Firefox requires addons to be signed by a valid certificate, users suddenly disabled all of their Firefox ad-dons once the certificate expired.

As a temporary fix, Mozilla issued a new intermediate signing certificate through its Normandy Study system. Once the hotfix has been installed, addons will be enabled again automatically.

You need to enable the Study system to use this system. However, doing so provides Mozilla with telemetry about how you use Firefox and some consider this a risk to privacy.
Even with the studies enabled, some users, including myself, report that they do not receive the hotfix.

Version 66.0.4 fixes expired certificate without studies

Mozilla has released Firefox 66.0.4 now, which includes a new intermediate signing certificate that has not expired and will force re-verification of the signature.


Three release candidates of Firefox 66.0.4 have been created over the past 2 days to fix this bug, with the first one being pulled as it did not properly resolve the ad-don problems. The third release candidate was the last candidate built before Mozilla released it to the public.
Firefox 66.0.4 Release
Mozilla's release notes for 66.0.4 have been updated to include the following fix as part of the change list.

Repaired certificate chain to re-enable web extensions that had been disabled
Firefox 66.0.4 Release Notes
Users should expect to see auto-update pushing Mozilla Firefox 66.0.4 as we speak.



Google Adds a new ' auto-delete ' option for your location history and activity data


Google gives you more control over how long you want your location history and web activity data to be retained by the tech company.

Google has introduced a new, easier, privacy-focused auto-delete feature for your Google Account that will enable you to delete your Location History and Web and App Activity data automatically after a set period.

If enabled, Google Located History allows the company to track the locations you have visited while you are visiting websites and apps using the Web and App activity.

Google has until now allowed you to either disable or manually delete all or some of these data, completely disabled Location history and Web and App Activity features. This allows users to efficiently manage their data without regular deletion controls.

But last year's AP survey showed Google services in Android and iPhone devices keep track of your movement, even if you turn off the Location History feature on all your accounts.

 Just last month, it was also revealed that Google maintains a detailed database of locations on hundreds of millions of Sensorvault telephones around the world that law enforcement agencies are reportedly using to resolve crime cases.

Google introduced its new auto-delete feature after user feedback and concerns about their data. Now users can choose how long they want their location and Web Activity data saved on the servers of the company by providing three options to choose from:
  • Keep until I delete manually
  • Keep for 18 months then delete automatically
  • Keep for 3 months then delete automatically



Here's How You Can Enable Auto-Delete Option

While the option is still not available, Google-shared GIF describes how to enable the auto-delete function step-by- step:
  • Visit Google homepage and tap on your profile picture in the upper-right corner
  • Click on the Google Account button.
  • Select the Data & Personalization tab and click Web & App activity
  • Select "Choose to delete automatically."
  • Choose between "Keep until I delete manually," "Keep for 18 months," and "Keep for 3 months" options
  • Click Next and confirm your choice

With these adjustments enabled, the search engine giant regularly clears out any part of the location history and Google holds web information every 3 months or every 18 months, depending on your preferences.

If you don't want a company to track its location or the web and application history, simply turn off the settings for "Location History" and "Web and App activity." Google states that "in the coming weeks" an auto deletion feature will be launched to allow users to manually delete cookies products and the history of their accounts, "called Clear History.

 Facebook last year announced a similar privacy feature called Clear History. The feature was delayed and is scheduled to start this autumn. 

Avengers Endgame Leaked Online By Tamilrockers.


The most anticipated film of the year, Avengers Endgame, was leaked online by the notorious Tamilrockers pirate site.
A portion of the Avengers Endgame was leaked online only a few days ago.

It prompted millions of Marvel fans to campaign against the spoilers by urging everybody not to spread the viral clip.


Avengers Endgame Leaked


Tamilrockers are infamous for releasing the pirated version of newly launched movies on torrent websites. It has caused the publishers a massive amount of damage.

 The instances of piracy are always sky high, especially in India. Recently, in India, the Game of Thrones Season 8 episode 1 has been pirated 9 million times. It has been speculated that Indians are resorting to piracy because of fewer options available to stream. 


The Endgame Hype


Avengers Endgame is scheduled to be released on April 26, 2019. The movie is said to score the biggest opening box office ever. Even before its release, Avengers Endgame managed to make $120 million just through pre-booking. Theaters are already planning to host 24-hour screenings in several metropolitan cities just for the Avengers Endgame.

Many enthusiastic fans have also been unable to secure their film tickets that could help Tamil Rockers to gain additional traffic. If the leaked images become viral, the overall revenue from the film could be down.

When the film leaked online, film director Russo brothers were forced to make an application not to spread the clip to the public. They took a letter to Twitter to tell hackers not to ruin the cinema experience.

If you want to remain free of any spoilers until the official film comes out, please check our article to block films on the web.

Chrome 74 released with 39 security and new functionality



Google released Chrome 74 on the Stable desktop channel to download now for everyone. This version remedies many security vulnerabilities and adds additional features such as reduced movement preferences and feature policy updates.

Users in Windows, Mac, and the Linux desktop may upgrade to Chrome by using Settings > Help > About Google, and the browser will check for the new update automatically and install it, if and when available. This upgrade is done.

Google Chrome 74
Now that Chrome 74 is being promoted to the Stable channel, Chrome 75 is Beta, and Chrome 76 is Canary.

In that release, many expected to finally link the Chrome Dark Mode to Windows 10 Settings in Color. This feature is still not in place in my tests, unfortunately.

The Chrome 74 Change Log lists all changes in this version, and additional details on developmental functions can be found on the Google Chrome Developers platform.


High security problems have been resolved

The update to Chrome 74 also included 39 safety fixes, none of them Critical, but five of them High Seriousness.

Other security solutions to Chrome 74 were detected using the use of tools like AddressSanitizer, MemorySanitizer, Undefined BehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL.

Windows 10 Sets tabbed window feature is discontinued from Microsoft


A tweet from a senior project manager of Microsoft came to an end when the much anticipated Windows 10 tabbed window, Sets, was called.

 Sets allow Windows 10 users to arrange apps, documents and tasks in a single tabbed window. This would make it simpler for them to work with all the information required in an organized set for a particular task.

When this function was announced by Microsoft, the users were excited to bring the highly-requested File Explorer tabbed and Windows tab board console.

Tabbed File Explorer
While Sets ' development continued in Windows 10 Insider builds for some time, Microsoft finally announced that it would pull the public development of insider builds and not release them with the Windows update on 10 October 2018 (Redstone 5).

However, the announcement indicated that Windows 10 Sets were simply internally developed and would build them in a future program for Windows Insider.

"If you have been testing Sets, you will no longer see it as of today’s build, however, Sets will return in a future WIP flight. Thanks again for your feedback."
It was discovered that Sets have been shelved in a tweet sent to Microsoft Senior Project Manager Rich Turner.


Turner said, however, that the add-on to the Windows shell is high in his to - do list, so we hope to see it come back in another form or feature.

MORE INFO:How-To Geek










Windows 10 Start Menu Getting Build 1903 Own Process


Next month the Windows 10 May 2019 update, also known as "Build 1903," will be released by Microsoft and will now run under its very own "Start" process.

 It is done to improve the performance of hangs in the Start menu and to facilitate recovery.

The Start menu has been integrated into the Windows Shell in previous Windows versions and did not have its own specific process.

This leads to problems with performance and the Start Menu when other Windows areas are hanging and freezing.

Windows 10 now has a dedicated procedure dedicated to the Start menu for solving these problems.

Microsoft states that the overall Windows 10 experience increases not only when launching applications or other integrated features.

The Start Menu process

The Start Menu now shows up as a Start in the Windows Task Manager in Windows 10 Build 1903. When this process is finished, the Start menu will not work until the process is restarted.

Start Process in Task Manager
The process has been linked to a StartMenuExperienceHost.exe application called Windows, located in the following folder: C:\Windows\SystemApps\Microsoft. Windows. StartMenuExperienceHost. The ms-appx:/Microsoft. Windows. StartMenuExperienceHost/ URI (Uniform Resource Identifier) was assigned.

StartMenuExperienceHost Folder


If the Start Menu hangs or no longer opens, you can now end the Start process of Task Manager by restarting a StartMenuExperienceHost.exe app on the Microsoft. Windows. Windows. StartMenuExperienceHost folder of C:\Windows\SystemApps.

These new experiences help solve problems in the start menu without affecting the rest of the Windows shell or operation of the operating system.


More pre-installed apps can be removed

Besides creating a dedicated Start menu application, Microsoft has stated that the number of preinstalled apps can be deleted has increased.


"This all began with a popular request from Insiders: expand the ability to remove pre-installed apps from Start. In 19H1, we more than doubled the number of pre-installed apps that can be removed."


Most users want full control over the operating system and can delete any applications that are pre - installed.

More Related Article:


ARM64 Beta Now available in Mozilla Firefox

Facebook Stored Millions of Passwords for Instagram users in plaintext

Facebook disclosed at the end of last month that Facebook had erroneously stored passwords for "hundreds of millions" of Facebook users with plaintext text, including the "ten thousands" passwords of its Instagram users.



Now it appears that the incident is far worse than first reported.

Facebook today updated its March press release quarterly and added that there were hundreds of thousands but millions of the actual number of affected Instagram users. 

These plaintext passwords were accessible to millions of Instagram users, together with millions of Facebook users, for some of the company's Facebook engineers who did not abuse it, according to them. 

According to an updated post, the company found out that "Instagram password extra logs," which have been stored in a readable format, are "misused or improperly accessed" by one of the staff, were "revealed" in its investigation. 

Here is the company's updated statement:

"Since this post was published, we discovered additional logs of Instagram passwords being stored in a readable format. We now estimate that this issue impacted millions of Instagram users. We will be notifying these users as we did the others. Our investigation has determined that these stored passwords were not internally abused or improperly accessed."

The latest disclosure occurs less than a day after it has revealed that Facebook has, without their consent or knowledge since May 2016, stored up to 1.5 million contact information on its websites.

To help you safely, you are advised that your passwords are changed immediately on Facebook and Instagram, even if you do not receive any Instagram or Facebook email.

 Make sure that the services are authenticated by two factor.

How to keep your computer safe from hackers and Malware:


If you follow these simple tips, it is easy to keep your computer malware free.

Up to date your System: We encourage our clients to allow automatic updates on their Windows computers in addition to running updates for programs like Adobe and Java. Many of these updates include security patches that fill the security holes in the Windows system. They always seem to come up at the wrong time. Simply update it when you're about to leave the System.

Back up your System: Regular and regular backup helps you to keep your data-secure in case a virus or infection infects the system. It always backups important files on a cloud drive or external hard drive regularly. There are three fundamental backup features: external hard disk, online backup or cloud storage. Use a service such as Google Drive to continuously back up your files to the cloud. Free for up to 5 GB of data The price is correct.

Use a pop-up blocker: Cyber criminals or developers with the core intent of spreading malicious programs use pop Ups and ads on websites as the most popular tactics. So, avoid clicking on unspecified websites, software offers, pop - ups, etc and install a powerful Chrome, Mozilla and IE ad blocker.

Installation of third parties: Try to avoid downloading freeware sites as they usually install software packages that have an installer.

Install an anti - virus/anti-Malware software: The use of advanced antivirus software that monitors your system will protect you from common malware and other risks of security. We recommend that you install an antivirus like Malwarebytes or a good Malware Removal Tool like Mcafee.

This Simple Tips Protect Your System life Time.








Windows 10-The best features of the May 2019 Update REVEALED

WINDOWS 10 will be scheduled for its first major overhaul in 2019 to present a host of new features that will excite Microsoft fans. The best additions you will find in the Windows update for 10 May 2019 are listed here. Express.co.uk.

Windows 10 is the computer system used by computers all over the world by Microsoft. Typically, the software gets two updates a year –in April and October, these arrived in 2018.

This year, Windows 10 will be the first major new version known as Update May 2019, and will be published next month for each user.
 Microsoft released recently the last update of the release preview cycle for Windows 10 May 2019 before the initial release.

 A number of features are provided with the new giant American technology software to enhance Windows 10.

Having said that, here is a list of the best new additions from Express.co.uk.

Windows Sandbox

Windows Sandbox is a new piece of Windows 10 software that runs an remote desktop environment to test "untrusted" programs.
 In principle, if an open application contain harmful materials, the idea behind Sandbox is that it will not adversely affect the device of the user. 
Microsoft discussed this addition: "Windows Sandbox is a new lightweight desktop environment that's designed for safe running isolated applications.
"How many times did you download an executable file, but were afraid to run it? Have you ever been in a situation requiring clean Windows installation, but didn't want to set up a virtual machine?

"These are the situations we have regularly experienced at Microsoft and we have developed Windows Sandbox: an isolated desktop environment in which you can run unreliable software without fear of permanent impact on your device.

"Any software installed in Windows Sandbox only remains in the sandbox and cannot affect your host. Once Windows Sandbox is closed, all software with all its files and state is permanently deleted."
Windows Sandbox is one of the biggest new additions to Windows 10



New Start menu


According to Microsoft, the Windows 10 May 2019 update will introduce a "simplified default start layout for new devices.
" The American tech giant insisted that the signature menu will have a "one column design" that should be more accessible to fans in general. 
Discussing the functionality, Microsoft said: "Based on your feedback, we are introducing a simplified default start layout for new devices, new user accounts, and clean installations.
" The new layout has been simplified into a sleek one-column design with reduced top-level tiles. 

"With previous changes that provide you with the opportunity to uninstall further Inbox apps and a new way of easily unpinning a folder or group of tiles, the simplified Start layout is part of a continuous effort that improves your Start experience for the upcoming Window release."
The new Start menu will have a 'one column design'



Search and Cortana have been separated


Search, Cortana, the new version of Windows 10, now allows users a more defined way of access. 

Previously, the functionality of the virtual assistant was integrated into the search bar in Microsoft software's base panel.
 But now a button has been placed for Cortana next to the box, which Microsoft said would allow both "innovative independently." 
"We will be disconnecting Search and Cortana into the Task Bar," the tech company continued. 

Search and Cortana are separated in the May 2019 Update


Windows 10 reserved storage


It is worth noting that the May 2019 update will reserve approximately 7 GB or more of storage so that "critical OS functions always have disk space access" according to Microsoft. It is worth noting Microsoft.
The reserved space can't be removed from Windows 10 by users.Talking about the reasoning behind the change, Microsoft commented:' We're starting with the next major update to change the way Windows 10 manages disk space. 
Some disk space will be reserved for use with updates, apps, provisional files and system caches through storage process.
"Our goal is that your PC's day-to-day functioning can always be improved by ensuring critical OS functions have access to disc space.
If a user almost fills in the disk space without reserved storage, multiple Windows scenarios and application scenarios will not be reliable.
 Updates, apps, temporary files and caches with reserved storage are less likely to remove valuable free space and should continue to work as expected.
windows 10 reserved storage



Removing buggy updates

The Windows 10 May 2019 update is able to remove buggy updates so that a PC can not boot in the correct form. 
Essentially, if the software can not run normally, it will check whether any recent updates are accountable.
 If so, the software will uninstall and prevent the updates from being added for 30 days. Windows 10 will also show a message saying "We have removed some newly installed updates to recover your device from startup failure"
Discussing the helpful addition Microsoft said: "Occasionally, startup failures may be due to hardware issues, file corruption, or incompatible third-party software.

Removing buggy updates win10

 'Windows will try to diagnose and correct malfunctioning caused by disk problems, corruption of the file system, invalid registry key, or other such causes if it detects your machine cannot successfully start up.



The U.S. government publishes details of North Korea's HOPLIGHT malware

DHS and FBI publish their sixteenth report on North Korean malware.


Today, the U.S. government has issued a security alert about a new strain of malware used by North Korean hackers called HOPLIGHT by the U.S. government.

The report, written by malware analysts from HIDDEN COBRA, the U.S. government's main governmental - supported hacking group for North Korea, is also referred to in News articles and cyber security reports as the Lazarus Group, and the Federal Investigative Bureau (FBI).
Trojan.Hoplight


SECURITY ALERT WARNS OF DANGEROUS BACKDOOR TROJAN

HOPLIGHT appears to be a very powerful backdoor Trojan according to the DHS-FBI alert. The malware collects data from the target device on infected systems and sends the data to a remote server. It can also receive orders from its C&C server and perform different operations on infected hosts.

According to DHS-FBI report, HOPLIGHT can:

  • Read, write, and move files
  • Enumerate system drives
  • Create and terminate processes
  • Inject code into running processes
  • Create, start, and stop services
  • Modify registry settings
  • Connect to a remote host
  • Upload and download files
The malware also uses an integrated proxy to mask its remote control and command server (C&C) communication. "Proxies can make false TLS handshake sessions with valid public SSL certificates and masking network connections with malicious remote actors," DHS and FBI analysts said.

Malware Analysis Report (AR19-100A)

Example Of Trojan.Hoplight include:


File Information
Size
240K
SHA-1
05ad5f346d0282e43360965373eb2a8d39735137
MD5
3021b9ef74c7bddf59656a035f94fd08
CRC-32
7fe2df72
File type
application/x-ms-dos-executable
First seen
2019-04-14