What is my IP
What is my IP

Search results: _los

Results (30)
Approximately 30 results of _los

“Brokewell' the new Trojan disguised as a Chrome update that steals banking data
“Brokewell" the new Trojan disguised as a Chrome update that steals banking data
07/05/2024

Cybersecurity researchers have identified a new Trojan that poses a serious threat to Android device users, especially those who bank on their phones. The malware, known as "Brokewell", masquerades as a Google Chrome update, allowing cybercriminals to gain remote access to sensitive information. Overlay attacks The discovery was made by security firm ThreatFabric, which has been following the development of this mobile Trojan. According to their report, Brokewell uses overlay attacks to trick users. The technique involves creating a fake screen that is placed on top of a legitimate application, allowing attackers to capture users' access credentials without them realizing it. Additionally, malware can steal session cookies and send them to a command and control (C2) server, giving attackers greater control over the infected device.Once Brokewell manages to infiltrate a device, it can carry out a series of malicious actions, such as screen casting to capture keystrokes and data displayed in open applications. It can also spy on the device, collecting information such as call history, geolocation, and audio recordings. A trojan in constant evolution The threat is especially worrying because the Trojan is constantly evolving. According to ThreatFabric, the Brokewell Cyber ​​Labs repository adds commands and functionality almost daily. The source code includes tools to bypass Android 13+ restrictions, allowing attackers to bypass the operating system's security measures and ultimately compromise the security of users.One clue to Brokewell's developer is the signature "Baron Samedit," which appears in the malware's source code and other places related to its promotion. This person or group is believed to have been active for at least two years, and is known to provide tools to check stolen accounts. Its presence in clandestine channels suggests that the Trojan could gain popularity among other cybercriminals, increasing its reach and the risk of attacks on clients of financial institutions. Malware with risk for the banking sector Cybersecurity experts warn that Brokewell poses a significant risk to the banking sector and that it is essential that Android users stay alert for suspicious updates and have appropriate security measures in place to prevent fraud and the loss of sensitive information.

[ ... ]

Ip Location, the tool to know my ip location
Ip Location, the tool to know my ip location

If you need to check what location your internet provider is sharing with the websites you visit, with our IP locator you can instantly geolocate your IP address or any other that you enter manually. To geographically locate the IP address, you only need to be connected to the internet. If you use VPN software or connect through a proxy to locate IP address you can also use our tool. None of the data generated by the IP locator is stored in our system. @Mapa@ How can I hide my IP address so that it cannot be traced? To anonymously browse the Internet and avoid being located through the IP of your connection, there are two basic ways to do it. The first is to hide IP so that no one will be able to track our presence on the network or access our browsing data and the second is to change IP and browse through another IP address whenever we need to. Why do I need to locate my IP geographically? Locating your IP geographically is the best way to find out what data our ISP shares about the location of our connection. Depending on this location. a website whose URL is ".com" will change to "/es" if we connect from Spain, for example, and some tasks related to the sending of forms will be simplified, as they will be automatically pre-filled with some data such as your country or city, depending on your geolocation IP. As users with a geolocation IP tool such as the one we offer in Cuál es mi IP, we can manually enter an IP address and find out, for example, from where we have received a fraudulent email, if we have had access before, of course, to the IP address involved Can anyone find out my home address with an IP geolocation tool? By using a tool to locate an IP address, you can trace the IP and geolocate it through coordinates on the map, but the specific postal address is never provided. This is because our IP address is not ours, but rather our Internet Service Provider's (ISP's). So what data can they find out about me with IP geolocation? When locating the IP geographically. the only information about us that is provided is the country and city from which we are connecting, since the GPS coordinates of altitude and latitude that are shown correspond, in reality, to those of the headquarters of the company that is offering us the Internet connection service. The reason behind this is that all data related to the actual geographic address of the device used to access the Internet, i.e. our router, is not public and belongs to our ISP, which can only disclose it by court order. Why are companies interested in locating my IP address geographically? Information is power and for a company to know from where its potential customers connect is an important advantage to design marketing strategies aimed at the customer profile of a particular geographical area or country. In addition, in terms of anti-fraud, e-commerce companies can improve card payment security by identifying payment attempts from suspicious IP addresses. What is an IP address? An IP address is a special numerical combination assigned to an internet-connected device to be identified on the network. All intelligent devices need an IP address to access the Internet and interact on the network. Each device connected to the Internet has its own an individual IP address. When we access the Internet, the servers recognize our device through its IP address, allowing the two-way communication with the recipient. As we are identified with our IP address, the rest of devices can order a return response, without mistake the sender. Making a simile, an IP address would be the address that we use to write on the back of an envelope. This information identifies us as issuers and also as recipients of the return answer. To make possible this data exchange, the IP protocol was established as a set of universal rules for all the Internet operations. That means that all devices connected to Internet or to a home network, "speak" the same language and they are able to communicate each with the others. There are two types of IP address, the external IP and the local IP: • The external IP or public IP is the numerical combination address assigned to us by our Internet service provider (ISP). This public IP identifies us as Internet users when we are connected. If you want to find the IP of your computer, your tablet or your Smartphone, you can find out this immediately by accessing the home page of “What is my IP” or using our speed test service that, in addition to this information, will inform you about the quality of your Internet connection. • The local IP address or internal IP is the one the router assign to all the devices connected to him and identifies each of these devices, individually, in the home network.  How to locate an IP address?  If you want to know how to find out where an IP address is from, you should know that it is not always easy to find out the IP origin of a connection, because there are different systems to hide the IP. Some users use these systems for security reasons or to simulate, for example, their IP location in another place and thus have access to Internet services not enabled in the place where they are located. Now, if the user does not use any resource to mask the IP, find out the IP of the computer or any other device connected, for example, to our website, it is as simple as use IP geolocation services such the one offered in “What is my IP?” and you will immediately find out the IP origin of any computer that you are interested in track. Knowing the IP location of our clients is an advantage when we are designing, for example, our marketing strategies and a good tool, also, to improve network security, as it allows us to locate suspicious IP addresses. In addition, with the IP geolocation service you can also verify the location that your Internet provider shares about you. It should be clarified that this location provided by IP geolocation services is never the specific address of our home or where we are located. The data actually are from the operator node in our area that is offering us the connection service to the internet network Therefore, the geolocation information will be the country and city from where the connection is made, but not the address where the user is located, because this specific tracking of the user address is protected by law and this data can only be provided by court order.

[ ... ]

Genius
Genius
Genius

Genius is a reputable manufacturer of computer-related electronic products and accessories. Genius is a Taiwanese company founded in 1983 that has become one of the leading international peripheral brands by bringing people closer to the digital world. Genius designs mice, keyboards, stylus, headsets, speakers, webcams and gaming devices that provide a great user experience. Its peripherals have the best price-performance ratio on the market and are designed for both home and professional use.

[ ... ]

HomePlug Networks
HomePlug Networks

With these HomePlug networking devices, you will find it very easy to bring the optical fiber and Wi-Fi signal to any place in the house. Using the electrical network of your home, you will be able to expand the area of action of your router and create additional access points without losing the signal or the quality of the bandwidth you have subscribed to.

[ ... ]

Cables
Cables

To connect our computers to the network, link them to each other or link them to other peripherals, it is essential to have the right cable for each type of connection. The difference between using a correct cable or resorting to any of the many that we store in the "cable drawer", can range from a lower performance of the Internet connection to failures in screen resolutions, sound deficiencies, failures in data storage ... or even the loss of information or inoperability of the equipment. Find here the cable you need, with all its specifications and precise details to make your choice the right one.

[ ... ]

Europe forces Apple to open iPadOS to third-party applications and allow the uninstallation of pre-installed apps
Europe forces Apple to open iPadOS to third-party applications and allow the uninstallation of pre-installed apps
03/05/2024

Apple will have to allow the installation of applications on its iPad tablets from sources other than the App Store, in addition to enabling the uninstallation of its own applications that come pre-installed.This obligation comes after the European Commission, within the framework of the Digital Markets Law, has identified the operating system of iPad tablets, iPadOS, as a "gatekeeper" or "gatekeepers". This means that they consider it an important entry channel for professional users to reach final consumers, thus justifying the requirement for its universality.As a result, Apple has a period of six months to comply with the rules imposed by European regulations and which aims to promote fair competition in the digital market.These new measures imposed by the European Commission on Apple follow the precedent of previous decisions that affected the iOS operating system for iPhone, the Safari browser and the App Store itself and mean allowing users to delete applications that come pre-installed on their iPad devices. and offer support for downloading and installing applications from sources external to the App Store.This change in operations for Apple, reported by Bloomberg in recent information, will imply a major adjustment for the company, which has traditionally maintained a closed ecosystem on its devices, allowing only approved applications and services through its official store. However, with this new regulation, iPad users are expected to have greater freedom and flexibility to customize their devices according to their needs and preferences.

[ ... ]

Skechers
Skechers
Skechers

The Skechers brand, was created in 1992 in California, and is probably best known by the name under which it was created, L.A. Gear. It was dedicated to sports and casual equipment, as well as backpacks and other practical accessories aimed at the world of sports. Despite its transformation, Skechers is still very popular today, because in its company philosophy it tries to combine the mission of making the American Way of Life accessible to the world of footwear and other sports accessories, and to rely on effective advertising with well-known people, especially in the American market. Headquartered in Manhattan Beach, it is currently the third largest athletic and casual footwear brand in the United States.

[ ... ]

IP Cameras
IP Cameras

IP cameras, IP Cam, or network cameras use the Internet to create a closed circuit and transmit real-time images and videos of what is happening. This type of IIP surveillance camera also has internal recording systems that allow you to replay afterward and remotely, everything that has happened within its field of view.

[ ... ]

Privacy Policy
Privacy Policy

Esta política de privacidad aplica a todos los contenidos de este sitio web y que sean publicados por Dommia Design Studio. Si usted tiene alguna consulta sobre cómo usamos su información personal, por favor contacte con nuestro responsable de privacidad en [email protected]. Según lo establecido en el RGPD (Reglamento (UE) 2016/679), les proporcionamos la Información Detallada de Protección de Datos que se expone a continuación: Responsable: Dommia Design StudioRazón Social: Dommia Design Studio SLC.I.F.: B-66440581Dirección: c/ Lepant, 326, Entlo, Desp 3 - 08025 - BarcelonaTeléfono: 936 241 455Correo Electrónico: [email protected] Inscrita en el Registro Mercantil de Barcelona Tomo: 44619, Folio: 176, Hoja: 461387, Inscripción: 1 Información que recopilamos y con qué objetivo Esta sección detalla la información que podemos recoger sobre usted. Explicamos por qué y cómo lo utilizamos en secciones posteriores. Información que obtenemos a través de cookies y herramientas similares Utilizamos cookies (y tecnologías similares) y herramientas de análisis en nuestros sitios para recopilar información sobre usted. Esta información se puede utilizar para mejorar el rendimiento del sitio y mejorar la experiencia de usuario. Proporcionamos información detallada sobre cookies y tecnologías similares dentro de nuestra Política de Privacidad; algunos ejemplos incluyen: Su ubicación: utilizamos cookies para mostrar información del lugar más relevante para su ubicación. Su uso: utilizamos cookies para entender como nuestros clientes utilizan nuestros sitios. El dispositivo: utilizamos cookies para entender el tipo de dispositivo que está utilizando para mostrarle la mejor versión del sitio. Si desea administrar sus cookies, siga las instrucciones de la sección "Cómo gestionar las cookies" dentro de nuestra Política de Privacidad. Información que obtenemos a través del formulario de contacto Datos de contacto: nombre y correo electrónico. Web Beacons Utilizamos web beacon en nuestras páginas web y nuestros correos electrónicos. Cuando enviamos correos electrónicos a los miembros del boletín de noticias, podemos hacer un seguimiento del comportamiento como quien abrió los correos electrónicos y quien hizo clic en los enlaces. Esto nos permite medir el rendimiento de nuestras campañas de correo electrónico y mejorar nuestras características para determinados segmentos de miembros. Fundamentos legales para el procesamiento Solo tratamos información personal cuando tenemos su consentimiento de usuario: es decir, cuando nos ha dado permiso explícito para procesar información personal para un fin determinado. Por ejemplo, si completa uno de nuestros formularios de comunicación, le solicitaremos su consentimiento si quisiéramos utilizar su información personal para cualquier otro propósito. Usted tiene el derecho de retirar este consentimiento en cualquier momento. Puede administrar sus preferencias contactando con nuestro Delegado de Protección de Datos en [email protected]. ¿Cómo utilizamos su información personal? Recopilamos información personal por una razón principal, para mejorar y mantener el rendimiento de nuestro sitio web y poder brindarle la mejor experiencia de usuario posible. Recopilamos información personal por dos motivos principales: Mejorar y mantener el rendimiento: para proporcionarle la mejor experiencia de usuario posible, debemos asegurarnos de que nuestros productos y servicios funcionan como deberían ser. Comunicar cambios y ofertas de productos: queremos que obtenga el máximo rendimiento de nuestros productos o servicios, incluyendo mostrar nuestros últimos contenidos y boletines informativos. Puede cambiar sus preferencias en cualquier momento contactando a nuestro oficial de privacidad a [email protected]. ¿Con quién compartimos su información personal? No divulgamos su información personal a ningún tercero a menos que lo exijan las leyes aplicables, órdenes judiciales u otros procesos legales válidos. ¿Cuánto tiempo conservamos su información personal? Un resumen de la duración de su información personal: Categoría de datosEjemploPeríodo RetenciónJustificación del Período Comercial Clientes Hasta 5 años después de la resolución de cualquier relación comercial Para informar de nuestros productos y servicios Comercial Formulario de contacto Hasta 5 años después de la resolución de cualquier relación comercial Para informar de las peticiones realizadas por el usuario Marketing Newsletter Hasta que exprese su negativa a que sea enviada Para informar de nuestros productos y servicios Los datos se almacenarán el tiempo estrictamente necesario exclusivamente para el desempeño de sus competencias legalmente establecidas. A veces es necesario que guardemos su información personal por períodos más largos, por ejemplo: Si existe un requisito legal para retenerlo; Si requerimos la información por razones legales o existe una necesidad legítima para que la retengamos; Para garantizar que no nos comuniquemos con usted si nos ha pedido que no lo hagamos. ¿Cómo mantenemos su información personal segura? Contamos con las medidas de seguridad técnicas y organizativas adecuadas para garantizar que la información de nuestros usuarios esté protegida contra el acceso, uso, alteración o pérdida no autorizados o accidentales. Sus derechos Según las leyes de protección de datos, tiene derechos en relación con sus datos personales que gestionamos. Estos derechos incluyen: El derecho de oposición al márquetin directo; El derecho de acceso a los datos personales que procesamos sobre usted; El derecho a solicitar la eliminación de sus datos personales; El derecho a solicitar la rectificación de sus datos personales. Puede ejercer estos derechos contactando a nuestro oficial de Privacidad en [email protected]. ¿Dónde se aplica esta política de privacidad? La información personal recopilada por el CLIENTE. Nuestro sitio web puede contener enlaces a sitios web de terceros que no están sujetos a esta política de privacidad. No somos responsables de su contenido, uso de información personal o prácticas de seguridad. Si tiene una consulta sobre el tratamiento de su información personal, comuníquese con nuestro oficial de Privacidad en [email protected]. Cambios en esta política de privacidad Esta política es efectiva desde el 24/05/2018. Cualquier cambio que hagamos a esta política de privacidad se publicará en esta página, explicitando la fecha del último cambio.

[ ... ]

49% of consumers are willing to favor brands that explain data usage in AI interactions
49% of consumers are willing to favor brands that explain data usage in AI interactions
17/04/2024

Artificial intelligence (AI) has become a fundamental tool for companies striving to provide personalized and efficient customer interactions. However, a new report reveals that the lack of transparency in data usage by brands is affecting consumer trust. According to Twilio's fifth 'State of Consumer Engagement Report', based on a global survey including over 4,750 B2C executives and 6,300 consumers across 18 countries, 49% of consumers would trust a brand more if it disclosed how it uses data from AI-driven interactions.   The report also highlights that, although 91% of brands claim to be transparent with their customers about AI usage, only 48% of consumers agree.  In this context, data protection emerges as a priority for consumers, with six out of ten indicating it's the best way for brands to earn their trust. This data security concern is shared by, the 40% businesses globally that considerate important to find a balance between security and customer experience as one of their most pressing challenges. AI-driven customer experience for brands AI-driven personalization is a key strategy to enhance customer relations. The report points out that companies adopting personalization experience a significant increase in consumer spending, averaging 54% more compared to those that don't. AI not only helps bridge the customer experience gap but also provides additional benefits, such as better data-driven decision-making and increased customer satisfaction. However, the report highlights that many companies face difficulties in activating customer data. Globally, only 16% of brands fully agree that they have the necessary data to understand their customers.

[ ... ]

Telegram incorporates chatbots into Telegram Business accounts
Telegram incorporates chatbots into Telegram Business accounts
03/04/2024

Telegram Business has announced the addition of chatbots among its features aimed at streamlining communication between companies and their clientele. The new automated assistants on this instant messaging application are designed to provide information automatically in response to predictable inquiries. This recent development was announced through the company's official blog, where Telegram also explained that the chatbots also have the option to provide links that direct customers to booking or order tracking. Additionally, these new automated assistants from Telegram Business are also capable of offering welcome messages and absence notifications, useful for informing customers, for example, about holiday closures. Telegram explains that thanks to this new feature of Telegram Business, user companies will be able to enhance their brand presence and foster lasting relationships with their customers by leveraging the power of automation along with personalized communication.

[ ... ]

European companies are facing million-euro losses due to connectivity issues
European companies are facing million-euro losses due to connectivity issues
12/06/2023

A study by Cradlepoint reveals that European businesses could be losing milions of euros every week as a result of connectivity problems. According to the State of Connectivity in Europe report, conducted in collaboration with Censuswide, 74% of companies experience at least 2 hours of connectivity loss each week. One hour of downtime can be valued at 332,600 euros, according to Statista. These connectivity issues have also generated additional operating costs for 47% of the surveyed companies, and 33% have missed out on business opportunities due to these problems. Furthermore, the education sector is affected, as 80% of respondents state that poor connectivity hinders the development of skills necessary to thrive in a modern economy. The study also highlights that 21% of European companies have lost talent due to connectivity issues. The findings also conclude that improving connectivity is considered crucial for 90.5% of the surveyed companies, as it would help them better manage potential economic, social, and political challenges and increase their resilience to future disruptions.

[ ... ]

The Neeva search engine fails and shuts down
The Neeva search engine fails and shuts down
02/06/2023

After months of efforts, Neeva, the search engine designed by two former Google employees that aimed to provide a user-tracking-free and ad-free service, has announced its closure. Since its launch, Neeva has failed to gather a sufficient user base to sustain the project, even after announcing Neeva AI and becoming the first search engine to provide real-time AI-driven answers to most queries. Therefore, today, on June 2nd, Neeva will disappear as a search engine. Its founders will redirect their business to a new area, and subscribers with active licenses will receive a refund for the unused period. Neeva has also announced the deletion of all user data.

[ ... ]

Europe will have its own satellites constellation to guarantee secure communications
Europe will have its own satellites constellation to guarantee secure communications
13/12/2022

With the sights set on 2027, the EU has closed a provisional agreement about the regulation of secure connectivity throughout its territory, which will include the deployment of a constellation of satellites that will ensure communications, especially in the event of cyberattacks or natural disasters that affect critical infrastructure. The plan, linked with the 'Global Gateway' strategy from the UE, that will allow the provision of affordable Internet access throughout Europe, will provide, also, secure connectivity in geographical areas of strategic interest, such  the Arctic region and Africa, and  services to protect the critical infrastructures of the Member states, too. The objective, according to the EU, is to ensure improvements in people's daily lives, identifying reliable and secure communications as the cornerstone of the EU's strategic autonomy.

[ ... ]

Google presents its new augmented reality search experiences
Google presents its new augmented reality search experiences
21/11/2022

Google presents its new augmented reality search experiences From this week, Google users in London, Los Angeles, New York, Paris, San Francisco and Tokyo will be able to enjoy the new Live function on their Android and iOS terminals, View Live, an immersive augmented reality (AR) experience that offers to explore the environment that surrounds us from our mobile.  With Live View, Google has explained, users will be able to use their mobile phones to discover the shops and other establishments that they have around, from which they we will receive information about their open hours, type of sale, etc.  To do this, it is necessary to install the application, which will soon be available in more cities than those included in this first launch, and focus the mobile camera on the buildings and stores that we have in view. Then,  the information available for each one will appear.  Google has also announced the global launch of a functionality that is currently only operational in Australia, Japan, the United Kingdom and the United States, which reports on accessibility to shops and other establishments and premises for people with reduced mobility.  The accessible places are marked with a wheelchair icon and the users can access to relevant information is displayed, such if that place have adapted bathrooms, if interior mobility in a wheelchair is possible, or if they have accessible parking spaces. The third novelty announced by Google is a new tool for electric vehicle drivers, with real-time information on the nearest charging stations.

[ ... ]

Google announces the closure of Street View
Google announces the closure of Street View
03/11/2022

The independent Google Street View application will stop working next March, as Google has reported. They also has confirmed that the service will remain active within Google Maps.  At this moment, Street View works in parallel as an independent App in the Google and Apple stores and also as an integrated functionality of Google Maps, a duplication that is no longer considered necessary and for these reason  it will disappear as an application next year, on march 21th.  Street View allows users to explore, through real images, towns and cities of more than 65 countries, providing them  panoramic views at ground level, and the possibility to choose which segments of the road they want to explore.  The images that Google uses for this service are taken by vehicles, cars and tricycles, equipped with up to nine cameras. This vehicles just  move around the world, taking the photos and generating three-dimensional data that are used on top of the images, in this case from Satellite, of each place.

[ ... ]

Microsoft Explorer is already history  Microsoft stops supporting
Microsoft Explorer is already history Microsoft stops supporting
17/06/2022

After 27 years, Microsoft has definitively disconnected the Internet Explorer web browser and Microsoft Edge becomes, from now on, the only reference browser of this technologic company.  Since last wendsday, June 15th, Microsoft is  only supporting Microsoft Edge and any user who tries to access to the old browser or open any service that only works with Internet Explorer will be redirected to Microsoft Edge.  Between 2002 and 2003, Internet Explorer was the most widely used browser in the world, 95% of users, although it was gradually losing market share. In fact, since 2016, Microsoft had already suspended the development of new features for this browser.  After a first phase of redirection to Microsoft Edge over the next few months, Microsoft has already announced that it will release a Windows update that will make virtually all traces of the old browser disappear permanently, although it will remain active within Microsoft's Internet Explorer mode Edge, until the end of 2029.  The withdrawal of support for Internet Explorer 11, the latest version available, will not affect server-based browser applications or the Windows 10 Long Term Servicing Channel (LTSC) or the Trident MSHTML engine.

[ ... ]

Vodafone tests a new technology to identify the activity of their users on  Internet
Vodafone tests a new technology to identify the activity of their users on Internet
03/06/2022

Vodafone has begin to test a new way of tracking the activity of their users on the network. This is an advertising identification system called TrustPid, which works by creating a fixed ID for each customer at the Internet Service Provider (ISP) level. After that, this ID will associates all user activity with it.  The objective is to use the data obtained for the distribution of publicity and personalized advertising and to prevent publishers from losing revenue.  According to the company, there is no way to circumvent the system at the browser level, blocking cookies or masking the IP address and they assure that it is a simple toll if people want to continue consuming high-quality content on the Internet without paying.  “Consumers appreciate the idea of ​​the free internet, but this needs a trade-off: publishers need a sustainable revenue model, which means adding subscription paywalls or relying on advertising to keep free access and ensure high-quality content”,  they justify.  At the moment, Vodafone is testing advertising identification in Germany with some of the country's largest websites, Bild.de and Deutsche Telekom, the parent company of T-Mobile.

[ ... ]

The Spanish Organization of Consumers and Users has denounces Apple for the planned obsolescence of the iPhone6
The Spanish Organization of Consumers and Users has denounces Apple for the planned obsolescence of the iPhone6
25/05/2022

The Spanish Organization of Consumers and Users (OCU) has filed a class action lawsuit against Apple for the planned obsolescence of their iPhone 6 and has agreed to pay the costs of the trial to the 400,000 affected in Spain.  The OCU considers this planned obsolescence a deceptive commercial practice that violates consumer protection regulations and demands compensation for Spanish users for an amount that ranges between 99 and 189 euros. This figure comes from the sum of the amount of the battery (between 29 and 89 euros, depending on whether or not the replacement plan was accepted), plus 10% of the purchase price of the mobile (between 699 and 999 euros, depending on the model).  According to the OCU lawsuit, Apple has acted fraudulently by hiding information from users, and considers that the technology company updated the software in the different models of the iPhone 6 to mask the performance problems of its batteries, knowing that this would cause a slowdown. and loss of phone performance.  This practice, said OCU,  conditioned consumers to renew their iPhones, causing them an economic loss that amounts to between 40 and 80 million euros, approximately.  The complaint against Apple is one more action from the OCU to encourage affected users to fight against planned obsolescence.

[ ... ]

Video calling apps listen when the microphone is off, according to a study
Video calling apps listen when the microphone is off, according to a study
25/04/2022

A group of researchers from the University of Wisconsin-Madison (United States) has determined that video conferencing applications can continue accessing audio data even if the user has disabled the microphone.  To demonstrate this, they have studied the most popular video conferencing applications and have analyzed the behavior of the mute button until they has determined that all the applications that they has tested whether the microphone was open or closed, occasionally collected raw data and delivered it to the servers of their services.  In their research they have worked with binary analysis tools to see how the audio was transferred from the application to the audio drivers of the computers and then to the network.  They aslo have created, through machine learning models ( 'machine learning'), a classifier of daily activities that, with 82% accuracy, has determined which activities users were doing while their microphones were, theoretically, silenced. In relation to this, the authors of this work recall that beyond muting the microphone, you can turn off the microphone of a device through the settings menu, a safer option to limit access to confidential information and sensitive data.  All the conclusions of this study will be known next July in the Privacy Improvement Technologies Symposium.

[ ... ]

Apple take distances itself from the Metaverse
Apple take distances itself from the Metaverse
07/02/2022

Unlike many other companies, it seems that Apple looks suspiciously at everything that has to do with virtual worlds and according to Bloomberg analyst Mark Gurman, who is specializes in this company, Apple would have ruled out the idea of ​​a virtual world for the time being where users can get away all day. Gurman assures that he has been told "fairly directly" that the Metaverse idea is "out of bounds" . This, however, does not mean that Apple is losing ground in the virtual world and if plans continue as they are, this company will most announce its first virtual and augmented reality headset this year. Apple's viewer would be mixed reality and would focus on video games, communication and content consumption.

[ ... ]

What's new in Google for Android?
What's new in Google for Android?
10/01/2022

Google opens the year with news and has already presented in CES 2022 some of the most importants ones, such the new option for locking and unlocking devices and for the remote control of actions on all devices compatible with their Assistant. This means that from now on, you can unlock and use a Chromebook, mobile or tablet from a Wear OS smartwatch. To be successful, of course, the devices must be close to the clock. It is also available the option of unlocking - opening or start the car - BMW vehicles through a compatible Samsung phone or Pixel and, also, the function of transferring and managing content between devices through an integrated Chromecast that allows users to  send content from the smartphone to televisions and monitors as well  to speakers. Google has also announced the upcoming launch of a new device connection function that will allow, for example, to configure a Chromebook from the mobile phone and access all the saved data,. The new feature will also incorporate 'Fast Pair' pairing with Bluetooth accessories.

[ ... ]

Andalusia becomes the mecca of 5G in Europe
Andalusia becomes the mecca of 5G in Europe
19/11/2021

With more than 36 pilot projects developed by Vodafone Spain and Huawei, in collaboration with 50 companies and organizations, Andalusia has become in terms of number of 5G business use cases, the mecca of 5G in Europe. This has been announced in the recent closure of the 5G Andalusia Pilot project. The 36 5G pilot projects have been developed in the cities of Sevilla, Malaga, Puerto Real, Algeciras, Huelva and Jaén, and have included high-value solutions as technology with remote piloting for a defibrillator drone and medical telecare in real time or a new biometric access to the Málaga-María Zambrano railway station, which allows the identification of passengers in the boarding area.   Thanks also to a 5G technology project, Balearia, the biggest maritime passenger and cargo transport company in Spain, has been able to lighten the management of vehicles in Algeciras harbour, where up to 8,000 vehicles pass daily in the operation "Paso del Estrecho".

[ ... ]

Spotify buys Findaway to expand its audiobooks service
Spotify buys Findaway to expand its audiobooks service
16/11/2021

Spotify is determined not to lose the battle as a digital entertainment platform, so they have announced the next acquisition of the Findaway audiobook service, with which, Spotiby will expand this type of content in its catalog. The operation is pending final approval by the regulatory authorities and is expected to be effective before the end of this year. The audiobook platform works for authors, publishers and consumers alike, and according to Spotify one of its goals with the acquisition is to work to remove current limitations and give better economic tools for audiobook creators.

[ ... ]

Apple reduces the manufacture of iPads in favor of the iPhone 13
Apple reduces the manufacture of iPads in favor of the iPhone 13
05/11/2021

The global shortage of semiconductors is growing and in light of this situation, Apple has announced that they will reduce its production of iPads to use the chips in the iPhone 13. Apple has also chosen to reduce the production of older iPhones. The strategy, they explain, is to focus on their newest product, the iPhone 13 that arrived to the market at the end of last September, and take advantage of the foreseeable pull, especially in western markets where the sales rate are already beginning to approach to the prepandemic stadium. In a recent interview with the Financial Times, Apple's chief financial officer, Luca Maestri, said that the losses generated by the shortage of chips have been millionaire and Apple has stopped earning 6.000 million dollars.

[ ... ]

Macro cyber-attack affects more than 350 companies worldwide
Macro cyber-attack affects more than 350 companies worldwide
07/07/2021

The number of companies that have suffered from the REvil macro cyberattack now exceeds 350 organizations worldwide from which the cybercriminals are demanding 70 million in bitcoins to provide them with a universal decryptor to restore their data. The attack was conducted through the update system of IT services software company Kaseya, which REvil exploited to spread and hide ransomware. The virus was leaked to TI Kaseya resellers and from there has reached all end customers using their software. The official data provided by TI Kaseya sets the number of affected companies at 350, although other sources such as the cybersecurity company ESET talk about more than 1,000, including some Spanish organizations, although no names have been disclosed. It has been made public that one of the companies most affected by the cyberattack has been the Swedish supermarket chain Coop, which has had to close its more than 800 points of sale for a few days due to the impossibility of using its cash registers or charging customers. Based on Sophos threat intelligence, REvil has been active in recent weeks and is currently the dominant ransomware gang involved in Sophos' defensively managed threat response cases. Prior to this latest attack, they were also responsible for the one suffered by meat company JBS, which forced the cancellation of all work shifts at the company's slaughterhouses in the US. JBS paid up to 11 million to restore normal operations. These macro cyber-attacks are in addition to other recent and highly significant ones, such as the one perpetrated by the hacker group DarkSide, which forced the preventive shutdown of the largest oil pipeline network in the United States, Colonial Pipeline, endangering the supply of fuel in a large part of the country, or the one suffered by the SEPE and the Ministry of Labor in Spain a few weeks ago.

[ ... ]

How to keep your Mac safe?
How to keep your Mac safe?
28/06/2021

5 things you should do to protect your Mac How many times have we heard that Mac is a more than secure and unbreakable system? For years, Apple has made its security through obscurity, or in other words, its proprietary software, flagship and brand guarantee. Today, however, just when Mac is no longer a minority option, Steve Jobs' system has become another favorite target for hackers and cybercriminals. The market has responded to this with the development of specific protection tools for Mac, while Apple works on optimizing its system in each version. Knowing what kind of tools exist for Mac and which ones are already included in our computer will help us to stay safe and choose the best strategy that fits our needs and use of the equipment. 1. Use computer security tools Cybersecurity is a universal and necessary practice in all operating systems today. The objective is to ensure protection against attacks and theft by cybercriminals who are looking for personal or confidential information stored on our computers or that enters or leaves them, in order to use it for their own benefit. What is VPN security? Cybersecurity tools help us to minimize our footprint on the Internet and thus increase our privacy and security. In this regard, VPN services for Mac stand out, as they incorporate advanced protection technologies capable of connecting to the Internet through intermediate servers, so that our IP address - our identification on the network - is replaced by the IP address of this secure server, without anyone being able to trace our connection. This type of VPN service also encrypts any information leaving our computer, thus preventing it from being accessed on its journey to its destination. This is essential, for example, when using public Wi-Fi networks to connect to the Internet. 2. Keep the operating system and software up to date As simple as it may seem, one of the best and easiest ways to protect a Mac is to always have the latest version of the operating system installed and to work with updated software downloaded from the Mac App Store. System updates usually include security patches, among other things. How do I update my Mac? Through the System Preferences Panel of our computer we can set that when there are available updates we receive a notice from MacOs warning us of it or that these updates, whether system data files, security updates or official software are installed automatically. To check if we are working with the latest versions available and our Mac is up to date we can do it by checking through this same panel if there are updates available at that time. If we have checked the automatic updates option, Mac will do this task for us routinely. 3. Use secure settings Mac's default security settings can be greatly enhanced by manually configuring the security and privacy terms of our computer. How to change the Privacy and Security preferences on the Mac? By accessing the "Privacy" tab of the "Security and Privacy" option of the Control Panel we will have the option to manage what information we allow our computer to make available to others over the Internet or on a network and what applications we allow access to our data and files. In the same way, but through the "Security" tab, we will be able to incorporate passwords for the access to different tasks and operations of the computer and through the "FileVault" tool we will be able to ensure the encryption, for example, of our personal information or certain documents for which a password will be required to unblock them. 4. Use an Antivirus for Mac There are antivirus programs developed specifically for Mac. Some of them are special for certain threats, although in general most of them offer a wide range of services to help us keep our computers safe. Which is the best antivirus for Mac? The range of antivirus for Mac, free and paid, is nowadays much wider than a few years ago, highlighting among the most complete and advanced, antivirus with malware protection functions in real time, tools against digital identity theft, protection against spyware or advanced detection and removal of blackmail programs. 5. Make regular backups Apple has a native function, Time Machine, which makes backup copies of our hard disk on a separate secondary disk, so that if for any reason we suffer an attack or a breakdown we can recover all the information. Many antiviruses offer a backup service, backup or backup similar but in the cloud, as a preventive measure against writing errors on the disk, theft of devices or even against data hijacking or ransomware.

[ ... ]

What is the value of a Bitcoin?
What is the value of a Bitcoin?
11/06/2021

Since Bitcoin first appeared in 2009, this digital currency not issued by any government or company, nor, under the umbrella of any kind of economic policy, has gained a foothold in the market and has already started to fit into existing legal frameworks. What gives Bitcoin its value? The great value of Bitcoin is that it is a decentralized and global currency, an alternative to fiat currencies (those issued by governments). All transactions with Bitcoins are public and each of these crypto currencies belongs exclusively to its owner, therefore, it is a currency that cannot be intervened by anyone. What can I do with Bitcoins? To date, with this cryptocurrency, it is possible to monetize all kinds of services, in addition to making investments, free or practically free of commissions, which in the medium to long term are proving attractive. This has made Bitcoin an asset in which to invest and an increasingly popular means of payment through which to transfer value from one user to another without losing friction along the way, going through an intermediary or paying a commission. What is the price of a Bitcoin? Like any other good, the price of a Bitcoin varies according to market demand, although the fact that it has been designed to behave as a deflationary asset and that its supply is limited to 21 million coins, facilitates that by the law of supply and demand itself, the Bitcoin exchange rate tends to rise continuously. As of June 9, at the time of writing this article, the Bitcoin value today is 30,007.86 euros, 3.4 times its price a year ago, when the Bitcoin to Euro conversion rate was 8,629.5 Bitcoins for 1 euro. In 2010 Bitcoin price was less than one Euro cent. What does the value of Bitcoin depend on? The value of Bitcoin depends on the trust and acceptance of users to use it, hence why Bitcoin is rising in value some days and not others. As Bitcoin has been implemented as a means of payment in multiple transactions and its popularity has grown, its value has grown in parallel.  Likewise, when there have been news or events that have questioned, for example, the suitability of this crypto currency, its price has fallen. Like any other currency, the price of Bitcoin fluctuates and it is the users themselves who set it at the time of the purchase and sale transaction, which prevents the existence of a single price for Bitcoin, since it is not operated through a single platform as is the case with other currencies. Even so, buying and selling prices of Bitcoins tend to be quite similar. To know how much Bitcoin costs, there are several online platforms, known as "Bitcoin trading platforms" that report live the evolution of the value of the cryptocurrency. Is it safe and profitable to invest in Bitcoin? As with any other asset, investing in Bitcoins is profitable if we know how to do it at the right time. On the other hand, the Blockchain technology on which Bitcoin is based is reliable and difficult to manipulate, with no risk of being counterfeited, although some experts believe that the perfect, 100% inviolable system has not yet been created. In the cryptocurrency segment, convertibility is contemplated, so that Bitcoins can be exchanged for fiat currencies. What can I buy with Bitcoins? Over the last few years, a large number of companies have incorporated Bitcoin as an official method of payment for their goods and services From travel companies to ticket sales platforms for all kinds of shows, through gaming platforms, digital bookstores, software stores or even non-profit organizations already accept this digital currency. That is, Destinia, 13tickets, Gear Best, Shopify, Wordpress, Hostinger, Greenpeace,... among many other companies. eBay is currently considering adding Bitcoin as a method of payment. What is Bitcoin mining and how are Bitcoins generated? The users themselves through a totally decentralized system create Bitcoins. To become a bitcoin creator, computers with high computational capacity are needed to process and verify transactions and quickly solve the complex digital processes of generating the currency. This work is called mining and one of its best attractions is that the system offers "miners" rewards in Bitcoins in exchange for these services, which has made this activity very appealing for certain users. Is it profitable to mine Bitcoins in Spain? Bitcoin mining requires very powerful equipment, with high calculation capacities to solve operations, being nowadays totally inoperative for this operation the PCs of domestic or office use. The investment to mine Bitcoins requires, in addition, to assume the large power consumption required by this more powerful equipment, which makes Spain, at this time due to the high price of KW/h, an uninteresting market for mining Bitcoins. On the contrary, other locations such as China, Iceland, Iran or Georgia, where the Bitcoin mining business is in full expansion, are very interesting.

[ ... ]

What can I do if my computer runs very slow?
What can I do if my computer runs very slow?
22/05/2021

If your computer is running slow, do not despair. The use of a computer like any other machine needs proper maintenance and the performance of our PC can be severely affected by the lack of attention to this task. But, don't worry, if you want your computer to work as it did on the first day, we explain how to get it back. Why is my computer so slow? Computer slowness can be due to hardware, software, connectivity and even tidiness and cleanliness problems! Every computer needs a minimum maintenance so these failures can be avoided and only if we pay this kind of attention we can ensure an always-optimal performance for our computer, prolong its life and work or enjoy our PC, without despairing. I have tried everything, but my computer is still very slow. What can I do? If your computer is slow and you have already tried the typical things like closing secondary tasks, disabling the automatic execution of programs, you have verified that you have free space on the hard disk and restarted the PC, and everything is still the same, it is clear that something is wrong with your machine and you should consider resorting to a professional computer repair service, so that they can fix it. You can search a thousand videos on the Internet, but... do you really know why your computer is slow? Why does your computer start up very slowly? Or why has your computer become slow after a while of working with it? Are you sure that what you want to do will not end up causing another error or, even worse, another more serious problem? Is it necessary to go to a professional Computer Repair Service to fix the slow computer problem? The answer is yes, if what we are looking for is to really fix the problem and prevent it from happening again. You can save a lot of time and money by using a professional computer repair service. The best computer repair services work with specialized technicians who have the necessary knowledge to make a quick and accurate diagnosis that will allow you to give your computer a new lease of life. In addition, professional computer repair services have the right tools and all the licensed software to be able to intervene. What will a Computer Repair Service do to speed up my slow PC?  The first and foremost thing that a professional computer maintenance service can offer you is a maintenance plan for your computer, tailored to your needs. With this alone, you will most likely avoid many problems related to the performance of your machine, including speed problems, right from the start. They will be able to, among other things, repair or replace any part of your computer causing any problem, they will perform a deep search for viruses to eliminate them; and if necessary, they can clean the cooling system of your computer to remove internal dust, one of the most common causes of slow computer performance - dust accumulated in the internal fans can reduce their efficiency and cause overheating of the machine and its mechanical components -. Sometimes we think about replacing the machine when a simple repair and a good maintenance can bring our PC back to life. When was the last time you had your computer serviced?

[ ... ]

What is IT maintenance? Prevention is better than cure
What is IT maintenance? Prevention is better than cure
19/04/2021

Keeping our IT equipment in good condition is essential for the smooth running of the business. The main goal of a good IT maintenance is to ensure the proper functioning of the hardware and software of our network and IT equipment and thus contribute to the overall efficiency of our business. What is the purpose of computer maintenance services? Computer maintenance services try to anticipate failures and offer us solutions to manage our computers and computer network, optimize their operation and secure all the information contained in our machines. In case of incidents, a good computer and systems technician will solve them and also find the cause of the error to prevent it from happening again. Benefits of hiring a computer maintenance and web maintenance service Common computers, servers, hard drives, networks, connections and antivirus problems can be avoided or prevented if we carry out all their preventive maintenance needs. Advance failure detection. Incidents can occur at any time, nipping them in the bud can save us a lot of headaches throughout the life of equipment. Improve the performance and reliability of your computers and network. This ensures our software is always up to date, thus improving the efficiency, speed and machines operation and other connected equipment. Prevents data loss. Data loss can wreak havoc. Keeping the equipment in good condition reduces the chances of these accidents that are completely neutralized if, in addition, our computer maintenance services include backups and contingency and recovery plans in case of disaster. Improve our protection against cyber-attacks. Regular maintenance means that our systems have the latest and, potentially, most effective security software installed to prevent any problem with malware, viruses, spyware or other unwanted attacks. Reduce our costs. With up-to-date computers we will always maximize their useful life and minimize the risk of loss due to unplanned downtime caused by computer problems. It helps us to keep the website properly updated and backed up. The most complete IT services include additional high-value services such as web maintenance for companies and backups of the entire project so nothing is lost in case of problems. What are the functions of a computer maintenance technician? Periodic reviews of computers, equipment and networks. To ensure from day one that everything is working properly, the software is up to date and the hardware is adequate. Server management with activity monitoring. To anticipate incidents or react immediately if they occur. Backup copies. To prevent data loss both on physical equipment and in the cloud. IT security. To keep machines protected and minimize the risks of viruses, computer attacks and improper intrusions. User management. To guarantee exhaustive control of how and who can access the data stored on the company's computers and servers. Remote and on-site technical assistance. Telephone support. To ensure quick resolution for major incidents and restore the service in the shortest possible time.

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x