What is my IP
What is my IP

Search results: sources

Results (8)
Approximately 8 results of sources

Europe forces Apple to open iPadOS to third-party applications and allow the uninstallation of pre-installed apps
Europe forces Apple to open iPadOS to third-party applications and allow the uninstallation of pre-installed apps
03/05/2024

Apple will have to allow the installation of applications on its iPad tablets from sources other than the App Store, in addition to enabling the uninstallation of its own applications that come pre-installed.This obligation comes after the European Commission, within the framework of the Digital Markets Law, has identified the operating system of iPad tablets, iPadOS, as a "gatekeeper" or "gatekeepers". This means that they consider it an important entry channel for professional users to reach final consumers, thus justifying the requirement for its universality.As a result, Apple has a period of six months to comply with the rules imposed by European regulations and which aims to promote fair competition in the digital market.These new measures imposed by the European Commission on Apple follow the precedent of previous decisions that affected the iOS operating system for iPhone, the Safari browser and the App Store itself and mean allowing users to delete applications that come pre-installed on their iPad devices. and offer support for downloading and installing applications from sources external to the App Store.This change in operations for Apple, reported by Bloomberg in recent information, will imply a major adjustment for the company, which has traditionally maintained a closed ecosystem on its devices, allowing only approved applications and services through its official store. However, with this new regulation, iPad users are expected to have greater freedom and flexibility to customize their devices according to their needs and preferences.

[ ... ]

Roku warns of unauthorized access to hundreds of its customers' accounts
Roku warns of unauthorized access to hundreds of its customers' accounts
19/03/2024

A Roku investigation, the company that manufactures media streaming devices running Roku software to access all kinds of streaming content, has revealed unauthorized access to hundreds of its users' accounts, "likely due to compromised login credentials obtained from third-party sources unrelated to Roku," they said. According to the company itself, these credentials were used to access Roku accounts, where changes were made, including attempts to purchase streaming subscriptions. However, in an official statement, Roku said that any sensitive personal data such as full payment account numbers could not be accessed. The affected accounts were secured and required password resets, as well as the cancellation of unauthorized subscriptions. Roku has announced that it will refund its users for all unauthorized charges. "What can I do if I can't access Roku? Roku has reset all passwords for accounts affected by these unauthorized accesses, so if we are holders of one of them, we may not be able to access it in the usual way. To regain access, we should go to my.roku.com and use the "Forgot your password?" option. Additionally, the company recommends reviewing subscriptions and devices linked to the Roku account from the Roku account Dashboard."

[ ... ]

Detected a Trojan that emulates the WhatsApp account and fraudulently manages subscriptions to payment sites
Detected a Trojan that emulates the WhatsApp account and fraudulently manages subscriptions to payment sites
17/10/2022

Kaspersky researchers has reported that YoWhatsApp advertised on Snaptube and Vidmate, two of the most popular download platforms at the moment, is actually a Trojan capable to issuing paid subscriptions and stealing WhatsApp accounts.   YoWhatsApp would act as a mod of the original messaging program, offering new functions that the official service does not allow, such as wallpapers, personalized fonts for chats and password-protected access to conversations, .... As Kaspersky researchers have explained, when a user installs YoWhatsApp on a device, it’s forced to log in to they real application account, and in this moment, Triada Trojan is activated, downloaded and executed on the terminal.  Once this is done, the Trojan is capable of accessing the user's real WhatsApp account credentials, steal all the data, having already detected unauthorized subscriptions to paid subscriptions.  Kaspersky recommends to install, only, Apps from official stores and reliable sources and they have insisted on the need to check always the permissions granted to each application. Installing an antivirus is another recommended measure.

[ ... ]

The Spanish, the European citizens who know more about metaverse and virtual reality
The Spanish, the European citizens who know more about metaverse and virtual reality
27/06/2022

The Spanish are the European citizens who most claim to know what the metaverse, virtual reality and augmented reality are. In fact, the results of the report presented by Ipsos in collaboration with the World Economic Forum, ensure that this knowledge would be not only above the European average,  also the worldwide. Thus, 63% of Spaniards say they know the metaverse, compared to 52% of the world population, 30% of germans or 28% of France citizens. At the other extreme we find Turkey (86%), India (80%), China (73%) and South Korea (71%), which are presented as the countries with the largest population knowledgeable about the metaverse. "The results of this research work give a very optimistic view of the potential of the metaverse and show that many people are open to the technological change that is taking place," says Jame Ferrand-Gutiérrez, head of Data Intelligence at Ipsos in Spain. The director, however, points out that “we cannot ignore that the metaverse is still a concept that has not been fully realized […] Although it is planned as a parallel reality where everything has a place, in reality it is not. Well, at least at present. We will see in the future where it evolves". About the augmented and virtual reality, 77% of Spaniards say they know the first one well, and 85% the second, being, once again, Turkey, the country in the world where the percentages of familiarity with these technologies are more high, 94%. According to the report 'How the world sees the metaverse and extended reality', which collects data from 29 countries, obtained between April  and May through the Ipsos Global Advisor platform, citizens expect that applications that use the metaverse will have a growing impact on their lives over the next decade and, according to the document, in Spain the greatest impact is expected in the field of virtual education and training (63%), entertainment (61%), video games (57%), work meetings (55%) and way of socializing and resources related to health (both with 54%).

[ ... ]

WhatsApp improves security in its desktop version
WhatsApp improves security in its desktop version
14/03/2022

In accordance with the growing use of WhatsApp in the desktop version and with the aim of guaranteeing users maximum security, Meta has announced that has implemented in this app, a new security layer called Code Verify that acts as an open source browser extension verifying automatically the authenticity of the web code of this application.  According to Meta, which has offered this utility to other services to use it, Code Verify allows web browsers to verify that the resources they obtain have not been tampered with.  "When someone uses Code Verify, the extension automatically compares the code that is executed in WhatsApp Web with the version of the code verified by WhatsApp and published in CloudFlare", has said the company, who also explains that if any violation or inconsistency is detected , the user will receives a notification, immediately.  This new WhatsApp code verification, which Meta has confirmed does not record metadata or user data or share information with the application, will be available in the official browser extension stores for Google Chrome, Microsoft Edge and Mozilla Firefox.

[ ... ]

What is web hosting and why do you need it?
What is web hosting and why do you need it?
09/09/2021

If you are thinking of creating your own website or if, on the contrary, you already have one and are looking for a better web hosting service, you probably have many doubts concerning web hosting: what exactly is it, what are its different types, why do I need it, etc. For this reason, here we offer you a clear and simple guide to web hosting. What is web hosting? Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet so that it can be consulted at any time and from any place and device. The content of the websites is stored, therefore, in web servers. These servers allow the content to be accessible via the World Wide Web. For all those who do not know the term, a web server is a piece of computer equipment that is much more powerful than any conventional computer and that is connected to the Internet 24 hours a day to enable access to the contents it stores. Different types of web hosting are offered based on the web server: shared hosting, VPS, cloud hosting, WordPress hosting, elastic hosting, etc. These services are offered by web hosts such as Webempresa, which provide space on a server for use by clients. Why do you need web hosting? Web hosting allows your website to be always online and available worldwide and for everyone. Therefore, even if you can afford to buy your own server and have a fast internet connection, it is advisable to hire a web hosting service, as it will be much cheaper. Web hosts have their own servers to host their clients' websites. These servers are located in a Data Processing Center (DPC): an infrastructure that has the most advanced security systems and stable and secure internet connections, which prevent errors in the services. What are the different types of web hosting? Although there are different types of web hosting in the market, the most common are the following: shared hosting, dedicated hosting, VPS (Virtual Private Server) hosting, cloud hosting, reseller hosting, and WordPress hosting. Each of them meets the needs of a particular group of customers. Shared hosting is the most basic type of web hosting. The provider rents small spaces on a single server to different websites. In this way, all customers have their own space to host their content, while sharing server resources such as CPU, processor, RAM, bandwidth, or IP address. In contrast, a dedicated hosting service is a type of web hosting in which the client leases an entire server and does not share it with anyone else. Although shared hosting works very well, a dedicated server stands out because it is never affected by existing traffic and because it has a higher level of security. A virtual private server (VPS) is basically a server running within a server. One physical server hosts multiple virtual servers, each isolated from the others. Each VPS runs its own operating system, independent of the others. The features offered by a virtual private server are very similar to those of shared hosting. At the same time, it offers all the benefits of a dedicated server. Cloud hosting works in a very similar way to the "cloud" where we store all kinds of documents. This is because all the resources that are used to collect the information of a website are executed from a cloud server. The main difference between cloud hosting and other web hosting types is that, in this case, you only pay for the services you use. Reseller hosting is another type of web hosting. It is basically white-label web hosting. A person buys hosting from a provider and then resells those services to his/her clients. This allows the creation of hosting plans and external domains or subdomains. The last type of web hosting we will talk about here is email hosting, which allows you to register a domain name and therefore have a professional email service. This type of web hosting is highly recommended for businesses or individuals that intend to convey an image of seriousness and trust. Thus, thanks to email hosting, you will be able to have a personalized email address, more storage space, and a higher level of security.

[ ... ]

Macro cyber-attack affects more than 350 companies worldwide
Macro cyber-attack affects more than 350 companies worldwide
07/07/2021

The number of companies that have suffered from the REvil macro cyberattack now exceeds 350 organizations worldwide from which the cybercriminals are demanding 70 million in bitcoins to provide them with a universal decryptor to restore their data. The attack was conducted through the update system of IT services software company Kaseya, which REvil exploited to spread and hide ransomware. The virus was leaked to TI Kaseya resellers and from there has reached all end customers using their software. The official data provided by TI Kaseya sets the number of affected companies at 350, although other sources such as the cybersecurity company ESET talk about more than 1,000, including some Spanish organizations, although no names have been disclosed. It has been made public that one of the companies most affected by the cyberattack has been the Swedish supermarket chain Coop, which has had to close its more than 800 points of sale for a few days due to the impossibility of using its cash registers or charging customers. Based on Sophos threat intelligence, REvil has been active in recent weeks and is currently the dominant ransomware gang involved in Sophos' defensively managed threat response cases. Prior to this latest attack, they were also responsible for the one suffered by meat company JBS, which forced the cancellation of all work shifts at the company's slaughterhouses in the US. JBS paid up to 11 million to restore normal operations. These macro cyber-attacks are in addition to other recent and highly significant ones, such as the one perpetrated by the hacker group DarkSide, which forced the preventive shutdown of the largest oil pipeline network in the United States, Colonial Pipeline, endangering the supply of fuel in a large part of the country, or the one suffered by the SEPE and the Ministry of Labor in Spain a few weeks ago.

[ ... ]

How to set up a digital marketing strategy?
How to set up a digital marketing strategy?
16/06/2021

As our daily life Internet gains prominence in our physical world, companies selling products and services are increasing their online presence. To do so, they resort to strategies and tactics that ensure their omnipresence in both worlds, with the main task of attracting and retaining customers who buy their products. In this race for customers' attention, strategies such as Inbound Marketing and Outbound Marketing have emerged as protagonists and although they are radically different in their forms, both techniques have found in online communication an ideal medium through which to achieve their goals. What is Inbound Marketing? Inbound Marketing is based on attracting customers through non-intrusive techniques that use content related to the needs and interests of our target audience to attract them to our brand and products. Inbound Marketing Strategy In Inbound Marketing, content is the king and the strategy to get the user to approach the brand is to create, through these contents, links with the customer and establish a relationship of trust and support that favors their interest in our products and services, as well as their loyalty. To achieve this attention on the contents, it is basic and essential to optimize the SEO search engine, which makes our website, our contents and brand visible, makes us relevant and also contributes to our authority. To achieve this optimization and positioning, SEO will be in charge of indicating which words are trending in searches related to our content, will improve the structure of the web to allow a correct user experience, will implement a good strategy of referral links or link building and will take care of other aspects such as the integration of CRM tools or user metrics. All this will make it possible for our content to be positioned and that in a totally "natural" way and without any intrusion, all those contents written according to the interests of a certain group of customers, awaken their interest and attract them to our brand. Inbound Marketing Tools Throughout the whole process of customer attraction and loyalty, the Inbound Marketing strategy has a wide variety of tools to achieve its goal: Blogs Landing page Lead Creation Calls to action Intelligent content Workflows, ... What is outbound Marketing? Unlike Inbound Marketing, outbound Marketing is based on a totally traditional commercial approach, in which the product or service being sold is the only protagonist of the communication. Outbound Marketing Strategy To reach the public, outbound strategies use invasive methods that address broad audiences, without a specific target, with the intention of reaching the maximum number of possible interested parties. Outbound Marketing strategies are based on one-way communication, from the brand to the customer. The company shows the value of its products and services and tries to convince the public to buy them. All this operation is implemented without the customer's request, even before he has made a search or has shown previous interest in a specific product or service. Outbound Marketing Tools In Outbound Marketing, since there is no specific target audience segment, the communication reaches many users, although it may not be of interest to any of them. To achieve this massive distribution, companies use resources such as: Pop-ups Advertisements inserted in videos Banners Email campaigns for which companies use powerful email marketing software in Spanish, with multiple integrated tools that allow from automating mass mailings to A/B testing, comprehensive monitoring of the actions of each recipient (open rate, clicks on links,...) or even advanced segmentation based on interactions and / or user behavior detected in previous actions. Newsletter, inbound or outbound marketing? Now that we know the differences between Inbound and Outbound Marketing, we will finish by looking at a very useful and versatile tool that, unlike those previously mentioned is used interchangeably by both strategies. We are referring to the Newsletters. If we look at the Newsletter of Which is my IP, for example, we would be talking about an Inbound strategy, because to receive the electronic newsletter you must first register (by the way, if you have not done so yet, do not miss it and you will receive timely information on news and updates to get the most out of your Internet connection). On the other hand, if we look at newsletters like the ones we have all surely received at some time, in which we are offered, for example, a telephone offer from a company that is not our own, we are dealing with an electronic newsletter included in the marketing plan of an Outbound strategy. At this point, we can only conclude that knowing our priorities as a company, analyzing the degree of knowledge we have about our target and assessing our objectives, we will have all the necessary answers to start working and designing our digital marketing strategy.

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x