The first thing you've wondered is surely how Google can get this data, because it's not something that hackers do. However, the figure published by Google is based on statistics provided by Verify the password, an extension that Google has developed and launched earlier this year.
This extension is available to all users who want to install it in their browser from the Chrome Web Store, which thousands of users have already done. The extension is responsible for checking user names and passwords used by users and alert them when it detects that the use of this identification information has been stolen by an attacker or a data filter.
This extension, fruit of the work done by Google in collaboration with many academics of the University of Standford, has already provided certainly alarming information. From a total of 21 million accreditations, username and password, automatically reviewed by Password Checkup, more than 300,000 were involved in several attacks and ended up in the hands of cyber criminals.
This suggests that our passwords are not as secure as we thought and that many users do not take the necessary security measures to protect their passwords. In this regard, Google recommends do not use the same password to access all our accounts and that each of them meets the minimum standards to be the sure enough
Written by Roberto Adeva
This was revealed today by the National Police, which dismantled a IPTV network dedicated to marketing payment channels and any other audiovisual content illegally. Most of these contents were related to sporting events. During the raid, there was only one detainee whose home in Tarrasa (Barcelona) was responsible for the offer of connections to this content, a multitude of hotels located throughout the Spanish geography.
The arrest was made possible through a complaint containing information on the criminal activity of the inmate, offering a service to customers from a website. without any authorization nor the ownership of the intellectual property rights of this content.
The inmate billed the clients a predetermined periodic amount, which varied according to the duration of their engagement and the terms of access to that content. To access this service, it was necessary to buy a decoder that the inmate has provided. These decoders have a modified firmware who was the one who gave access to the servers with the content.
Among the available channels, there were many different payment platforms, having access to almost every sporting event. He also stopped I used the logos and names of these platforms to promote his service even though he was doing it illegally.
After conducting the investigation, the police identified the person responsible for the website and proceeded to arrest her at her home in Tarrasa, where she found all the documents with which he had conducted the criminal activity. Along with this, the police blocked and disabled the streaming service, where the customers who had paid for it have already lost access to this content.
At home, they also found several bills in exchange for offering illegal service to many hotels in Spain. They also found EUR 4,705 that it is believed to come from the criminal activity that he conducted.
The IPTV hacking It has steadily grown over the years, as it allows illegal access to live streaming content, which is the one most often requested by users, among which sports programs predominate.
Written by Alberto Garcia
source> National Police
Something as simple as taking our cell phone and saying something like: Hello Google, remember … you have to pick up the child at 4:00 pm. This person will automatically receive a notification on their mobile or even their smart speaker enabled for the Google assistant when creating the reminder, then will be notified again when we ask them to remember it.
At any time, we can see quickly the reminders we sent to our contacts asking the Google assistant to show us reminders for a specific person.
Reminders that will work too location-basedIn other words, we can ask the Google assistant to remind someone to do something when they arrive at a specific site if we know they will go there. In this way, Google will notify this person of the geolocation of your mobile in this area to remind you that you must send this message.
This function will be started at the beginning in English for the United States, the United Kingdom and Australiaalthough it is expected that it will happen later in other languages for the rest of the countries. In addition, it is important to keep in mind that the people to whom we can send and who will be able to receive these reminders must be people from our Google family group or people whose accounts are linked to the same smart talker. , for example.
Written by Roberto Adeva
Specifically, allowing this failure is that the attacker can reduce the length of the encryption key used when establishing the connection between the two devices. In this way, reducing the length of the key makes a lot easier to decipher this key and therefore access the information exchanged.
Fortunately, exploiting this vulnerability is not an easy task because you have to give special conditions. On the one hand, both devices must be Bluetooth BR or EDR, ie basic rate or enhanced data rate, which corresponds to the data transmission rate supported by the connection . In addition, the attacker should be within reach of both devices They will establish the connection via Bluetooth and will be quick when it comes to intercept and manipulate the key established between the two devices, because it should be shortened and decrypt in a relatively short time.
Finally, this process must be repeated each time the two devices are associated again, as a new key would be used and the attacker should reestablish a new attack.
To resolve this problem, the Bluetooth specification has been updated. recommend a minimum length for the connection encryption key of 7 bytes for BR and EDR connections. For its part, Microsoft has already released an update today, CVE-2019-9506 – Bluetooth Encryption Key Negotiation, which resolves this vulnerability by applying the minimum length of 7 bytes to ensure secure connections.
However, once this update is installed, we need to enable the feature that allows us to solve the problem manually by accessing the Windows registry. We have to go to the road HKLM System CurrentControlSet Policies Hardware Bluetooth and change the input value EnableMinimumEncryptionKeySize at 1 instead of 0.
So, Spotify users can set up their favorite devices from the mobile app and later, when it is detected that any of them is within our reach, the application itself will detect it and ask us if we want to continue reading on this other device.
Therefore, if we listen to Spotify music in the car, we go home and we have our Bluetooth speaker among the favorite devices of the application. At the moment we are close, Spotify will ask us if we want to follow the current reading in the speaker. If we confirm the change, the music will continue playing on the other device. at the same time we let it on the other device
A great feature that many users will surely receive with open arms but who still has no date for their arrival. Of course, there are already users who test and test the function. Everything indicates that she will soon be ready for her arrival in the Spotify application, for both iOS devices and Android devices. Therefore, just wait until Spotify announces the arrival of this feature and other functions in which the company is already working on one of the next updates of the tool. It is expected that in future versions of Spotify, the application is compatible with Siri and we can ask the music that we want to listen to the Apple assistant.
Written by Roberto Adeva
The Eta function allows block all calls numbers that are not on our agenda, so automatic. That is, any call from an unknown number will automatically be blocked to prevent us from being disrupted without having to block calls from each unknown number calling us. Although this possibility still exists if we prefer to block Only the numbers we want.
This new feature adds to the Apple environment the ability to natively block unwanted calls on the iPhone. Calls that will be redirected directly to voicemail so that they do not bother us.
To activate this option, the first thing to do is to have the beta version of iOS 13 on our iPhone and once that's done we open the settings and we go to the option Phone number. We'll find the Disable Unknown Numbers option, which blocks calls from unknown numbers and sends them directly to voicemail. Therefore, all we have to do is slide the switch to the On position.
We need to be very clear: by enabling this option, we can lose some important calls, although the call log is saved in the recent calls list and we can leave voicemails in the voicemail box that we can listen to later. However, it is recommended add all these numbers to our contacts directory of those who do not want to miss any call if we will enable this option in iOS 13.
Written by Roberto Adeva