Connect with us


Gmail Gets New Look Soon, Similar To Outlook



Gmail Gets New Look Soon, Similar To Outlook

In terms of User Interface, in the last few years, Gmail has only received minor updates, but regarding this, it seems that it will soon change because some time ago Google announced that they had prepared a new user interface for users to use.

Old look

Now as you can see above, that is how Gmail looks now, and will soon be replaced with the following user interface:

Now at first glance, Gmail’s new user interface is similar to Outlook, where on the side you can switch to Mail, Chat, Meet and Spaces, and some layouts that I see are quite similar to Outlook.

Although it looks similar, of course, this is not a problem, considering that Google itself describes that this user interface is made so that users can easily switch to other Google applications/services, including Meet and others.

Regarding this new user interface, Google noted that all Gmail users will get this new look, except Workspace Essentials and Admin can’t change the appearance again after getting this update, in other words, later before everything goes perfectly, Google will provide a small banner that invites users to switch to a new view, and reportedly this will start on February 8th and end at the end of Q2 2022.

Via: Google



How to Improve the Security of Your Home Network Easy



Improve the Security of Your Home Network

Securing your home network is essential to protect your personal information and devices from cyber threats like hacking, malware, and viruses. In this guide, we will go over some easy steps to improve your home network’s security and keep your data safe.

1. Change the default login credentials

The first step in securing your home network is to change the default login credentials for your router. Most routers come with a default username and password that are easy for hackers to guess. By changing the login credentials to a unique and strong combination of letters, numbers, and symbols, you can make it much harder for hackers to gain access to your network.

To change the login credentials for your router, log into the router’s web interface using the default login credentials. Once you are logged in, look for the “admin” or “security” settings and change the username and password to something unique and hard to guess.

2. Enable WPA2 encryption

Another essential step in securing your home network is to enable WPA2 encryption. WPA2 is the strongest encryption standard currently available for wireless networks and provides an extra layer of security to protect your data from hackers.

To enable WPA2 encryption, log into your router’s web interface and look for the “wireless” settings. Once you are in the wireless settings, look for the option to enable WPA2 encryption and enter a strong password to secure your network.

3. Disable Remote Management

Many routers come with the option to remotely manage the router settings. While this can be convenient, it also poses a security risk as hackers can gain access to your router settings from outside your home.

To disable remote management, log into your router’s web interface and look for the “admin” or “security” settings. Once you are in these settings, look for the option to disable remote management and turn it off.

4. Keep your router firmware up to date

Keeping your router firmware up to date is an important step in securing your home network. Router manufacturers often release updates that fix known security vulnerabilities, so it is important to install these updates as soon as they become available.

To check for updates to your router firmware, log into your router’s web interface and look for the “admin” or “security” settings. Once you are in these settings, look for the option to check for firmware updates and install any updates that are available.

5. Use a VPN

A VPN (Virtual Private Network) is a great way to secure your home network and protect your personal information from hackers. A VPN encrypts all of the data that is sent and received over your network, making it much harder for hackers to intercept your data.

To use a VPN, you will need to sign up for a VPN service and install the VPN software on your devices. Once you have the VPN software installed, you can connect to a VPN server and all of the data that is sent and received over your network will be encrypted.

6. Use a Firewall

A firewall is a security system that monitors and controls incoming and outgoing network traffic. A firewall can help to protect your home network from hackers and malware by blocking incoming traffic that is known to be malicious.

To use a firewall, you can either install a software firewall on your devices or purchase a hardware firewall that can be connected to your router. Once the firewall is set up, it will monitor all incoming and outgoing network traffic and block any traffic that is known to be malicious.

7. Use an Antivirus

An antivirus is a software that can detect and remove malware and viruses from your computer. It can also help to prevent malware and virus.

Continue Reading


Lee Young-hee Becomes Samsung’s First Female President



Lee Young-hee Becomes Samsung's First Female President

South Korean technology giant Samsung Electronics Co appointed Lee Young-hee as President of the Global Marketing Center for Samsung’s Device eXperience (DX) Division which oversees its mobile business.

As reported by Antara, Monday (5/12/2022), this is Samsung’s new history of appointing a woman to a high position.

Lee Young-hee is the first female president of Samsung, South Korea’s largest conglomerate, to come from outside the founding family.

Meanwhile Lee Boo-jin, the first daughter of the late Samsung Electronics Chairman Lee Kun-hee, currently serves as President and Chief Executive of Hotel Shilla, which is an affiliate of Samsung.

Lee Young-hee worked at L’Oreal before joining Samsung in 2007. Five years later, he was promoted to vice president.

Samsung expects this promotion to be an opportunity for other talented female employees to challenge themselves and climb the career ladder.

Continue Reading


Malware on Android Steals Facebook Accounts, 300,000 Users Become Victims



Regarding security issues, recently Zimperium through its official page reported that there is a malware campaign that is happening on Android devices, where the device will be infected with a trojan horse and steal Facebook user credentials recently.

According to Zimperium, this threat has been active since 2018 and more generally targets comic and novel readers in Vietnam. The Trojan Horse itself is named “Schoolyard Bully” and is found in various applications that can be downloaded from the Google Play Store including third-party apps with the same title.

So, more or less, for example, like in the picture above, where this application pretends to be an educational application with various books and topics for users to read, including Novels and Comics, but the real purpose of the application is to steal information such as:

  • Name on Facebook profile
  • ID Facebook
  • Facebook email/phone number
  • Facebook password
  • Device name
  • device APIs
  • device RAM

This Trojan steals data by opening a fake Facebook login page and injecting malicious javascript code to get user input. And even then, this malware can evade antivirus programs and AI virus detections.

Worse, according to Zimperium, there have been at least 300,000 victims from 71 countries, but the exact number of these countries has not been reported because these malicious applications are still found in third-party app stores.

“Facebook reaches nearly 2.96 billion monthly users and continues to be the number one social media platform. As attackers leverage the Schoolyard Bully Trojan to gain unauthorized access to credentials, they have far more success accessing financial accounts. Nearly 64% of individuals use the same password that was exposed in a previous breach. With the percentage of users recycling passwords, it is no surprise the Schoolyard Bully Trojan has been active for years.” Ungkap Zimperium

Now for Zimperium users, remind that users should read the application reviews before downloading and interacting interactively in it, and also make sure to pay attention to the permission requests requested by the application.

Via: Zimperium

Continue Reading


What is 5G What is 5G
Internet9 hours ago

5G: Everything You Need To Know | What is 5G

SHARE More 5G, or fifth-generation cellular technology, is the latest and greatest in mobile network technology. With faster speeds, lower...

connect macbook to imac connect macbook to imac
Mac1 day ago

How To Connect a Macbook to an iMac

SHARE More Connecting a MacBook to an iMac is a simple process that allows you to share files, use the...

How To Connect iPhone To MacBook How To Connect iPhone To MacBook
iPhone1 day ago

How To Connect iPhone To MacBook Step By Step

SHARE More Connecting your iPhone to your MacBook is a great way to transfer files, photos, and videos between the...

Garmin Nuvi Garmin Nuvi
Wiki2 days ago

What is Garmin Nuvi

SHARE More Garmin Nuvi is a line of GPS navigation devices produced by Garmin, a leading manufacturer of GPS technology....

What is USB 3.0 What is USB 3.0
Wiki3 days ago

What is USB 3.0 Step By Step

SHARE More USB 3.0, also known as SuperSpeed USB, is a type of USB (Universal Serial Bus) technology that allows...

What Does VGA Mean What Does VGA Mean
Wiki3 days ago

What Does VGA Mean?

SHARE More VGA stands for Video Graphics Array and is a type of computer display standard that was first introduced...

Windows 11 Not Shutting Down Windows 11 Not Shutting Down
Windows 113 days ago

How To Fix Windows 11 Not Shutting Down

SHARE More If your Windows 11 computer is not shutting down properly, there are several troubleshooting steps you can try...

Turn Off Sleep Mode iPhone Turn Off Sleep Mode iPhone
iPhone3 days ago

How to Turn Off Sleep Mode on iPhone step by step

SHARE More Sleep mode is a feature on iPhone that allows the device to conserve battery power by automatically turning...

How to Secure Your Wi-Fi Devices How to Secure Your Wi-Fi Devices
Internet4 days ago

How To Secure Your Wi-fi Devices Step By Step

SHARE More Securing your Wi-Fi devices is crucial to protect your personal and financial information from hackers and cybercriminals. Here...

What is CPU Cache What is CPU Cache
Wiki1 week ago

What is CPU Cache?

SHARE More Have you ever heard the term CPU Cache on your computer device? if so, in this article we...



Share via
Copy link
Powered by Social Snap