Anti Spam League Wed, 10 Nov 2021 00:20:55 +0000 en-US hourly 1 Anti Spam League 32 32 Hide my email available in the mail app with new beta versions of iOS 15.2 and macOS Monterey 12.1 Tue, 09 Nov 2021 18:42:38 +0000

ICloud + subscribers who use Hide My Email can do so directly from the Mail app after installing the iOS 15.2, iPadOS 15.2, and macOS Monterey 12.1 betas released today.

The feature update is described in Apple’s release notes for the beta, and it should make Hide My Email much more convenient to use on Apple devices. For those unfamiliar with Hide My Email, this is an iOS 15 and macOS Monterey feature available to anyone with a paid ‌iCloud‌ + plan (starting at $ 0.99 per month).

Hide My Email allows users to create unique and random email addresses that are forwarded to a personal inbox. It’s similar to a password manager for email addresses, with users able to generate random email addresses for each website or login.

All emails sent to the random email address created by Apple are forwarded to you so that you can reply if necessary, but the person on reception does not see your real email address. And if you start to receive spam emails from someone, you can just delete the email address and end it.

Hide My Email was previously available from ‌iCloud‌ settings on Apple devices, but is now also accessible directly in the Mail app. In the Mail application when composing an email, click on the “From” field to see the option to generate a “Hide my email” email address. Selecting this feature will generate a random email address, effectively masking your real email address.

Related stories

New iCloud + Custom Mail Domain Feature Now Available in Beta

Starting with iOS 15, iPadOS 15, and macOS Monterey, users with a paid iCloud + storage plan can customize their iCloud email address with a custom domain name, such as, and the feature is now available in beta. ICloud + subscribers interested in setting up a custom email domain can visit the website, select “Account Settings” under their name and select …

Web-based iCloud messaging overhaul, my email masking, and custom domain features now available

Along with the launch of iOS 15, iPadOS 15, tvOS 15, and watchOS 8, Apple has also been pushing an update for its website, introducing a new look for iCloud Mail which is posted on the web. ICloud Mail’s new web design resembles the email apps on devices running iOS 15, iPadOS 15, and the macOS Monterey beta. It’s a cleaner and more streamlined look than the previous one …

DuckDuckGo announces cross-platform alternative to Apple’s Hide My Email

DuckDuckGo today announced its brand new Email Protection feature that will allow users to avoid being tracked by trackers embedded in emails by forwarding them to a free and personalized DuckDuckGo email before they go. ‘be sent to their actual email. DuckDuckGo Email Protection provides an alternative to Apple’s Hide My Email portion of iCloud +, allowing users to direct emails to …

Apple announces iCloud +, combines paid storage with privacy features like Hide My Email

During WWDC, Apple announced that iCloud was getting a premium subscription level called “iCloud +” which includes “Private Relay” which allows users to browse the web through Safari with all information leaving their device encrypted and access to “Hide my e-mail”. One of the flagship features of iCloud + is Private Relay, which, like a VPN, ensures that all traffic leaving a …

iCloud + allows iCloud Mail users to customize their email domain name

During its opening remarks at WWDC on Monday, Apple announced that iCloud is getting a premium subscription level called “iCloud +,” which includes privacy features like Private Relay and Hide My Email. Another feature included in iCloud + that was not covered in the speech is the ability to create a custom email domain name. From Apple’s iOS 15 feature overview page, under the iCloud + section: Cus …

Apple Seeds Introduces Second MacOS Monterey Candidate to Developers

Apple today released the second release candidate of macOS Monterey, the latest version of the macOS operating system. The release candidate represents the final version of macOS Monterey that will be released to the public, and it comes just days after the first RC. The release candidate is listed as version 12.0.1, probably because Apple has made some changes since 12.0 …

SharePlay added to macOS Monterey 12.1 beta

Apple released the first beta of macOS Monterey 12.1 to developers today, and it turns out the update adds a missing Monterey feature – SharePlay. According to Apple, SharePlay is enabled in the beta of macOS Monterey 12.1, so those who installed the beta can do more with their friends and family through FaceTime. SharePlay was already introduced in iOS 15.1, iPadOS 15.1 and tvOS …

Apple Seeds launches the first public beta of macOS Monterey 12.1 with SharePlay

Apple today released the first beta of an upcoming macOS Monterey 12.1 update to public beta testers, just a day after delivering the beta to developers. Public beta testers can download the macOS 12.1 Monterey update from the Software Update section of the System Preferences app after installing the appropriate profile on Apple’s beta software website. macOS Monterey 12.1 introduces support …

]]> 0
How to activate enhanced protection in Google Chrome for mobile and PC Tue, 09 Nov 2021 14:00:00 +0000

Internet security can be deceptive. You encounter tons of threats while browsing the web. And while your favorite web browser can protect you from most of them, it can’t save you from all threats every time unless you allow it. To protect you from these threats, browsers like Chrome have introduced something called Safe Browsing.

Safe browsing mainly has two types – standard protection mode (enabled by default) and enhanced protection mode, a slightly more advanced level of safe browsing. We will talk about what hard protection in Google Chrome means and how you can enable it in this article. So let’s get started.

What is enhanced protection in Google Chrome

Enhanced Protection Mode keeps you safe from malicious websites, downloads, or extensions. When enabled, it essentially allows Chrome to access your online activities and act proactively. Chrome will use this data to predict and notify you of any dangerous event before it happens by constantly checking and analyzing unusual URLs and sample website pages in real time.

Enhanced security chrome

Enabling Enhanced Protection also increases the security of other Google apps (such as Gmail, Drive, etc.) that you may be using. It will offer enhanced protection based on a comprehensive view of threats against your Google Account. For example, if Gmail detects spam with a summary link, Enhanced Protection transmits the tattoo information to Chrome if you click on it.

Additionally, if any of your saved passwords are compromised in any data breach, Chrome will notify you.

By default, the Chrome browser comes with standard protection configured, which is just good enough to alert you to potentially risky downloads, sites, and extensions. If you’ve decided to improve your online security, here’s how to enable Enhanced Protection Mode on the mobile and web versions of Google Chrome.

How to activate enhanced protection in Google Chrome for Android

Previously, the Safe Browsing feature was only accessible through Chrome Flags for Android. Well, not anymore, because the feature has finally been incorporated into Chrome’s privacy and security settings. Read on to find out how to enable enhanced protection in Google Chrome for Android.

Step 1: Open the Google Chrome app on your Android. Use the three-dot menu in the upper right corner to open the settings.

Google Chrome Home Screen

Open Google Chrome Android settings

2nd step: Under Basics, tap Privacy & Security. Now go to Safe Browsing.

Android privacy and security settings

Safe browsing on Android

Step 3: Then select the Enhanced Protection option. You can tap the arrow next to find out more.

Improved protection for Google Chrome on Android

How to enable enhanced protection in Google Chrome for iOS

Google Chrome also offers enhanced protection mode for iOS devices. Here’s how you can activate it.

Step 1: Launch Google Chrome on your iPhone. Tap the three-dot menu icon to choose Settings from the list.

Google Chrome Home Screen for iPhone

Open Google Chrome settings on my phone

2nd step: Go to Google Services. Turn on the switch next to Safe Browsing and tap Done to save the changes.

Google services

Safe browsing on i Phone

How to enable enhanced protection in Google Chrome for Desktop

For the top version of Google Chrome, here’s how to activate Enhanced Protection mode.

Step 1: Open Google Chrome on your PC. Now click on the three-dot menu icon at the top right to access the settings.

Google Chrome Settings

2nd step: Go to the Privacy and Security tab and click on Security.

Security settings

Step 3: Finally, select the Enhanced protection option under Safe browsing.

Turn on enhanced protection in Chrome for PC

Bonus: How to perform a security check in Google Chrome

Whether you intend to enable enhanced protection or not, we recommend that you run the built-in security check tool frequently to protect yourself against data breaches, bad extensions, etc. Here’s how to run a security check in Google Chrome.

Step 1: Launch Google Chrome and click on the three-dot menu icon at the top to open the settings.

2nd step: Use the left pane to access the Privacy & Security tab. Under Security Check, click the Check Now button to start a quick scan.

Run security check in Chrome

Once complete, Chrome will suggest changes based on the scan results.

Security check results in Chrome

Follow the recommended steps if necessary and you should be in the clear.

Also on Guiding Tech

Safety first

When browsing online on Chrome, you had better keep your system safe. Enabling enhanced protection in Chrome is the right thing to do, especially if you surf the web a lot and like to use extensions. And while you’re at it, be sure to check out these other Chrome security tips.

Last updated on November 9, 2021

The above article may contain affiliate links that help support Guiding Tech. However, this does not affect our editorial integrity. The content remains impartial and authentic.

]]> 0
How antispam software and ransomware protection are connected Tue, 09 Nov 2021 13:04:31 +0000

Mimecast Threat Center research reveals a malware campaign delivered through sideloading, a new technique enabled by Windows 10 that is known to lead to ransomware attacks.

Key points:

  • A threat actor known to spread malware like Trickbot and BazarLoader has resurfaced, with a new way to deliver malware, according to Mimecast’s Threat Center.

  • The new malware delivery method known as “sideloading” takes advantage of a feature introduced by Microsoft in June 2021 that allows users to install Windows 10 apps from a webpage; sideloading seeks to install apps while bypassing the Windows store.

  • Trickbot and BazarLoader spread spam and are known to lead to ransomware attacks, demonstrating the importance of a secure email gateway and anti-spam software.

In June 2021, Microsoft released a new feature in the Windows store called App Installer, which allowed users to install Windows 10 apps from a webpage. Unfortunately, a threat actor known to spread Trickbot and BazarLoader, which spread spam often resulting in ransomware attacks, exploited this feature. This is yet another example of the importance of updated email antispam software to help prevent ransomware attacks.

Trickbot was first seen in 2016 and has been widely used to target financial companies; BazarLoader is basically a spin-off of Trickbot to deliver malicious payloads via Microsoft and JavaScript attachments into spam emails that go undetected until activated. Both aim to steal banking information, PII (Personally Identifiable Information) and / or user credentials.

The threat actor behind Trickbot and BazarLoader is known to sell access obtained from compromised networks to third parties who use it for ransomware. Using sideloading to load malicious payload is a new approach in an ever-changing threat landscape.

How the sideloading threat works

Spam e-mail tricks users into clicking on what appears to be a legitimate link. The email is for a customer complaint that references their full names, with additional details available in the linked PDF. The intention, of course, is to create a sense of urgency to uncover the complaint. And the fastest way to find out is to click on the link and download the report.

Note that the content of the email is grammatically awkward and contains a spelling error (“She” instead of “Here”), a sure sign that it is possible spam. But if users panic that a complaint is filed against them, they might not read the email carefully. (This is why effective anti-spam software is so essential – it would have detected malicious content.)

The link seems legitimate. But instead of downloading the report, the malware uses sideloading to bypass the Windows App Store webpage and install the malware. The user clicks on the report thinking that it is about downloading the PDF report. Instead, the link redirects to a web page where it looks like there is a problem and asks the user to try downloading again.

Uploading malicious code

Instead of downloading the report, users are tricked into thinking that they need an app to view the report. He looks over the edge, except he’s not.

When users click Install, they are downloading a set of applications used by Windows 10; the problem is that the bundle contains the malware.

Mimecast Threat Center noted that this campaign has been viewed more than 16,000 times in various countries, including the United States, United Kingdom, Germany, Australia and South Africa.

Defend against side loading

Starting with Windows 10 2014, Microsoft enables sideloading by default. Organizations can turn off the feature, but then they lose the ability to easily download apps not available in the Windows App Store designed for functions unique to their business.

Whether or not an organization chooses to allow sideloading, the first line of defense against evolving threats like this is a combination of effective anti-spam software and user awareness training. The layered email security policy delivers the efficiency required to keep your business, information, and users secure. Scanning emails and quarantining suspicious content helps prevent spam that leads to ransomware attacks.

Additionally, user awareness training alerts employees to key characteristics of spam to instill a “think before you click” mentality. In this example, a cyber-conscious employee would immediately be wary of an email containing spelling errors and awkward grammar.

The bottom line

Cybercriminals are continually looking for new vulnerabilities to exploit users. This side loading scheme is just the latest example. According to Mimecast’s Threat Center, this is a new version of similar malware attempts masquerading as a Windows application – a particularly dangerous application that will be emulated by other threat actors. The best defense is effective anti-spam email security updated with the latest threat information combined with a “think before your click” culture through ongoing user awareness training.

Want more cool articles like this?Subscribe to our blog.

Get all the latest news, tips and articles straight to your inbox

thank you forSubscription

You will receive an email shortly

Take me back to the article please


Mimecast Limited published this content on November 09, 2021 and is solely responsible for the information it contains. Distributed by Public, unedited and unmodified, on 09 November 2021 13:03:12 UTC.

]]> 0 Natural Cycles Birth Control Application: Does It Work? Tue, 09 Nov 2021 02:04:27 +0000

There’s an app for just about everything these days, so it’s no surprise to learn that there is an app for birth control: Natural Cycles.

What is perhaps more surprising, however, is that Natural Cycles was the first app-based birth control. erased by the Food and Drug Administration (FDA).

According to Natural Cycles, being licensed means it is a legitimate medical device for contraceptive use.

So what is Natural Cycles and how well does it work in preventing pregnancy? We have the details for you here.

Read on to learn more about Natural Cycles, how it works, how well it works, customer reviews, prices, and more.

This app is considered an alternative form of birth control for those looking to avoid methods, such as:

Using an algorithm based on daily basal body temperature and menstrual cycle information, Natural Cycles attempts to predict which days a person is fertile.

This type of monitoring is called fertility awareness.

Fertility awareness is of course not a new strategy for planning (or avoiding) births.

Knowing which days you are most fertile can help you avoid or plan for pregnancies by abstaining or engaging in unprotected sex with the penis in the vagina.

Usually, the windows of fertility are a few days before or during ovulation.

The Natural Cycles app makes it easier to monitor the fertility awareness strategy because it is digital and takes into account a range of information.

Overall, it’s probably best to think of the app as a useful tool – if used consistently – to help predict fertile days, rather than a foolproof method to prevent pregnancy. It is, after all, about trying to predict fertile days, not confirming them.

Natural Cycles works by analyzing your basal temperature readings, along with your menstrual cycle information, to tell you which days you are most likely to be fertile and which days you are least likely to be fertile.

According to research, basal temperature, the type of temperature taken after resting, is useful in detecting ovulation.

Of course, certain factors can disturb this measurement system. That’s why frequent temperature readings taken at the same time each morning – perfect use – can help with accuracy.

On the company’s website, the brand states that the Natural Cycles app is 93% effective with typical use and that number increases to 98% with perfect use.

To get started, you need to download (and purchase) the app and select one of the plans:

  • NC Birth Control
  • NC Pregnancy Plan (find fertile days)
  • NC Pregnancy monitoring (pregnancy monitoring)

The app needs your menstrual cycle information before you are ready to start measuring the basal thermometer, so you need to enter that information first.

Once you have your basal thermometer, you can begin your temperature readings. Annual subscribers receive a basal thermometer from the company, while monthly subscribers can purchase theirs at a pharmacy.

Temperature readings should be taken immediately in the morning while you are still in bed, before you even go to the bathroom. You enter your temperature in the app. On days when you may be feeling sick and suspect that your temperature has risen due to illness, you can skip your temperature entry.

The company’s website says that you don’t have to take daily temperature readings, but making a habit of consistent readings most mornings helps the algorithm learn more about your cycle.

From there, Natural Cycles begins studying your data – your temperature readings and menstrual cycle information. This is how the app tells you which days are most likely to be fertile.

Your screen will show either a green message indicating “Not fertile” or a red message indicating “Use protection”, which means that there is a greater chance of pregnancy on this day.

The app can also track other things like PMS, pain, mood swings, and sex drive.

Currently, Natural Cycles has an average rating of 3.8 stars out of 5 on Trustpilot, a third-party review site.

Satisfied reviewers like the app to be a hormone-free method of preventing pregnancy and overall feel like they are learning more about their body using the app.

Less than stellar reviews point to unplanned pregnancies and some issues with billing auto-renewal fees without notice, or other subscription issues.

It’s also worth mentioning that Natural Cycles received negative publicity in 2018 in the UK and Sweden. This happened when 37 users reported unwanted pregnancies after using the app for birth control.

At the time of publication, Natural Cycles offers two plans:

  • annual: $ 89.99
  • monthly: $ 9.99

If you would like to get a feel for Natural Cycles before paying for the service, there is a free demo mode that you can try out by downloading the app.

He is also eligible for the use of the Flexible Spending Account (FSA) and the Health Savings Account (HSA).

There are many free and paid fertility apps on the market.

Natural Cycles is one of the few birth control apps approved for sale by the FDA. And unlike similar apps, it uses information based on your specific data.

For example, some apps predict fertility based on a 28-day cycle, but some people don’t exactly have that menstrual cycle.

Here are some application options similar to Natural Cycles:

  • Flo. Flo is a free app that also tracks information about your period, fertility, and ovulation. It looks like you can record your basal body temperature using the app as well, but this feature isn’t as advertised as with Natural Cycles.
  • Index. Clue is a free period and ovulation tracker (with in-app purchases). You can also record your basal body temperature with this app. Clue has also been approved by the FDA.

If you are looking for other hormone-free birth control options, keep in mind the following traditional birth control methods:

If you have an iPhone, you can download Natural Cycles from the App Store. If you have an Android, you can download Natural Cycles through Google Play.

If you need any accessories for the related services offered by the app, you can buy them from the brand’s website. You can buy basal thermometers at most retailers.

Can Natural Cycles be wrong about ovulation?

It is important to stress that no form of contraception, application-based or otherwise, is 100% effective.

However, the FDA has cleared the Natural Cycles application.

A 2015 study looked at the effectiveness of Natural Cycles in 317 women aged 18 to 39.

The researchers reported that the number of days of false non-fertile predictions was low – just 0.05% – suggesting that the app is a useful hormone-free contraceptive method.

How long does it take for Natural Cycles to work?

You can download the app and immediately enter your menstrual cycle data, followed by your basal temperature readings shortly after.

The company states on its website that it may take 1-3 period cycles for the algorithm to understand your specific cycle information.

Does Natural Cycles Really Work?

In addition to being FDA approved, the app has an overall positive brand reputation online, including its Trustpilot profile.

Some users have reported unplanned pregnancies after using the app. But the company warns that perfect use is the only way to get the most accurate information about your fertility. This means taking consistent readings at the same time each morning.

In general, no form of contraception prevents pregnancy 100%.

While no form of birth control is 100% reliable, emerging technologies, like Natural Cycles and other fertility awareness apps, can be a useful and effective way to prevent pregnancy.

If you decide to use the Natural Cycles app to help you make health decisions, remember that technology can only predict your ovulation days. He cannot guarantee them.

If you want a more traditional form of contraception, consider speaking with a healthcare professional about the range of options available.

]]> 0 Akamai Redefines WAAP Simplicity and Automation with New App and API Protector Mon, 08 Nov 2021 11:30:00 +0000

Protects against complex web and API-based attacks and mitigates bots with a unique, easy-to-use solution powered by Akamai’s Adaptive Security Engine

CAMBRIDGE, Mass., November 8, 2021 / PRNewswire / – Akamai Technologies, Inc. (NASDAQ: AKAM), the World’s Most Trusted Solution for Powering and Protecting Digital Experiences, Today Announces the Launch of App & API Protector, the Next Generation Web Application and API Protection Solution (WAAP). It provides a holistic set of powerful protections designed for today’s modern applications and APIs with smart automation and simplicity.

Akamai Technologies, Inc. logo (PRNewsfoto / Akamai Technologies, Inc.)

Last month Akamai released its latest State of the Internet / Security report, ‘API: the attack surface that connects us allWhich highlighted the challenges organizations face in the evolving threat landscape, especially as APIs reported by Gartner will be the most common online attack vector by 2022. In fact API calls are by design easier and faster to automate than other software endpoints, making them an increasingly attractive target for cybercriminals.

With App & API Protector, Akamai customers have a unique integrated WAAP solution designed to deliver the best security outcomes without compromising on simplicity and ease of use. The main advantages include:

Automatic API discovery and security– Mitigate API risks and vulnerabilities through continuous discovery of known, unknown, and evolving APIs. API requests are automatically discovered and inspected for malicious code; and optional API security controls can be applied at the edge to enable positive API security models. Gartner’s 2021 Critical Capabilities Report ranked Akamai # 1 for the API Programmability and Security use case.

Adaptive and more precise detections—Detects up to twice as many attacks compared to traditional rule sets. Adaptive threat-based detection uses a multidimensional threat assessment model that combines the intelligence of Akamai’s platform with the data / metadata of every web request and API. This data is processed with decision-making logic that accurately identifies and stops stealth attacks with surgical-grade precision.

Continuous self-adjustment– Akamai’s Adaptive Security Engine not only keeps pace with rapidly evolving threats, but reduces false positives by up to five times to ease the effort required to maintain and adjust policies. Security triggers, whether real attacks or those mistakenly identified as attacks, are automatically and continuously analyzed with machine learning to provide very precise policy-by-policy tuning recommendations with an in-depth implementation. a click.

Integrated bot mitigation—Automatically detect and mitigate unwanted bots with built-in bot visibility and mitigation capabilities. Akamai’s industry-leading bot technology offers a large repository of over 1,500 known bots and gives customers the ability to create and define bots to proactively monitor scans and prevent attacks. For the more persistent and contradictory bot operators, Akamai offers its Robot manager solution to mitigate this threat.

Automatic updates—Enable a hands-off approach to WAAP with adaptive protections fully managed by Akamai. Our world-class security researchers use advanced machine learning and data mining techniques to continuously analyze over 303TB of attack data daily and automatically update protections against the latest threats. Customers can also opt for manual / evaluation mode of operation to minimize any unexpected impact from new updates.

Simplified DevOps integration—Easily integrate WAAP functionality using Akamai CLI, Terraform, or scripting into the CI / CD automation pipeline. Enable rapid application integration, ensure uniform security policy management across large application and API portfolios, and centralize security enforcement across hybrid and multi-cloud infrastructures.

“As the online threat landscape continues to evolve, the need for a holistic and adaptive approach to web application and API security is clear. With the introduction of our new App & API Protector, Akamai customers now have a unique and holistic solution that makes protection extremely simple, ”said Amol Mathur, vice president of product management, Akamai. “This builds on Akamai’s proven security technologies, introducing new levels of sophisticated and automated intelligence to keep our customers one step ahead of cybercriminals.

In September, Akamai was appointed chief in the Gartner Magic Quadrant for Web Application and API Protection and ranked highest in execution ability among companies rated for their ability to protect web applications and APIs. In addition, Akamai also received the highest scores for three of the four use cases in the 2021 Gartner Critical Capabilities for Cloud Web Application and API Protection report, including the API security use case.

To learn more about Akamai being named a Leader in Gartner, Magic Quadrant for Web Application and API Protection, September 20, 2021, a free copy of the report is available here.

For more information on App & API Protector, visit here.

About Akamai
Akamai powers and protects life online. The world’s most innovative companies choose Akamai to secure and deliver their digital experiences, helping billions of people live, work and play every day. With the world’s largest and most trusted edge platform, Akamai keeps applications, code, and experiences closer to users, and threats further away. Learn more about Akamai’s security, content delivery, and edge computing products and services at,, or follow Akamai Technologies on Twitter and LinkedIn.

Akamai Declaration under the Private Securities Litigation Reform Act
This press release contains information about the future expectations, plans and prospects of Akamai management that constitute forward-looking statements for the purposes of the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. Actual results may vary. differ materially from those indicated by such statements due to various important factors including, but not limited to, failure of solutions to perform as intended or meet market needs, failure of network infrastructure, ‘Akamai and other factors which are discussed in Akamai’s Annual Report on Form 10 -K, Quarterly Reports on Form 10-Q, and other documents periodically filed with the SEC.


Helen Yang
Media relations

Tom barts
Investor Relations



View original content to download multimedia:–api-protector-301417763.html

SOURCE Akamai Technologies, Inc.

]]> 0
How to fix video issues on the Zoom app Mon, 08 Nov 2021 10:33:55 +0000

This tutorial covers how to troubleshoot video issues on the Zoom app. We will do our best to make sure you understand this guide. I hope you will like this blog How to fix video issues on the Zoom app. If your answer is yes, please share after reading this.

Check how to fix video issues on the Zoom app

Telecommuting is more popular than ever, and thousands of businesses are using video conferencing to keep their employees informed. Zoom and other online meeting tools make this easier than ever, but like any other software, issues will arise that will interrupt or even prevent good video calls.

Fortunately, while there are some outages that you can’t do much about, you can often fix typical issues on your own. To keep your Zoom calls working properly, we’ve put together the most common Zoom issues that users face and provided step-by-step instructions on how to fix them. Nothing is more frustrating than when the webcam or audio is not working during a zoom call. If your webcam isn’t showing or is selected but not working, try some of these basic tips first.

Make sure to allow access to the camera and microphone.

Whether you’re trying to access Zoom on the web, on your phone, or in your browser. You will still find that certain permissions are required to access your microphone and camera. If you deny access to any of these permissions on a smartphone, the Zoom Cloud meeting app will not work.

If you are using the desktop app or the browser, when you start Zoom, be sure to allow these permissions to work as expected. In addition to the permission for the Zoom app, if you have a system-wide privacy option on the Mac or webcam permissions, on Windows, make sure you also give the camera l ‘access to the Zoom application.

Activate the option “Start with the video”

Unlike many other video conferencing options, Zoom has a neat little feature that lets you turn video streaming on or off when you start the call.

This way, of course, you can avoid accidental mistakes. However, if you didn’t know and the video was turned off, you might want to turn it on the next time you call to make sure your video is accessible.

Disable the option “Disable my video when I participate in a meeting”

  • Open the Zoom app and tap the “Settings” icon in the upper right corner of the window.
  • Now go to the Video option.
  • Here, scroll down to the meeting option and uncheck the “turn off my video when joining a meeting” option.

Check camera settings in the Zoom app

If you have connected a separate webcam or other webcam app for your video streaming, you need to check the Camera option in the Zoom app. This could be the reason for an empty video stream.

All you need to do is go to video settings and then switch the camera to the other options available. And that should largely solve the problem.

Close background apps using camera / microphone

Sometimes some background programs may already have access to your camera and microphone, which is why Zoom receives an error message while accessing. In this case, make sure that no other application is accessing the camera and microphone.

As an added mention, in my personal experience, I often leave my music DAW running in the background, but it actually locks the audio driver, so if I don’t close it, I can’t use the video conferencing options with it. audio, Follow the instructions. steps below for unwanted background apps.

  • Open Settings by searching the Start menu.
  • Now click on Privacy.
  • Scroll down to the left panel and click on Background Apps.
  • Now in the “Choose which apps can run in the background” section, turn off the toggle switch for the apps you want to restrict.

Make sure you have the latest Zoom app

It’s always important to make sure you’re running the latest version of an app. Not only can you fix the issues, but you also fixed the latest security issues. You will therefore have to update your Zoom application if you have not already done so, both on smartphones and on PCs.

Update video drivers

Sometimes the app works fine, but its video controller is in the safe (rare cases). If none of the other solutions work for you, be sure to update the video drivers (NVIDIA / AMD) to make sure the drivers work as expected.

Camera hardware or USB issues

If your USB port has a problem, the webcam may not detect the problem in Zoom. USB ports sometimes suddenly stop working due to software or hardware failures. Restart your computer for a quick fix of the USB not detecting error. If anything is stuck inside the USB port, clean it with a toothpick or any small plastic object.

Restart your system

It’s fun for the average consumer that a simple restart fixes a lot of problems. But technically, a reboot will reset the software (or system) state and start over. So if a process crashes, a restart will reset the state and start over.

You never know what is causing the problem when there are many important programs running in the background. In this case, a simple restart should do the job.

Final words: How to fix video issues on the Zoom app

hope you will understand this item How to fix video issues on the Zoom app, if your answer is no, you can request anything through the contact forum section linked to this article. And if your answer is yes, then share this article with your family and friends.

]]> 0
How to cancel an App Store subscription on iOS 15 or iPadOS 15 Fri, 05 Nov 2021 16:40:00 +0000

AppleInsider is supported by its audience and can earn commission as an Amazon Associate and Affiliate Partner on qualifying purchases. These affiliate partnerships do not influence our editorial content.

If you’re suffering from subscription fatigue, don’t worry – it’s easy to cancel your unwanted app subscriptions right from your iPhone or iPad.

You might have forgotten to unsubscribe from an app that billed you every month last year. Or, maybe, you’re trying to avoid getting charged until a free trial ends. Either way, it’s not a bad time to learn how to cancel those pesky and unnecessary App Store subscriptions.

Appleinsider suggests that you check your subscriptions regularly to avoid unwanted billing – once every six months is a good routine to follow.

How to cancel an app subscription on iOS 15 or iPadOS 15

  1. Open Settings
  2. Press your Apple ID icon at the top of the screen
  3. Faucet Subscriptions
  4. Tap the subscription you want to cancel
  5. Faucet unsubscribe
  6. Faucet To confirm

In addition to canceling your subscription, many applications also allow you to change your plan from the subscriptions page. This feature can come in handy if you decide to go monthly or upgrade to an annual plan for bigger savings.

If you subscribe to certain streaming or buying club services and signed up through a third-party app or webpage, such as Netflix or Amazon Prime, you will need to go through the unsubscribe process for that specific service. This may mean that you need to visit your user profile or billing page on that service’s website or in the service’s app.

]]> 0
CISA provides ransomware protection advice to agencies Thu, 04 Nov 2021 15:31:50 +0000

CISA offers ransomware advice as attacks evolve

The CISA guide includes the following recommendations:

  • Keep encrypted data backups offline and regularly test backups
  • Create, maintain and implement a basic cyber incident response plan, resilience plan and associated communication plan
  • Mitigate Internet vulnerabilities and misconfigurations to reduce the risk of actors exploiting this attack surface
  • Reduce the risk of phishing emails by activating powerful spam filters and implementing a cybersecurity awareness and training program
  • Practice good cyber hygiene by keeping antivirus and antimalware software and signatures up to date, implementing application whitelisting, ensuring privileged users and accounts are restricted, using multi-factor authentication and implementing other CISA cybersecurity best practices

“Over the past year, we have seen an upsurge in ransomware attacks among state, local, tribal and territorial governments, as well as small and medium-sized businesses,” said Boyden Rohner, CISA associate director for vulnerability management. “This is an epidemic that affects cities, police, hospitals, schools, manufacturing targets and critical infrastructure, and ransomware players do not discriminate on the basis of industry or location. size of the organization. “

Recent ransomware attacks against state and local agencies include incidents in Joplin, Missouri, targeting the Alaskan justice system and the Washington, DC Metropolitan Police Department.

Even when they are not in the national news, these attacks occur across the country and impact daily life.

“We have seen horrific examples of compromised state DMV systems, and people cannot renew their driver’s licenses. Local governments are affected by ransomware and they cannot process marriage licenses, death certificates, ”said Matt Pincus, director of government affairs at the National Association of State Chief Information Officers.

RELATED: Learn how to create an effective incident response plan.

This creates growing concerns for people, who may think, “I will not be able to go to school, I will not be able to get treatment in a hospital, I will not be able to do anything with my condition or my government. local, ”Pincus says.

Traditionally, malicious actors have demanded a ransom in exchange for decryption; The CISA guidelines explain that threats have evolved to become “more destructive and more impactful”. Today, a growing number of hackers are exfiltrating data, including personally identifiable information, and threatening to sell or disclose it if organizations don’t pay.

“Malicious actors are evolving their ransomware tactics to take advantage of unpatched systems, lack of network segmentation, and trust relationships within systems,” Rohner explains.

TO EXPLORE: Ransomware and phishing remain the top cybersecurity concerns for agencies.

Cyber ​​hygiene is essential to the security of the agency

In NASCIO’s latest report on its annual survey of state CIOs, respondents overwhelmingly cited ransomware attacks as their top concern for government continuity. Twenty percent said their state has experienced a cyber incident since the pandemic-induced switch to remote working, coupled with the increasing adoption of new technologies, which has increased the risk to state systems, the government said. report.

NASCIO fully supports the measures outlined in the CISA guidelines, said Pincus, who underscored the federal agency’s recommendation to implement a user education and training program on cybersecurity.

“I can’t tell you how important this is to state CIOs,” he says. “A lot of cybersecurity and ransomware attacks all happen because of human error. You click on a link, and guess what? You have compromised your entire state network. You have compromised your entire local government.

MORE FROM STATETECH: How to fight ransomware with a unified approach to IT modernization.

Adopt a “pan-state approach” to cybersecurity

Pincus says states likely already have these types of safeguards in place, but he advises officials to also work with local government agencies, such as school districts and hospitals, on cybersecurity security.

“I think it boils down to what we call a ‘holistic approach’, which is every state agency, every local government agency, the National Guard, CISA – everyone has a role to play,” he says. .

This is happening in states like North Carolina, where officials formed a joint cybersecurity task force in 2018 that includes several state departments and the National Guard. It is also home to the North Carolina Local Government Information Systems Association, which deploys trained response team members to jurisdictions experiencing cybersecurity incidents to help provide free response and recovery resources. The National Guard offers free services such as vulnerability assessments and employee training that counties can also take advantage of.

“There are a number of different opportunities that can be exploited locally: engaging in strong cyber hygiene, strong passwords,” says Rob Main, North Carolina’s new chief risk officer. “Often you can implement MFA at no cost depending on your current network operating environment. “

It all goes back to user training, according to Main. “It kind of follows the ‘See something, say something’ pattern,” he says,

Rohner of CISA says these proactive measures are essential because “the battle against ransomware doesn’t start the day you get hit.”

]]> 0
Prokeep presents the messaging app for the construction industry Wed, 03 Nov 2021 19:41:24 +0000

Prokeep introduced an upgrade to its popular SMS application for managing supplier-to-customer communications. Five new high-demand features will allow distributors to expand the channels used by customers to connect with them, enrich relationships and build new ones.

  • No longer just to send SMS

Prokeep has upgraded its original text-only app to a multi-channel mobile messaging solution. Send or receive messages from any cell phone. This multi-channel capability increases productivity, enriches the customer service experience and builds customer loyalty.

“Finally, counter staff and their teams can get away from their desks while working with a client. Check stock, send a photo or product code, monitor your inbox and send notifications from anywhere, ”explains the co-founder and head of the Prokeep customer team. Jack Carrere.

  • Internal messaging connects everyone

Prokeep’s new internal messaging opens communication between all staff, branch to branch, representative to representative or manager to employee within the same system as external customers. Team members can also search for past conversations.

“It’s time for companies to move away from buying separate systems for internal and external communication. It takes up valuable time and risks losing important information or context, ”Carrere adds.

  • Announcements to all

A powerful new announcements tool allows one-to-many messages to be delivered to promote new products, announce trainings or communicate changes in store opening hours. Distributors can even catalyze new conversations with customers by announcing urgent opportunities to add an on-time order for a truck already scheduled for delivery nearby, generating new, last-minute business.

Spam? Certainly not! This broadcast messaging feature works from a dedicated phone line, which minimizes the possibility of being flagged as spam as can promotional email. Customers can respond to broadcast messages individually and distributors can respond directly. You can also pre-program the output of these messages.

Prokeep’s new application programming interface (API) automatically sends a text when triggered by a company’s third-party software or system. These programmable texts can communicate on order status, shipping information, receipts, contact details, etc.

  • Connect with your website

For those with online customers, Prokeep’s new Web Connect feature will provide faster response times to customer inquiries and leads submitted online. Customers can submit questions through the website and connect directly with the same over-the-counter salesperson they typically know and see on a daily basis. Web Connect protects businesses from spam messages by blocking fake phone numbers.

Discover the new Martech Cube podcast. For more updates like this, follow us on Google News Martech News

]]> 0
Australia’s largest bank integrates Bitcoin into the app Wed, 03 Nov 2021 11:01:08 +0000

Australia’s largest bank is said to have started with Bitcoin (BTC). The Commonwealth Bank wants to integrate cryptocurrency into its online environment.

According to the Australian Financial Review, the bank will offer a number of services. Starting with buying and holding bitcoin and other “digital assets”. From next year, Commonwealth Bank customers should be able to buy and store bitcoin at the bank.

Buy Bitcoin easily and quickly on Bitvavo. Go ahead and pay no trading fees for your first purchase up to € 1,000!

Customers simply need a button on their app to buy bitcoin. It doesn’t appear that bitcoin can be withdrawn directly as well, the service seems to be aimed at people who want to get exposure to bitcoin but don’t want to store it themselves.

The Commonwealth Bank has been around since 1911, so it’s a relatively old institution. It is not without reason that they are cooperating with other parties to launch this service on the ground.

The bank has checked with Gemini about its services as a custodian. Chainalysis has been contacted to analyze cash flow in order to ward off unwanted customers.


Commercial banks around the world are increasingly aware of the value of bitcoin. And that value to them isn’t in the ideology or the Bitcoin protocol, it’s just a way for banks to make more money.

Billions of dollars are traded every day on various exchanges around the world. The banks also want to take advantage of it. They see the cryptocurrency exchange turning out to be huge transformations. As a bank, you usually want to take advantage of this.

Not all commercial banks will do something with bitcoin. However, there is a clear trend: more and more banks are trying to occupy a place in this new financial world.

]]> 0