See Latest Way How to get Get More than 10gb Data For Free on All networks Mtn, Airtel, 9mobile and Glo L ftast For 1 Month


Dent Free Data. DENT App for IOS and Android is an application that allows you to send mobile data, top-up and earn free data no matter the country you are from. The App is designed by DENT Wireless Company.

DENT DATA: Yes it is real, I know many people must have heard of this app, working very well as at the time of publishing this post. Note it's for all network.

It’s a trusted app for Android and IOS users with over One Million downloads as at the time of writing this article. With this app, you can get free data to browse the internet.
This app also has what is called dent coin which allows you to top-up your data at anytime you want. Immediately you download the dent Apk App or dent ios app you get 540 dent coin as a welcome bonus which you can use to buy atleast 1gb worth of Data. The app is available for worldwide download.

How To Earn Free Data With Dent Wireless App

  • The app has different methods to earn free data. It has referrals link that you can share with friends when any of your friend download with your referral link you instantly earn 540 dents coin. And same goes for your friend.
  • Another way is, you earn 540 free dent coin immediately after downloading the app and register by entering some details about you, e.g Your mobile phone number.
  • Dent They are community that reward members with dent coins for doing daily task for their sponsors, like taking survey

How To Download Dent App Android and IOS

  • Android users can download the dent wireless app from google play store for free. dent download google play
  • IOS users can download the app from the AppStore for free. Download IOS
  • Launch the app and enter your mobile phone number
  • Instantly a verification code will be sent to the mobile phone number, type in the code and proceed
  • Connect and authorize your social account with it, or connect google account
  • Immediately you complete your registration, you’ll receive 50 dents, which you can use to get free data
  • To earn more dent coin, copy your referral link and share with friends. The more you invite the more dents you earn.

See the notification of just purchased data from dents apps below;


I will show you, simple trick on how you can even earn7 more data, upto 10GiG of Data for a month, let hit straight.

Step 1:
Just click this link to install the app and sign up with your number and you gyet your data instantly. You get a bonus of 650 Dent which you can redeem to buy data worth 250mb.

Download App Here from Play store

STEP 2:
You get more Data by simple referring friends. Yes you earn 320 Dent for each referrer.

1151 dent will give you 1.5gig for a month.



Step 3:
Here comes the big trick, I’ll show you how you can get more referrer bonus by just referring yourself.. Yes so sweet you can refer yourself for as long as you want…
Click Here to see the trick on how to get unlimited coin.

Let’s go there. Download App Here from Play store 

Update: You can drop your mobile number below using the 'Comment Box' and specify your network name. I will purchase Dent Data with my Coins and transfer to your number for free.


What Is X-Ray Spectroscopy?



X-ray spectroscopy is a technique that detects and measures photons, or particles of light, that have wavelengths in the X-ray portion of the electromagnetic spectrum. It's used to help scientists understand the chemical and elemental properties of an object.
There are several different X-ray spectroscopy methods that are used in many disciplines of science and technology, including archaeology, astronomy and engineering. These methods can be used independently or together to create a more complete picture of the material or object being analyzed.
Wilhelm Conrad Röntgen, a German physicist, was awarded the first Nobel Prize in physics in 1901 for his discovery of X-rays in 1895. His new technology was quickly put to use by other scientists and physicians, according to the SLAC National Accelerator Laboratory.
Charles Barkla, a British physicist, conducted research between 1906 and 1908 that led to his discovery that X-rays could be characteristic of individual substances. His work also earned him a Nobel Prize in physics, but not until in 1917.
The use of X-ray spectroscopy actually began a bit earlier, in 1912, starting with a father-and-son team of British physicists, William Henry Bragg and William Lawrence Bragg. They used spectroscopy to study how X-ray radiation interacted with atoms within crystals. Their technique, called X-ray crystallography, was made the standard in the field by the following year and they won the Nobel Prize in physics in 1915.
In the early 1900s, William Henry Bragg (here) and his son, William Lawrence Bragg, were the first use X-ray spectroscopy to study how X-ray radiation interacted with atoms within crystals.
When an atom is unstable or is bombarded with high-energy particles, its electrons transition from one energy level to another. As the electrons adjust, the element absorbs and releases high-energy X-ray photons in a way that's characteristic of atoms that make up that particular chemical element. X-ray spectroscopy measures those changes in energy, which allows scientists to identify elements and understand how the atoms within various materials interact.
There are two main X-ray spectroscopy techniques: wavelength-dispersive X-ray spectroscopy (WDXS) and energy-dispersive X-ray spectroscopy (EDXS). WDXS measures the X-rays of a single wavelength that are diffracted by a crystal. EDXS measures the X-ray radiation emitted by electrons stimulated by a high-energy source of charged particles.
In both techniques, how the radiation is dispersed indicates the atomic structure of the material and therefore, the elements within the object being analyzed.
X-rays are high-frequency waves on the electromagnetic spectrum.
X-rays are high-frequency waves on the electromagnetic spectrum.
Credit: Shutterstock
Today, X-ray spectroscopy is used in many areas of science and technology, including archaeology, astronomy, engineering and health.
Anthropologists and archaeologists are able to discover hidden information about the ancient artifacts and remains they find by analyzing them with X-ray spectroscopy. For example, Lee Sharpe, associate professor of chemistry at Grinnell College in Iowa, and his colleagues, used a method called X-ray fluorescence (XRF) spectroscopy to identify the origin of obsidian arrowheads made by prehistoric people in the North American Southwest. The team published its results in October 2018 in the Journal of Archaeological Science: Reports.
X-ray spectroscopy also helps astrophysicists learn more about how objects in space work. For example, researchers from Washington University in St. Louis plan to observe X-rays that come from cosmic objects, such as black holes, to learn more about their characteristics. The team, led by Henric Krawczynski, an experimental and theoretical astrophysicist, plans to launch a type of X-ray spectrometer called an X-ray polarimeter. Beginning in December 2018, the instrument will be suspended in Earth's atmosphere by a long-duration, helium-filled balloon.
Yury Gogotsi, a chemist and materials engineer at Drexel University in Pennsylvania, creates spray-on antennas and water-desalination membranes with materials analyzed by X-ray spectroscopy.
The invisible spray-on antennas are only a few dozen nanometers thick but are able to transmit and direct radio waves. A technique called X-ray absorption spectroscopy (XAS) helps ensure that the composition of the incredibly thin material is correct and helps determine the conductivity. “High metallic conductivity is required for good performance of antennas, so we have to closely monitor the material,” Gogotsi said.
Gogotsi and his colleagues also use X-ray spectroscopy to analyze the surface chemistry of complex membranes that desalinate water by filtering out specific ions, such as sodium.
The use of X-ray spectroscopy can also be found in several areas of medical research and practice, such as in modern CT scan machines. Collecting X-ray absorption spectra during CT scans (via photon counting or spectral CT scanner) can provide more detailed information and contrast about what is going on inside the body, with lower radiation doses from the X-rays and less or no need for using contrast materials (dyes), according to Phuong-Anh T. Duong, director of CT at Emory University Department of Radiology and Imaging Sciences in Georgia.

How to Dry Out a Phone

We help you fix your water-damaged tech


If your non-waterproof phone has accidentally got wet, DO NOT TRY TO USE IT. Take it out the water and turn it off.
Remove the SIM and any other accessible parts, then rub it dry on a towel or sleeve. Give it a gentle shake to remove any water from its ports. 
Then follow our advice below to fix a water-damaged phone.

Many phones are not user-accessible, and the only way to get to the internals is often through the screen. You probably don't want to do that, because you're going to invalidate your warranty and potentially break your device. Of course, the up side to this is that those devices are typically less prone to water damage. 

How to dry out a wet phone

How to dry out a phone: fix a wet iPhone, Apple Watch or mobile device
You know how you put a tiny cup of rice in a saucepan full of water and before you know it you have enough to feed the 5,000? That's because rice is amazing at sucking up water. Grab a big bowl, then into the bowl goes your wet phone and enough rice to adequately cover it. Now forget about it for 24 hours. 
Only when the time is up should you reassemble your now hopefully dry device and attempt to switch it on. If it doesn't work, stick it back in the rice and try again the following day. On the third or fourth unsuccessful attempt you should begin to consider noting the time of death.  
You could also substitute rice for silica gel (you'll probably find some packets of this in the box for the last pair of trainers you bought).  
If you have a nice warm airing cupboard in your house, leaving your device in there for a day or three could help draw out the unwanted moisture. The key word here, though, is 'warm': avoid anything 'hot'.

How not to dry out a wet phone 

  • Do not put a water-damaged phone in the tumble dryer (even if it's inside a sock or a pillow case)
  • Do not leave your wet phone on the radiator
  • Do not heat up your wet phone with a hair dryer
  • Do not put your wet phone in the freezer
If it's a wet iPhone you're trying to dry and you are planning to flutter your eyelids in an Apple Store in hope that someone will take pity on you, at least tell them the truth: with internal liquid detectors inside iOS devices they will know that your iPhone got wet. They won't, however, know the difference between whether it was dropped in a toilet or a bath, so you can keep that one to yourself.

How many views are required to earn 1 dollar by AdSense on YouTube?

Around $1-5
YouTube revenue depends on a lot of things. Let us list down some of the most important ones below.
Niche means the broad category of your video. For example, a video on insurance will get more revenue then photoshop videos on youtube. This is because advertisers pay a large amount for insurance niche.
High bid rate keywords are related to the high revenue niches. If you want to earn maximum per 1000 views, you should probably use google keyword planner to know which keywords are having high bid rate.
Ad type is an another deciding factor. YouTube allows non-skippable instream video ads, skippable true view ads, InVideo or overlay ads, display ads etc.
  • Non-skippable instream video ads are usually 15-20 seconds long. They are sold as per cost per mile (CPM). These ads play either at the beginning, end or during the video play. YouTube pays around 3$ – 7$ for this kind of ad per 1000 views.
  • Skippable true view ads may be up to 30 seconds long. However, one can skip after 5 seconds. Here advertisers pay for whole ad view or for first 30 seconds. This is a good option for the publishers who allow their viewers to decide whether to view the ad. This way you will not loose your potential subscribers. You will have low video bounce rate.
  • InVideo or overlay ads appear on the button of the youtube video. It gets populated as an overlay to the video. The viewer can close the ad by clicking the cross symbol on the top right corner of the ad. YouTube pays when someone clicks on these type of ads.
  • Display ads are default ads on youtube. YouTube pay the publishers per 1000 impressions of this type of ad.

Telcos, banks in denial as SIM swap fraudsters empty accounts



SIM cards
Telecommunications operators and commercial banks are denying involvement in SIM swap frauds as Nigerians continue to lose millions of naira to fraudsters who use mobile numbers and short codes to empty unsuspecting victims’ bank accounts.
SIM-swap fraud, is a type of phishing fraud that poses a serious threat to customer and bank security.
The fraudster obtains an individual’s banking details through phishing techniques or by purchasing these from organised crime networks.
Gbolahan Awonuga, executive secretary, Association of Licensed Telecoms Companies of Nigeria (ALTON), said that telcos should not be blamed for losing cash to fraudsters through SIM swap.
Awonuga, who spoke at the inauguration of the newly elected executives of Industry Consumer Advisory Forum (ICAF), said that victims should blame their banks for whatever happened to the money kept in the custody of the banks.
But the banks on their parts have also washed their hands.
The Nigerian Communications Commission (NCC), on the other hand said, investigation is ongoing to unravel those involved in the fraud.
Mrs Felicia Onwuegbuchulam, director, Consumer Affairs Bureau, NCC, “We have received a lot of complaints on how fraudsters are using mobile numbers to remove money from their bank accounts,”? she said.
“Though the money is not in their custody, we are not exonerating the telecom operators until we conclude our investigations. We believe there may be a connivance of telecom staff in all these crimes. Why should a subscriber’s line go off at the time fraud is about to be committed on their accounts?”
Onwuegbuchulam said to arrive at a holistic solution to the issue of frauds, the Commission has scheduled a meeting with the Central Bank of Nigeria (CBN) and all security agencies in the country.
But Bernard Okoye, an ICT expert has insisted that telcos are complicity.
Okoye also fingered insiders in banks arguing “this kind of fraud is only possible with the help of an insider in the network operator of the subscriber that is targeted”
He wondered why operators are hesitant to to block numbers being used by the fraudsters, even when such numbers are reported to them (the network operators).

The evolving threat landscape – What to look out for in 2019


Security is an industry obsessed with measurements.
And as 2018 ends, it naturally becomes the time to takestock of the year that was—the threats that have changed the face of cybersecurity, the evolution of attacks and, more importantly, the learnings for 2019.
SophosLabs researchers evaluate the changes in the threat landscape every year, uncovering trends and seeking to understand their impact to the cybersecurity market moving forward. Here’s what we found in the SophosLabs 2019 Threat Report
Attackers are getting personal
The attack vectors used by cybercriminals are evolving. Over the past five years, we’ve witnessed a barrage of ‘spray and pray’ automated attacks. Attackers have built up a repertoire of automation, increasingly using artificial intelligence and machine learning, in an attempt to rapidly attack their targets. Automation has taken various forms—from the weaponisation of word documents, to phishing emails (as we’ve seen in Australia with fake AGLand Medicare emails making the rounds).
With automated attacks, once a business realises an email contains something malicious, it can take steps to block it. This usually will include increasing security (i.e. spam filters) and improving internal security practices. As a result of increased awareness and the predictable nature of automated attacks, cybercriminals are moving towards highly targeted, manual attack methods, which will be a key trend shaping the security industry into 2019.
An example of this is the SamSam ransomware, for which two men were recently indicted. Instead of using mass spamming techniques, the SamSam orchestrators (SamSammers) identified networks where there was a security hole, such as a remote access portal with a guessable password. Attackers make their way onto a network and once in, they escalate their own privileges and spread a payload laterally across the network; a sleeper cell that lays in wait until ready to begin encrypting. This manual attack method has earned its creators a whopping US$6.5 million in three years.
“Living off the land” is the new law of the land 
Most malware continues to be designed to run exclusively on Windows computers (this is not news). But what is interesting is how cybercriminals are abusing legitimate admin tools on the Windows operating system’s (OS)—such as PowerShell, WMI and Windows Scripting Host—to evade detection and bring a new wave of attacks to victims.
Living off the land is a simple strategy, and it’s hard to detect. In recent years, protections such as disabling macros inside documents or using preview mode have blunted this technique. However, criminals are fighting back and have developed methods to encourage users to enable their attacks.
As a result, the scope of what one might consider a dangerous file has expanded over the past two years to encompass a wide range of Windows file types, not all of which are executables. When used in conjunction with malicious email messages, these file types are often encased in compressed file formats, such as .zip files, and may also be password protected to further thwart automatic detection.
Mobile and IoT malware is not slowing down
As internet users transition from desktop computers and laptops to mobile and the Internet of Things (IoT), so too are cybercriminals. We’re seeing that users of mobile devices are increasingly subject to malicious activity that’s pushing malware apps to their phones, tablets and other devices running Android and iOS. The favoured tactic of cybercriminals is to sneak malicious apps past Google’s Play Store and Apple’s App Store. Other popular tactics include:
1.    Cryptominers – Cryptominers can be hidden as a function inside another innocent-looking app, making it difficult for users to notice their device’s processor straining under the load.
2.    Advertising click fraud – Like cryptomining, this is embedded inside apps that simulate users clicking ads to generate revenue. The negative for users is the same —battery and process drain—while advertisers are charged for useless clicks and the cost of online advertising is driven up.
3.    Supply chain compromise – Earlier this year, SophosLabs researchers discovered a legitimate app supplied as part of the stock firmware of a small phone maker that had been ‘Trojanised’ in the supply chain, before anyone purchased the device.
Similarly, as IoT becomes more embedded in our daily lives, cybercriminals are unleashing new ways to hijack and compromise these devices.
A popular method among attackers is to hijack IoT devices to use as nodes in massive botnets. These botnets are then leveraged in distributed denial-of-service (DDoS) attacks, as well as for cryptomining and network infiltration activities. Attacks such as these are difficult to detect as it’s rarely apparent that the device is affected—until something has gone wrong on the network.
Over the last two years there has been significant growth in the volume of attacks targeting IoT devices. It’s highly likely that the IoT target list will continue to expand to include database servers, commercial-grade routers and internet-connected CCTV systems.
What should Australian businesses remember?
Of the malicious cyber incidents reported under the Notifiable Data Breaches (NDB) scheme between 1 July and 30 September 2018, the tactics were varied—spanning phishing, brute-force attack, compromised or stolen credentials, malware, hacking and ransomware.
The Office of the Australian Information Commissioner’s NDB quarterly statistics reports are consistent with what Sophos is seeing. Phishing is getting worse, brute-force attacks are stable, and even with the SamSammers behind bars, copy cats will rise up and fill the hole.
Ransomware has dipped—it accounted for just three per cent of cyber incidents reported under the NDB scheme in this period. Cybercriminals have built up a repertoire of attacks making ransomware less needed. Ransomware is noisy, threatening and most people are trained not to pay—making it a last resort.
But this doesn’t mean ransomware is going away. Over the last year, many of the worst manual ransomware attacks started when the attacker discovered that an administrator had opened a hole in the firewall for a Windows computer’s remote desktop. Closing these easy loopholes goes a long way to preventing ransomware attacks.
Malicious spam is a primary vector of malware with email messages most commonly the source of bad links and attachments. At the very least, organisations need to be aware that malware may leverage files that aren’t typically considered dangerous, like Office documents, to start the infection process. Educate employees about the risk of email, how to spot a bad link and the importance of validating files before opening them.
Practice the security fundamentals such as using a password manager and never reusing passwords. Change the default administrator passwords on things like home routers, modems and network-attached storage servers and add a passcode or password pattern to phones. For administrators, it’s vital to keep up to date with operating system patches and app or software updates, which so frequently provide the means of attack to criminals.
And finally, use multi-factor authentication for everything you can use it for. Multi-factor authentication is an amazingly effective tool for preventing the abuse of stolen credentials. For organisations not using it now, you should be.
For 2019, my best advice? Stay mindful and practice reflexive distrust of unknown files, messages or links.

Chrome 71 is out: swats 43 bugs and clamps down on bad ads

Google will pay out at least $59,000 to researchers for reporting dozens of security bugs found in Chrome version 70 and prior. 
Google has released the stable version of Chrome 71 for Windows, Mac and Linux with 43 security fixes, including a patch for Site Isolation, an important feature for minimizing the risk of malicious websites using the Spectre flaws affecting CPUs from Intel, AMD, Arm and others. 
Chrome 71 expands Google’s move against sites with “abusive experiences” that pushed Chrome users to sites they don’t want to visit. Previous approaches included a pop-up blocker and restricting autoplay videos, while last year’s efforts aimed to prevent surprise redirectsthrough links and buttons on a site. 
Chrome 71 closes an apparent loophole in its Google’s previous clampdown by removing all ads on the fraction of sites with “persistent abusive experiences”. 
Google was targeting ads of the type commonly used by tech support scams, such as ads displaying system warnings and bogus “close” buttons. Google decided to tackle ads after discovering that nearly all of the  abusive experiences it was missing to date relied on bad ads. 
Chrome 71 also cracks down on vague information available when users are inputting information on subscription pages. In November Google said millions of Chrome users see mobile pages with poor information about subscriptions. 
As of this version, Chrome will show a warning before users enter a page where billing information is required. The warnings target pages that allow users to subscribe by typing in their phone number, resulting in charges to the user’s mobile subscription. 
The latest version of Chrome also fixes 13 high severity flaws in Chrome 70 and earlier, including bugs that affect the browser’s V8 JavaScript engine, its PDF engine, and the Blink rendering engine.   
The highest single payout was made for a medium seventy issue concerning “inappropriate implementation in Site Isolation”. 
Site Isolation was one of the key Chrome mitigations for JavaScript threats posed by the Spectre CPU side channel flaws, which could allow an attacker to leak information from one tab to another by accessing memory that should be isolated. It was introduced in Chrome 67. Browsers were potentially exposed because they can run JavaScript from several websites in the same process.  

How to Fix PC Crashing and Reboot a Crashed Laptop Running Windows 10/8.1/8/7?

Step 1. Burn a Boot CD/DVD or USB Drive

To fix crashed laptop running Windows OS, download Windows Boot Genius and install it in any Windows computer. Launch the program. In the main interface, follow the tutorial specifically to make a Windows repair CD/DVD or USB drive.
Note: Please prepare a blank CD/DVD or USB drive in advance.
laptop crashes on startup

Step 2. Boot Crashed Laptop from CD/DVD or USB Drive

Here we take USB drive for instance. Insert the newly created USB drive to the crashed laptop. Restart the computer, Press F12, Delete to get into BIOS Setting Utility. Please change your laptop to boot from USB drive, not from the internal hard drive.
fix laptop crash

Step 3. Fix Crashed Laptop

When you get into the system successfully, you will see the icon of Windows Boot Genius. Click it to run the program. In the Home screen, please select the Windows Rescue module. Here you will see various repair tools. Please fix your computer under the guide there step by step with all tiny utilities.
laptop crashed
Laptop crash error can't be ignored. If you leave the problem unchecked, your laptop will always crash. Windows Boot Genius can fix any Windows pc crashing, such as Windows 7 computer crashed, Windows XP/Vista/8/8.1 pc crashing, etc. The tool aslo works for any computer brands based on Windows operation system, including:
Samsung laptopHP laptopSony laptopDell laptop
Acer laptopAsus laptopToshiba laptopFujitsu laptop

Supermicro third-party motherboard audit finds no spy chips

Supermicro says the review of its motherboards has not turned up malicious chips as reported by Bloomberg in October. 
The report claimed that some of the servers with compromised Supermicro motherboards ended up in Apple and Amazon datacenters. Both companies strongly denied ever having identified malicious chips on their servers. 
Supermicro several times refuted claims that Chinese spies had compromised its manufacturing process to put implants in hardware bound for the US that gave Beijing secret access to US networks. 
The company in October announced it would carry out a third-party review of its equipment to assure customers its hardware didn’t contain Chinese implants. 
Charles Liang, CEO of Supermicro, said in a letter to customers today that the third-party investigations firm had tested a representative sample of its motherboards, including the types mentioned in the Bloomberg piece that were purchased by Amazon and Appl
“After thorough examination and a range of functional tests, the investigation found absolutely no evidence of malicious hardware on our motherboards,” wrote Liang. 
“These findings were no surprise to us. As we have stated repeatedly, our process is designed to protect the integrity and reliability of our products”. 
Liang also thanked Apple and AWS for their support in responding to the initial Bloomberg report and a follow up story that claimed to present new evidence of compromised Supermicro hardware in a US telecoms company.     
Apple CEO Tim Cook, Liang and AWS boss Andy Jassy called on Bloomberg to retract the story, which it has declined to do. 
Liang also thanked the Department of Homeland Security, the Director of National Intelligence and FBI Director Christopher Wray who toldlawmakers to “be careful what you read” when asked about Bloomberg’s allegations. 
“Today’s announcement should lay to rest the unwarranted accusations made about Supermicro’s motherboards,” said Liang.

Innovative anti-phishing app comes to iPhones

Apple, iOS, iPhone, iPad, security, MetaCertWe’re always told never to click on a link we receive in an email in case doing so takes us to some dodgy phishing site where our account details are violated. But what if our email app warned us before we clicked malicious links?

Can this app protect against phishing attempts?

MetaCert isn’t fully available yet, but it does seem to be a promising solution that provides email users in enterprise and consumer markets an additional line of defense against clicking on malicious links received in email messages.
The solution emerged from the developer’s earlier work building an API to help app developers add a layer of security to WebView.
It relies on two principal databases that are regularly updated:
  • An extensive collection of known phishing email addresses
  • A collection of known addresses for the services phishers often like to spoof, places like PayPal, online retailers, banks, and so on
In the future, the company will be implementing blockchain technology across its systems — that’s an essential step that should enable users to verify whether websites and emails that are being alerted as threats actually are threats, rather than items accidentally added to the phishing warning lists.

How MetaCert works

When you receive an email, MetaCert will check the message against its databases.
It will then flag emails inside your email app as follows:
  • A red shield warns the link goes to a known phishing site.
  • A grey shield states it is unrecognized.
  • A green means the link should be safe to use.
If you do accidentally click a recognizably malicious link, you will be taken to a warning page before you reach the bad website.

Privacy concerns

There is a negative side to how the app works, which most users must be certain they understand. This is in order for this to work, the system must analyze your emails, which means messages must pass through MetaCert's servers.
This process means you must give the service permission to handle your messages, and (on iOS devices) you will be required to create an application-specific password that gives this software permission to access and analyze your messages.
The company says it doesn’t store your emails, but permitting third-party access in this way may be a red flag for some potential users, particularly in regulated industries.
There are other solutions that provide anti-phishing protection, such as those from Avira (which costs a few dollars each month). MetaCert is currently available for free, but it is planned will become a paid service.

Other cautions

You can’t be completely reliant on services like these.
Common sense matters; just because your security system tells you something is safe, it doesn’t mean you should abandon your own scrutiny and common sense.
A grey shield alert doesn’t necessarily mean a link is safe; it means you should double check the link before you click.

Final thoughts

Phishing attacks are becoming far more sophisticated, targeted and professional, with approximately 76 percent of enterprises admitting to experiencing them in the past year. Further, the security environment continues to become more complex for both enterprise and consumer users.
Traditional security protection systems such as virus checkers and firewalls are still mandatory, but they are far less effective against the complex attack scenarios prevalent in today's digital economy.
When it comes to enterprise security, network monitoring, location-based protection and cooperative sharing of security-related datasets are becoming key components of switched-on, 24/7, situation-awareness security protection systems. Within this landscape, MetaCert’s system seems a useful adjunct to existing systems.
I imagine we’ll see this kind of alert-based security systems become components of future operating systems in the future, certainly within those from vendors that actually care about customer security, and privacy, come to that.
On iOS, this new solution works with most email services, including Thunderbird and Apple Mail, with Outlook and Gmail support in development. The company is running a public beta test, so you can test this system for yourself.

Microsoft Teams gains ground on Slack

slack face off2Two years after its launch, Microsoft Teams is outpacing team chat rival Slack – largely thanks to Teams’ free availability as part of Office 365 subscriptions. That’s according to a survey of 900 IT decision makers in North America and Europe conducted by Spiceworks. 
The results indicate that Teams is now the second most popular business chat app and is used by 21% of respondents, up from 3% in a similar Spiceworks survey in 2016. That ranks it ahead of third-place Slack, the popular standalone team chat tool in use by 15% of businesses polled. (That represents a slight increase from 13% in 2016.)
The most popular tool is another Microsoft app, Skype for Business. It’s used by 44% of surveyed businesses, up from 36% two years ago. Another rival, Google Hangouts (now Google Hangouts Chat), meanwhile, saw use drop to 11%, from 16% two years ago. Facebook’s Workplace remained at 1%, while stats for Cisco’s Webex Teams (formerly Cisco Spark) were not provided. 
Furthermore, the Spiceworks report claims that Teams is set for the fastest growth of all business chat apps over the next two years. The survey indicates that 41% of respondents expect to use Teams by 2020, compared to 18% for Slack. 
Credit for Microsoft Teams’ growth lies in its availability within Office 365 subscriptions. The office productivity suite is used by 155 million businesses worldwide, thus putting Teams in the hands of a massive audience. 
“The rise in use of Microsoft Teams is likely influenced by the fact that it’s available at no additional cost to Office 365 users,” Spiceworks wrote in a company blog post. “And considering more than half of businesses use Office 365, it’s enticing organizations to give Teams a try.” 
Teams was unveiled in 2016 as a rival to Slack, and has since been placed at the core of Microsoft’s communication and collaboration strategy, replacing Skype for Business Online over time. Microsoft has also launched a free version of Teams in a bid to attract a user base outside of Office 365 subscribers.
Teams is now used by 329,000 organizations worldwide, Microsoft said during this year’s Ignite conference, up from 125,000 a year ago. “That is about twice the rate [of growth] that we see from Slack,” said Frank Shaw, Microsoft’s corporate vice president of communications ahead of the conference.
That said, the Spiceworks report and Microsoft’s statistics show only part of the picture; actual usage rates are less solid. 
Microsoft has not provided total daily active user figures for Teams, unlike Slack, which touts 8 million daily active users, including 3 million paid users. Slack declined to comment on the Spiceworks report.
According to Spiceworks, Skype for Business and Microsoft Teams are most frequently used by large and mid-sized businesses, while Slack is commonly deployed by smaller organizations. 
It also shows that, while email is still the most popular workplace communication tool (used by 99% of respondents), overall demand for business chat apps continues to grow. Adoption is highest among large organizations (70%, compared to 53% in 2016), followed by mid-size firms (61%, up from 38% two years ago) and finally, small businesses (58%, up from 42%).

5 reasons to remain skeptical about 5G in 2019

5G 2019
Have you heard? Some vaguely defined but super-snazzy-sounding thing called 5G is, like, totally coming to knock your socks off any second now. It's gonna speed up your phone, revolutionize your productivity, and probably even lower your cholesterol.
Okay, so maybe some of that is pure poppycock. But you know what? So is the very idea that 5G is anything an average person should get excited about — or consider adopting — in the coming year.
You'd be forgiven for thinking otherwise. After all, the mobile tech marketing machine has been revving up considerably over these past few weeks, pushing out all sorts of spectacular-sounding narratives about how 5G is going to change the way we work, live, and lather. (Again, at least one of those items is my own nonsensical creation, but I'd argue that all of them are equally absurd.)
Lemme tell ya: You can safely ignore all that hype — regardless of who or what is spewing it. The reality is that 5G is going to be a slow-moving progression that's more menace than messiah for the foreseeable future. And as an educated tech observer, you'd be well-advised to watch it from a distance without investing an ounce of your own money or mobile tech energy in the effort.
Let's break down the reasons, shall we?

1. Limited availability of 5G networks

No matter how much the carriers may crow, 5G is going to be extraordinarily limited in real-world application for 2019 — and likely even further down the road than that. Remember when 4G first came along and how long it took for that to mean much of anything outside of a few select areas? By all counts, we'll be looking at an even more extreme version of that reality with the 5G rollout.
The data says it all: AT&T, which is generally seen as leading the 5G charge in these (allegedly) United States of ours, is planning to have just 19 cities up and running with 5G by the end of 2019. Nineteen cities. By the end of 2019. And that doesn't even tell the whole story.
By its very nature, y'see, 5G is a short-range technology. The estimated range of an average 5G tower is a mere third of a mile, as my fellow skeptic Steven J. Vaughan-Nichols pointed out earlier this year. Compare that to a 4G tower, which can spread its connectivity-love as far as 30 miles (and sometimes even more), and you can see the sort of difference we're facing.
What that ultimately means is that 5G, in its current incarnation, will require a lot of towers for just a little bit of reach. The issue is compounded by the fact that the signals also have a tough time making their way through walls, signs, salamanders, and other interfering objects.
If we feed that data into the nearest Carrier Marketing Nonsense Translation Machine, what we get back is this: Setting up 5G in a city is going to be slow and expensive, and when someone says 5G is "coming to a city" in 2019, what they really mean is that it's "coming only to a handful of isolated areas within the city" — not that it'll be widely available throughout the entire place.
Beyond that, it seems quite possible that the speeds themselves won't even be consistent from one area to the next. As the maker of AT&T's first 5G hotspot told The Verge: "It varies market to market — some markets, they may have a couple hundred megabits of bandwidth ... [while] others can go all the way up to 5Gbps."
Oh, and one other factor to keep in mind: The nature of these new 5G towers is raising fresh concerns over cancer risks — to the point that one Bay Area city has actually blocked the installation of such structures until their safety can be further evaluated. Whatever you want to say about the health risk itself, that sort of concern and resulting resistance sure isn't gonna speed things up any when it comes to network deployment.

2. Expensive service

You know what mobile carriers simply adore? Any reason to charge you more money. And you know what the big, bold, ad-ready concept of 5G gives 'em? Yup, you guessed it: a perfect reason to ask you to cough up extra shekels.
And you'd better believe they're gonna be hopping on the opportunity. Already, AT&T is hinting strongly that we should be ready to open up our wallets if we wanna do the 5G dance.
"I don't think you can think about it as we think about pricing today," AT&T's senior vice president of vague foreboding statements — er, sorry, of wireless product marketing — told CNET at a lavish Hawaii media event held by Qualcomm last week. "That paradigm has to shift."
A Verizon exec echoed the sentiment, telling the site: "Verizon believes customers will pay for utility and value. There will be that, definitely, in 5G." ("Verizon also believes most customers will pay whatever we put on their bills without asking questions," he forgot to add with a cackle.)
Getting a bit more specific, AT&T's consumer wireless chief is quoted as saying the company is considering "different tiers of service" for its 5G plans — including, apparently, the possibility of having separate pricing tiers for different types of activities you might perform on a device. Lovely, no?
And Sprint, not to be outdone, explicitly told investors to expect healthy price hikes with its 5G service. Specifically: "We're going to have a lot of room to increase our price of unlimited to get to similar prices as Verizon and AT&T in the future. ... We're looking at 5G as an amazing opportunity for the company not only for the position of the company, but also to charge for the blazing fast speeds."
I somehow suspect that line won't make it into the ads.

3. Limited and expensive device options

Network availability aside, remember that the vast majority of phones aren't even going to support 5G in 2019. Such support will be more the exception than the rule, with a small number of 5G-capable devices popping up — and, naturally, coming with elevated prices of their own.
OnePlus's CEO has estimated that 5G phones could cost you a cool $200 to $300 more than their non-5G counterparts. Other companies are being a bit more coy and seem to be doing a delicate dance around the subject without technically saying they won't charge an arm and a leg for the 5G "privilege."
For example, when asked by CNET about the possibility of having higher prices for a 5G phone, Samsung's SVP of mobile said: "If you generate enough value [in the phone], then consumers will be ready to pay." (He may or may not have followed that remark with an exaggerated wink.)
Qualcomm's president, meanwhile, compared the coming cost increase to the jump we saw when first moving from 3G to 4G phones. He noted that things would "get cheaper with scale," saying: "You have to start somewhere."
Well, they have to start somewhere, anyway. You don't.

4. A lack of cross-carrier compatibility

It took years to get here, but we've finally reached a point where it's possible to buy an unlocked phone and use it on almost any network you want. That freedom is what allows devices like Google's Pixel phones or the various OnePlus products to exist and what allows us as purchasers of said devices to get our gadgets wherever we want and take them wherever we go — without the carrier middleman meddling in our affairs and keeping us chained to their cells, as they did for so long.
Well, with 5G, expect that luxury to fade away. For now, at least, every carrier seems to be adopting its own 5G standard — both within the U.S. and elsewhere in the world — and that means any 5G phone you buy in 2019 will likely be limited to working on one carrier's network and nothing more.
On a broader and even more troubling level, that means unlocked phones — like, y'know, the ones sold by Google and OnePlus — probably won't come with the same level of automatic universal compatibility they now enjoy once 5G is in the equation. And I don't even want to think about what it'll be like to try to travel internationally with a 5G phone, particularly as the networks evolve and the standards continue to shift.

5. Devices with compromises and short shelf-lives

Speaking of device-related downsides, does the name HTC Thunderbolt ring a bell? The Thunderbolt was the first Verizon 4G device, released way back in the ancient era of 2011. It was, to put it nicely, a steaming hot mess.
Now, some of the Thunderbolt's woes were likely the fault of HTC and unrelated to anything about the device's "first!" network bragging right. But when it comes to the phone's legendarily bad battery life and connectivity issues, it's hard not to suspect that early and not-yet-perfected 4G configuration was at least in part to blame.
I'm certainly no psychic — heck, I don't even have a crystal ball — but given recent history and what we generally know about how quickly mobile tech evolves, I'd sure be hesitant to pick up one of the first 5G phones. It doesn't seem like a stretch to say those devices are likely to sport serious compromises in areas like battery life, given the new and unrefined nature of these 5G network connections. And then there's the field of form and design: Already, the fickle nature of 5G connectivity is requiring device-makers to come up with some funky modifications to work around antenna requirements and keep a device's signal from being blocked by a user's hands. (For the love of all things holy, let's hope we don't end up in another "holding it wrong" scenario.)
At best, the early 5G phones are going to become outdated quickly as standards coalesce and the tech surrounding them is adapted to better handle the requirements. At a time when it's becoming increasingly superfluous to buy a new smartphone every year — or even every two years, if you plan wisely — dropping extra dough on a phone that's likely to be dated in a matter of months (and with little resale value, at that, particularly given the limited carrier compatibility) doesn't seem like the most advisable move.
All considered, the smart strategy for now is to treat 5G for what it is: an incredibly early, almost experimental kind of connection that's nowhere near ready for prime time. Watch it from afar and see how things develop — and keep your skepticism guard up high as the hype machine gets ready to kick into high gear.
We'll meet back here at the end of 2019 to see how things are shaping up and reassess from there. Until then, keep your G-level firmly grounded at four and your wallet firmly tucked into your trousers. Despite what certain forces will be working overtime to make you believe, this is one game where hesitation is an asset — and where waiting is the only move to make.