Skip to Content

Blogs Blogs

Chromebooks that also run Windows 10 may be in the works



Dual-booting — AKA having two operating systems on the same computer — might be landing on a Chromebook near you.


As spotted by the online software development community XDA Developers, it appears the software team behind Chrome OS has been working on "Campfire," a feature that would enable dual-booting with Windows 10. Google has not spoken about this in any official way, but on a open Chrome OS forum run by Google, sometimes future tools are worked on in the public eye. 


Campfire wouldn't just support higher-end Chrome OS devices like the Pixelbook but also Chromebooks from Acer, HP, and Lenovo. While these code snippets don't outline all the specifications, it would be a safe bet that only Intel-based Chromebooks (like the Pixelbook) could handle the dual-booting.


Read more

Tech giants face hefty fines under Australia cyber laws

Tech companies could face fines of up to A$10 million (US$7.3 million) if they fail to hand over customer information or data to Australian police under tough cyber laws unveiled Tuesday.


Encryption within messaging apps has become a major headache for law enforcement agencies AFP/JUSTIN SULLIVAN


SYDNEY: Tech companies could face fines of up to Aus$10 million (US$7.3 million) if they fail to hand over customer information or data to Australian police under tough cyber laws unveiled Tuesday (Aug 14).


The government is updating its communication laws to compel local and international providers to co-operate with law enforcement agencies, saying criminals were using technology, including encryption, to hide their activities.

Read more

Strengthening Resilience with Business Continuity Management



Cyber threats, data breaches, unplanned outages and security incidents threaten business continuity. To ensure effective mitigation and quick recovery, there is great demand for T-shaped infocomm talent well-versed in the principles of Business Continuity Management (BCM).


Aptly, the 10th annual conference of SCS Business Continuity (BC) Chapter on 10 April 2018 was themed: “Leveraging BCM for Preparedness and Industry Transformation”. The topic reinforced the importance of levelling up the industry’s state of preparedness and boosting corporate resilience in support of industry transformation. Besides featuring eminent speakers from both public and private sectors, the conference also saw the active engagement of over 130 BC practitioners, cloud professionals, risk managers and C-suite executives.



How to Travel Safe in the Digital Age


How to Travel Safe in the Digital Age



 For me, I make sure to observe the following rules every time I travel.



Instead of choosing bags for aesthetic reasons, opt for a plain bag to avoid unwanted attention. Also, make sure the material is sturdy enough to weather the journey and any attempts to pry it open. In my case, while my custom ultra-strong composite fabric carrier never wins any compliments from hipsters, it is not just water and cut proof, but also very functional. Similarly, I keep my mobile gadgets in old and beaten cases to make them look like they are way overdue for an upgrade. You might be surprised but these gadgets are highly targeted for both their resale value and the information inside.



It is estimated that less than half of the phones, and even fewer laptops, are encrypted globally. But there is really no excuse for not doing it since most modern operating systems have intuitive one-click encryption options, which doesn’t take a tech geek to turn on. That said, it’s possible to get hacked even with a strong encryption. WiFi Pineapple is one such platform. Cheap, easy to set up and allows anyone to execute a “man in the middle” attack to collect information passing through, WiFi Pineapple is like a regular hotspot that has been modified to execute network attacks. Therefore, get a local SIM card the next time you travel. Most countries today have decent 3G or 4G networks.



The “man in the middle” attacks are also prevalent in credit card payments. Although wireless payments present much convenience, they also allow thieves to perform undetected near-field communication (NFC) micro-charges. It is also not uncommon for hackers to attach fake microchips on top of real ones to fake terminal transactions.


Actually attacks are not always technically sophisticated. I recall a time when I made payment to a shop attendant in one of the less secure airports. She claimed that the closest terminal was in another store and disappeared with my card for a good 10 minutes. I only realised much later that she had charged expenses to my account. Luckily, the loss was not too high.


Long story short – use cash or services, like Uber, which can automatically charge based on your preferred payment method.



Surprisingly, even the most adept tech professional may be susceptible to simple tricks such as video recordings of one typing passwords on phones and laptops. All it takes is a password to access a service such as email and a door will be created for hackers to access other resources. Hence, if you have to work on the go, find a private corner and always use protective screens. Password aggregators can also make logins more convenient and secure.


Feel free to try out some of my rules the next time you hit the road. Combine them with some common sense, and your journey might just become safer as well as more pleasant and productive.

What the rumors say about Google’s upcoming Pixel 3


Now that the Note 9’s all good and official, it’s time to move onto the next major smartphone. The Google Pixel 3 leaks haven’t quite hit the fever pitch we saw with Samsung’s device ahead of launch — though there’s still time. After all, it seems likely the latest version of Google’s flagship Android handset won’t officially be official until October.


Even so, we’ve already seen a handful of credible links, including a full unboxing last week, so we’re starting to develop a pretty good picture of what we’re in for with the device.


For starters, there’s what looks to be a pretty sizable top notch. That Google would embrace the notch this time around is no surprise, really. In additional to being all the rage on practically every non-Samsung flagship, Google made a big deal of making Android Pie notch-friendly.


Read more