Hot on the heels of the iPhone 12 launch, Google has sent out invites for a live stream event on October 15th at 12PM PT/ 3PM ET (3AM GMT+8/MST) called Search On. Google is looking to highlight how the company is applying the power of AI to help the people to understand the world better.
Source: Google
The event was announced through a brief tweet that revealed little about the virtual event. However, given the company’s focus, you can expect that the search giant will be updating the world, particularly developers, of the new features, services, and products from Google. More interestingly, Google is expected to update the world on how it is updating Search.
The event will be one of a series that has taken the place of I/O this year. The Their events have, in the past, had a singular focus – focusing on Assistant, Maps, and so on; so we are expecting that the search giant will be focusing their keynote on the advancements they will be introducing to Search.
Google is something that we use now nearly on a daily basis. G Suite is one of the largest known services for corporations in the digital space. G Suite is their email, their document system, their storage, and much more. It seems though that Google is not too happy with the name G Suite. G Suite now is called Google Workspace.
Google Workspace is not that much different from G Suite though. It is G Suite rebranded after all. There is still a difference however. In the coming weeks, users will get to see new four color icons for Gmail which including Calendar, Meet, Drive and collaborative content creation tools like Docs, Sheets and Slides. All this in lieu of Google Workspace’s commitment to build immersive communication and collaborations experiences from Google.
There are new features to Google Workspace too. First, you can save time by switching between apps and tabs to still manage to preview the content of a link without leaving the original document. The new features of Smart chips in Docs, Sheets and Slides is that names will automatically popup when you mention someone in a document. The new feature allows you to instantly share documents with whoever you need to share your documents with, when you need to.
Working remotely is difficult enough. You cannot possibly communicate with each other effectively without a meeting face-to-face. Not so with Google Workspace. Google Workspace enables users to work on a single document within a chat room. You can chat with your collaborators while typing things out in the documents. As long as you are not childish, this should go smoothly. In the coming months, you can even get to see the person you collaborate with on the same document with picture-in-picture feature.
The biggest impact of Google Workspace is in the education and non-profit organisation sectors. In the coming months G Suite tools like Classroom, Assignments, Gmail, Calendar, Drive, Docs, Sheets, Neet, and Slides for education will be available for free. Of course, there are some limitations to G Suite for Education.
Source: Google
Google’s Google Workspace interface and rebrand is effective immediately. The “new home for work” tool is now available only for business customers. Still, Google is planning to roll out the service to end-users as well. If you have not seen any changes in your G Suite yet, you will see the four colour icon in the coming weeks. More information on Google’s Workspace website.
The question of ‘hackability’ and the overall security of our smartphones is one of those issues that seems to pop up in the news. After all, we use our smartphones for just about anything – sharing photos, ordering food, shopping online, sending emails and messages, banking and financial services, etc. – without realising all of the ways we could be putting our device and ourselves at risk, allowing cyber-criminals to get access to our sensitive data.
While many of us are better informed today about the potential dangers of being connected on our smartphones, hackers and cyber-criminals are also changing their methods of attack. As the global pandemic have left many of us stuck at home and more reliant than ever on our mobile devices, cyber-criminals have also adapted new ways to target users. Over the Movement Control Order (MCO), cybersecurity cases spiked by 82.5% compared to the same time last year, with 18% attributed to attacks against local companies and the remaining linked to home users and others[1].
Recognising Cyberattacks and the Need for Cyber-resilience
Among the new waves of attacks brought on by the pandemic are COVID-19 themed phishing lures, high-risk fake domains, and scams[2]. These new methods employed by cyber-criminals are aimed at taking advantage of the public fear of the virus, combined with heightened stress levels from unfamiliar ways of working. The most common attacks in Malaysia can be attributed to phishing attempts, the spread of malicious code via untrustworthy websites, and passwords, as below:
Phishing Emails – Reports have found that 91% of all attacks begin with a phishing email to an unsuspecting victim, with 32% of all successful breaches involve the use of phishing techniques[3]. While many of us have been educated on recognising phishing emails, these attacks are still effective, and can fool even tech-savvy individuals.
Malicious Websites – Compromised websites is a main avenue for spreading malware infections on mobile devices. Limiting your browsing activity to reputable websites can reduce the possibility of infection.
Password Security – A survey revealed that 59% of respondents use the same password for multiple accounts, citing convenience and a fear of forgetting their password as the reason for this practice[4]. However, this allows cyber-criminals to access all your accounts easily through one single credential. Therefore, it is advisable to use different passwords across accounts.
Cyberattacks continue to grow day-by-day, and it is crucial that we learn to minimise risk, with good cyber habits being a pivotal and essential first step in combatting threats.
Defending your Smartphone, the Moment it is Turned On
As such, while it is important to take steps and measures to protect yourself online, it is also crucial to have a strong security platform on your smartphone, helping you encrypt and secure confidential data. Most smartphone breaches happen because they may not be equipped with advanced security measures, have outdated systems that may not be able to withstand current attacks. Similarly, smartphone owners may also not consider the importance of securing their phones or performing regular security check-ups. However, there are certain devices that come with a safe and secure in-built mobile interface to keep your personal data protected.
For example, Samsung Knox sets a foundation of security to users at both the hardware and software level as a security platform that’s integrated within Samsung smartphones, tablets, and wearables to protect it against malicious threats. Whether it is protection against phishing attacks or potential malware infections, the Samsung Knox platform has security integrated into its DNA, providing multi-layered security with data encryption and run-time protection within Samsung devices to keep sensitive information safe from online threats. Users can safeguard passwords, save private files under a secured folder, and even secure mobile transactions with Samsung Knox. Getting to know your security platforms is just as important when considering the range of services that is available to ensure that it is updated to meet global information and technology security requirements. This helps its users stay ahead of the modern-day threats with its game-changing security features.
Given that smartphone usage has only grown exponentially over the past few years, it is important that we have more security platforms allowing us the freedom and peace-of-mind in staying connected. Similar to how Samsung Knox have.
On top of having a top-tier security platform for your data, having that protection extended to all the essentials in a mobile device is equally important. While many of us are familiar with installing apps on our phones, we may be unfamiliar with the authenticity of the sources producing these apps. Learning to identify unverified and suspicious sources can help users identify potentially harmful apps.
Similar to how Samsung devices come built-in with Google Mobile Services (GMS) to help ensure that your vital applications have the latest updates and patches from verified sources, using trusted sources from well-known app stores like Google Play can help protect you from downloading and installing apps that can harm your devices.
Staying Secure, Safe, and Savvy about Security
Cyberattacks are nothing new, the challenge is in identifying and combatting the updated approach that many cybercriminals are using when it comes to their targets and the frequency of their attacks. Whether it is a hacking attempt by a third-party app or a fraud email redirecting you to a malicious website, most cybercriminals have one common goal: exploit your personal data and use that data to make profit. As such, it is critical that we keep our sensitive information protected at all costs, with the help of a smartphone built with highly advanced security features to always keep you safe from unwanted threats.
The techENT Download is back for another exciting week in tech! This week’s tech news round up has everything from dramatic reveals, painful hacks to sad cancellations!
The current pandemic has spurred the need for video conferencing platforms as more and more people look for options to meet while keeping in line with the increasing number of lockdowns around the world. Popular video conferencing platform, Zoom, was propelled into the limelight thanks to this. However, after being embattled in a privacy controversy, people are looking for alternatives.
Google is stepping up to the plate by offering their Google Meet platform for free starting next week. Google Meet isn’t something new from the tech company, in fact, many of their government, corporate and education users already use it for patient consultations, meetings and classes.
Google Meet will also not need users to download separate apps on laptops and desktops. It is able to run natively on Google Chrome, Microsoft Edge, Mozilla Firefox and other modern browsers. Google claims that this makes the service more secure. It is also already available on the Google Play Store and Apple App Store.
Google is promising a more secured experience when it comes to using Google Meet. The company highlights that it has created a strong set of host controls; allowing hosts to deny entry to meetings and even remove participants. In addition, participants will need to have a google account to enter or use the service and more complex meetings code help deter unknowns.
Apple and Google found themselves at odds with Governments when it came to how data should be handled in their Contact Tracing API.
The OnePlus 8 series found its way to Malaysia. The new Snapdragon685 touting Smartphones are up for pre-order. They are priced starting from MYR2,699.
AMD unveils a new generation of Zen 2 based Ryzen 3 processors.
Facebook had a busy week enhancing Messenger with Messenger Rooms and enabling Group Calls on WhatsApp.
vivo launched their Snapdragon 712 powered V19 in Malaysia. The Quad Camera touting flagship is retailing for MYR1,699.
Netflix scores an new Netflix Original with Pokémon Journeys and sneaks in a new feature on the Android app.
Motorola makes a comeback in the Flagship smartphone market with the new Motorola Edge! Remember to hit that like and subscribe button!
We are on Facebook, Twitter, LinkedIN and Instagram as techenttv, so follow us there!
About two weeks ago, a certain Cupertino based firm and a Mountain View tech giant decided to team up to create something that the world really needs. Apple and Google have decided that they are collaborating to create a framework for contact tracing apps. Singapore responded soon after with a contact tracing app that they are distributing in their own region, ‘TraceTogether’ they call it.
Source: ABC Australia
Following that is Australia, launching their own COVIDSafe app on the Google Play Store and Apple App Store. The app is based on Singapore’s TraceTogether app, which is fundamentally is a voluntary app for users. Basically, the app will allow your device to communicate with other smartphone devices within a certain radius, a sort of “digital handshake”.
It uses your device’s Bluetooth data to trace proximity with another person. Once that is established, the app cross checks your contact list and its own servers to identify infected persons. The app will then notify users if they have been in contact with an infected person for longer than 15 minutes.
There are some security concerns over this of course. You are allowing your smartphone to share its contact information with a server and another device via Bluetooth, which is less than ideal. Still, it will only share these data when you allow the app to do so. The app will also ask for your consent to share your data if you are an infected person or if you have been infected. There are also concerns about more data being shared out with external parties and governments.
Department of Health (Australia)
The Australian government have dismissed that claims and assured its people that the app, though public and open in nature, is secure and save. Any technology that could help with the fight against COVID-19 is a welcome addition after all.
Germany is on a different approach to contact tracing though. Like Google and Apple’s approach to contact tracing, they are prioritising a little bit more privacy. Instead of storing data in a centralised sever, the app will store data only on its devices. We have not seen any implementations on that just yet though, including Google and Apple’s attempt. We should see it soon, and we are quite excited.
For now, we can only wait and see if the app helps or not. Although, in the case of Malaysia, the Movement Control Order has helped with the local efforts in the fight against the virus. Do we still need the app then? What do you think? Let us know in the comments section.
In this week’s Tech & Tonic Podcast, which was also a livestream in the morning, it is just the two of us again. We explored plenty of things that came out last week though. We spoke about the collaboration between Google and Apple. We think that there is going to be a significant long-term benefit to the collaboration for the health care industry.
Apple also launched their brand-new Apple iPhone SE last week. The iPhone SE is meant to be their latest, and most affordable Apple iPhone. It still packs an A13 Bionic processor though, so it comes packing with power.
We also discussed about OnePlus’ new flagship, the OnePlus 8. In that, we spoke about how similar it is to another flagship that was launched earlier this year. Still, it seems like a good flagship contender for 2020.
We finally unboxed the HUAWEI MatePad Pro too (unboxing later this week). We discussed about how we actually liked the device. Of course, without Google’s Mobile Services, we feel that it is a little lacking somehow. Still, we like it.
That brought us to another topic of mobile ecosystems though. Is HUAWEI Mobile Services a good alternative to the Google Play ecosystem? Should you even consider it. We spoke about that, and more in the latest Tech & Tonic!
Sidestepping the first issue which sees Google and Apple aiming to implement their feature directly on a device’s operating system while the NHSX version requires a downloadable dedicated application, this article will focus on the issue of privacy arising from the second issue.
In essence, Apple and Google have insisted that if there is to be any collaboration between the NHSX and them for the purposes of contact tracing the storage of all data will have to be decentralised. The NHSX, on the other hand, is pushing for centralised storage of data.
What’s the difference?
Before deciding on one system or another, it’s best to understand the basics of the distinction between these systems.
A centralised system has a single storage point and controller of the data collected. The central controller of the data may grant access to other users but remains ultimately responsible for the system as a whole. A centralized system is relatively easy to set up and can be developed quickly. Such a system is very useful where continuous modifications to the parameters of the system are expected or where the use of the data needs to be adapted for different purposes.
In contrast, a decentralised system has multiple controllers of data all of whom collect and store copies of the data on their respective systems. This system allows for quicker access to data and less risk of downtime as a fault with one controller will not necessarily affect the others.
The third form known as a distributed system in which there is no single central owner at all and instead gives collective ownership and control to each user on the network is unlikely to be used by either party.
Each system has its advantages and disadvantages and to make a decision between a centralised and a decentralised system the NHS and the tech giants will need to take into consideration a range of issues including:-
The overall effectiveness of the technology;
The adaptability of the system to the shifting demands of research;
The cost of deployment and maintenance;
Whether or not the system is a security risk for the user;
Whether there are compliance concerns.
Why is a decentralised system so important?
Google and Apple have been clear that the reason for a proposed decentralised system is to avoid the risk of mass government surveillance presently or in the future. This is a genuine concern as the data being collected will be directly related to a user’s location and medical history. Although not absent from criticism, this position is the preferred option and has been supported by academics and numerous civil rights groups including the Electronic Frontier Foundation and the American Civil Liberties Union.
Still, the European position is split with the seven governments supporting the project known as the Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT) which proposes a centralised repository of data and a growing following for the Decentralised Privacy-Preserving Proximity Tracing (DP-3T) advocating a decentralised system.
The NHS itself may not be intent on surveillance however being publicly funded draws immediate speculation to its government links. In addition, both the NHS and the UK government have had a poor record of handling large scale IT projects such as the failed £11bn National Programme for IT, scrapped in 2011 and the plans for a paperless NHS by 2018 which could not even take off.
What about the NHS position?
Unfortunately, the focus on privacy risks coupled with the NHS’s bad track record in the field of technology projects have detracted from the core issue at hand – What does the NHS need right now to curb the spread of the Covid-19 virus?
Ross Anderson, an advisor to the NHS on its contact tracing application highlighted the problem with a decentralised system:-
“…on the systems front, decentralised systems are all very nice in theory but are a complete pain in practice as they’re too hard to update. We’re still using Internet infrastructure from 30 years ago (BGP, DNS, SMTP…) because it’s just too hard to change… Relying on cryptography tends to make things even more complex, fragile and hard to change. In the pandemic, the public health folks may have to tweak all sorts of parameters weekly or even daily. You can’t do that with apps on 169 different types of phone and with peer-to-peer communications.”
The Covid-19 virus took approximately 2 months to infect 100,000 UK residents and the spread has shown few signs of a slowing infection rate. Time is critical in this situation and correspondingly, flexibility in adapting to the constantly changing nature of the infection is a necessity. Decentralised systems do not allow for rapid evolution.
In addition, we should consider that unlike centralised systems, decentralised systems are often unencrypted. While trying to prevent a government from carrying out surveillance, the Google and Apple system may inadvertently open itself up to more security problems than expected. In fact, they have themselves admitted this risk stating that nothing is “unhackable”.
As a second consideration, the API that Google and Apple will release will likely have strict limitations on the type of data that may be collected. For example, the NHS would not be able to gather a list of every person a user has been in contact with based on user proximity. Instead, it will utilise a more manual version of contact tracing involving sending every phone in the system a list of other phones that have been reported as contagious, and asking the user whether they have “seen this user” Such a system relies heavily on user verification which is often incorrect or simply disregarded.
Key location data which may be used for developing population flow maps and anticipating the further spread of the virus will likely not be made available under Google and Apple’s current proposal. It is also important to note that data from contact tracing could be used beyond the scope of curbing the spread of the virus i.e. for decisions on directing the flow of emergency aid, development of temporary healthcare facilities, deployment of healthcare equipment and personnel.
What has been going on elsewhere?
Contrasting the UK’s situation, the Asian experience, having less stringent data protection regulations, have taken remarkably different approaches to Europe in general.
Hong Kong, for example, introduced the mandatory use of an electronic wristband connected to a smartphone application to enforce quarantine for arrivals from overseas. Users refusing to adopt this requirement are refused entry into the country.
South Korea won praise for both tracking and publishing data relating to affected person’s travel routes and affected areas, the data being collected through the government’s application as well as numerous independent applications. Residents also receive numerous location-based emergency messages and are not allowed to opt-out of this function.
China’s measures, which have come under considerable question, see a private entity collaboration through the Alipay Health Code. Citizens are given a ‘traffic light’ status that determines the restrictions that will be imposed on them. Although the exact basis for determining a person’s status is not known the status has widespread application including restriction of access to certain public facilities and payment systems.
Privacy concerns of these measures aside, all these countries have seen a considerable reduction in the spread of the Covid-19 virus. While it would be premature to suggest that this is solely attributable to the contact tracing measures implemented there is no doubt that the quick and extensive deployment of the technology has contributed to the battle against the virus’ spread which begs the question:
Is privacy getting in the way?
In 1890, Brandais and Wallace, pioneers of modern day privacy wrote:-
“…To determine in advance of experience the exact line at which the dignity and convenience of the individual must yield to the demands of the public welfare or of private justice would be a difficult task…”
The UK and indeed Europe are at this juncture and need to decide on the cost of the compromise as the death toll and infection rate continue to increase. History reminds us that the greatest privacy and surveillance violations occurred when the world was focused on a raging war and in fact it is times like this that we must be most vigilant about rights.