Security System

4 things that will make your kitchen Safe and Secure

Our home should be a safe place, and therefore all the rooms that comprise it should also be. However, it is inevitable that there are certain hazards or areas of greater risk than others, especially when small children live in homes. That is why safety in the kitchen is so important , and this is one of the rooms that can hide the most dangers for our crazy little ones.

When there are children at home, the dangers multiply, and that is their inexhaustible curiosity and restlessness, makes them want to see everything, touch it, know it, discover everything hidden in the corners of our house and add it to their arsenal of utensils for to play. However, it is we who must try to curb this. Not because we want to limit them and inhibit them in their curiosity and in their eagerness for games, but because in the kitchen they can find themselves with infinite dangers that can become serious problems if they result in an accident.

secure kitchen

It’s better to prevent than to cure. Surely you have heard this statement many times, especially when our mother told us. ” Take an aspirin that looks like you’re running out ,” or ” Take the umbrella that looks like it’s going to rain.”

Well, security is the same. Sometimes, it is true that for many precautions we take, there are accidents that are practically inevitable and beyond our control, but it is true that there are many others that are in our hands to avoid, and it is as easy to do as to take some precautions basic .

Lock functions

When it comes to taking precautions, we could find hundreds of things to protect our kids, but it is not about being extremists but about being practical and attacking where we know it is an area of ??greatest risk.

In short, with a series of basic precautions that we could summarize in 4 tips, we can make our kitchen a much safer place.

In the kitchen there are many utensils and most of them sharp, therefore, the first point to avoid would be not to leave within your reach knives or sharp objects with which they can be damaged.

There are also plugs, which we also use frequently, since many of the devices we use regularly need to be connected to the light. Well, another measure to adopt would be to plug those plugs when we are not using them.

And if there is something that abounds in our kitchen and that is a source of risk, they are appliances, and also, more and more frequently both their design and their connectivity, they become objects very desired by the little ones, since they see us constantly interact with them, which arouses their curiosity and their desire to want to touch them too.

For this reason it is essential that, when choosing our appliances, we take into account the security measures that are incorporated for the smallest of the house, such as the blocking function .

Any type of appliance can incorporate this function, from the plate, the oven, the dishwasher, the washer or dryer to the iron. All these appliances can become very dangerous in the innocent hands of our children and that is why it is so important that they have anti-child systems.

Anti child systems

It must be recognized that said: anti-child system, it sounds even a bit ugly, but I assure you that these systems can avoid more than a scare. For some appliances such as the washing machine or the dishwasher for example, it can serve us more than to prevent an accident, so that you have control of the appliance at all times and that your children cannot themselves turn them on or modify the program while they are running.

But in the case of ovens, plates, or irons, these safe or anti-child systems can be of great help to avoid accidents such as burns that can be very serious. These systems allow you, for example, to block the oven door, or to have your iron disconnect automatically when it does not detect your hand. This way you can also avoid leaving it on carelessly.

As you can see, with these basic precautions in your kitchen, you can make it a much less dangerous place for your children.

Accessories Security System

Bluetooth, a flaw endangers your devices

A Bluetooth vulnerability would allow cybercriminals to track the activity of fitness tracker wearers or use Apple devices

Together with Wi-Fi, Bluetooth is undoubtedly the best known and most used wireless connection. Now present on any type of device (from smartphones to smart bulbs, via wireless speaker, smartwatch and fitness tracker) it is extremely versatile and allows you to connect two devices without consuming too much energy.

Despite the widespread use (or perhaps because of this), it sometimes happens that hackers are able to discover, and exploit for their sinister purposes, the flaws of the Bluetooth firmware . The last one, for example, was announced just a few hours ago by a group of researchers at Boston University. In particular, it is a vulnerability that affects some of the most widespread fitness trackers on the market, giving the possibility to some hackers to identify with great precision the position of the wearer or the user of the device .

wireless speaker

The flaw in the Bluetooth connection

As mentioned, the Bluetooth vulnerability identified by Boston University would allow third parties to determine the user’s position , sensitive information, especially in the hands of a possible stalker. The flaw in the Bluetooth connection is linked to the mode A in which it is determined and managed the connection between two devices.

When this happens, one of the two devices takes on a “central” role, managing the technical aspects of communication. In particular, what in jargon is called “master” assigns to the other device (called “slave”) a sort of address to send data packets to. To protect users, this address is changed at regular intervals , in order to make the communication anonymous. Or at least try it. Thanks to a complex algorithm, in fact, it is possible to go back to the original address and trace, thus, all the activities and data sent.

Bluetooth risk: the devices involved

According to allegations made by analysts and researchers, the Android device would not be affected by the vulnerability a while are at the real risk devices Applee Windows 10. But the risk to have to be particularly careful are the FitBit users, because the devices dedicated to the fitness of the house in San Francisco they are not able to update their unique addresses thus becoming easy prey for any bad guys.

Accessories Security System

Wireless mouse and keyboard alarms: may be hacked

Computer researcher Marcus Mengs has discovered security flaws that affect wireless keyboards and mice and endanger our data

If you have a wireless mouse or keyboard then be very careful: they could become the front door for viruses or malware and in a few minutes a hacker could use them to enter your PC and steal all your data , as well as destroy them.

The alarm comes from the researcher Marcus Mengs, who explains how the problem lies mainly in some security flaws of the dongle (the small USB key used to send input from mice and keyboards, but also pointers for presentations and other devices). Although the flaw was found on Logitech devices, it would be a generalized alarm, not related to a specific product or brand: Meng did not do specific tests, but also other wireless pointing devices, equipped with the same chip but produced by other brands , they could be vulnerable.

Wireless mouse and keyboard alarms

Because wireless mice and keyboards are dangerous

Mengs found that during the pairing phase between the pointing device and the dongle, a hacker could get in the way and enter our system. At that point he could do anything: send us viruses or steal data, for example. The vulnerabilities found by Marcus Meng are a total of seven and not for all there is already a security patch.

The indicted dongles

According to Mengs the vulnerabilities have an impact on all Logitech USB dongles that use the proprietary 2.4 GHz ” Unifying ” radio technology , whose first version dates back to 2009. The dongles are often found with wireless keyboards, mice, clickers for presentations and trackballs.

The 2016 MouseJack

It is not the first time that security flaws are discovered in wireless dongles for pointing devices. Already in 2016 another researcher, Marc Newlin, discovered the vulnerability that then became famous with the name of “MouseJack”. It was a flaw very similar to those discovered by Marcus Meng, a sign that the wireless connection applied to mice and keyboards can be very dangerous. Also because, and this is particularly serious, Mengs has discovered that in the market there are still devices vulnerable to the MouseJack of 2016. And this, as will be understood, multiplies the number of potentially attackable devices.

Camera Security System

Gateway and security camera all in one: Xiaomi security camera that also controls home gadgets

Xiaomi announces a security camera that also controls home gadgets
There are product ranges in which Xiaomi already has more than a dozen of them in the market. Some of them are headphones or mobile phones, but security cameras are another of Xiaomi’s specialties. The last one that they have launched to the market not only can be placed easily on any metallic surface, but also serves as a gateway to control all the smart devices of the home.

Xiaomi Aqara Smart Camera G2

This camera, the Aqara Smart Camera G2 (Gateway Edition) has a magnetic base , thanks to which we can place it on any metal surface, like the door of a refrigerator. In addition, it includes a metal plate with 3M sticker to be able to place it in any position that we want.

In terms of image quality, we find a Full HD 1080p resolution thanks to its 2 MP sensor , which also has night vision thanks to eight infrared lights of 940 nm with a range of up to 8 meters away. It has a viewing angle of 140 degrees, compensating for the fact that it can not be rotated.

Another of the most interesting peculiarities of this camera is that it has ZigBee 3.0 connectivity to make Gateway with all the smart gadgets of Xiaomi home, such as temperature sensors. As regards WiFi, it is only compatible with the 2.4 GHz band. It is possible to store the recorded images in the SD, in the cloud, or in the NAS. It has intelligent alarm mode to avoid false positives.

It also supports Mijia to create intelligent scenes

Xiaomi announces a security camera that also controls home gadgets
The camera has compatibility with Mijia, which implies that it is compatible with voice control and with the integration of the Xiaomi AI to create intelligent scenes and other functions. For example, we can see the camera in real time on the mobile through the app or play videos. In the application you can also send short videos of up to 15 seconds to the family by pressing the button of the camera itself for three seconds.

Its price is 249 RMB, about 33 euros to change, and will be on sale next March 26. While it is not the cheapest camera of Xiaomi, it is one of the smartest that have been released to the market. The only one sold officially in Spain is the Xiaomi Mi Home Security Camera 360 for 39.99 euros , which is also rotatable 360, along with a 1080p version compatible with Google Assistant and Alexa.

Mobile Apps Security System

What is bloatware and how to remove it from your Android mobile

Samsung-Galaxy-S9 bloatwareYou turn on the mobile that you just bought, and you see that the application drawer is full of applications that you have not installed or probably use during the entire time you have the phone. That is the bloatware.

Although manufacturers are increasingly benevolent with users and little by little many have been leaving aside the habit of flooding the software of their phones of all kinds of applications , there are still those who refuse to part with these add-ons. that a good part of its users demonstrate not having the desire to use them.

But not all bloatware is bad, though. And the one that is, can usually be uninstalled without too many problems. In this guide we explain everything you need to know about Android bloatware, and how to eliminate it forever.

What is bloatware?

At the beginning of the article I was referring to bloatware as pre-installed applications on a device from the day you buy it.

Broadly speaking it is true, but usually the term bloatware refers to all that “filler” software, which comes pre-installed in the operating system of the device, occupying and consuming resources without providing obvious benefits for users .

Therefore, it would not be correct to name the application of system adjustments as pre-installed on all Android phones, as well as an option within the settings that, for example, can be used to analyze installed apps in search of virus despite the fact that Android already includes a tool of this type through Google Play called Play Protect, as it has been shown on more than one occasion that it is not necessary to have an antivirus installed on Android.

And is that the “junk software” or “filler” is not reduced only to applications. We can also find options, added in the system settings, modules or components of the user interface that, despite not providing any value , are there occupying space, consuming resources such as memory or battery, or simply messing up the experience with the device.

Therefore, what could we consider “good bloatware“? All those applications or additions that, despite not being essential for the operation of the system or the device, do contribute a real utility or are there to improve the user experience . Applications that do not come by default in AOSP as a file explorer, a video player or a gallery application, would be examples of truly useful pre-installed apps , as long as they do not exceed the limit of incorporating more functions than necessary.

How to remove the bloatware from your Android mobile?

But there is good news: the bloatware can be deleted. Some manufacturers offer the ability to disable or disable pre-installed applications. While this may be a solution to get rid of the bloatware, we must bear in mind that the deactivation of the apps consists of eliminating the installation of the application itself, keeping the installer package so that, in the future, it can be recovered.

The most drastic and effective way to get rid of bloatware is, therefore, to uninstall those applications pre-installed in the system by the manufacturer . The simplest way to do it is, logically, uninstalling the app as usual through the system settings. However, it is not always possible, and it is in this situation that a more effective solution must be resorted to :

Remove the bloatware without root: Uninstall applications

You do not need superuser permissions on your mobile in order to remove the bloatware. Just a USB cable, and a computer with the ADB drivers installed on it . If you meet the requirements, these are the steps you must follow:

  1. First, activate the USB debugging of the phone and connect it to the computer.
  2. Now, open a command window -CMD or Terminal- on the computer.
  3. To verify that the phone has connected successfully, execute the “adb devices” command. The identification number of the device must appear in the command window.
  4. On the computer, enter the “adb shell” instruction.
  5. To list all the applications pre-installed by the device manufacturer, you must execute the command “pm list packages | grep ‘brand’ “. For example, pm list packages | grep ‘samsung’.
  6. To delete a specific application, enter the command “pm uninstall -k – -user 0 packagename”. For example pm uninstall -k – -user 0 “.
  7. Repeat the previous step with all the apps you want to uninstall.

The only bad thing about this solution is that it only allows you to eliminate specific applications , and not added in the phone software as options within the menu of settings or elements of the interface. Luckily, this type of additions, despite being annoying, do not usually consume as many resources as system applications do.

Security System Tips and Guide

What is ethical hacking?

Through ethical hacking , computer security knowledge is used to test systems, networks or electronic devices, looking for all those vulnerabilities that can be exploited to take those measures that avoid putting our system at risk
A specialist in ethical hacking must know how to determine the risks of the devices or components that are within their reach in order to strengthen their protection and evaluate the possible assets, threats or vulnerabilities.
Despite the negative connotations that the media have given to the term Hacker, the truth is that this type of professionals in the field of computer security use all their skills and knowledge to identify and efficiently manage possible security breaches that may arise in a company or system.

Ethical hacking and cybersecurity

You could say that ethical hacking is a tool for data protection and prevention. Precisely, what is tried is to stay several steps ahead of those who try to attack us with attacks carried out by computer experts and who have been trained in the criminal mentality of the hackers themselves, as well as in the different techniques of digital attack .

Through ethical hacking , computer security knowledge is used to test systems, networks or electronic devices, looking for all those vulnerabilities that can be exploited to take those measures that avoid putting our system at risk.

In this sense, an ethical hacker , in the field of cybersecurity carries out so-called penetration tests or “tests” to detect vulnerabilities that may affect the system such as bad configurations, using all the knowledge they have to your disposition Once the situation has been analyzed, these professionals will be responsible for sending a report on the situation so that appropriate measures are taken.

However, in order for all of these actions to be truly effective, it is very important that at the business level awareness is raised about the importance of computer security.

At this time, information is presented as one of the most important assets for the company, whether we talk about banking transactions or databases. All these assets are managed from computerized systems. However, a misuse of them can be presented as a weak point for companies and, logically, a favorable point for competing companies.

The companies that most often see their information security compromised are related to financial systems. On the other hand, we can also find very diverse cases of industrial espionage in which, through hacking, we try to locate the weak point of the competition in order to take full advantage of all this information.