Ulefone kicks off Summer Sale, up to 69% off

0
[ad_1]

Ulefone has launched its Summer Sale event and is offering discounts of up to 69%. The company’s latest handsets, the Ulefone Armor 25T Pro and Armor 26 Ultra are discounted too. As per usual, the sale is conducted via AliExpress. Ulefone has its store there.

The sale kicked off today and will last until June 23, in case you’re wondering. Various different devices are available. We’ll highlight some of them in this article, while you’ll be able to access the rest via the link below the article.

The Ulefone Summer Sale 2024 is ongoing, and the Armor 25T Pro is one of the discounted devices

The main phone worth highlighting is the Ulefone Armor 25T Pro. This is the company’s flagship which not only comes with thermal imaging and night vision capabilities, but it’s also a rugged phone with a large battery.

Ulefone Armor 25T Pro (1)

This smartphone also delivers 5G connectivity, and it’s usually priced at $499.99. Thanks to this sale, you’ll be able to save up $210. The phone is priced at $289.99 at the moment.

Buy the Ulefone Armor 25T Pro (AliExpress)

The Ulefone Armor 26 Ultra is 40% off

The Ulefone Armor 26 Ultra is also discounted, both its standard and Walkie-Talkie versions. This phone comes with a truly powerful speaker on its back, a speaker that provides 121dB of loudness.

Ulefone Armor 26 Ultra (2)

A gigantic 15,600mAh battery is also included, and the same goes for 120W charging. There is a 200MP camera placed on the back as well. This handset is also referred to as a ‘flagship’ by the company.

The standard model of this phone is priced at $359.99 (40% off), while the Walkie-Talkie model costs $419.99 (40% off).

Buy the Ulefone Armor 26 Ultra (AliExpress)

Buy the Ulefone Armor 26 Ultra Walkie-Talkie (AliExpress)

The company’s best tablet is discounted, and a number of other devices

Armor Pad 3 Pro

If you’re in need of a tablet, the Ulefone Armor Pad 3 Pro can be yours for $279.99. It’s 50% off. The Ulefone Note 18 Ultra is also discounted, as it’s now available for $149.99 (50% off). Check out those phones and all the others via the links below.

Buy the Ulefone Armor Pad 3 Pro (AliExpress)

Buy the Ulefone Note 18 Pro (AliExpress)

Ulefone’s Summer Sale 2024 (AliExpress)


[ad_2]
Source link

Google will push AI features despite slip-ups

0
[ad_1]

Google is one of the biggest AI companies in the world, but that doesn’t mean that its AI is all that good. As powerful as the Gemini-powered products are, they certainly make a bunch of mistakes. Well, the newly-appointed Google Search head said that Google will continue to push AI features despite slip-ups.

No AI tool is without its mishaps, but Google seems to be the company making the most blunders with its tools. Bard’s first hallucination happened when it was unveiled, Gemini’s image generator was making racially inaccurate pictures, and we can’t forget about the whole glue-on-pizza debacle.

Google will launch AI features despite slip-ups

You’d think that, with all of the mess-ups that Google’s AI tools have gone through, the company would slow things down and really make sure that its tools are functional before launching them. Well, you’d think wrong!

The newly-appointed head of Google Search, Liv Reid, spoke to Google’s employees in a company-wide meeting. CNBC was able to obtain audio from the meeting, and it revealed Google’s problematic approach to AI. “It is important that we don’t hold back features just because there might be occasional problems, but more as we find the problems, we address them,” she said. “When we find new problems, we should do the extensive testing but we won’t always find everything and that just means that we respond.”

So, it sounds like she’s suggesting that the company roll out new features and address the problems after they arise. That seems like the company’s plan ever since it launched Bard, so what’s new? Of course, other models have had issues in the past, but when was the last time that a large ChatGPT slip-up made the news? What was the last time DALL-E had to be rolled back due to a massive error?

Google is a large and powerful company, but it’s rushing. How much longer will this go on until people start losing faith in its products? Sure, if users start to lose faith, that’ll be bad, but once investors start to lose faith, that’s when the company might need to panic.


[ad_2]
Source link

Hunt3r Kill3rs Group claims Infiltrated Schneider Electric Systems

0
[ad_1]

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric’s systems in Germany.

The announcement was made via a post on the social media platform Twitter by the account MonThreat, which is known for tracking cyber threats and activities.

Details of the Breach

The Hunt3r Kill3rs group breached Schneider Electric’s systems, potentially compromising sensitive data and critical infrastructure.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

Schneider Electric, a global leader in energy management and automation, has a significant presence in Germany, making this breach particularly concerning for the company and its clients.

The exact nature of the data compromised has not been disclosed, but experts suggest that the breach could have far-reaching implications, given Schneider Electric’s role in managing critical infrastructure.

The company has yet to release an official statement regarding the breach, but sources indicate that an internal investigation is underway.

Cybersecurity experts have expressed alarm over the breach, highlighting the increasing sophistication of cybercriminal groups like Hunt3r Kill3rs.

“This incident underscores the urgent need for robust cybersecurity measures, especially for companies involved in critical infrastructure,” said Dr. Laura Stein, a cybersecurity analyst at the Berlin Institute of Technology.

“The potential fallout from such breaches can be catastrophic, affecting not just the company but also the broader economy and public safety.”

Government Response

In response to the breach, German authorities have initiated a comprehensive review of cybersecurity protocols for companies involved in critical infrastructure.

The Federal Office for Information Security (BSI) has been alerted and is collaborating with Schneider Electric to assess the extent of the breach and mitigate any potential damage.

This incident is a stark reminder of the ever-present threat cybercriminals pose and the need for continuous vigilance and investment in cybersecurity.

As the investigation continues, both Schneider Electric and German authorities are expected to provide further updates

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

Microsoft Recall delayed after privacy and security concerns

0
[ad_1]

Microsoft has announced it will postpone the broadly available preview of the heavily discussed Recall feature for Copilot+ PCs. Copilot+ PCs are personal computers that come equipped with several artificial intelligence (AI) features.

The Recall feature tracks anything from web browsing to voice chats. The idea is that Recall can assist users to reconstruct past activity by taking regular screenshots of a user’s activity and storing them locally. The user would then be able to search the database for anything they’ve seen on their PC.

However, Recall received heavy criticism by security researchers and privacy advocates since it was announced last month. The ensuing discussion saw a lot of contradictory statements. For example, Microsoft claimed that Recall would be disabled by default, while the original documentation said otherwise.

Researchers demonstrated how easy it was to extract and search through Recall snapshots on a compromised system. While some may remark that the compromised system is the problem in that equation—and they are not wrong—Recall would potentially provide an attacker with a lot of information that normally would not be accessible. Basically, it would be a goldmine that spyware and information stealers could easily access and search.

In Microsoft’s own words:

“Recall does not perform content moderation. It will not hide information such as passwords or financial account numbers. That data may be in snapshots that are stored on your device, especially when sites do not follow standard internet protocols like cloaking password entry.”

Microsoft didn’t see the problem, with its vice chair and president, Brad Smith even using Recall as an example to demonstrate how Microsoft is secure during the Committee Hearing: A Cascade of Security Failures: Assessing Microsoft Corporation’s Cybersecurity Shortfalls and the Implications for Homeland Security.

But now things have changed, and Recall will now only be available for participants in the Windows Insider Program (WIP) in the coming weeks, instead of being rolled out to all Copilot+ PC users on June 18 as originally planned.

Another security measure taken only as an afterthought was that users will now have to log into Windows Hello in order to activate Recall and to view your screenshot timeline.

In its blog, Microsoft indicates it will act on the feedback it expects to receive from WIP users.

“This decision is rooted in our commitment to providing a trusted, secure and robust experience for all customers and to seek additional feedback prior to making the feature available to all Copilot+ PC users.”

Our hope is that the WIP community will convince Microsoft to abandon the whole Recall idea. If not, we will make sure to let you know how you can disable it or use it more securely if you wish to do so.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


[ad_2]
Source link

The Zenfone 11 Ultra shows up in a new beautiful color

0
[ad_1]

The ASUS Zenfone series of phones isn’t quite a trailblazer in the smartphone industry, but it’s still a great series of devices. The latest line in the series, the Zenfone 11, launched three months ago, but ASUS isn’t done with new releases. ASUS just launched the Zenfone 11 Ultra (Review) in a beautiful green color.

Feast your eyes on the new green Zenfone 11 Ultra

The official name of this color is called Verdure Green. The word “Verdure” means the greenness of growing vegetation. It has roots (no pun intended) in Anglo-French, and it’s been used since at least the 14th century. While the word’s roots stretch back hundreds of years, the colorway was inspired by something that exists in modern times.

According to the report, this green color was inspired by Central Park, New York City. “Inspired by NYC’s Central Park, this stylish shade blending nature and technology is now part of the Zenfone 11 family.” That’s a quote from the post on the ASUS Twitter account.

Zenfone 11 Ultra Green 2

One notable thing about this color is the fact that the entire back of the phone is clad in this lush green color; this includes the camera bump. The other colors of the phone (Eternal Black, Misty Gray, Skyline Blue, and Desert Sand) have a black camera bump. The Verdure Green colorway stands out by being a complete wash of green.

Zenfone 11 Ultra specs

While ASUS gave this phone a new paint job, everything under the hood is the same. If you pick up this phone, you’re still getting the powerful Snapdragon 8 Gen 3 backed up by 12GB of RAM and 256GB of storage.

The Zenfone 11 Ultra has a 6.78-inch AMOLED display with a 1080p+ resolution. As for the refresh rate, this is a 120Hz display. It’s an LTPO panel, which means that it can drop its refresh rate down to as low as 1Hz.

Moving onto the camera, this phone has a 50MP main camera, and that’s accompanied by a 13MP ultrawide camera and a 32MP telephoto camera. Rounding out the specs, there’s a large 5,500mAh battery with 65W charging (15W wireless charging).

Pick up the Zenfone 11 Ultra – $899


[ad_2]
Source link

ARM’s ‘TIKTAG’ attack affects Google Chrome and Linux systems

0
[ad_1]

Recently, a team of Korean researchers from Samsung, Seoul National University, and Georgia Institute of Technology have tested a new speculative execution attack called TIKTAG. Quite surprisingly, this specially designed attack targets ARM’s Memory Tagging Extension allowing data leakage with a success rate higher than 95%. The practical implications of this discovery are significant as it enables hackers to bypass key protection mechanisms against memory corruption.

Understanding ARM’s memory tagging extension

Integrated as a base option with the ARM v8. Specifically, 5-A architecture, MTE is an enhancement in dealing with the memory corruption problem, which is one of the biggest categories of security issues. Lower overhead tagging is used in MTE with tags in the size of four bits allocated to 16-byte memory blocks. This mechanism helps in ascertaining that the pointer attached to a tag asserts to the tag of the memory region being accessed hence reducing cases of unauthorized memory access and abuse.

MTE, as indicated earlier, exists in three categories namely; synchronous, asynchronous as well as asymmetric and each comes with balanced type of security and performance. Still, the TIKTAG attack highlights system vulnerabilities, showing even top-level protection can be defeated.

ARM's 'TIKTAG' attack affects Google Chrome and Linux systems
Image credit: arxiv.org

The researchers observed two main programs with high efficiency and speed, including TIKTAG-v1 and TIKTAG-v2, which targeted speculation execution to leak MTE memory tags.

TIKTAG-v1: branch prediction and data prefetching

The features used in TIKTAG-v1 include the speculation shrinkage in branch prediction and the data prefetching of the CPU. This gadget has been resistive to the Linux kernel especially in the functions that involve memory speculations. Malicious code alters kernel pointers and uses cache side channels through system call function calls; they then access and measure the states of a cache to obtain memory tags.

tiktag 1
Image credit: arxiv.org

TIKTAG-v2: store-to-load forwarding

TIKTAG-v2 focuses on the store-to-load forwarding in timing speculation of the processor. The first step is storing the value to a memory address and loading it from the same address simultaneously. The value is passed to the next tag, successfully loading and changing the shared cache state. On the other hand, a mismatch prevents the forwarding, the cache state remains in the same state. If attackers examine cache state after speculative execution, they can deduce tag check outcome.

TIKTAG-v2 was proved to be effective against the target vulnerable process – the Google Chrome browser, with an emphasis on the parts including the V8 JavaScript engine: the exploitation of memory corruption vulnerabilities in the renderer process has been shown here in this paper as well.

tiktag 2
Image credit: arxiv.org

Implications and industry response

The leakage of MTE tags is not tied to the leakage of passwords, encryption keys, etc. However, it effectively weakens the security that MTE claims to offer. Therefore, enabling memory corruption attacks that are surreptitious in nature. The field research ended in November and December 2023, with the team submitting findings to the entities. While the general reception has been quite positive, there were no quick Band-Aids immediately applied.

In a technical paper deposited on a repository known as arxiv.org, the researchers suggested several mitigations to counter TIKTAG attacks. First, do not allow speculation to modify cache states after the tag check is done. Second, enclosing speculation barriers (‘sb’ or ‘isb’ instructions) helps prevent executing sensitive memory procedures. Third, pad for additional time between branch instructions and memory accesses with padding instructions.  Finally, enhance the sandboxing strategies to limit the constructiveness proactively of AMAs in sensible memory spaces as securely as possible.

mte bypass
Image credit: arxiv.org

ARM and Chrome’s responses

ARM understood that the TIKTAG attack was very strong and then pointed out that it is still safe to disclose the tags for allocation at the architecture level using speculative methods. Their bulletin stressed that allocation tags are not covert in the address space.

On the other hand, Google Chrome’s security team pointed out these issues but chose not to fix them and noted that the V8 sandbox does not keep memory data and MTE tags secret. Also, as of now, Chrome does not have MTE-based defenses enabled, so fixing the bugs is not urgent.

Although the Pixel 8 device MTE oracles mechanism was later disclosed to the Google Android security team in April 2024 and confirmed as a hardware issue that qualified for a bounty. The attacks could not have been possible without exploitation of the Pixel 8 device’s boot and recovery images.


[ad_2]
Source link

Chrome on Android gains a new “Listen to this page” feature with playback controls

0
[ad_1]

Last year, Google experimented with a read-aloud feature for Chrome on desktop, but it hasn’t been publicly released yet. Now, a similar feature is making its way to Chrome users for Android.

Chrome on Android now includes a feature that allows it to read webpages out loud right from within the app


Google is adding a new feature called “Listen to this page” to the Chrome browser for Android. This feature lets you hear a webpage read aloud, and it includes playback controls similar to those in music or podcast apps. You can pause, change the reading speed, skip forward or backward by 10 seconds, and scrub through the content.

After you choose the “Listen to this page” option, a player will pop up, featuring a progress bar and controls for play/pause, as well as options to skip forward and rewind. At the bottom corners of the player, there are two functions.


On the left side, you can adjust the playback speed from 0.8x to 4x. Meanwhile, the bottom-right corner of the player includes a triple-dot menu where you can access additional settings like Highlight Text & Auto Scroll and Voice.


Yes, you can also tweak the voice and switch up the language. Google’s help page mentions that this feature supports a variety of languages, like English, French, German, Arabic, Hindi, Spanish, Japanese, and more.


To check if you have it, navigate to a text-heavy page, then tap the three-dot menu and look for “Listen to this page,” positioned just below the Translate option.


You can also have Google Assistant read webpages aloud and translate them into other languages at the same time. However, when you choose this option, it switches you from Chrome to the Google app, whereas the new feature lets you stay within your browser.


This feature is particularly handy when you want to catch up on, let’s say, the news while multitasking. Safari for iPhone also offers a similar feature called “Listen to Page,” which reads webpages using Siri’s voice and includes similar controls to Google’s.

 
Google appears to be rolling out this feature gradually with Chrome version 125, so it may take some time before you notice it. If you haven’t received it yet, hang tight — it is on its way.


[ad_2]
Source link

Operation Celestial Force Employing Android & Windows Malware

0
[ad_1]

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting Indian entities.

Since 2018, they have used GravityRAT malware, initially for Windows and later for Android, which has been deployed through malicious documents and social engineering

In 2019, they expanded their toolkit with HeavyLift, a malware loader distributed via fake installers, where each campaign within the operation is managed by custom “GravityAdmin” panels, highlighting the need for user education on cyber hygiene and implementing defense-in-depth security models. 

 Malicious drop site delivering HeavyLift. 

Operation Celestial Force, a cyberespionage campaign targeting Indian entities, uses two main infection vectors: spearphishing emails with malicious documents and social engineering on social media to trick targets into downloading malware.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

The malware suite includes GravityRAT, a remote-access Trojan for Windows and Android, and HeavyLift, a Windows malware loader.

The operators manage these tools with a multi-paneled administrative interface called GravityAdmin. 

Operation Celestial Force’s infection chains

GravityAdmin is a malware framework used to manage various malicious campaigns. The panel binary authenticates users with a server and retrieves a token to communicate with campaign-specific C2 servers. 

Different campaigns target different platforms (Windows and Android) and deploy different malware families (GravityRAT and HeavyLift).

There are infrastructure overlaps between campaigns, such as sharing malicious domains to host payloads or maintaining infected machine lists. 

 Login screen for GravityAdmin titled “Bits Before Bullets.” 

GravityRAT, a multi-platform remote access trojan, first targeted Windows machines but has since expanded to Android devices, which are likely used by Pakistani actors against Indian targets and spread through fake app websites and social media. 

New variants steal user data (SMS, call logs, files), device information (IMEI, location), and even associated email addresses.

The malware communicates with hidden command-and-control servers and can wipe data on infected devices. 

 The group uses Cloudflare service to hide the true location of their C2 servers. 

HeavyLift, an Electron-based malware loader, is disguised as an installer and deployed through social engineering, which communicates with C2 servers to steal system information (including username, MAC address, and OS version) and download malicious payloads. 

These payloads are executed persistently on the compromised system using crontab for macOS and scheduled tasks for Windows. The malware also implements anti-analysis techniques to evade detection in virtual environments.  

The provided Indicators of Compromise (IOCs) by Cisco Talos are hashes of malicious files, domains, and URLs that are associated with Android malware, including HeavyLift, GravityRAT Android, and GravityAdmin. 

The URLs contain suspicious parameters and may be used to exploit vulnerabilities on Android devices, and by checking these IOCs against files, network traffic, and URLs, security researchers can identify potential infections.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

Pixel 9 Pro to include 16GB RAM, Pixel 9 & Pro XL get benchmarked

0
[ad_1]

We’ve seen some rumors in the past claiming that the Pixel 9 Pro will offer 16GB of RAM, and a well-known tipster just confirmed it too. Ice Universe said, on X, that the Pixel 9 Pro will offer 16GB of RAM.

The Google Pixel 9 Pro will offer 16GB of RAM, a well-known tipster says

In that post, he also mentioned that the Galaxy Z Fold 6 will not. He seems to be quite annoyed by that based on what he said in that post. He believes that the ‘AI era’ which Samsung’s software entered requires 16GB of RAM to be included.

Having said that, the Google Pixel 9 appeared on Geekbench, the same goes for the Pixel 9 Pro XL. Those two listings confirm that the phones will be fueled by the Tensor G4 chip. That chip will fuel all phones in the Pixel 9 series, of course.

The Pixel 9 managed to score 1,653 points in the single-core, and 3,313 points in the multi-core test on Geekbench. What’s interesting is that these results are lower than what the Tensor G3 offers. Do note that this is probably a pre-release model, so don’t take that to heart.

Pixel 9 Geekbench

The Pixel 9 Pro XL, on the other hand, managed to hit 1,378 points in the single-core, and 3,732 points in the multi-core test on Geekbench. You can see its results below.

Pixel 9 Pro XL Geekbench

The vanilla Pixel 9 will end up offering 8GB of RAM

You’ll also notice that the Pixel 9 has 8GB of RAM. Android 14 is mentioned here, while the Pixel 9 will ship with Android 15 out of the box. That’s another proof that this is a pre-release model, of course. The Pixel 9 Pro XL, on the other hand, will include 16GB of RAM, just like the Pixel 9 Pro.

These benchmarks also confirms that the Tensor G4 will have a prime core clocked at 3.1GHz, three cores running at 2,6GHz, and four cores clocked at 1.95GHz.

As a reminder, three Pixel 9 phones are expected to arrive this time around. The Pixel 9, Pixel 9 Pro, and Pixel 9 Pro XL are expected. All three of those phones already appeared in CAD-based renders.

All three of them are expected to launch at the same time, during Google’s press event which is expected in early October. There’s a chance that will happen in September, but considering Google’s past launches, October is a more realistic choice.


[ad_2]
Source link

5 upcoming Android 15 features we’re excited about

0
[ad_1]

With each new release, Android manages to outdo itself, and Android 15 is no exception. What we know so far about its sophisticated features tells us that it will redefine how we interact with our mobile devices. It promises improvements that prioritize security, efficiency, and connectivity. With its strong and efficient software and hardware, it seems we can expect a whole package. However, like most new technologies with more customized characteristics, privacy is a domain that can raise the most issues.

One way we can strengthen our online security and privacy and also avoid geographical content restrictions is by using a virtual private network like Utah VPN, which will give you access to all the content available in the mentioned state, secure your privacy, and defend you against cyber threats. When your connection and privacy are secured, and you are in better control of the data you share, it is much easier to explore and use all the functionalities devices like Android 15 offer.

As we approach its unveiling set later this year, its creators provide more information about the new Android. Let’s dive into five upcoming features that tech enthusiasts are the most excited about.

1. Better File Integrity Management

As mentioned, security is of the greatest importance, and Android 15 is stepping up with its rebuilt File Integrity Management system. This new setup strengthens the defenses against malicious software and also ensures that your files remain untampered. Building on the foundations laid by previous Android versions, this feature bolsters security by using cryptographic signatures—a method akin to digital wax seals—making sure everything from your holiday photos to crucial work documents is secure from prying eyes.

2. Partial Screen Sharing

The partial screen-sharing capability is a dream come true for multitaskers and privacy-conscious users. Instead of sharing your entire screen, Android 15 allows you to share just a portion of it. Whether you’re in a virtual meeting or assisting a friend, you can choose exactly which parts of your screen get displayed. This feature enhances privacy and keeps the unnecessary clutter out of your presentations, making your shared content as neat as a pin.

3. Advanced Camera Controls

Photography enthusiasts, this one is for you! Android 15 is set to introduce new camera controls that will bring a professional touch to your smartphone photography. With options like low-light visibility tweaks and precise flash intensity adjustments, your device is practically transformed into a DSLR. Besides improving the quality of the photos, these tools offer creative control right at your fingertips, turning every shot into a masterpiece.

4. Virtual MIDI 2.0 Devices

Musicians and producers will find a friend in Android 15 with its support for Virtual MIDI 2.0 devices. This feature overcomes the gap between music creation apps and external synthesizers, allowing your phone or tablet to control other music gear as if connected by wire. It’s like turning your Android device into a musical maestro, orchestrating electronic symphonies easily and precisely.

5. Dynamic Performance Optimization

Last on our list but certainly not least, Android 15 introduces a game-changer for app developers and gamers: the Android Dynamic Performance Framework. This tool allows apps to interact directly with the device’s power and thermal management systems, optimizing performance for intensive tasks without overheating. Imagine playing the latest graphic-intensive game or running a resource-demanding app without your phone breaking a sweat—this is what Android 15 aims to achieve.

Android 15 is shaping up to be a pivotal release in the evolution of mobile operating systems. From solving security issues to multimedia experiences and ensuring optimal performance, these features highlight Android’s commitment to innovation and user satisfaction. As we await its official release, the anticipation builds not just for what these features will look like but for how they will transform our interaction with technology in everyday life. Whether you’re a tech expert or just someone who appreciates a good gadget, Android 15 is set to deliver a smarter, more connected mobile experience.


[ad_2]
Source link