Best Apple HomePod Deals – May 2023

0
[ad_1]

Like every other tech giant out there, Apple also has their own smart speaker – the HomePod. Now the HomePod has had a rather shaky history on the market. With the first one being priced pretty high at $349. Which ended up with Apple canning the product, only to bring it back as basically the same HomePod but now $50 less.

But you can often times find the HomePod for less than what Apple sells it for. Many retailers do generally have discounts for the HomePod and HomePod Mini. And in this article, we’ll round up the very best deals.

Best Apple HomePod Deals

Apple, currently has two versions of the HomePod. There’s the HomePod and the HomePod Mini. As you might expect, the HomePod Mini is smaller and cheaper than the HomePod. The HomePod is normally $299, while the HomePod Mini is $99.

The big difference between the two, is the audio difference. Which does have an impact due to the size. Both of them do support Spatial Audio and Dolby Atmos. But if you’re looking for a whole-home experience, the regular HomePod is going to be the better option. The HomePod Mini is better to use on a desk or next to your bed. Somewhere that you don’t need the music to be very loud.

The HomePods are pretty limited, unfortunately. They really only work with Siri and Apple Music. They are supposed to get Spotify support, but who knows when that will happen. Of course, the most important part here is that they also need to be setup with an iPhone or iPad. So you’ll need at least another Apple device to really take advantage of the HomePod.

They are great speakers, but some might hesitate to call them a “smart speaker”.

Without further ado, here are the best HomePod deals available right now.


[ad_2]
Source link

Huawei, ZTE, and BOE are developing a flexible under-display camera OLED display

0
[ad_1]

The foldable industry is booming with some new screen technology coming from Huawei, ZTE, and BOE. These tech giants are pulling their resources and know-how together to hit the foldable market with something new. Already Huawei is prepping to announce their new foldable device to the world and it comes with some jaw-dropping technology.

But this article will focus on what is coming from the collaboration between these Chinese tech firms. Information on this issue was made public by popular tipster, Digital Chat Station, via his Weibo page. He also gave some details on the screen in work and the brands that might feature the folding screen technology.

All three companies in this collaboration are top of their games in their various industries. So it will be lovely to see a foldable device that encompasses all three companies’ designs. Without any delay, here is what you need to know about the flexible under-display camera OLED display this collaboration will bring to the limelight.

Details on the coming flexible under-display camera OLED screen from Huawei, ZTE, and BOE

Over the past few years, Huawei has been a reputable force in the foldable industry. Bringing impressive foldable devices with inward and outward folding hinges. They are also great at making their foldable devices quite sleek, hence outwitting the competition from the like of Samsung and other recent entries.

ZTE on its part has come through with the most impressive under-display camera technology. This has made their flagship-level devices like the ZTE Axon 40 Ultra stand out from the crowd. Samsung has even tried to make use of a similar technology but didn’t hit the nail on the head as well as ZTE has done.

BOE is one of the top display manufacturing companies available today. Their business brings products that are put to use in the development of a ton of flagship devices available today. Apple is one of the big names that source screens from BOE, this is so because of the quality it offers.

Considering the achievements of these three firms in their various lines, one can expect much from their collaboration. This will produce a foldable device that will stand out from the crowd in many ways. According to Digital Chat Station, this screen will be used on a coming ZTE foldable device, that will be the first from the brand.

Huawei will also implement this technology in its coming foldable devices. Pairing this flexible screen with Huawei’s impressive hinge technology will be game-changing. The coming months will bring more details on the 1,440Hz PWM dimming screen this collaboration will produce.


[ad_2]
Source link

Galaxy Note 20, Flip 3, Fold 2 & more Samsung devices get May update

0
[ad_1]

Samsung is pushing the May 2023 Android security patch to several Galaxy devices today. The company has released the latest security update for the Galaxy Note 20 series, Galaxy Z Flip 3, Galaxy Z Fold 2, Galaxy A52 5G, and Galaxy A33 5G. The new SMR (Security Maintenance Release) has been previously rolled out to the Galaxy S23 series, Galaxy Tab S8 series, and a few other models.

Samsung’s May update for the Galaxy Note 20 series is currently available in Latin America. More specifically, the new SMR is rolling out to users in Brazil. The company should soon expand the release to other countries in the region, and also cross boundaries to other parts of the world. The new firmware build number for the last Note-series phones is N98*BXXS6HWE2. The update seemingly doesn’t bring anything apart from the latest security fixes.

The Galaxy Z Flip 3 is also initially receiving the May SMR in Latin America. The rollout is a little wider for the 2021 clamshell foldable. It is picking up the new update in Colombia, Guatemala, Mexico, Panama, Peru, and Trinidad & Tobago, SamMobile confirms. This phone is getting the build number F711BXXS4EWD9 with the latest update. Once again, Samsung isn’t pushing anything apart from the new security patch.

The story remains the same for the Galaxy Z Fold 2 as well. The May update for this 2020 foldable is available in the same six Latin American countries as the Galaxy Z Flip 3. The updated firmware version for this phone is F916BXXS2JWE1. And you guessed it right, there aren’t any goodies to look forward to here either. The update brings the latest security patches but nothing else.

The May update for the Galaxy A52 5G and Galaxy A33 5G is also currently limited to Latin America. Samsung is pushing the latest SMR to the two mid-range models in select countries in the region. The new firmware versions for the phones are A526BXXS3EWD8 and A336MUBS4CWD4, respectively (via). A wider rollout should follow in the coming days. Don’t expect anything major, though. This update is all about security fixes.

The May update patches over 70 vulnerabilities in Galaxy devices

If you’re using any of these Samsung smartphones, the latest update for your phone brings fixes for more than 70 security issues. The May SMR patches around 20 Galaxy-specific flaws and over 50 Android OS vulnerabilities. At least six of those issues are labeled critical by Google and Samsung. If you don’t receive a notification for a new update anytime soon, you can manually check for it from the Software update menu in the Settings app.


[ad_2]
Source link

Mozilla acquires Fakespot to combat fake reviews

0
[ad_1]

Ever since the advent of e-commerce websites, fake reviews have been a headache for shoppers who rely on customer feedback to make informed purchasing decisions. However, the launch of AI chatbots like ChatGPT has made matters worse since companies are now using AI to write fake reviews for their products. Now, in an effort to address this issue, Mozilla has acquired Fakespot, a startup that uses AI and machine learning to identify fake or unreliable reviews.

Mozilla says it plans to integrate the browser extension into its Firefox browser and use Fakespot’s grading system to assign a grade between A and F based on the authenticity of the reviews. Additionally, the company is also working on new exclusive Fakespot features that will help users make informed purchasing decisions on all major retailers, including Amazon, BestBuy, eBay, Walmart, Shopify, and Sephora.

Furthermore, speaking on the concerns that Mozilla might make Fakespot exclusive to their browser, Steve Teixeira, Mozilla’s Chief Product Officer, assured users that the extension would continue to work on all major web browsers and mobile devices and that Mozilla would only continue to enhance the experience.

Mozilla’s efforts to incorporate AI

Since the start of the AI revolution late last year, companies like Mozilla and Microsoft have been pushing to integrate more AI features and potentially gain some market share from Chrome. And this move to acquire Fakespot aligns with the company’s goals and comes shortly after it launched Mozilla.ai, an AI-focused startup that aims to build trustworthy and open-source AI.

“We think there is a commercial market in trustworthy AI — and that this market needs to grow if we want to shift how the industry builds AI into the apps, products and services we all use every day. Mozilla.ai — working loosely with many allied companies, researchers and governments — [has] the opportunity to collectively create a ‘trust first’ open source AI stack,” said Mark Surman, the executive president of Mozilla.


[ad_2]
Source link

Former Uber CSO charged

0
[ad_1]

Former Uber CSO, Joe Sullivan, has been sentenced to three years’ probation for his involvement in covering up a data breach in 2016 that affected 57 million Uber users.

Sullivan was convicted on October 5 of obstruction of proceedings of the Federal Trade Commission (FTC) and misprision of felony in connection with his attempts to cover up the hack.

US district judge William Orrick sentenced Sullivan on May 4 to three years’ probation and 200 hours of community service, noting that Sullivan has previously worked to protect people from the crimes he was charged with covering up. Orrick also said that Sullivan’s actions helped stop the private data that was stolen from becoming exposed.

Orrick also said that he believed that former Uber CEO Travis Kalanick was equally responsible for the concealment of the data breach. Kalanick has not been charged for his alleged involvement.

Sullivan said of his actions: “I was a bad role model. We’re there to be the champion of the customer, and I failed in this case.”

The 2016 Uber hack and attempted cover-up

In November 2014, Uber suffered a data breach that exposed the personal information of 50,000 customers. As this hack was disclosed to the FTC, Uber’s data security practices were investigated. In May 2015, Uber was served a Civil Investigative Demand by the FTC. The demand required Uber to give extensive information on its data security practices as well as detailed information on any other occasions where unauthorized parties had gained access to confidential user information.

The Department of Justice (DOJ) said that evidence demonstrated that Sullivan played a significant part in Uber’s response to the FTC, including “supervis[ing] Uber’s responses to the FTC’s questions, participat[ing] in a presentation to the FTC in March 2016, and testify[ing] under oath…to the FTC on November 4, 2016, regarding Uber’s data security practices…includ[ing] specific representations about steps he claimed Uber had taken to keep customer data secure”.

Ten days after his testimony, Sullivan learned that the data breach had taken place, as he was contacted directly by the hackers on November 14, 2016. 
Evidence at the trial demonstrated that Sullivan actively tried to keep knowledge of the breach from reaching the FTC, including telling a subordinate that information about the hack was to be “tightly controlled” and that they “can[not] let this get out”. He also told employees outside of the security team that the official line to the rest of the business was “this investigation does not exist”.

Sullivan attempted to pay the two hackers $100,000 to sign a non-disclosure agreement which, according to the DOJ, “contained the false representation that the hackers did not take or store any data”. Uber paid the hackers $100,000 in Bitcoin in December 2016, despite not knowing their true identities. In January 2017, Uber discovered their identities and the hackers signed a new version of the original non-disclosure agreement which contained their true names. Both hackers were prosecuted and pleaded guilty in October 2019 to charges of computer fraud conspiracy. They are currently awaiting sentencing.

Sullivan’s concealment of the breach

Despite this information being crucial to the FTC investigation, evidence showed that Sullivan did not disclose any information about the cyber security incident to Uber’s lawyers who were handling the investigation, nor to the General Counsel of Uber. The initial investigation was settled in summer of 2016, without Sullivan mentioning the breach.

In 2017, Uber began investigating the 2016 breach. During the investigation, Sullivan lied to the new CEO of Uber, Dara Khosrowshahi, telling him that the hackers were only paid after their identities were revealed. He also deleted information from a draft of a report on the breach that said it involved the exposure of a large amount of personal information from a large number of Uber customers. The breach was eventually discovered and disclosed to both the FTC and the general public in November 2017.  


[ad_2]
Source link

Nothing OS 1.5.4 update delivers improved performance & battery life

0
[ad_1]

Nothing has started rolling out a new update for the Nothing Phone (1), Nothing OS 1.5.4. The rollout has started, but as it’s a staged rollout, you may not get it straight away. Still, everyone should get it fairly soon.

Nothing OS 1.5.4 update is here with improved performance & battery life

In any case, this update weighs 119MB, and it comes with a rather lengthy changelog. It’s mostly focused on improved performance, and battery life improvements, though. Let’s see what’s new.

Nothing has optimized the fingerprint pattern unlocking experience. The Pop-up view animations are now smoother, and the Google Safety Center is integrated. The Nothing OS now also offers a new feedback feature, which you can access by heading to Settings -> System -> Feedback.

The company has reduced power consumption by optimizing the 4G/5G network switching function. The Bluetooth functions in Quick Settings have also been optimized, including new fast access to paired devices.

There are quite a few entries in the changelog

You’ll now also experience smoother QR code transitions. It’s now also possible to scan UPI QR codes directly through the camera app, and then choose a payment app on your phone to complete the transaction. This feature is available in some markets only.

Nothing has also added NDot Cyrillic font support for some languages, including Belarusian, Bulgarian, Macedonian, Russian, Serbian, and Ukrainian.

The notification display in Quick Settings has been improved too, and the company also resolved the error message during the face unlock setup. Nothing fixed incoming call notifications, so they should come through without delay.

Time-stamp accuracy for photos has also been improved, while the company also listed ‘Other general improvements’ in the changelog.

Android 14 Beta 1 is coming to the Nothing Phone (1) in the coming weeks

This update is, of course, based on Android 13. Android 14 Beta 1 is coming to the Nothing Phone (1) in the coming weeks. Do note that you’ll need to opt-in if you’d like to use it, of course. The Nothing Phone (2) is also coming this summer.


[ad_2]
Source link

Samsung’s SmartThings Find has over 300 million devices globally

0
[ad_1]

Samsung‘s SmartThings Find service has amassed over 300 million registered and opted-in devices globally. The company achieved the milestone in about two and a half years since debuting the in-demand device location service in late 2020. It helps people find their lost or misplaced Galaxy phones, tablets, watches, earbuds, and smart tags. You can even use it to locate your compatible car in a parking space.

SmartThings Find added 100 million devices in the past ten months

Samsung launched SmartThings Find at the end of October 2020. The service is a crowd-sourced network of Galaxy devices that helps other Galaxy users find their lost devices. It doesn’t require your lost device to have an active internet connection or a signed-in Samsung account.

Once you report a missing Galaxy device on SmartThings Find, the service securely adds it to its database and makes the lost device broadcast a Bluetooth LE signal, even if it’s offline. The signal is picked by a registered Galaxy device nearby, which then relays the information to the cloud along with its location. Finally, you will receive the lost device’s location.

Apple offers a similar service to find lost iPhones and other Apple products. Google has also been working on a crowd-sourced network of Android devices. It was spotted laying the groundwork back in June 2021, but we haven’t heard much since. In the meantime, Samsung’s SmartThings Find is growing strong.

In early September 2021, about ten months after its launch, Samsung announced that the service has reached 100 million registered and opted-in devices worldwide. It also revealed that SmartThings Find helps locate around 230,000 devices every day. The service added another 100 million devices in the next ten months or so, i.e. by mid-July 2022.

Ten months since then, 100 million more devices have been added to the SmartThings Find network, bringing the total to over 300 million. The way this service works, the higher number of devices makes it more powerful for users. As Samsung puts it, “Each opted-in device has the ability to help locate another.”

Samsung offers various features to ensure user security

SmartThings Find comes with several privacy and security features. It encrypts user data, so no one on the network can see your information. Samsung’s Knox security platform further safeguards your data. The company also lets you choose whether to share your location data with other users or not. On top of this, the service automatically changes the device ID every 15 minutes and stores it anonymously for maximum security. Last but not least, SmartThings Find helps you determine if an unknown or unauthorized smart tag is following you.


[ad_2]
Source link

Android Apps With 1M Installs Steals 2FA Codes & Passwords

0
[ad_1]

Check Point Research has recently published a study revealing the discovery of a previously unknown malware variant dubbed FluHorse.

The malware comprises multiple malicious Android apps that impersonate legitimate ones, and unfortunately, most of these fake apps have already been installed by over 1,000,000 users.

All these malicious applications are designed to steal victims’ credentials and 2FA codes, compromising their personal and sensitive information.

FluHorse targets various industries across the Eastern Asian market and is distributed through email.

These attacks can prove persistent, dangerous, and challenging to detect, as they often leverage email accounts belonging to high-profile entities during the initial stages.

Mimicked Apps

Attackers find applications that mimic trusted, reputable companies particularly enticing since they are likely to attract financially capable customers. 

The legitimacy of these copied applications makes them even more appealing to hackers.

  • ETC with 1,000,000+ Google Play installsVPBank
  • Neo with 1,000,000+ Google Play installs

According to the ETC APK developer’s website, the application generates approximately 16 million transactions daily, with over 6 million users relying on its services.

VPBank, a major private bank in Vietnam, recorded total assets surpassing 631 trillion dongs as of December 2022, cementing its position as one of the country’s biggest financial institutions.

While the enterprise encompasses a diverse range of financial services like:-

  • Spanning retail
  • Corporate
  • Consumer Finance
  • Wealth management operations

Also, experts have noted the presence of other malicious dating applications’ presence. However, they have not discovered any corresponding applications that the malware attempts to impersonate.

Targeted banks

Infection Chain

The malicious applications contain nothing beyond multiple window replicas that offer the victim input options.

While the scheme’s effectiveness remains undisputed, regardless of the attackers’ intentions, once the victim enters their sensitive data, the information is swiftly exfiltrated to the command and control (C&C) server.

Upon reaching this step, the SMS interception feature takes over, redirecting all incoming SMS traffic to the server under the attacker’s control.

The malware actors intercept any Two Factor Authentication (2FA) codes when prompted in the event they have already entered stolen credentials or credit card data.

Attack Chain

Moreover, the email lures serve as an effective social engineering tactic and are consistent with the supposed intent of the malicious APK (like paying tolls) installed afterward.

Cloned apps

To achieve the objective, assessing Flutter-based applications requires intermediate steps compared to analyzing pure Android apps.

The Flutter framework uses a custom virtual environment that enables developers to develop across multiple platforms using a single code set.

The Flutter platform utilizes a particular programming language called Dart for its development. At the same time, the availability of the Flutter platform code as an open-source project makes analysis somewhat more straightforward.

Toolchain

The malicious samples have multiple layers of technical implementation. Despite the simple, functional aspect, analysts deduce that the malware developers utilized Flutter as a developing platform, indicating minimal programming effort.

Since May 2022, FluHorse activity has been under the radar of cybersecurity researchers. Their analysis reveals the persistent danger of these campaigns as fresh infrastructure nodes and malicious applications surface every month.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


[ad_2]
Source link

The one and only password tip you need

0
[ad_1]

I was asked to write a list of password tips. It’s a short list.

OK, it’s time for me to keep a promise.

Back in October 2022, I wrote an article called Why (almost) everything we told you about passwords was wrong. The article summarizes how a lot of what you’ve been told about passwords over the years was either wrong (change your passwords as often as your underwear), misguided (choose long, complicated passwords), or counterproductive (don’t reuse passwords).

Most damningly of all, the vast effort involved in dispensing this advice over decades has generated little discernible improvement in people’s password choices. If it hasn’t quite been a wasted effort, it has certainly represented a galactically inefficient use of resources.

We know that this advice isn’t what it’s cracked up to be thanks to intrepid researchers, such as the folks Microsoft Research, who made it their business to discover what actually makes a difference to password security in the real world, and what doesn’t.

If you want the full, three-course meal version of why all the password advice you’ve been told stacks up to much less than the sum of its parts you can read the original article. Here’s the snack version:

How strong, long, and complicated your password is almost never matters in the real world. The most common type of password attack is credential stuffing, which uses passwords stolen in data breaches. It works because it’s so common for people to reuse the same password in two places and it is completely unaffected by password strength. The next most common attack is password spraying, where criminals use short lists of very simple passwords on as many computers as possible. In both situations a laughably simple but unique password is good enough to defeat the attack.

There are rare types of attack—offline password guessing—where a strong password might help, but the trade-off is that strong passwords are far harder for people to remember, which leads them to use the same password for everything, which makes them much more vulnerable to credential stuffing. Notebooks are a really good, simple solution to the password reuse problem, but for years people were ridiculed for using them. Password managers are also a good solution but they are much harder to use than notebooks and a majority of people don’t use them, and don’t trust them, despite years of positive press and advocacy.

OK, back to the promise I mentioned.

As somebody who has done his fair share of dispensing this kind of advice, I ended my Why (almost) everything we told you about passwords was wrong article with a mea culpa in the form of a promise. Never again would I dish out laundry lists of things you should do to your password. I would instead focus my energy on getting you to do one thing that really can transform your password security, which is using two-factor authentication (2FA):

So, from now on, my password advice is this: If you have time and energy to spare, find somewhere you’re not using 2FA and set it up. If you do I promise never to nag you about how weak your passwords are or how often you reuse them ever again.

Well, today is World Password Day, and it’s time to make good on that promise. I was asked to write a list of password tips, so here they are:

To explain why I’m all-in for 2FA I can’t do any better than quote Microsoft’s Alex Weinert from his 2019 article, Your Pa$$word doesn’t matter. (He calls it MFA but he means the same thing, I’ll explain why lower down).

Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.

Yes, he wrote 99.9%, and he wasn’t exaggerating. 2FA defeats credential stuffing, password spraying, AND password reuse, AND a bunch of other attacks.

Even if you don’t know what 2FA is, you’ve probably used it. If you’ve ever typed in a code from an email, text message or an app alongside your password you’ve used 2FA.

In the real world, 2FA just means “do two different things to prove it’s you when you log in”. One of those things is almost always typing a password. The other thing is often typing a six-digit code you get from your phone, but it might also be responding to a notification on your phone or plugging in a hardware key (a small plastic dongle that plugs into a USB port and does some fancy cryptographic proving-its-you behind the scenes).

2FA is very widely supported and any popular website or app you use is likely to offer it. In an ideal world those sites and apps would take responsibility for your security and just make 2FA a mandatory part of their account setup process. Unfortunately, we don’t live in an ideal world, and the tech giants that know better than anyone else how much 2FA can protect you have left it for you to decide if you need it.

To make your life a little harder still, they also give it different names. You’ve already met MFA, which means multi-factor authentication, while Google, WhatsApp, Dropbox, Microsoft, and others brand their version of 2FA with a slightly altered name: two-step verification (2SV).

If you have a choice, the best form of 2FA is a password and hardware key, but you’ll need to buy a hardware key. They are worth the small investment and not nearly as intimidating as they can seem.

If you aren’t ready for the that, the next best form of 2FA uses an app that prompts you with a notification on your phone. Next best after that is 2FA that uses a code from an app on your phone, and the least good version of 2FA uses a code sent over SMS.

However, don’t let anyone tell you any form of 2FA is “bad.” It’s all relative. Adopt any one of them and you can safely ignore the rest of the password advice you were probably ignoring already.

To help you get started, here are links to the 2FA setup instructions for the five most visited websites:


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Motorola unveils Edge 40 handset with 144Hz display, 68W charging

0
[ad_1]

Motorola announced a couple of smartphones earlier this week. It announced the Motorola Edge+ (2023) and a couple of G series devices. Well, now the company announced yet another smartphone, the Motorola Edge 40.

This is a mid-range smartphone, and it got announced in Europe, but it’s coming to more markets. More on that later. The phone comes with a curved display, thin bezels, and a centered display camera hole.

The Motorola Edge 40 is on offer featuring two different backplate materials

The device comes with an aluminum frame, and there are Acrylic and vegan leather backplate variants. There are two cameras on the back. All the physical buttons are placed on the right-hand side of the device, while the overall shape is kind of standard. Both its front and back sides curve into the frame.

The Motorola Edge 40 features a 6.55-inch fullHD+ (2400 x 1080) pOLED display with a 144Hz refresh rate. This display also has a 360Hz touch sampling rate, and gets up to 1,200 nits of peak brightness. This handset is fueled by the MediaTek Dimensity 8020 SoC, which is MediaTek’s 6nm chip. The phone comes with 8GB of LPDDR4X RAM and 256GB of UFS 3.1 flash storage.

Android 13 comes pre-installed on this phone, while you’ll find a dual SIM setup here (nano SIM + eSIM). A 4,600mAh battery is also included in the package, and it supports 68W TurboPower wired charging. 15W wireless charging is also supported, as is 5W reverse charging.

Two cameras sit on the back, while the phone is IP68 certified

A 50-megapixel main camera (f/1.4 aperture, OIS, Quad Pixel Technology) is backed by a 13-megapixel ultrawide camera (120-degree FoV, f/2.2 aperture, macro option). A single 32-megapixel camera (f/2.4 aperture, Quad Pixel Technology) sits on the phone’s front side.

The Motorola Edge 40 does include stereo speakers, and offers Dolby Atmos support. It is IP68 certified for water and dust resistance, and has a Type-C USB port at the bottom. Bluetooth 5.2 is supported here.

The phone comes in Acrylic and Leather variants. The Acrylic model measures 158.43 x 71.99 x 7.58mm, and weighs 167 grams. The Leather variant measures 158.43 x 71.99 x 7.49mm, and weighs 171 grams.

The Motorola Edge 40 comes in Eclipse Black, Lunar Blue, and Nebula Green color options. It’s priced at €599.99 ($662). It will become available in Europe in the coming days, and it’s coming to the Middle East, Latin America, and Asia-Pacific regions in the coming weeks.


[ad_2]
Source link