The ultimate CCTV installation checklist: A step-by-step guide

0
[ad_1]

As property owners, we all want to ensure the safety and security of our homes, businesses, and assets. One of the most effective ways to do this is by installing a Closed-Circuit Television (CCTV) system. A well-designed CCTV system can provide 24/7 surveillance, deter crime, and provide valuable evidence in case of incidents.

However, installing a CCTV system can be complex and time-consuming, especially if you’re not familiar with the process. That’s why we’ve created this ultimate CCTV installation checklist to guide you through every step of the process.

Step 1: Determine Your Surveillance Needs

Before purchasing any equipment, it’s essential to determine your surveillance needs. Ask yourself questions such as:

  • What areas do I want to monitor?
  • How many cameras do I need?
  • What type of cameras do I need (e.g., dome, bullet, PTZ)?
  • What is my budget?

By answering these questions, you’ll be able to select the right CCTV equipment for your specific needs.

Step 2: Choose the Right CCTV Cameras

Once you’ve determined your surveillance needs, it’s time to choose the right CCTV cameras. Consider factors such as:

  • Camera resolution: Higher resolution cameras provide better image quality and detail.
  • Camera type: There are different types of Jual CCTV Jakarta cameras, including dome, bullet, and PTZ cameras. Choose the right type of camera based on the area you want to monitor and your specific needs.
  • Night vision: If you need to monitor areas in low light conditions, choose cameras with night vision capabilities.
  • Weather resistance: If you need to install cameras outdoors, choose cameras that are weather-resistant.

Step 3: Plan Camera Placement

Camera placement is crucial for effective surveillance. Consider the following factors when planning camera placement:

  • Coverage: Ensure that each camera covers the area you want to monitor.
  • Height: Position cameras at the right height to capture the best view of the area.
  • Obstructions: Avoid placing cameras where obstructions such as trees, walls, or buildings may obstruct the view.
  • Lighting: Ensure that there is adequate lighting for each camera to capture clear footage.

Step 4: Install Wiring and Power Supply

Proper wiring and power supply are essential for reliable CCTV system operation. Follow these tips when installing wiring and power supply:

  • Use high-quality cables: Choose high-quality cables to ensure that your CCTV system operates reliably.
  • Choose the right power supply: Choose the right power supply based on the number of cameras you have and their power requirements.
  • Avoid interference: Ensure that your wiring and power supply are not interfering with other electrical equipment.

Step 5: Set Up Remote Access

Remote access allows you to view and manage your CCTV system from anywhere, at any time. Follow these steps to set up remote access:

  • Choose a remote access method: There are different methods for remote access, such as using a mobile app or accessing the system via a web browser.
  • Configure your network: Ensure that your network is configured correctly to allow remote access.
  • Test your remote access: Test your remote access to ensure that it’s working correctly.

Step 6: Test Your System

Once your CCTV system is installed, it’s essential to test it thoroughly to ensure that it’s working correctly. Here are some tips for testing your system:

  • Check camera angles: Ensure that each camera is positioned correctly and covers the intended area.
  • Check image quality: Ensure that each camera provides clear and sharp images.
  • Check recording and playback: Test recording and playback to ensure that your CCTV system is recording and storing footage correctly.

By following this ultimate CCTV installation checklist, you can ensure that your CCTV system is installed properly and is functioning as intended. By taking the time to plan your CCTV system installation carefully, you can avoid common pitfalls and ensure the safety and security of your property.

Step 7: Regular Maintenance and Upgrades

Once your CCTV system is installed and tested, it’s essential to maintain it regularly to ensure that it continues to function correctly. Here are some tips for regular maintenance and upgrades:

  • Clean the cameras: Dust, dirt, and debris can accumulate on the camera lens, affecting image quality. Regularly clean your cameras to ensure they are working correctly.
  • Check the cabling: Check the cabling for any damage or signs of wear and tear. Replace any damaged cables as necessary.
  • Update firmware: Keep your CCTV system up-to-date by regularly updating the firmware to ensure that it’s operating at its best.

Tips for Maintenance and Upgrades

Here are some essential maintenance tasks:

1. Regular Cleaning of the Cameras

Over time, dust, dirt, and debris can accumulate on the camera lens and affect the image quality. To ensure that your CCTV system produces high-quality images, you need to clean the cameras regularly. Cleaning the cameras can be done easily by using a soft, dry cloth or a special lens cleaning solution to wipe away any dirt or debris.

2. Checking the Cabling

Cabling is an essential component of your CCTV system, and it’s important to regularly check for any signs of wear and tear. Faulty cabling can cause image distortion, video loss, or other issues with your CCTV system. To prevent such problems, it’s essential to check the cabling regularly and replace any damaged cables as needed.

3. Updating Firmware

To keep your CCTV system operating at its best, it’s important to update the firmware regularly. Firmware updates can add new features, fix bugs, and improve overall performance. Many CCTV system manufacturers release firmware updates periodically, so it’s important to check for new updates and install them as soon as they become available.

By following this ultimate CCTV installation checklist, you can ensure that your CCTV system is installed correctly and maintained effectively, providing you with reliable surveillance and peace of mind.

Conclusion

Installing a CCTV system can be a daunting task, but by following this ultimate CCTV installation checklist, you can ensure that your system is installed correctly and is functioning as intended. Take the time to plan your installation, choose the right equipment, and follow the recommended steps for installation, testing, and maintenance. By doing so, you can enjoy the benefits of a reliable and effective CCTV system that provides valuable surveillance and security for your property.


[ad_2]
Source link

Hackers use WinRAR as a Cyberweapon to Conduct Cyberattacks

0
[ad_1]
hackers winrar cyberweapon

CERT-UA (Ukrainian Government Computer Emergency Response Team) recently reported that the Ukrainian state networks suffered a cyber attack attributed to the notorious ‘Sandworm’ hacking group from Russia.

The attackers reportedly employed WinRar to destroy critical data on various government devices.

Russian hackers successfully infiltrated critical systems in Ukrainian state networks by exploiting compromised VPN accounts that lacked adequate protection from multi-factor authentication measures.

Upon gaining unauthorized access to the targeted network, the perpetrators utilized specialized scripts that wiped out critical data on Windows and Linux systems. 

Their method of choice was the WinRar archiving program, which was exploited to carry out the devastating attacks.

Filetypes Targeted

The Sandworm hacking group employed a BAT script called ‘RoarBat,’ to perform malicious operations on Windows devices. 

This script was designed to scan various disks and targeted directories, seeking out specific file types like:-

doc, docx, rtf, txt, xls, xlsx, ppt, pptx, vsd, vsdx, pdf, png, jpeg, jpg, zip, rar, 7z, mp4, SQL, PHP, vbk, vib, vrb, p7s, sys, DLL, exe, bin, dat

The attackers employed a specific tactic when utilizing WinRar, using the “-df” command-line option. 

This feature automatically deletes files as they are being archived, thus allowing the perpetrators to destroy critical data with ease systematically.

Following the archive process, the perpetrators went further and deleted the archives themselves. 

As per CERT-UA, the RoarBAT script was executed through a scheduled task centrally created and distributed across all devices on the Windows domain.

This distribution was facilitated using group policies, which allowed for seamless task implementation across the entire network.

The attackers opted for a different approach when targeting Linux machines, utilizing a Bash script instead of the BAT script employed on Windows systems. 

This script used the “dd” utility to overwrite specific file types with zero bytes, rendering the data completely irretrievable.

Given the nature of data replacement carried out by the dd tool, the likelihood of recovering files that have been “emptied” using this method is extremely low. 

It may even be impossible to restore the contents of the affected files. Using legitimate programs such as the ‘dd’ command and WinRar was likely a strategic move by the threat actors to evade detection by AV tools.

According to CERT-UA, the recent cyber attack on Ukrainian state networks resembles a similar incident that occurred in January 2023.

In light of recent events, CERT-UA has issued recommendations to help critical organizations nationwide mitigate the risk of similar cyber attacks.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


[ad_2]
Source link

World Password Day must die

0
[ad_1]

The continued existence of World Password Day is a tell that something has gone badly wrong in cybersecurity.

Now in its tenth year, the day is supposed to act as an annual reminder for people to follow good password hygiene: Don’t reuse passwords; use long passwords; no, longer passwords than that; use a collection of random words; no, not those words; use a phrase; use a collection of phrases; don’t forget the weird characters; etc., etc.

This is bad. Critical technology should not require an annual pep talk to function correctly. There is no annual “how to avoid nuclear meltdown” day.

And make no mistake, password authentication is critical technology. It is the bedrock on which security is built. Fail at authentication and it doesn’t matter how “military-grade” your encryption is or if you patch twice a day before flossing, you’re toast.

The existence of World Password Day is a symptom of two problems.

The first is that password authentication is a terrible design. Its success hinges on humans being good at something humans are really bad at: Creating and remembering long strings of random characters.

In an environment where users must now remember about 100 passwords each, it is impossible to use passwords well without assistance. The only chance you have of making it work is to outsource the “creating and remembering” part you’re really bad at to a computer, in the form of some password management software.

Password managers are great—apart from where they aren’t, like when you’re logging in to Windows—but from what we can tell, most people still don’t use password managers, and those that do are almost certainly the most security-aware among us; in other words, the folks who need its help the least.

And when I write “impossible” I am not being hyperbolic. You cannot remember 100, different, strong passwords. You just can’t. Almost all of us run into serious problems juggling fewer than ten. (If you’re still doubtful, read Why (almost) everything we told you about passwords was wrong, it’s got more details and links to the research.)

The second problem is that for too long we made passwords a problem for users to solve instead a problem for IT or security. Dispersing the responsibility like this created an enormous headache that has consumed untold resources. A system is only as strong as its worst password choice, but we almost never know what the worst choice is or who made it. That creates a situation where improving security rests on our ability to improve every single user in the hope that we’ll reach the worst.

Attempts to level up users often boil down to edicts about how to do passwords better, such as making sure each password includes a mixture of uppercase and lowercase letters, and that passwords are not reused.

It’s like we asked the janitor to configure the firewall rules and then tried to fix our terrible mistake by having a firewall expert constantly lecture the janitor about not messing up the firewall.

Repeated password breaches over decades—which show us real users’ password choices—suggest that these edicts are having little effect. This shouldn’t be a surprise. Reusing passwords and making passwords simpler may be bad for security, but they make perfect sense if your most pressing problem is working out how to juggle an unmanageably large portfolios of passwords.

Our experiment in shifting responsibility and blame to users hasn’t worked. Ransomware gangs rely routinely on phished, stolen, or guessed passwords to break into corporate networks through VPNs or remote desktops, causing untold damage and disruption.

The good news is that while there isn’t much we can do about problem number one, number two was a choice, and it’s a choice we can un-make. There is another way, but it requires a shift in mindset.

Instead of thinking about how to get users to choose stronger passwords, businesses should focus on protecting themselves from users’ poor password choices instead.

The most powerful way to do this is to remove passwords entirely. Thankfully, after decades of false starts, a slew of technologies like Apple’s Touch ID, Windows Hello, and FIDO2 has appeared that now make this a viable option in a number of areas.

Passwords are going to be with us for a long time yet though, so we still need ways to cope with bad ones where passwordless authentication is unavailable.

Where you can’t abandon passwords, the next best option is multi-factor authentication (MFA). In 2019, Microsoft’s Alex Weinert wrote that “Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA.”

MFA comes in different flavors and your choice of flavor makes a difference: Hardware keys are better than push notifications from an app, which are better than One-Time Password (OTP) codes from an app, which are better than OTP codes over SMS. But the improvements that come in the steps between the different forms of MFA are incremental. The step between MFA of any kind and no MFA at all is transformational.

More than any other choice or technology, MFA puts the responsibility for password security back into the hands of IT and security specialists where it belongs.

There are other measures, too. When you go to an ATM you don’t have to type in a 14-character password with eight quattuordecillion (that’s a number with 45 zeroes at the end of it) possible combinations to get your money—a 4-digit PIN with a paltry 10,000 possible combinations will do.

Why? Because the ATM isn’t going to give an attacker 10,000 chances to guess the correct PIN, it’s going to give them three, and then it’s going to eat the card. The same thing happens on your iPhone. Six wrong guesses and you’re on the naughty step. Ten wrong guesses and your data can self-destruct.

No normal user is going to make hundreds of guesses at their password before phoning support, so take a leaf out of your bank’s playbook and give your users a handful of chances to enter their password correctly.

Like MFA, account lockouts allow users to stay secure even with truly awful password choices. (After all, EVERY 4-digit PIN is a terrible password choice.)

In the interests of defense in depth, businesses may still want to ensure that users are making strong passwords, or at least avoiding weak ones. Here, the thinking has changed in the last decade, and that change is enshrined in the National Institute of Standards and Technology (NIST) Digital Identity Guidelines.

Forcing people to create passwords to a formula, insisting on at least one uppercase letter, at least one special character etc, is out. And so are periodic password resets. Both are far more effective at annoying users than they are at improving security.

Instead, NIST says, it’s more effective to simply stop users choosing known bad passwords, such as passwords that have appeared in breaches or that are based on dictionary words.

If you are going to insist on strong passwords, please make a password manager part of the standard software suite on all your organization’s machines, and make sure employees actually know how to use it. Many users simply don’t trust password managers, and unless you’ve sat with somebody using one for the first time, you may not appreciate how difficult it can be for people to make sense of them.

The measures I’ve suggested in this article are not interchangeable or equally effective: You should start at the top and work down. If you do that, you can improve password security, remove the need for toothless edicts, and perhaps we can finally get rid of these annual pep talks.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Samsung improved its 4nm yield rate, gets close to TSMC

0
[ad_1]

Samsung has reportedly significantly improved the yield rate of its 4nm chips in recent months. Its 4nm yields are now on the same level as that of TSMC, and close to 5nm yields, the Korean media is reporting. These improvements may have helped it retain a few big customers, namely AMD and Google.

Samsung is one of the biggest contract chip manufacturers in the world. It is second only to TSMC in the semiconductor foundry market. However, the gap between the two is huge because of the latter’s superior chip fabrication tech and better yield. Chips manufactured by TSMC have always offered better performance and power efficiency. So much so that the Koren firm didn’t use its in-house Exynos processors in the Galaxy S23 series flagships.

Amid all this, Samsung also lost several key customers to TSMC. Most notably, Qualcomm switched to the latter for manufacturing its recent chips, including the Galaxy S23’s Snapdragon 8 Gen 2. However, there have been reports recently that the Korean firm is on its way to turn things around. It has improved its yield rates as well as process nodes. The latter improvements would help improve the performance and power efficiency of its chips.

A fresh report coming out of Samsung’s homeland reiterates that. It says the company’s 4nm yield rate, which is the percentage of usable chips out of the total manufactured, is comparable to TSMC’s. The Korean firm has reportedly increased its 4nm production capacity as well. This has enabled Samsung to lure back customers that were mulling switching to TSMC for manufacturing their 4nm solutions, including AMD and Google.

Samsung may be able to convince Google to stick with it in the future

Samsung has manufactured Google’s Tensor chips for Pixels smartphones since the first-gen solution in 2021. These chips use the Korean firm’s Exynos processors as their base. The Tensor G3, which will power the upcoming Piel 8 series, is a modified version of the unreleased Exynos 2300. Unsurprisingly, Samsung will manufacture it.

However, starting with the Tensor G4 next year, Google is reportedly planning to design the chips on its own. It is also considering switching to TSMC for production to take advantage of the latter’s superior fabrication process. The Pixel maker hasn’t finalized anything because TSMC has raised its prices recently. Now, with Samsung improving its process nodes and yield rates, Google may be convinced to stick with the Korean firm. At least for one more year.


[ad_2]
Source link

Will humans be banned from the driver’s seat?

0
[ad_1]

The business of driverless cars is not a brand new one. For over ten years, companies like Ford, Tesla, Google, and General Motors have been serving up demo models that have kept us in hopeful anticipation for the perfected product. We’ve been confidently assured that the complications of road travel in both urban and freeway settings, not to mention in wilder weather conditions, are well within the range of our scientific grasp. Not only that, but the industry was touted as a necessity in order to save some of the millions of lives lost every year due to human driving error.

2023 is here, $100 billion has been spent, and we still don’t see too many self-driving cars on the road. According to the carmakers themselves, the technology needed to make fully autonomous vehicles has proved more elusive than expected. It doesn’t necessarily mean they’ve all admitted defeat, though, because Tesla’s CEO, Elon Musk, was bold enough to claim, as recently as mid-April 2023, that “I think we’ll do it this year”.

The dangers of human beings taking the wheel are certainly not going away, and these types of vehicles could potentially solve our traffic problems too. We therefore ask: How far away are we from a situation where manual car driving is actually outlawed? The question touches upon the futures of the big automobile makers whose shares are traded in CFD online trading.

Are We Close?

The first thing we must ask is whether or not we’re on the brink of having fully autonomous cars ready for production. The news, lately, has not been promising. In October 2022, Ford and Volkswagen said they had given up on their self-driving vehicle project, called Argo AI. They’re not the only ones to have failed to live up to promises. Ford once said they would have fully self-driving cars ready to go by 2021. Back in 2015, Uber wanted to be in on the action and started up their own project, only to sell it in 2020. General Motors (GM) predicted they would mass produce these cars by 2019, which didn’t happen either.

Apple’s project in this area, called Titan, which aimed to create a car without any pedals or steering wheel, was recently put off until 2026. Apple had been increasing the sums of money going into the business since 2016, so the news knocked their share prices down. As of November last year, the only project for a fully autonomous vehicle still running was GM’s Cruise, which is actually used by San Francisco ride-hailers, but only at night when traffic is low.

Do We Really Need Them?

If it’s true the technology is waiting for its eureka moment, when a computerized version of human intuition will appear, then perhaps it’s only a matter of waiting out the time. But not everyone agrees the technology would even be good for us. “Everyone is saying how driverless cars will take the problematic human out of the equation”, says Stanford University’s Professor Ken Taylor. “But… Can artificial intelligence actually replace our capacities as moral agents?” Indeed, the prospect of placing human lives in the care of electronics opens up an ethical can of worms.

One of the moral issues that needs to be resolved involves the relative priority that should be given to passenger safety over pedestrian safety, which has no easy answer. Another issue has to do with potentially numerous job losses that could be precipitated if the technology catches on. For instance, there are about 3.5 million working truck drivers in the USA. Another professor at Stanford, Margaret Levi, suggests that “We need social scientists and ethicists on the design teams from the get-go”.

Motoring Ahead

Autonomous vehicles are still “one of Nvidia’s largest and most important endeavors”, in the company’s own words. Nvidia, who make both software and hardware, created a blueprint for developing these kinds of cars in the form of their Hyperion architecture. In April, they claimed to have made a breakthrough in terms of their technology’s safety features.

Another company with a fighting spirit is Intel Corp, who use the technology of Mobileye Global Inc. in their project. In January 2023, they said they still expect to rake in revenues of over $17 billion from their efforts before 2030. Intel bought Mobileye back in 2017.

Returning to our original question of whether or not we humans should expect to be banned from the driver’s seat, the answer, at the moment, is no. Too many carmakers have recently thrown up their hands at making self-driving cars. “Long term, I think we will have autonomous vehicles”, remarks Gartner’s Mike Ramsey. “But we’re going to be old.”

At present, we can enjoy the driver assistance technology offered by companies like Tesla, but also keep our eye out for the technological breakthrough promised by some in the industry. Any significant news in this regard is likely to impact the share prices of relevant automobile makers, so stay up to date when you trade Tesla, Ford, or Nvidia share prices as CFDs in your online trading.


[ad_2]
Source link

Pixel users reportedly to get an exclusive Google AI home screen widget

0
[ad_1]
Google’s conversational AI chatbot Bard might soon find a spot  on your Pixel’s home screen according to 9to5Google. Currently, you can access Bard from your phone’s web browser or desktop by going to bard.google.com (or you can tap on this link). But code viewed by 9to5Google indicates that Bard will be coming to Android as an app along with an Android home screen widget. The widget will first be made available for Pixel phones, according to the report, before being offered on more Android phones.
The Bard Android app might not necessarily be a standalone app as the chatbot feature could be integrated into Google Search. The Bard widget (again, expected to be available at first on Pixel handsets only) most likely will be more than just a shortcut allowing you to start a new conversation with Bard. Instead, the widget could include buttons for suggested conversations and open up the Bard app or Google Search.
Since the use of Bard is still limited to those who have been allowed by the bouncer through the velvet ropes, and there is still a waitlist that many are still waiting to get off of, it is possible that Google will allow Pixel owners to skip the waitlist, or move up the waitlist. Or it is possible that the waitlist will be abolished soon leading Google to disseminate the Android app and the Pixel-exclusive widget.
We could hear more about Bard and Google’s future AI plans this coming Wednesday, May 10th, when Google holds its annual Google I/O developer conference. The event should kick off at 10 am PDT which is 1 pm EDT. You can watch the keynote from Google’s YouTube channel which you can see by tapping on this link.
With Google looking to expand the Pixel ecosystem, we expect several new hardware announcements at Google I/O including the Pixel 7a, Pixel Fold, Pixel Tablet, and the Pixel Buds A-Series in a new color, This would be a propitious time for Google to announce a Pixel exclusive for a Bard widget.

[ad_2]
Source link

How small businesses can secure employees’ mobile devices

0
[ad_1]

A third of organizations aren’t protecting their mobile devices at all. Don’t be one of them.

Fact: 77% of organizations are convinced they’re capable of protecting their mobile devices—smartphones, tablets, and laptops (including Chromebooks)—from cybersecurity threats.

Another fact: A third of those organizations aren’t protecting their mobile devices at all.

And that matters—in its Mobile Security Index 2022 report, Verizon reported that 45 percent of businesses suffered a major mobile-related compromise with lasting repercussions.

The increase in companies’ reliance on mobile devices that began with the pandemic persists today. Many employees are working on their mobile devices more, which follows that more mobile devices (53 percent) have access to sensitive data compared to pre-pandemic times. We recognize how critical such devices are to our work, and yet, confident or not, we continue to treat their defense against cyberattacks like an afterthought.

So what can small business owners do to quickly turn things around?

Start by recognizing that the mobile space has become a battleground, so protecting it is a must. And then, develop a mobile security policy that touches on essentials for securing employee mobile devices.

A cybersecurity policy is essentially a high-level plan detailing how a company will protect its physical and digital assets. In the context of mobile devices, that means protecting the sensitive data they store and have access to, and stopping non-employees from physically accessing such devices.

The policy doesn’t have to be complicated or perfect, but it must be solid and effective. The document must evolve with changing technologies and attack trends to prevent it from becoming outdated. For a policy to be effective, it should clearly and explicitly state responsibilities for the organization and its employees.

Here’s a list of some organizational duties you might want to include in your mobile security policy, to help you get started.

  • Use a mobile device management (MDM) platform. IT teams use MDM to provision, deploy, and manage mobile devices. It allows an administrator to perform remote tasks, such as troubleshooting and wiping devices after a theft. More importantly, an MDM can be used to enforce strong password practices and deploy software updates.
  • Use a mobile endpoint security solution to provide real-time protection to employee devices.
  • Ensure employees use a VPN to connect to the company networkYour small business may have adopted a working scheme that allows employees to work anywhere. In this case, it’s vital to encrypt data in transit, so you don’t have to worry about your employees using public Wi-Fi.
  • Use FIDO2 two-factor authentication (2FA). FIDO stands for Fast Identity Online, a globally-recognized standard for passwordless authentication. Employees using mobile devices to read their emails are particularly vulnerable to phishing. Unlike other forms of 2FA, FIDO2 devices can’t be phished.
  • Set clear Bring Your Own Device (BYOD) guidelines, explaining whether employees are allowed to use their personal devices for work and what their obligations are if they do.
  • Educate employees on best practices for mobile security. Employees are your first line of defense—arm them with the tools and know-how they need to fulfill their role.

By creating a strong mobile security policy, a small business is better placed to prevent cyberattacks, and better prepared should one occur.

Good luck!


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Galaxy Tab S8 series is getting May update with a big OTA size

0
[ad_1]

Samsung has begun rolling out the May 2023 Android security patch to its tablets. The latest flagship lineup Galaxy Tab S8 is picking up the new security update ahead of others. The company has already released the May SMR (Security Maintenance Release) for a few Galaxy smartphones, including the Galaxy S23 series.

The latest security update is currently available for the Galaxy Tab S8 series in Europe, SamMobile confirms. To be precise, the publication can only confirm the rollout for the Ultra model. However, Samsung usually pushes new updates to all models in a series simultaneously. So the Galaxy Tab S8 and Galaxy Tab S8+ should also be receiving the new SMR in the region.

A screenshot shared by SamMobile reveals that the new firmware build number for the Galaxy Tab S8 Ultra is X906BXXU4BWD8. It’s a pretty big release with the OTA (over the air) package weighing almost 1.6GB. However, the changelog supplied by Samsung doesn’t mention anything. It simply says that the device is getting the latest security patch and some undetailed stability and performance improvements.

The Galaxy Tab S8 series recently received the One UI 5.1 update. So it’s unclear what Samsung is pushing this time around. But we do know the content of the latest security patch. The company has published the updated monthly security bulletin revealing that the May SMR patches more than 70 vulnerabilities in Galaxy devices. Around 20 of those are Galaxy-specific patches while the remaining 50-odd patches are for Android OS flaws. The latter patches come from Google and other partner vendors.

Galaxy Tab S8 series will soon get the May update in other markets

The May security update for the Galaxy Tab S8 series should soon reach other markets, including the US. Samsung has gotten a lot faster in pushing new updates to its Galaxy devices in recent years. So the wait shouldn’t be much longer for Galaxy Tab S8, Galaxy Tab S8+, and Galaxy Tab S8 Ultra users in other regions. As usual, you can check for updates from the Settings app on your tablet.

Samsung is expected to launch a new trio of flagship Android tablets later this year. The Galaxy Tab S9 series may debut in late July alongside the fifth-gen Galaxy foldables. The new tablets may come with an IP rating for dust and water resistance, which would be a first for the lineup. Stay tuned for more information about these upcoming Samsung products.


[ad_2]
Source link

Google employees are criticizing CEO Sundar Pichai’s recent pay raise

0
[ad_1]

It comes as no surprise that Alphabet and Google CEO Sundar Pichai is one of the highest-paid CEOs in America. However, Pichai’s recent pay raise to over $226 million last year has raised concerns among employees, especially in light of the company’s cost-cutting measures and job cuts that impacted over 12,000 people.

Although most of CEO Pichai’s income last year came in the form of a $218 million stock buyback, which he receives every three years, in addition to his base $2 million salary package, this incident has caused a stir in the company’s internal message boards with employees criticizing his pay raise and the company’s $70 billion stock buyback.

Employees using memes

In classic fashion, many employees expressed their frustrations in the form of memes, with one comparing Pichai to the character Lord Farquaad from the movie Shrek, with the text “Sundar accepting $226 million while laying off 12k Googlers, cutting perks, and destroying morale and culture.” Another meme criticized Google CFO Ruth Porat’s cost-saving measures under these tense economic conditions, stating, “Ruth’s cost savings applied to everyone… except our hardworking VPS and CEO.”

While some employees used memes to express their disappointment, others drew comparisons to rival CEOs, such as Apple’s Tim Cook, who received a 40% cut from his total compensation for 2022, and Zoom’s Eric Yuan, who reduced his salary by 98% and declined his bonus after cutting 1,300 jobs earlier this year.

It’s also worth noting that this isn’t the first time CEO Pichai has come under fire, as he previously took responsibility for firing over 12,000 employees and the recent botched launch of Google’s Bard AI. However, the topic of Pichai’s compensation is especially controversial, since the CEO himself acknowledged that “we shouldn’t always equate fun with money” in response to the elimination of certain perks.


[ad_2]
Source link

Mozilla Firefox could soon have shopping tools that can tell if a product review is fake or not

0
[ad_1]

When deciding whether to buy a phone from Amazon or not, you are probably scrolling down to read Amazon’s review section. This way, you can see what experiences other people have had with the phone you are considering purchasing.

However, according to a recent report by CNBC, there are more and more fake reviews on Amazon written with the use of AI chatbots, such as the so-popular ChatGPT. Of course, Amazon is trying to fight these fake reviews, but it still has a hard time doing so.

But don’t worry; it appears Mozilla has you covered on this one, or at least it will in the near future. As the company announced in a recent blog post, it has purchased a startup company called Fakespot, which provides a website and browser extension that allow users to spot fake or untrustworthy reviews.

By utilizing a complex artificial intelligence (AI) and machine learning (ML) system, Fakespot’s solution can identify patterns and similarities across reviews, thereby identifying those more likely to be deceitful. It assigns a grade to the reviews, ranging from A to F, with A indicating that a review is reliable and F showing that the review is most likely untrustworthy.

In its blog post, Mozilla stated that Fakespot’s extension will still be available on all major web browsers and mobile devices and that the Mozilla team will continue improving the extension. However, Mozilla also stated that there will be Fakespot integrations available only for the Firefox browser in the future.

According to Mozilla, Fakespot will provide Firefox users with reliable shopping tools that will improve their shopping experience. The company also shared that it will gradually implement Fakespot’s functionalities into Firefox.


[ad_2]
Source link