Sideloading apps on iPhones could become a reality with iOS 17

0
[ad_1]

For the start, sideloading apps on iPhones has been impossible. Apple designed a way to block all apps not installed from the AppStore from existing on their products. According to them, this restriction improves the security of iPhones and other Apple products.

This action is in sharp contrast to what is attainable on Android devices. Users of Android devices can install apps to their devices from sources other than the Play Store. These apps then undergo security checks from the device’s system before being permitted to exist with other apps.

Over the past few years, some users of Apple products have spoken up about this app sideloading restriction. But Apple has been able to hold its ground and prevent sideloading up until this point, possibly. Multiple sources have come out to make claims that the coming iOS 17 upgrade will permit app sideloading.

Apple might come under pressure and allow sideloading apps on iPhones with their new operating system upgrade

The European Union back in November 2022 kicked off its Digital Markets Act, which put companies like Apple under pressure. This act was put in place to ensure open markets across the board (business users and consumers). It is set to go into full effect by May this year, which is just a few weeks away.

This act will force Apple to allow sideloading apps from different sources on their devices. Some Apple product users will find this quite interesting, as they would be able to access some apps that Android users have always had access to. Such apps for sideloading are available on platforms like APK Mirror as well as the websites of app developers.

Details of the sideloading apps on iPhones were made available by the folks at Bloomberg in a recent Power On post. The WWDC 2023 event will bring official details regarding this switch in Apple’s stance regarding app sideloading. For now, the company seems to be working hard to “overhaul the software to open up the iPhone to sideloading.”

The iOS 17 upgrade will also pack some more features that you can check out here. But this app sideloading issue is not the only change the European Union will force Apple to make. The tech giant will also switch to using USB-C ports on all their devices, hence moving away from lighting ports.


[ad_2]
Source link

Hackers Using Old Nokia 3310 Phone to Start Car Without Key

0
[ad_1]
Nokia 3310 Phone

Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft is becoming more prevalent in the US.

Criminals use tiny gadgets to interface with the car’s control system, sometimes hidden within innocent-looking Bluetooth speakers or cell phones.

This makes it possible for thieves with little technological expertise to steal cars without a key, sometimes in as little as 15 seconds.

With the gadgets available online for a few thousand dollars, the barrier to stealing even high-end luxury cars is significantly decreased.

How Thieves Steal Cars Using Outdated Cell Phones?

According to YouTube videos exhibiting the technique, identified by Motherboard is the one where a man uses a Nokia 3310 to start a Toyota.

A man is repeatedly tapping a button next to the steering wheel while seated in the driver’s seat of a Toyota.

The engine fails to start, and a red light flashes. Because he lacks the key, the man pulls out an everyday object: a Nokia 3310 phone.

Using a black cable, the man connects his phone to his vehicle. He selects a few options on the tiny LCD screen of the 3310. The display reads, “CONNECT. GET DATA.” He then tries starting his car once more. The engine roars while the light turns green.

Reports say the technology is sold for between $2,700 and $19,600 on numerous websites and Telegram channels. One vendor sells the Nokia 3310 phone for 3,500 Euros ($3,800), while another advertises it for 4,300 Euros ($4,300).

When one person offered to sell engine starters online, Motherboard pretended to be an interested buyer. That person stated they would use DHL to send a device to the United States.

“Yes, Nokia works with USA cars,” they wrote, referring to the engine starter hidden inside a Nokia phone. The seller said they take Western Union, MoneyGram, bank transfers, and cryptocurrency.

One advertisement for a device concealed inside a Bluetooth speaker bearing the JBL logo reads, “JBL Unlock + Start.” “No key is required!”

According to the advertisement, a range of Toyota and Lexus vehicles can use this particular device: “Our device has a cool stealthy style and look,” it claims.

Ken Tindell, CTO at vehicle cybersecurity company Canis Labs, wrote in an email to Motherboard, “The device does all the work for them, all they have to do is take two wires from the device, detach the headlight, and stuff the wires into the right holes in the vehicle side of the connector.”

Tindell and Ian Tabor, a colleague in automotive cybersecurity where Tabor purchased a device for reverse engineering after it appeared that auto thieves used one to steal his own Toyota RAV4 last year.

Tabor researched and discovered devices for sale that target Jeeps, Maseratis, and other car models.

Keyless repeaters are a different kind of vehicle theft deterrent that Motherboard has previously spoken with vendors about.

These send signals from a victim’s car key, which may be in their home, to their automobile, either in the driveway or nearby. But thieves don’t need the car key to operate with these modern gadgets.

 Despite the devices’ high cost, the one Tabor purchased only had parts worth $10. These comprise another CAN-related chip and a chip containing CAN hardware and firmware.

The assault, known as CAN (controller area network) injection, operates, by Tindell and Tabor’s study, by delivering fake messages that seem to originate from the car’s smart key receiver, the research adds.

The Effective Solution

The only efficient remedy, according to Tindell, would be to add cryptographic protections to CAN messages. He stated that a software update may accomplish this.

“The software is straightforward, and the only complex part is introducing the cryptographic key management infrastructure. But since new vehicle platforms are already deploying cryptographic solutions, that infrastructure is either in place or has to be built anyway,” Tindell said.

“Vehicle theft is an industry-wide challenge that Toyota takes seriously. Even with technological advances, thieves reportedly are devising ways to circumvent existing anti-theft systems.

We are committed to continuing to work on this issue with theft prevention experts, law enforcement, and other key stakeholders”, Corey Proffitt, senior manager of connected communications at Toyota Motor North America, told Motherboard in an email.

Building Your Malware Defense Strategy – Download Free E-Book

Also Read:

The Relatively Unknown Car Hacking Threat

PASTA – A New Car Hacking Tool Developed by Toyota to Test The Security Vulnerabilities


[ad_2]
Source link

Spring cleaning tips for your browser

0
[ad_1]

Some tips that can enhance your browser’s speed, so you have more time to enjoy the outdoors.

When you are resting up from the physical part of your spring cleaning and you’re sitting behind your laptop or swiping left on your phone, why don’t you speed up your browsing experience with a few simple actions?

Let’s start with your browser, as that usually has the most impact on your perception of how “fast” your device is. In this post we will focus on the settings for Chrome since that is the browser with the biggest market share, but many browsers (like Edge) will have the same settings because they are based on the same Chromium codebase or they will have very similar settings (Firefox). We’ll also mention where you can find similar or the same settings in Safari, if available. These will be shown in red.

There may be slight differences in the methodology and screenshots, based on the type of device, the operating system, your language settings, and maybe even the manufacturer of your device, but the basics should be pretty much the same as the Windows-based methods and screenshots shown in this post.

Backups

Before we start let’s take some precautions to minimize the chance of having regrets about our actions afterwards.

1. Backup your currently open bookmarks: More (three dots) > Bookmarks > Bookmark all tabs… (Safari: In the Menu bar > select Bookmarks > then choose Add Bookmarks for these {number of open} Tabs.)

bookmark all open tabs

This will create a Set of bookmarks of the currently open tabs.

You will see a prompt where you can provide a name for this set of bookmarks. Something with the date in it would make it easier to find if you plan to do this more often.

Name that set and save it by clicking the Save button.

type a name for the set of bookmarks

2. Exporting your data can be used to synchronize your browser between devices, but it can also be used as a backup for your data.

To create a backup click on More (three dots) > Settings > Turn on sync… Then log in to your Google account and access sync settings by clicking on Settings:

turn on synchronization

(Safari: click the Apple menu in the top left corner of your screen. Then click System Preferences > Click iCloud > select the checkbox next to Safari.)

Then select Manage what you sync and turn on Sync everything if it’s disabled, or make a custom selection of what you want to back up.

manage what to synchronize

Once you’ve decided what to sync, it’s all automatically available across devices, as long as you sign in with the same Google account. When push comes to shove you can use this as a backup to restore your browser. If you were not using sync between devices before you started, you may want to turn it off once you are satisfied everything went well.

Speeding up

1. Check if you have the latest version of Google Chrome. Updates not only introduce new features, they also improve security and fix bugs.

Under More (three dots) > Help > About Google Chrome you can find what version you are on. If there is an update available, Chrome will download and install it. When it’s done you need to relaunch the browser to complete the update. 

update installed, you need to relaunch

Safari: Go to the Apple menu > System Settings > click on Software Update > if updates are available click Restart Now to install them. Once your macOS has updated, Safari will be up to date too.

2. Close some of those tabs that open every time you start your browser. Each site will take some time to load and that slows down your browser. Remember, you can create a set of sites that you need every day and the rest can be moved to your bookmarks so you can always find them.

Now you can start closing tabs and create a set of tabs that you would like to start your sessions with. Once all the unnecessary tabs are closed, click on More (three dots) > Settings > On startup. Select Open a specific page or set of pages.

select your opening tabs

Click on Use current pages and the currently open tabs will be the ones you see at the start of every browser session.

Safari: open the tabs you want to start with and use the method outlined under backups to create a set of bookmarks. Name that set of bookmarks, for example “Startup”. Go to Safari menu > Preferences > select Choose tabs folder from the New windows open with drop-down list. Select the folder of bookmarks (e.g. Startup) you created. Then, click Choose.

3. Under Performance > Memory Saver you can find another way to minimize the impact of your open tabs. When on, Chrome frees up memory from inactive tabs. This gives active tabs and other apps more computer resources and keeps Chrome fast. Your inactive tabs automatically become active again when you go back to them. 

memory saver settings

4. Clean out some clutter you have picked up over time. Click on More (three dots) > Settings > Privacy and security. Click on Clear browsing data. This will open a prompt where you can select which data to clear. The top four are usually the ones you will want to clear. If you are using Chrome as a password manager you will certainly want to leave the fifth one unchecked.

select the data to remove

Cookie warning: if you delete all your cookies, you will find that you will have to log in on several sites, so have your password manager ready or be selective about which cookies to delete. If you uncheck Cookies and other site data here, you can select which ones to delete if you click More (three dots) > Settings > Privacy and security > Cookies and other site data > See all site data and permissions. This allows you to go over a complete list and make more granular decisions. You can use the trash can symbol behind each site’s symbol to remove the site data and permissions.

a more granular approach

Or use the dropdown arrow to have even more options.

Safari: Click the Safari menu > Clear History… > in the Clear field choose All History > click Clear History.

 

5. When it comes to browser extensions that you only use occasionally, you might consider disabling them until you need them. And if you no longer use them at all, remove them. Depending on the type of extension, the difference in surfing speed can be noticeable.

Click More (three dots) > Settings > Extensions to see an overview of the currently installed browser extensions.

installed extensions

The one(s) with the slide to the right (showing blue) are enabled and the one(s) with the slider to the left (showing in grey) are disabled. Any unwanted or no longer needed extensions can be removed by clicking on the Remove button in the extension’s tile.

Safari: Choose Safari > Settings > Extensions. To turn off an extension, deselect its checkbox. To uninstall an extension, select the extension and click the Uninstall button.

6. Preload your pages. Click More (three dots) > Settings > Privacy and security > Cookies and other site data. Here you can turn on Preload pages for faster browsing and searching.

prefetch settings

7. Scan your device with Malwarebytes to see if any malware is lurking on it. Clearing up any malware on your system is a surefire way to speed it up. And it means you are safer, too!

If you came here looking for a resolution for an extremely slow browser and all of the above didn’t help, there could be other reasons at play. You can try resetting Chrome to default or even uninstall and re-install Chrome.

If a certain site isn’t working properly, you can also try opening the site in an Incognito window. Click More (three dots) and then New Incognito Window. Then copy and paste the URL of the problem site in the address bar and see if it works now. If it does solve the issue, then circle back to point 4 and remove all the cookies and data of the domain that the problem site belongs to.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Adobe Lightroom now supports RAW photos from Pixel 4a, 5a & 6a

0
[ad_1]

Those of you who use Adobe Lightroom and Google’s mid-range Pixel phones will be happy to hear this. Adobe has added support for RAW photos from the Pixel 4a, 5a, and 6a to its Lightroom software.

Adobe Lightroom now supports RAW photos from Google’s Pixel 4a, 5a, and 6a handsets

The vast majority of you probably never shoot in RAW, but some of you do. To put it simply, if you tend to edit images frequently, and want to do the best job of it, shooting in RAW is the way to go.

Adobe Lightroom is one of the best and best-known software offerings to make such edits, and you’ll be glad to know that you can now do it if you use one of the aforementioned devices. This change comes as part of the April 2023 update. Those models are now supported by the Adobe Camera Raw extension.

This does come as a surprise, as Adobe usually focuses on high-end smartphones. That’s not surprising, as usually those users use the RAW function. Not to mention that high-end phones usually have better cameras. We all know that Google’s mid-range Pixels can snap a great photo, though, so… there you have it.

Sadly, the camera matching profile is not available for either of the three phones

One thing to note is that the support is here regardless of whether you use your PC, Mac or smartphone to edit. The thing is, the camera matching profile is not available for either of the three phones. The same goes for ‘Lens Correction’ profiles for wider FoV lenses, even though ultrawide cameras are supported in general. The same goes for front-facing cameras.

Now, if you’re planning on using this functionality, do note that you’ll need the Adobe Camera Raw version 15.3, in addition to LIghtroom 6.3 and/or Lightroom Classic 12.3.

In the image below, you can see a full list of the latest cameras that Adobe added in the April 2023 update. The vast majority of the list is populated by PIxels, but a camera from Panasonic also made the list, and the same goes for one camera from Sony.

Adobe Lightroom cameras update April 2023


[ad_2]
Source link

Snapdragon 8 Gen 3 could launch sooner than expected

0
[ad_1]

According to some new info from Revegnus, a tipster, the Snapdragon 8 Gen 3 could launch a bit sooner than expected. He says that Qualcomm’s next-gen SoC will arrive in late October, as opposed to mid or late November.

The Snapdragon 8 Gen 3 could launch a bit sooner than expected

As a reminder, the Snapdragon 8 Gen 2 launched on November 16. Its predecessors had similar launch dates, it’s usually mid-November or late November. We’re not sure why would Qualcomm move that to late October, but if Revegnus is to be believed, it’ll happen.

In addition to the Snapdragon 8 Gen 3, he also mentioned two offerings from MediaTek. He said that the Dimensity 9200+ is coming in May, while the Dimensity 9300 will launch in late October, just like the Snapdragon 8 Gen 3.

The Snapdragon 8 Gen 3 will be a 4nm chip, and the Dimensity 9300 is expected to be as well. The Snapdragon 8 Gen 3 will likely be made using TSMC’s N4P 4nm node, but it remains to be seen.

The Snapdragon 8+ Gen 1 & Snapdragon 8 Gen 2 turned out to be outstanding chips

The Snapdragon 8+ Gen 1 and Snapdragon 8 Gen 2 proved to be outstanding processors. They were both miles better than the Snapdragon 8 Gen 1, not just in sheer performance, but power consumption too. Overall, Qualcomm did an excellent job. So, the expectations are high for the Snapdragon 8 Gen 3.

Now, in regards to MediaTek, the company’s Dimensity 9200 flagship SoC proved to be a worthy opponent. That 4nm processor performed great in the Vivo X90 Pro we’ve tested, and is in the same league as Qualcomm’s offerings. It still doesn’t offer as good control over power consumption as Qualcomm’s offerings do, but that could change moving forward.

MediaTek’s chips have come a long way over the years, as the company truly closed the gap (for the most part) with Qualcomm. It will be interesting to see how the Snapdragon 8 Gen 3 and Dimensity 9300 compare.


[ad_2]
Source link

Avoid this “lost injured dog” Facebook hoax

0
[ad_1]

We take a look at a Facebook hoax which uses supposedly injured dogs as the lure for a bait and switch scam.

Facebook users are advised to be wary of posts involving injured dogs receiving treatment at a vet surgery, or pets sitting next to people post-operation adorned with bandages and plaster casts.

The dog-themed missives all follow a similar format, with the primary change between them being the location the post is supposedly coming from. Here’s an example:

Hello. If anyone is looking for this sweet girl, found her lying on the side road in [hashtagged location name]. She was hit by a car in a hit and run incident.I took her to the vet. She is in a critical condition,sustained multiple fractures and on pain relief and oxygen.She is not chipped. I know someone is looking for her. Please bump this post to help me find the owner.

Fake Facebook dog operation post

The images are randomly sourced, with many of the posts reusing the same photographs. Comments are often disabled.

Who is doing this? Well, in terms of the individual accounts on display, they’re a variety of personal accounts with little to no posting history. They’ve either been compromised first and then wiped clean of content, or they’re spam accounts with a recent creation date. The examples we’ve seen strongly suggest the latter.

As for posting tactics, they follow the standard Facebook spam tactic of being posted to local community / classified / real estate groups for maximum exposure. This is something which happens a lot, and was used to great effect in the “dead daughter / free PS5” campaign from the middle of last year.

What, specifically, are these bogus dog in the vet stories for? The scammers are banking on sympathetic engagement off the back of the heartstring tugging tale. With enough engagement, eyeballs, replies, anything at all of value…the posts switch to something else altogether.

This is exactly what was happening back in December with another Facebook scam. There, mostly freshly minted accounts posted up harrowing tales of missing toddlers dumped outside the gates of their homes. Eventually, they would become adverts promoting a variety of decidedly non-missing baby content.

Content switcheroo scams on Facebook are incredibly manipulative, and there’s a fair chance that such behaviour likely drives people away from engaging with genuine “missing baby / relative / injured pet” warnings down the line.

There are, however, a few things you can do to keep your Facebook house in order.

Avoiding Facebook hoaxes

  • No replies allowed. Disabled replies can be a major warning flag. If you’re asking for help or giving a warning, why limit the number of people who can reply?
  • If there’s a photograph, try performing a reverse image search. This is where you try to deduce the origin of the image. These scams are lazy; image reuse is rife, often going back many years. There are dedicated sites for this, such as TinEye. There, you either upload an image or provide a URL and TinEye will find any matches from across the internet. Most search engines also offer some reverse image search functionality, though quality of results will inevitably vary. It’s worth noting that sometimes scammers will flip an image (from left to right or vice versa) to try and fool reverse image searches. Deepfaked images will also typically not produce results.
  • Copy / paste that text. Take the text of the suspicious post and search for that, too. You may well find a whole raft of cut and paste efforts across multiple social media portals.
  • Freshly baked scammers. If the site the message or photo is posted to displays details about the person who posted it, see if it’ll let you observe things like account creation date or if the name on the account has been altered. A new account with no other content has likely been set up to scam people.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Exynos 2400-powered Galaxy S24 is looking more likely

0
[ad_1]

For better or worse, an Exynos-powered Galaxy S24 may be happening. Samsung‘s mobile division has reportedly approved the unannounced Exynos 2400 chipset for use in its 2024 flagships, at least in select markets. It shipped the Galaxy S23 series with a Snapdragon processor globally.

After skipping the Exynos 2300, Samsung is now working on a new flagship chipset. The Exynos 2400 was initially expected to power phones from Chinese vendors like Vivo and Xiaomi starting in early 2024. The Korean firm signed a multi-year partnership with Qualcomm last year, so it was expected to continue exclusively using Snapdragon processors in its flagship smartphones. At least for one more year.

But it appears, the company has changed its mind. It is now considering going back to Exynos in 2024. While it isn’t final just yet, the Exynos 2400 could end up powering the Galaxy S24 series in some markets, probably Europe. Hopefully, the new Exynos chipset will leave behind the performance nemesis that led to Samsung going all-in with Snapdragon this year.

Otherwise, the company may find it difficult to sell its next-gen flagship smartphones. Fans haven’t forgotten how Exynos processors have underperformed compared to competing Snapdragon solutions for years.

Early Exynos 2400 rumors would please Galaxy fans

Samsung going back to Exynos next year reportedly has to do with the dropping market share of its Exynos processors. However, the company’s mobile division won’t risk the sales of its latest flagship models if the Exynos 2400 isn’t as good as the unannounced Snapdragon 8 Gen 3, if not better. But if early rumors are anything to go by, things are looking quite promising.

The Exynos 2400 is said to be a deca-core chipset built on a 4nm low power performance (LPP) node. This will reportedly address the power efficiency and thermal management issues Exynos processors have had for years. The LPP node also has a better yield rate, something Samsung has struggled with lately. In other words, the Exynos 2400 could address two of the major complaints with Exynos chipsets.

It’s also rumored the new processor may feature a bonkers GPU. Rumors have it that Samsung will integrate AMD’s RDNA2-based graphics with 6WGP (Workgroup Processor). One WGP consists of two compute units (CUs), so the Exynos 2400 GPU will have 12 CUs. The Exynos 2200’s Xclipse 920 GPU has three CUs, so the new chipset has four times more compute units. These early rumors suggest the Exynos 2400 will be a massive leap forward from Samsung’s last Exynos processor. Whether it will be enough to win back fans’ confidence, only time will tell.


[ad_2]
Source link

Android users can now access personalized loan recommendations based on their spending habits

0
[ad_1]

In today’s fast-paced world, managing personal finances has become more critical than ever. For Android users, there’s good news! You can now access personalized loan recommendations based on your spending habits, making it easier to make informed decisions about borrowing money. This article will explore the concept of personalized loan recommendations, how analyzing spending habits can lead to better loan decisions, and the role of AI and machine learning in this process.

The rise of personalized loan recommendations

How personalization works

Personalized loan recommendations work by analyzing your financial data, such as income, expenses, credit score, and spending habits. This information is then used to match you with loan products that best suit your financial situation and goals. By tailoring loan recommendations to your individual needs, you can avoid costly mistakes and find the most suitable borrowing options.

Benefits of personalized loan recommendations

There are several advantages to using personalized loan recommendations. First, they save time and effort by narrowing down your search for suitable loans. Second, they can help you avoid loans with high-interest rates or unfavorable terms that may not be suitable for your financial situation. Finally, personalized recommendations can increase the likelihood of approval, as you’ll only be applying for loans that match your credit profile.

Analyzing spending habits for better loan decisions

Breaking down your spending habits

To access personalized loan recommendations, it’s essential to have a clear understanding of your spending habits. Categorize your expenses into different areas, such as housing, utilities, groceries, entertainment, and savings. This will provide a clear picture of where your money goes and help identify areas where you can cut back to improve your financial health.

Importance of understanding your financial behavior

Understanding your financial behavior is crucial for making better loan decisions. By analyzing your spending habits, you can identify trends and patterns that may affect your ability to repay a loan. This insight can help you make more informed decisions about the type of loan and repayment terms that best suit your financial situation.

How AI and machine learning drive personalized loan recommendations

The role of AI in financial services

Artificial intelligence (AI) has revolutionized the financial services industry by enabling more accurate and efficient data analysis. In the context of personalized loan recommendations, AI can process vast amounts of financial data to generate highly customized recommendations. By leveraging AI, lenders can better understand individual borrower needs and offer more suitable loan products.

Machine learning algorithms for better predictions

Machine learning, a subset of AI, plays a crucial role in developing personalized loan recommendations. These algorithms analyze past financial data and spending patterns to predict future behavior. As a result, they can determine an individual’s creditworthiness and provide loan recommendations that match their unique financial profile.

SoFi: Overview and features

SoFi is a popular Android app that offers personalized loan recommendations based on your financial data. Key features include:

  • Comprehensive financial analysis to assess your creditworthiness
  • A wide range of loan products to choose from, including personal loans, home loans, and student loan refinancing
  • Seamless application process with quick approval times
  • Access to exclusive member benefits such as career coaching and financial planning resources

Branch: Overview and features

Branch is another excellent Android app for personalized loan recommendations. Its standout features include:

  • In-depth spending habit analysis to better understand your financial needs
  • AI-driven loan recommendations tailored to your unique financial situation
  • Access to a vast network of reputable lenders to find competitive loan offers
  • Fast and flexible loan options, including payday advances and installment loans

Even: Overview and features

Even is a user-friendly Android app that provides customized loan recommendations by analyzing your financial data. Key features include:

  • Easy-to-understand breakdown of your spending habits to identify potential savings opportunities
  • Machine learning algorithms that generate highly accurate loan recommendations
  • Secure and efficient loan application process with fast approval times
  • Integrated financial tools, such as automatic savings and bill tracking, to help you improve your financial health

Preparing to take a personalized loan

Evaluating your credit score

Before applying for a personalized loan, it’s essential to evaluate your credit score. A higher credit score indicates a lower risk to lenders, resulting in better loan terms and lower interest rates. Make sure to check your credit report for errors and take steps to improve your score before applying for a loan.

Ensuring a stable income

Lenders will assess your ability to repay a loan based on your income. Ensure you have a stable income source and can demonstrate consistent earnings to increase your chances of loan approval.

Considering the loan term and interest rate

When taking out a loan, consider the term and interest rate carefully. A shorter loan term, such as those offered by payday loans, may result in higher monthly payments but lower overall interest costs. Conversely, a longer loan term may have lower monthly payments but higher total interest costs. Keep in mind that payday loans often have higher interest rates than other loan types, so it’s important to carefully assess your options. Choose a loan term and interest rate that best align with your financial goals and repayment capabilities.

In conclusion, personalized loan recommendations for Android users offer a valuable tool for making informed borrowing decisions. By analyzing your spending habits and leveraging AI and machine learning, these apps can provide tailored loan recommendations that match your unique financial situation. By taking the time to understand your financial behavior and considering key factors such as credit score, income, and loan terms, you can find the best loan options to meet your needs.


[ad_2]
Source link

Swatting-as-a-Service is a growing and complicated problem to solve

0
[ad_1]

Using a false call to deploy emergency services to the address of a victim or a school has been turned into Swatting-as-a-Service

One Telegram channel has been found to be behind a great deal of swatting incidents in the US. Using the anonymity provided by Telegram, caller ID spoofing, and voices generated by Artificial Intelligence (AI), a person or group of persons calling themselves Torswats is suspected to be behind dozens, if not hundreds of swatting incidents.

Swatting is where someone makes a hoax emergency call to law enforcement in order to get armed police (hence the SWAT reference) to target a particular address. Swatting is a crime that has evolved from a dangerous type of prank to a cybercrime that can be ordered as a service.

NPR reported that in October 2022, 182 schools in 28 states received fake threat calls with a familiar pattern behind this wave of false calls. A voice-over-internet-protocol (VOIP) number in Ethiopia which was tied to a call about a “suspicious backpack” in a classroom call had logged calls to 79 other places across Louisiana, Arizona, and New Mexico.

Even in the stage when swatting was a prank popular among gamers, it was dangerous because of the potential consequences. Not only does it take emergency services away from their actual tasks, there have been swatting incidents that had fatal consequences. Police officers are placed in danger as victims may try to defend themselves against an unsuspected raid.

Swatting is a criminal offense in many jurisdictions, often punishable by fine or imprisonment. So swatters want to keep their identity hidden. And Torswats seems to do a good job at that. Some of the people paying Torswats for their services have been arrested, but the Telegram channel remains open for business.

Telegram is an anonymous chat platform that uses encrypted communication and does not require users to reveal their true identity. While not intended for that purpose, it is popular among criminals of all kinds and trades because they have a natural desire to stay anonymous.

Caller ID spoofing is the practice of causing the telephone network to indicate to the receiver of a call that the origin of the call is different from the true origin. Swatters use this to make the caller ID display show a phone number different from that of the origin.

Text to speech conversion software has evolved to a point where it is almost impossible for a human to discern the generated speech patterns from a real human. AI can be used to instill “voice acting” into the spoken text so the message sounds panicky, threatening, or whatever emotion is needed to make the message sound more realistic.

Torswats carries out these alarming calls as part of a paid service they offer. Payments are made in cryptocurrency to maintain anonymity. For $75, Torswats says they will close down a school. For $50, customers can buy more extreme swatting services, in which authorities can be expected to handcuff the victim and search their house.

Counter actions

If you are afraid of swatters targeting you for your online actions, you can use a VPN to hide your IP address. That gives them one less opportunity to find your physical address.

Just like there are tools and programs to generate fake voices, there are initiatives that aim to fight this increasingly widespread practice. But many of them are based on biometrics which allows the program to determine whether the text was spoken by the person or the deepfake version trying to impersonate them.

The future probably lies in deep-learning algorithms that analyze a caller’s voice and recognize unique characteristics that are tied to deepfakes. These programs will be used to assist emergency services dispatchers in recognizing AI generated voices.

Let’s hope Torswats and other operations like theirs will soon learn what it feels like to get—legitimately–arrested.


We don’t just report on encryption—we offer you the option to use it.

Privacy risks should never spread beyond a headline. Keep your online privacy by using Malwarebytes Privacy VPN.


[ad_2]
Source link

Pixel Fold to have over $1,700 price tag and super durable hinge

0
[ad_1]

The Pixel Fold price is once again being talked about in the leadup to Google’s annual I/O conference in May, where the device is suspected to be officially unveiled.

In a recent rumor the price was said to be $1,799. A new report from CNBC (spotted by 9To5Google), says the Pixel Fold price will be upwards of $1,700. Google will also reportedly offer trade-in discounts, plus a free Pixel Watch to buyers. This likely means the price rumored from yesterday is either close to the launch cost, or right on the money. For comparison, the Samsung Galaxy Z Fold 4 launched at $1,799 without any trade-in offers. So it sounds like Google is going to price its foldable around the same amount.

Alongside the price, the report (which cites internal communications), mention several other key details about Google’s foldable phone. It’s said to have the “most durable hinge of any foldable.” The device will also offer some level of water resistance, likely similar to what Samsung offers on the Galaxy Z Fold 4.

Battery life will apparently last for up to 24 hours with regular use. Though a low-power mode could push that out to 72 hours if needed. The device is also said to be powered by the Tensor G2 and weigh about 283 grams.

The Pixel Fold price seems to be comparable to similar offerings

Google of course hasn’t confirmed any details of this phone yet. But price is surely going to be one of the key details consumers are interested in. Given the price tags of foldables aren’t cheap.

With yesterday’s rumor noting a specific price of $1,799 and today’s leak suggesting over $1,700, it seems quite likely Google is pricing the Pixel Fold to match Samsung. Hoping to perhaps capitalize on the fact that it may offer a more durable hinge than competitors.

In addition to the Pixel Fold, Google is also expected to unveil its much more budget-friendly phone, the Pixel 7a, as well as the Pixel Tablet at Google I/O next month.


[ad_2]
Source link