Best Ring Products You can buy for your Home

0
[ad_1]

Amazon purchased Ring back in 2012, and helped make it a huge name in the smart home industry. Today, Ring has a ton of different products from video doorbells, to DIY security systems, to smart lighting and so much more. But which products are the best to put in your home? That’s what we’re here to help you with.

So here are the best Ring products that you can buy for your smart home.

Best Ring Products

Ring’s products are very competitively priced, and often times Amazon will discount them or bundle them with other products. For instance, you may see a Ring Video Doorbell bundled with another Stick-Up Cam or an Echo Show.

CostWhere to Buy
Ring Floodlight Cam Wired Pro$249Amazon
Ring Floodlight Cam Wired Plus$199Amazon
Ring Chime$35Amazon
Ring Spotlight Cam Battery HD$199Amazon
Ring Video Doorbell 3$199Amazon
Ring Indoor Cam$59Amazon
Ring Alarm 8-Piece Kit (2nd Gen)$249Amazon
Ring Video Doorbell Pro 2$259Amazon
Ring Solar Panel$59Amazon
Ring Solar Pathlight$35Amazon
Ring Smart Steplight$59Amazon
Ring Smart Floodlight$49Amazon

Ring Floodlight Cam Wired Pro

51T N7xnATL SL1000

  • Price: $249
  • Where to buy: Amazon

The Ring Floodlight Cam Wired Pro is a really great floodlight to get for your home. It has 1080p HDR video available, with nightvision. Of course, the two floodlights on either side are very bright, so you don’t really need the nightvision.

It has 3D Motion Detection and Bird’s Eye View, so you can see what’s going on everywhere in your backyard or sideyard at your home.

Ring Floodlight Cam Wired Pro – Amazon

Ring Floodlight Cam Wired Plus

51X2knRYlhL SL1000

  • Price: $199
  • Where to buy: Amazon

The Ring Floodlight Cam Wired Plus is very similar to the Pro, but it is $50 less. It doesn’t do HDR video, instead it’s just 1080p. It does have slightly different shape for the floodlight, so it won’t light up as big of an area.

Despite missing those features, the Floodlight Cam Wired Plus is still a really great option to keep your entire home protected.

Ring Floodlight Cam Wired Plus – Amazon

Ring Chime

51Y9HqlQUGL SL1000

  • Price: $34.99
  • Where to buy: Amazon

The Ring Chime is more of an accessory than an actual product. Basically, you pair this with a Ring Video Doorbell, and you’ll hear a chime when the doorbell rings. So you don’t need to be near your phone or an Echo Show or Fire TV to hear that someone is at the door.

Ring Chime – Amazon

Ring Spotlight Cam Battery HD

610KEBx7YjL SL1001

  • Price: $199
  • Where to buy: Amazon

The Ring Spotlight Cam Battery HD is a good camera to put outside your home, if you don’t have the wiring needed for a floodlight. Since there are no battery-powered floodlights yet. The Spotlight Cam runs on battery, and can last a few weeks or months, depending on your settings.

There are 8 LED lights on either side of the camera that light up when it detects motion. Nowhere near as bright as a floodlight, but it does work. And there is nightvision available too.

Ring Spotlight Cam Battery HD – Amazon

Ring Video Doorbell 3

61LbvlbShHL SL1000

  • Price: $199
  • Where to buy: Amazon

This is the default Ring Video Doorbell basically. It does all of the necessities, at a lower price. This is the cheapest option for those that need to use it without existing doorbell wiring. Now there is a wired version for about a third of the price, but you need existing doorbell wiring for it to work.

This doorbell from Ring can record in 1080p video, it also has motion detection and Ring makes it super simple to set up. You’ll get notifications when something is seen outside of your home, as well as when packages are delivered.

Ring Video Doorbell 3 – Amazon

Ring Indoor Cam

51ajZq9tiML SL1000

  • Price: $59
  • Where to buy: Amazon

Now this camera is one that you can put up in your home and see what your pets are doing when you’re at work. Or see what your kids are up to after school, before you get home. This is not meant to be used outside, since it does not have a battery and is not weather-proof.

It can be used in different angles and mounted. It’ll show you video in 1080p, and it has two-way talk. So you are able to talk with whoever is in your home.

Ring Indoor Cam – Amazon

Ring Alarm (2nd Gen)

41UQQvH6ZhL SL1000

  • Price: $249
  • Where to buy: Amazon

This is a do-it-yourself security system from Ring. It’s available in a 5-piece, 8-piece and 14-piece kit, and you can buy these parts individually if you need more. This here is the 8-piece kit, which we feel is perfect for everyone. It includes the base station, keypad, four contact sensors, one motion detector and a range extender.

This will give you piece of mind when you’re not at home. Now this doesn’t require any monthly subscription, but you can get professional monitoring for a monthly subscription. And it works in the Ring app that you already use.

Ring Alarm (2nd Gen) – Amazon

Ring Video Doorbell Pro 2

61VyKQDH1AL SL1000

  • Price: $259
  • Where to buy: Amazon

You’re probably wondering why you should get this over the Ring Video Doorbell 3? Well, for one, this has a wider-angle camera. So you can see from head to toe, who is at your door. This is important as some packages are dropped off so close to the door that they can’t be seen. Well they can with the Ring Video Doorbell Pro 2.

This one does need existing wiring to work, as there is no battery inside. So do keep that in mind.

Ring Video Doorbell Pro 2 – Amazon

Ring Solar Panel

619sQVIlECS SL1500

  • Price: $59
  • Where to buy: Amazon

The Ring Solar Panel is made specifically for the Ring Spotlight Cam Battery and the Stick Up Cam Battery. You’ll mount it close to the camera, and plug it into the camera. Now you won’t need to worry about recharging your camera. As the sun can do that for you, for free even.

Ring says that you’ll need about 3-4 hours of direct sunlight, and that will depend on your usage.

Ring Solar Panel – Amazon

Ring Solar Pathlight

51rlyztUVcL SL1000

  • Price: $35
  • Where to buy: Amazon

Ring has its own pathlights that you can purchase and put in your front yard. It’s a cool way to light up your path from the car to the front door. These are solar pathlights, so there are small solar panels on the top and grab sunlight during the day. Then brighten up your yard at night.

You can buy the Ring Solar Pathlight in a single, two, four or six pack. Depending on your home.

Ring Solar Pathlight – Amazon


[ad_2]
Source link

LockBit ransomware on Mac: Should we worry?

0
[ad_1]

With plans to offer more ransomware, LockBit has just created a variant for macOS. But, as experts have pointed out, it’s hardly ready for anything.

News broke over the weekend that ransomware gang LockBit had begun targeting Mac users, triggering some concern in the Apple community. But have no fear: Apple security experts have dissected the ransomware, taking a deep dive into what it can and cannot do, and concluded that it is, actually, toothless.

“Yes, it can indeed run on Apple Silicon. That is basically the extent of its impact,” said Patrick Wardle (@patrickwardle), known macOS cybersecurity expert and founder of the non-profit, Objective-See. “macOS users have nothing to worry about.”

Here’s why.

The signature is invalid

Using a utility called codesign, Wardle saw that the payload’s signature value is “ad-hoc” compared to an Apple Developer ID. Because the signature is invalid, macOS won’t execute it.


If you’re brave enough to run the payload on your macOS, you’ll be met with this message, says Wardle. (Source: Objective-See)

The encryptor is likely a test file

Azim Khodjibaev (@AShukuhi), a security researcher at Cisco Talos, floated the theory to BleepingComputer that the encryptors designed for macOS were “meant as a test and were never intended for development in live cyberattacks.”

Wardle further confirmed this theory, stating the malware is far from complete. Indicators in the malware’s code suggest it’s Linux-based but compiled for macOS with basic configuration settings included. The code also shows its developers have yet to consider macOS’s TCC (Transparency, Consent, and Control) and SIP (System Integrity Protection), two security features meant to protect user files and folders.

With TCC and SIP present, the ransomware will only be able to encrypt a little, if at all.

The code is buggy and will crash

Laying further credence to the test file theory, Wardle found the macOS payload contains a buffer overflow, which will cause it to crash when executed.

No worries for now!

Apple users can rest easy knowing that this macOS ransomware, as it is now, will hardly impact anyone. However, as Wardle quickly pointed out, this may be different in future releases.

“The fact that a large ransomware gang has apparently set its sights on macOS should give us pause for concern and also catalyze conversations about detecting and preventing this (and future) samples in the first place,” he says in his blog.

With LockBit operating as a ransomware-as-a-service (RaaS) outfit, its ambition is to offer a range of ransomware. Currently, we have at least two available offerings: LockBit Black (based on BlackMatter’s code) and LockBit Green (based on Conti’s code). So expanding to target systems outside its repertoire is not only a logical move but also strategic.

“For most organizations, the main takeaway is Macs are probably safe, for now, but your Windows servers were always the prime target anyway,” says Malwarebytes Security Evangelist Mark Stockley. However, Mark warned:

“You’re only safe until you’re not, and there’s no timeline on getting this working. We won’t get a warning in advance, we’ll just hear (probably from LockBit itself) that an organization with lots of Macs has been turned over. So…what are you going to do if you have lots of Macs in your organization? Wait for the horse to bolt and then shut the door, or shut the door now?”

In an interview with BleepingComputer, LockBit’s public-facing representative LockBitSupp says the Mac encryptor is “actively being developed.”

LockBit was by far the most dominant ransomware in 2022, and hasn’t slowed down in 2023, which is why it’s one of the five threats you can’t afford to ignore in the Malwarebytes 2023 State of Malware report.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

Xiaomi announces Pad 6 series with Snapdragon SoC and 50MP camera

0
[ad_1]

During its global launch event today, Xiaomi finally unveiled its much-anticipated Xiaomi Pad 6 series. The event also took the wraps off the Xiaomi 13 Ultra smartphone, the Xiaomi Smart Band 8, and a massive 86-inch Xiaomi Smart TV. The Xiaomi Pad 6 series launched in two variants – the Xiaomi Pad 6 and the Xiaomi Pad 6 Pro.

Both variants offer a high-resolution display with a high refresh rate. While the standard variant comes packed with a Qualcomm Snapdragon 870 processor, the Pro variant draws power from a more efficient chipset. Let’s take a closer look at their specs, pricing, and availability.

Both Xiaomi Pad 6 and Pad 6 Pro come with top-of-the-line specs

The Xiaomi Pad 6 and Pad 6 Pro are reminiscent on various fronts, but the company has offered slightly better innards for the latter. The Xiaomi Pad 6 series launched with a metal body and offer USB-C 3.0 port. The devices are equipped with a fingerprint sensor for added security.

Both variants also share the 11-inch display with a 2800 x 1800 pixel resolution. Xiaomi has used a 2.8K IPS LCD display with a 144Hz refresh rate. The company claims that the display is capable of offering great color accuracy. Besides, users get dual eye protection certification. Moreover, both devices are equipped with quad speakers system powered by Dolby Atmos. The tablets will run Android 13 wrapped under MIUI Pad 14 skin.

However, when it comes to the processor, the Xiaomi Pad 6 Pro has the edge over its sibling. The Pro variant comes packed with a Snapdragon 8 Plus Gen1 processor, while the standard variant runs on Snapdragon 870 SoC. The Xiaomi Pad 6 Pro has a 50MP rear camera and a 20MP front-facing camera. The Xiaomi Pad 6, on the other hand, gets 13MP rear and an 8MP front camera.

The battery is the only area where the standard variant beats the Pro version. The Pro variant comes with an 8,600mAh battery, while the standard variant comes equipped with a bigger 8,840mAh battery. However, the Pro version gets 67W charging, while the standard variant has to settle for 33W charging.

Xiaomi Pad 6, Pad 6 Pro pricing and availability details

The Xiaomi Pad 6 series launched in black, blue, and champagne gold color options. The standard variant will sell for CNY 1,999 (around $291) for the 6GB RAM and 128GB storage model, while the 8GB/128GB model is priced at CNY 2,099 (around $305). The 8GB/256GB model carries a price tag of CNY 2,399 (around $349).

Speaking of the Xiaomi Pad 6 Pro, the 8GB/256GB model will come for CNY 2,699 (around $392), while the 12GB/256GB will sell for CNY 2,999. The top-of-the-line 12GB/512GB version will set users back by CNY 3,299 (around $489). Both tablets are currently available for pre-orders in China, and the sales are expected to kick off by April 21. The company is yet to announce the international pricing and availability for the tablets.


[ad_2]
Source link

Elon Musk’s ‘TruthGPT’ is on the way to challenge OpenAI and Google

0
[ad_1]

Elon Musk confirmed that he’s working on an AI chatbot called TruthGPT. This chatbot would “create a third option” and wants to challenge OpenAI’s ChatGPT and Google Bard.

Rumors about Musk’s plans for tapping into the AI space have been circulating for months, but the recent moves suggest the billionaire has a well-baked plan for AI development. He recently launched his new company, X.AI, and was spotted buying thousands of GPUs to develop an AI product. Additionally, Musk is reportedly hiring AI engineers from rival companies like Google and OpenAI.

In an interview with Fox News, Musk revealed that his team is developing an AI chatbot to create a “maximum truth-seeking AI that tries to understand the nature of the universe.” Musk added he hopes TruthGPT would do “more good than harm,” as current AI tools are trained to lie.

Elon Musk seeks a healthy AI with TruthGPT

Of course, the billionaire admitted that rivals are ahead and he’s started late. Yet, there are no more details on how TruthGPT compared to ChatGPT and Google Bard. It also remains to be seen whether TruthGPT will be integrated into Twitter and Tesla EVs. Given the current trend of technology, we are more likely to see TruthGPT in Twitter and Tesla cars.

In his interview with Fox, Musk also warned about the potential dangers of AI. As well as its ability to destroy civilization. Musk said this was one of his main incentives to launch TruthGPT. He was one of the signatories of a recent open letter that argued all AI experiments should be halted for six months. Adding that more strict regulations are needed.

The second richest man in the world was one of the co-founders of OpenAI in 2015, which is currently the parent company of ChatGPT. Musk left the company after disagreements with current chief executive Sam Altman. He later said ChatGPT was politically biased.

Whether TruthGPT will be successful in its mission to spread healthy AI and become a rival to ChatGPT remains to be seen. But one thing is clear: with Musk at the helm, the future of technology looks brighter than ever.


[ad_2]
Source link

DoNot APT Hackers Attack Via Android Malware via Chatting Apps

0
[ad_1]
DoNot APT Hackers

CYFIRMA recently detected a cyber-attack on a person living in Kashmir, India, and obtained two malware pieces from the victim’s mobile download folder.

The investigation of these samples links the recent cyber-attack to DoNot APT, which has a long-standing record of activity in the area.

It seems the perpetrator behind the cyber-attack exploited third-party file-sharing websites to distribute malware to the victim’s mobile device. 

Due to this, the downloaded files get saved in the main download folder of the victim’s device. It’s might be possible that the attacker created their file-sharing website to deploy the malware. 

Interestingly, the malware samples were disguised as chat apps named:- 

  • Ten Messenger.apk
  • Link Chat QQ.apk

This threat actor has carried out cyber attacks in the South Asian region since 2016 when it was first found to be active.

External threat landscape management

The earlier campaign’s Android samples had encrypted strings that utilized the Base64 algorithm.

Unlike the previous campaign’s samples, the team discovered that the strings in the current sample had two encryption layers with CBC mode and PKCS padding:-

The code was hard to comprehend because it was obfuscated and safeguarded using Pro Guard.

According to the CYFIRMA technical analysis report of the attack shared with GBHackers, it aligns with DoNot APT’s modus operandi, as they have previously targeted entities in this region.

The threat actor has employed spear-phishing tactics against their adversaries in various industries and locations in the past. However, it’s unclear what the motive was behind the recent attack.

The recent attack by DoNot APT on an individual in Kashmir does not surprise the threat intelligence community.

Since this group has repeatedly targeted NGOs and other entities in the following regions in the past:-

  • Kashmir
  • India
  • Bangladesh
  • Pakistan

It is possible that the threat actor used popular messaging apps such as WhatsApp to initiate a social engineering attack and deliver the malicious app.

In contrast to other messaging apps, WhatsApp does not save attachments to the download folder, instead, they are saved in the WhatsApp media location.

Technical Analysis

The victim will be prompted to open the application as soon as the Android Malware Sample has been installed.

Once the victim opens the app, it prompts them to enable the accessibility service through a repeated alert every time they open the app, until the victim enables it.

Once the victim clicks on “Ok,” the app directs them to the Accessibility settings page and requests that they enable Accessibility by turning on “Link Chat.”

The app then conceals itself from the main menu and limits the victim’s ability to uninstall it.

The malicious app’s Android Manifest file contains a snippet revealing its attempt to acquire various permissions.

By doing so, the app could execute malicious activities, harming the victim’s device and privacy.

Here below we have mentioned all the permissions it asks for:-

  • READ_CALL_LOG: This enables actors to read and fetch call logs.
  • READ_CONTACTS: This permission allows TA to read and fetch contacts.
  • READ_SMS: This permission enables the threat actor to read the victim’s received and sent SMSs.
  • READ_EXTERNAL_STORAGE: This allows threat actors to explore and fetch data from the file manager.
  • WRITE_EXTERNAL_STORAGE: This allows threat actors to delete and move files.
  • STORAGE: This gives access to mobile internal storage, to view and access files.
  • ACCESS_FINE_LOCATION: Allows the threat actor to fetch precise locations and track the live movement of mobile phones.
  • WRITE_CALL_LOG: This allows the threat actor to delete numbers from call logs.
  • GET_ACCOUNTS: This allows the threat actor to extract emails and usernames, used for login into various internet platforms.

In order to decrypt the string, it was determined that the playstoree[.]xyz domain is involved.

In addition to being one year old, the suspected IOC is part of the notorious Do Not APT group.

DoNot APT Hackers

The string is encrypted and decrypted by a class using a secret key. Monitoring of compromised victims’ outgoing and incoming calls is performed using the following permissions:-

  • android.intent.action.NEW_OUTGOING_CALL
  • android.intent.extra.PHONE_NUMBER 
DoNot APT Hackers

A new sample with a different name was discovered during the analysis carried out by security experts.

However, except the command and control domain, the code used in the present sample is the same as the code they have previously analyzed.

The attackers continuously focus on individuals in Kashmir, using relatively unsophisticated attack methods. 

Apart from this, the threat actors have been observed using the same TTPs for the past two years, and this indicates a lack of innovation in their attacks.

Building Your Malware Defense Strategy – Download Free E-Book

Also Read:

Winnti APT Hackers Attack Linux Servers With New Malware ‘Mélofée’

Hackers Compromised CircleCI Employee’s Laptop to Breach the Company’s Systems

North Korean APT37 Hackers Exploited IE Zero-Day Vulnerability Remotely

U.S. Federal Network Hacked – Iranian APT Hackers Compromised Domain Controller


[ad_2]
Source link

Goldoson Android Malware Found in 60 Apps with 100M Downloads

0
[ad_1]

Goldson malware can collect data from apps installed on the device, as well as from Bluetooth- and Wi-Fi-connected devices.

McAfee’s Mobile Research Team researchers discovered at least 60 malicious apps on Google Play Store infected with Android malware Goldoson. Collectively, these apps account for around 100 million installs on the Play Store and 8 million installs on the South Korean ONE Store. South Korean users are most vulnerable to downloading these apps.

Goldoson Infiltrates Legit Apps on Play Store

Researchers found that Goldoson Android malware has infiltrated the official Google Play Store via 60 legitimate apps. The malware component is based on a third-party library that all sixty apps use. Researchers assume that the developers mistakenly added it to the apps.

Which Apps Are Infected with Goldoson?

Some of the infected apps include the following:

Pikicast
GOM Player
LIVE Score
Infinite Slice
Real-Time Score
L.POINT with L.PAY
Swipe Brick Breaker
Bounce Brick Breaker
LOTTE WORLD Magicpass
Compass 9: Smart Compass
Korea Subway Info: Metroid
SomNote - Beautiful note app
GOM Audio - Music, Sync lyrics
Money Manager Expense & Budget

How Does The Device Gets Infected?

The Goldoson Android malware is designed to perform malicious actions on devices that download one of the 60 infected apps. Once the app is downloaded and launched, the malware library registers the app and receives its configuration from a remote server with an obfuscated domain.

This configuration sets the functions that the malware will run on the device, including ad-clicking and data-gathering features. The data collection function is activated every two days, and the collected data, along with the MAC address of connected Bluetooth and Wi-Fi devices, is transferred to a C2 server.

The ad-clicking feature is launched by loading and injecting HTML code into a hidden, customized WebView. This feature generates revenue through multiple URL visits. Overall, the Goldoson malware has been found in 60 different apps and has impacted a large number of downloads.

What is Goldoson Malware Capable of?

Goldson malware can collect data from apps installed on the device, as well as from Bluetooth- and Wi-Fi-connected devices. In addition, it can track users’ location and carry out ad fraud by clicking on ads in the background without alerting the user. Data collection relies on permissions given to an infected app when being installed. 

In a blog post, McAfee researchers stated that although Android 11 and above versions are generally considered safe against data theft due to their superior security protections, in 10% of the infected apps, Goldoson could collect sensitive data from devices running these versions.

McAfee responsibly alerted Google and the app developers, who promptly removed the malicious library from the apps. Apps in which they couldn’t remove the library were taken off the Play Store.

It is worth noting that malicious versions of these apps will still be available on third-party Android app stores even though on Play Store these apps will become safe with an update. Therefore, uninstall the app, and reinstall it from Play Store to be safe.

  1. Russian Android Spyware Tracks GPS Location
  2. Play Store Apps Drop Android Malware to Millions
  3. BRATA malware steals funds, factory resets phones

[ad_2]
Source link

Samsung Galaxy S23+ vs Samsung Galaxy S21+

0
[ad_1]

This time around we’re comparing two high-end smartphones from Samsung. Well, one of them is the current high-end smartphone, while the other one is in the past. In this article, we’ll compare the Samsung Galaxy S23+ vs Samsung Galaxy S21+. The Galaxy S23+ kind of lives in the Galaxy S23 Ultra’s shadow at the moment, but it’s sure an excellent smartphone. We enjoyed using it quite a bit.

Some of you are probably wondering how it compares to its older cousin. Well, that’s what we’re here to find out, in case you’re thinking of upgrading, or something of the sort. We’ll first list the specs of both devices, side-by-side, and will then move to compare them across a number of categories. Let’s get started, shall we?

Specs

Samsung Galaxy S23+Samsung Galaxy S21+
Screen size6.6-inch fullHD+ Dynamic AMOLED 2X display (curved, 120Hz adaptive refresh rate, LTPO, 1,750 nits peak brightness)6.7-inch FullHD+ Dynamic AMOLED 2X display (120Hz adaptive refresh rate, 1,300 nits peak brightness)
Screen resolution2340 x 10802400 x 1080
SoCQualcomm Snapdragon 8 Gen 2 for GalaxyQualcomm Snapdragon 888 or Samsung Exynos 2100
RAM8GB (LPDDR5X)8GB (LPDDR5)
Storage256GB/512GB, non-expandable (UFS 4.0)128GB/256GB, non-expandable
Rear cameras50MP (f/1.8 aperture, 24mm lens, 1.0um pixel size, OIS, Dual Pixel PDAF)
12MP (ultrawide, f/2.2 aperture, 13mm lens, 120-degree FoV, 1.4um pixel size)
10MP (telephoto, f/2.4 aperture, 70mm lens, 1.0um pixel size, OIS, 3x optical zoom, PDAF)
12MP (f/1.8 aperture, 1.8um pixel size, OIS, Dual Pixel PDAF)
12MP (f/2.2 aperture, 1.4um pixel size, 120-degree FoV)
64MP (f/2.0 aperture, 0.8um pixel size, OIS, PDAF, Hybrid Optic 3X, 30X Space Zoom)
Front cameras12MP (f/2.2 aperture, 26mm lens, Dual Pixel PDAF)10MP (f/2.2 aperture, 1.22um pixel size, 80-degree FoV, Dual Pixel AF)
Battery4,700mAh, non-removable, 45W wired charging, 15W Qi wireless charging, 4.5W Wireless PowerShare
Charger not included
4,800mAh, non-removable, fast battery charging, Fast Wireless Charging 2.0, Wireless PowerShare
Charger not included
Dimensions157.8 x 76.2 x 7.6mm161 x 75.6 x 7.8mm
Weight196 grams202 grams
Connectivity5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.2, Wi-Fi, USB Type-C
SecurityIn-display fingerprint scanner (ultrasonic)In-display fingerprint scanner (ultrasonic)
OSAndroid 13
One UI 5.1
Android 11 (upgradable to Android 13)
One UI 3.0
Price$999.99/$1,119.99$289.99 (refurbished)
BuySamsungAmazon

Samsung Galaxy S23+ vs Samsung Galaxy S21+: Design

When the design is concerned, they’re quite similar, actually. They have the same exact shape, and look very similar in general. Still, it’s very easy to differentiate between them due to the cameras on the back. The Galaxy S21+ has a dedicated camera island, while the Galaxy S23+ does not. Its camera protrudes directly from the phone’s backplate. The Galaxy S23+’s cameras also take up more space on the back.

Both phones include a flat display, with a centered display camera hole up top. The bezels are very thin on both phones, and both devices have rounded corners, and display corners. The physical buttons sit on the right-hand side of both devices. They’re also both made out of metal and glass. The Galaxy S23+ has Gorilla Glass Victus 2 on the back, while the Galaxy S21+ has Gorilla Glass Victus.

The Galaxy S23+ is slightly shorter, and a bit wider than the Galaxy S21+. The two phones are almost equally thick. Samsung’s newer model is about 4-5 grams lighter in comparison. It’s worth saying that the Galaxy S23+ does have a slightly smaller display, and a different aspect ratio, hence the differences. They’re both quite slippery in the hand, and are not particularly good for one-hand use due to their size. Still, they’re not even close to the largest phones in the market. They do feel nice in the hand, though.

Samsung Galaxy S23+ vs Samsung Galaxy S21+: Display

The Galaxy S23+ includes a 6.6-inch fullHD+ (2340 x 1080) Dynamic AMOLED 2X display. This is a flat display with a 120Hz refresh rate (adaptive). It supports HDR10+ content, and it gets quite bright at 1,750 nits of peak brightness. It has a 19.5:9 aspect ratio, and the panel is protected by the Gorilla Glass Victus 2, the same protection as you’ll find on the back of the phone.

Samsung Galaxy S23 Plus Review AM AH 08

The Galaxy S21+, on the flip side, has a 6.7-inch fullHD+ (2400 x 1080) Dynamic AMOLED 2X display. This display is also flat, and it has a 120Hz refresh rate (adaptive). It also supports HDR10+ content, but it’s less bright than the Galaxy S23’s panel. It can get up to 1,300 nits of peak brightness. This display has a 20:9 aspect ratio, and it’s protected by the Gorilla Glass Victus.

Both panels look excellent, actually. Both are very sharp, vivid, and have good viewing angles. Touch response was also quite good during our usage, so no complaints there. When used outdoors, in direct sunlight, the difference is quite noticeable. The Galaxy S23+’s panel does get noticeably brighter. Even when the sun is out of the question, that display is more pleasant to use. So, if you do spend a lot of time outdoors, in bright light, the Galaxy S23+ is definitely the better choice. If not, both panels are excellent.

Samsung Galaxy S23+ vs Samsung Galaxy S21+: Performance

Qualcomm’s Snapdragon 8 Gen 2 SoC fuels the Galaxy S23+. That phone also has 8GB of LPDDR5X RAM, and UFS 4.0 flash storage. The Galaxy S21+, on the other hand, is fueled by the Snapdragon 888 and Exynos 2100, depending on the market. It includes 8GB of LPDDR5 RAM and UFS 3.1 flash storage. The Galaxy S23+ does have the advantage from the performance hardware side of things.

Is that advantage noticeable during usage? Well, yes, actually. In regular, not demanding tasks, it’s far less noticeable, as both phones do feel very smooth. The Galaxy S23+ does not stutter, though, almost at all, while that is something you will notice on the Galaxy S21+, especially the Exynos model. The difference is more noticeable in games, though. The Galaxy S23+ can handle pretty much any game with ease, as can the Galaxy S21+, but it does struggle a bit more with the most demanding titles.

Another difference can be noticed in heat dissipation, well, especially if you have the Exynos model of the Galaxy S21+. The Galaxy S23+ does manage to stay cooler at all times. The Snapdragon 888 is also good in that regard, but not as much as the Galaxy S23+. So, yes, the newer model is the better performer overall, which is to be expected. The Galaxy S21+ is still good, though, and nothing to scoff at.

Samsung Galaxy S23+ vs Samsung Galaxy S21+: Battery

A 4,700mAh battery sits inside the Galaxy S23+, while you’ll find a 4,800mAh unit inside the Galaxy S21+. In our experience, both phones do a good job when it comes to battery life, but not to the level of the Galaxy S23 Ultra. That phone has simply outstanding battery life, so we’re not sure why it did not translate to the Galaxy S23+, as the specs are similar. In fact, based on the specs, the Galaxy S23+ should be able to push further than the Galaxy S23 Ultra, but that’s not the case.

The Galaxy S23+ can cross over the 8-hour screen-on-time mark. In our case, we still had around 10-15% of battery life at that point, sometimes even a bit more. Do note that gaming was not a part of the picture, though. The Galaxy S21+ is not close to such numbers, at least it wasn’t back in the day. We are talking about the Snapdragon 888 model, though. Still, if memory serves well, it did fly close to 7-7.5 hours of screen-on-time. Both phones are quite good in that regard.

The Galaxy S23+ supports 45W wired charging, 15W wireless charging, and 4.5W reverse wireless charging. The Galaxy S21+ is on the same playing field when it comes to wireless and reverse wireless charging. It’s a bit slower in terms of wired charging, though, as it comes with 25W charging. One thing to note is that neither phone offers a charger in the box. You’ll have to get it separately if you don’t have it already. Just get a PD3.0 charger and you’re good to go.

Samsung Galaxy S23+ vs Samsung Galaxy S21+: Cameras

The Samsung Galaxy S23+ includes a 50-megapixel main camera, a 12-megapixel ultrawide unit (120-degree FoV), and a 10-megapixel telephoto camera (3x optical zoom). The Galaxy S21+ has a 12-megapixel main camera, a 12-megapixel ultrawide camera (120-degree FoV), and a 64-megapixel telephoto unit (1.1x optical zoom). Now, both phones are capable of capturing really good photos, but the Galaxy S23+ definitely stands out.

Samsung Galaxy S23 Plus Review AM AH 20

Both phones do take really nice-looking photos during the day, but the Galaxy S23+ does manage to capture slightly more detail. It also does a better job when it comes to balancing photos, and with HDR situations. In low light, both phones manage to retain a lot of light from the shadows, but the Galaxy S23+ shots end up looking sharper in general. You’ll definitely notice the difference.

The telephoto camera does a better job on the Galaxy S23+, as the Galaxy S21+ doesn’t offer anything close to 3x optical zoom. The ultrawide camera during the day does a good job on both phones, but the photos from the Galaxy S23+ do end up looking less artificial. It also does a bit better in low light too. The video recording is good on both, but once again, the Galaxy S23+ does stand out, as the footage ends up looking a bit more stable and better processed. The differences are not colossal, though, not at all.

Audio

There is a set of stereo speakers on both smartphones. Speakers on both devices do sound good, but the Galaxy S23+ does seem to provide a better balance. It sounds a bit different, and a bit more detailed. The difference is not that big at all, and both phones are great in this regard.

What you will not find on either phone is an audio jack. You will be forced to use that Type-C port if you’d like to connect your headphones via a wire. If not, there is Bluetooth 5.3 included on the Galaxy S23+, and Bluetooth 5.0 on the Galaxy S21+.


[ad_2]
Source link

Instagram now lets you add multiple links to your profile

0
[ad_1]

Instagram is finally adding a requested update to its functionality. Soon, users will be able to add multiple links to their profile. For years, the app has only allowed users to add a single link to their bio. This has prompted folks to turn to third-party tools such as Linktree, a link-in-bio platform, to add multiple links. 

Instagram will now let all users add multiple links to their bio

Now, Instagram is adding its own feature for users to add multiple links directly into the app. Meta CEO Mark Zuckerberg announced the launch of the update today, suitably on his own Instagram channel. He calls it “probably one of the most requested features we’ve had.”

The feature is currently rolling out to all users, both personal and business accounts. With this update, you will be able to add up to five links into your profile. The way the new feature works is that if you add more than one link to your profile, Instagram will truncate the first one and will ask if you want to add more links. 

However, there is a catch to this new feature. Only the first link will be visible in your profile. Additional links will be hidden in a pop-up menu. Tapping the first link will pull up this hidden menu, allowing users to view your additional links. 

This limitation might prompt users to continue using Linktree, which allows users to have any links that they add to be visible at once. It’s also possible that users will stick with Linktree out of habit or because Linktree allows users to build a more customized page for multiple links. 

In any case, Instagram’s update allowing users to add multiple links to their profile was a long-time coming. And users will surely be happy that it’s being added.


[ad_2]
Source link

Samsung’s News app is rolling out to U.S. Galaxy devices delivering the day’s top stories and more

0
[ad_1]
According to Samsung, these days more consumers prefer to read the news from their mobile devices. As a result, Samsung today announced that it has launched the Samsung News app that delivers “everyday news experience in one convenient place.” The company says that the app will include “trusted news sources” and users will be able to access briefings in the morning and evening. It also will give Galaxy device users the ability to see their trusted news sources via a single swipe.
Available first to U.S.-based Galaxy users as an update to the Samsung Free app that contains free premium content and services for Samsung device owners. If you already have the Samsung Free app on your Galaxy phone, starting today you will see the icon change to reflect the Samsung News name. Or, the Samsung News app can be downloaded from the Galaxy Store. Samsung will first roll out this new feature on select phones and it will be made available to all other eligible U.S. devices over the coming weeks.
You’ll certainly recognize the list of news sources that will be available from the Samsung News app. Right now, this list includes:
  • Bloomberg Media
  • CNN
  • Fortune
  • Fox News
  • Glamour
  • GQ
  • HuffPost
  • Money,
  • Newsweek
  • New York Post
  • Parade
  • POLITICO
  • Refinery29
  • Reuters
  • Salon
  • Slate
  • Sports Illustrated
  • The Daily Beast
  • TheStreet
  • USA TODAY
  • Vice

No matter which side of the political spectrum you’re on, or whether you want hard-hitting news or just want to learn about your favorite sports teams, the Samsung News app will give you access to the news sources that you favor. Samsung says that over time it will add additional news sources.

Get the Samsung News app on your brand-new Galaxy S23 Ultra. Buy it now!

There are three ways to access the news from the app. Daily Briefings are delivered twice a day, in the morning and the evening. These briefings give users the top headlines of the day in one location. Users can also view news feeds from Samsung’s partners, organized for quick and easy access. With the “Following” tab, users can update the preferences they select to customize the news that they want to see. And the Samsung News app also gives users a location to access all of their favorite podcasts or discover new ones.

Avner Ronen, VP of Product Development at Samsung Electronics, sums up the new app by saying, “We created Samsung News to deliver breaking and premium news to Galaxy users in an easy-to-access format. Our goal is to support users by letting them curate their ideal news experience.”


[ad_2]
Source link

What is Spear Phishing ? Guide to Motives,Techniques and Prevention

0
[ad_1]
Spear Phishing

Every day tens of thousands of Spear phishing emails are sent to millions of victims around the world.

Cyber-attacks have different pathways now; they can strike you from inside or outside, with equal damages across your network.

Targeted takedowns could be critical if analyzed and executed with absolute precision.

In this guide. We’ll look at Spear Phishing Attacks, techniques, examples, mitigation procedures, and a few best practices.

What is Spear Phishing?

Spear Phishing is a malicious practice that executes via Email campaigns that hackers research their target audience, understand their likes and dislikes, study their day to day operations, and customize the mail to steal sensitive data and install malware. This type of targeted email campaign deployment to infiltrate their target audience group is called Spear Phishing Attack.

Any anonymous email that drops into your inbox from an unknown sender can be assumed to be phishing Attack. Blasting millions of emails to the database of email id’s with malicious intent is called phishing.

It could be for the deployment of malware, remote code executions and more, however, this phishing may not be rewarding for hackers.

How does Spear Phishing Attack Work?

Spear Phishing is executed in four stages,

  1. Target identification
  2. Studying the target’s behavior
  3. Customizing the message
  4. Blasting emails

Target identification:

The hackers initially identify their target victims by narrowing down their audience based on their motive of the campaign, this could be targeted at corporate in a particular vertical or patients of a healthcare company.

The identification procedure is divided into two stages, the primary and secondary target, primary target will be executives working for an MNC, who will be receiving the blasted emails and the secondary target will be the key ones who will have access to business sensitive information.

These primary targets that have become victims to the spear phishing attack will be manipulated to exploit the secondary targets.

Studying the target’s behavior:

Gathering information about the targeted audience by digging deep into their social media profiles, job sites, portfolios, comments, likes and groups they belong to, and communities they belong to. One way or another the hackers will gain their personal information like email, phone numbers, first name, surname, history of experience, schooling, college, area of expertise and more which they will use to influence their potential targets.

Customizing the message

Hackers will customize their emails and message based on the information collected from these external resources for better open rates and reduced bounce rates. Once a successfully established message is obtained they will proceed for the email blasting procedure.

Blasting emails

After all the research hackers will prepare their attack vector and strategy to ensure the mail gets delivered to the target audience inbox and not into the spam folder.

They will disguise the sender details to be a legitimate one, to ensure the proper delivery of the mail is made and the end user opens it as expected.

After opening the email, the user will click a link or download an attachment-based on the content as it is made accurate.

With all research, the CTR will definitely be high. Thanks to the reliability of the mail crafting procedures the hackers have implemented.

What are 3 types of Spear-phishing emails?

Usually, hackers prefer one of three techniques below to manipulate their target audience.

  1. Impersonation
  2. Personalization
  3. Emotional Response

Impersonation

As the name defines, hackers pretend to be someone else or a legal entity to establish trust and elude with data. This technique is very commonly used by disguising a genuine person or entity in the sender section with an indistinguishable subject line.

Personalization

This technique has an excellent success rate, as the message is very much customized for the recipient so he believes that this email will be of use to him or for his profession in general.

Emotional Response

This technique creates a fear, happiness, shock or surprise to make the end user open the mail and click/download the malicious content as planned.

What is an example of spear phishing?

Examples of Spear Phishing Attacks are very much targeted and often have disastrous outcomes for enterprises, below are few examples for successful spear phishing attacks.

Ubiquite Networks Inc

This Company paid more than USD $40 million in 2015, as a result of spear phishing attack because of a CEO fraud. The emails were impersonated as if they were from senior executives to transfer funds to a third party entity in Hong Kong, which was then found to be some anonymous entity and not a genuine third party.

RSA

RSA is a leading security firm but unfortunately, even they themselves become victim to a targeted spear phishing attack in 2011.

Mails with subject line ‘2011 Recruitment Plan’ were blasted, though most of it was marked as spam one user opened it, leading to the deployment of malware into the infected system and eventually gave remote access to the hackers to infiltrate the computer and network.

Amazon

Amazon is another leader among the fortune 500 companies, targeting this firm will definitely improve your success rates for spear phishing.

In 2015, a mass spear phishing attack was unleashed targeting Amazon customers with a subject line ‘Your Amazon.com order has been dispatched’, followed by a code.

However, unlike the normal emails from Amazon, where you could see the dispatch status directly in the mail or via your Amazon account, in this case, it was mentioned to be available in the attachment.

Few employees become prey to this maneuver and a Locky ransomware was downloaded and installed in the infected systems to encrypt data and demand ransom.

How can you protect yourself from phishing?

Spear phishing prevention is a process that depends on different factors like awareness, tools, education, emotional response and more. Below are the best practices that both organizations and individuals should practice to protect yourself from phishing,

  1. Increasing cyber awareness
  2. Employing cyber tools
  3. Identifying fake emails
  4. Avoiding clicks and attachments
  5. Avoid mails that force urgency

According to a report from Intel 97% of people were unable to identify a phishing mail. The best suggestion to apply spear phishing prevention by creating cyber awareness and improving cyber education. Spear phishing prevention is a process that will depend on a number of factors and their amount of precision.

Increasing cyber awareness:

Organizations and individuals should improve their cyber awareness either themselves or through cyber guidelines. Understanding the attack vectors, their mechanisms, procedures and possible procedures can help the end users and individuals prepare themselves any potential phishing scams and ensure they avoid them all times.

Employing cyber tools

As already mentioned in earlier sections, no tools are good against phishing attacks but properly configured browser policies, email filters, and endpoint configurations can reduce the chances of becoming a victim to phishing scams. GPO policies for stronger passwords and firewall configurations could also help organizations secure their users against phishing mails.

Identifing fake emails

Users can also distinguish between a genuine and fake mail by looking at the subject line, the sender and the relativity. Based on the content of the email this can be re-confirmed. Any unknown senders or purpose of the mail could be a potential phishing scam.

Avoiding clicks and attachments

Not all phishing scams do work when the mail is opened, most is switched ON only when the link in the mail is being clicked or an attachment is being opened. So the users need to ensure they are aware of the links and attachments, perhaps by hovering over the link or looking at the attachment file.

Avoid mails the force urgency

Users should avoid emails that create an urgency; emotional response is what will become prey to these sort of phishing emails. Any emotional mail that create a fear, surprise, shock, or personalized emotional response based on your tax, and health metrics should be avoided.

Spear Phishing Infographic

Spear Phishing

Organizations need to have few policies and configurations in place to keep phishing mails away from the enterprise network, however when users expose themselves to public networks only a self-analysis and cyber practices can keep them safe against spear phishing attack.

If you guys have ever experienced a phishing email, or do have an example to share, please free to comment below your experiences and message so we will see some real-time information on this threat.

Spear phishing attacks are hard to detect and mitigate, so keep your browsers and firewalls active and updated.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


[ad_2]
Source link