Best HDMI Cables for your TV

0
[ad_1]

An HDMI cable is almost needed as much as a USB-C cable at this point, because it is used by just about everything. From your gaming consoles, to your laptop, to even your streaming devices like a Roku or Chromecast. But not every HDMI cable is created equal. You might head to Best Buy and find a cheap HDMI cable and think that’s a great option. It might be, it might not be.

Here in this article, we are rounding up the very best HDMI cable that you can pick up for your TV in 2023.

Best HDMI Cables

This list has HDMI cables that can support 4K Ultra HD resolution, as well as a couple of 8K models available. While majority of us don’t have a 8K TV, that will change in the future, so you might as well invest in a good 8K HDMI cable now.

Product nameCostWhere to buy
Monoprice 6′ High Speed HDMI Cable$6.98Amazon
Best Buy Essentials 6′ 4K HDMI Cable$6.99Best Buy
Cable MAtters 48Gbps 8K HDMI Cable$10.49Amazon
Philips 4′ High Speed HDMI Cable with Ethernet$9.19Target
Insignia 25′ 4K HDMI Cable$79.99Best Buy
Rocketfish 4′ 8K High Speed HDMI 2.1 Cable$39.99Best Buy

Monoprice 6′ High Speed HDMI Cable

51pBqQUe GL SL1200

  • Price: $6.98
  • Where to buy: Amazon

Monoprice is a pretty popular name in the world of cheap cables. And that’s because they offer cheap, but good cables. And this one here is a six-foot long HDMI cable. That’s going to be plenty long enough for most TVs and entertainment setups. And it’s also the most common lenght here.

This is a “premium certified” cable, which means that it is guaranteed to perform at a specific level. That level is 4K at 60Hz. Since this does not support HDMI 2.1, it won’t do 4K at 120Hz, unfortunately.

This is the cheapest cable on this list, but not by a huge margin. The next option is just a penny more expensive actually.

Monoprice High Speed HDMI Cable – Amazon

Best Buy Essentials 6′ 4K HDMI Cable

6472356 sd

This is Best Buy’s in-house brand, so yes it’s still cheap, but this is still a pretty good HDMI cable. It’s going to be perfect for most people and can support 4K at 60Hz. It can also support up to 18Gbps bandwidth. Ensuring a great picture and sound experience with this particular HDMI cable.

It also uses nickel-plated connectors, allowing it to resist corrosion for long-lasting use. So you won’t need to replace this anytime soon.

Best Buy does sell this particular HDMI cable in three lengths: 3-foot, 6-foot and 12-foot. So if you do need something shorter, or a bit longer, they have you covered here.

Best Buy Essentials 6′ 4K HDMI Cable – Best Buy

Cable Matters 8K HDMI Cable

61O4 dPc9GL SL1500

  • Price: $10.49
  • Where to buy: Amazon

If you just bought a 8K TV, then you’re going to want to buy this 8K HDMI cable. While it’s not the best, it will get the job done. It is able to do 8K at 60Hz and 4K at 240Hz. It also supports eARC over HDMI, so you can use it for a soundbar as well. And still get Dolby Atmos and DTS X Surround Sound 7.1 and 5.1 here.

This is backwards compatible with HDMI 2.0 cable and does support RGB HDR 12-bit color and Dolby Vision. So you’ll be able to take full advantage of all the features of your TV with this cable.

Cable Matters 8K HDMI Cable – Amazon

Philips 4′ High-Speed HDMI Cable

best hdmi cable

  • Price: $9.19
  • Where to buy: Target

This is a shorter HDMI cable, this time from Target. It’s a good option for a smaller TV, or a setup where your consoles and streaming devices are closer to your TV. As a shorter cable means that the signal has to go less distance to get to your TV.

It’s a HDMI 2.0 cable here, so that means it is capped out at 4K at 60Hz. Which is perfectly fine for most people. It’ll still work perfectly fine with your Apple TV, Fire TV, Roku or any other device.

Philips 4′ High-Speed HDMI Cable – Target

Insignia 25′ 4K HDMI Cable

best hdmi cable

If you have a very elaborate setup, then this HDMI cable might be needed. This is a 25-foot long HDMI cable that is capable of 4K at 60Hz, since it is still HDMI 2.0. This particular cable is available in smaller sizes, should you not need a 25-foot cable.

This is also rated to be used within a wall. So if you are trying to do a setup where everything is hidden, this is a pretty good option, to be quite honest.

Insignia 25′ 4K HDMI Cable – Best Buy

Rocketfish 4′ 8K High Speed HDMI 2.1 Cable

best hdmi cable

This is the best HDMI cable to get for 8K and/or HDMI 2.1. If you have a PlayStation 5 or an Xbox Series X with a HDMI 2.1 compatible TV, then this is the cable you want. It’s one of the few that can do HDMI 2.1 at a decent price. That’s going to give you 4K at 120Hz, or 8K at 60Hz. It can even support up to 10K, though we have not seen any 10K TVs just yet.

On top of that, it also supports VRR or Variable Refresh Rate, which is a big feature for the PlayStation 5 and Xbox Series X.

This is a very high-quality HDMI cable from Rocketfish, and you can tell by just how thick the cable is here. It is in-wall rated, and comes in a four-foot length. While this is a HDMI 2.1 cable, it is backwards compatible with older HDMI standards, so you can use it with other devices too.


[ad_2]
Source link

EU Chips Act is set to be approved this month

0
[ad_1]

After the United States’ initiative to boost its semiconductor manufacturing capabilities and reduce its reliance on Taiwan, the EU is also taking significant steps to strengthen its semiconductor industry with its own Chips Act.

According to a report from the South China Morning Post, the European Union plans to reduce its dependence on US and Asian suppliers with a $47 billion investment, aiming to increase the EU’s share of global chip output to 20% within a decade.

While initially, the European Commission proposed funding only for advanced chip plants, in the wake of the global chip shortage, the EU governments and lawmakers further expanded the scope to include the entire value chain, including older chips and research and design facilities.

Additionally, this expansion is also in response to the growing importance of Belgium-based IMEC, a leading innovation hub in nanoelectronics and digital technologies. With over 600 major industry players, lawmakers see IMEC as a significant reason to invest more in research and development.

Funding negotiations and potential deal clinching

EU countries and lawmakers will meet at the European Parliament’s monthly session in Strasbourg on April 18th to negotiate the funding details for the Act. And, according to sources familiar with the matter, the likelihood of clinching a deal is high. However, discussions so far have pointed to a €400 million shortfall, but the EU executive has reportedly secured the bulk of the funds.

Moreover, the EU’s move to provide funding for the entire value chain will also address the complaints of smaller EU countries about being left out after Intel and STMicroelectronics announced plans to build chip manufacturing facilities in Germany and France, respectively.

The EU Chips Act is a significant step towards boosting the European semiconductor industry and its success will be crucial in securing the EU’s position in the global technology landscape and reducing its reliance on Taiwan and the United States.


[ad_2]
Source link

Ransomware Gang Leaked 600GB of Data

0
[ad_1]
Ransomware Gang Leaked

The ransomware gang responsible for the February attack on the City of Oakland, California, released a second data dump. The dump consisted of nearly 600 gigabytes of files that contained stolen municipal data, exposing critical information on thousands of employees in the city.

Play, the threat group responsible for the ransomware attack, posted the second leak on their site, following up with their first data dump at the beginning of March, with Oakland’s data sizing up to 10 gigabytes.

The leak included thousands of former and current city employees and a massive 12 years of city roster. It also had several police misconduct allegations and scanned bank accounts.

Oakland City Hall statement reads, “As a further community update, we recently became aware that the same unauthorized third party claiming responsibility for the ransomware incident has posted additional data allegedly taken from our systems during the incident in February to a website not searchable via the traditional Internet.

Since the attack in February, Oakland has recovered some of the services disrupted during the breach, including its 311 line, which serves as a government contracting portal and online permit application system.

Nevertheless, the attack still affects the City significantly, with the threat group frequently leaking stolen data. In accordance with this second data dump, a union representing Oakland Police Department officers had filed a claim of nearly $25,000 for every police officer whose data had been leaked in the breach.

The association also released a statement accusing city leaders, including Mayor Sheng Thao and City administrator G. Harold Duffey of refusing to answer and hiding the extent of the ransomware attack.

“Oakland city leaders talk about accountability, yet there has been zero accountability and a deafening silence for the safety and financial security of the city’s valued employees. This city is truly broken when city employees learn more about releasing their confidential information from the media than their employer, whose incompetence and sloppy security allows these data breaches to occur.” said Barry Donelan, the association’s president.

Oakland city officials are still investigating this issue and dealing with the clashes between the Officer’s Union and the city leaders. A similar clash between Washington D.C.’s Metropolitan Police Department and the city officials was due to the 2021 data breach incident.

Looking for an all-around patching solution – Try Patch Manager Plus


[ad_2]
Source link

Malwarebytes’ 15-year journey in business cybersecurity

0
[ad_1]

It’s time to buckle up and embark on a whimsical journey through the twists and turns of Malwarebytes’ evolution.

As we raise a glass to toast Malwarebytes’ 15th anniversary of boldly venturing into the realm of business cybersecurity, we’re feeling nostalgic.

It’s time to buckle up and embark on a whimsical journey through the twists and turns of Malwarebytes’ evolution. From modest beginnings to becoming a titan in business cybersecurity, we’ve got a tale to tell, so take your seats, grab your popcorn, and enjoy the show!

Act I: Humble Beginnings (2008 – 2012)

In the late 2000s, Malwarebytes tiptoed into the business sector with corporate licensing for its consumer anti-malware product. It was a modest start, but hey, every masterpiece starts with a single brushstroke, as they say.

2012 marked a milestone as Malwarebytes introduced Anti-Malware Small Business Edition, a tailored solution with features beyond the Home edition, like XML Logging and Advanced Command Line Parameters & Controls. Now we were cooking with gas!

Act II: Malwarebytes Takes the Stage (September 2012 – 2016)

With the grand entrance of Malwarebytes Enterprise Edition (MEE) in late 2012, our business offerings went from a fresh-faced newcomer to a seasoned performer. MEE delivered centrally deployed, administered, and monitored threat protection and malware remediation to an audience of businesses, governments, and educational institutions.

Our performance received rave reviews, and the likes of The University of Alabama, NextGen Healthcare, and several Fortune 1000 companies lined up for an encore. Malwarebytes CEO Marcin Kleczynski summed it up in 2013, promising more show-stopping acts in the future:

“We have been making great progress since the launch of MEE, and this is just the start. Over the next year we’ll be releasing a new enterprise product, and there will be tremendous opportunities within our growing channel program,” said Kleczynski. “We’re carving out a new space in endpoint security by offering a solution that protects enterprises from zero-day malware incidents that AVs struggle to detect.”

And you best believe that Marcin was true to his word.

Act III: The Plot Thickens (June 2014 – 2016)

In 2014, Malwarebytes launched the Anti-Malware Remediation Tool, a sleek, portable solution for businesses to eliminate malware with minimal fuss. This was swiftly followed by Malwarebytes Endpoint Security, a triple-threat bundle combining Anti-Malware for Business, the Management Console, and Anti-Exploit for Business.

Act IV: The Cloud Age (2017 – 2018)

The year 2017 marked a turning point as Malwarebytes unveiled Nebula 1.0, a cloud-based console that propelled us into the world of cloud security management. Nebula 1.0 featured Malwarebytes Incident Response and Endpoint Protection, showcasing our innovative machine learning approach to Anomaly Detection.

In 2018, we expanded our portfolio with Endpoint Protection for Mac, Endpoint Detection and Response (EDR) for Windows endpoints, EDR Ransomware Rollback, and EDR Endpoint Isolation. Our growing repertoire of features ensured that no businesses’ platform was left unprotected.

Act V: OneView to Rule Them All (2019)

2019 saw the introduction of OneView, a multitenant console designed for Managed Service Providers (MSPs). This innovation allowed MSPs to effortlessly manage multiple clients’ cybersecurity needs from one central command center.

With Malwarebytes OneView, MSPs could now deliver the exceptional protection and remediation capabilities their clients demanded, without compromising on efficiency or profitability.

Act VI: Windows Servers and Beyond (2020 – 2021)

We didn’t rest on our laurels in 2020, enhancing our EDR offerings with support for Windows Servers and the addition of Flight Recorder Search for advanced visibility and search capabilities.

In 2021, Malwarebytes extended its protective umbrella to include EDR for Mac and Cloud Sandbox, followed by Threat Hunting Alerts and Brute Force Protection, ensuring cyber threats were kept at bay.

Act VII: A Smorgasbord of Enhancements (2022)

In 2022, Malwarebytes broadened its horizons, embracing an Active Response Shell for EDR and EDR for Linux-based systems. We also introduced Device Control, Vulnerability Assessment, and Patch Management Modules to empower administrators in their ongoing battle against exploits and other cyber threats.

But wait, there’s more! Malwarebytes added a DNS/Web Content Filtering Module and a Cloud Storage Scanning Module to the mix, rounding off a delectable buffet of cybersecurity enhancements. Oh, and did we mention our venture into Managed Detection and Response (MDR) services? We just can’t help ourselves!

Act VIII: The Mobile Frontier (2023 and beyond)

As we set our sights on the future, 2023 marked our foray into Mobile Protection for iOS, Android, and Chromebook platforms. The introduction of an Application Block Module gave administrators even greater control over app installations on devices.

As we continue to innovate and expand our offerings, we’re committed to rolling out products that enable resource-constrained IT professionals to save valuable time and resources while being protected from the latest threats. Upcoming offerings include enabling centralized administration on-the-go, extending award-winning protection to more threat vectors, and providing continuous monitoring and guidance so that IT people can easily secure their environments while focusing on other critical tasks.

Curtain Call

From a humble anti-malware solution in 2008 to the leading provider of business cybersecurity in 2023, Malwarebytes’ story is one of tenacity, innovation, and the occasional dad joke. As we celebrate our 15th anniversary, we look back with pride and look forward with anticipation, knowing that the best is yet to come.

Keep an eye on our blog and press center for the latest goodness for Malwarebytes for Business!


[ad_2]
Source link

Microsoft Edge Workspace allows you to share your browser tabs

0
[ad_1]

The new Microsoft Edge Workspace feature is becoming available to some users for testing. This new testing version brings a clearer picture of what the feature is all about. If you collaborate with colleagues or classmates on lots of topics, then you might need to pay close attention to this article.

From the latest public preview of this feature, users can finally get a glimpse of its functions. The new workspace function makes cross-collaboration easy within a team working on a project. It does this by letting members of the team share their browser tabs with others.

This makes it easier to get your project research sources vetted by other members of your team. But there are a few things to take note of before rushing in to make use of this new workspace feature. In this article, you will get to know more about this feature and how you can put it to good use.

Microsoft Edge Workspace takes cross-collaboration to a new level

Are you struggling with getting information on your research work across to your team? If yes, you might need to put the Microsoft Edge Workspace feature to good use once available. With this feature, you can bring together a ton of web pages under a labelled group and then share the group with others.

Users can add a name or label these groups for easy identification while sharing. For visual identification, users can also add colours to point out each group in case they have more than one saved. So, what are the procedures to take before opening a new workspace to share with team members?

The first step to take is to open a new workspace tab, failure to do this will mean your progress won’t be saved. With the most recent update, the workspace tab sits at the top left-hand corner of the screen. Once your new workspace tab is open, you can start your research and open as many web pages as you wish.

It is advisable to name your workspace and add colour to make it stand out from other workspace tabs you might have saved. When your research is complete, you can share it with others by clicking the “Invite” button. This will pull up a small window and you are to select “Copy Link” and send it to team members.

Those you are sharing this link to need to have the Edge browser to view the workspace. Once anyone clicks on the link you send and accepts the invite, you’d get notified. Their name and icon will pop up on your workspace, so you can know those that viewed your research work.

Students and other professionals will find this feature interesting as it improves teamwork. Only a preview for this feature is available for download at this moment and you can get it now. Step up your working experience with the new Microsoft Edge Workspace feature.


[ad_2]
Source link

Twitter blocks access to its API, even for those willing to pay

0
[ad_1]

Twitter seems to have officially cut off free access to its API. Over the past few days, several developers have reported that their third-party Twitter clients have stopped working. This ban also affects many researchers, journalists, academic institutions, bot makers, nonprofits, and other developers that use Twitter’s API for various purposes. The company has already announced multiple paid tiers of its APIs.

Twitter has been working on this change since early this year. In mid-January, it abruptly blocked third-party clients without any warning or notice. The company later announced that it would not allow free access to its APIs to anyone. Developers would require to pay to use its APIs. The paid API was supposed to be available in early February but was delayed indefinitely as Twitter needed more time to complete the redesign.

Finally, Twitter announced its new paid API tiers in late March. It did keep a “Free” tier, but with little access. The company said it’s designed for “write-only use cases and testing the Twitter API”. The new free version of Twitter API offered too little for many developers to continue their work without paying the social media giant anything. Unsurprisingly, they decided to shut down their projects.

For those willing to pay, Twitter launched a $100 per month “Basic” tier that is ideal for “hobbyists or prototypes”. The “Enterprise” tier, on the other hand, is for “businesses and scaled commercial projects”. It will have varying monthly subscription plans, likely based on individual use cases. Reports say the Enterprise tier could start at a staggering $42,000 per month.

Twitter has now blocked access to the old free version of its API

A week after this announcement, Twitter has now shut down the existing free version of its API. Everyone, including those willing to pay the exorbitant cost of the Enterprise tier, has lost access. Developers say they have already signed up for the paid version. But instead of making necessary changes to their API access, Twitter has cut off access entirely without notice.

“When Twitter announced these new tiers last week, we immediately sought to sign up for the Enterprise tier,” Echobox said in a recent . “We still have had no response from Twitter’s enterprise sales team and our access to the API was cut off without notice yesterday”. Likewise, Twitter has many suspended third-party clients that signed up for the Enterprise tier. These include Tweet Deleter, Tweet Hunter, Tweet Archivist, Tweet Shelf, and more. As of this writing, Twitter hasn’t said a word on the matter. We will let you know as soon as we have more information.


[ad_2]
Source link

Chrome to bring a new epoch of web graphics to mobile and desktop

0
[ad_1]
Google’s infamous and popular browser Chrome, which comes pre-installed on some of the best smartphones on the market, will get an update to WebGPU after six years of development time in collaboration with Microsoft, Apple, Intel and Mozilla. The update is expected to impact both the app and desktop experiences, and maybe other browsers that use Chromium as a base.

But wait, what is a WebGPU anyway? Why should you care? Well, a WebGPU is basically an API — something that enables different types of programs to “talk” to each other — that aims to improve the way that Chrome utilizes the hardware associated with the given system on a specific device. Or, in simpler terms: a program that can improve the way that your hardware is used by Chrome in order to achieve prettier and more impressive visual results. Improvement in computational speeds is also expected too, which means less waiting around for loading.
But let’s provide an applicable example. Google Meet is an online communication platform, which allows users to get on video calls. Since video is part of the visual department, this new WebGPU API will impact Meet too. A simple example would be that it will increase the responsiveness and accuracy of the blur that users can apply to their surroundings when on a call. Neat, right?

This update is also stated to improve rendering — in this context, the transformation of 2D images into 3D objects — too. This in turn amps up the performance of currently utilized tech and will allow for more impressive results for applications such as Unity’s WebGL, so gamers have something to look forward to too.

One of the goals with this update is to, quote, “have applications work portably across different user systems and browsers”. For you, this means better tools and higher productivity interaction. The tech is already available on the Chrome 113 stable beta, and it is expected to drop on PCs first, followed by a roll out for Android and Linux later on.
And just in case…
… all of this GPU talk got your thumbs itching, check out our recommendation on the best gaming phones available right now.

[ad_2]
Source link

Market Place for Selling phishing

0
[ad_1]
Telegram  Market Place

Telegram is becoming an increasingly popular platform for users as well as cyber-criminals. It has become a Mini Dark-web since 2021 when cyber threat actors have been using them.

The services these threat actors offer vary from Automation of Phishing, selling Phishers kits, and setting up a custom phishing campaign for everyone willing to pay.

To promote their stuff, these phishers create Telegram channels where they conduct polls, train their audience, and provide choices on what kind of personal data they prefer. 

Channel links are circulated via GitHub, YouTube, and the Phishing links they make. A detailed analysis of their pricing, services, and other information is listed below.

Offers Now: Telegram Black Market

These threat actors’ services are categorized into two “Paid” and “Free”. Telegram bots help many legitimate users automate regular tasks, answer customer FAQs, set reminders, etc. However, threat actors use the bots for phishing page creation or user data collection.

Creating a phishing page with a telegram bot involves the following steps,

  • Aspiring phisher joins a bot creator’s channel
  • Choose the language (English / Arabic)
  • Bot asks the phisher to create their bot and share its token with the current bot, which they call “Botfather.”
  • After sharing the token, the botfather generates many fake pages, all with the same domain.

Once the Botfather creates the phishing links, the phisher has to spread the link himself. 

Every time there is a victim to these phishing pages, the phisher will receive a message on his bot for which he shared the token with the botfather. 

The message will contain which link the victim visited, his IP address, and the credentials he entered.

Some bots that generate phishing pages slightly differ from links-generating bots that will initially ask for the service to replicate, such as Dropbox or Google. 

Following this, it asks the phisher to enter the link that he wants the users to redirect to once they have fallen for the phishing page, which will typically be a Google homepage. Once the options are given, it generates multiple links containing the same service replicated on all the generated links. 

The victims’ credentials will be received directly on this phishing bot on Telegram.

The basic phishing kit offers a service that forwards the required data into a utility with predefined packages available. 

After this, they have a script inside the phishing pages that will forward the stolen data to the bot to which the links are configured. Other information includes the chat identifier token and the URL to which the links have to redirect.

Mysterious question: Why the developer can’t configure this page to send a copy to his server is still unanswered.

These phishers are sometimes so generous that they post a link containing the resource for phishing pages of various brands and are ready-to-use templates.

Subscribers of these channels also frequently see links containing stolen personal data. They also tag these links as verified or not verified data. “YELLOW LIGHT DATA” stands for unverified data.

The research found that threat actors sold bank account credentials based on the available balance. For instance, a bank account with $1,400 was sold at $110, but an account worth $49,000 was sold at $700.

Phishing-As-A-Service (PhaaS)

Like SaaS or PaaS, Phaas (Phishing as a service) is also becoming increasingly popular. SaaS offers Software as a service; likewise, these malicious actors were found to offer “premium” subscriptions for the newbie phishers. This service includes guides for beginners, access to phishing tools, and technical support.

Sometimes, these threat actors mention that they have anti-bot systems, URL encryption, geoblocking, and other exciting features useful for attackers. When I looked closer, they contained scripts blocking web crawlers and other phishing detectors.

These kinds of pages differ in prices with different vendors ranging from $10 per copy to $50 for a several-page archive. Some exclusive featuring pages like 3-D secure support go up to $300.

Looking for an all-around patching solution – Try Patch Manager Plus

Related Read:


[ad_2]
Source link

New tool allows you to opt out of Facebook’s targeted advertising

0
[ad_1]

Privacy watchdog noyb has built a tool for EU users to make it easier to opt out of Meta’s targeted advertising.

After Meta (Facebook and Instagram) switched the legal basis for targeting advertising from automatic consent to opt-out, privacy watchdog noyb has built a tool for users to opt out of targeted advertising and various other claims made by Meta in an easy and legally sound way.

After losing several cases where privacy-focused organizations claimed that Meta was in violation of GDPR regulations, Meta changed the legal basis to process certain first party data in Europe from “Contractual Necessity” to “Legitimate Interests.” GDPR is the EU’s general data protection regulation which governs how the personal data of individuals in the EU may be processed and transferred.

Even in Meta’s own words the new rules shouldn’t make much of a difference:

“It is important to note that this legal change does not prevent personalized advertising on our platform, nor does it affect how advertisers, businesses or users experience our products.”

The GDPR allows the processing of personal data if a company complies with one of the six legal bases in Article 6(1) GDPR, which are almost all irrelevant for advertising, so Meta does need the user’s consent.

But, instead of switching to an “opt-in” system, like Google or Microsoft, Meta argues that its “legitimate interest” to process user data would override the fundamental right to privacy and data protection of users.

In the view of the noyb the “legitimate interest” argument has no lawful foundation, and even if it had, opting-out should be as easy as it is to opt-in. But instead of providing a simple method to opt-out, like clicking a button,  Meta requires users to fill out a hidden form. This form requires users to argue why they want to perform an opt-out and explain why Meta’s, non-public, assessment is wrong in their individual case. An action that requires a user to click all the right buttons, understand legalese, and argue their points effectively. This has been made so complicated, that noyb thinks it is highly unlikely that any normal user would be able to successfully complete this process.

This means the days in court are far from over, but in the mean time noyb created a quick and easy way for users to object to the processing in a broad way. It has created a tool that allows users to opt-out of any processing under “legitimate interest“ and generally object to the use of personal data for targeted ads.

The tool

The tool helps EU citizens to object, as a precautionary measure, under Article 21(1) and (2) of the GDPR, to any use of their personal data for alleged “Legitimate Interests” as set out in the “What is our legal basis for processing your data?” section of Meta’s Privacy Policy.

In the words of Max Schrems, co-founder and honorary chairman of noyb:

“Our form turns the table: Meta has to argue why they have an overriding interest – not the user. Users can now opt out of data processing, and Facebook must process this objection without delay. We want to make it as easy as possible for those affected to exercise their fundamental rights.”

To use the free tool, users can visit the noyb consent form for collecting the necessary information and sending it to Meta.

Next you are presented with three options.

screenshot of the 3 options

The Facebook Login option allows you to object via noyb’s servers, using your email address as a sender and verifying that you have a Facebook account via Facebook Login. You will receive a copy of the objection.

The Email Tool option is basically the same except for the fact that you don’t have to log in to Facebook. Instead you will have to provide the email address that you use for Facebook/Instagram and noyb will verify if it’s yours.

email verification mailContent of the verification email sent to users of the second option

The Email Client option provides you with an example text so you can send an objection email yourself. All you have to do is copy the text into your email client and replace <YOUR_EMAIL_ADDRESS> in two places with the email address that is linked to your Meta account(s).

Knowing Meta, it’s probably too soon to get your hopes up. But sending out that email will at least tell Meta that there are objections and users feel that this is not the way to go about their business.


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

OPPO is preparing to rival Redmi with its own 300W charging

0
[ad_1]

It seems like OPPO is preparing its own version of 300W charging. It will be released under the company’s SuperVOOC branding, and it’s aiming to match Redmi’s 300W offering. As many of you know, Redmi showed off its 300W charging back in February, though it still didn’t make its way to a single product.

OPPO is aiming to rival Redmi with its 300W fast charging

Redmi did, however, confirm that it plans to utilize 300W charging in devices moving forward. The fastest charging now available in a commercial smartphone is Realme’s 240W charging solution. It is included in the Realme GT3. Realme is OPPO’s company, even though it’s now its own company, technically. So OPPO likely had a lot to do with that 240W charging offering.

In any case, OPPO is looking to up the ante once again. The news regarding its 300W charging solution comes from Digital Chat Station, a well-known Chinese tipster. He shared the info via Weibo.

It will likely be presented before the end of this year, and OPPO is aiming to present it while paired with a 4,450mAh battery. You’re probably wondering how fast will this charging be, well, we may have an idea.

OPPO’s offering should be on par with Redmi’s implementation when it comes to charging speed

Redmi’s 300W charging takes under 5 minutes to fully charge a 4,100mAh battery. It takes only 2 minutes and 11 seconds to reach the 50-percent mark. So, OPPO’s 300W charging should offer similar results.

OPPO’s SuperVOOC charging has been serving users well for quite some time now. The company includes super-fast charging in many of its smartphones, even the cheaper ones. We’ve tested it a number of times, and it really does work really well.

The company’s 120W charging is plenty fast, so many people would probably say that they don’t really need charging to be faster than that. If it can be achieved while keeping battery health in check, why wouldn’t companies push forward.


[ad_2]
Source link