June 5 to 9 at Apple Park

0
[ad_1]

WWDC 2023

Apple has officially announced that its Worldwide Developers Conference, or WWDC, will take place from June 5 to 9, 2023.

Like the past few WWDC events, this event will take place both in-person as well as offline at Apple Park, California. All developer-focused sessions will be live-streamed free of cost. Developers will have the opportunity to attend online sessions and labs where they can learn about the new features and software updates that will be announced at WWDC 2023.

In addition to announcing WWDC 2023 dates, Apple has also kicked off the Swift Student Challenge. This competition encourages students to showcase their creativity and coding skills by building Swift playgrounds. The challenge is open to students around the world aged 13 or older. Winners receive a range of prizes, including an exclusive WWDC jacket, pins, certificates, and an invitation to the WWDC event. 

Apple has also planned an all-day special event for select developers and scholars at the Apple Park campus on June 5. Attendees will be able to watch the keynote and State of the Union videos, meet Apple employees, and attend the Apple Design Awards. To attend the in-person event, developers must submit a request, and the company will select attendees by a random lottery. The selected attendees will be notified by April 5.

WWDC 2023: What to Expect

The conference will kick off with a keynote event, where Apple is expected to unveil the latest software updates in iOS 17, iPadOS 17, macOS 14, watchOS 10, and tvOS 17. iOS 17 is expected to bring the ‘most requested features’ while there is currently no information about other software updates.

In addition to software updates, the event could include new hardware announcements, such as the Mixed Reality headset that Apple is reportedly working on. The headset is reportedly almost ready, and a report even claims that the company has showcased the headset to some top executives.

Source: Apple


[ad_2]
Source link

How to remove Memories from Google Photos

0
[ad_1]

Google Photos has a great feature called Memories. The software will take pictures and videos you added in the past and resurface them so you can experience them again. However, you might not want certain memories hanging around on your timeline. Fortunately, you have the ability to remove Memories from Google Photos.

Removing those memories isn’t really hard to do, but it’s not quite as direct as most would hope. So, here’s a guide on how to remove your Memories.

What are Google Memories?

So, before we talk about how to remove Memories, let’s talk about what they are. When you open the Google Photos app, you’ll see a feed of photos and videos on the top of the UI. They’ll have text on them like “Remember this day?”, “Revisit this moment”, “Spotlight of the day”, etc.

These are your Memories. Google will go through the content you have in your library and it’ll pick ones to resurface. A lot of them are just random memories that the app picked for you. The program most likely uses AI to distinguish which photos or videos are worth resurfacing.

It will show you this content in an Instagram/Snapchat Stories format. This means that you’ll progress to the next image or video by tapping on the right side of the screen.

Google Photos will also highlight Memories from the past season. For example, at the start of Winter, you’ll get a recap of your best photos and videos taken during the Fall.

Recently, Google started adding music and zoom-in effects to still photos in your Memories. This adds a bit of flair to them.

How to remove Memories from Google Photos

So, removing Memories from Google Photos is pretty simple. The first thing you do is go to the Memory that you want to get rid of. On the bottom right of the screen, tap on the three-dot menu. This will bring up the information panel for the Memory.

How to remove google photos memory 3

The panel has all sorts of options to choose from, but you’ll want to look for the Hide option. It’s the eyeball with a line through it. Tapping on it won’t instantly hide the Memory. Instead, it will open a sub-menu with different options for hiding the Memory.

If you want to remove the Memory altogether, then tap on the bottom option: Remove this memory. Just know that if you remove a Memory, you will NOT remove the actual photo or video from your library. So, don’t worry.

If you’re having second thoughts, then you’ll see a confirmation popup appear. It will ask you if you’re sure you want to do it and give you the option to cancel it.

Other options

There are other options that you can choose when you access the Hide menu. Instead of getting rid of the story altogether, these other options might actually suit you more.

The first option is the Remove photo from Memory option. This one shows up when the story has more than one photo. If you don’t mind the Memory, but there are one or several photos that you want to take out of it, you can use this option to get rid of specific ones.

The next one is the Hide date from Memory option. Say, there’s a specific date that you don’t want to be brought up. Maybe that day was especially painful for you. Well, if you use this option then Google Photos won’t give you any Memories from that day.

The last one is the Hide people and pets option. If you have this option selected, you won’t see stories with certain people or animals in them. You can select from the list of people that Google has already identified. If you want to reverse this, just go to any story, go to the Hide People and Pets option, and deselect the person/pet you selected.

What else is in the panel?

When you access the information panel while viewing a Memory, it will show you a ton of useful tools and information about it. On the bottom, you’ll see information like the location it was taken in if that information’s available. You’ll also see the date the picture was taken on, the file’s name, who’s in the image (if Google recognizes them as one of your contacts), whether it’s been backed up to the Drive, and even the camera settings you used when you took the picture.

Above that information, you’ll see a carousel of options. The first one will take you to the date the photo or video was taken. It will take you to that spot in your Google Photos Timeline.

The next option will let you order a physical print of the photo. When you tap on it, you’ll see a sub-menu with three options. You can just get that one printed and sent to you.

You also have the option to have a large canvas print of that image to hang on a wall. Lastly, you can add that phone and others to a full photo book and have that sent to you. In order to do that, you’ll need to have at least 20 photos selected.

Next, you’ll be able to edit the title of that Memory. Lastly, you’ll be able to add the photo in that story to an album in your Google Photos library. There are so many things that you can do with Google Photos Memories. Hopefully, this guide was able to shine some light on this interesting feature.


[ad_2]
Source link

Apple will announce iOS 17 on June 5 at WWDC 2023

0
[ad_1]

Apple has begun sending out invites to their developer conference, which is set to take place on June 5.

The event is still going to be mostly online, and will run from June 5 through June 9. Like last year, Apple will have some developers and press on site for the keynote on June 5. But all of the sessions will be available online.

Apple is already hyping up the event, saying that this is going to be Apple’s “biggest and most exciting yet” in terms of WWDC.

What will Apple announce at WWDC 2023?

Traditionally, Apple shows off the next version of software for each platform. So that would include the big ones like iOS 17, iPadOS 17, watchOS 10, and macOS 14. But we’ll also get tvOS 17. tvOS doesn’t always make it into the keynote, as typically the update is pretty small.

This year, there’s a lot of rumors about hardware that we could see at WWDC. Pro’s are still waiting on the Apple Silicon-powered Mac Pro. Which would make sense to announce at WWDC, and it’s also the only Intel-powered Mac left in its lineup. The previous Mac Pro’s were announced at WWDC, seeing as this is the audience that would buy a Mac Pro, it’s the perfect place.

But there’s even more rumors this year, about other hardware. Specifically, Apple’s mixed reality headset that has been rumored for many years. We’ve heard rumors lately that iOS 17 isn’t going to be a big update this year, primarily because Apple has moved resources from iOS over to xrOS which is rumored to be their mixed reality platform.

Of course, if Apple does announce the headset at WWDC, it wouldn’t be crazy to hear Apple talk about it, and then give us more information in the Fall, with a release date in the Fall too. And since WWDC is still mostly online this year, it makes it seem less likely that it’ll come this time around.

Either way, June 5 is when we’ll see what iOS 17 has in store for us this year.


[ad_2]
Source link

UK Police Setup Thousands of  Fake DDoS-For-Hire Websites

0
[ad_1]
Fake DDoS-For-Hire Websites

The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use these platforms to attack businesses.

Also, this declaration follows the Agency’s decision to designate one of the sites now maintained by officers as a criminal service as part of a sustained programme of activities to disrupt and undermine DDoS.

Booter Services Are a Key Enabler of Cyber Crime

DDoS-for-hire services, sometimes known as ‘booters,’ are online platforms offering to produce huge garbage HTTP requests towards a website or online service in exchange for money that overwhelm the webserver and take it offline.

DDoS attacks, designed to overwhelm websites and force them offline, are illegal in the United Kingdom under the Computer Misuse Act of 1990.

People who want to take down a website or disrupt an organization’s operations purchase these illegal services for various motives, including espionage, revenge, extortion, and politics.

Numerous thousands of people allegedly visited NCA’s fake websites, which had the appearance of an actual booter service. However, they only served to gather data on people who wanted to use these services rather than to provide access to DDoS tools.

After users register, however, their information is compiled by investigators rather than being provided access to cybercrime tools.

The NCA cautions that numerous fake law enforcement-operated booter sites are still being utilized to accumulate data on cyber criminals. 

Alan Merrett from the NCA’s National Cyber Crime Unit said: “Booter services are a key enabler of cybercrime.

“We will not reveal how many sites we have, or for how long they have been running. Going forward, people who wish to use these services can’t be sure who is actually behind them, so why take the risk?”

These fake sites are part of “Operation PowerOFF” and progressing universal law enforcement, including the US FBI, the Dutch National Police Corps, the U.K. National Crime Agency, Germany’s Federal Criminal Police Office, and Polan’s National Police Cybercrime Bureau.

This splash page advises clients that their information has been collected and law enforcement authorities will soon contact them.

Banner has been seen by visitors of the fake DDoS-for-hire site

“National Crime Agency has collected substantial data from those who accessed our domain. We will share this data with International Law Enforcement Enforcement for action. Law Enforcement will contact individuals in the U.K. who engaged with this,” reads the NCA splash page on the fake DDoS booter site.

“National Crime Agency has been and will run more services like this site.”

“Operation PowerOFF has already resulted in the arrest of numerous individuals and continues to ensure that users are being held accountable for their criminal activity.”

Last year in December, the U.S. Department of Justice and the FBI reported the seizure of 48 domains that sold “booter” services in “Operation PowerOFF.”

Because of that action, the authorities charged six suspects for their coordinated involvement in these unlawful services.

The NCA clarifies that while takedowns and arrests are still a vital component of the battle against the danger, their most recent strategies expand the effectiveness of their operations to weaken belief in criminal markets and stop DDoS assaults at their source.

Searching to secure your APIs? – Try Free API Penetration Testing

Related Read:


[ad_2]
Source link

A New Malware Targeting macOS Catalina Devices

0
[ad_1]

MacStealer steals extensive data from a targeted device, including personal data, iCloud Keychain data, images, passwords, and credit card details.

If your device runs on macOS Catalina, be cautious because a new malware has surfaced dubbed MacStealer, which mainly targets Catalina-running Mac devices and infects both Apple Silicon and Intel chips.

MacStealer steals a wide range of user data

Security researchers at Uptycs discovered MacStealer and observed that it steals extensive data from the device, including personal data, iCloud Keychain data, images, passwords, and credit card details.

Furthermore, the malware can steal browser cookies, documents, and login details from the targeted Mac. It works specifically on MacOS Catalina-based Macs. The malware steals cookies and credentials from Google Chrome, Firefox, and Brave browsers along with extracting the Keychain database.

Moreover, it can obtain several file types, such as text files, MP3s, photographs, PowerPoint files, and databases.

How Does the Attack Take Place?

The attack starts by taking the Keychain wholesale without accessing its data. The stolen database is transmitted to the attacker via Telegram in encrypted form. A separate ZIP folder is also shared with the attacker through a Telegram bot.

The malware developer, who is selling access to MacStealer for $100 per build, claims that the extracted Keychain cannot be accessed without the master password.

The developer has provided a list of upcoming features of MacStealer, which includes stealing funds from cryptocurrency wallets, a dedicated tool for creating new builds, a custom uploader, a reverse shell, and a control panel. The upcoming versions may also feature the capability to steal data from the Safari browser and Apple Notes.

This is what the MacStealer malware developer has to say on a Russian hacker forum (Image credit: Uptycs)

How to Stay Safe?

Researchers couldn’t identify how MacStealer moves between Macs. Initial infections were caused by the weed.dmg app, which bears the icon of a leaf and appears as an executable. When this file is opened, it displays a fake macOS password prompt.

Beware of MacStealer: A New Malware Targeting macOS Catalina Devices
(Image credit: Uptycs)

It is worth noting that this prompt isn’t the same as the genuine macOS password prompt. If the user enters credentials, the tool can access other documents on the device. Therefore, if you are an experienced Mac user, it would be easier to identify this difference.

Keep your Mac device updated and patched, and only download/install files from trusted sources, such as the App Store.

  1. 5 macOS Monterey Issues You Need to Fix
  2. macOS Hit By New “Alchimist” Attack Framework
  3. macOS Users hit by Chinese Iron Tiger APT Group
  4. DazzleSpy infects macOS through hacked websites
  5. Multi-platform SysJoker backdoor hits macOS devices

[ad_2]
Source link

Get this Powerful Tablet for a Steal

0
[ad_1]

Amazon has the Samsung Galaxy Tab S8+ on sale right now for just $599. Which is a pretty good price for this tablet. In fact, it is good enough for an all-time low here. That’s saving you $300 off of this tablet, and it’s one of the most powerful tablets out there, so it’s definitely worth picking up.

The Galaxy Tab S8+ is on sale in all of its colors. That includes: Graphite, Silver, and Pink Gold. And this is for the 128GB model. The 256GB model is also on sale, but the discount isn’t as steep. It’s just $887, good for a little more than $100 off.

Samsung announced the Galaxy Tab S8 series last fall, so this is their most recent flagship tablet, and at 12.4-inches, it’s a big boy too. Though the S8 Ultra is larger at basically a laptop size – 14.6-inches. Despite its size, the Galaxy Tab S8+ is also pretty lightweight.

As far as the specs go, we’re looking at a 12.4-inch 2800×1752 resolution display. The resolution may look a bit odd, but it is a 16:10 aspect ratio and it’s sporting a 266 ppi density.

It sports the Snapdragon 8 Gen 1 processor, 8GB of RAM and 128GB of storage on-board. That’s about the same as a flagship smartphone, which makes this pretty powerful. It also has a 13-megapixel camera on the back. But more importantly, a 12-megapixel selfie camera for taking those Zoom calls. And all of this is powered by a 10,090mAh capacity battery.

With the Galaxy Tab S8+ it does run on Android 13, along with One UI. So it does have the latest software. Samsung also includes DeX on its tablets, which gives you a sort of desktop-like experience. Which is really useful on a tablet with this large of a screen.

You can pick up the Samsung Galaxy Tab S8+ from Amazon today by clicking here.

Samsung Galaxy Tab S8+ – Amazon


[ad_2]
Source link

What’s coming to Hulu in April 2023

0
[ad_1]

There’s a ton of fresh content coming to Hulu in April 2023. Like usual with Hulu, the majority of the content arriving in April, come on February 1. There’s a ton of great new shows and movies arriving this upcoming month. Here are some of the highlights.

In April, we have a good amount of “new” content coming to Hulu that they are licensing. So the content isn’t actually new, just new to Hulu. Along with quite a few season premiere’s that are happening on ABC and FOX, since Hulu is owned by their parent-company, Disney, that’s no big surprise.

One of the originals coming to Hulu this month is The Pope Listens. This is an original Spanish special featuring Pope Francis and is directed by Jordi Evole. The special features upfront and honest conversations between one of the most influential people in the world and ten Spanish-speaking young adults between 20 and 25 years old.

Hulu is also airing Am I Being Unreasonable starting on April 11. This is a six-episode series that sees Nic grieving a loss that she can’t share with anyone whilst stuck in a depressing marriage. Only her son, Ollie who she adores, keeps her going.

Here’s What Is Coming To Hulu In April 2023

And now, the full list of everything coming to Hulu in April 2023.


[ad_2]
Source link

Twitter source code leaked via GitHub

0
[ad_1]

Part of the source code for social media site Twitter has been leaked via source code repository GitHub, according to a DMCA takedown request.

The DMCA request stated that the code leaked included “proprietary source code for Twitter’s platform and internal tools”. Following the DMCA request, the code was taken down.

The source code was leaked by a user under the screen name ‘FreeSpeechEnthusiast’. It is unclear how long the source code was available for, however, the account has been active since at least January 2023.

The leak was originally reported by the New York Times which noted that Twitter was attempting to identify the user who originally leaked the code and those who downloaded it.

In the DMCA takedown notice issued to Github, Twitter asked the source code repository to “preserve and provide copies of any related upload/download/access history (and any contact info, IP addresses, or other session info related to same), and any associated logs related to this repo or any forks thereof, before removing all the infringing content from Github”.

GitHub has not yet stated whether it will provide this information to Twitter. When contacted for comment, Twitter’s press office responded with an automated reply. 


[ad_2]
Source link

New WiFi Flaw Let Attackers Hijack Network Traffic

0
[ad_1]
New WiFi Flaw

A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef of imec-DistriNet, KU Leuven, allows attackers to deceive access points into exposing network frames in plaintext.

When the receiver is in sleep mode, for example, Wi-Fi devices routinely queue frames at different tiers of the network stack before sending.

WiFi frames are data packages comprising a header, data payload, and trailer containing data like the MAC addresses of the source and destination and control and management information.

By keeping track of the busy/idle states of the receiving points, these frames are broadcast in a regulated manner to prevent collisions and maximize data exchange performance.

“Our attacks have a widespread impact as they affect various devices and operating systems (Linux, FreeBSD, iOS, and Android) and because they can be used to hijack TCP connections or intercept client and web traffic,” researchers.

According to the researchers, queued/buffered frames are not sufficiently protected from attackers, who can control data transmission, client spoofing, frame redirection, and capturing.

Adversary Can Abuse the Power-Save Mechanisms

The initial version of the 802.11 standards already included power-saving features that let clients go into a sleep or doze mode to use less power. All frames intended for a client station are queued when it goes into sleep mode because it sends a frame to the access point with a header that includes the power-saving flag.

Nevertheless, the standard does not specify how to manage the security of these queued frames and does not impose any time restrictions on how long the frames may remain in this state.

The access point dequeues the buffered frames, adds encryption, and transmits them to the target after the client station has awakened.

Attack Diagram

In this case, a hacker might impersonate a network device’s MAC address and transmit power-saving frames to access points, making them queue up frames for the intended target. To obtain the frame stack, the attacker then sends a wake-up frame.

Typically, the WiFi network’s group-addressed encryption key or a pairwise encryption key, specific to each device and used to encrypt frames sent between two devices, are used to encrypt the transmitted frames.

By providing authentication and association frames to the access point, the attacker can force it to transmit the frames in plaintext or encrypt them using a key provided by the attacker, changing the security context of the frames.

“As a result of the attack, anyone within the communication range of the vulnerable access point can intercept the leaked frames in plaintext or encrypted using the group-addressed encryption key, depending on the respective implementation of the stack (i.e., user-space daemon, kernel, driver, firmware).”, explain the researchers.

Network Device Models That Are Known To Be Vulnerable:

“An adversary can use their Internet-connected server to inject data into this TCP connection by injecting off-path TCP packets with a spoofed sender IP address,” researchers warn.

“This can, for instance, be abused to send malicious JavaScript code to the victim in plaintext HTTP connections with as goal to exploit vulnerabilities in the client’s browser.”

The researchers warn that these attacks may be exploited to inject malicious content, such as JavaScript, into TCP packets.

Cisco is the first firm to recognize the significance of the WiFi protocol weakness, acknowledging that the attacks described in the paper may be effective against Cisco wireless access point products and Cisco Meraki products.

“This attack is seen as an opportunistic attack, and the information gained by the attacker would be of minimal value in a securely configured network.” – Cisco.

The company advises implementing mitigating strategies such as employing software like Cisco Identity Services Engine (ISE), which can impose network access restrictions by implementing Cisco TrustSec or Software Defined Access (SDA) technologies.

“Cisco also recommends implementing transport layer security to encrypt data in transit whenever possible because it would render the acquired data unusable by the attacker,” Cisco.

Are You a Pentester? – Try Free Automated API Penetration Testing For Developers & Testers

Related Read:


[ad_2]
Source link

Multiple mid-range Galaxy devices receive the One UI 5.1 update

0
[ad_1]

Samsung is pushing its One UI 5.1 update to more low-cost smartphones. The company has released the new One UI version for the Galaxy F22, Galaxy F23 5G, and Galaxy M23 5G. It has already updated all eligible premium mid-range and flagship models.

The Galaxy F22 was launched in India and a few neighboring countries in July 2021 with Android 11 onboard. Samsung has already updated the phone to Android 12 and Android 13. It is now pushing the last major feature update to the device. The One UI 5.1 update for the Galaxy F22 is rolling out with the firmware build number E225FXXU5DWB8. All users should receive this update within the next few days.

The story is the same for the Galaxy F23 5G as well. Launching last year as the successor to the Galaxy F22, this device also didn’t see a global release. It was kept confined to the Indian sub-continent by Samsung. Debuting with Android 12, the Galaxy F23 5G picked up Android 13 a few months back. It is now getting One UI 5.1 as well. The latest update comes with firmware version E236BXXU2CWC1 (via).

The Galaxy M23 5G, on the other hand, is available in more markets. Along with a wider release in Asia, Samsung also sold this phone in Europe, Latin America, and other regions. It arrived with Android 12 in March of last year and received Android 13 in December. One UI 5.1 is now rolling out to the Galaxy M23 5G with firmware version M236BXXU2CWC1. The rollout is currently limited to Europe and Latin America but should soon reach other markets.

None of these Galaxy smartphones are receiving the latest security patch, though. Samsung is only pushing the February SMR (Security Maintenance Release) to the phones. Since they don’t get monthly security releases, the next update may not arrive until May. In the meantime, if you’re using a Galaxy F22, Galaxy F23 5G, or Galaxy M23 5G, you can go to Settings > Software update and tap on Download and install to check for the One UI 5.1 update.

The Galaxy A52s 5G is also widely getting the One UI 5.1 update

Samsung’s latest push to bring One UI 5.1 to more Galaxy devices sees the Galaxy A52s 5G receive the update widely. The 2021 premium mid-range model started picking up the new One UI version in South Korea earlier this month. The update recently reached the phone in Europe with firmware version A528BXXU2EWC1. A global rollout should be just around the corner. The Galaxy A52s 5G debuted with Android 11 and will get Android 14.


[ad_2]
Source link