Elon Musk now values Twitter at just $20 billion

0
[ad_1]

It’s no secret that Elon Musk’s acquisition of Twitter has caused significant turmoil for the social media platform, with over 500 advertisers abandoning Twitter in response to Musk’s erratic changes. According to a report from The Information, Musk told his employees that the company is now worth just $20 billion, which is significantly lower than the $44 billion he paid last year. Musk shared this valuation in an internal Twitter memo, where he also announced a new stock compensation program that would allow employees to sell their stock every six months.

In the email, Musk warned employees that the company was still in a difficult financial position. However, at one point, Twitter was four months away from running out of cash, emphasizing the challenges that the company faces. Musk further described Twitter as an “inverse startup,” due to the significant changes he made to save the platform from bankruptcy.

Still a long way to go

This drop in valuation reflects the challenges Twitter has faced ever since Musk took over. Daily revenue has dropped by 40% compared to the previous year as over 500 of the company’s top advertising partners paused their spending on the platform following Elon’s decision to launch Blue with a verification subscription and the “general amnesty” policy, which brought some of Twitter’s worst users and a wave of fake accounts.

Despite the challenges, Musk remains optimistic about Twitter’s future. He sees a clear but difficult path to a $250 billion valuation, which would make the company’s current stock grants worth ten times as much in the future.

However, it remains to be seen whether Musk’s vision for Twitter will ultimately be successful. While the offer of stock grants may motivate employees and potentially increase the platform’s value, Twitter needs to address its challenges to be profitable.


[ad_2]
Source link

Study Reveals Inaudible Sound Attack Threatens Voice Assistants

0
[ad_1]

A recent study reveals how attackers can trigger vulnerabilities in voice assistants for malicious purposes. As demonstrated, using inaudible sound trojans allows exploiting existing vulnerabilities in voice assistants to attack respective devices.

Inaudible Sound Can Attack Voice Assistants

A team of researchers from the University of Texas at San Antonio and the University of Colorado, Colorado Springs, devised an interesting attack strategy aimed at voice assistants.

Specifically, the researchers have developed NUIT (Near-Ultrasound Inaudible Trojan) attack that involves injecting malicious voice commands in the inaudible range to trigger voice assistants.

For this, the attacker may trick the victim into installing a malicious app that later meddles with the device’s voice assistants by playing audio files. Or, the attack may happen through a maliciously crafted website if and when the victim visits it, for instance, following a phishing attack.

Once done, the attacker exploits the device’s microphone with near-ultrasound waves inaudible to humans. And before performing any other action, it may even reduce the target device’s volume via a similar inaudible command so that the voice assistant’s response to the command won’t be heard. Thus, the victim user wouldn’t know the attack is happening while the adversary continues executing malicious commands.

The researchers have shared the following videos as demonstrations of the NUIT attack. In the first video, the attacker attacks an iPhone, triggering Siri to open the victim place’s main door with silent commands.

Likewise, in the following video, the attacker triggers Google Assistant (popular on Android devices) to do the same.

In both cases, the owner of the target device is sitting nearby the hacked device. Yet, the victim remains oblivious to its phone’s activities.

Limitations And Countermeasures

According to the researchers, NUIT attack isn’t as perfect as it seems. It mainly works for handsets bearing linear speaker and microphone. Since that’s now getting common, the researchers advise the device manufacturers to consider redesigning the placement so as to prevent inaudible sound transmission to the microphone.

While that’s a remedy for the future, for now, the researchers advise users to switch to using earphones instead of device speakers. That’s because earphones ensure a low transmission of sound, preventing direct commands to the microphone.

The researchers are going to present their study at the USENIX Security 2023 scheduled for August 9 and 11, 2023, at the Anaheim Marriott in Anaheim, CA, USA. Whereas details about the NUIT attack is also available on a dedicated webpage.

Let us know your thoughts in the comments.


[ad_2]
Source link

Solving the password’s hardest problem with passkeys, featuring Anna Pobletts

0
[ad_1]

This week on Lock and Code, we speak with Anna Pobletts about the “death” of passwords, and how passkeys can become the non-compromising fix to authentication’s biggest problems.

How many passwords do you have? If you’re at all like our Lock and Code host David Ruiz, that number hovers around 200. But the important follow up question is: How many of those passwords can you actually remember on your own? Prior studies suggest a number that sounds nearly embarrassing—probably around six. 

After decades of requiring it, it turns out that the password has problems, the biggest of which is that when users are forced to create a password for every online account, they resort to creating easy-to-remember passwords that are built around their pets’ names, their addresses, even the word “password.” Those same users then re-use those weak passwords across multiple accounts, opening them up to easy online attacks that rely on entering the compromised credentials from one online account to crack into an entirely separate online account. 

As if that weren’t dangerous enough, passwords themselves are vulnerable to phishing attacks, where hackers can fraudulently pose as businesses that ask users to enter their login information on a website that looks legitimate, but isn’t. 

Thankfully, the cybersecurity industry has built a few safeguards around password use, such as multifactor authentication, which requires a second form of approval from a user beyond just entering their username and password. But, according to 1Password Head of Passwordless Anna Pobletts, many attempts around improving and replacing passwords have put extra work into the hands of users themselves:

“There’s been so many different attempts in the last 10, 20 years to replace passwords or improve passwords and the security around. But all of these attempts have been at the expense of the user.”

For Pobletts, who is our latest guest on the Lock and Code podcast, there is a better option now available that does not trade security for ease-of-use. Instead, it ensures that the secure option for users is also the easy option. That latest option is the use of “passkeys.” 

Resistant to phishing attacks, secured behind biometrics, and free from any requirement by users to create new ones on their own, passkeys could dramatically change our security for the better. 

Today, we speak with Pobletts about whether we’ll ever truly live in a passwordless future, along with what passkeys are, how they work, and what industry could see huge benefit from implementation. Tune in now. 

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)


Malwarebytes removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

TRY NOW


[ad_2]
Source link

The Android volume slider might get a small but welcome change

0
[ad_1]

It’s the time of year when we’re looking forward to a bunch of new updates in Android. While we’re excited about the next biggest changes, we can’t forget about the minor tweaks. According to Mishaal Rahman, the Android volume slider might change its height based on the device’s screen size.

Google introduced the vertical volume slider with Android 9 back in 2018. It was a change of pace from the slider that stretched horizontally across your screen. The position of the slider should coincide with the position of your hardware volume buttons.

This is a neat thought, but it can be a bit weird on taller devices. See, the volume slider only has one size. While it looks great on medium and smaller screens, it can look pretty tiny on larger screens.

The Android volume slider will change its height for larger displays

The smaller volume slider looks weird on larger displays, but it looks like that’s about to change. In a tweet from Mishaal Rahman, we get the news about what Google plans to do about this. There was a new commit added to the AOSP that hints at the volume slider being proportional to the device’s screen size.

So, depending on what size display you have, the volume slider will have a different height. It’s not the most significant update to Android, but it still adds a nice visual appeal.

This code was discovered in the Android 13 QPR Beta 1, but it’s not looking like the feature will come with the next feature drop. Instead, Google might opt to have this feature come with Android 14. This version of the operating system is in preview right now, and the beta is expected to launch in the coming months.

However, since this was discovered within the code of the software, you’ll want to take it with a grain of salt.


[ad_2]
Source link

A small Android smartphone could be in the works from Pebble

0
[ad_1]

If you love small devices, you might need to watch out for the coming Pebble Android smartphone. This device is said to resemble the iPhone Mini series that comes with 5.4-inch screen sizes. It will also pack as much power as these iPhones did, bringing a powerful processor from the semiconductor industry.

You will agree that it is difficult to find a miniature Android device in the smartphone market. Some of the best shots at tiny Android devices are the Google Pixel 6a, ASUS ZenFone 9, Samsung Galaxy S23, and a few others. These devices come with 6.1 or 5.9 -inch screen sizes, which are larger than that on the iPhone Mini entries.

Pebble plans to make a very compact Android device available to those desiring such. This plan has been in place for a while, and it is finally seeing its early development stages. Specifications of the miniature Pebble Android smartphone are not available, but here is what you need to know about this device.

Details regarding the coming Pebble Android smartphone

Back in 2022, Pebble’s CEO Eric Migicovsky posted an update on the SmallAndroidPhone blog page requesting a mini-sized Android phone. In this update, Eric made his love for small devices (sub-6-inch smartphones) known to the public. He also made the physical features of his desired device known, saying that it should be lightweight, pocket friendly, and great for one-hand usage.

His goal was to bring together lovers of small phones to put pressure on large smartphone OEMs to action. This action aimed to make these brands see the need to create a small smartphone that packs a punch. Eric has been able to gather over 38,000 small phone lovers to impress the need for a small Android smartphone.

Well, this effort to draw the attention of major smartphone OEMs have yielded little result. Most Android brands are still comfortable launching devices that sit in the 6.1 to 6.8-inch screen size range. No one seems to dare launch a device whose screen measures 5.4 inches. Even Apple abandoned their Mini line-up, opting for a much larger Max line-up.

Eric and a few other small phone enthusiasts have taken it upon themselves to design the ideal smartphone that suits their needs. Some of the specifications they are working with include sub-6-inch screen size, Stock Android OS, impressive cameras, a flagship processor, good memory capacity, and so much more. From their desired specifications, this device will not be a flimsy effort at launching a sub-6-inch smartphone.

Since no smartphone brand is willing to take this task up, Eric and his team have taken it upon themselves to design the ideal device. This isn’t their first time in the gadget manufacturing industry, as this team was responsible for the design and release of the Pebble Time Steel smartwatch. With knowledge of the industry, the team has already begun designing this coming mini Android device.

Sources that have spoken with members of this team say that there are a ton of design ideas. At the moment, these ideas are mainly about the rear camera layout. Once these ideas and designs are finalized, the actual development of this device will kick off.


[ad_2]
Source link

Portion of Twitter’s Proprietary Source Code Leaked on GitHub

0
[ad_1]

Reportedly, the source code remained public for several months before being taken down by GitHub.

According to a news report from the New York Times (NYT), some portions of Twitter’s source code were leaked online through GitHub after the social networking platform filed a DMCA request to take it down.

The report claims that the source code probably remained public for several months before being taken down by GitHub. It was published by a GitHub user with the username FreeSpeechEnthusiast, referring to Elon Musk’s statement that he was a Free Speech Absolutist previously.

Code-sharing service GitHub published the request online, stating that the leaked info was Twitter’s proprietary source code for internal tools and platforms. It is worth noting that the GitHub profile linked with the DMCA takedown listed a non-public code contributed in early January.

Portion of Twitter's proprietary source code leaked on GitHub
DMCA takedown notice

Proprietary source code is usually the most sensitive and secretive trade information. This code becoming public entails several risks for the company, such as it can disclose the platform’s software flaws that attackers can exploit.

Moreover, it gives the competitors a competitive edge by giving an insight into the company’s non-public internal workings.

Twitter also filed a court filing in California apart from requesting to take down the source code. The company submitted the filing to identify the perpetrator responsible for the leak as well as to get information on GitHub users who might have downloaded the code.

As per the filing, Twitter asked the court to order GitHub to disclose the users’ names, telephone numbers, addresses, social media profiles, IP addresses, and emails. The request was made under the Digital Millennium Copyright Act implemented in 1998.

Twitter execs suspect that one of the employees who left the company in 2022 after Elon Musk acquired the platform could be responsible for the leak. Since Musk laid off thousands of Twitter employees, it is difficult to determine the culprit as of now.

  1. Twitch hacked- Source code leaked
  2. Yandex Source Code Leaked Online
  3. Hackers Stole GoDaddy Source Code
  4. Hackers Steal LastPass’ Source Code
  5. Hackers Stole T-Mobile’s Source Code

[ad_2]
Source link

Motorola Edge 40 series detailed specs leak ahead of launch

0
[ad_1]

Motorola‘s long-rumored Edge 40 and Edge 40 Pro flagship smartphones have been subject to another major leak. MySmartPrice has exclusively revealed the detailed specs of the new phones. The devices still don’t have an official launch date, though Motorola debuted the Chinese version of the latter back in December 2022.

The Motorola Edge 40 is a rebranded Moto X40

Leaks about the Motorols Edge 40 series have been coming for a few months now. The Pro model is the global version of the Moto X40 that launched in China late last year, so we already know what to expect from it. But the Lenovo-owned company is also readying a stripped-down model to accompany it in global markets. According to the new report, the two devices will share very few specs.

The Motorola Edge 40 Pro will feature a 6.67-inch Full HD+ display (1080×2400 pixels) with a staggering 165Hz refresh rate. It is a 10-bit pOLED panel with HDR10+ support, Dolby Vision, and 1,300 nits of peak brightness. The handset gets a quad-curved design with anti-glare and anti-fingerprint coated 3D Corning Gorilla Glass Victus panels on the front and back, sandwiching a Sandblasted aluminum frame.

Powering this phone is Qualcomm’s latest Snapdragon 8 gen 2 processor with 12GB of LPDDR5X RAM and 256GB of UFS 4.0 storage. For photos, we have a 50MP primary camera at the back with OIS (optical image stabilization) support. It is flanked by a 50MP ultrawide lens and a 12MP 2X telephoto zoom camera. On the front, we have a 60MP selfie camera. The handset also features four microphones and Dolby Atoms-tuned stereo speakers.

The Motorola Edge 40 Pro will pack a 4,600mAh battery with 125W of fast wired charging support. It also supports 15W wireless charging and 5W wireless power share (reverse charging). Other highlights include an under-display fingerprint scanner, IP68 rating for dust and water resistance, Wi-Fi 7, Bluetooth 5.3, linear x-axis vibration motor, and Android 13.

The base model gets a MediaTek processor, fewer cameras, and slower RAM

The base Motorola Edge 40, on the other hand, gets a 6.55-inch display of the same resolution but a 144Hz refresh rate and 1,200 nits of peak brightness. Motorola is equipping it with a less powerful MediaTek Dimensity 8200 processor, with 8GB of LPDDR4X RAM and 128GB/256GB of UFS 3.1 storage. The primary rear camera seemingly carries over unchanged but the Motorola Edge 40 gets a 13MP ultrawide lens and 32MP selfie camera. There’s no zoom camera here.

Elsewhere, it misses out on Wi-Fi 7 and gets only three microphones, though we still have Dolby Atoms-tuned stereo speakers. You’ll also find an under-display fingerprint scanner and IP68 rating for dust and water resistance here. But the Motorola Edge downgrades to a 4,400mAh battery with 68W wired charging and 15W wireless charging. It lacks reverse wireless charging, and seemingly a linear x-axis vibration motor too. Stay tuned for the official launch of the Motorola Edge 40 series.

Motorola Edge 40 series detaile specs leak


[ad_2]
Source link

Apple releases iOS 16.4, complete with more Emoji

0
[ad_1]

On Monday, Apple released the latest update to iOS 16, and that’s iOS 16.4. After a few beta releases, it is finally available to everyone.

This actually turned out to be a rather large update for iOS 16, which is surprising since we are only a couple months away from iOS 17 debuting at WWDC.

The update is available now on the iPhone, as well as iPadOS 16.4 rolling out. Apple also rolled out macOS Ventura 13.3 and watchOS 9.4.

What’s new in iOS 16.4?

So what’s new in iOS 16.4? Well, the biggest feature is definitely new Emoji. I’m only half joking. But there are new emoji coming in this update. There’s 21 new emoji including animals, hand gestures and objects.

Apple is also allowing websites to do notifications through Web Apps when added to the home screen. Apple has also added Voice Isolation for cellular calls that will prioritize your voice and block out ambient noise around you. This has actually been available on FaceTime for a while.

Additionally, VoiceOver support is available for maps in the Weather app now. Most of the rest of the changes here are bug fixes. Here’s the changelog from Apple:

This update includes the following enhancements and bug fixes:

– 21 new emoji including animals, hand gestures, and objects are now available in emoji keyboard
– Notifications for web apps added to the Home Screen
– Voice Isolation for cellular calls prioritizes your voice and blocks out ambient noise around you
– Duplicates album in Photos expands support to detect duplicate photos and videos in an iCloud Shared Photo Library
– VoiceOver support for maps in the Weather app
– Accessibility setting to automatically dim video when flashes of light or strobe effects are detected
– Fixes an issue where Ask to Buy requests from children may fail to appear on the parent’s device
– Addresses issues where Matter-compatible thermostats could become unresponsive when paired to Apple Home
– Crash Detection optimizations on iPhone 14 and iPhone 14 Pro models

As mentioned, you can download the update on your iPhone and iPad now, as well as macOS Ventura 13.3 on your Mac and watchOS 9.4 on your Apple Watch.


[ad_2]
Source link

Hackers Exploited Critical Microsoft Outlook Vulnerability

0
[ad_1]
Microsoft Outlook Vulnerability

In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help them discover the associated IoCs.

That Outlook vulnerability in question has been tracked as “CVE-2023-23397” with a CVSS score of 9.8 and marked as Critical.

As a result of this flaw, NTLM hashes can be stolen, and without any user interaction, they can be reused to execute a relay attack.

The threat actors use specially crafted malicious emails to exploit the vulnerability and manipulate the victim’s connection. As a result, this allows them to get control of an untrusted location.

The attacker can authenticate as the victim with the Net-NTLMv2 hash leaked to the untrusted network.

Microsoft patched the flaw

In the Patch Tuesday updates for March 2023, Microsoft fixed the vulnerability in order to prevent the possibility of any further attacks.

The problem is that this approach was taken after it was weaponized by Russian threat actors and used as a weapon against the following sectors in Europe:

  • Government
  • Transportation
  • Energy
  • Military

It was reported in April 2022 that Microsoft’s incident response team had found evidence that the shortcoming could be exploited.

Attack chain & threat hunting Guidance

It has been identified that a Net-NTLMv2 Relay attack allowed a threat actor to gain unauthorized entry to an Exchange Server in one attack chain.

By exploiting this vulnerability, the attacker could modify mailbox folder permissions and maintain persistent access, posing a significant security risk.

The adversary used the compromised email account in the compromised environment to extend their access. It has been discovered that this is done by sending additional malicious messages through the same organization to other members.

CVE-2023-23397 can lead to credential compromise in organizations if they do not implement a comprehensive threat-hunting strategy. 

As a first step, running the Exchange scanning script provided by Microsoft is important to detect any malicious activity. However, it’s imperative to note that for all scenarios, this script is not capable of providing any visibility into messages that are malicious in nature.

Multiple mailboxes can be opened at the same time by Outlook users. Messages received through one of the other services will still trigger the vulnerability if a user configured Outlook to open mailboxes from multiple services. The scanned mailboxes do not contain that message.

If a user wishes to move a message to a local file, they can do so. Finding evidence of a prior compromise in Archived messages may be possible in some cases.

You can no longer access your Exchange messages if they have been deleted from Exchange. It is recommended that incident responders review the security telemetry collected from all available channels in order to confirm the presence of IP addresses and URIs obtained from the PidLidReminderFileParameter values. 

There are a number of data sources that can be used to gather data, including:-

  • Firewall logs
  • Proxy logs
  • Azure Active Directory sign-in logs for users of Exchange Online
  • IIS Logs for Exchange Server
  • VPN logs
  • RDP Gateway logs
  • Endpoint telemetry from endpoint detection and response (EDR)
  • Forensic endpoint data

Recommendations

Here below we have mentioned all the recommendations:-

  • To mitigate the issue, make sure to update Microsoft Outlook immediately.
  • Ensure that defense-in-depth mitigations are active in organizations leveraging Microsoft Exchange Server on-premises.
  • The script should be used to remove either the messages or just the properties if suspicious or malicious reminder values are observed.
  • In the event that a targeted or compromised user receives suspicious reminders or initiates incident response activities, they should be instructed to reset their passwords.
  • To mitigate the impact of possible Net-NTLMv2 Relay attacks, it is recommended that you use multifactor authentication.
  • On Exchange, you should disable unnecessary services that you don’t need.
  • Block all IP addresses except those on an allowlist from requesting connections on ports 135 and 445.
  • If your environment has NTLM enabled, you should disable it.

Searching to secure your APIs? – Try Free API Penetration Testing

Related Coverage


[ad_2]
Source link

ESPN+ announces April 2023 MLB Season streaming schedule

0
[ad_1]

Opening Day is just a few days away for the Major League Baseball 2023 season. And while we’ve already seen Apple TV+ announce their schedule for the first half of the season, now it’s time for ESPN+ to do the same thing. ESPN+ is only announcing the schedule for April 2023, at this time. Since they have games on every single day, the schedule is still quite long.

In the first month on ESPN+, there’s a good number of games that are going to be pretty entertaining to watch. There’s going to be two appearances by the New York Yankees and Aaron Judge. As expected, the reigning World Series champs, Houston Astros will only be on ESPN+ once in the first week. That’s because they are a hotter commodity and likely on other networks and streaming services.

This year, the MLB will be broadcast on quite a few national networks. Outside of the usual RSNs that get all of the games for these teams. We’ll also see them on MLB Network, ESPN, ESPN+, TBS/TNT, Apple TV+ and Peacock. So there’s plenty of ways to watch some Baseball this year.

Here’s the schedule for April 2023

Without further ado, here’s the schedule for the first month, which is mostly April but a couple of games in March as well.

DateTime (ET)Game
Thu., March 304 p.m.Philadelphia Phillies vs. Texas Rangers
Fri., March 3110 p.m.Arizona Diamondbacks vs. Los Angeles Dodgers
Sun., April 21:30 p.m.San Francisco Giants vs. New York Yankees
Mon., April 37:45 p.m.Atlanta Braves vs. St. Louis Cardinals
Tue., April 410 p.m.Colorado Rockies vs. Los Angeles Dodgers
Wed., April 51:30 p.m.New York Mets vs. Milwaukee Brewers
Thu., April 61 p.m.Boston Red Sox vs. Detroit Tigers
Fri., April 74 p.m.Chicago White Sox vs. Pittsburgh Pirates
Sat., April 87 p.m.St. Louis Cardinals vs. Milwaukee Brewers
Sun., April 91 p.m.Cincinnati Reds vs. Philadelphia Phillies
Mon., April 107 p.m.Cincinnati Reds vs. Atlanta Braves
Wed., April 126:30 p.m.Boston Red Sox vs. Tampa Bay Rays
Thu., April 131 p.m.Oakland Athletics vs. Baltimore Orioles
Fri., April 149:30 p.m.Milwaukee Brewers vs. San Diego Padres
Sat., April 159:30 p.m.Colorado Rockies vs. Seattle Mariners
Sun., April 161:30 p.m.Tampa Bay Rays vs. Toronto Blue Jays
Mon., April 178 p.m.Toronto Blue Jays vs. Houston Astros
Tue., April 186:30 p.m.Cleveland Guardians vs. Detroit Tigers
Wed., April 197 p.m.Minnesota Twins vs. Boston Red Sox
Thu., April 209:30 p.m.San Diego Padres vs. Arizona Diamondbacks
Fri., April 2110:15 p.m.New York Mets vs. San Francisco Giants
Sat., April 221 p.m.Toronto Blue Jays vs. New York Yankees
Sun., April 234 p.m.Kansas City Royals vs. Los Angeles Angels
Mon., April 246 p.m.Colorado Rockies vs. Cleveland Guardians
Tue., April 259:45 p.m.St. Louis Cardinals vs. San Francisco Giants
Wed., April 261:30 p.m.Detroit Tigers vs. Milwaukee Brewers
Thu., April 271 p.m.Seattle Mariners vs. Philadelphia Phillies
Fri., April 286:30 p.m.Chicago Cubs vs. Miami Marlins
Sat., April 291 p.m.Baltimore Orioles vs. Detroit Tigers
Sun., April 304 p.m.St. Louis Cardinals vs. Los Angeles Dodgers

[ad_2]
Source link