People are seeing AI Overviews less frequently

0
[ad_1]

Ever since Google launched its AI Overviews, it’s been nothing but a mess for the company. Despite being a tool that can put a ton of companies out of business, AI Overviews have been problematic. Well, according to a new report, Google is showing AI Overviews less frequently.

The company has been dealing with yet another AI feature giving it trouble. It’s like Google can’t seem to launch an AI product without some sort of mishap. Besides the people protesting the tool, numerous users have seen some odd responses to their queries. Google posted a blog post explaining why the tool gave some of those responses and put a bit of the blame on the users. It also blamed the responses on “Data Voids” and other things. In any case, it rushed to issue a fix to the problem.

Google is showing AI Overviews less frequently

Back when Google tested this feature under the name SGE, the company was showing generated search results on about 84% of searches, according to BrightEdge. So, if you opted in to test it, you were seeing generative results on the majority of your searches. Well, it looks like Google is pulling back its AI tool just a bit.

When AI Overviews launched to the public back on May 14th, they showed up on between 40% and 50% of searches. However, after the backlash that the company has been facing, it appears that Google is scaling the tool back significantly. The report states that only 15% of searches are seeing overviews.

The source also states that the overviews are more likely to appear if the search query is a question or if there’s a Featured Snippet present. So, it looks like Google is trying to minimize the possibility of it serving up inaccurate information. You won’t have to worry about Google telling you to put glue on your food.

We don’t expect this to be a permanent thing; Google has put too many eggs in its AI basket. We’re sure that the company is just scaling this feature back while it works on the problem.


[ad_2]
Source link

UK and EU users can now officially download Google’s ChatGPT alternative, Gemini

0
[ad_1]

Google’s Gemini (which used to be called Bard) is the company’s generative AI chatbot and assistant. It’s now going to expand its availability and is now available for download in the UK and the European Union. Android users can now download it from the Play Store.

Initially, it was said that Gemini would go global in early May. However, the European region did not get the Gemini app, unless you find it from a third-party app store. Most likely, the delay was due to regulatory considerations.

Now the rollout should begin across the European continent. It first debuted in the U.S. in February, and it’s been broadening its user base since.

On top of that, if you’re a Google Pixel owner, you can seamlessly switch from Google Assistant to Gemini, and you will be able to activate Gemini by voice with the “Hey Google” prompt. Keep in mind though that if you switch to Gemini, some of the features that Assistant handled will be disabled (so no smart home integration for Gemini just yet).

Bard, Gemini’s predecessor, also got a delayed start in the EU previously. Probably, it’s the same regulatory concerns that slowed it down.

Now, millions of people will be able to use Gemini and people in Europe and the UK won’t feel left out anymore. This is great news, as generative AI has loads of benefits and can make your life easier. Of course, there’s always trade-offs. Gemini will most likely completely replace Google Assistant soon.


[ad_2]
Source link

SPECTR Malware Attacking Defense Forces of Ukraine

0
[ad_1]

The government computer emergency response team of Ukraine, CERT-UA, in direct cooperation with the Cyber Security Center of the Armed Forces of Ukraine (CCB), has detected and investigated the activity of the UAC-0020 (Vermin) group, aimed at the Defense Forces of Ukraine.

This cyber espionage campaign, named “SickSync,” marks the return of the Vermin group after a prolonged absence since March 2022.Image Placeholder

Background of Vermin Group

The Vermin group, directed by employees of the law enforcement agencies of the temporarily occupied Luhansk, has been active since at least 2015.

According to the Computer Emergency Response Team of Ukraine report, the group is known for targeting Ukrainian government institutions with remote access trojans (RATs) like Quasar, Sobaken, and Vermin.

Their activities align with the interests of the Luhansk People’s Republic (LPR), a region occupied by Russia.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

The SPECTR Malware

SPECTR, a malware known since 2019, was used in the latest attack.

This malware acts as an information stealer, capturing screenshots every 10 seconds, harvesting files, gathering data from removable USB drives, and stealing credentials from web browsers and applications like Element, Signal, Skype, and Telegram.

The attackers leveraged the legitimate SyncThing software’s synchronization functionality to download stolen documents, files, passwords, and other sensitive information from compromised computers.

SyncThing supports peer-to-peer connections, making it an effective tool for data exfiltration.

The attack begins with a spear-phishing email sent to the target, carrying a password-protected RARSFX archive named “turrel.fop.vovchok.rar.”

Upon launching the file, it extracts a PDF (“Wowchok.pdf”), an installer (“sync.exe”), and a BAT script (“run_user.bat”).

The BAT file executes sync.exe, which contains both legitimate SyncThing components and SPECTR malware files, including auxiliary libraries and scripts.

The standard files of the SyncThing software are partially modified to change directory names, schedule tasks, and disable user notifications.

SPECTR Modules

The SPECTR malware consists of several modules, each with specific functions:

  • SpecMon: Calls PluginLoader.dll to execute DLL files containing the “IPlugin” class.
  • Screengrabber: Takes screenshots every 10 seconds if certain program windows are detected.
  • FileGrabber: Uses robocopy.exe to copy files from user directories and USB media.
  • Social: Steals authentication data from messengers like Telegram, Signal, and Skype.
  • Browsers: Steals browser data, including authentication and session data from Firefox, Edge, Chrome, and other Chromium-based browsers.

The stolen information is copied to subfolders in the directory %APPDATA%\sync\Slave_Sync\ and then transferred to the attacker’s computer using SyncThing’s synchronization functionality.

Example of an email and the contents of a malicious installer
Example of an email and the contents of a malicious installer

CERT-UA recommends monitoring for signs of interaction with the SyncThing infrastructure (e.g., *.syncthing.net) to detect potential infections.

They also urge the Armed Forces’ cyber security personnel to contact the Cyber Security Center to obtain and install appropriate protection technologies.

Additionally, ensuring the transmission of network connection logs via the Syslog protocol on edge network devices is advised.

The Vermin group’s resurgence and use of the SPECTR malware in the SickSync campaign highlight Ukraine’s ongoing cyber threats.

The collaboration between CERT-UA and the Cyber Security Center of the Armed Forces of Ukraine is crucial in mitigating these threats and protecting the nation’s defense forces from cyber espionage.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

How to turn off location tracking on Android

0
[ad_1]

Android devices come with location services. Some apps need access to location services to function properly. However, there may be reasons why you don’t want your device to be located, often because you don’t want to be found and the device is always with you.

Depending on who you are trying to hide your location from, there are several levels of hiding your location.

Disclaimer: the exact instructions for your make and model of Android device may look a bit different.

Turn off location for particular apps

There are apps active on most Android devices that could give away the location of the device. To check which apps have access to your device’s location:

  • Swipe down from the top of the screen.
  • Find the Location icon location pin
  • Touch and hold Location.
  • Tap App location permissions.
  • Under Allowed all the time, Allowed only while in use, and Not allowed, find the apps that can use your device’s location.
  • To change the app’s permissions, tap it. Then, choose the location access for the app.
  • If you see any apps that you don’t recognize, be sure to turn the permission off.
location in main settings menu on Android

Turn off location entirely

Alternatively, you can turn Location off entirely:

  • Swipe down from the top of the screen.
  • Find the location icon location pin
  • If it’s highlighted, tap it to turn it off.
  • You’ll see a warning that some apps may not function properly. Confirm by tapping Close.
No location access warning Android

Turn off Find My Device

Find My Device is a service which makes your device’s most recent location available to the first account activated on the device. Find My Device is included with most Android phones, and it’s automatically turned on once you add a Google account to your device.

How to turn off Find My Device:

  • Open Settings.
  • Tap (Biometrics &) Security.
  • Tap Find My Device, then tap the switch to turn it off.

Turning off Find My Device may backfire if you ever truly need to find your device because you lost it. But if someone may have the login credentials for the Google account associated with the phone, you may want to turn it off.

The last resort is to turn your phone off.

Even in airplane mode, GPS on your phone is still working. As long as a phone isn’t turned off, it’s possible to track the location because the device sends signals to nearby cell towers. Even when it’s turned off, the service provider or internet provider can show the last location once it’s switched back on.


We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.


[ad_2]
Source link

New Tecno flip phone will have completely different design

0
[ad_1]

The new Tecno flip phone will arrive with a completely different design. That was just confirmed by the FCC, as the phone was certified there. A sketch of the phone was shared as part of the process, hence the confirmation.

The upcoming flip phone from Tecno will offer a different design

The name of the device will likely be the Tecno Phantom V2 Flip. The first-gen model is called the Tecno Phantom V Flip. If you check out the image provided below, you’ll see the sketch of a new model, next to a render of the existing model.

Tecno Phantom V2 Flip FCC sketch

As you can see, the Tecno Phantom V2 Flip will have a rectangular cover display. That cover display will be considerably larger than the circular one on the first-gen model. In addition to that, the rear camera design will also be different.

Instead of a camera oreo on the back, the next-gen model will have two separate circles on the back for the phone’s two cameras. They will be vertically aligned, and placed in the top-left corner (from the perspective of an unfolded phone).

Its rear cameras will cut into the cover display, it seems

Those cameras will seemingly cut into the cover display on the back. Well, presumably that the bezels around the display won’t be extremely thick, which is not likely. We presume that the cutout on the back is reserved for the display, almost in its entirety.

This new design will make the phone look more similar to its competitors. It had a rather unique back design with the first-gen model. The FCC also revealed that a 4,490mAh battery will be in use here.

The Tecno Phantom V2 Flip will use a split battery setup. One battery will measure 3,310mAh, while the other 1,180mAh. That makes for a 4,490mAh battery capacity in total.

70W charging will be supported, and a 4,490mAh battery included

What about charging? Well, the phone will support 70W wired charging. The original model supports charging up to 45W, in case you’re wondering. This FCC listing also confirms that the phone will include 8GB of RAM and 256GB of storage. That will be at least one of its variants.

The phone also appeared on Geekbench not long ago, confirming that the MediaTek Dimensity 8050 SoC will be in use. The first-gen model arrived in September, though this one could arrive sooner than that… it remains to be seen.


[ad_2]
Source link

Humane wants to be bought for $1 billion

0
[ad_1]

Remember the AI Pin? It seems like a lifetime ago since people actually talked about that device and even longer since anyone said anything good about it! The ill-fated device flopped hard, so the company is now on damage control. Humane is looking for a $1 billion buyout after the AI Pin flopped.

The tech industry was flooded by poor reviews of the AI Pin. Sure, it was an interesting concept. If you don’t know what the AI Pin is, it’s a little device you clip onto your clothes that acts as a quick shortcut to AI models. You can activate it to ask it questions, and it will contact LLMs in the cloud and serve them to you. Also, it has a camera onboard to scan objects in the real world.

On paper and in the Ted Talk that the CEO gave, it seemed like a useful and industry-defining device; then again, so did the Nokia NGAGE. The fact of the matter is that the device underperformed in just about every area. Thus, it gained a thumbs down from pretty much every reviewer. Making things worse is the fact that it was a steep $700 investment plus $24/month for cell service.

Humane is looking for a $1 billion buyout

Well, we can add this to the “Interesting, but failed device graveyard” along with the corpses of the Essential Phone, Moto Mods, and the Rabbit R1. After the company only sold 10,000 units, Humane is now looking to be bought. The 10,000-unit figure doesn’t take into account canceled orders or returns. Also, how many of those users are going to continue paying the $24/month fee for the service? As noted by Engadget, the company could have only pulled in a maximum of $7.24 million in revenue.

10,000 units is much lower than the 100,000 units Humane planned to sell, so it’s selling itself. Humane is looking for a buyer to purchase the company. We don’t know what company would want to buy Humane, but it’s been in talks with HP.

It may seem odd that the company wants to sell itself after bombing so hard on its first product. We don’t know what Humane is planning on doing, but it could be seeking the security of being owned by a much larger company. Also, who knows if Humane could make itself a division of a company? Rather than developing its own products, it could lend its technology and expertise to another company.

Well, anything is better than bankruptcy!


[ad_2]
Source link

This news app with 50 million monthly users is said to publish fake AI stories

0
[ad_1]

Misinformation” and “disinformation” have been part of our vocabulary for years now, but there’s an app that takes things to the next level and publishes fake AI-generated stories! It’s available only in the US and it has over 50 million monthly users, so you (or someone you know) might’ve stumbled upon it at a point in time – or even use it regularly.It’s no secret that local news outlets across America have shuttered in recent years – and that’s where the NewsBreak app comes into play to fill the void.

Billing itself as “the go-to source for all things local”, Newsbreak says it has over 50 million monthly users. It publishes licensed content from major media outlets, including Reuters, Fox, AP, and CNN as well as some information obtained by scraping the internet for local news or press releases which it rewrites with the help of AI.

Now, a Reuters report highlights that NewsBreak did a big no-no last Christmas Eve, when the news app published a false story about a shooting in Bridgeton, New Jersey. The local police department debunked the article, stating that no such incident had occurred. NewsBreak removed the article four days later, citing inaccurate information from a content source.

The report goes on with claims by former employees, who revealed that most of NewsBreak’s engineering work is done in China. This has raised concerns about data privacy and the influence of Chinese-based staff on American user data. NewsBreak insists it complies with US data laws and maintains that its data is stored on US servers.

NewsBreak’s use of AI has led to legal issues, including a $1.75 million settlement with Patch Media for copyright infringement. Another lawsuit with Emmerich Newspapers is ongoing. Despite these challenges, the company claims to address issues promptly and continues to evolve its operations.

NewsBreak generates revenue through ads targeted at its predominantly female, suburban or rural user base. The company continues to face scrutiny over its ties to China and its use of AI in news aggregation.

[ad_2]
Source link

CISA Adds A Linux Vulnerability To Its Known Exploits Catalog

0
[ad_1]

CISA warned users of a severe vulnerability in Linux under active attack. While the vulnerability has already received a fix, it remains a threat to unpatched systems, allowing the attackers to exploit the flaw.

Linux Vulnerability Found Under Active Attack Despite Patch

According to the latest advisory from CISA, a new Linux vulnerability has been under active attack, threatening users globally. CISA added this vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, confirming the active exploitation and the threat severity.

Identified as CVE-2024-1086, the vulnerability is a use-after-free flaw in the netfilter: nf_tables component. Exploiting it allows an adversary with local access to gain elevated privileges (such as root access) on the target Linux system. As stated in the NVD vulnerability description,

A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

Linux developers patched this vulnerability in a January 2024 commit (commit f342de4e2f33e0e39165d8639387aa6c19dff660).

While CISA’s advisory doesn’t explain much about the exploit, the researcher with the alias “notselwyn” elaborated on it in a detailed post. The researcher also presented a PoC exploit (shared on GitHub), demonstrating the local privilege escalation.

Though the vulnerability swiftly received a fix, the threat became severe due to unpatched systems. As highlighted by Jonathan Wright, Red Hat Enterprise Linux (RHEL) developers didn’t push the fix in time, marking the vulnerability with a moderate severity level, which left many Linux systems vulnerable.

Understandably, unpatched systems are always lucrative for threat actors, often resulting in massive exploitation waves. While the exploitation for CVE-2024-1086 seemed minimal, it still triggered severe active attacks.

Deploy Patches By June 20th

Given the severity of the matter, CISA added this vulnerability to its KEV Catalog, instructing the organizations to patch their systems by June 20, 2024. In cases where applying a patch isn’t possible, CISA advised users to blocklist nf_tables, restrict access to user namespaces, and load the Linux Kernel Runtime Guard (LKRG) module.

Alongside this vulnerability, CISA added the recently highlighted Checkpoint VPN vulnerability, CVE-2024-24919, to its KEV Catalog.

Let us know your thoughts in the comments.


[ad_2]
Source link

How to turn off location tracking on iOS and iPadOS

0
[ad_1]

On iOS and iPadOS, location services are typically turned on when you first set up your device. However, there may be reasons why you don’t want your device to be located, perhaps because you don’t want to be found but need to keep the device with you.

There are a few options to hide your location from prying eyes.

Please note: I will only mention iOS from here on, but the instructions are almost the same for iPadOS.

Turn off location services by app

Some apps will not work properly without location services, but it’s certainly worth checking which ones are actually using them.

  • Go to Settings > Privacy & Security > Location Services.
  • If Location Services is on, you will see a list of apps with permissions.
Apps using Location Services
  • Scroll down to select an app.
  • Now you can tap the app and select an option of Never, Ask Next Time Or When I Share, While Using the App, or Always.
  • From here, apps should provide an explanation of how they will use your location information. Some apps might offer only two options.

Turn location services off entirely

You can turn Location Services on or off at Settings > Privacy & Security > Location Services. Move the slider control to the left to turn Location Services off.

Location Services menu

Note that turning Location Services of will also disable the Find My feature for the device.

Turn off Find My iPhone

Find My iPhone allows a user to track their devices. It allows you to locate the device from another device, make it play a sound if you are close, and even remotely erase your device if you suspect it has fallen in the wrong hands.

To disable Find My iPhone:

  • Go to Settings
  • Select your account name.
  • Choose Find My
  • Turn the feature off. You will need to enter your iCloud password.
Find my iPhone screen showing how to turn off Find My iPhone

An iPhone can still be tracked in some cases, even if it is in Airplane Mode. The only way tracking is not possible is to turn the iPhone off completely.  And even then, since iOS 15, iPhone models 11 and up will transmit their location even when powered off if the Find My Network is enabled in your settings.

To turn off Find My network:

  • Go to Settings
  • Select your account name.
  • Choose Find My
  • Turn Find My network off.

We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.


[ad_2]
Source link

Ulefone Armor 25T Pro is still discounted, but not for long

0
[ad_1]

The Ulefone Armor 25T Pro received quite a considerable discount at launch, and it’s still discounted. That will not last for long, so this is your last call to grab the phone for that price if you’re interested.

The Ulefone Armor 25T Pro is still discounted, but you don’t have a lot of time

The discount ends tomorrow, June 7. It is currently priced at only $289.99 over at Ulefone’s official AliExpress store. The purchase link can be found here, and below the article as well.

In case you’re not familiar with the device, the Ulefone Armor 25T Pro is the company’s new budget rugged phone. It is not only rugged, but it has a large battery and a thermal imaging camera. Those are its main selling points, basically.

The device comes with a ThermoVue sensor for thermal imaging. It can provide images of 160 x 120 pixels and a frame rate of up to 25Hz. It detects temperatures of all objects above absolute zero (-273°C).

A large battery is included, as is an infrared camera

There is also a 64-megapixel infrared night vision camera on the back. A 6,500mAh battery sits on the inside of the phone, while the device supports 30W wired charging. Yes, the charger is in the box. It also supports 30W wireless charging, by the way.

The Ulefone Armor 25T Pro is also IP68/IP69K and MIL-STD-810H certified. It is not only water and dust-resistant, but it can take a hit too, in case you drop it or something like that.

The MediaTek Dimenstiy 6300 SoC fuels the device. This is a 6nm processor, by the way. The phone supports 5G connectivity too. It offers 6GB of RAM and 256GB of storage. RAM can be expanded via virtual RAM, while the phone’s storage can also go up by an additional 2TB (microSD card).

The phone also has a 120Hz display

A 6.78-inch fullHD+ (2460 x 1080) IPS LCD display is placed on the phone too. It offers a 120Hz refresh rate, and it’s protected by the Gorilla Glass Victus.

There is plenty to like here, especially at the phone’s current price tag. If you’re interested, the purchase link is included below.

Buy the Ulefone Armor 25T Pro (AliExpress)

Ulefone Armor 25T Pro (more info)


[ad_2]
Source link