T-Mobile is shutting down some of its Signature stores in the US

0
[ad_1]

T-Mobile is closing four of its Signature stores across the United States. The company president Jon Freier reportedly announced the news via a “Freierside Chat” this past Friday.

As one of the biggest national carriers, T-Mobile has a significant role in the US telecommunications industry. The company currently has over 110 million subscribers, and its 5G network covers 99% of Americans across 1.8 million square miles. In the past few months, T-Mobile has made the headlines for its layoffs, data breaches, and network outages. The carrier is now closing at least four Signature stores to cut costs.

The Signature-branded stores were initially launched to “wow customers and employees with ultimate Un-carrier experiences, like exciting events and product launches.”

T-Mobile has six Signature stores overall that provide customers with exclusive experiences. Four stores in San Francisco, Chicago, Miami, and Santa Monica will be closed soon. The impacted employees are offered to work in other T-Mobile stores or get a severance payment.

T-Mobile Signature stores remain active in New York City and Las Vegas.

Despite closing stores in four locations, T-Mobile has no plan (yet) to shut down its Signature stores in New York City and Las Vegas. The decision to close stores comes after the company missed the quarterly revenue estimations (via Yahoo). As per the reports, T-Mobile’s revenue dropped 2.5% from a year earlier due to fierce competition.

The monthly rent of each Signature store is reported to be around $500,000 or more per month. So T-Mobile can save up to $24 million annually by shutting down four stores. Other plans to cut costs and maximize profit include removing autopay discounts for customers paying via credit card since May 16.

Of course, T-Mobile is one of the many US-based companies laying off staff and selling unprofitable assets to cut costs. The economic forecasts for the coming years have caused companies to be more cautious in spending and use any tactic to reduce costs.


[ad_2]
Source link

Microsoft integrates ChatGPT tech into its Power Platform tools

0
[ad_1]

Microsoft is bringing ChatGPT to more of its products. The company Monday announced that it will integrate the tech behind the AI sensation into its developer software suite Power Platform. It previously integrated the AI tool into its Edge browser, Bing search engine, and cloud computing platform Azure.

According to Reuters, Microsoft has updated multiple Power Platform tools with enhanced ChatGPT-like AI capabilities. The publication says Power Virtual Agent and AI Builder are among those tools. The former is software for writing chatbots while the latter gives businesses AI models that help optimize and automate business processes. With ChatGPT integration, Power Virtual Agent can “connect to internal company resources to generate summaries of weekly reports and customer queries,” the report explains. AI Builder, on the other hand, will gain generative AI capabilities.

Microsoft’s announcement comes on the same day it launched a new AI-powered version of its business management platform Dynamics 365. Dubbed Dynamics 365 Copilot, it enables organizations to automate repetitive tasks across sales, service, marketing, operations, supply chain, and more business areas with the use of AI tools. “These AI capabilities allow everyone to spend more time on the best parts of their jobs and less time on mundane tasks,” the company’s CVP of Business Applications and Platform, Charles Lamanna, said in a blog post yesterday.

The Windows maker has also recently announced AI updates for the popular PC platform. It plans to bring AI to its remote collaboration and communication tool Microsoft Teams as well. Its Office productivity suite, including Word and Excel, maybe the next in the pipeline to benefit from artificial intelligence. Microsoft has planned an event for Thursday, March 16, where CEO Satya Nadella will discuss “reinventing productivity with AI”. We may see the company announce AI updates for more of its products there.

OpenAI has already launched a ChatGPT API for developers

Microsoft is integrating ChatGPT into its Power Platform developer suite less than a week after OpenAI, the maker of the AI tool, launched an API for developers. Companies and individuals can use the API to give unprecedented AI powers to their products. They can build conversational AI chatbots into their existing or new apps. They can also use ChatGPT to make their “non-chat” platforms more intelligent. Snapchat and a few others have already announced products powered by the ChatGPT API. You can expect to find the AI tool in more social and utility apps in the future.


[ad_2]
Source link

Access the AI chatbot everyone is talking about from your Apple Watch

0
[ad_1]
How would you like to access the AI chatbot everyone is talking about right from your Apple Watch? According to 9to5Mac, the watchGPT app is now available for the Apple Watch from the App Store priced at $3.99. According to the App Store listing, with watchGPT you’ll be able to:
  • Interact with ChatGPT right from your Apple Watch.
  • Quickly get answers to your questions or generate longer messages without typing.
  • Share the outcome of your interaction with others via text, email or social media.
  • Set the app as a complication for easy access.
  • Does not collect any data.
  • Available in English, Dutch, French, and Spanish.
Right now, users can only ask one question. The developer says that he plans to update the app to allow users to have a complete conversation. The App Store listing notes that watchGPT can be added to your watch face as a complication. The latter is any feature on a watch beyond the display of hours, minutes, and seconds. You can set the app so that it will use a vocal input by default. The app can also be set to read answers out loud.
The developer, Hidde van der Ploeg, writes on the App Store listing, “With watchGPT on your wrist, you can easily access a vast source of knowledge and communicate with an intelligent computer in real-time. It’s like having a personal assistant on your wrist! To use watchGPT, simply open the app and ask your question or type in your message. watchGPT will provide you with a response that you can quickly share with others via text, email or social media.”He adds, “To make things even easier, you can set watchGPT as a complication on your watch face. This way, you can quickly access the app with just a tap on your watch face.”

You can’t escape it, folks. The ChatGPT chatbot is everywhere. Personally, I just came off the waitlist today for the mobile version of the New Bing which means that I can now access it from my Pixel 6 Pro anytime I want. Frankly, after just playing around with it today, you can see that this is the future of search. And if ChatGPT or another AI chatbot gets access to the Android or iOS platforms, we could eventually say adios to digital assistants.


[ad_2]
Source link

Illegal movie streaming platforms hide lucrative ad fraud operation

0
[ad_1]

A network of online video streaming sites are monetizing traffic with hidden ads. The problem? Advertisers are throwing up to a million dollars every month down the drain as nobody is even seeing the ads.

This investigation was a joint effort between Malwarebytes Threat Intelligence’s Jérôme Segura, DeepSee’s Rocky Moss and Antonio Torres.

Key findings

  • Over a dozen unique domains were found selling ad inventory through Google Ad Manager, even though the pages were embedded invisibly under the content of illegal movie & porn streaming sites

  • Streaming sites in the DeepStreamer fraud ring generated an estimated 210,550,928 visits in January 2023, as measured by Similar Web

  • There was not a single seller in common between each of the sites used for laundering (the “money sites”), but most offered their inventory for sale through Google Ad Manager

  • Using extremely conservative estimates, which factor in a 50% ad-block rate & 70% ad-unit fill rate, we project advertiser spend on this scheme between $120k – $1.2 million in January 2023 alone

  • Working with a leading ad buying platform, we were able to confirm there were hundreds of millions of bid requests generated for these domains between January and February 2023

Introduction

Online video streaming sites have always been some of the most visited destinations on the web. Legitimate ones will typically require a subscription fee or rely on advertising as part of their business model. Unfortunately, at any given point in time, there are thousands of sites that allow users to illegally stream pirated content, and they often manage to devise strategies that allow them to monetize their illegally sourced content with programmatic advertising.

Researchers at DeepSee and Malwarebytes have identified an invalid traffic scheme that has gone undetected for over one year via a number of illegal video streaming platforms. DeepStreamer used different techniques to evade detection and forge traffic by surreptitiously loading “money sites” (ad-monetized sites used to monetize/launder the human traffic to pirate sites) filled with Google ads completely hidden from view, while internet users were watching movies.

Not only are these streaming sites breaking the law by using copyrighted material, they are also defrauding advertisers to the tune of $1.2million per month, based on conservative estimates.

A deceptive business model

DeepSee researchers contacted Malwarebytes about a scheme they had observed recently via a video streaming website called moviesjoy[.]to. DeepSee’s crawlers had observed the site mikerin[.]com loading ads deep under the content of moviesjoy, but it wasn’t exactly clear how this was happening.

Interestingly, the site claims to offer free HD movies and TV series with “absolutely zero ads on our site. Once you hit the play button, you can start streaming right away, without any interruptions in the middle.”

On the internet if something is “free”, it usually means you are the product in some shape or form. Hosting and streaming costs money that needs to be recouped so the service can stay online.

What we identified was not entirely surprising but was quite clever. The platform does indeed rely on ads but rather than having them visible on the site, they are embedding and hiding them.

While the site owner could display ads to their visitors, there is no way legitimate advertisers (meaning those that would pay more) would accept traffic coming from a site offering pirated movies.

The trick consists of loading ads from seemingly regular websites and not showing them to anyone. Those “legitimate” websites are embedded and hidden into the page as iframes while users are watching movies.

There are 4 Google ads that load per page and the pages reload periodically. Advertisers are buying ad space for mainstream content but on websites that are inserted as invisible iframes into illegal video streaming platforms.

Anti-debugging tricks

Rather than using more simple techniques such as popunders, DeepStreamer relies on intermediary domains that create hidden iframe containers within the existing page.

The code that they use is highly obfuscated and detects the presence of debuggers. Capturing network traffic externally will only show some static elements, and not the dynamically created iframes.

Here is the overall traffic view, from the streaming site (moviesjoy) to the money site (mikerin):

There are several anti-debugging tricks being used, the first one actually from the online video streaming site itself:

The domain hosted at adtrue[.]top (or adtrue[.]info) plays an important role in loading the money domains by performing a HEAD /dynamic/ads/ HTTP request, and yet it shows an enigmatic 404 code response.

We were able to replay the attack by putting a breakpoint on adtrue[.]info using an external web debugger (Fiddler) and observed that it started loading the domain immediately responsible for rendering the money site.

It appears though that all these intermediary domains are connected and watching for each other.

Hidden iframe containers

Let’s look at the difference between static and dynamically rendered content with mikerin[.]ml which is related to mikerin[.]com (money site with ads) only appears to load jquery.js:

This has nothing to do with the popular jQuery JavaScript library, but instead is heavily obfuscated and debugger-proof code that contains the clues on how DeepStreamer is loading their iframe:

However, we can take a shortcut and see what the Document Object Model (DOM) looks like by saving the current webpage as a complete *.html,*.html file using the browser UI.

While the HTML saved from mikerin[.]ml showed very little information, the DOM provides a lot more useful information since it shows objects that have been rendered by the browser.

There is a new element called “containerIframeBlog____” that is referring to the money sites which are ordinary looking blogs with Google ads. The iframe’s properties make it so that nothing is visible to the user.

One way to confirm those iframes without triggering the anti-debugger code is by launching Chrome’s Task Manager:

Evasion techniques

What we refer to as the money sites are WordPress sites with a number of blog articles and Google ads. At first glance, everything looks legitimate but that is simply a decoy to fool everyone.

What we noticed are articles that are completely clean, while others contain ad fraud code. Of course, you will only get to the latter if your referer is one of the movie streaming sites.

There is one problem though. If visitors truly came from a pirated site, then ad networks would not allow their customer’s ads through. 

This is where referral forging comes into play. We can see that DeepStreamer is spoofing the referer and choosing from one of their own (Google, Bing or Facebook):

Another issue is that the invisible iframes will not reflect user activity, and yet it is important to pretend humans are scrolling and clicking on the articles. The next piece of code from the ad fraud script does just that:

If the money site was not hidden as an iframe, this is what it would look like while performing ad fraud:

Perhaps as a measure to avoid creating too many ad requests, these embedded pages do not often refresh ad units within the context of a single page-view. Instead, they generate a visit to a new spoofed page every 2-3 minutes, as demonstrated in this code snippet (looking at the interval object in particular for details on timing):

This is also confirmed by our packet captures from manually generated visits to these pirate sites; a new page is loaded every 2-3 minutes.

(Un)intended 3rd Party Measurement Evasion

One interesting side effect of embedding the money domain as DeepStreamer here has: estimates from SimilarWeb were completely thrown off! Take for example the SimilarWeb results for 2 money sites that generated hundreds of millions of ad opportunities in the same measurement period (Nov ‘22 to Jan ‘23):

Similarweb has no idea they exist & are generating these kinds of ad traffic volumes. This makes it seem like SimilarWeb measures traffic for domains that are navigated to in the browser address bar, and not accounting for hidden / embedded pages. This could be both a blessing and a curse. 

On the plus side: many ad exchanges check for 3rd party traffic metrics from tools like SimilarWeb before making a publisher’s inventory available, and organizations doing that basic check will protect themselves from exposure to sites like this. Put another way: a quality specialist would see that there’s no traffic to mikerin[.]com, or guiadosabor[.]com, and the sites would not be approved for the platform subsequently. 

One negative outcome of this measurement scenario is that researchers who rely on SimilarWeb insights can not know about the “money” sites’ connections to pirate domains; the connection from source -> “money” site is lost given the absence of SimilarWeb “related sites” data. 

DeepSee’s crawl data revealed ground-truth connections between the pirate & “money” sites, but it could not account for the volume of traffic directed at the “money” sites. Luckily, since these sites load every time someone visits the pirate sites, it’s possible to estimate the visit counts to the “money” domains by understanding traffic volumes to the pirate sites which embed them.

Monetization

The Roster of Embedded Sites

By working with the team at Malwarebytes, DeepSee was better able to profile the activity of a monetized site involved in this scheme, and set about the task of mapping the active ones to their pirate/source domains. What we found are 14 active content domains, loaded by 250+ unique pirate sites, which cumulatively generated hundreds of millions of visits in January:

In order to arrive at the estimated visit statistics, we used data from Similarweb. Not every pirate domain was found in their dataset due to recent registration, or low traffic volumes.

Now that we had identified a sample of ad-monetized domains, we needed to make sure these ad units were actually firing off impression trackers, meaning the advertiser would be charged for presenting their ads on the page. 

In order to confirm this, DeepSee analyzed data its crawlers had gathered when visiting the pirate sites in question, and compared the number of Google ad requests generated to the number of corresponding Google impression trackers fired. 

This dataset, composed of 6,748 crawls performed between January 1st and February 27th 2023 showed the following:

  • Of the 35,269 Google ad requests measured, DeepSee measured 25,387 corresponding impression trackers, making for a fill rate of ~72%

  • The “money” sites loaded a median 4 ad units per-page load; confirmed by manual inspection performed by Malwarebytes

  • In DeepSee’s limited manual tests, generated by visiting the pirate sites & running packet capture software, there was a measured fill rate of ~80%

  • Perhaps more troubling, ~98% of the sessions that DeepSee crawlers generated were from known data centers, performed without any attempt to cloak the IP.

(For more information on how to do this kind of auditing yourself, check out this explainer from MonetizeMore)

These data points in hand, we could now construct an estimate of how much advertisers might be spending on this inventory. For complete insights into the dataset we used to create these estimates, alongside the complete list of Source:Money domain mappings, check out our companion document

  • After matching the pirate source domains to SimilarWeb data, and summing the visit counts, we counted 221,823,394 cumulative visits generated.

  • Using the visit data, and the time-on-site metrics from SimilarWeb, we arrived at a weighted average time-on-site of ~7.75 minutes per visit

  • Visitors immediately cause 4 ads to load upon a page load, and another 4 ads load on average each 2.5 minutes when the page reloads. This makes for an average 16.40 ad exposures per visit for each user

  • Multiplying average exposures per user by the number of visits yielded a total of 3,636,840,849 estimated ad exposures in January, but we had to add a few modifiers to this figure:

    • According to data compiled by Statista, ~50% of desktop web users block ads, and that number is ~30% for mobile browser users. We chose to use the more conservative 50% figure, and removed half of the projected impressions from the pool, leaving 1,818,420,425 estimated ad exposures in January

    • As we previously mentioned, DeepSee crawlers measured a fill rate of ~72% for Google ad units on the money sites during our visits. Factoring in a slightly more conservative 70% fill rate left us with 1,272,894,297 estimated ad exposures in January

Given our final figure of 1,272,894,297 estimated ad exposures in January, the advertiser spend was estimated to be between $127k and $1.27 million, depending on the average price of these advertisements, which was never disclosed to us. We broke our estimates down across several probable price points for this media:

At this point, it was clear that advertisers were really buying this space, so we started asking around for evidence that could point us to who was selling the space.

The Non-Google DSP Perspective

The data in this section was provided to DeepSee by a leading DSP (demand-side advertising platform) with global reach, who agreed to participate under condition of anonymity (we’ll call them DSP “A”) . They provided reporting, from their perspective, on the count of bid requests generated by the money domains dating back to August of 2020. Most helpfully, they also provided the supply-path related to an opportunity, which tells us the exchange & seller name related to the opportunity.

As a disclaimer, there are a few limitations of this dataset:

  • This is just the perspective of one DSP, and we can’t claim to know that these sellers created a similarly large share of opportunities presented to all other DSPs. We suspect they do, but without input from Google in particular, it can’t be confirmed.

  • These sites seemed to monetize extremely poorly outside of Google; fewer than 1% of requests resulted in an ad being delivered via the DSP we polled.

    • That low fill rate was echoed by another non-google exchange we polled, who told us that only .1% of opportunities they created resulted in ads being loaded

    • On the other hand, we observed that the Google filled these ad units upwards of 70% of the time, implying spend was mainly coming from users of Google’s DSP

Understanding the above, the below table shows the top sellers offering space on these money domains, and the ad exchange the opportunity came through.

Google Was the Top Exchange Offering These Opportunities; There Was Not 1 Particular Seller in Common

Top Seller Per Domain, Ordered by Magnitude of Ad Opportunities Presented to DSP “A” Since August 2020

Summary

In this investigation, we uncovered a network of streaming websites and bogus domains created for the purpose of illicitly gaining revenue from advertisements by a threat actor we called DeepStreamer.

We were impressed by the technical complexity of the code and underlying infrastructure. The perpetrators took many steps to prevent reverse engineering and tracking metrics were not accurately representing the scale of the abuse at play.

We have notified Google and other industry partners and some actions have already taken place. Malwarebytes users are not participating in this invalid traffic scheme defrauding advertisers as we already block the fraudulent domains used.

About Malwarebytes

Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes’ award-winning endpoint protection, privacy and threat prevention solutions and its world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe. 

The effectiveness and ease-of-use of Malwarebytes solutions are consistently recognized by independent third parties including MITRE Engenuity, MRG Effitas, AVLAB, AV-TEST (consumer and business), Gartner Peer Insights, G2 Crowd and CNET.

The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

About DeepSee

DeepSee uses highly sophisticated crawlers, combined with rigorous network analysis, in order to capture the behaviors websites present when visited by actual humans, and contextualize those behaviors within the graph of the internet.

DeepSee uses this data to arm advertising professionals with ground-truth signals about content appropriateness, ad-density, on-page technologies, backlink makeup, and more.

This dataset enables the sell-side to effectively & automatically moderate the quality of the inventory they offer, and empowers the buy-side to quickly generate robust blocking / targeting lists.

Indicators of Compromise

Domains launching invisible iframes:

adorablefurnishing[.]ml
awscloudfront[.]ml
bigcache[.]ml
brcache201[.]ml
brient[.]ml
cache33[.]ml
cdncache[.]ml
compactembed[.]ml
dbcache[.]fun
dcache[.]ml
embed123[.]ml
fcache[.]ml
filecache[.]ml
financeirocartao[.]ml
fishuflatinned[.]ml
fullcdn[.]ga
harateness[.]ml
honessity[.]ml
hypercdn[.]ml
hypercdn3[.]ml
investwell[.]ml
jestick[.]ml
journeywithvision[.]ga
jscache[.]live
kbyte[.]ml
livrosdereceita[.]ml
maxcache[.]ml
mbyte[.]gq
mcdn[.]ga
megacdn[.]ml
megacdn[.]top
megasearch[.]gq
melhoresdomomento[.]ml
mikerin[.]ml
myplayer[.]ml
newsworldcity[.]ml
poptube[.]fun
primesinfo[.]ml
satishmoheyt[.]ml
supercache[.]top
tapcache[.]ml
tcache[.]ml
tecnowebclub[.]ga
toptube[.]fun
uwatchtube[.]ml
video[.]your-notice[.]fun
videocdn[.]fun
videosdahora[.]fun
whatsappvideos[.]ml
wispields[.]ml
wpcache[.]ml
youbesttube[.]gq
yourtube[.]fun
ytcache[.]fun
pharmabeaver[.]ml
pharmabeaver[.]com
virvida[.]com
guiadosabor[.]com
techyclub[.]in
journeywithvision[.]com
newsworldcity[.]com
mikerin[.]com
primesinfo[.]com
investwell[.]site
streamix[.]tv
guerytech[.]online
brandingjoy[.]in
aitechgear[.]in
adorablefurnishing[.]com
satishmoheyt[.]in

Money domains:

brandingjoy[.]in
aitechgear[.]in
guiadosabor[.]com
mikerin[.]com
adorablefurnishing[.]com
journeywithvision[.]com
satishmoheyt[.]in
primesinfo[.]com
techyclub[.]in
streamix[.]tv
newsworldcity[.]com
pharmabeaver[.]com
guerytech[.]online
virvida[.]com

Malicious JavaScript (iframe):
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Have a question or want to learn more about our cyberprotection? Get a free business trial below.

GET STARTED


[ad_2]
Source link

An alleged Google Pixel Fold has been seen in public

0
[ad_1]

For a while, the Google Pixel Fold has been making headlines across the internet, and now a live version of the foldable device has been allegedly spotted in the wild. This reveals the design of the device that will be Google’s first entry into the foldable category.

According to the available report, a Reddit user spotted this alleged device on a train. The user then proceeded to take a close picture of the device and share it on their page. A Google employee was said to have this device in their possession while on the train.

Although the specifications of this device are still a mystery, some elements of its design have leaked. The Reddit user that spotted this device also explains other aspects of its design that images didn’t reveal. That said, all details concerning this leak should be taken with a pinch of salt.

Details on the live Google Pixel Fold device

Google has been bad at keeping the details of its products concealed from the public. Once again, details on a coming product have hit the internet ahead of the product’s launch. This time, images on the yet-to-launch Google Pixel Fold have hit the internet.

These images shared by a Reddit user show the Pixel Fold in the hands of a Google employee. The images show the device in use while folded up, hence revealing only its cover screen. From these images, it is safe to assume that the coming foldable device from Google will make use of a unique design form factor.

This design form factor is quite similar to that found in the OPPO Find N Fold series. Aside from this alleged device’s cover screen, other design elements remain unknown. The Reddit user responsible for this leaked information also described what the Google Pixel Fold spotted looks like.

From the user’s description, this coming foldable is thin and has thin bezels as well. It is hard to confirm these descriptions since most of the images are blurry. Also, it is important to take this leak with a pinch of salt until further information from reliable sources is available.

Pixel Fold leak


[ad_2]
Source link

Apple is expected to announce a new iPhone 14 color very soon

0
[ad_1]

It seems like Apple may announce a new iPhone 14 color soon. Back on March 8 last year, the Green iPhone 13 and iPhone 13 Mini were announced. So, tomorrow will be exactly a year since then.

Apple may announce a new iPhone 14 color very soon

So, when can we expect Apple to announce a new iPhone 14 color? Well, very soon. According to reports, there is a product briefing taking place with Apple’s PR team today, March 7.

On top of that, Bloomberg’s Mark Gurman said that a new iPhone 14 color is “imminent”. Gurman is usually spot on when it comes to Apple-related info, so we have no reason to doubt him.

What color can we expect this time around? Well, a yellow variant of the iPhone 14 is expected. Just to be clear, both the iPhone 14 and iPhone 14 Plus will become available in this new color.

This concept gives us an idea of what the phone may look like

The phone’s design will, of course, remain unchanged. The only thing that will change is the paint job. Now, aaple_lab did create a concept of a yellow iPhone 14, just to give you an idea of what we may get. That concept image is shown below.

Yellow iPhone 14 concept image 1

Apple will likely use a different shade of yellow, though it could be close to this, we cannot be sure. Needless to say, this colorway will grab some attention, so if that’s what you’re looking for, this will be right up your alley.

As a reminder, the iPhone 14 and iPhone 14 Plus launched on September 7, along with the iPhone 14 and iPhone 14 Pro Max. The devices have been out for about half a year at this point, which is when Apple usually spices things up a bit.

We’ll probably get more info about the new iPhone 14 color soon. In fact, Apple may even make an official announcement in the coming days.


[ad_2]
Source link

WhatsApp CEO: Don’t use Telegram!

0
[ad_1]
Well, the chat app wars are raging, and the latest strike comes from Will Cathcart, Head of WhatsApp at Meta. In a rapid-fire style series of tweets, Cathcart mounts some serious attacks, calling Telegram “Russian spyware,” and urging people not to use it.

This war is a long-standing one, and it dates way back in time, but the latest point of discussion seems to be end-to-end encryption. Cathcart referred to an article by Wired and his own critique of Telegram’s implementation of end-to-end encryption (E2EE), pointing out that it has not been verified independently. Additionally, Cathcart noted other weaknesses in the E2EE implementation, such as the fact that it is not enabled by default and is not available for group chats.

“Telegram lacks real transparency most technology companies have adopted. “In many cases, it’s impossible to tell what’s really happening…whether spyware or Kremlin informants have been used to break in.”

You can jump to Twitter and “enjoy” the whole show (with or without popcorn), but it’s safe to say that there are always two sides to every story. WhatsApp has been criticized for backing up chats to Google Drive and effectively giving government agencies the means to warrant out any information through Google.

Cathcart rounds up his attack with some “friendly” advice for people who don’t want to use WhatsApp for some reason. “Don’t use Telegram!” WhatsApp’s head doesn’t list any alternatives, but experts in the industry think that Signal is the most secure option at the moment.

Also Read:


[ad_2]
Source link

Ransomware review: March 2023

0
[ad_1]

February 2023 saw a record number of victims for LockBit, a record high ransom demand, and a devastating assault on the City of Oakland.

This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their Dark Web leak sites. This information represents victims who were successfully attacked but opted not to pay a ransom.

It seems like LockBit wasn’t content with having us merely crown them as one of the five most serious cyberthreats facing businesses in 2023. In February, the most widely used ransomware-as-a-service (RaaS) posted a total of 126 victims on its leak site—a record high since we started tracking the leaks in February 2022.

Known ransomware attacks by gang, February 2023
Known ransomware attacks by gang, February 2023
Known ransomware attacks by country, February 2023Known ransomware attacks by country, February 2023
Known ransomware attacks by industry sector, February 2023
Known ransomware attacks by industry sector, February 2023

Companies attacked along LockBit’s warpath last month include financial software firm ION Group and Pierce Transit, a public transit operator in Washington state. LockBit claimed that ION Group had paid the ransom and demanded $2 million from Pierce Transit.

Speaking of ransom demands, it seems like that’s another area where LockBit broke records last month.

In early February LockBit tried to get $80 million out of the UK’s Royal Mail—the largest demand since asking Continental for $50 million in 2022. Royal Mail rejected the demand, calling it ‘absurd’, and LockBit consequently published the files it stole from the company—but not without also leaking a chat history showing the negotiations between the two parties, which featured the unusual sight of a Royal Mail negotiator giving the feared ransomware gang the runaround.

Lockbit and Royal Mail negotiations
Lockbit and Royal Mail negotiations

Confirmed attacks by Vice Society, the ransomware gang infamous for wreaking havoc on the education sector, reached their three-month low last month. The apparently Russian-based group tallied just two victims on its leak site in February, but—true to their modus operandi—both of them were educational institutions: Guildford County School, a specialist music academy in London, and Mount Saint Mary College, a liberal arts college in New York. Needless to say, we’re not banking on this persistent education sector threat going away anytime soon.

After LockBit, ALPHV (aka BlackCat) and Royal again topped the list of most known victims last month. But as it turns out, these two groups have more in common than just their high placements: Both are considered big dangers to healthcare organizations. The US Department of Health and Human Services (HHS) even released a detailed report on Royal and ALPHV in mid-January 2023 outlining the dual threat to the US health sector. Last month, however, Royal and ALPHV apparently only attacked one healthcare organization between them—ALPHV’s attack on the Pennsylvania-based Lehigh Valley Health Network. Their combined 48 leaked victims last month were across a range of industries, mainly centered around manufacturing, logistics, and services. It just goes to show that just because ransomware is used to target one sector in one month that doesn’t necessarily mean it won’t be used against a different industry in another month.

Ever since we first reported on it in November 2022, witnessing the emergence of the Play ransomware gang over the months has been one of those “Aw, they grow up so fast (and evil)” type of situations. After their surge in December activity fell by about 76 percent in January, it made something of a comeback last month with 11 known victims, including the City of Oakland, where an attack shutdown many of the city’s services. In fact, the situation was so bad in Oakland that the Interim City Administrator declared a state of emergency shortly afterwards.

New ransomware groups

Medusa

Not since we introduced Royal ransomware in November 2022 have we seen a new gang burst onto the scene with as much activity as Medusa did in February. The group published 20 victims on its leak site, making it the third most active ransomware last month. Among its victims are Tonga Communications Corporation (TCC), a state-owned telecommunications company, and oil and gas regulator company PetroChina Indonesia.

The Medusa leak site
The Medusa leak site

V is Vendetta

V is Vendetta is a newcomer that published three victims in February on a site that follows the not-so-new practice of branding itself with imagery ripped from a particular mid-2000s dystopian action film. The site is noteworthy not only for its awful “teenager’s bedroom” design but also for using a subdomain of the Cuba ransomware dark web site.

The V is Vendetta leak site
The V is Vendetta leak site

DPRK’s ransomware antics

In early February, CISA released an alert highlighting the continuous state-sponsored ransomware activities by the Democratic People’s Republic of Korea (DPRK) against organizations in the US healthcare sector and other vital infrastructure sectors.

The agencies have reason to believe cryptocurrency ransom payments from such operations support DPRK’s “national-level priorities and objectives.” The report states:

The authoring agencies assess that an unspecified amount of revenue from these cryptocurrency operations supports DPRK national-level priorities and objectives, including cyber operations targeting the United States and South Korea governments—specific targets include Department of Defense Information Networks and Defense Industrial Base member networks,

In the last few years, two new ransomware strains from DPRK have surfaced: Maui and H0lyGh0st.

US Marshal Service ransomware attack

It seems ransomware attackers are going after the big fish again.

At least, it’s been a while since a federal agency like the US Marshals Service (USMS) was hit with ransomware. In late February 2023 a threat actor managed to infiltrate the agency and to get hold of sensitive information about staff and fugitives.

It’s far from rare to see a ransomware attack on governments, to be sure. State, Local, Tribal, and Territorial (SLTT) governments were hammered by ransomware throughout 2022. Attacks on the federal government, however, remain few and far between.

If there’s one thing this attack taught us, it’s that no organization is safe from ransomware—but that’s not all. It’s also the most eye-catching attack on the fabric of the US since the Colonial Pipeline attack by the DarkSide ransomware gang. There is no word about who is responsible for the attack or whether or not there has been a ransom demand.

If this is the work of a regular ransomware gang rather than a political statement, it’s a surprise that they’re this bold (or frankly, stupid, for thinking the federal government would ever pay them). Attacking a federal government paints a huge target on their backs.

We know there have been times where affiliates of ransomware gangs go rogue and attack an organization that’s off-limits according to the gangs’ rules—but until more information is released, many details about the USMS breach remain speculative.

How to avoid ransomware

  • Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; disable or harden remote access like RDP and VPNs; use endpoint security software that can detect exploits and malware used to deliver ransomware.
  • Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware.
  • Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.
  • Write an incident response plan. The period after a ransomware attack can be chaotic. Make a plan that outlines how you’ll isolate an outbreak, communicate with stakeholders, and restore your systems.

Our Ransomware Emergency Kit contains the information you need to defend against ransomware-as-a-service (RaaS) gangs.

GET THE RANSOMWARE EMERGENCY KIT


[ad_2]
Source link

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro

0
[ad_1]

The Xiaomi 13 Pro launched, and it’s ready to compete with the best devices out there. Apple’s crown jewel, the iPhone 14 Pro Max, is considered to be one of those, and one of the most popular high-end phones generally. Therefore, we’re here to compare the Apple iPhone 14 Pro Max vs Xiaomi 13 Pro. These two phones do differ in so many ways, and that should make for an interesting comparison.

We’ll first list their spec sheets, as we usually do when it comes to comparisons. Following that, we’ll compare the two devices across a number of categories, including design, display, performance, battery, cameras, and audio. This will, hopefully, help you make a purchasing decision. So, let’s get started.

Specs

Apple iPhone 14 Pro MaxXiaomi 13 Pro
Screen size6.7-inch LTPO Super Retina XDR OLED display (flat, 120Hz refresh rate, 200 nits peak brightness)6.73-inch QHD+ LTPO AMOLED display (curved, 120Hz adaptive refresh rate, 1,900 nits peak brightness)
Screen resolution2796 x 12903200 x 1440
SoCApple A16 BionicQualcomm Snapdragon 8 Gen 2
RAM6GB12GB (LPDDR5X)
Storage128GB, 256GB, 512GB, 1TB, non-expandable256GB/512GB, non-expandable (UFS 4.0)
Rear cameras48MP (f/1.8 aperture, wide-angle, 1.22um pixel size, sensor-shift OIS, dual pixel PDAF)
12MP (ultrawide, f/2.2 aperture, 13mm, 120-degree FoV, 1.4um pixel size, dual pixel PDAF)
12MP (telephoto, f/2.8 aperture, 77mm lens, PDAF, OIS, 3x optical zoom)
50.3MP (Sony’s IMX989 1-inch sensor, f/1.9 aperture, 1.6um pixel size, Dual Pixel PDAF, OIS)
50MP (ultrawide, f/2.2 aperture, 14mm lens, 115-degree FoV)
50 MP (telephoto, 3.2x optical zoom, f/2.0 aperture, PDAF)
Leica
Front cameras12MP (wide-angle, f/1.9 aperture, 23mm lens, PDAF)
SL 3D (depth/biometrics sensor)
32MP
Battery4,323mAh, non-removable, 23W wired charging, 15W MagSafe wireless charging, 7.5W Qi wireless charging, 5W reverse wireless charging
Charger not included
4,820mAh, non-removable, 12W wired charging, 50W wireless charging, 10W reverse wireless charging
Charger included
Dimensions160.7 x 77.6 x 7.9mm162.9 x 74.6 x 8.7mm
Weight240 grams229 grams
Connectivity5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, Lightning port5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C
SecurityAdvanced facial scanningIn-display fingerprint scanner (optical)
OSiOS 16Android 13
MIUI 14
Price$1,099€1,299/TBA
BuyAppleXiaomi

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro: Design

The Apple iPhone 14 Pro Max and Xiaomi 13 Pro sure do look different, and also feel different in the hand. The iPhone 14 Pro Max has flat sides, all of them. That includes its display too. The phone is made out of stainless steel and glass. The Xiaomi 13 Pro has a lot of curves, on the other hand. Even its display is slightly curved towards the sides. The device is made out of aluminum and ceramic, at least the global model is.

Apple’s flagship is slightly shorter, but noticeably wider than the Xiaomi 13 Pro. It is also slightly thinner in comparison. It weighs 240 grams, while the Xiaomi 13 Pro weighs 229 grams (ceramic model). We’ll refer to the ceramic model throughout this comparison, as that is the only variant that launched globally. The iPhone 14 Pro Max has uniform bezels, and a pill-shaped cutout on the front. The Xiaomi 13 Pro has extremely thin bezels, and a centered display camera hole.

If we flip the two phones around, you’ll see considerably different designs on the back. Both of them have display camera islands in the top-left corner, but they do look fairly different. Both phones do include three cameras on the back, though. The iPhone 14 Pro Max is a bit more annoying to use with one hand due to its width, and the fact it cuts into your hand due to its flat bottom and weight. The Xiaomi 13 Pro is not easy to use with one hand either, as it’s also quite large. Both phones are quite slippery, so the usage of a case is recommended.

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro: Display

The iPhone 14 Pro Max includes a 6.7-inch 2796 x 1290 LTPO Super Retina XDR OLED display. This panel is flat, and it supports an adaptive refresh rate of up to 120Hz. It supports HDR10 content, and also has Dolby Vision support. It can reach a maximum brightness of 2,000 nits in direct sunlight. The display aspect ratio here is 19.5:9, and the panel is protected by the Ceramic Shield glass.

AH Xiaomi 13 Pro KL image 13

The Xiaomi 13 Pro, on the other hand, has a 6.73-inch QHD+ (3200 x 1440) LTPO AMOLED display. This display is curved, and it supports up to 1 billion colors. It has an adaptive refresh rate of up to 120Hz, and Dolby Vision support as well. This panel also gets immensely bright at 1,900 nits of peak brightness. The display aspect ratio here is 20:9, and the panel is protected by the Gorilla Glass Victus.

Both of these phones have top-of-the-line displays. They’re immensely sharp, vivid, and have great viewing angles. On top of that, they’re really fluid, and get more than bright enough. Even in direct sunlight, both displays should get bright enough for you to be able to easily see what’s on them. These are some of the brightest offerings out there. They’re both also well-protected. You can’t go wrong here, just note that one is flat, and the other is curved.

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro: Performance

The iPhone 14 Pro Max is fueled by the Apple A16 Bionic SoC. That is Apple’s 4nm flagship processor. The phone is also equipped with 6GB of RAM, and NVMe storage. The Xiaomi 13 Pro comes with the Snapdragon 8 Gen 2 SoC, the best processor Qualcomm has to offer. The phone is equipped with 12GB of LPDDR5X RAM and UFS 4.0 flash storage. Xiaomi’s flagship has more powerful RAM and storage, while both SoCs are outstanding.

What does this mean for regular, day-to-day performance. It means that you’ll get an immensely fluid phone, regardless of what you do, basically. Getting them to slow down is not an easy task. They glide through browsing, consuming multimedia, image editing, messaging, and so much more. Even games are not a problem for either of the two phones, which is to be expected. Even the most powerful games out there run very nicely on both smartphones. They do get warm during intense gaming sessions, but we did not notice a performance drop-off or anything of the sort.

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro: Battery

Apple’s flagship comes with a 4,323mAh battery, while the Xiaomi 13 Pro has a 4,820mAh unit. Do note that iOS devices usually come with smaller batteries, but that doesn’t mean they offer worse battery life. What’s the case here, though? Well, both smartphones offer excellent battery life, but the iPhone 14 Pro Max does have the edge. Apple improved its battery life since its launch, actually.

Getting to an 8-hour screen-on-time mark with both phones is doable, while the iPhone 14 Pro Max usually lasts a bit longer than that. The Xiaomi 13 Pro sometimes fell under that mark for us, though. Your mileage will, of course, differ, maybe even considerably. Your installed apps will be different, and so will your usage and signal where you live. There are simply too many factors. The point is, both phones deliver really good battery life.

When it comes to charging, the Xiaomi 13 Pro dwarfs the iPhone 14 Pro Max. Not only does it come with a 120W charger in the box, but it supports 120W wired charging. It also supports 50W wireless charging, and 10W reverse wireless charging. The iPhone 14 Pro Max doesn’t have a charger in the box, and it supports 20W wired, 15W MagSafe wireless, and 7.5W Qi wireless charging.

Apple iPhone 14 Pro Max vs Xiaomi 13 Pro: Cameras

The iPhone 14 Pro Max has a 48-megapixel main camera, a 12-megapixel ultrawide unit (120-degree FoV), and a 12-megapixel telephoto camera (3x optical zoom). The Xiaomi 13 Pro, on the other hand, comes with a 50.3-megapixel main camera (1-inch sensor), a 50-megapixel ultrawide camera (115-degree FoV), and a 50-megapixel telephoto camera (3.2x optical zoom). Xiaomi’s flagship also has Leica lenses on all three cameras.

AH Xiaomi 13 Pro KL image 22

So, how do they compare? Well, they both shoot great photos, but completely different ones. The iPhone 14 Pro Max tries to keep things closer to real life in terms of looks. The Xiaomi 13 Pro has that Leica image style and two shooting styles you can choose from. It offers Leica Vibrant and Leica Authentic modes. The Leica Vibrant is what most people will prefer, as the colors get emphasized a bit more.

They both provide really detailed photos, though the ones from the Xiaomi 13 Pro look a bit more moody, in lack of a better word. That especially goes for low light images. They also look more like they were taken with professional cameras due to the natural, creamy bokeh. The dynamic range is good on both, but they both struggle with white balance from time to time. It could end up being fixed soon, though, via an update. They both do a great job with macro photography, while the Xiaomi 13 Pro shines when it comes to portrait images taken with the telephoto camera.

Both phones do a good job when it comes to ultrawide shots, and they keep the color science close to what the main cameras offer. The video recording is better on the iPhone 14 Pro Max, but the Xiaomi 13 Pro does a great job too. It’s all a matter of preference when it comes to these cameras, both phones do a great job.

Audio

There is a pair of stereo speakers on both of these smartphones. Those speakers are very good on both phones. They’re more than loud enough, and they’re also detailed. The distortion is not exactly noticeable.

There is no audio jack on either phone, though. You’ll need to utilize the Type-C port, which is located at the bottom of both phones. If you prefer a wireless connection, however, Bluetooth 5.3 is on offer on both devices.


[ad_2]
Source link

Google Universal Speech Model aims to build a 1,000-language AI model

0
[ad_1]

To step up its growth in the AI industry, Google is improving its Universal Speech Model. Currently, the company is working on adding over 1,000 languages to its AI models. This will help to diversify the usage of these models, making them available globally regardless of the language barrier.

Google has been working on this AI model for quite a while and will soon unveil it to the public. This product will be unveiled during the Google I/O event that will take place in a few months. The Universal Speech Model will aid Google to achieve its goal in the artificial intelligence industry.

Already, some Google products are making use of this AI model. Improvements to this product are ongoing to make it available for use in other apps and services. More information regarding this product is available to the public ahead of its unveiling.

More information on the Google Universal Speech Model

With the growing competition in the AI industry, there is a need for the competition to evolve. Major players like Google and Microsoft are constantly improving their AI models to better serve their customers. The Universal Speech Model is Google’s response to the competition, and it looks to improve its services.

Google recently shared some information on this AI language model. According to the company, this model is a “critical first step” to help them achieve their goals in the AI industry. One remarkable part of this system is that it will support over 1,000 languages spoken around the world.

Through training, this AI system is effective in handling lots of languages. Currently, the Universal Speech Model can operate in over 100 languages. Google is now working to expand its reach to cover more languages.

YouTube is one app that currently puts the Google Universal Speech Model to good use. It does this via automatic speech recognition and translation, which works with different languages. Other core Google apps also make use of this AI language model for speech-related tasks.

The Universal Speech Model is undergoing improvement, some of which will be made public at the Google I/O event. This language model will help reshape how the public relates to artificial intelligence. More information on this AI model will be available after the Google I/O event.


[ad_2]
Source link