India’s Largest Truck Brokerage Company Leaking 140GB of Data

0
[ad_1]

The misconfigured server is still exposing the data, and there has been no response from the company since their only contact email address available to the public is bouncing back all emails.

India’s largest truck brokerage and freight delivery company, FR8, is facing a serious data leak problem. According to the IT security researcher Anurag Sen working with Italian cyber security firm FlashStart, the organization has exposed more than 140 gigabytes of data, which is available to the public without any password or security authentication.

According to Hackread.com, the leaked data includes sensitive information such as customer records, invoices, and payment details across India. Not only that, but it also contains other personal information, such as names, addresses, and contact numbers of both customers and employees.

FR8 claims to be “India’s largest truck transport service company,” currently operating in over 60 cities across the country.

Anurag discovered the server on Shodan while searching for misconfigured cloud databases on January 30th, 2023. The researchers informed FR8 about the leak, but they did not receive any response. Their only contact email address available to the public is bouncing back all emails.

For your information, Shodan is an OSINT tool and a specialized search engine used by cybersecurity researchers to locate vulnerable Internet of Things (IoT) devices, including servers and misconfigured databases on the internet.

As for FR8, what is worse, at the time of writing, the server is still live and is exposing the following details:

  • Full name
  • Mobile number
  • Internal document
  • Delivery Full address
  • Bank payment details
  • Delivery Vehicle Details
  • Internal employee details
India's Largest Truck Brokerage Company Leaking 140GB of Data

India has a server misconfiguration issue

With a population of over 1.4 billion people, India is a lucrative place for businesses to invest and for cybercriminals to target. The more investment there is, the more widespread and vulnerable the IT infrastructure becomes.

Just a couple of weeks ago, Hackread.com exclusively reported on how an Enterprise Resource Planning (ERP) software provider had exposed half a million Indian job seekers’ data.

Last year, several top data exposure-related incidents involving tens of millions of victims were reported from India. These included Covid antigen test resultsIndian Federal Police and banking recordsMyEasyDocs, online packaging marketplace Bizongo, and more.

Impact

Since the server is live and there has been no response from the company, the chances of misuse and abuse of data are high if it gets into the hands of a third party with malicious intent.

While the data can be exploited to carry out identity theft-related fraud, hackers can hold the company’s server or data for ransom and leak it on cybercrime forums if their demands are not met.

Misconfigured Databases – Threat to Privacy

As we know, misconfigured or unsecured databases have become a major privacy threat to companies and unsuspecting users. In 2020, researchers identified over 10,000 unsecured databases that exposed more than 10 billion (10,463,315,645) records to public access without any security authentication.

In 2021, the number of exposed databases increased to 399,200. The top 10 countries with the most database leaks due to misconfiguration in 2021 included the following:

  • USA – 93,685 databases
  • China – 54,764 databases
  • Germany – 11,177 databases
  • France – 9,723 databases
  • India – 6,545 databases
  • Singapore – 5,882 databases
  • Hong Kong – 5,563 databases
  • Russia – 5,493 databases
  • Japan – 4,427 databases
  • Italy – 4,242 databases
  1. Hackers selling 13TB of Domino’s India data
  2. Hackers leak millions of Airtel India user data
  3. Hackers leak 9 million Indian job seekers’ data
  4. Hacker claims to steal 8.2TB of MobiKwik data
  5. India’s COVID-19 surveillance tool leaked user data

[ad_2]
Source link

Consent to gather data is a misguided solution, study reveals

0
[ad_1]

There’s a flaw in the notice-of-consent approach, and this is evident in the stark gap in knowledge noted by a recent study by the Annenberg School for Communication in Pennsylvania.

When researchers from the University of Pennsylvania’s Annenberg School for Communication conducted a survey to see if “informed consent” practices are working online with regard to user data gathering, the results revealed weaknesses in a framework that, for decades, has served as the basis for online privacy regulation in the US. This framework, which is commonly known as “notice of consent,” usually allows organizations to freely collect, use, keep, share, and sell customer data provided they inform them about their data-gathering practices and get their consent. However, as the New York Times noted, the survey results add another voice to “a growing body of research suggesting that the notice-of-consent approach has become obsolete.”

“Informed consent is a myth”

The report, entitled “Americans Can’t Consent to Companies’ Use of Their Data,” contains the results, expert analyses, and interpretation of survey results. The authors not only give attention to the gap in American users’ knowledge of how companies use their data but also reveal their deep concern about the consequences of its use yet feel powerlessness in protecting it. Believing they have no control over their data and that trying would be pointless is what the authors call “resignation,” a concept they introduced in 2015 in the paper, “The Tradeoff Fallacy.”

As the Annenberg School report said:

“High percentages of Americans don’t know, admit they don’t know, and believe they can’t do anything about basic practices and policies around companies’ use of people’s data.”

The authors define genuine consent as people having “knowledge about commercial data-extraction practices as well as a belief they can do something about them.” The survey finds that Americans have neither.

“We find that informed consent at scale is a myth, and we urge policymakers to act with that in mind,” the report said.

The New York Times noted a handful of regulators agreeing to the report’s findings.

“When faced with technologies that are increasingly critical for navigating modern life, users often lack a real set of alternatives and cannot reasonably forgo using these tools,” said Lina M. Khan, a chairperson of the Federal Trade Commission, in a speech last year.

Digital consent has had critics as early as 1999, denoting that its weakness remained unaddressed for almost 25 years. Paul Schwartz, a professor at the University of California and author of the paper “Privacy and Democracy in Cyberspace,” had warned that consent that was given via privacy policy notices was “unlikely to be either informed or voluntarily given.” The notices were “meaningless,” he said, as most people ignore them, were written in a vague and legalistic language that very few people understand, and “fail to present meaningful opportunities for individual choice.”

Neil Richards and Woodrow Hartzog, authors of the paper “The Pathologies of Digital Consent,” give strength to this argument by recognizing a form of consent they call “unwitting consent,” which occurs when people do not really understand “the legal agreement,” “the technology being agreed to,” and “the practical consequences or risks of agreement.” Previous work of two of the authors of the study also shows people misunderstanding and confusing the meaning behind the term “privacy policy,” believing it is a promise that the company asking for consent will protect the privacy of the one giving consent.

Robert Levine’s argument is also in parallel with Richards and Hartzog. He expressed that people must have understanding and autonomy before they can make informed choices. That said, a person must understand corporate practices and policies (including legal protection), surrounding the data that companies want to gather about users. A person must also believe that companies will give them the freedom to decide whether to give up their data and when, Levine said. If one of these isn’t satisfied, the consent to data collection “is involuntary, not free, and illegitimate.”

‘F’ for Fail

The study presupposes that in order to give consent, US consumers must satisfy two things: they must be informed about what is going to happen to their data, and they must have the ability to give (or withdraw) consent. To test these, 2,000 US survey participants are provided a set of 17 basic true/false questions about internet practices and policies. They can also answer “I don’t know,” the median option.

The overall survey results are worrying.

A majority (77 percent) of survey takers got nine or fewer correct answers out of 17 questions, which could be interpreted as an ‘F’ grade. Only one participant got an ‘A’ grade, scoring 16 correct answers. Below are the most notable insights from the results:

* Only around 1 in 3 Americans know it is legal for an online store to charge people different prices depending on where they are located.

* More than 8 in 10 Americans believe, incorrectly, that the federal Health Insurance Portability and Accountability Act (HIPAA) stops apps from selling data collected about app users’ health to marketers.

* Fewer than one in three Americans know that price-comparison travel sites such as Expedia or Orbitz are not obligated to display the lowest airline prices.

* Fewer than half of Americans know that Facebook’s user privacy settings allow users to limit some of the information about them shared with advertisers.

Furthermore, 80 percent of Americans believe Congress must act urgently to regulate how companies use personal information. Joseph Turow, one of the authors of the study, worries though that the longer the government waits to enforce change, the more difficult it will be to control user data.

“For about 30 years, big companies have been allowed to shape a whole environment for us, essentially without our permission,” Turow said. “And 30 years from now, it might be too late to say, ‘This is totally unacceptable.'”


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


[ad_2]
Source link

Samsung Galaxy S23 vs Google Pixel 7

0
[ad_1]

If you find the Galaxy S23 Ultra and Pixel 7 Pro to be too big for your liking, luckily they have smaller siblings. In this article, we’ll compare the Samsung Galaxy S23 vs Google Pixel 7. These are also flagship-grade smartphones, even though they are technically inferior to their larger siblings. To those of you who prefer more compact devices, these may be ideal alternatives, though.

As per usual, we’ll first list the spec sheets of the two smartphones, and will then move on to compare them across a number of categories. We’ll first compare their designs, and will then move on to displays, performance, battery life, cameras, and audio performance. There is a lot to talk about here, so… let’s get started.

Specs

Samsung Galaxy S23Google Pixel 7
Screen size6.1-inch fullHD+ flat AMOLED display (120Hz refresh rate, 1,750 nits peak brightness)6.3-inch fullHD+ flat AMOLED display (90Hz refresh rate, 1,400 nits peak brightness)
Screen resolution2340 x 10802400 x 1080
SoCQualcomm Snapdragon 8 Gen 2Google Tensor G2
RAM8GB (LPDDR5X)8GB (LPDDR5)
Storage128GB (UFS 3.1)/256GB (UFS 4.0)/512GB (UFS 4.0), non-expandable128GB/256GB, non-expandable (UFS 3.1)
Rear cameras50MP (f/1.8 aperture, 24mm lens, 1.0um pixel size, OIS, Dual Pixel PDAF)
12MP (ultrawide, f/2.2 aperture, 13mm lens, 120-degree FoV, 1.4um pixel size)
10MP (telephoto, f/2.4 aperture, 70mm lens, 1.0um pixel size, OIS, 3x optical zoom, PDAF)
50MP (Samsung ISOCELL GN1 sensor, 1.2um pixel size, f/1.85 aperture, 82-degree FoV, Super Res Zoom up to 8x)
12MP (ultrawide, 1.25um pixel size, f/2.2 aperture, 114-degree FoV, lens correction)
Front cameras12MP (f/2.2 aperture, 26mm lens, Dual Pixel PDAF)10.8MP (1.22um pixel size, f/2.2 aperture, 92.8-degree FoV, Fixed Focus)
Battery3,900mAh, non-removable, 25W wired charging, 15W wireless charging (Qi/PMA), reverse wireless charging
Charger not included
4,355mAh, non-removable, 21W wired charging, 23W wireless charging, reverse wireless charging
Charger not included
Dimensions146.3 x 70.9 x 7.6mm155.6 x 73.2 x 8.7mm
Weight168 grams197 grams
Connectivity5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.2, Wi-Fi, USB Type-C
SecurityIn-display fingerprint scanner (ultrasonic)Face Unlock
In-display fingerprint scanner (optical)
OSAndroid 13
One UI 5.1
Android 13
Price$799/$849/TBA$599/$699
BuySamsungGoogle

Samsung Galaxy S23 vs Google Pixel 7: Design

Both of these phones are made out of aluminum and glass, though they both look and feel different. The Galaxy S23 has more rounded corners, and is actually considerably more compact than the Pixel 7. It is almost 10mm shorter, and over 2mm narrower than the Pixel 7. It’s also about a millimeter thinner. Unsurprisingly, the Galaxy S23 also weighs less at 168 grams, compared to 197 grams. None of that is surprising, as the Pixel 7 does include a noticeably larger display.

Both smartphones have flat displays, and a centered display camera hole. The bezels are quite thin on both phones, but the Galaxy S23 has uniform bezels, unlike Google’s phone. If we flip them around, you’ll notice that their camera modules look considerably different. The Galaxy S23 has three cameras in the top-left corner, which are vertically-aligned. These cameras protrude directly from the backplate. The Pixel 7, on the other hand, has a large camera strip on the back, which is covered by aluminum, and hides two cameras on the inside.

Both of these smartphones are quite slippery, so using a case may be a good idea. They do feel quite premium in the hand, though. The Galaxy S23 is much easier to use with one hand, due to its smaller footprint. Both smartphones do offer IP68 certification for water and dust resistance. That will give you some peace of mind, that’s for sure.

Samsung Galaxy S23 vs Google Pixel 7: Display

The Samsung Galaxy S23 features a 6.1-inch fullHD+ (2340 x 1080) Dynamic AMOLED 2X display. That panel is flat, and it offers a 120Hz refresh rate. It supports HDR10+ content, and it also gets quite bright at 1,750 nits of peak brightness. This panel has a 19.5:9 aspect ratio, and it is protected by the Gorilla Glass Victus 2. The screen-to-body ratio is higher here than on the Pixel 7.

google pixel 7 AM AH 10 1

The Google Pixel 7, on the other hand, has a 6.3-inch fullHD+ (2400 x 1080) AMOLED display. This panel is also flat, and it offers a 90Hz refresh rate. It also supports HDR10+ content, and gets up to 1,400 nits of peak brightness. We’re looking at a 20:9 display aspect ratio here, and the Pixel 7’s panel is protected by the Gorilla Glass Victus.

So, the Galaxy S23’s display does look better on paper, and it actually is in real life. The vast majority of you really won’t care about the differences, though. Both panels do offer great viewing angles, vivid colors, deep blacks, and are more than sharp enough. The Galaxy S23 does have an edge in smoothness, due to its higher refresh rate, and it also gets noticeably brighter in direct sunlight. Those are two of its major advantages. The touch response is really good on both phones.

Samsung Galaxy S23 vs Google Pixel 7: Performance

The Galaxy S23 is fueled by the Snapdragon 8 Gen 2 SoC in all markets. Samsung opted not to use its Exynos chip this time around. The phone includes 8GB of LPDDR5X RAM, and either UFS 3.1 or 4.0 flash storage. Do note that only the 128GB base storage model has UFS 3.1 storage. The Pixel 7, on the other hand, is fueled by the Google Tensor G2 SoC, Google’s second-gen smartphone chip. The phone comes with 8GB of LPDDR5 RAM and UFS 3.1 storage in both its 128GB and 256GB storage flavors.

When it comes to regular, everyday performance, both phones do a great job. They can open and close apps really fast, the same goes for multitasking. They’re great for browsing, consuming multimedia, and various other actions. They’re buttery smooth in all those aspects. The differences do become obvious when it comes to gaming, though. The Galaxy S23 is the better phone for gaming out of the two. The Pixel 7’s Tensor G2 chip is not made for gaming, and Google never claimed it will. It will do good with most games, but if you fire up the most demanding games you can find, it may struggle.

Samsung Galaxy S23 vs Google Pixel 7: Battery

The Samsung Galaxy S23 sports a 3,900mAh battery on the inside. The Pixel 7, on the flip side, has a 4,355mAh battery. So, how do they compare, battery-wise? Well, first and foremost, the Galaxy S23 does offer considerably better battery life than the Galaxy S22, which was really bad in that regard. It’s around 25% better, if we had to give you a ballpark improvement. It’s not yet as good as some other flagship phones are, but it will be more than good enough for most people.

You should be able to get over 5 hours of screen-on-time on the Galaxy S23 (maybe even considerably more), though that will all depend on your usage, what apps you have installed, location, and so on. The Pixel 7 does include a larger battery, and combined with its chip and lower screen refresh rate, it does manage to offer more in the battery department. Getting around 6-7 hours of screen-on-time is possible with the Pixel 7. Even more than that, at times. Your mileage may vary, of course.

When charging is concerned, they both offer both wired and wireless charging. The Galaxy S23 supports 25W wired, 15W wireless, and 4.5W reverse wireless charging. The Pixel 7 supports 20W wired, 20W wireless, and 5W reverse wireless charging. Do note that both smartphones come without a charger in the box, though.

Samsung Galaxy S23 vs Google Pixel 7: Cameras

The Samsung Galaxy S23 features three cameras on the back. It includes a 50-megapixel main camera, a 12-megapixel ultrawide unit, and a 10-megapixel telephoto camera. The Pixel 7 has two cameras on the back, a 50-megapixel main unit, and a 12-megapixel ultrawide camera. A 12-megapixel selfie camera sits on the front side of the Galaxy S23, while a 10.8-megapixel unit can be found on the front side of the Pixel 7.

google pixel 7 AM AH 08 1

The camera results these two phones provide are entirely different. The images from the Galaxy S23 are a lot warmer, while the Pixel 7 provides cooler-looking images. The Pixel 7 also offers those contrasty images that we’re used to seeing from Pixel phones in general. Truth be said, the Galaxy S23 camera results are noticeably better than what the Galaxy S22 offered. The images are sharper, and balanced better at the same time. The Pixel 7 is still the king of dynamic range, though.

The same can be said for both daylight and nighttime images, you’ll notice the difference in color temperature, but both phones do a great job. I’d still take the Pixel 7 for still, mainly due to the overall look of Pixel images, excellent dynamic range, and the way the phone makes those sunset photos look. As I said, though, the Galaxy S23 is a considerable improvement over the Galaxy S22. Depending on the scene, it can beat the Pixel 7, especially if you love those warmer tones. Its images even end up being sharper in low light most of the time, though a bit too yellow at times. The telephoto results are better from the Pixel 7, without a doubt, while the ultrawide camera performance tries to be in line with the main cameras, though it’s a step below in both cases.

Selfies do end up looking a bit more lifelike on the Galaxy S23, and also warmer at the same time. The Pixel 7 provides more contrasty selfies, so in line with the rear cameras, actually. The video performance is good on both devices, but also quite different. It all depends on what you prefer, but both provide good, stable shots.

Audio

Both the Galaxy S23 and Pixel 7 include a set of stereo speakers. What they do not have is an audio jack. Those speakers sound good on both phones, as good as you’d expect. There are better speakers out there for sure, but these do get both loud enough and detailed enough. Not many people will have complaints.

When it comes to headphones, you can either hook them up with a Type-C port on either phone, or utilize Bluetooth. The Galaxy S23 is equipped with Bluetooth 5.3, while the Pixel 7 includes Bluetooth 5.2 support.


[ad_2]
Source link

Huawei Dynamic Island feature might launch with the Nova 11 series

0
[ad_1]

Apple set a trend with Dynamic Island, and Huawei might borrow this idea. The Chinese tech giant might be working on its own Dynamic Island feature. This is said to be a bit different from that which Apple debuted with the iPhone 14 Pro series.

Regardless, it is obvious that Huawei is going to take inspiration from the iPhone 14 Pro series. This inspiration will help them develop their version of the Dynamic Island feature. But what are the details regarding this coming feature that is coming to Huawei devices?

Apple’s iPhone 14 Pro series will inspire the Huawei Dynamic Island feature

After years of sticking to the notch design, Apple finally decided to try something new. With their iPhone 14 Pro series launched last year, the company introduced what they call Dynamic Island. This feature adds functions (media controls, notifications, and so much more) to the center pill front-facing camera cutout.

After Apple released this feature, other smartphone manufacturing companies like Xiaomi and Honor adopted the pill-shaped center selfie camera cutout. But none of these companies added any functions to the pill-shaped cutout. Now, Huawei is stepping up to introduce its own Dynamic Island feature.

According to the available reports, this feature will make an appearance with the Nova 11 series. Some devices in this series from Huawei will use a pill-shaped selfie camera cutout. Since this series will run on HarmonyOS it will be easy for Huawei to integrate features into the pill-shaped selfie camera cutout.

In-depth details on this coming feature are not available at this moment. But the Huawei Nova 11 series is expected to launch in the coming months. Asides from the Huawei Dynamic Island feature, this series might also spot the XMAGE photography system. Details on this device will become available as its launch date draws closer.

Once available, this feature will attract lots of attention from the smartphone community. Other brands might also adopt the Dynamic Island feature on their devices. One company that might give this feature a try is Xiaomi with their coming flagship series.


[ad_2]
Source link

WhatsApp adds new features to your status updates

0
[ad_1]

Although an app with a very large and broad user base, WhatsApp can still leave a lot to be desired when it comes to its features. Competing apps such as Signal and Telegram have, for years, outshined the Meta-owned application in that respect; However, WhatsApp is now stepping things up and adding a set of new features to the status section.

WhatsApp announced via a blog post that the company will be adding more options to the status section of the app, which is often used to convey fleeting information with friends and close contacts. These statuses are available for 24 hours and can contain a variety of media, including photos, videos, animated GIFs, etc. Here’s a summary of the new features you can expect:
  • Private Audience Selector: Every status update you post might not be appropriate for all of your contacts all of the time, so WhatsApp will now have the ability to update your privacy settings on a per-status basis so that you can choose who sees each new version of the status that you post. The audience that you most recently selected will be remembered and used as the default for your subsequent status update.
  • Voice Status: You will soon be able to record and share voice messages on WhatsApp status that are up to 30 seconds long. Voice status allows for the sending of more personal updates, which is especially useful if you find that expressing yourself verbally rather than through typing is more comfortable for you.
  • Status Reactions: You can now respond to any status in a flash by swiping up and selecting one of eight different emojis from the menu that appears. It goes without saying that you can still respond to a status update with a text message, voice message, stickers, or any number of other options. Status reactions have been one of the most requested features since the debut of Reactions a year ago. 
  • Status Profile Rings for New Updates: When a contact of yours shares an update to their status, a ring will appear around their profile picture. This will be viewable in the chat lists, the participant lists for groups, as well as the contact information, thus making it easier to never miss a status update from a friend or family member again.
  • Link Previews on Status: When you send a message or post a link on your status, you will now see an automatic visual preview of the message or link’s content, just as you do when you send a message. Visual previews not only improve the appearance of your status updates but also provide your contacts with a clearer picture of the content of the link before they choose to click on it.
These updates have begun to be made available to users all over the world, and they will be accessible to absolutely everyone in the coming weeks. As usual, just like your personal chats and calls, your WhatsApp status is protected by end-to-end encryption so that you can share in a private manner without compromising your safety.

[ad_2]
Source link

Hackers Aim at Crypto Wallets with Hacked Namecheap Phishing Emails

0
[ad_1]

Namecheap users should remain cautious, as hackers are using its inbox to scam users through phishing emails designed to appear as if they were sent from DHL or MetaMask cryptocurrency hot wallet.

For your information, Namecheap is a popular domain name registrar with more than 15 million domains issued thus far.

According to the company, the incident may have occurred due to a supplier-related issue. Namecheap released its official statement regarding the hack on Sunday, confirming that its upstream system was abused to send out malicious emails.

This means a third party is involved in “mailing unsolicited emails to our clients.” “As a result, some unauthorized emails might have been received by you,” the statement read.

The DHL emails inform the recipient that they need to pay a delivery fee for receiving their parcel, whereas the MetaMask email urges the recipient to complete the Know-Your-Customer (KYC) process. The email then warns victims that if the due process is not completed, they may lose access to their wallets.

Namecheap Watch: Hackers Targeting Employees with DHL Phishing
Screenshot of the phishing email shared by a Twitter user @h4x0r_dz

MetaMask took to Twitter to ensure that it doesn’t collect KYC information and would never send an email to get details of its users’ accounts. Hence, the company suggested that users shouldn’t enter the Secret Recovery Phrase on any website server and ignore any emails from Namecheap or MetaMask.

Namecheap assured its customers that its internal systems weren’t breached and that their personal information and account-related data were secure. However, the company has urged customers to avoid clicking on any links.

The company stated that it has temporarily suspended all emails. This includes emails delivering authentication codes, password resetting, and verifying trusted devices.

“We are glad to let you know that the mail delivery has been restored, so you should receive emails from Namecheap as usual from now on,” Namecheap CEO, Richard Kirkendall, confirmed. However, the CEO didn’t name the upstream system that was compromised. 

Speculation is rife that it could be SendGrid’s email delivery service. However, it is worth noting that the third party has denied being compromised. Twilio, which owns SendGrid and got hacked last year, said that the incident isn’t a result of a compromise of the Twilio network, but they are investigating it and will provide additional details over time.

  1. PayPal Notifies 35,000 Users of Data Breach
  2. Geo Targetly URL Shortener Abused in Phishing Scam
  3. Reddit Hacked After Employee Bites on Phishing Scam
  4. Sophisticated SMS Phishing scam Dupes Zendesk Staff
  5. Scammers Using Microsoft Team GIFs in Phishing Scam

[ad_2]
Source link

Proof that the tablet is not dead

0
[ad_1]

The tablet market is in a really tough spot now, and that leads people to think that manufacturers have put less effort into their tablets. While the market is overrun with cheapo tablets you can get at Walmart, companies like Samsung and Apple continue to pour heart and soul into producing their flagship tablets. However, it’s not just about them. Lenovo also makes its line of premium tablets.

Android Headlines had the opportunity to review the Lenovo Tab P11 Pro. This is a premium tablet from Lenovo, and it promises to bring a top-notch Android tablet experience. Is this tablet worthy competition to the likes of Samsung and Apple, or does it fall flat? Let’s find out in this review.

Lenovo Tab P11 Pro: Build quality and design

When you pick up this tablet, nothing about it screams cheap. Everything from the front panel to the frame is made from high-quality materials. When you grab the device, you know you’re picking up a quality piece of hardware. It’s not extremely heavy, but it does have a decent amount of heft to it, which is reassuring.

Lenovo Tab P11 Pro 9

The tablet has a two-tone glass back panel that feels great to the touch. However, it can be rather slippery. The two-tone glass gives it a nice appearance and is rather elegant. The back of the tablet is pretty bare-bones with a small camera package occupying the top right corner. Other than that, the back is pretty bare-bones with the exception of the Lenovo branding on the top left.

The Lenovo Tab P11 Pro has a thick metal frame that keeps everything together. That frame houses the power and volume buttons, the four speakers, the SIM card tray, the microphones, and the USB-C charging port. It’s a very good-looking tablet, but it does not have a headphone jack, unfortunately.

Overall, this is a very snazzy and sleek-looking device with top-notch build quality. You will not feel like you’re grabbing a cheap device at all.

Lenovo Tab P11 Pro: Display

Moving on to the display, the Lenovo Tab P11 Pro has a nice 11.5-inch display with a resolution of 1600 x 2560. This puts the resolution at above 1440p, and that’s great if you want to watch high-definition content. Along with the pixel density, this display has the benefit of being an OLED display. This means that you’ll get punchier colors than with an LCD display. Also, the contrast is amazing with inky blacks.

I will say that, while the display is nice, it feels a few steps behind that of a Samsung display. Sure, the colors are punchy and it has great contrast, but it’s not much better than that of a high-quality LCD display. For example, it’s quite similar to the LCD display on the Honor Pad 8.

It’s not bad by any stretch of the imagination, but it’s not exactly jaw-dropping. It’s a really good display, and you’ll enjoy watching content on it.

Lenovo Tab P11 Pro 11

One thing the display has going for it is the fluid 120Hz refresh rate. Another good aspect of the display is the brightness. It can get plenty bright, and that means great sunlight visibility. If you happen to take this tablet outside, you’ll have no issue using it in the sun.

The display sits within some appropriately-sized bezels. These give you enough room to place your thumbs without interfering with the screen.

Lenovo Tab P11 Pro: Speakers

If it’s any department that can be better, it’s definitely the speaker department. The Lenovo Tab P11 Pro comes with a set of four speakers, and they flank the device when you hold it in landscape mode. For starters, they are definitely loud. They get loud enough to fill a room, so if you’re watching content, you will have no issue hearing it.

However, the quality of the speakers is nothing to write home about. Tablet speakers aren’t quite the replacement for Bluetooth speakers, but they usually come with a fair amount of depth. The speakers on though on the Lenovo Tab P11 Pro don’t have much depth to them. They’re not quite immersive.

Lenovo Tab P11 Pro 7

There is a respectable amount of bass, but it sadly doesn’t add much depth to the sound. Also, the higher frequencies definitely suffer. I say that the speakers are better suited for movies and TV shows. However, when it comes to music, you will definitely hear the lack of speaker quality.

Lenovo Tab P11 Pro: Performance

I had no issues with performance while using this tablet. You’ll be able to fly through the UI smoothly and without any stuttering. Of course, the typical tasks like browsing the web, going through social media, and writing were no issue at all. I have no complaints about the performance.

Gaming

When it comes to gaming, the story is much the same. For starters, 2D games are no problem at all. The tablet ran them all perfectly smoothly. As for 3D games, I also had a pretty good experience. Graphically intensive games such as Sky: Children Of Light ran perfectly. Also, games such as Dragon Ball Legends had no issues.

Lenovo Tab P11 Pro 6

But, what about the big fish? I ran Genshin Impact on this tablet and, the story was not really the same. Using the game’s normal graphic settings, it lagged and stuttered a lot. I had to turn the graphics down to it their lowest settings. After that, the game ran perfectly smoothly. My guess is that the motion blur effect kept it from running smoothly. So, you’ll be able to play most titles smoothly with the exception of the top-tier games.

Lenovo Tab P11 Pro: Battery

The Lenovo Tab P11 Pro has pretty decent battery life for a tablet. I ran it through the battery test which consisted of two hours of video watching, 2 hours of gaming, and 2 hours of social media, and the tablet lasted about 5 hours and 51 minutes before calling it quits. That’s not too bad, especially if you’re going to be using your tablet sparingly. You shouldn’t worry too much about bringing this tablet out for a workday.

If you do need to charge the tablet, you can charge it from 0 to 100% in about 2 hours and 14 minutes. That’s definitely a while, but not too bad when it comes to tablets.

Lenovo Tab P11 Pro: Software

This tablet’s software ss pretty close to stock Android. You have the Material You flare with the round and bubbly aesthetic. The notification shade and quick settings are a mirror image of what you will get on a Pixel Device. However, Lenovo did manage to add its own influence into the software in several locations.

For starters, the wallpaper picker is very different. What’s unfortunate is that you have less customization options for the dynamic theming. Also, the system settings have their own flair as well. If you want a more familiar stock Android aesthetic, this tablet does a fair job of bringing Google’s familiar software aesthetic and mixing it with its own flare.

Lenovo Tab P11 Pro 12

One of the features that stuck out to me was the Productivity Mode. This basically turns the tablet into a desktop computer. It will disable the swipe gestures, and there will be a small task bar at the bottom with your currently open apps, navigation buttons, status bar, and shortcut to access your apps.

Also, when you open an app, it will open as a floating window. This means that you’ll be able to open multiple apps at the same time and use them side-by-side. This is perfect if you’re trying to get serious work done, and it works well on the tablet.

Lenovo Tab P11 Pro: The pen

One of the most spectacular features of this tablet is the stylus support. This puts it in closer competition with the Galaxy Tabs from Samsung. Lenovo provided a Lenovo Precision Pen 3 to test on the tablet, and it works amazingly. It’s not merely a stylus, it’s a connected device. This means that the tablet can detect the pen even when it’s not making contact with the display. Also, there is an action button on the stylus that can perform different tasks.

As for the precision, it’s also top-notch. As you’d expect, this tablet comes with a built-in suite of note-taking applications. Using them, I felt that the pen was extremely accurate. Also, it is pressure-sensitive. This means that if you want to use this tablet for art, you will have a very natural experience.

Lenovo Tab P11 Pro 2

The pen pairs to your tablet and charges by attaching magnetically to the back. And, it does not take long to charge.

Lenovo Tab P11 Pro: Conclusion

Lenovo did a fantastic job with this tablet. Everything from the design to the software just screams quality, and it performs exceptionally well. You will have no issues with this tablet as your work device, especially if you like to draw or sign documents. The screen is really nice, but the speakers could definitely use some work. Also, you should have no issues using this as your main gaming device.

You should buy this tablet if you

  • Want to game on It
  • Want to use it for art
  • Want to use it for business
  • Want a tablet with a quality build
  • When a tablet with a great stylus experience
  • When a tablet with a nice display
  • Want a tablet with a near-stock Android experience

You shouldn’t buy this tablet if you:

  • I want the best audio experience

[ad_2]
Source link

Multiple 0-Day Attacks in The PyPI Packages

0
[ad_1]
PyPI Packages

Recently, the FortiGuard Labs team made a groundbreaking discovery of several new zero-day attacks in the PyPI packages. The source of these attacks was traced back to a malware author known as “Core1337.” This individual had published a number of packages.

Here below we have mentioned the packages that are published by Core1337:-

  • 3m-promo-gen-api
  • Ai-Solver-gen
  • hypixel-coins
  • httpxrequesterv2
  • httpxrequester

Between the 27th of January and the 29th of January 2023, these attacks were published. The recent discovery made by the FortiGuard Labs team revealed that each of the packages published by the malware author “Core1337” had only one version with an empty description. 

However, what was alarming was the fact that all of these packages contained similar malicious code. This raises the question of the level of sophistication and the intentions behind these attacks. 

Technical Analysis of the Packages

First of all, cybersecurity analysts have noticed something that looks like a URL for a webhook in its setup[.]py file:-

  • hxxps://discord[.]com/api/webhooks/1069214746395562004/sejnJnNA3lWgkWC4V86RaFzaiUQ3dIAG958qwAUkLCkYjJ7scZhoa-KkRgBOhQw8Ecqd

There is a similar code in each package’s setup.py file except for the URL of the webhook that is sent from each package. It appears that the URL in question may have a connection to the infamous “Spidey Bot” malware. 

This particular strain of malware is notorious for its ability to pilfer personal information via Discord, as highlighted in a recent blog post by the organization. The blog, entitled “Web3-Essential Package,” delves into the dangers posed by the “Spidey Bot.”

Experts in the field have discovered potential malicious behaviors in a recent static analysis that was conducted by reviewing the setup.py script. During this process, the experts meticulously examined the code and were able to identify several key indicators that point toward malicious intent.

Experts in the field of malware analysis have gained a general understanding of the behavior of a particular strain of malware by carefully examining its primary function. 

According to their findings, this malware may attempt to extract sensitive information from various browsers and the Discord platform and then store it in a file for later exfiltration.

In order to gain a better understanding of the inner workings of this piece of malware, experts have focused their attention on the “getPassw” function. This function is specifically designed to gather user and password information from the browser and then save it to a text file.

The malware has a self-proclaimed title of “Fade Stealer,” which it prominently displays in the form of its name being written at the top of its accompanying text file.

As for its ‘getCookie’ function, the behavior is similar to the one seen in its other functions. Based on the functions of “Kiwi,” “KiwiFile,” and “uploadToAnonfiles,” it appears that the malware is programmed to scan specific directories and select specific file names for the purpose of transferring them through a file-sharing platform:- 

All these packages have one thing in common – they possess similar codes that are created for the purpose of launching attacks. While all these packages may have different names, the underlying intention and code structure is the same, which indicates the work of a single author.

Network Security Checklist – Download Free E-Book


[ad_2]
Source link

Using CISO strategies to prevent threats

0
[ad_1]

Executive summary of CISO

CISOs are under immense pressure to protect their organization and keep them out of the breach headlines. The largest obstacle to this goal is an evolving threat landscape that is increasing in sophistication. Payments from successful ransomware attacks fuel this evolution in the form of ransomware-as-a-service models. To break the trend, this report will explore why CISOs, and their teams can no longer simply react to these threats and must prevent them from occurring in the first place.

When an organization’s cybersecurity tools are reactive solutions, they can leave the organization vulnerable to attack, recovering data and systems is not enough. Threat actors became wise to this recovery tactic and started to exfil sensitive data before launching ransomware within the victim environment. As a result, threatening to release sensitive data is often enough to force the organization to pay the ransom even if they have the ability to recover systems and data.

“Threat actors are always changing and evolving their tactics, and we need to account for that change.” 

Tony Lee

Vice-President,Global Services Technical Operations at BlackBerry

Being quick to react and recover is important, but it is only half of the picture, according to Lee, because of the name-and-shame tactics and the data released by the threat actors.

Ransomware-as-a-service, where threat actors can use already-developed ransomware tools and services to carry out attacks, continues to thrive and enable threat actors to scale like never before. Organizations that may have believed threat actors did not target before are now targets. Organizations (regardless of size) cannot afford to remain reactive and perform monitoring on a nine-to-five basis. Threat actors are working around the clock globally and a company’s defences must do the same.

In fact, the threat of “new ransomware models” was the top concern facing executives in the third quarter of 2021, according to Gartner’s latest Emerging Risks Monitor Report Those surveyed by Gartner said that ransomware was a bigger concern than pandemic related disruptions, including supply-chain issues.

Finally, organizations must be prepared to face an ever-growing cyber space, as well as a huge volume of data and endpoints. While previously it may have been easy to manage a small set of systems it is now imperative that companies are prepared to deal with an explosion in the number and types of endpoints. The rapid growth and prevalence of IoT is not just a risk to home users, but also organizations. Everything from coffee pots to smart car chargers to fish tank thermometers pose a risk to the organization. A preventative approach to solving these issues lies in the technology and strategies CISOs are deploying.

“Moving from a reactive to a preventative security posture is not an easy undertaking.”

Tony Lee

Vice-President, Global Services Technical Operations BlackBerry

By focusing on Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), Managed Detection and Response (MDR) and Managed Extended Detection and Response (XDR) solutions, this report will reveal how CISOs can use the latest cyber security mitigation strategies to deal with this complex and fast-moving threat landscape.

Using managed services to bridge the skills gap

In the face of today’s threats, a preventative strategy should employ 24×7×365 monitoring, threat intel overlay, and continuous threat hunting, all based on AI-powered technology. AI is the force multiplier to help bridge the skills and resources gap making humans more efficient in their jobs. The predictive nature of AI-based EDR and EPP is needed to combat zero-day threats enabling the prevention-first strategy.

It is often a challenge for CISOs to deliver these types of capabilities in-house. Typically, only the largest enterprises with budgets and resources to match have a chance at solving this with in-house only resources. For the rest of the industry, there are managed solutions that are designed to scale using fixed resources.

“Even if budget is not an issue, staffing and time to build are still challenging. In many cases for organizations of all sizes, enlisting the help of an existing MDR or XDR provider is often more cost and time effective than building it yourself,” Lee explains.

Using managed services is by no means a new solution. As Lee explains, the demand for environment visibility via an EDR product is driving customers to see the value, but also realize the challenge in implementing and optimizing such a powerful product.

Also read: Five active ransomware gangs and their tactics

Next-gen AI-based EDR and EPP solutions are being used increasingly to replace legacy antivirus solutions that do not pass as meeting minimal security standards anymore.

Lee points out that using some legacy solutions may in fact mean an organization is unable to obtain cyber insurance due to a high risk of breach.

“Cyber insurers want to see next-gen products as well as EDR and 24×7 monitoring as a minimum. This combination of AI-based EPP and EDR provides a “prevention-first” strategy followed by visibility in case there is a need for investigation and validation,” Lee said.

Skill shortages

While EDR may be growing in popularity, it can prove difficult for organizations to really master as it requires both commitment and possibly even dedicated resources.

“Organizations realize the necessity [for EDR] but they do not in many cases have the in-house expertise to avoid another shelfware product so that’s why they look towards managed services,” Lee adds.

For example, in the research carried out by UK’s Department for Digital, Culture, Media & Sport, the UK government said in March 2020: “Approximately 653,000 businesses (48 percent) have a basic skills gap. That is, the people in charge of cyber security in those businesses lack the confidence to carry out the kinds of basic tasks laid out in the government-endorsed Cyber Essentials scheme and are not getting support from external cyber security providers.”

Even if organizations were willing to hire additional in-house staff, they are faced with a headcount shortage in the cyber security industry.

Moreover, in an August 2021 speech by President Biden on improving cyber security in the US, he said, “Our skilled cyber security workforce has not grown fast enough to keep pace [with hackers and criminals].”

“We’ve created our own problem because we’re focused on a detect and respond world, not a preventative world.”

Brian Robison

Vice-President of Solutions Strategy at BlackBerry

Biden noted that about half a million cyber security jobs remain unfilled.

While organizations may be grappling with this so-called skills shortage, managed services can assist by allowing organizations to have cybersecurity solutions supplied rather than building them in-house.

Brian Robison, Vice-President of Solutions Strategy at BlackBerry, views the skills shortage as a problem that has been created by the cyber security world itself. “We’ve created our own problem because we’re focused in a detect and respond world, not a preventative world. We’re spending millions and millions of dollars of our board’s money to react to a threat that could have been blocked,” he says.

“We need managed services to bridge the gap to efficiently scale to cover thousands of organizations and hundreds of thousands of endpoints. These services are able to protect more devices by efficiently using a smaller set of highly skilled people along with finely tuned processes and technology,” Lee adds.

Professional services organization KPMG said in a 2021 post that, as the skills gap becomes more acute, the answer is not just to bring in more people but to use technology and automation for repetitive tasks.

The job of technology is not necessarily to replace people but to assist those who are working in cyber security in carrying out the most important tasks.

Also read: The main challenges facing by CISOs

How investment in prevention-first pays off

Through the use of MDR and Managed XDR, combined with EDR and EPP solutions, businesses can optimize their investment in cyber security.

Ultimately, Lee believes that utilizing managed services is the most cost-effective way to ensure an organization’s cyber security.

“We have performed multiple cost model analysis for MDR/Managed XDR versus building in-house and only in the very largest organizations, such as those in the Fortune 100, would it start becoming more cost-effective for them to do it in-house,” he explains.

This is especially true for small- and mid-size organizations since employing enough staff to do the job of a managed services provider can be impractical, they are simply not large enough to absorb the investment needed for the additional headcount.

We know that small- and mid-sized businesses must carefully consider effective investment in cyber security because they are at high risk. The US Small Business Administration notes that small businesses are particularly attractive targets because they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses.

Not only do managed services provide businesses with the solutions they need to counter these threats but the shift to a prevention-first strategy also provides an opportunity to be more cost-effective with a security strategy.

“Prevention is far less time-consuming and costly than investigation and containment. The earlier we can prevent the attack in the cyber kill chain – the less resources we will need to consume. Thus, a prevention-first strategy can also help reduce the skills and resources gap along with defensive spend,” Lee says.

CISOs shifting their approach

CISOs must consider the benefits investment in a prevention-first strategy will bring to their business and Robison also says that today’s CISOs need to turn the corner from being a cost center to becoming a more proactive part of the business.

The conversation needs to change from one that is focused on investment in legacy antivirus solutions, which Robison believes is ultimately a drain on resources, to preventative solutions that stop the threat before it becomes a cost to the organization through ransom payout and remediation efforts.

“What this requires you to do is to partner with vendors that help you grow the business,” he says.

Robison compares the shift in focus CISOs must make to the actions CIOs took to move from on-premises solutions for an organization’s data to cloud solutions for their data centers.

“CIOs changed their models from being a massive cost center to becoming a more proactive business delivery model,” he says. “The CISO has not rounded that corner yet.”

“The biggest paradigm shift that I see being capable in the world today is helping the CISO change the conversation and say I need to make this investment [in a managed service].

He explains that this is essentially what the CIO did years ago when they recognized the need to get rid of the on-premises solutions which are costly to the organization and switch to the more efficient cloud-based services.

This is by no means an easy task and it is challenging for CISOs to stand in front of the board and tell the CEO there is a better way of doing things, Robison notes. Ultimately, most businesses will discover that outdated, traditional reactive solutions do not prevent breaches when a breach happens it will be extremely costly.

The cost of a breach to small- and mid-sized businesses are often astronomical and can ultimately be mitigated with commitment and investment in preventative solutions such as MDR/Managed XDR, EDR and EPP.

Using AI is imperative to the solution

AI offers solutions where computers can process large amounts of data to learn patterns, so it knows how to behave without the assistance of humans – this includes predicting what may occur next from analysis of what has already happened.

The value of MDR and Managed XDR solutions can be enhanced through the use of AI to provide the 24x7x365 coverage required in a scalable fashion.

“The reality is the human aspect of legacy EPP and EDR solutions cannot scale, there are too many new versions of new viruses,” says Robison.

The AI component of MDR/Managed XDR, EDR, and EPP is essential to have a predictive advantage against today’s threats.

In July 2021, the World Economic Forum noted that well-deployed AI can be used to counter today’s security threats. In addition, the World Economic Forum highlights that AI can help respond to threats almost immediately, especially when there is too much data for humans to process.

Also read: CISO considerations for managed XDR investment

AI-powered endpoint protection

AI is necessary because network defenders already face a huge volume of alerts. Many organizations are unable to analyse all the endpoint threats and vulnerabilities, and when coupled with the labour shortage previously discussed, this is where AI can be that force multiplier.

AI-powered endpoint protection is able to use advanced machine learning to uncover malware, fileless and user-based threats in the environment. Meanwhile, the benefits of AI are already being felt by those who use it. As of 2019, 64 percent of senior IT executives surveyed by Statista stated that AI helped lower costs to detect and respond to breaches in their organizations.

Statista stated that 83 percent of US-based respondents it surveyed agreed to the statement “we will not be able to respond to cyberattacks without AI”. Many vendors claim to employ artificial intelligence in their products as a bit of an “us too” marketing exercise, Lee says. Thus, CISOs are encouraged to look for vendors who have been in this space for a while and have mature AI math models.

“The AI component is critical to all of this otherwise it just does not scale efficiently.”

Tony Lee

Vice-President, Global Services Technical Operations, BlackBerry

“The beautiful thing about the math model is the predictive nature of it, so even when a brand-new threat comes out, there is a high probability that the math model already has coverage on the new threat without even being told about it,” Lee explains.

Essentially AI can do what humans cannot by trawling through vast amounts of information to identify threats and use the learnings from said information to predict what future threats may look like.

CISOs’ threat prevention-first strategy

To move from a reactive to a preventative strategy, CISOs must recognize that there is a need to shift away from outdated legacy antivirus technology and toward nextgen solutions that prevent attacks before they happen.

MDR, Managed XDR, EPP and EDR solutions, combined, can offer an effective approach that does not drain resources and allows organizations to minimize alert fatigue.

In addition, these solutions must work together.

“A fully integrated EPP, EDR, and managed service is required for any hope of correlating events. Trying to correlate EPP and EDR events in two disparate systems is not scalable,” Lee says.

“This needs to be delivered as a single package by managed security experts who know how to wield the products the best. Since no EPP is 100 percent, EDR provides the ability to gather evidence, threat hunt and even take extended actions.” “These two technologies combined with managed services enables incident analysts and hunters that work as an extension of your security team. This allows internal security teams to focus on key security initiatives rather than spending time and resources triaging alerts or recovering from an attack,” he adds.

AI also has a vital role as the volume of threats and incidents cannot be identified by humans alone. The predictive aspect of AI is crucial to identify threats before they happen.

While faced with a shortage of cyber security professionals, a prevention-first strategy is the only way for organizations to defend against today’s threat landscape.

Read a PDF of the report here


[ad_2]
Source link

Wear OS 3: Everything You Need To Know

0
[ad_1]

The new Wear OS is finally here, finally giving us our hands-on look at what the software will be like for users. Google was initially quiet on which current devices would get the update to it. But during the Google IO keynote on May 18, and in the months that followed, it did share some details about what to expect from the new version of its wearables platform.

Better battery life is probably the biggest thing that’s available. But it’s not the only notable improvement that Google made. users can also expect better performance, some new features, and overall just a more well-rounded experience.

This guide will break down everything there is to know about the new Wear OS platform now that it’s been available since the launch of Samsung’s new watch. We’ll update this post periodically as more information becomes available.

The new Wear OS is a unified platform

If you missed the keynote from Google IO earlier this year, you can watch a roughly 9-minute recap of the biggest parts here. But in regards to Wear OS specifically, if you missed the keynote then you missed that Google is unifying Wear OS with Samsung’s touch on the software. Officially the software is called Wear OS 3, but the user interface is called One UI Watch 3.

With Google’s smartwatch OS at the helm and Samsung’s user interface layer on top, users are getting the best of both worlds. Google’s expansive collection of smartwatch apps and Samsung’s more pleasing user experience.

As for what the new unified platform includes, there’s not a ton of specifics yet but Google has highlighted some things. Both Wear OS and One UI Watch have their strengths. Which is exactly what Google and Samsung are trying to offer. This means you’ll see things like Google Assistant and Bixby for voice-activated, hands-free functions.

While other services like Google Maps and Google Pay are being brought into the fold on Samsung’s smartwatches for the first time since the Samsung Gear Live.

Google is officially calling the new platform Wear OS 3

A recent support forum post from Google about the new Wear OS platform refers to it as Wear OS 3, confirming that this will be the official name for the software. This goes for any watches that are eligible to receive the upgrade to the software, as well as those that will launch with it out of the box.

It’s reasonable to have suspected that because Google was making this a new unified platform with Samsung, that it would come with a new name. But Google is choosing to keep the Wear OS name and simply add the new version number.

New apps and tiles are coming

If you like third-party apps on your smartwatches, then Wear OS 3 is going to be right up your alley. Google has even shared some of the apps and tiles that are going to be available once the new version of the OS rolls out.

This includes YouTube Music, Google Maps, and Google Pay for the apps. You can see some screenshots of what these apps look like in the gallery above. From Google Pay to Spotify.

Beyond the apps, Google is refreshing the looks of many of its most popular Tiles. Like weather, the alarm clock, the hand washing timer, Google News, and Google Calendar just to name a few. There’s also going to be a new Tile added dedicated to Fitbit’s Active Zone Minutes feature.

You can expect Tiles from third-party apps too. Like Spotify, Strava and others. As Google will be opening up the new Tiles API to third-party developers when the new Wear OS gets pushed out.

Samsung and Fitbit are Google’s only partners for the new Wear OS platform so far

It’s quite possible that eventually Google will have more partners for this new platform. But it’s starting out small. With Fitbit, which it owns, and Samsung, which is a clear choice. Given the popularity of Samsung’s wearables platform over the current Wear OS.

Samsung is the first to feature the new software. Because it worked with Google to develop it. As of right now, the Galaxy Watch 4 and Galaxy Watch 4 Classic are the only two smartwatches that run Wear OS 3. Though some existing watches will be getting the update to it sometime in 2022.

What watches will run on Wear OS 3?

As of right now there are 11 different watches that run on Wear OS 3. This includes the Samsung Galaxy Watch 4 and Galaxy Watch 4 Classic, as well as the Galaxy Watch 5 and Galaxy Watch 5 Pro. Additionally, the Mont Blanc Summit 3, and Google’s own Pixel Watch run on Wear OS 3 as well. And as of October 17, Fossil has started sending out the update to four of its watches. Which are the Fossil Gen 6, the Skagen Falster Gen 6, the Michael Kors Gen 6, and the Razer x Fossil Gen 6.

Fossil’s recently launched Gen 6 Wellness Edition also comes with Wear OS 3 out of the box and won’t need to be updated.

The Spotify app will support downloadable content

You’ll be able to download both music and podcasts to the watch when this feature rolls out. Meaning you can connect a pair of Bluetooth earbuds or headphones to the watch and leave the phone at home. That way you can still enjoy everything Spotify offers even if the watch isn’t connected to the internet.

Better performance, better battery life, faster load times for apps

Wear OS has been lacking in both performance and battery life for really its entire lifespan. Since it’s been available to users, these two areas have always fell short. Google knows it.

So the new Wear OS rectifies this with better performance and better battery life. This was the promise during Google’s IO announcement this year, and for the most part Google has lived up to that promise. The company states that apps load faster too. So the user experience overall should be more efficient and enjoyable for most people. In our experience, that was mostly the case.

More to the point, though, is that you’ll be able to use the watch for more than a day before having to charge it. Whereas with Wear OS 2, you’d be lucky to get to the end of the day.

It’s all about convenience

The new Wear OS makes it super easy to not only get things done but also use your favorite apps. One of the new features is the capability to easily switch back and forth between your most recently used apps.

From anywhere on the watch no less. So no matter what screen you’re on, you can hop right back to maps if that’s the last app you used.

The new Wear OS offers world-class health and fitness features

With Fitbit on board, the new Wear OS is going to be even more centered on health and fitness than ever before. The platform will come with a Fitbit app with features like Active Zone Minutes.

It’ll also include on-wrist celebrations to keep you motivated. And you’ll be able to track your progress throughout the day with just a glance. There are likely more features that will be part of the app as well.

Qualcomm says that Wear 3100/4100 chips can support the new software

Back on June 17 Qualcomm confirmed that smartwatches running on its two newest chipsets could technically support the new software.

Stating that Wear 3100 and Wear 4100 chips are capable of doing so. It also noted that it would be working to ensure that devices on these chips get the update if at all possible.

However, Google is not necessarily as committed to bringing support to older devices. The company has stated that its top priority is user experience. And it doesn’t know that those older chips can live up to the experience that it wants to provide for users.

Some manufacturers, like Fossil, have made official statements saying that none of its existing watches will get the update. Other brands, like Mobvoi, seem to be hinting that at least the TicWatch Pro 3 would be updated. And as the only Wear OS watch running a Snapdragon Wear 4100 chip, it would be a little surprising if the watch didn’t receive the new software.

Samsung’s Galaxy Watch 4 is the first device on this new platform

Samsung Galaxy Watch 4 76

Back in July Samsung showcased some of the upcoming platform that it’s working on with Google. The new user experience is officially called the One UI Watch 3. Prior to the announcement of the Galaxy Watch 4, this wasn’t an official name for the user experience, as Samsung was simply referring to it as the One UI Watch experience.

The company initially revealed the new experience during its virtual Mobile World Congress event on July 23. Noting that its upcoming smartwatch at the time, now officially known as the Galaxy Watch 4 and Galaxy Watch 4 Classic, would be the first device to run this new software.

This means that no other Wear OS smartwatches are going to have this software for a while following Samsung’s latest device that has just recently hit the market. In fact, Google also confirmed that Samsung’s Galaxy Watch 4 will exclusively feature Wear OS3 until late 2022. So this will be the only Wear OS 3 watch for the better part of a year.

According to Google, it will begin rolling out updates to compatible devices in the middle to second half of 2022.

Google Assistant and YouTube Music are not on the Galaxy Watch 4 at launch

Following the Galaxy Watch 4 announcement, Samsung confirmed that at launch, the Galaxy Watch 4 would not have access to either Google Assistant or YouTube Music. Furthermore, Google Pay is absent too. Though it will these eventually.

Samsung says it’s working closely with Google to get these services up and running on the new watch. In the meantime, users will still have access to Samsung’s own virtual assistant, Bixby. Worth noting is that YouTube Music is now available on Wear OS if you have the Galaxy Watch 4. Having been made available back around August 27.

Will any current smartwatches be upgraded to the new software?

There are three current smartwatches which have been confirmed as eligible to receive the upgrade to Wear OS 3. This includes the TicWatch Pro 3 GPS, the TicWatch Pro 3 Cellular/LTE, and the TicWatch E3.

Google also confirms that follow on TicWatch devices, as well as Fossil Group’s upcoming smartwatches later this year will also be eligible for the Wear OS 3 upgrade.

Devices eligible for upgrade will need a factory reset

In addition confirming which watches are eligible for the new software, Google has also stated that any eligible devices will need a factory reset. In the support forum post where it confirmed the Wear OS 3 name, it notes that eligible watches will need revert back to the way they were when users got the devices. Which means factory settings.

Google cites the changes to the software as the reasoning for the factory reset requirement.


[ad_2]
Source link