What is business email compromise?

0
[ad_1]

In this article, Cyber Security Hub explores how cyber attackers use threat vectors like phishing, social engineering and ransomware to enact business email compromise (BEC).

Cybercrime is an ever-growing issue across virtually every industry. Expected to have a global cost as much as US$10trn by 2025, companies must fight to combat malicious actors seeking to gain from cyber attacks against them.

Threat actors increasingly use multiple threat vectors during attacks to overwhelm companies and make it easier for them to gain access to their network. This is makes it more important than ever to safeguard the most common vehicle for an initial breach point – email.  

The majority of hacking groups (65 percent) utilize email-based spear phishing campaigns as their primary attack vector. This cyber attack method targets specific individuals within an organization with the goal of compromising their credentials and using their privileged access to gain further control of a business’ network or steal information that only certain employees have access too.

These campaigns can have a devastating impact, not least from a financial perspective; in May 2022, the US Federal Bureau of Investigation (FBI) reported that BEC had led to a total loss of $43.3bn between June 2016 and December 2021.

In this Cyber Security Hub article will highlight the key vulnerabilities for those without sufficient email security and explain how to block threat actors from carrying out successful attacks while mitigating data loss and fraud.

Read also: Prevent advanced ransomware attacks with good email security

Email security must not be ignored

As the ransomware-as-a-service (RaaS) economy matures, ransomware gangs are demonstrating supreme confidence in their debilitating actions.

In January of this year, the UK’s Royal Mail had to completely halt all dispatch of items overseas after it became the victim of an alleged LockBit ransomware attack. The ransomware caused “severe disruption” to the computerized systems used to send mail abroad and resulted in Royal Mail requesting that customers stop sending mail abroad in the wake of the ransomware attack.

Verizon also noted a 13 percent increase in ransomware breaches in 2022. As ransomware can be spread via BEC, this statistic is especially worrying.

During email-focused cyber attacks, malicious actors may target low-level data within the attack’s early phases. This low-level data can then be used to gain access to and steal more sensitive data. With Microsoft reporting that it takes hackers just 24-48 hours to gain control of a network via a privileged account, even the compromise of low-level accounts can be serious.

For example, a hacker could pose as a job seeker to target those in human resources (HR). Hackers rely on the fact that HR professionals are used to receiving and opening attachments from unknown senders to allow their ransomware to spread across a network. Additionally, if attackers do compromise HR emails, this gives them access to confidential and sensitive company information. 

Read also: The dangerous vulnerabilities caused by weak email security

Best practices for alert organizations

Understanding the human element

Comprehensive email security strategies like the use of strong passwords and email encryption can provide a higher level of protection against BEC. This, however, relies on employees following the rules and with 65 percent of people reusing passwords for multiple or all of their accounts and 73 percent of people using the same passwords for both work and personal accounts, this is easier said than done.

Likewise, research by the Harvard Business Review has found that 67 percent of employees admit that they fail to adhere to cyber security policies, with a failure-to-comply rate at an average of once every 20 tasks. In 85 percent of all cases where employees knowingly broke procedure they cited work-related reasons for doing so, including “to better accomplish tasks for my job”, “to get something I needed” and “to help others get their work done”.

So, companies must recognize that their cyber security policies need to both protect the company while also not preventing their employees from doing their jobs efficiently. Likewise, employees should be made aware of their role as those on the front line against email-based cyber attacks. Not doing so can cause employees to cut corners in the name of efficiency without understanding the ramifications, ultimately endangering the company. 

Read also: Top tips for cyber security training 

Introduce a robust backup strategy 

As cyber attackers may delete or poison uploads as they make their way through a company’s network, it is important that companies have safeguards in place to make sure they are still able to access important documents even in the case that they need to shut down the network. 

Cyber security researcher Alex Vakulov explains that having a ‘3-2-1′ backup strategy can help ensure the safety of critical data: “[Using the 3-2-1 method] two copies are stored locally on the same site but on different media. The third copy is separated from the previous two, for example it is kept in the cloud. Accordingly, if something happens to the first storage, then the data still remains in another storage in the [on premises] data center. If access to the entire data center is lost, a backup copy remains in the cloud.” 

By using multiple backups, companies can mitigate the risk and impact of business email compromise, allowing them to continue to function while also being able to shut down the network to stop malicious actors from gaining further access to it and/or poisoning or stealing data. 

Increase endpoint security 

In today’s digital climate, the number of devices in use across an organization has risen exponentially, as most employees need access to multiple devices in order to do their jobs. When paired with the emergence of hybrid or completely remote working and the move away from a secured on-premises network, this means that businesses must be constantly vigilant about endpoint security. 

This need is already being recognized in the cyber security space, with Cyber Security Hub’s own research finding that 44 percent of cyber security professionals say their company is currently investing in endpoint security

As well as protecting the devices on its network, companies need to protect the network itself. To do this, companies should increase their detection and response capabilities. This need has similarly been recognized by businesses, with the same research finding more than two fifths (42 percent) of companies are investing in threat detection and response.  

Conclusion: combine a human-centric approach with key software investments 

An employee-centric approach to ransomware and BEC threat prevention allows all employees to understand the risk of these threats. By shifting a security strategy approach to understanding the human element of these attacks, companies can help prevent these attacks by stopping them before they infiltrate the network.  

Additionally, companies should identify the areas in which they can invest to better strengthen their ability to protect against and respond to cyber attacks, including endpoint security, cloud storage and backup facilities, and detection and response software. 

This means companies have a double-layered threat prevention approach and are not solely reliant on endpoints and other technology to stop ransomware after it is activated. 


[ad_2]
Source link

Major Cybercrime Crackdown: Encrypted Messenger Exclu Seized

0
[ad_1]

So far, authorities have arrested 48 people in connection with Exclu, discovered two drug labs and a cocaine-processing facility, and confiscated $4.3 million, several kilograms of drugs, and luxury items.

European law-enforcement authorities have seized Exclu, an encrypted communication service that cybercriminals used as their primary channel to carry out organized crime, mainly trading drugs.

According to authorities, 48 people have been arrested so far in connection with the service and seizure of guns, drugs, and millions in cash. Reportedly, police raided 79 locations in the Netherlands, Germany, and Belgium on Friday. The arrested individuals were operators, administrators, and users of Exclu.

The investigation into the encrypted communication service, identified as Exclu Messenger Service, was started in September 2020. Their probe revealed that Exclu was offered as a smartphone app and came with a 6-month license, costing around 800 euros or $860. The service had 3,000 users, of which around 750 were based in the Netherlands.

“Exclu made it possible to exchange messages, photos, notes, voice memos, chat conversations, and videos with other users,” Dutch police revealed. The service was popular among criminals for its high level of security.

After starting their investigation into the Exclu secret communication service, authorities hacked the platform and accessed the messages passed between criminal gangs for five months before carrying out the raids.

Dutch, French, Italian, and Swedish police participated in this investigation, which was supervised by Eurojust and Europol. At least two drug labs, a cocaine-processing facility, four million euros (or $4.3 million), several kilograms of drugs, and luxury goods were confiscated from the suspects.

Exclu isn’t the only encrypted online chat platform shut down by law enforcement. Back in June 2020, encrypted communication provider EncroChat was forced to cease operations after suffering a malware attack.

In July 2020, however, authorities dismantled the entire infrastructure of EncroChat and arrested over 800 individuals, including some prominent crime figures, by using information acquired through EncroChat.

  1. Europol Busts Crypto Fraud Call Centers
  2. DoubleVPN’s servers used by ransomware seized
  3. 48 DDoS-hiring Sites Busted by FBI in Major Sweep
  4. iSpoof seized; UK’s largest bank call scam disrupted
  5. Online piracy hacker network Sparks Group dismantled

[ad_2]
Source link

Reddit Hacked After Employee Bites on Phishing Scam

0
[ad_1]

Reddit has become a victim of yet another data breach, in which threat actors have accessed the company’s internal documents, dashboards, business systems, and more.

On Thursday, Reddit confirmed that the platform had become a target of a sophisticated phishing attack on February 5th, 2023. The company revealed that the attackers targeted its employees by sending out plausible-sounding prompts via a website that looked exactly like Reddit’s intranet gateway. The objective of this attack was to steal credentials and second-factor tokens.

The incident should not come as a surprise, as companies such as Cisco, Twilio, GoDaddy, and others have suffered security breaches due to employees lacking cybersecurity knowledge.

According to Reddit, Several employees received malicious emails sent via a fake website. One of the employees entered their credentials into this cloned website, which allowed the attacker(s) to hack into Reddit. Reddit asserts that its primary production system wasn’t breached, where Reddit stores most of its data.

After the affected employee informed the Security team, the team learned about the attack, and Reddit then launched an investigation into the incident. The company responded to the incident by removing the invader’s access to its system.

“We’re continuing to closely investigate and monitor the situation and working with our employees to fortify our security skills. As we all know, the human is often the weakest part of the security chain.”

Reddit

Reddit CTO Christopher Slowe wrote that the attacker could access internal documents, dashboards, and business systems. Exposed data includes limited contact information of company contacts, which are currently in the hundreds, and current/former employees’ data. Reddit noted that limited advertiser info was also exposed.

The company, however, has assured Redditors that their data is secure and was not affected in this incident. “Based on our investigation so far, Reddit user passwords and accounts are safe,” the company’s spokesperson stated.

They further noted that after several days-long investigations by security, engineering, and data science (and friends), the company didn’t find any evidence that its customers’ non-public data was accessed or Reddit’s data was published/distributed online.

In a comment to Hackread.com, Sam Humphries, Head of Security Strategy, EMEA, Exabeam said that “This latest incident is yet another reminder that all it takes is one employee’s credentials to be stolen to open the door to an organisation’s internal systems.”

“Fortunately, in the case of Reddit, the targeted employee self-reported the incident to their security team, allowing for prompt investigation and response,” Sam added.

He further advised that “Organisations need to place as much (if not more) emphasis on detection as prevention. This will allow them to more efficiently and effectively identify malicious behaviour indicative of a compromised employee account and minimise data theft.”

Matt Aldridge, Principal Solutions Consultant at OpenText Cybersecurity, pointed out a crucial weakness: employees with no education on cybersecurity. “It’s also crucial to ensure staff are properly trained to identify threats,” Matt emphasised.

“There’s no use investing in sophisticated cybersecurity software and services if employees continue to click on dangerous phishing links that slip through the net, in turn granting cybercriminals access to the business network – It’s like turning on a fancy home security alarm, but leaving a window open – you’ll be left playing catch-up after the bad guys get in,” Matt added.

Nevertheless, Reddit recommends that users switch to two-factor authentication. Slowe also hosted an AMA to answer queries related to the incident and confirmed that the employee who had self-reported the incident wasn’t fired but had been shifted to stocks as a punishment.

  1. Hackers hit Reddit; deface 70+ Subreddits
  2. Game of Thrones Season 8 script pages leaked on Reddit
  3. Reddit hacked: Hackers steal copy of old database backup

[ad_2]
Source link

Geo Targetly URL Shortener Abused in Phishing Scam

0
[ad_1]

Geo Targetly is a legitimate online service that offers its own URL shortening service, similar to Bitly, called Geo Link.

Researchers at Check Point Software Company’s security firm, Avanan, have discovered a new wave of phishing attacks in which actors use the Geo Targetly product, Geo Link, to redirect users to malicious links.

What’s worse, following this modus operandi, scammers can launch targeted attacks according to the victim’s region and language through this service.

The latest Reddit hack teaches us one major lesson: Do not underestimate phishing attacks.

Hackread.com

For your information, Geo Targetly is a legitimate website that lets businesses and advertisers redirect users to ads or pages in their local markets. Its Geo Link service is essentially a URL shortener, according to the company, just like Bitly.

Threat actors use Geo Targeting to target potential victims at specific locations through phishing emails. This could be a massive blow to the cybersecurity fraternity, as exploitation of get targeting may be the ultimate game-changer for cybercriminals.

“In this attack, hackers redirect users via Geo Targetly … and provide them with customized, localized phishing pages,” Avanan researchers stated.

The said tool is used to display ads based on the user’s location. So, the ads viewed by someone in France would be different than those shown to someone in the US. Now, hackers can launch geo-specific phishing content and send malicious emails customized by region and language to their targets.

Email Content

One of the emails Avanan researchers analyzed was in Spanish and was sent to users in Colombia. It appears to be about a speeding subpoena. The email’s subject line translation is as follows:

“Subject: Notification of subpoena for excess of maximum speed allowed on urban roads of 60 km/h.”

The email contains a link. When the recipient clicks on “See Compared,” they are redirected to the Geo Targetly page. Since the user is in Colombia, the email will redirect them to a Colombian page.

Phishing email screenshot provided by Avanan

But that’s not the exciting part. The customization that hackers perform to attack their targets according to their location is the exciting part. With this trick, they can target multiple users in different parts of the world simultaneously.

By exploiting Geo Targetly, attackers can create phishing URLs that redirect users in certain regions to inauthentic login pages that appear legitimate. Due to this personalization, victims will be trapped and click on the link. This technique is based on the “spray-and-pray” method, in which thousands of phishing emails are sent at once.

How to Stay Protected?

Researchers recommend users check the URLs included in their emails and browsers before clicking on them. Avanan’s cybersecurity researcher Jeremy Fuchs stated that this is a widespread attack campaign.

Since there is no security flaw in Geo Targetly that threat actors have exploited, the only line of defence is staying vigilant. Geo Targetly has confirmed that hackers used its service to target users.

The company removed Geo Link from its free trial, considerably reducing its exploitation in phishing campaigns. Geo Targetly has also limited the creation of new accounts unless the user shares their legitimate company email account and domain.

  1. SMS Phishing scam Dupes Zendesk Staff
  2. Phishing Attacks Using Unicode Characters
  3. Zoom Phishing Scam Steals MS Exchange Data
  4. Gmail Phishing Scam Stole Data Using Attachment
  5. Phishing: Microsoft & PayPal, most targeted brands

[ad_2]
Source link

ChatGPT may lead to lower wages: economist famously predicted

0
[ad_1]

In 2013, Oxford University economists Carl Benedikt Frey and Michael Osborne predicted that nearly half of all jobs in the US (47%) were under threat from computerization or automation in a decade or two. In other words, they suggested that AI (artificial intelligence) would reduce manpower in many industries.

Fast forward to today, i. e. a decade later, automation is part of almost every industry, while AI-powered services like ChatGPT are threatening to eat up many jobs. Frey has now opined that ChatGPT and the like could lead to lower wages even if workers manage to cling to their jobs.

ChatGPT could create more competition, leading to lower wages

According to Frey, computers still haven’t replaced half of the manpower in the US. However, the trend is there. And, the arrival of ChatGPT may have just fueled it. He said automation will create more competition in various industries, driving wages down. Frey pointed to the steadily falling income of prime-age men to explain how AI is affecting employment. “I think there’s a risk that ChatGPT makes us a lot more productive in easy-to-do stuff, but the hard part to figure out is how we can use AI to create innovation that then creates new occupations and new industries,” he told Fortune.

In a separate interview with Business Insider, Frey likened ChatGPT ‘s AI revolution to Uber disrupting the taxi market. He said the arrival of Uber and the like resulted in more taxis on the streets. But it also led to more competition, thus effecting a wage cut of around ten percent for drivers.

“Uber didn’t reduce the demand for taxi drivers,” Frey said. “It, if anything, increased the number of people driving cars for a living, but it reduced the amount the earnings capacity of incumbent drivers”. He suggests ChatGPT will similarly impact creative industries like writing, music, art, graphic design, and even computer programming.

AI could help improve employment in many areas

While AI may replace some jobs, it could also help improve employment in some areas. Perhaps emerging technologies will transform many jobs rather than outright replace those. Some roles will evolve and require a new set of knowledge and skill.

As such, people who lack the required skills for this transformation might end up losing their jobs, but they will be replaced by another human. “I think there’s this somewhat misguided distinction between replacement and jobs being changed and transformed by technology,” Frey said.

He added that technological advancements, such as ChatGPT, are good for society. “It’s the reason that we’re a lot more prosperous today than a couple of hundred years ago,” the economist said.

The conversational AI chatbot created by Microsoft-backed OpenAI has raked in over 100 million users in just two months. Many tech biggies are rushing to introduce their own ChatGPT alternatives, including Google which recently launched Bard. It remains to be seen how these services impact employment in the coming years.


[ad_2]
Source link

Everything you need to know

0
[ad_1]

The term “broke the internet” is tossed around a lot, but there are few things that actually break the internet. One of these things is ChatGPT. This is an extremely powerful AI (Artificial Intelligence) chatbot that put a lot of big companies at attention. So, what is this technology and what does it mean for the future of AI? Here’s everything you need to know about ChatGPT.

What is ChatGPT?

The concept of ChatGPT isn’t new. It’s a chatbot- a piece of software that simulates a human conversation. You’re able to send messages to it and get responses as though you’re talking to a human being. There’s a certain humanization factor to it that we’re seeing with voice assistants such as Amazon Alexa and Google Assistant.

ChatGPT is much the same thing, and it’s been making waves since November 2022. It has a simple interface with a text field on the bottom. You’re able to type in whatever query you want and get a prompt response.

What can you do with ChatGPT?

That is the million-dollar question because it’s what this chatbot can do that is making companies like Google quake in their boots. Some say that ChatGPT does a lot, and others will argue that it does too much. The responses that ChatGPT delivers range from conversational to informative.

Basic knowledge

This is, perhaps, the biggest threat to Google. We’re all used to turning to Google to find results for just about anything. Baby care tips, local restaurants, information on quantum mechanics, etc. Well, ChatGPT does the same thing, but it cuts out the middleman. If you search for the best way to swaddle a baby on Google, you’ll get about 31,400,000 results. Those results will involve ads, contradictory results, and downright wrong information.

However, if you ask ChatGPT, it will just tell you how to- plain and simple. You won’t have to wade through an endless pool of results. If you type in “How to swaddle a baby” in ChatGPT right now, you’ll get a clear and concise list of five steps.

You’ll also be able to ask it factual questions. You can ask questions like “When was Jupiter discovered?”, “Who was Muzio Clementi?”, or “How much energy does it take for an electron to jump from the lowest energy level in a carbon atom?”. ChatGPT will give you a clear to-the-point answer with additional context.

Advice

This is an area where ChatCPT stands out. As stated before, you’re getting a direct response, not a wall of search results. This means that getting advice is a lot easier. Typing in something like “I need advice on what to teach my kid”. Again, you’ll get a direct list of items to keep in mind. If you type this in Google, you’ll see a highlight from an article along with other search results.

What might make ChatGPT’s implementation more tempting is the mentality about it. If you want advice on parenting, who would you rather ask, your mother/father or a group of 50 parents who are likely to have contradicting advice? Getting one answer from one source will likely make people feel more confident about the results rather than a slew of results that won’t agree with one another.

What also makes ChatGPT tempting is the conversational aspect. If you don’t like the results, you can say (type) so, and the chatbot will alter its results based on that. You can’t really do that with Google.

For example, “I want advice on buying a new pet” was entered, and we got this result:

ChatGPT Pet 1

This result gives you a list of things you should consider when buying a pet, but if you have an additional question, then you can inquire further. Below is the rest of the conversation.

So, you can see how you’re able to have a conversation with the bot to get further information.

Conversation/support

This might be one of the oddest aspects of this chatbot, but you can have idle chit-chat with it. You can start a conversation about pretty much anything.

We were able to hold a conversation about going out with a friend and wanting to pay her back for treating us to lunch. ChatGPT remained consistent and even offered advice on the way. There was another extended conversation centering around the loss of a pet. It offered condolences and gave advice on coping. If you’re in need of conversation, ChatGPT could actually hold a conversation.

Producing written content

Now, let’s get down to the juicy stuff. You can ask ChatGPT to write you several forms of written content. This includes full news articles, product reviews, poems, stories, scripts, and much MUCH more.

For example, we asked it to write a 2000-word review of the HTC 10, and it delivered- albeit extremely dryly. We also had it write a story about a mean boy who gets hit just deserts.

Other examples include a poem about the night, a plot synopsis of Toy Story, a script about a couple just getting home from the store, and more. Each time, we were able to offer changes, and ChatGPT made them.

Writing code

One of the smash-hit features of this chatbot is the ability for it to write actual code. You just need to ask it to write code for the action you want the program to perform. We asked for code for an app that can tell time, and it gave us some python examples to add to the app.

ChatGPT code

What can’t ChatGPT do?

While ChatGPT can write code, it can not write an entire program. Also, it can’t give you advice on certain sensitive subjects. These could involve subjects like sex, pregnancy, murder, violence, etc.

Obviously, while this chatbot can produce original content, just know that it will be rather clinical. Sure, that’s great for looking up advice, encyclopedia knowledge, recipes, etc., but anything like articles or reviews won’t show any personality. The HTC review read like a press release with even LESS personality.

How much does ChatGPT cost?

There are two ways to use ChatGPT. You can use the core functionality for free. This means that you can ask it questions until your heart’s content. The company doesn’t put a limit on how many inquiries you can put in.

In fact, OpenAI thrives off of this input. However, there are a few limitations. At times in the day when a ton of people are using it, you won’t have access to the service. You’ll need to wait until traffic goes down.

However, there is a paid tier that costs $20/month. With this, you’ll have access to it regardless of the traffic. Also, it will process your results more quickly. Last but not least, you’ll have early access to new features with the paid tier.

Do I need an account to use it?

Yes. In order to use the service, you’ll need to sign in. You can either set up an OpenAI account or sign in with either your Google or Microsoft account.

Is using ChatGPT content illegal?

At this point (early 2023) there are no laws or regulations stating that you’re not allowed to use the AI-generated content that ChatGPT makes. While there are obvious moral roadblocks, you can use your generated articles or stories and publish them.

You’ll just need to take into account the rules and regulations of the specific publication companies that you’re submitting to. They have the final word.

What should I be worried about with ChatGPT?

As of the writing of this, ChatGPT’s knowledge stops at 2021. So, there’s a lot of information that it doesn’t know from modern events. This means that you run the risk of getting out-of-date or inaccurate information.

Also, despite how advanced ChatGPT is, it’s still not human. This means that it could accidentally give results that are heavily offensive. They could, unintentionally, be biased or hurtful. This technology is still being developed, so you’ll want to keep that in mind.

Try out ChatGPT


[ad_2]
Source link

Apple Q1 2023 Results: $30.0B Profit, But Still a Miss

0
[ad_1]
Apple has announced its financial results for Q1 2023 (Q4 2022 calendar quarter). The Cupertino giant generated $117.2 billion in revenue and a net quarterly profit of $30.0 billion. This is a slight decrease compared to the same quarter of last year, where they posted revenue of $123.9 billion and a net quarterly profit of […]
[ad_2]
Source link

Samsung updates Galaxy S10 Lite to February security patch

0
[ad_1]

Samsung has begun rolling out the February 2023 Android security patch to the Galaxy S10 Lite. The device is currently picking up the latest security update in Europe. A wider rollout should follow in the coming days. The handset received the January SMR (Security Maintenance Release) in the US just a few days back. So users stateside may have to wait a few weeks to get the new security release.

The February SMR for the Galaxy S10 Lite comes with the firmware build number G770FXXS6HWB1 in Europe. As of this writing, the update is only available to users in Spain. But it should just be a matter of time before it reaches other European countries. Samsung should also expand the rollout to more regions over the next few days. We will let you know when it arrives in the US.

In the meantime, you can go to the Software update menu in Settings and tap on Download and install to check for updates manually. If an update is available, you will be prompted to download it. If you don’t see any pending updates, wait a few days and check again. You may also get a notification when the OTA (over the air) release becomes available for your Galaxy S10 Lite unit.

This update doesn’t bring anything notable. There aren’t any new features or improvements here. Samsung is only pushing the latest vulnerability fixes to the Galaxy S10 Lite. There are plenty of those, though. The February SMR patches more than 50 vulnerabilities, including seven Galaxy-specific ones. The Korean firm patched issues with Secure Folder, Contacts, Phone, Fingerprint TA, and more system apps.

The remaining vulnerability patches found in the February SMR are part of Google’s latest ASB (Android Security Bulletin). These are issues found in Android OS and other partner components. The Android maker labeled five patches as “critical” this month. Some of those could lead to remote code execution. The remaining patches were all labeled “high-severity” by Google.

Galaxy S10 Lite may not get Samsung’s One UI 5.1 update

Samsung launched the Galaxy S10 Lite in early 2020, just a month before the Galaxy S20 series. Both devices arrived with Android 10 out of the box and received updates to Android 11, Android 12, and Android 13. While neither is eligible for Android 14, the Korean firm has confirmed that the latter will get One UI 5.1, which debuted with the Galaxy S23 series last week. The Galaxy S10 Lite appears to be missing out on it. We will let you know when Samsung starts rolling out the One UI 5.1 update to older Galaxy devices.


[ad_2]
Source link

OnePlus 11 vs Google Pixel 7 Pro

0
[ad_1]

The OnePlus 11 is a brand new smartphone at this point. It’s the best OnePlus has to offer, and we continue our series of comparisons with the best of Google. In this article, we’ll compare the OnePlus 11 vs Google Pixel 7 Pro. The Pixel 7 Pro arrived in September last year, and it’s currently Google’s flagship. It’s considered by many to be one of the best, if not the best camera smartphone for stills. It will be interesting to see how the OnePlus 11 compares to that, amongst other things.

As per usual, we’ll first list the spec sheets of both phones, and will then move to a number of other sections. We’ll compare their designs, displays, performance, battery life, cameras, and audio performance. There’s a lot to talk about here, so, let’s get started with the comparison, shall we?

Specs

OnePlus 11Google Pixel 7 Pro
Screen size6.7-inch QHD+ LTPO3 Fluid AMOLED display (120Hz refresh rate, curved, 1,300 nits peak brightness, LTPO down to 1Hz)6.7-inch QHD+ curved OLED LTPO display (120Hz refresh rate, 1,500 nits peak brightness)
Screen resolution3216 x 14403120 x 1440
SoCQualcomm Snapdragon 8 Gen 2Google Tensor G2
RAM8GB/16GB (LPDDR5X)12GB (LPDDR5)
Storage128GB/256GB, non-expandable (UFS 4.0)128GB/256GB/512GB, non-expandable (UFS 3.1)
Rear cameras50MP (f/1.8 aperture, 1.0um pixel size, OIS, multi-directional PDAF)
48MP (ultrawide, f/2.2 aperture, 115-degree FoV, AF)
32MP (telephoto, f/2.0 aperture, 2x optical zoom, PDAF)
50MP (Samsung ISOCELL GN1 sensor, 1.2um pixel size, f/1.85 aperture, 82-degree FoV)
12MP (ultrawide, 1.25um pixel size, f/2.2 aperture, 125.8-degree FoV, lens correction)
48MP (telephoto, 0.7um pixel size, f/3.5 aperture, 20.6-degree FoV, 5x optical zoom, Super Res Zoom up to 30x)
Front cameras16MP (f/2.5 aperture, 25mm lens, 1.0um pixel size)10.8MP (1.22um pixel size, f/2.2 aperture, 92.8-degree FoV, Fixed Focus)
Battery5,000mAh, non-removable, 100W wired (80W in the US) charging
Charger included
5,000mAh, non-removable, 23W wired charging, 23W wireless charging, reverse wireless charger
Charger not included
Dimensions163.1 x 74.1 x 8.5mm162.9 x 76.6 x 8.9mm
Weight205 grams212 grams
Connectivity5G, LTE, NFC, Bluetooth 5.3, Wi-Fi, USB Type-C5G, LTE, NFC, Bluetooth 5.2, Wi-Fi, USB Type-C
SecurityFace scanning (front camera)
In-display fingerprint scanner (optical)
Face Unlock
In-display fingerprint scanner (optical)
OSAndroid 13
OxygenOS 13
Android 13
Price$699/$799$899/$999/$1,099
BuyOnePlusGoogle

OnePlus 11 vs Google Pixel 7 Pro: Design

The moment you lay your eyes on these two phones, you’ll notice considerable differences design-wise. They both have curved glass on the front and back, with a frame made out of aluminum in between. That’s basically where the similarities end, though. Both phones do have curved displays, with display camera holes. Those hole punches are placed in different spots, though. The one on the OnePlus 11 is in the top-left corner, while the Pixel 7 Pro has a centered one, up top.

The bezels are thin on both phones, while their backplates look entirely different, thanks to different camera setups. The OnePlus 11 has three cameras on the back, placed inside a circular camera island. That module sits in the top-left corner. The Pixel 7 Pro has a large camera strip on the back, which goes from the left to the right side, all the way. There are three cameras included in it.

The OnePlus 11 is slightly taller, and a bit narrower than the Pixel 7 Pro. It’s also slightly thinner (less than a 1mm difference). The OnePlus 11 weighs 205 grams, while the Pixel 7 Pro weighs 212 grams. The OnePlus 11 has Gorilla Glass 5 on its back, while the Pixel 7 Pro has Gorilla Glass Victus. Both phones are quite large, and quite slippery at the same time. They’re both fairly difficult to use with one hand, but the Pixel 7 Pro more so, due to its width. Using a case with both of them is a good idea. They do both feel good in the hand, though, and feel premium.

OnePlus 11 vs Google Pixel 7 Pro: Display

The OnePlus 11 features a 6.7-inch QHD+ (3216 x 1440) LTPO3 Fluid AMOLED display. This is a 120Hz panel, and it offers an adaptive refresh rate. It supports HDR10+ content, and gets up to 1,300 nits of peak brightness. We’re looking at a 20:9 aspect ratio here, and this display is protected by the Gorilla Glass Victus. The ppi is 525, in case you were wondering, and yes, this panel is curved.

google pixel 7 pro AM AH 02 1

The Pixel 7 Pro, on the flip side, has a 6.7-inch QHD+ (3120 x 1440) LTPO AMOLED display. It also offers an adaptive refresh rate of up to 120Hz, and supports HDR10+ content. This display gets a bit brighter than the OnePlus 11’s, as it can reach 1,500 nits at its peak. The display has a 19.5:9 aspect ratio, and it’s protected by the Gorilla Glass Victus. The ppi here is 512.

The bottom line is, both of these displays look really nice. They’re sharp, vivid, and have good viewing angles, The touch response is also quite good. You may notice the extra 200 nits of brightness under direct sunlight, from the Pixel 7 Pro, but in every other situation, 1,300 nits will be more than enough. The point is, both displays are excellent, and unless you’re really a nitpicker, you’ll be happy with either one. They’re smooth, well optimized, and offer those deep blacks as well. One thing to note is that the Pixel 7 Pro has better auto brightness.

OnePlus 11 vs Google Pixel 7 Pro: Performance

The Snapdragon 8 Gen 2 fuels the OnePlus 11, Qualcomm’s most powerful SoC to date. The phone also includes up to 16GB of LPDDR5X RAM and UFS 4.0 storage (the 128GB model has UFS 3.1). The Pixel 7 Pro, on the other hand, is fueled by the Google Tensor G2 SoC. It comes with 12GB of LPDDR5 RAM, and UFS 3.1 flash storage in all models. On paper, the OnePlus 11 is more powerful.

In day-to-day use, however, the difference in sheer power are not exactly noticeable. The Pixel 7 Pro does have great specs too, and it’s really well optimized. No matter if you’re browsing, consuming multimedia, processing images, or doing something else entirely, both phones can keep up without a problem. You will see a difference in gaming, though, if you’re playing more demanding games. The OnePlus 11 will do better than the Pixel 7 Pro in such situations. The Tensor G2 is not that great with intensive games. Both phones do get quite warm during longer gaming sessions, but the heat doesn’t directly impact performance. It’s not that excessive or anything like that.

OnePlus 11 vs Google Pixel 7 Pro: Battery

Both of these smartphones include a 5,000mAh battery pack. Considering that they have the same display sizes, and somewhat similar display types, you may assume that they offer similar battery life. Well, that’s not exactly true. The OnePlus 11 does do a lot better in the battery department. The Snapdragon 8 Gen 2 does have something to do with that, that’s for sure, but OnePlus’ optimizations probably play a part in it.

We’ve managed to go beyond the 10-hour screen-on-time mark while using the OnePlus 11, on several occasions. Even with some light gaming included. The phone offered outstanding battery life, to say the least. The Pixel 7 Pro was mostly closer to 7 hours of screen-on-time. On very rare occasions it went significantly above that mark. That’s still very good battery life, but it doesn’t look that way compared to what the OnePlus 11 offers.

The OnePlus 11 has much faster charging overall. It supports 100W (80W in the US) wired charging. It does not support wireless charging at all, though. The Pixel 7 Pro supports 23W wired, 23W wireless, and 5W reverse wireless charging. Do note that the OnePlus 11 does ship with a charger, while the Pixel 7 Pro does not.

OnePlus 11 vs Google Pixel 7 Pro: Cameras

Both of these smartphones have three cameras on the back, and one on the front. The OnePlus 11 features a 50-megapixel main camera, a 48-megapixel ultrawide unit, and a 32-megapixel telephoto (2x optical zoom) camera. The Google Pixel 7 Pro has a 50-megapixel main camera, a 12-megapixel ultrawide camera, and a 48-megapixel telephoto (5x optical zoom) unit. The camera setups and their performance is really good on both phones, actually.

OnePlus 11 Review AM AH 20

The OnePlus 11 camera is miles better than what the OnePlus 10T offered, at least in our experience. The phone actually manages to keep up with the Pixel 7 Pro, and even pull ahead in some aspects. In the daytime, the Pixel 7 Pro provides more contrasty images, while the OnePlus 11 pulls more light out of the shadows and provides more saturated shots. It’s a matter of personal preference, really, both results are quite sharp, and well-balanced. The Pixel 7 Pro is still the dynamic range king, but the OnePlus 11 is not far behind.

In low light, the difference is a bit more noticeable. The OnePlus 11 photos did look great, but a bit washed out compared to the Pixel 7 Pro. They’re not washed out in general, not at all, but looking at them side-by-side with what the Pixel 7 Pro provides, it looks that way. Indoors, the story is different, they do both do a great job, and look quite similar. When it comes to a telephoto camera, the Pixel 7 Pro is an easy winner. It does a noticeably better job.

In the video department, on the other hand, the OnePlus 11 does pull ahead. It does better in both daylight and low light. In low light, the results are close, but the OnePlus 11 manages to offer slightly more detail, and overall produce better results. It also grabs better video in most daylight situations, without any undesirable effects, such as the halo effect. Ultrawide cameras are really good on both phones, there’s not much to separate them. They’re both really great in the camera department.

Audio

When it comes to audio, they both come equipped with stereo speakers. Those speakers sound really good on both phones, and very similar at the same time. They’re not the best around, but they’ll do the trick for the vast majority of people. They’re loud enough, and provide more than enough audio detail.

Neither phone includes an audio jack, so you’ll have to rely on Type-C ports. If you prefer a wireless audio connection, the OnePlus 11 is equipped with Bluetooth 5.3, while the Pixel 7 Pro has Bluetooth 5.2. We did experience a couple of connection drops with the OnePlus 11 in the last 24 hours (at the time of writing this article), but those could only be isolated cases.


[ad_2]
Source link

New HomePod Teardown Shows Minor Improvements

0
[ad_1]

HomePod Tear-down

In a recent tear-down of the second-generation HomePod, a tech YouTuber showed how the new smart speakers differ from the original version. 

Last month, Apple released a video to announce a new full-sized HomePod that promises excellent audio quality and enhanced Siri capabilities. Furthermore, the new device’s design is the same as its predecessor — a cylinder with a mesh fabric exterior and backlit touch surface. 

Of course, Apple claimed that the internals is different. 

According to the Cupertino-based tech giant, the new HomePods now have an S7 chip for advanced computational audio and a U1 chip for Ultra Wideband features. The speaker also reportedly has four microphones, five tweeters, and a four-inch high-excursion woofer. 

But what else is different? Well, that’s what the YouTube channel Brandon Geekabit sought to uncover. 

The YouTube channel recently shared a complete tear-down video of the second-generation HomePod. Despite the similarities between the new device and its predecessor, there are a few notable differences. 

Second-Generation HomePod Tear-down: Exploring the Improvements 

One of the first differences we noticed during the tear-down was the power cable. The new HomePod has a removable Figure-8 power cord, unlike the previous model. That means users can conveniently replace the cable when necessary. 

Removing the top part of the speaker in the original HomePod model was challenging — even for the most skilled technicians. But that’s no longer the case. The reviewer quickly removed the top part after removing the mesh and the screws on the base. 

That’s not the only difference. 

The tear-down also confirmed the presence of five tweeters and four microphones in the smart speakers. While that’s a downgrade from the first-generation HomePod’s seven tweeters and six microphones, there’s no notable difference in sound quality.

Finally, the new HomePods now have a built-in sensor to measure room humidity and temperature. 

At the end of the video, the reviewer pointed out that the second-generation Apple smart speaker is easier to take apart and assemble than the original version. He, however, admitted that the device’s repairability hasn’t improved. 

Watch the full video here: 


[ad_2]
Source link