Galaxy Z Flip 6 users can force a desktop mode, but it’s not DeX

0
[ad_1]

It seems that the new Galaxy Z Flip 6 comes with a desktop mode, although it is not Samsung DeX. Officially, no model in the Galaxy Z Flip lineup has supported DeX, the desktop mode of flagship Samsung phones. However, there is a way to force a similar feature in the latest Z Flip.

As spotted by Android expert Mishaal Rahman, Galaxy Z Flip 6 users can enable the “force desktop mode” option in One UI 6.1.1 settings to get an experience of this kind, but it is different from DeX. According to the report, after enabling the option and connecting the device to an external screen, it will display a desktop-style UI. For reference, this option does not work on the Galaxy Z Flip 5.

There’s a desktop mode on the Galaxy Z Flip 6, but it’s still not Samsung DeX

This desktop UI is less capable than the official DeX experience. The report describes the UI as an intermediate point between Android’s base desktop mode and Dex. It lacks some basic features, like a taskbar, although the multi-window feature seems to work decently, even allowing you to resize and move app windows.

Anyway, in its current state, this forced desktop mode is kind of buggy. For example, if you try to use the split-screen feature, it will be displayed on the phone screen instead of the external screen. Also, the “maximize” and “minimize” buttons for windows do not work. Currently, it is unknown if Samsung will polish this Galaxy Z Flip 6 “forced” desktop mode in the future. However, it would be a welcome addition for fans of these foldables.

Samsung Galaxy Z Flip 6 force desktop mode
Galaxy Z Flip 6 “desktop mode”

Official word on the lack of DeX support for Z Flip devices

According to Samsung, the lack of DeX support in the Galaxy Z Flip lineup is due to thermal issues. It seems that the company found that the particular structure of these phones results in overheating when using DeX. In fact, no Z Flip model even supported video output until the arrival of the Galaxy Z Flip 5.

Although the Z Flip 5 gained video output, it still did not support DeX. For now, owners of the new Galaxy Z Flip 6 looking for a pseudo-desktop experience will have to settle for the current buggy and incomplete version.


[ad_2]
Source link

Here’s more proof that Galaxy Tab S10 series uses MediaTek chip globally

0
[ad_1]

Samsung recently revealed that its Galaxy Tab S10 series would arrive before the end of this year. Rumors say the new flagship tablets will run a MediaTek chipset globally, a surprising switch from Qualcomm’s Snapdragon processors. We now have more proof of this rumored switch. After the Galaxy Tab S10+, the Galaxy Tab S10 Ultra has surfaced on Geekbench with MediaTek’s Dimensity 9300+ flagship SoC.

Galaxy Tab S10 Ultra spotted with MediaTek Dimensity 9300+

Last month, the US version of the Galaxy Tab S10+ (model number SM-X828U) surfaced on the popular benchmarking platform Geekbench running the Dimensity 9300+. The same chipset has now been spotted on the global version of the Galaxy Tab S10 Ultra (SM-X926B). Both devices appeared with 12GB of RAM and scored 2,141 in single-core Geekbench tests. Multi-core scores are 6,952 and 5,533, respectively.

But more than the scores, these listings are proof that Samsung’s next-gen flagship tablets will feature a MediaTek chipset globally. We have yet to see the base Galaxy Tab S10 on the benchmarking platform. There are rumors that the company might cancel the base model and only launch Plus and Ultra. But if it exists, it is likely to follow its siblings to the MediaTek camp, leaving the Snapdragon camp for good or worse.

Samsung Galaxy Tab S10 Ultra MediaTek Dimesity 9300 Plus Geekbench

Theoretically, the Dimensity 9300+ is on the same page as the Snapdragon 8 Gen 3, the successor to last year’s Snapdragon 8 Gen 2 that powered the Galaxy Tab S9 series. Both new chipsets are produced on TSMC’s 4nm process node and feature identical CPU speeds. In fact, they go neck on neck in almost every area. Even the real-world performance has been comparable, so it might not be a bad switch at all.

That said, it’s the first time Samsung is using a MediaTek chipset in its flagship tablets. Switching from Snapdragon probably wasn’t a straightforward decision. Something must have weighed in favor of the Dimensity this time around. Perhaps it’s the cost. Qualcomm’s flagship chipsets are costlier than MediaTek’s, so the Korean firm might be saving a few bucks while still offering a competitive processor in the Galaxy Tab S10 series.

Both chipsets will get a successor later this year

MediaTek and Qualcomm are hard at work on their next-gen Dimensity 9400 and Snapdragon 8 Gen 4. These chipsets will arrive later this year. It remains to be seen if Samsung will launch the Galaxy Tab S10 series before the two chipmakers introduce their upgraded solutions. The new tablets run Android 14 out of the box, so the company might not delay their release until late 2024. Expect more leaks in the coming months.


[ad_2]
Source link

Chinese Vigorish Viper Exploits DNS and Football Sponsorships for Illegal Gambling

0
[ad_1]

Unmasking Vigorish Viper: The Elusive Cybercrime Network Behind Illegal Gambling. Learn how this sophisticated group uses clever DNS tactics and deceptive sponsorships to dominate the online gambling black market. Discover the threats they pose and how experts are fighting back. 

A research report by cloud networking and security services giant Infoblox reveals the continued dominance of a sophisticated cybercrime network called Vigorish Viper in the illegal online gambling world.

This network has carved a niche for itself by facilitating access to gambling sites in Southeast Asia, often targeting residents of Greater China and Europe. Reportedly, it has been operating since 2018 and was discovered by Infoblox in 2023.

Infoblox Threat Intel reports that Vigorish Viper is linked to Chinese organized crime and uses advanced technology suite to exploit the global $1.7 trillion illegal sports gambling economy. The group’s name comes from the gambling world’s exorbitant fees on unlucky bettors. Moreover, its technology suite includes software, DNS configurations, website hosting, payment systems, and mobile apps. 

It is worth noting that Chinese groups are quite active in illegal gambling-related operations. In November 2023, Qurium Media, a Swedish nonprofit provider of digital security solutions, exposed a major operation in which Chinese scammers created cloned versions of legitimate websites, redirecting visitors to gambling sites.

Infoblox’s research highlights Viper’s cunning use of the Domain Name System (DNS). DNS acts as the internet’s phonebook, translating website names into the numeric addresses, computers use to connect.  Vigorish Viper exploits this system by maintaining a network of over 170,000 active domain names and DNS CNAME traffic distribution systems to evade detection and law enforcement. 

The group has connections to the infamous Yabo Group (aka Yabo Sports or Yabo rebranding to Kaiyun Sports and later Ponymuah), possibly the largest illegal gambling operation targeting Greater China.

The Yabo Group is embroiled in controversies over European football club sponsorships, including Manchester United, being used to illegally promote unregulated gambling sites in Asia. 

Experts believe the DNS configurations and software used by Vigorish Viper’s network strongly resemble those employed by Yabo. This suggests a potential shared infrastructure or a close technical collaboration between the two entities.

Chinese Vigorish Viper Exploits DNS and Football Sponsorships for Illegal Gambling
Vigorish Viper’s infrastructure (Screenshot: Infoblox)

“We are highly confident that Vigorish Viper’s technology suite was developed by the Yabo Group,” the Infoblox report read.

The report unveils a surprising tactic: leveraging European football sponsorships. Vigorish Viper secures advertising space on jerseys or at stadiums, subtly promoting illegal gambling sites to unsuspecting European audiences.

This strategy exploits the popularity of European football, particularly in Southeast Asia, where such sponsorships might go unnoticed by European authorities. Tens of seemingly unrelated gambling brands use Vigorish Viper technology, operating more like franchise branches, highlighting the importance of a holistic view of DNS threats.

“This work is particularly important because it connects the physical crimes of human trafficking, money laundering, and fraud, to online crime in a way that hasn’t been done before.”

Infoblox Threat Intel’s Vice President, Dr. Renée Burton.

  1. Chinese APT Posing as Cloud Services to Spy on Cambodia
  2. Chinese APT spying on Vietnam military with FoundCore RAT
  3. Money Transfer XHelper App is A Money Laundering Network
  4. Chinese APT Slid Fake Signal, Telegram Apps onto App Stores
  5. Hacks Surge 325% in Philippines Amid South China Sea Standoff

[ad_2]
Source link

Buy the Anker 735 USB-C Charger for only $29

0
[ad_1]

If you’re in the market for a new USB-C wall charger, then you’ll want to look no further than the Anker 735. This is a three-port USB-C charger with two USB-C ports and a USB-A port for only $39.99 (regularly $55.99). With many smartphones coming without a wall charger these days, this is a great purchase.

Anker is well-known for its chargers, and this is another great one. I actually have one myself and use it when I travel. Mostly because it is pretty tiny, it has a foldable plug and can charge multiple phones at the same time, which is super useful when traveling.

As if that wasn’t a big enough reason to buy this charger, it is also a GaN charger – or Gallium Nitride. What this means is that you’re going to get a much smaller charger that can charge faster. Anker claims that this is about 53% smaller than most other 65W chargers. This means that when you plug it into a surge protector, it won’t cover other outlets.

It’s a 65W charger, but it can actually push out 65W from a single outlet. However, the more you plug in, the slower it’ll get. If you use all three outlets, the USB-C1 will charge at 40W max, USB-C2 will charge at 12W max, and the USB-A will charge at 12W max – that does only equal 64W, however, as there are some losses expected.

If you do a lot of traveling or need a new charger for your office, bedroom, or anywhere else, this is a great pickup.

Buy at Amazon


[ad_2]
Source link

WhatsApp nears rollout of username for secure messaging

0
[ad_1]

WhatsApp is getting closer to rolling out its username feature. The new feature allows you to have WhatsApp conversations without sharing your phone number, adding a layer of privacy to your messaging experience. This much-needed privacy tool doesn’t have a release timeline yet.

WhatsApp continues to develop its username feature behind the scenes

The Meta-owned messaging app has been working on usernames for a long time. We have been tracking its developments since early last year, with several iterations of the feature showing up in early builds of WhatsApp. The idea is to let you message anyone without needing to give away your phone number, which can be risky at times. Telegram already does that.

WhatsApp is taking its own sweet time to refine this feature before a public rollout. Since it is fundamentally changing how you can connect with other users on the platform, the company likely wants to ensure proper measures have been put in place to prevent potential misuse or functional breakdown. In the meantime, it continues to test various UI designs for the feature.

The folks over at WABetaInfo, the ultimate destination for all things WhatsApp, recently discovered the in-development feature in a WhatsApp Web update. A screenshot shared by the publication shows a redesigned interface to create a username for the app. “Your friends and family can contact you on WhatsApp using this username,” the official description reads. “To protect your privacy, your username will be shown in place of your phone number.”

WhatsApp username feature development

WhatsApp adds that “only people that know your username will be able to contact you.” Like phone numbers, every username must be unique for you to reach the right person. This means you cannot choose a username that has been already taken by someone else. This is similar to how platforms like X (Twitter) and Instagram usernames work. WhatsApp will let you check for the availability of your desired username when setting up the feature.

A future WhatsApp update should bring the feature

While a release date is missing, the latest developments suggest WhatsApp isn’t too far off rolling out usernames. A forthcoming update for the app should bring it. Beta users will probably receive the feature first, followed by a public rollout. You can check for WhatsApp updates on the Play Store or App Store. Stay tuned for more information about this and other new features the messaging giant has in the works.


[ad_2]
Source link

Google Play Protect may get “Rescan” button for easier app security

0
[ad_1]
Google Play Protect, the security feature within the Google Play Store, is getting a potential upgrade with the addition of a “Rescan” button. This feature, still under development, could offer users the ability to initiate another scan for harmful apps without having to first uninstall those flagged in previous scans.Currently, Play Protect scans devices for apps that might violate Google’s Unwanted Software Policy. If such an app is found, users are alerted and given the option to uninstall it. However, the current system requires the removal of the flagged app before another scan can be initiated. This can be frustrating if the app was mistakenly identified as harmful.

The upcoming Rescan button aims to address this issue by allowing users to re-scan their devices without having to uninstall any apps. This could be particularly helpful for those who frequently install apps from third-party sources, which are sometimes incorrectly flagged by Play Protect.

Play Protect old UI versus new UI with rescan button | Images credit — Android Authority

While the Rescan button isn’t currently available in the Play Store, it was discovered in version 41.9.17 during an APK teardown. APK teardowns can offer insights into potential future features by examining work-in-progress code, but it’s important to note that not all features found in teardowns necessarily make it to a public release.

Play Protect itself is an essential tool for Android users, helping to safeguard their devices from potentially harmful apps. It’s a free service that’s built into the Play Store and runs automatically in the background. In addition to scanning for harmful apps, it also offers other security features, such as Safe Browsing for Chrome, Find My Device, and app permissions management.

It’s unclear when, or even if, the Rescan button will officially roll out to users. However, if it does, it could be a welcome improvement to Play Protect, providing users with more flexibility and control over their device security.


[ad_2]
Source link

Data Breach Increases by Over 1,000% Annually

0
[ad_1]

The Identity Theft Resource Center® (ITRC), a nationally recognized nonprofit organization established to support identity crime victims, released its U.S. data breach findings for the second quarter (Q2) and the first half (H1) of 2024.

The results are staggering, revealing a dramatic increase in data breach victims, with a 490 percent rise compared to the first half of 2023.

This alarming trend underscores the urgent need for enhanced data and identity protection measures across all sectors.

According to the ITRC, there were 732 publicly reported data compromises in Q2 2024. While this represents a 12 percent decrease from the previous quarter (838), the overall picture for the year’s first half is far more concerning.

The ITRC tracked 1,571 compromises in H1 2024, marking a 14 percent increase compared to H1 2023, which ended with a record number of compromises (3,203).

Explosive Growth in Victim Numbers

The number of data breach victims in H1 2024 reached an unexpected 1,078,989,742, a 490 percent increase from the 182,645,409 victims reported in the first half of 2023.

Many of these victims were impacted by breaches announced or updated in Q2. For instance, Q1 saw 37,677,141 victims, while Q2 witnessed a staggering 1,041,312,601 victims. Several high-profile breaches contributed to these alarming numbers.

Prudential Financial initially reported a breach in February 2024, affecting 36,000 victims. However, in June 2024, this figure was revised to 2.5 million.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Similarly, Infosys McCamish System revised its victim count from approximately 84,000 in February to 6 million.

Credential stuffing attacks targeting the Snowflake cloud service customers accounted for over 900 million victims reported in Q2.

The estimated number of H1 victims is 1+ billion, not including those affected by the Change Healthcare supply chain attack.

Company executives predict this breach will impact “a substantial number” of U.S. residents, further deepening the alarming situation.

Expert Insights

Eva Velasquez, President and CEO of the Identity Theft Resource Center, emphasized the gravity of the situation.

The H1 2024 Data Breach Analysis findings are eye-opening for many reasons. The estimated victim count is up significantly, primarily due to a small number of substantial data events skewing the numbers.

What is clear, though, is the fact the trends we saw emerge in 2023 that led to a record-breaking year in compromises are continuing into 2024.

Velasquez added that the trends accelerated through the year’s first half in some cases, such as the number of organizations impacted by supply chain attacks and the number of entities that did not list the root cause of a breach.

The takeaway from this report is simple: Every person, business, institution, and government agency must view data and identity protection with a greater sense of urgency.

Key Findings

The H1 2024 Data Breach Report & Analysis revealed several critical trends:

  • Unspecified Causes: “Not Specified” remained the most reported cause of a cyberattack listed in breach notices issued in H1 2024, accounting for 68 percent of cases.
  • Industry-Specific Attacks: Attacks against Financial Services companies surged by 67 percent year-over-year, making it the most compromised industry in H1 2024, followed by Healthcare companies. Reported compromises increased in ten of the 16 industries tracked by the ITRC. However, Healthcare entities saw a 37 percent year-over-year decrease in reported compromises, dropping from the most targeted industry to the second most frequently compromised for the first time in six years.
  • Driver’s License Data Theft: The increased value and use of stolen Driver’s License information were evident. Driver’s License data was stolen in 25 percent of data breaches based on notices issued in H1 2024. This trend reflects a post-pandemic shift towards using Driver’s Licenses for identity verification on a broader variety of transactions. Data breaches involving Driver’s License data rose from 198 instances in pre-pandemic 2019 to 636 in 2023 and 308 through June 30, 2024.

The ICRC’s H1 2024 Data Breach Report & Analysis highlights the urgent need for robust data protection measures.

As data breaches continue to rise, affecting millions of individuals and numerous industries, safeguarding personal information cannot be overstated.

The ITRC remains committed to providing support and guidance to victims of identity crime and advocating for stronger data security practices.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.


[ad_2]
Source link

Heritage Foundation data breach containing personal data is available online

0
[ad_1]

The Heritage Foundation this month denied that it had suffered an earlier system breach and the subsequent leaking of internal data. But the organization had to admit that cybercriminals gained access to an archive of Heritage’s affiliated media site, The Daily Signal, dating back to 2022. That archive reportedly contained content of Heritage and non-Heritage contributors’ personal information.

Either way, a Malwarebytes review of the data shows over half a million usernames and passwords.

At the heart of the back-and-forth claims are an alleged breach against the Heritage Foundation that SiegedSec, a politically motivated group, claimed to have carried out on July 2, 2024.

The group said it released the data in response to Heritage Foundation’s Project 2025, a set of proposals that aim to give Donald Trump a set of ready-made policies to implement if he wins this fall’s election in the United States.

The stolen data includes email addresses, usernames, passwords, phone numbers, IP addresses, full names, and may contain other compromised user details.

SiegedSec also claimed to have over 200 gigabytes of additional “mostly useless” data, which they do not intend to release.

The discrepancy in the claims lies in the fact that SiegedSec said it obtained passwords and other user information for “every user” of a Heritage Foundation database. Heritage responded in saying that:

“An organized group stumbled upon a two-year-old archive of The Daily Signal website that was available on a public-facing website owned by a contractor.”

A possible cause for the discrepancy is an earlier cyberattack on the Heritage Foundation in April of 2024 which resulted in a shutdown of the organization’s network to prevent further malicious activity. But the nature of that attack is unclear and it is impossible to say whether any data was stolen.

Some sources, however, have reported that it was in fact a ransomware attack by the Play Group, which means that an attempt to steal data is still a possibility.

Protecting yourself after a data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

Check your exposure

Even if you were not amongst the victims of the Heritage leak, it’s likely you’ve had other personal information exposed online in previous data breaches. You can check what personal information of yours has been exposed with our Digital Footprint portal. Just enter your email address (it’s best to submit the one you most frequently use) to our free Digital Footprint scan, and we’ll give you a report.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.


Summer mega sale

Go into your vacation knowing you’re much more secure: This summer you can get a huge 50% off a Malwarebytes Standard subscription or Malwarebytes Identity bundle. Run, don’t walk!


[ad_2]
Source link

J.D. Vance wants to break up Big Tech, Starting with Google

0
[ad_1]

Last week, the Republican nominee for US President, Donald Trump, chose his running mate. Which is Ohio Senator J.D. Vance, and now we’re starting to learn quite a bit more about him, including the fact that he wants to break up Google.

Earlier this year, Vance tweeted that it’s time “to break Google up”. He went on to say that “this matters far more than any other election integrity issue. The monopolistic control of information in our society resides with an explicitly progressive technology company.”

Why is Vance so against big tech, including Google? Well one of the reasons centers around the perceived notion that companies like Google have control over what people can say and post online. He has also alleged that voters will see results on Google that could be “explicitly biased towards Democrats”, which Vance says is a “threat to democracy”.

Even if Trump-Vance wins the election this Fall, it’s not a foregone conclusion that Google will be broken up

If the Trump-Vance ticket wins in November, it doesn’t mean that Google will be broken up. But keep in mind that this is a bipartisan issue. In fact, Massachusetts Senator Elizabeth Warren ran her 2020 Presidential Campaign on breaking up big tech and making the rich pay their fair share of taxes. So this is an issue that both Democrats and Republicans agree on – which is pretty rare.

However, having Vance in the White House could lead to more discussion on breaking up big tech companies like Google in the future. Though, Vance could also have a conflict of interest here since he is an investor in the video-sharing platform Rumble. Which has filed multiple lawsuits against Google. Those lawsuits center on Google favoring YouTube in search results. Of course, this is not the first time we’ve seen Google favor its own products over competitors in its search results, and likely won’t be the last.

As always, with a presidential election looming, the threat of breaking up big tech is a big topic. Now, the real question is, will it be more than just talk this time?


[ad_2]
Source link

Galaxy Ring works with any Android phone, may soon support iOS

0
[ad_1]

Samsung‘s revolutionary new smart ring, the Galaxy Ring, is compatible with non-Samsung Android smartphones. You can use it with Android phones from any other brand, though you need to create a free Samsung account. The company might also add support for iPhones later.

The Samsung Galaxy Ring works with any Android phone

Launched alongside the Galaxy Z Fold 6 and Flip 6 earlier this month, the Galaxy Ring is a revolutionary wearable device from Samsung. The tiny gadget that fits around your finger is a comprehensive daily health and fitness monitor. It boasts a wide range of features to inform you about your health stats so you can make better choices. The ring is substantially less intrusive than a smartwatch yet offers basically the same features.

During the launch event on July 10, Samsung made it look like the Galaxy Ring only works with its phones. Official product pages and marketing materials implied the same. Nowhere did the firm mention anything about its compatibility with Android phones from other brands, at least not clearly enough for consumers to understand. Unsurprisingly, some reviewers took its word and didn’t bother testing the ring with non-Samsung phones.

However, YouTuber M. Brandon Lee discovered that the Galaxy Ring works fine with their Nothing phone. This means it should be compatible with any other Android phone, no matter who made it. Like on Galaxy devices, you must install the Galaxy Wearable app, connect the wearable to the device via Bluetooth, and go through the setup process to get it up and running. You will probably need Samsung Health and SmartThings too.

These apps require you to sign in with a Samsung account. If you don’t already have one, you can create a new account for free in a jiffy. It’s worth noting that some features may not be compatible with non-Samsung phones, particularly AI-powered features like Energy Score and health recommendations. These features on the Galaxy Ring rely on the company’s Galaxy AI available on flagship phones, tablets, and foldables.

Samsung could add iPhone support to the ring later

During media briefings and Q&A sessions for the Galaxy Ring, Samsung didn’t explicitly say that the ring wouldn’t support iPhones. Instead, it said it had no word on iOS support for the wearable at that time. An industry insider claims they were “originally told that there would be iOS support, though not necessarily at launch.” It appears Samsung plans to break into the iOS ecosystem with the Galaxy Ring. Hopefully, it won’t take long to push this much-awaited update.


[ad_2]
Source link