Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic

0
[ad_1]

Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial of service (DoS).

This high-severity vulnerability, which has a base score of 7.4 and is tracked as CVE-2024-20276, is triggered by improper handling of process-switched traffic. 

Cisco IOS (Internetwork Operating System) is a set of proprietary operating systems (OSes) that run on Cisco Systems hardware, such as routers, switches, and other network devices.

Cisco IOS comprises essential functionalities such as interface configuration, network management and monitoring, routing, security, switching, and quality of service (QoS).

Details Of The Cisco IOS Vulnerability

This Cisco IOS Software flaw for Cisco Catalyst 6000 Series switches could allow an unauthenticated, local attacker to force an unexpected reload on a vulnerable device.

The vulnerability stems from the improper handling of process-switched traffic.

An attacker may take advantage of this flaw by directing malicious traffic to a vulnerable device. 

If the exploit is effective, the attacker could trigger a denial of service (DoS) issue by forcing the compromised device to reload.

“An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition”, Cisco said in its advisory.

Affected Products

Suppose any of the following Cisco products are running a vulnerable version of the Cisco IOS software and have activated port security, device classifier, or authentication, authorization, and accounting (AAA). In that case, they are susceptible to this vulnerability:

  • Catalyst 6500 Series Switches with Supervisor Engine 2T or 6T
  • Catalyst 6800 Series Switches with Supervisor Engine 2T or 6T

Use the show running-config | include interface|port-security command to find out if a device has port security setup.

This vulnerability affects a device if port security is enabled on an interface.

Use the show running-config | include device classifier command to see if a device has device classifier configured.

The device is susceptible to this vulnerability if the command returns output.

Use the show running-config | include system-auth-control|interface|port-control|mab command to find out if a device is configured with AAA.

This vulnerability affects a device if AAA is enabled on the interface.

Products Not Vulnerable

The following Cisco products are unaffected by this issue, according to Cisco

  • IOS XE Software
  • IOS XR Software
  • Meraki products
  • NX-OS Software

Cisco has verified that the following Cisco IOS platforms are unaffected by this vulnerability:

  • Catalyst 1000 Series Switches
  • Catalyst 2000 Series Switches
  • Catalyst 3000 Series Switches
  • Catalyst 4000 Series Switches
  • Catalyst 9000 Series Switches

There are no workarounds to address this vulnerability. Users are encouraged to upgrade to the appropriate fixed software release to mitigate the risk posed by this vulnerability.

Cisco has made these updates free for customers with service contracts, accessible through their usual update channels.

For customers without service contracts, upgrades can be obtained by contacting the Cisco Technical Assistance Center (TAC), with the product serial number and the URL of the advisory as evidence of entitlement to a free upgrade.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here


[ad_2]
Source link

The Galaxy Z Fold 6 may have the same camera from last year

0
[ad_1]

Right now, we’re getting a tidal wave of new information surrounding Samsung’s upcoming Z Fold smartphone. While we expect these phones to be an improvement over last year’s model in several ways, it appears that one area of the phone will not see any change. According to reports, the Galaxy Z Fold 6 may have the same camera setup as last year’s foldable phone.

One area where Samsung’s Galaxy foldables haven’t been impressing audiences is the camera. These phones usually fall behind in the camera department, and this is something that people have commented on ever since the beginning. The cameras are never bad overall, but they’re always underpowered compared to the latest Galaxy S phone.

The main thing that annoyed people was the fact that the Galaxy foldable phones are so expensive compared to other flagship phones. So, it just feels weird having underperforming cameras on a nearly $2,000 phone.

The Galaxy Z Fold 6 might have the same cameras from last year’s foldable phone

Even though this news is coming from a notable leaker, you’ll still want to take this news cautiously. We’re not dealing with official information, and there’s always a chance that new information could arise before the official launch.

According to notable leaker Ice Universe, Samsung may fit the Galaxy Z Fold 6 with the same camera package present in the Galaxy Z Fold 5. It notes that everything could be the same from the main camera to the under-display camera.

Last year’s Galaxy Z Fold 5 (Review) had a 50-megapixel main camera sensor with an F/1.8 aperture, 10-megapixel 3x telephoto camera with an f/2.4 aperture, 12-megapixel ultrawide camera with an f/2.2 aperture, 10-megapixel external selfie camera with an f/2.2 aperture, and 4-megapixel under-display camera with an F/1.8 aperture.

The cameras on this phone were good, but they weren’t befitting of the high price tag. Well, it appears that the Galaxy Z Fold 6 will mirror these camera specs and be yet another step behind the top flagships of the year.

Better camera specs might come, but they could cost you

Along with rumors of the Galaxy Z Fold 6 coming, we’ve also been following rumors surrounding the Galaxy Z Fold 6 Ultra model. As the name suggests, it will be more powerful and more expensive than the standard Galaxy Z Fold 6 model. News about this Ultra model is still very scarce, so we don’t have much to go on. However, it’s possible that Samsung could fit better camera specs into the Ultra model and leave the standard model with last year’s specs.

We will have to wait for more information on that model.


[ad_2]
Source link

What Is Nest? Everything You Need To Know

0
[ad_1]

Google and Nest are two brands that are commonly associated with the modern smart home market. Despite both companies being involved in the smart home industry, they are not the same brand. This article aims to provide a detailed explanation of Nest and its products, as well as answer some of the most frequently asked questions about them. It will also provide tips on how to maximize the use of Nest products that you already own.

What’s the difference between Nest and Google?

Summarily, Nest is a smart home-specific company operating under the more familiar brand Google LLC, which serves as its parent company. Of course, Google LLC is under the parent company Alphabet, But it started out on its own footing.

Prior to merging fully with Google in 2018, Nest had its own endeavors. That began with the AI-powered Nest Learning Thermostat in 2011 and was followed up by carbon monoxide and smoke detectors in 2013. Those were all under the “Nest Protect” branding. The company acquired Dropcam and Revolv in 2014. While it adopted Dropcam products into its own lineup, it effectively shelved Revolv products.

Also, prior to fully merging with Google, the company took its Nest Learning Thermostat to its 3rd Generation in 2015. And released a subsequent follow-up with the Nest Thermostat E in 2017. A new Nest Protect-branded smoke alarm and carbon monoxide detector launched in 2015 as well as the original Nest Cam. That was followed by the Nest Cam Outdoor in 2016 and the updated Nest Cam IQ in 2017.

Under Google, those devices were followed by various smart home gadgets, from the latest Nest Thermostat to the Nest Cam and Doorbell (Battery).

Now, Google and Nest are effectively the same company, with Nest operating as a subsidiary. So the biggest difference between Nest and Google is that some older Nest products connect to both the Nest app and Google Home app for smart home integration while the latest cameras only require the Google Home app and don’t appear in the Nest app.

Nest, of course, is also responsible for the Nest Aware service. That’s a value-added service for all Nest-branded products. It adds features such as noise detection for smoke alarms and breaking glass. It also increases the amount of time and which events are recorded and stored. But we’ll dive into that a bit later on in this explainer.

What are the current Nest products?

nest video doorbell battery AH

Now, Nest products have been released steadily since the company’s founding. But the current run of products is quite a bit more extensive than where Nest started. Especially since Google has begun to place all of its smart home products under the Nest brand. This means that there are now no fewer than ten categories for its products if you navigate over to the Google Store page.

For instance, for smart home entertainment, Nest now has the Speakers and Streaming categories. The latter of which houses the Google-branded Chromecast and Chromecast with Google TV. While the former category houses its Nest Mini (2nd Gen) speaker and Nest Audio speakers.

What’s more, the apparent trend of featuring two products in those categories continues across the remaining categories. So, for example, in Display-centric smart home hubs, Nest has its smaller Nest Hub (2nd gen) and its full-size Nest Hub Max. Under doorbells, it has a new wired and wireless version of its doorbell. And that holds for its cameras as well. Although it also still sells a combination floodlight and camera package.

There are additionally two home thermostats — including an older “Learning” thermostat and a newer model. It will also provide a temperature sensor to help HVAC systems better handle managing multi-level homes.

All of which is to set aside the company’s two mesh internet offerings and a plethora of accessories for powering, protecting, or repositioning the products. And, of course, without consideration for partnered products such as the Nest x Yale Lock.

Conversely, the company also sells Nest Protect smoke & CO alarms, installation services, and consultation services.

Finally, Nest does have a couple of Mesh WiFi Systems available, there’s Nest WiFi and Nest WiFi Pro. The main difference between the two is WiFi 6E being available on the “pro” model.

Of course, all of these products are available for control through the Google Home app on web, Android and iOS. Making it easier than ever to control everything in your home.

Do Nest cameras record all of the time, and how do you know?

Whether Nest cameras record all of the time depends entirely on the subscription level chosen and on the camera that’s been selected. The newest, battery-powered cameras cannot record all of the time. Even when wired up to a secondary source to charge the battery — effectively making them ‘wired’. They can be viewed live at any time and record events. But they cannot record 24/7 video feeds.

Older cameras can and do record all of the time when a Nest Aware Plus subscription is in place. With up to 10 days of recordings saved, as we’ll discuss in the next segment here.

Equally importantly, all Nest cameras indicate on-device when they are recording. Namely, via the built-in LED lights. Solid green lights on the cameras themselves indicate that a recording is being made. So, for example, when a camera is recording at all times via a Nest Aware Plus subscription, the light stays on. Or when an event is being recorded.

A blinking light, conversely, indicates that users with access to the cameras are watching. The light comes on anytime the live video is being viewed.

Do you need to pay for Nest?

what is nest everything do you need nest aware segment DG AH 2022

One important fact to note about Nest products is, in fact, that they don’t typically come with added after-costs; namely, subscriptions.

Nest does have a Nest Aware subscription available. However, for most Nest products, simply paying for the product will give you its full range of functionality. Or very close to it. For instance, if only Nest speakers, Chromecast, or WiFi gadgets are in use, there’s no benefit to a subscription service. The same can be said of Thermostat products.

For the Nest Hub-branded smart displays, improvements are available if the video recording features are turned on. For facial recognition, keeping track of “seen” faces and activity zones. Or if you’d like your Nest Hub to recognize sounds like a smoke alarm or glass breaking — or more intelligent motion tracking since basic tracking is included out of the box.

The full range of benefits for cameras is similar to those available with the Nest Hub Max, which is camera-enabled, for instance. With added benefits for recording and storing footage, too. For instance, Nest Aware Plus gets users 10 days of continuous 24/7 video history. And 60 days of event history. They’d just have 30 days of event history with Nest Aware and either 5, 10, or 30-day continuous video history with the original, 1st-Gen Nest Aware subscription.

That, in turn, feeds into other advanced features that wouldn’t otherwise be available, such as saving and sharing video clips. But a subscription is absolutely not going to be necessary for most buyers, especially with e911 services included for both subscription levels. And, even then, it isn’t overly expensive. Starting at just $6 per month for Nest Aware or $12 per month for Nest Aware Plus. With a 30-day trial available for those who are just getting started.

How do you use Google Nest products & do you need to use the Nest app?

Now, as far as access, features, and functionality, some Nest products do require users to access them via the Nest app. Around half of them, in fact.

For instance, the latest Nest Thermostats, smoke alarms, door locks, temperature sensors, and services such as Nest Aware and installation. Older camera models, excluding the latest “(Battery)”-designated models, require the app too.

Speakers, the newest cameras and doorbells, the mesh Wi-Fi gadgetry, and even the smart home hub displays all use Google Home instead. As do Google Chromecast and Chromecast With Google TV. However, for those latter two products, the app is mostly just for setup.

So the biggest difference between Nest and Google is that some older Nest products connect to both the Nest app and Google Home app for smart home integration. But others simply use the Google Home app. And future products will likely continue that trend.

That’s made using Nest products less intuitive than some might have hoped. But, fortunately, we have an extensive list of how-to guides to help get started with some of the interactions users will access most commonly.


[ad_2]
Source link

Google might bring AI email summaries to Gmail on Android

0
[ad_1]

Artificial intelligence is becoming a bigger and bigger part of our online and mobile world, and it is happening pretty fast. One popular feature powered by generative AI is summarization, which lets users get quick summaries of articles, docs, and even phone calls. Now, it seems Google is gearing up to introduce email summarization in the Gmail app.According to PiunikaWeb, teaming up with AssembleDebug, Gmail on Android might be in for a smart upgrade that will give you the scoop on lengthy emails using AI, saving you the hassle of sifting through all the details. In version 2024.03.31.621006929 of the Gmail app, they spotted a new button called “Summarize this email.”
Just so you know, Google already offers email summaries for users of its Gemini for Workspace suite, but it is currently only available in the web version of Gmail. So, it is not exactly shocking that it is now heading to the Android app. This new feature could be quite handy for Gmail on smartphones, especially for those long emails or ones jam-packed with info.Plus, this new button on the mobile app looks like it might be for everyone, not just Workspace suite users. As seen in the screenshot above, the button pops up right under the subject line. But since the feature is still in its early testing phase, tapping the button doesn’t do anything yet. It is likely that tapping it will bring up a little pop-up window at the bottom of the screen with a summary of the email in bullet points. Kinda like how it works on the web, but instead of the side panel, we’d get this handy pop-up.

In addition to the “Summarize this email” button, the tipster also noticed a Gemini entry in the three-dots menu on the top bar. Right now, it doesn’t do anything – it just opens up a blank sheet with the Gemini logo and some text.

Google’s Gemini is LLM (Large Language Model). It is trained on large amounts of publicly available data and can communicate and generate human-like text in response to a wide range of questions.

In other news, just recently, rumors started swirling that reply suggestions from Gemini might be making their way to Gmail on Android soon, too. Stay tuned for updates!


[ad_2]
Source link

Chinese Hackers Using AI Tools To Influence Upcoming Elections

0
[ad_1]

By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in election campaigns.

Large language models (LLMs) can also enable them to produce realistic but misleading content at scale, thereby exacerbating division and fake news on social media.

Recently, cybersecurity analysts at Microsoft discovered that Chinese hackers are actively exploiting AI tools to influence the upcoming elections.

State-sponsored actors leverage evolving tactics to advance geopolitical agendas. Beijing employs fake social media accounts and AI-generated content to sow discord and influence U.S. elections.

Besides this, North Korea has increased the pace of cryptocurrency theft and supply chain attacks with AI to fund military expansion.

Document
Stop Advanced Phishing Attack With AI

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .

The most recent Microsoft East Asia threat report highlights these facts as further evidence that nation-state threats are ever-evolving.

The coordinated Chinese campaign on social media to influence the U.S. elections is going, with fake accounts pretending to be voters and making louder content about climate change, immigration, and race via original as well as recycled posts.

Chinese sockpuppets solicit opinions on political topics (Source – Microsoft)

In recent times, “polling” has been employed to establish voter opinion on controversial matters that could allow for customization of information operations during peak seasons associated with the presidential election cycle. 

China’s IO in the US exploited events to serve strategic interests by casting a bad light on America.

They alleged that the U.S. intentionally started Maui wildfires, insinuated that the U.S. may have caused a Kentucky train derailment, and accused the U.S. of water poisoning for power sustenance. 

Such methods also included calling into question Japan’s wastewater disposal system as part of efforts to undermine IAEA findings.

AI-Generated Memes (Source – Microsoft)

The 2024 Taiwanese presidential election marked the first known instance of AI-generated content being used in foreign influence operations by China-affiliated Storm-1376. 

Videos published by Storm-1376 used AI-generated voice recordings of Terry Gou (Source – Microsoft)

They uploaded what appeared to be computer-generated audio of former candidate Terry Gou supporting someone else, which was quickly removed from YouTube.

The first-ever country that has employed AI in interfering with elections seems to be China.

Storm-1376 increased AI-generated memes mocking Taiwanese officials and dissidents, including AI news anchors, since early 2023.

North Korea prioritized crypto theft and supply chain attacks against adversaries to fund weapons, stealing over $3 billion since 2017, $600 million-$1 billion in 2023 alone.

Timeline of AI influence in Taiwan election (Source – Microsoft)

Used AI tools by Emerald Sleet group to enhance operations against the U.S.-Japan-South Korea alliance before Microsoft and OpenAI disrupted their activities.

Major elections in 2024 risk China amplifying AI-generated content to serve its interests, though the impact remains limited for now. 

However, China’s AI meme/video/audio augmentation experiments persist.

Expect North Korea’s crypto heists and supply chain attacks on the defense sector to fund weapons programs.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor - Try Here


[ad_2]
Source link

The Legacy of a Security Breach

0
[ad_1]
The Legacy of a Security Breach
Keir Finlow-Bates
This article was authored and contributed by Keir Finlow-Bates, a passionate blockchain enthusiast and technologist.

Today over at Resonance Security I am going to look at one of the more unusual ways in which your approach to computer security can lead to an increase in public awareness of your company.

There are many motivations for starting a company: becoming wealthy, doing something interesting and useful, and leaving some kind of legacy or mark on history are three of the main ones that spring to mind.

About that legacy: imagine having the name of your corporation attached to a file representing one of the most significant hacks of the 21st century!

That’s quite notable, but probably not what the founders of one particular company were looking for with their startup.

We won’t rock you

In the middle of the 2000s, RockYou, Inc. was doing well as a widget-maker for social media companies like MySpace and Facebook. However, back in 2009, it suffered a data breach in which a hacker discovered an SQL database server with an unpatched ten-year-old bug, the database containing over 32 million usernames and passwords for user accounts.

That’s right — 32 million usernames, and their associated passwords. For comparison, that’s about 10% of the active monthly users that Facebook had at the time.

The passwords were stored in plain text.

Mud on your face, big disgrace

Not only did RockYou initially fail to notify their users, but it subsequently released a falsified official statement claiming that the breach was less severe than it was.

To be clear: it was a very, very serious breach.

A decade and a half ago, people were far worse at password security than they are now. Password managers were almost unheard of, for some unexplained bizarre reason some sites blocked the use of password managers for unspecified “security reasons”, and two-factor authentication was pretty much only affordable and available to business users.

Because people were told not to write down their passwords, this meant that most of the leaked credentials were being used on other websites. After all, who in their right mind is going to memorize twenty or thirty different random passwords? As a result, sites such as banks, online stores, health databases, social media, supposedly private online journals, and online games held accounts using the same passwords.

The legacy

For years the full list of RockYou passwords has been available to download by anyone. It is typically found in a file called rockyou.txt , and there are plenty of GitHub repositories out there where you can find it.

In Kali Linux, a Linux distribution designed and produced specifically for penetration testing, the RockYou text file is included during the installation by default.

Conclusion

Just imagine — with a little bit of security carelessness, you too can take your modestly successful company and in the process of destroying it, allow its name to live on forever.

Have we learned anything since 2009? Not always.

For example: in 2017 it was revealed that an old social media site called LiveJournal, dating back to the 90s (but still running to this day), suffered a breach in which 26 million unique usernames, email addresses, and plaintext passwords were extracted. It took them until 2019 to admit to the breach.

That’s right — passwords were still being stored in plaintext in 2017, and I would bet good money on there being more sites out are doing the same, even though we are a decade and a half on from the original RockYou breach.

I predict that the leakage of passwords will only end once we stop using passwords, and start using improved systems such as security keys and self-managed identity for our authentication systems.

In the meantime, you have to assume that any password you provide to a website will eventually be leaked, therefore:

  • use a password manager to generate long, random, unique passwords for your accounts,
  • protect access to the password manager with two-factor authentication, and
  • make sure the password you use for your password manager has never been used anywhere else.

Post-script

Don’t run off and look for a website that allows you to enter your password and see if it was ever revealed in a breach! I can guarantee it will be a phishing site. Instead, I recommend HaveIBeenPwned, where you can type in your email address, and retrieve a list of the companies and websites that have managed to leak your credentials to the dark web through bad security practices. Another option is the Resonance Data Leak Detector, which monitors if your credentials have been leaked 24/7 and automatically notifies you.

About Resonance Security

Resonance Security is a curated platform for end-to-end cybersecurity products and services. It functions as a concierge for your organization’s end-to-end cyber-security needs, aggregating valuable security offerings into one platform to spread awareness on what it takes to secure your technology stack end-to-end.

About the author

I’m Keir Finlow-Bates, often known as Blockchain Gandalf, and am primarily a blockchain researcher and inventor. I started on this journey in late 2010 by examining the original Bitcoin code, and have been obsessed with blockchain ever since.

I am also the author of two books on the topic: Move Over Brokers Here Comes The Blockchain, explaining blockchain, and Evil Tokenomics, illustrating through practical examples how web3 scams work. You can find more at my website: Thinklair.com

  1. The Forgotten Victims of Data Breach
  2. Solving the Cyber Security Problem: Mission Impossible
  3. Will good prevail over bad as bots battle for the internet?
  4. If a Cyber Security Report Falls in a Forest, Is Anyone Listening?

[ad_2]
Source link

Apple’s App Store opens the door to classic game emulators

0
[ad_1]

In recent months, Apple’s tight grip on its App Store policies has begun to loosen. Following regulations from entities such as the EU, the company has just updated its App Review Guidelines. It has further opened the door to retro game emulators and ROM downloads.

For the first time ever, emulators will be allowed on the App Store. This change means that iOS users may soon be able to play their favorite classic games from systems like Nintendo and Sega systems directly on their iPhones and iPads. However, Apple has also established many strict rules. Developers must ensure that any games they distribute are done so legally to avoid potential copyright issues with abandonware titles.

Some caution remains, though. In its guidelines, Apple lumps emulators in with mini apps and plugins. That means they must use HTML5 rather than native system APIs for things like hardware acceleration. This could severely limit the types of emulators that come to the platform. Consoles like the PlayStation may not emulate well without low-level access.

New App Store policy allows emulator apps, but with restrictions

Developers will have to work within Apple’s guidelines for what constitutes a properly “hosted” emulator. And, as with past reversals, Apple retains full control over the App Store ecosystem. If emulators are poorly implemented or violate other policies, a crackdown could always occur.

“You are responsible for all such software offered in your app, including ensuring that such software complies with these Guidelines and all applicable laws,” Apple writes in its App Review Guidelines.

As is often the case with Apple’s policies, the implementation and interpretation of these new guidelines will likely set a precedent that will shape the future of emulator apps on the App Store. The gaming community will be watching closely as developers begin to navigate these new waters, eagerly anticipating the arrival of their favorite classic games on iOS devices.


[ad_2]
Source link

AutoPro X accessory will bring Samsung DeX to your vehicle

0
[ad_1]

Have you ever wanted to have the capabilities of Samsung DeX in your car? Well, the AutoPro X accessory promises to make this possible. This is a device that enables the DeX interface and functions on your vehicle’s screen. Basically, like an Android Auto adapter, but specifically intended to use DeX.

For those who don’t know, Samsung DeX is a feature that offers a pseudo-desktop experience. It works by connecting a compatible Galaxy device to an external monitor or display. At first, the system worked only by cable, but then Samsung introduced Samsung DeX Wirelessly to offer more possibilities. This feature inspired the creation of similar ones, such as Motorola Ready For. Even Android 15 could natively bring something similar.

Samsung DeX experience in your vehicle will be possible thanks to AutoPro X

Returning to the AutoPro X accessory, it was launched through a Kickstarter campaign. There seems to be a lot of interest in a device of this type, so it didn’t take long for the team behind it (Mayton) to reach 100% of their funding goal.

One of the promises of AutoPro X is that you won’t need cumbersome configurations. Everything should be as easy as connecting it to your vehicle’s screen via USB. Another advantage of using this accessory is that you don’t have to rule out Android Auto since it also integrates the Google OS for cars. This will give the user great versatility in choosing what type of UI and functionalities they want to use in their vehicle.

DeX enables better multitasking

But what is the difference between Samsung DeX and Android Auto? Basically, the DeX UI is adapted to the style of a computer. This means that it is designed to make better use of keyboards and mice, although you can also use it by touching the screen. In addition, it enhances multitasking with the possibility of having multiple apps on the screen at the same time. Multitasking in DeX allows you to distribute apps in different segments of the screen or one on top of another.

Currently, we are about a week and a half away from the official launch of the AutoPro X accessory. It will be interesting to see the public’s response to this product and if it also inspires the arrival of other DeX-based accessories for cars.


[ad_2]
Source link

WhatsApp to roll out new photo library shortcut for faster sharing

0
[ad_1]
WhatsApp keeps rolling out new features regularly, and now it seems it is working on making it easier for everyone to open and share photos. According to WABetaInfo, a reliable source for WhatsApp updates, the Meta-owned messaging app is widely releasing a feature to quickly open the photo library.
While the official changelog doesn’t offer much insight, the latest version of the iOS app, 24.7.75, has unveiled that this feature is now rolling out to all. Essentially, it’s a handy shortcut for swiftly accessing the photo library. Users can simply long-press the attach button within the chat bar, saving time by directly navigating to their photo library without any extra steps.

If you haven’t got this feature yet, keep in mind that it may be gradually rolled out to some accounts over the next few weeks, even though it’s not mentioned in the official changelog. As mentioned, the Meta-owned app frequently introduces new features, so installing all the latest updates will ensure you have access to the latest features and enhance your overall user experience.

On a different note, WhatsApp is gearing up to introduce a picture-in-picture option for videos. This means you will be able to watch videos while browsing through multiple chats or other parts of the app. Additionally, the app is set to receive a series of little tweaks, all aimed at enhancing the user experience.

As an example, WhatsApp is currently testing a redesign for its calling screen to make it easier for users to know where to tap to hang up. Moreover, a new simplified “Like” button for reacting to status updates could be introduced in a future app update.


[ad_2]
Source link

Veterinary Giant IT System Attacked by Hackers

0
[ad_1]

CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to a segment of its IT systems.

The company’s security protocols swiftly detected the breach, prompting an immediate response to contain the threat.

Upon discovering the breach, CVS Group decisively isolated the compromised systems.

The company temporarily shut down its IT systems to prevent further unauthorized access, adhering to its emergency response plan.

While effective in halting the attack, this necessary action has caused significant operational disruptions over the past week, particularly affecting the UK operations.

Specialist Intervention and Authority Notification

CVS Group has enlisted the expertise of third-party cybersecurity consultants to conduct a thorough investigation into the nature and scope of the incident.

Document
Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

The company has also proactively informed the relevant authorities, including the Information Commissioner’s Office, due to the potential risk of compromised personal information.

The London Stock Exchange has published a blog post reporting a cyber attack on the IT system of CVS Group, a veterinary giant.

Impact on Services and Recovery Efforts

Despite the challenges posed by the cyber incident, CVS Group has managed to maintain high levels of clinical care across most of its practices.

IT services have been securely restored across most of the company’s locations.

However, the enhanced security measures have led to some systems operating less efficiently than before, which may continue to affect operations for the foreseeable future.

According to a tweet by Reuters, CVS Group, a significant player in the veterinary industry, has been hit by a cyber attack targeting its IT system.

Due to the cyber attack, CVS Group is transitioning to cloud-based practice management systems and IT infrastructure.

This strategic move aims to strengthen security across the company’s operations and improve operational efficiency.

Nonetheless, the transition will impact operations for several weeks as the company focuses on maintaining clinical care while enhancing security.

Ongoing Forensic Analysis and Commitment to Security

The forensic analysis of the cyber incident is still underway, and CVS Group is committed to taking all necessary measures to safeguard its business and client data.

The company assures that it will provide further updates as the situation evolves and more information becomes available.

CVS Group’s experience reminds us of the ever-present threat of cyber attacks on businesses of all sizes and sectors.

The company’s prompt and effective response highlights the importance of a robust cybersecurity strategy and response plan.

As CVS Group continues to recover and strengthen its IT systems, the veterinary community is watching closely, recognizing the critical need for cybersecurity vigilance to protect sensitive data and maintain operational integrity.

Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor- Try Here


[ad_2]
Source link