New iMessage Phishing Campaign Targets Postal Service Users Globally

0
[ad_1]
New iMessage Phishing Campaign Targets Postal Service Users Globally

Netcraft Report Uncovers “Darcula” Platform Targeting Postal Services Worldwide via iMessage & RCS Phishing. Discover how USPS & global services are under attack and learn essential protection measures.

A new report by cybersecurity firm Netcraft has discovered a sophisticated phishing-as-a-service (PhaaS) platform called “Darcula.” This platform is being used to launch large-scale smishing attacks targeting the United States Postal Service (USPS) and global postal services across more than 100 countries.

Darcula represents a significant development in the world of cybercrime. Unlike traditional PhaaS platforms that rely on email communication, Darcula leverages iMessage and Rich Communication Services (RCS) messaging for its attacks. This allows cybercriminals to bypass SMS firewalls commonly used to block phishing attempts.

Why iMessage and RCS?

iMessage and RCS offer features like file transfers and enhanced media support, making them appear more legitimate than traditional SMS messages. Additionally, these messaging services are often used for personal communication, potentially lowering a user’s guard against potential phishing attempts.

The Smishing Tactic

The Darcula platform facilitates smishing attacks, a form of phishing that uses text messages to trick victims. These messages often impersonate legitimate organizations, such as postal services, and typically lure users into clicking malicious links or providing sensitive information.

New iMessage Phishing Campaign Targets Postal Service Users Globally
Screenshots of the actual malicious text sent to a user (Credit: Netcraft)

In the case of attacks targeting postal services, the messages might impersonate the USPS or a similar national postal service, informing recipients of missed deliveries or requesting additional information for package clearance. Clicking the malicious link could lead to a fake website designed to steal the user’s login credentials, credit card information, or other sensitive data.

Global Reach and Long History

The Netcraft report reveals that Darcula has been operational for at least a year and has been used in attacks on users in the UK and the United States. The platform’s capacity to target postal services in over 100 countries highlights its global reach and the potential impact of these phishing campaigns.

New iMessage Phishing Campaign Targets Postal Service Users Globally
Phishing pages to which a user is taken (Credit: Netcraft)

Importance of Cybersecurity Training

While the use of iMessage and RCS introduces a new element to smishing attacks, basic security principles and training remain crucial in protecting oneself. Users should be wary of unsolicited messages, even those coming from seemingly familiar sources.

Phishing attempts often create a sense of urgency, urging users to click links or respond immediately. Taking a moment to verify the legitimacy of a message by contacting the sender directly through a verified phone number or website can help avoid falling victim to these scams.

According to Max Gannon, Cyber Intelligence Analysis Manager at Cofense, Darcula, a very advanced phishing kit, paints a dire picture of phone-based phishing that individuals are not trained to avoid. This kit uses new techniques carefully designed to avoid security controls.

While this advanced phishing kit is problematic and avoids common security controls, a user trained properly to detect phishing emails should be just as likely to detect phishing messages on other platforms, Max emphasised.

The existence of this kit emphasizes the importance of training individuals to be more vigilant across platforms. Even if a trained individual were to fall for the phishing attempt and click the link, the request for sensitive information like credit card details or SSNs should raise immediate concerns, he added.

  1. Police Dismantle PhaaS Platform BulletProftLink
  2. Malspam targets hotels, spreading Redline and Vidar stealers
  3. Microsoft Warns of Tax Returns Phishing Scams Targeting You
  4. 800 Fake “Temu” Domains Lure Shoppers into Credential Theft
  5. “Failure in Parcel Delivery” Email Drops Malware on USPS Users’ PC

[ad_2]
Source link

Amazon is bringing palm recognition to phones

0
[ad_1]

Most people might not know this, but Amazon has its own method of identification called Amazon One. With it, users will use their palm to confirm their identity. Until now, users have been required to go to physical locations to sign up for an Amazon One account. However, Amazon just announced that Amazon One is making its way to phones via an app.

The company has been distributing Amazon One modules to different locations around the states. In order to use these modules, you simply have to hover your palm over the reader. Then, you’ll be able to make purchases at different locations through your Amazon account.

Amazon launches an official Amazon One app

As stated before, you needed to be at an official Amazon One reader in order to use this service. So, you couldn’t sign up for the service at home. This made it a bit inconvenient, as you’d have to go to a physical location.

Well, according to the company, that’s changing. Amazon just announced a new Amazon One app. With it, you can easily sign up for the service right at home. It’s available for both iOS and Android today, and you can download it using the link below.

Download Amazon One – Google Play Store

When you open the app, you will sign in with your Amazon account. Just know that you will need a valid telephone number. Once you’re signed in, you will use your phone’s camera to scan your palm. You can either scan one palm or both of them.

After you scan your palm, Amazon will save that information. So, the next time you go to any eligible Amazon One physical location, all you have to do is scan your palm. Then, Amazon will automatically activate your account.

You will be able to use your account at participating Amazon locations including Amazon’s own stores, Whole Foods, Etc. So, if you want a more convenient way of using Amazon One, then you should give the app a try.


[ad_2]
Source link

Powering the future of ThreatDown with AI

0
[ad_1]

Nobody can deny the influence of AI today. In just a few years, we have observed AI’s capacity to be as transformative as the internet and smartphones, especially for cybersecurity. Indeed, the potential of AI to radically simplify complex security environments is unmistakable, and aligns closely with our mission at ThreatDown to reduce threats, complexity, and costs for our customers.

With continuous advancements in AI and its ever-expanding potential to enhance user experiences, ThreatDown remains dedicated to integrating these technologies into our solutions going forward. Let’s dive into where we are with AI and where we’re headed.

What led us here

We’ve always been big on democratizing security for all, and we believe AI has the potential to do just that. With this in mind, in late March 2024 we added a powerful AI functionality to our industry-leading Security Advisor. Users can now use simple natural language requests to search for information about their environment, ask for recommendations on how to optimize their security posture, and more.

Users will now see an “Ask AI” search bar on the Endpoints, Detections and Vulnerabilities pages

The deployment of generative AI into our Security Advisor propels us closer to our goal to make security management more accessible, especially for companies with constrained IT resources. Generative AI’s ability to sift through vast datasets to highlight essential issues and suggest actions significantly lowers the barrier to advanced security, eliminating the necessity for deep security know-how among users. But we’re not done yet.

Where we’re going

As we integrate generative AI, we envisage a host of potential advancements that could further revolutionize security management:

  • Global AI search: Our team is considering the development of a universal AI search feature, integrated across all products, that can comprehend natural language queries and surface relevant data.
  • Evolving summarization techniques: Imagine an AI that can not only summarize threats detected by EDR tools but also provides remediation steps with contextual help to follow along.
  • Dynamic security recommendations: We’re exploring the possibility of AI that not only provides recommendations but also adapts them in real-time based on the evolving security context of each user.

Pioneering simplicity in security with AI

AI will likely become a bigger and bigger fixture in security as the years go on, and as it evolves, ThreatDown is deeply committed to simplifying security management through the power of AI.

Nebula users can use Security Advisor and its AI capabilities today. Learn more.


[ad_2]
Source link

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats – GBHackers on Security

0
[ad_1]

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting the growing, widespread use and potential of Web3 user security data to aid in risk management.

The report’s findings reveal a clear and growing demand for more advanced security tools that can effectively safeguard digital assets, verify the authenticity of nonfungible tokens (NFTs), and monitor decentralized applications for threats. 

The report, “Uncharted Consensus: The Widespread Use and Potential of User Security Data in Web3”, showcases the rapid adoption of GoPlus’s API suite, which provides Web3 industry stakeholders with unparalleled insights into the health and vulnerability of various cryptocurrencies, NFTs and decentralized applications.

At the same time, it also underscores the unique role GoPlus plays in addressing Web3’s most pressing security challenges.

GoPlus is the developer of an API suite designed to address the multifaceted challenges of Web3 user security. The suite enables targeted data analysis across key industry aspects.

Its modules include a Token RIsk API and NFT Risk API that evaluate the risk associated with different cryptocurrencies and non-fungible tokens; a Malicious address API for monitoring and reporting malicious address; a dApp Security API for real-time monitoring and threat detection in decentralized applications; and an Approval API for checking malicious approval of an address.

The report shows rising demand for better Web3 security solutions. GoPlus revealed that its Token Risk API saw a rapid increase in utilization from November 2023, with some months witnessing peaks of over 20 million calls per day.

This suggests that the crypto industry is collectively shifting towards pre-emptive risk identification and mitigation, driven by the evolving and intensifying landscape of security threats. 

These increases were mirrored by similar usage spikes in GoPlus’s other API modules. For instance, usage of its NFT API spiked between Dec. 2022 and Feb. 2023 and then several times again between March and May 2023 before stabilizing, followed by a sustained period of much steadier growth.

These usage trends mirror the growing adoption of NFTs and the corresponding need for tools to assess the risks associated with these digital assets.

Evolving Threat Landscape

A closer analysis of the API usage data illustrated a significant fluctuation in the presence of “high-risk” tokens, reflecting a threat landscape that’s just as volatile as the crypto industry itself.

The majority of these high-risk tokens were identified as being either “blacklisted” or “honeypots”. However, many other kinds of threats were identified, illustrating the evolving tactics used by hackers and scammers in the industry. The report also found an exponential increase in threats associated with NFTs, such as privileged operations (burn and minting), restricted approvals, self-destruct mechanisms, and unauthorized transfers.

The threat-related insights demonstrate the need for Web3 projects to employ more dynamic, robust, and adaptable security strategies and countermeasures to deal with the evolving threat landscape. They also highlight the need for education and collaboration to increase awareness of these threats and find better ways to mitigate them.

Top Ecosystems & Threats

The comprehensive study also highlighted the differing levels of user engagement and security concerns across blockchains, providing perspective on the unique challenges and risks faced by each ecosystem. 

BNB Chain emerged as the most prominent user of GoPlus’s APIs, being queried more than 92.7 million times during the research period. This reflects Binance’s laudable achievement in fostering a large community that’s united in its determination to identify and proactively mitigate security risks such as token vulnerabilities and scams.

Ethereum was the second-most popular chain to leverage GoPlus, with users querying its APIs 84 million times, highlighting both the extent of its user base and its vigilance against vulnerabilities and scams. Meanwhile, Polygon also stood out with almost 9.8 million queries during the period. This high level of adoption in the much smaller Polygon community illustrates the strong emphasis it places on scaling security solutions for the Web3 industry. 

Other insights from the report include the top ten token risks faced by the crypto industry today, with further analysis uncovering ten tokens with characteristics that mark them out as being “particularly malicious”, and also the top ten NFT collections that could be perceived as risky, due to their close association with phishing scams.  

The Importance Of User Security Insights

The GoPlus report provides valuable insights into aspects such as user engagement, preferences and the nature of the evolving threats in Web3, which can be essential for stakeholders to make more informed decisions and mitigate the risks they face. 

Perhaps the most significant finding is that the report underlines the critical importance Web3 security data can play in helping the industry to address the evolving risk landscape. As the Web3 ecosystem grows and evolves, the need for comprehensive security data will become all the more vital, helping dApp developers protect their users, while educating users on how to protect themselves.  

About GoPlus Labs

GoPlus Labs is revolutionizing Web3 security by offering a transparent, User Security Network with permissionless security data. It provides User Security Module as a Service to any blockchain, utilizing advanced AI for comprehensive threat detection.

Notably, its security data infrastructure has seen a massive usage increase, the user security data usage has grown 5000x from 2022 to now, with daily data API calls 21M.

SecwareX, launched in March 2024, quickly gained significant traction, showcasing high user trust. Within its first two weeks, it attracted over 400,000 users, including more than 30,000 premium (paid) users, highlighting its immediate impact and user trust.

GoPlus enhances Web3 user security through broad support for over 20 chains, collaboration with RaaS and Layer2 partners like Altlayer, zkSync, and Manta, and the introduction of innovative products like the “Secscan” security engine and Secware Middleware. These advancements facilitate a more open data and computing layer, moving towards gradual decentralization.

GoPlus enhances Web3 user security and promotes decentralization by motivating user participation with its token system. The GoPlus Token will act as a “gas fee,” necessary to reinforce the user security network and expand its utility. Moreover, it encourages users to become SecWare Service Providers, Data Providers, and Computing Node Providers. By contributing to the network, these participants can earn GoPlus Tokens.

Contact
Dasi Kaplan
[email protected]

[ad_2]
Source link

CISA Urges Patching Microsoft SharePoint Vulnerability (CVE-2023-24955)

0
[ad_1]
CISA Urges Patching Microsoft SharePoint Vulnerability (CVE-2023-24955)

Critical Microsoft SharePoint Server Flaw (CVE-2023-24955) Actively Exploited! CISA Urges Patch by April 16th. Learn why patching is crucial and how to secure your servers.

The Cybersecurity and Infrastructure Security Agency (CISA) is urging all US federal civilian agencies to patch a critical vulnerability (tracked as CVE-2023-24955) in the Microsoft SharePoint Server by April 16, 2024. 

CISA has added CVE-2023-24955 to its Known Exploited Vulnerabilities (KEV) catalogue after confirming its active exploitation in the wild.

For your information CISA’s KEV catalog is designed for US Federal Civilian Executive Branch (FCEB) agencies but can be utilized by all organizations, including private ones, to enhance their vulnerability management efforts.

Vulnerability Details

CVE-2023-24955 (CVSS score 7.2) is a code injection vulnerability allowing remote code execution (RCE) on vulnerable Microsoft SharePoint servers. An authenticated attacker with Site Owner privileges can execute arbitrary code remotely on SharePoint servers. This means attackers could potentially take full control of affected systems, steal data, or launch further attacks within a network. It is a critical flaw already addressed by Microsoft in its May 2023 Patch Tuesday updates. 

Why Such Urgency

CISA’s demand for an immediate patch reflects the potential for widespread damage if the vulnerability is not addressed. CISA has warned about two Microsoft SharePoint code injection vulnerabilities, CVE-2023-24955 and CVE-2023-29357 (a privilege escalation flaw in SharePoint Server), being exploited by malicious cyber actors, posing significant risks to federal enterprises. It is worth noting that CVE-2023-29357 was added to CISA’s KEV list in January 2024.

STAR Labs’ security researcher Nguyễn Tiến Giang (Janggggg) exploited both CVE-2023-24955 and CVE-2023-29357 in March 2023 at Pwn2Own Vancouver to achieve pre-authentication RCE on a patched device running SharePoint 2019, earning a $100,000 reward. Giang published a technical analysis and PoC exploit in December 2023 whereas in September 2023, a standalone PoC exploit for CVE-2023-29357 was published on GitHub. 

Microsoft released patches in May and June 2023 to address both issues. However, it seems some organizations, including US federal agencies, have not yet applied the patch. 

What Should Users Do?

This incident underscores the importance of timely patching for critical vulnerabilities and the potential impact of such vulnerabilities on government agencies. 

Microsoft SharePoint Server users, particularly those in high-risk environments such as government agencies, are advised to patch their systems immediately, enable two-factor authentication, and keep software updated to minimize the risk of similar attacks.

Expert Opinion

Cybersecurity expert Ray Kelly from the Synopsys Software Integrity Group emphasizes the importance of patching and updating software regularly, especially for private and public-facing servers handling sensitive data.

“This CISA advisory highlights the importance of patching and updating your software regularly, especially for private and public-facing servers that handle sensitive data. These chained vulnerabilities are very serious because they allow attackers to circumvent authentication and execute code remotely on vulnerable servers,” Ray explained.

“However, it’s important to point out that security patches for these vulnerabilities have been available since last Summer. The fact that CISA is now warning us about active exploitation indicates that many organizations have failed to apply the necessary security updates promptly. Malicious actors will always look for the easy targets and an unpatched server will always be easing pickings for them,” he added.

  1. CISA and Fortinet Warns of New FortiOS Zero-Day Flaws
  2. CISA Warns of Exploited Vulnerabilities in Chrome Browser
  3. CISA Advisories Highlight Vulnerabilities in Top ICS Products
  4. CISA Publishes List of Free Cybersecurity Tools and Services
  5. CISA Warns of Flaws in Propump , Controls’ Osprey Pump Controller

[ad_2]
Source link

Meta will bring AI to its Ray-Ban smart glasses

0
[ad_1]

It seems that Meta is no longer the metaverse company, as it has pivoted towards AI. It’s been ramping up its AI endeavors over the past couple of months. Now, the company wants you to bring its AI out into the real world. According to a new report, Meta will bring AI to its Ray-Ban smart glasses.

The company partnered with Ray-Ban to bring a set of powered smart glasses that come equipped with a microphone and camera. Along with being a fashion statement, these glasses can also take pictures, record videos, and play music. If this is a product that interests you, you can order your pair at Ray-Ban for $299.99.

Meta will add AI to its Ray-Ban smart glasses

At this point, smart glasses are a pretty niche product. However, AI is not. Artificial intelligence has been making the rounds over the past year and a half, and several devices are working on bringing AI into the real world. A few examples of this are the Rabbit R1, and the Humane AI Pin. One is a smartphone-like device that you put in your pocket, and the other one is a pendant you attach to your clothes. So, here comes another form factor.

Meta will implement AI technology into its Ray-Ban smart glasses. With this functionality added, the smart glasses will be able to use its camera to identify objects and animals. The New York Times was able to get a hands-on with these glasses and test out their capabilities. The glasses struggled to identify animals that were far away or behind cages. Also, the glasses struggled with identifying an exotic fruit. However, it seemed that they still worked pretty fine.

You will also be able to use the AI for speech translation. So, it seems that it will help you have a seamless conversation with another person who speaks a different language. According to the report, it currently supports English, Italian, French, German, and Spanish.

You will be able to access the AI in the glasses by saying the “Hey Meta” hotword.

When will I be able to try this?

Right now, the AI functionality is being tested via a beta program. However, Meta will distribute the AI functionality next month.


[ad_2]
Source link

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats – Latest Hacking News

0
[ad_1]

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report that highlights the growing, widespread use and potential of Web3 user security data to aid in risk management. The findings of the report reveal a clear and growing demand for more advanced security tools that can effectively safeguard digital assets, verify the authenticity of nonfungible tokens (NFTs) and monitor decentralized applications for threats. 

The report, “Uncharted Consensus: The Widespread Use and Potential of User Security Data in Web3”, showcases the rapid adoption of GoPlus’s API suite, which provides Web3 industry stakeholders with unparalleled insights into the health and vulnerability of various cryptocurrencies, NFTs and decentralized applications. At the same time, it also underscores the unique role GoPlus plays in addressing Web3’s most pressing security challenges.

GoPlus is the developer of an API suite that’s designed to address the multifaceted challenges of Web3 user security, enabling targeted data analysis across key aspects of the industry. Its modules include a Token RIsk API and NFT Risk API that evaluate the risk associated with different cryptocurrencies and non-fungible tokens; a Malicious address API for monitoring and reporting malicious address; a dApp Security API for real-time monitoring and threat detection in decentralized applications; and an Approval API for checking malicious approval of an address.

The report shows there is rising demand for better Web3 security solutions, with GoPlus revealing that its Token Risk API saw a rapid increase in utilization from November 2023, with some months witnessing peaks of over 20 million calls per day. This suggests that the crypto industry is collectively shifting towards pre-emptive risk identification and mitigation, driven by the evolving and intensifying landscape of security threats. 

These increases were mirrored by similar usage spikes in GoPlus’s other API modules. For instance, usage of its NFT API spiked between Dec. 2022 and Feb. 2023, and then several times again between March and May 2023, before stabilizing, followed by a sustained period of much steadier growth. These usage trends mirror the growing adoption of NFTs and the corresponding need for tools that can accurately assess the risks associated with these digital assets.

Evolving Threat Landscape

A closer analysis of the API usage data illustrated a significant fluctuation in the presence of “high-risk” tokens, reflecting a threat landscape that’s just as volatile as the crypto industry itself. The majority of these high-risk tokens were identified as being either “blacklisted” or “honeypots”, although many other kinds of threats were identified, illustrating the evolving tactics used by hackers and scammers in the industry. The report also found an exponential increase in threats associated with NFTs, such as privileged operations (burn and minting), restricted approvals, self-destruct mechanisms and unauthorized transfers.

The threat-related insights demonstrate the need for Web3 projects to employ more dynamic, robust and adaptable security strategies and countermeasures to deal with the evolving threat landscape, as well as the need for education and collaboration to increase awareness of these threats and find better ways to mitigate them.

Top Ecosystems & Threats

The comprehensive study also highlighted the differing levels of user engagement and security concerns across blockchains, providing perspective on the unique challenges and risks faced by each ecosystem. 

BNB Chain emerged as the most prominent user of GoPlus’s APIs, being queried more than 92.7 million times during the research period. This reflects Binance’s laudable achievement in fostering a large community that’s united in its determination to identify and proactively mitigate security risks such as token vulnerabilities and scams.

Ethereum was the second-most popular chain to leverage GoPlus, with users querying its APIs 84 million times, highlighting both the extent of its user base and its vigilance against vulnerabilities and scams. Meanwhile, Polygon also stood out with almost 9.8 million queries during the period. This high level of adoption in the much smaller Polygon community illustrates the strong emphasis it places on scaling security solutions for the Web3 industry. 

Other insights from the report include the top ten token risks faced by the crypto industry today, with further analysis uncovering ten tokens with characteristics that mark them out as being “particularly malicious”, and also the top ten NFT collections that could be perceived as risky, due to their close association with phishing scams.  

The Importance Of User Security Insights

The GoPlus report provides valuable insights into aspects such as user engagement, preferences and the nature of the evolving threats in Web3, which can be essential for stakeholders to make more informed decisions and mitigate the risks they face. 

Perhaps the most significant finding is that the report underlines the critical importance Web3 security data can play in helping the industry to address the evolving risk landscape. As the Web3 ecosystem grows and evolves, the need for comprehensive security data will become all the more vital, helping dApp developers protect their users, while educating users on how to protect themselves.  

About GoPlus Labs

GoPlus Labs is revolutionizing Web3 security by offering a transparent, User Security Network with permissionless security data. It provides User Security Module as a Service to any blockchain, utilizing advanced AI for comprehensive threat detection.

Notably, its security data infrastructure has seen a massive usage increase, the user security data usage has grown 5000x from 2022 to now, with daily data API calls 21M.

SecwareX, launched in March 2024, quickly gained significant traction, showcasing high user trust. Within its first two weeks, it attracted over 400,000 users, including more than 30,000 premium (paid) users, highlighting its immediate impact and user trust.

GoPlus enhances Web3 user security through broad support for over 20 chains, collaboration with RaaS and Layer2 partners like Altlayer, zkSync, and Manta, and the introduction of innovative products like the “Secscan” security engine and Secware Middleware. These advancements facilitate a more open data and computing layer, moving towards gradual decentralization.

GoPlus enhances Web3 user security and promotes decentralization by motivating user participation with its token system. The GoPlus Token will act as a “gas fee,” necessary to reinforce the user security network and expand its utility. Moreover, it encourages users to become SecWare Service Providers, Data Providers, and Computing Node Providers. By contributing to the network, these participants can earn GoPlus Tokens.

Contact

Dasi Kaplan

[email protected]


[ad_2]
Source link

Wilder World Launches on Epic Games Store as The First ‘GTA of Web3’ Game

0
[ad_1]

Wilder World, a massively multiplayer online metaverse, is now available for wishlisting on the Epic Games Store, a digital distribution platform launched by the studio behind Unreal Engine. Players will soon be invited to explore Wiami, a virtual city where ancient wisdom meets futuristic innovation.

As a decentralized virtual world, Wilder World challenges players to defy the authoritarian FORUM and shape their destiny by defending Wiami. Experience the fusion of stunning visuals and rich storytelling in Wilder World, where your legacy begins. Wishlist Wilder World on the Epic Games Store and be the first to craft a new era of freedom and innovation.

Wilder World is a free-roam virtual world that begins in Wiami, a metaverse city to explore, race, socialize, and much more. With an order of magnitude more surface area than traditional MMOs, Wiami offers a rich environment for players to connect and enjoy a Web3-enabled gaming experience. Wilder World’s first experience, a competitive racing game set within the expansive landscape of Wiami, is currently in an alpha testing phase and scheduled for a broader release later in 2024.

In development since early 2021, Wilder World is a next-gen AAA game built on Unreal Engine. The game features the latest in photorealistic graphics and true in-game AI to offer a next-gen gaming experience while enabling a full-scale economy. All items, equipment, land and avatars exist as tradable digital assets on the Wilder World marketplace, which players can own and earn real value by participating in the economy, trading equipment, winning races, exploring the world and more to come.

The listing on the Epic Games Store, one of the largest digital delivery platforms in the world with over 270M total users and 75M monthly active users as of December 2023, will boost visibility for Wilder World among active and dedicated PC gamers. Working with Epic Games is the perfect match for Wilder World, both because of the unrivalled quality of the Unreal Engine, and the strong alignment in ethos and values — given Epic Games’ strive to fight against aggressive middlemen.

“We’re honoured to be listed on the Epic Games store, setting the pace for next-gen gaming in the metaverse,” said Frank Wilder, Co-founder of Wilder World. “Our mission is to create a novel experience using cutting-edge technology, offering players a virtual space for gaming, socializing, and earning.”

Wilder World is for all, letting players across the entire world join in on the fun. Thanks to key partnerships including Nvidia’s GeForce Now and SuperVerse, Wilder World has expanded its reach to both Web2 and Web3 gamer communities. It has also chosen to focus on utmost scalability to power its massive world, working with Polygon and Celestia to build a custom, scalable blockchain to keep its fees low; as well as working with Metagravity to power virtual worlds with thousands of players.

About Wilder World

Wilder World is a massive multiplayer metaverse, launched in closed-alpha in December 2023 after 2.5 years of active development. As a free-roam metaverse, Wilder World leverages the latest in blockchain and AI to give a truly unique experience for players, while also enabling massive photorealistic environments. Wilder World focuses on creating a space in the metaverse for everyone, no matter their financial status, hardware or location. It has amassed a team of over 100 seasoned industry veterans to realize this vision.

Learn more about Wilder World on their website and stay up to date with the latest releases by following the X account and clicking here to wishlist Wilder World on the Epic Games Store

  1. The Benefits Of Blockchain In The Travel Industry
  2. What is Blockchain Gaming and its Play-to-Earn Model?
  3. Exploring Data Privacy and Security in B2B Gaming Data
  4. GAM3S.GG Raises $2M to Grow Web3 Gaming Superapp
  5. The Rise of Blockchain Gaming and Secure Marketplaces

[ad_2]
Source link

Chrome for Android will soon automatically archive your inactive tabs

0
[ad_1]

Do you often find yourself overwhelmed by hundreds of open tabs in Chrome on your Android phone? While Chrome allows you to surf the internet on different topics simultaneously by opening multiple tabs, having multiple tabs open can sometimes cause confusion, especially if you’re looking for a particular tab. Well, this is about to change with the upcoming “Tab Declutter” feature which will archive inactive tabs in Chrome.

What is the Tab Declutter feature?

It’s common to forget to close the tab in Chrome after you’re done accessing the information present on it. While keeping a few tabs open is perfectly fine, problems arise when you accumulate a large number. And that’s where the Tabs Declutter feature will come into play.

As the name itself suggests, this feature will help declutter the tabs open in Chrome. It’ll automatically archive tabs that you haven’t used in a while. This way, you’ll not only have a clutter-free environment in Chrome, but it’ll also help to speed up Chrome’s performance. And don’t worry, you’ll have the option to retrieve those tabs if you need them later.

One thing that’s still unclear is how long of inactivity will trigger Chrome to archive a tab. In addition to that, it will be interesting to see how Chrome implements this feature, as there’s a fine line between closing unused tabs to save memory and closing a tab you might still need but haven’t accessed in a while.

When will the Tab Declutter feature be released?

The feature is still under development, and there’s no official word yet on its release date. Like most Chrome features, it will likely be introduced as an experimental option in Chrome Flags first.

As of now, you can access it in Chrome Canary, but it’s not fully functional yet. You can only enable or disable it from the Chrome Flags menu.

Android Tab Declutter flag in Chrome Flags.

As per 9to5Google, you can expect it to be released in Chrome 125, which is scheduled for May. However, take this information with a grain of salt as the feature is still in development, so it wouldn’t be surprising if Chrome delays its release or cancels it altogether.

This isn’t the first time Chrome has tried to declutter tabs

In early 2020, Chrome for Android was working on a similar feature aimed at helping users with the issue of multiple background tabs. It was supposed to prompt users about tabs they hadn’t used in a long time and ask them to close them. Unfortunately, that feature never made it to the stable release.

It’ll be interesting to see how Chrome approaches this new Tab Declutter feature and whether it will be available in the stable release.


[ad_2]
Source link

Oregon now has the ‘strongest’ Right to Repair law in the US

0
[ad_1]

Smartphone manufacturers employ various tactics to sell more devices to customers. One of the oldest tactics is making devices unrepairable or slower with software updates to encourage the owner to buy a new device.

In recent years, California and Minnesota have introduced bills dubbed “Right to Repair” to protect customer’s right to repair their damaged devices. Oregon is now joining the list by introducing the “strongest Right to Repair law to date.”

Oregon Governor Tina Kotek signed the Right to Repair bill on Wednesday. The SB 1596 bill passed the state legislature a few weeks ago and will affect next year. It covers consumer electronics, including appliances, laptops and smartphones.

Oregon’s introduction of the Right to Repair bill marks a significant milestone. It’s the fourth state in the United States to take a stand on this issue

As the name implies, the bill requires manufacturers to respect the buyer’s right to repair their damaged device by buying the necessary parts and equipment. While this might seem like a fundamental human right, many manufacturers don’t allow customers to perform repairs themselves or third-party repair shops. Doing so might result in warranty termination.

“The legislation requires manufacturers to make repair more accessible by providing open access to the parts, tools, and information used to fix devices, which manufacturers are currently restricting to “authorized” service centers.” the legislation reads.

One key provision that sets Oregon’s bill apart is the ban on “parts pairing.” This term refers to a company’s software needing to approve a third-party component to function perfectly in a device. This restriction can prevent repairmen from using components not from the device manufacturer, potentially limiting repair options.

Apple warns about security risks of installing unauthorized parts

Additionally, manufacturers are prohibited from using parts pairing to downgrade a device’s performance or showing related warnings to customers. All devices used by Oregonians starting in 2025 must meet these requirements. The bill also encourages manufacturers to make necessary documentation, tools, parts, and software available to consumers and repair shops without overcharging.

Tech companies have no choice but to comply with the new law. Meanwhile, Apple warns that installing unauthorized parts, like biometric sensors, could result in security flaws. In February, John Perry, Apple’s senior manager of Secure System Design, testified to state lawmakers that the company approves the “majority” of Senate Bill 1596.


[ad_2]
Source link