New OnePlus Nord phone is official with 120Hz display & 5,500mAh battery

0
[ad_1]

OnePlus has just announced a new ‘Nord’ phone, the OnePlus Nord CE 4 Lite. The device launched in India first, as expected, and it’s exactly what we thought it would be. A somewhat compelling budget device.

Let’s talk about its design first. As you can see it has a flat display, with a centered display camera hole at the top. The bezels are rather thin, but they’re not uniform. All the physical buttons sit on the right-hand side.

The OnePlus Nord CE 4 Lite has a dual camera setup and a 120Hz display

On the back, there are two vertically-aligned cameras in the top-left corner. Those cameras are a part of the same camera island. That’s also where an LED flash is, while OnePlus’ logo is centered on the back. The phone also has a flat frame all around.

The device includes a 6.67-inch fullHD+ (2400 x 1080) OLED display. That panel has a 120Hz refresh rate and a 240Hz touch sampling rate. Its peak brightness goes up to 1,200 nits (2,100 partial brightness), by the way.

The Snapdragon 695 SoC from Qualcomm fuels this phone. OnePlus also included 8GB of LPDDR4X RAM here, and you can choose between 128GB and 256GB of UFS 2.2 internal storage. That storage is expandable via a microSD card, by the way, up to 1TB.

A 5,500mAh battery is also included, and the phone supports 80W charging

A 5,500mAh battery sits inside of this phone. The device supports 80W SuperVOOC wired charging. It also has stereo speakers, and it’s IP54 certified, which means it’s both splash and dust-resistant.

OnePlus included an in-display fingerprint scanner here. Android 14 comes pre-installed on the phone, with OxygenOS 14 included on top of it. There is also a hybrid dual SIM setup here (nano + nano / microSD).

A 50-megapixel main camera (Sony’s LYT-600 sensor, f/1.8 aperture, OIS) is backed by a 2-megapixel depth sensor (f/2.4 aperture). On the front, you’ll find a 16-megapixel unit (f/2.4 aperture).

The OnePlus Nord CE 4 Lite comes in three color options

The OnePlus Nord CE 4 Lite measures 162.9 x 75.6 x 8.1mm, while it weighs 191 grams. The phone comes in Mega Blue, Super Silver, and Ultra Orange colors. Do note that the latter color will stay exclusive to India.

The phone’s 128GB storage variant is priced at INR19.999 ($240), while the 256GB storage option costs INR22,999 ($276).


[ad_2]
Source link

How eSIM can save your time and money when traveling to Europe

0
[ad_1]

Just like everything else, traveling changed with the development of technology and the internet among other things. Today, it’s not only about packing your belongings and having your passport on you. Nobody travels without their mobile device and internet. Mobile data is an important part of every trip.

If you’re planning to travel to the Old Continent, eSIM in Europe can be a lifesaver for you. Europe eSIM offers a stable internet connection just like a physical SIM card would. With eSIM technology you get the much needed mobile data.

Each of these cards comes with a data plan, and depending on your purchase it could even come with unlimited data. Let’s see which advantages Europe eSIM brings and how it works.

eSIM in Europe Advantages

when in Europe do what the Europeans do. When traveling on the Old Continent many tourists decide to buy Europe eSIM plan from Holafly. With a Holafly Europe eSIM purchase, you don’t only get peace of mind but unlimited cellular data without buying a local phone number if your device is compatible. This is how it works:

Start by Customizing Your Plan

First of all, you need to know how long you will need your prepaid eSIM plans. When you have a set timeline you can adjust your data plan accordingly. With a proper service you will never run out of internet data connection nor will you be overspending. This is what makes multi country plans so good.

Aim For Unlimited Data Plans

Running out of internet data is everyone’s nightmare when abroad. This is why you need to have prepaid unlimited data in Europe that comes with an virtual SIM. When you’re covered by outlets such as Holafly you can sleep peacefully knowing that there will be no additional data roaming charges while at the same time you have the best coverage and access to best networks.

It Allows You To Keep Your WhatsApp Number

When travelling abroad keeping in touch with friends and family is paramount. So, having a service such as WhatsApp when using Europe eSIM comes in handy. Holafly’s eSIM package allows you access to WhatsApp and all of its contacts. Having unlimited calls via this mobile plan could prove to be a lifesaver when in a foreign country.

24/7 Customer Support

This is where the good part steps in. First of all, eSIM is easy to use for the needs of mobile data and everything else. Regardless, you could face some issues with network coverage even if you have access to best local network. So, it’s good to know that with a good eSIM plan, you’ll get 24/7 access to a support team via email or chat support. It was never easier to receive instructions and avoid any imaginable issues with your new eSIM data plan via this digital SIM.

Instant Delivery

It doesn’t matter if you’re planning on traveling or you’re already on the road. The eSIM delivery is an instant process. Europe eSIM can be sent directly to your email. Connection is possible in seconds and by a few simple clicks, you get instant access to your unlimited plan without having to resort to buying a local number or experiencing any hidden fees. Your data plan is activated immediately through a simple activation process.  If you’re already hooked up on buying eSIM data program and have eSIM compatible device you should see this page.

Sharing is Caring

When you activate your eSIM plan it is possible to share it with your friends or travel companions on other devices. With every good eSIM plan, there is up to 500MB of data to share with whoever you want. You can use your smartphone to share the data by using a WiFi network or mobile hotspot. Multiple device connection is the norm here.

How Does eSIM for Europe Work?

As we already said, the process is quite straightforward. But, regardless of this, let’s walk you through the few steps necessary to install the eSIM Europe onto your mobile device and have you connected to unlimited data through some of the best Europe eSIM plans.

Check Compatibility

First, you need to check if your phone is compatible with an eSIM. There shouldn’t be any issues in this department as the majority of eSIMs are compatible with all the popular brands such as iPhone, Samsung, and Google Pixel among others.

Buying Prepaid eSIM Data Plans

Just like with any other online purchase you need to head to an eSIM online store and buy a cellular data plan that suits your needs the best. Once you have your eSIM the time is right to install it and start enjoying the perks of unlimited internet without a need for a physical SIM card.

Scan the QR Code

This part is easy. You’ll receive a QR Code on your device. Scan the QR Code and proceed by turning on your mobile data roaming in the settings of your phone. By doing this browsing the World Wide Web in Europe becomes accessible.

What Does Europe eSIM Offers?

There are plenty of reasons why one should opt for an eSIM mobile data connection in Europe when traveling. First of all, it provides a clear connection to the web. Your video calls and messages will go out uninterrupted. You can share your photos and videos on social media platforms without a delay. Both data upload and download will be super fast. Also, access to maps works seamlessly which is paramount when traveling. With a quality eSIM, you will have full access to high-speed 4G and 5G networks in Europe.

Things to Know About eSIMs

There’s a chance you’re still not convinced about buying an Europe eSIM immediately. That’s all right. We will give you a few more information about eSIMs that should provide enough reassurance about your upcoming decision. This is what you should know:

No Local Phone Number

Remember, while eSIMs are amazing they only provide access to internet data. You will not receive a local phone number. So, you can’t send SMS messages and make calls. for that you’ll need your original SIM card. But, as we said, same eSIM plan offers WhatsApp and Skype too and that should provide enough means for communication.

Your Phone Needs to be Compatible With an eSIM

Before you opt for buying any eSIM products from any provider and enable data roaming ensure that your phone is eSIM card compatible with this data service to ensure you always stay connected and that data connectivity is always top notch.

Install Before Traveling

Before you set off make sure you’re packed and that your European eSIM and international data plan is prepared.  Buy the product before you travel but activate it when you reach your destination where it will be automatically upgraded to local standards. Just for your safety, it might be a good idea to carry a printed-out version of the QR Code you’ll receive in your email.

Bottom Line

eSIMs as a service just offer too many advantages to be ignored when you decide to travel to Europe. We believe enough information was shared to help you make the right decision. If that’s not the case, please tell us what we should add to help you activate data roaming via an eSIM card.


[ad_2]
Source link

Google Wallet adds 29 more banks to its growing list

0
[ad_1]
Google Wallet brings the ease of a digital wallet to millions, letting users store and use bank cards, tickets, passes, car keys, and IDs with a tap. Now, the tech giant has broadened its support to include additional banks.

Google Wallet continues to add new banks to its list


To attract a broader audience, Google Wallet continues to expand its support base, adding new banks each month. This year alone, over 170 banks have been included. Continuing this trend, Google has now added 29 new banks to its supported list. Keep in mind that support for the newly added banks may not be available right away, possibly due to gradual integration from the banks or a phased rollout by Google. For a complete list of supported banks, you can visit the Google Wallet Help page.

If your bank is on Google’s list of supported banks, you have a couple of options for adding your card. One way is to do it directly from your bank’s website or app. However, I find it easier to add it through the Google Wallet app. Here is how:

  1. Launch the Google Wallet app.
  2. Tap the + Add to Wallet button at the bottom right.
  3. Select Payment Card.
  4. Enter your card details manually or use your phone camera to scan the card.
  5. Tap Save.
  6. Agree to the terms and conditions, and you are all set!
Video Thumbnail

Video credit – Google

Digital wallets offer incredible convenience by enabling quick payments for purchases, whether online or in-store. Personally, I rely on Apple Wallet, which serves a similar function to Google Wallet but for iOS users. It has become a daily essential for me and I have practically forgotten the hassle of carrying around a bulky physical wallet.

With tech giants like Google expanding support for digital IDs and driver’s licenses in digital wallet apps across more states, in the future, physical plastic cards could become a rarity. Of course, let’s hope that by the time that eventually happens, smartphone batteries will last much longer. Otherwise, ending up wallet-less and phone-less in a tough spot wouldn’t be ideal, would it?


[ad_2]
Source link

Hackers Attacking Windows IIS Server to Upload Web Shells

0
[ad_1]

Windows IIS Servers often host critical web applications and services that provide a gateway to sensitive data and systems due to which hackers attack Windows IIS servers.

A South Korean medical establishment’s Windows IIS server with a Picture Archiving and Communication System (PACS) has been attacked, as identified by AhnLab Security Intelligence Center (ASEC), which resulted in CoinMiner infections.

There are several suspicions of web shell uploads indicating possible PACS vulnerabilities or wrongly configured safety settings.

The attacks were two different situations just days apart, probably organized by Chinese hackers who used various tools like Cpolar and RingQ, complete with Chinese annotations.

This event is an example of the continuous targeting of exposed web servers in Korea but specifically directed towards China-speaking groups emphasizing the importance of having secure measures for such critical systems like PACS in hospitals.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Hackers Attacking Windows IIS Server

Firstly, an attack was launched against a Korean medical institute’s web server via upload of Chopper and Behinder web shells, followed by system reconnaissance.

For privilege escalation, BadPotato was deployed by the threat actor, while Cpolar was used for remote access. A CoinMiner came in through a “1.cab” file that contained batch script, task scheduler XML, and downloader.

Finally, some Chinese-speaking attackers had chosen the above tools and also made annotations on the scripts. 

They included several additional web shells (ASPXspy, Caidao), privilege escalation tools (PrintNotifyPotato, IIS LPE, GodPotato), port forwarding tools (Lcx, Frpc), as well as user account creation malware.

Consequently, this all-inclusive toolkit provided continuous accessibility to the compromised server, which enabled governing it, and assisted in cryptocurrency mining.

Days later, the second attack was launched on the web server of a Korean medical institution. 

The attacker also used Certutil to download additional malware and installed more privilege escalation tools such as GodPotato, PrintNotifyPotato, and CVE-2021-1732 exploit which were among others network exploration tools deployed like fscan, remote shell, and Netcat.

EarthWorm served as a proxy tool while Ladon is a multi-functional Chinese-built tool that handles different steps in an attack process.

RingQ project on GitHub (Source - ASEC)
RingQ project on GitHub (Source – ASEC)

Besides that, evidence suggests that the threat actor may be a Chinese speaker, who used RingQ to encrypt and execute malware in memory to bypass file-based detection.

Consequently, they finely crafted an ASPX downloader as XMRig CoinMiner which had some of the most advanced evasion techniques or even focused on crypto mining.

Recommendations

Here below we have mentioned all the recommendations that the security analysts provide to prevent such attacks:-

  • Administrators should address file upload vulnerabilities.
  • Implement regular password changes.
  • Access controls to mitigate lateral movement risks.
  • Keep antivirus software updated.

IOCs

MD5

First Attack Case:-

– 67af0bc97b3ea18025a88a0b0201c18d: WebShell – woanware (1.aspx)

– f6591c1ab7f7b782c386af1b6c2c0e9b: WebShell – woanware (2.aspx)

– 986c8c6ee6f6a9d12a54cf84ad9b853a: WebShell – Chopper (2a.aspx)

– 2183043b19f4707f987d874ce44389e3: WebShell – Behinder (32.aspx)

– 77d507d30a155cf315f839db3bf507f7: WebShell – Behinder (1234a.aspx)

– 8d52407e143823a867c6c8330cdcb91a: WebShell – Behinder (1235a.aspx)

– 73cdd1be414dec81c6e42b83f0d04f20: WebShell – Behinder (12345a.aspx)

– 7e9f28cedfa8b012ab8646ac341a841c: BadPotato (bad1231.exe)

– 8cf601c06370612010f438fa8faa8aa7: Cpolar (cpolar.exe)

– e2753e9bc7e5880a365f035cdc5f6e77: Runner (1.bat)

– 205e6247f5a0dce8a55910354c816a61: ScheduleTask (1.xml)

– e13adb67739f4b485544ed99bc29f618: NSSM (service.exe)

– f3bdcd409063a42479dbb162dc7f5d21: CoinMiner downloader (svchost.exe)

– fce1b5ffcaefd1dcb130f4e11cdb488d: CoinMiner downloader (sihost.exe)

– a66338d9ba331efa4918e2d6397b17fe: CoinMiner (SecurityHealthServices.exe)

– 40dc8989d4b2e3db0a9e98ef7082b0d9: WebShell – ASPXspy (aspx.txt)

– b69eb0155df920514d4ae8d44316d05a: WebShell – ASPXspy (good.txt)

– 285b5f246f994b4650475db5143e4987: WebShell – Caidao (index.txt)

– 7e1a2828650e707d8142d526604f4061: BadPotato (bad.exe)

– 83b66aae624690e82c8e011e615bce59: BadPotato (bad520.exe)

– 5f3dd0514c98bab7172a4ccb2f7a152d: GodPotato (god3.exe)

– 1fdb1dd742674d3939f636c3fc4b761f: GodPotato (god4.exe)

– 493aaca456d7d453520caed5d62fdc00: PrintNotifyPotato (P2.exe)

– 493aaca456d7d453520caed5d62fdc00: PrintNotifyPotato (P3.exe)

– 7727070eb8c69773cafb09ce77492c27: PrintNotifyPotato (P4.exe)

– f7d53946b3ae7322cd018480a2f47de8: IIS LPE (iislpe.exe)

– 10cf4d43163ee395ddad1fe7e777e2c9: IIS LPE (iislpe1.exe)

– f222524766456936074f513cec2149a8: Cpolar (cpo.exe)

– d6f84855f212400314fb72d673aba27b: Frpc (F.exe)

– 62ba55ac729763037da1836b46cb84bc: Frpc (frpc.exe)

– 3c5905da1f3aecd2dccc05f6b76a1ca9: Frpc Config (frpc.txt)

– ce1f3b789b2aab2b2b833343f13b7c98: Lcx (99.exe)

– 371a2eb2800bb2beccc1a975f3073594: Lcx (Lcx.exe)

– 7abca4faa3609f86f89f1a32fe7bbcc6: UserAdder (UserAdd.exe)

– e8a7e8bb090da018b96aab3a66c7adeb: UserAdder Command (net.txt)

– 5d9464aba77e1830e1cf8d6b6e14aa55: UserAdder Command (useradd.bat)

Second Attack Case:-

– 71a6ba713f3f5c8e24c965487a86b5d4: WebShell – Chopper (zbngjv.aspx)

– 93abe2fcb964ec91de7d75c52d676d2d: WebShell – Chopper (bin.aspx)

– 2c3de1cefe5cd2a5315a9c9970277bd7: WebShell – Godzilla (aaa.ashx)

– 69c7d9025fa3841c4cd69db1353179cf: WebShell – Godzilla (aaa.asmx)

– 7871587d8de06edc81c163564ea4ea41: WebShell – awen (cmd.aspx)

– 10b6e46e1d4052b2ad07834604339b57: WebShell – Behinder (hi1.aspx)

– 5eeda9bfb83aacb9c3f805f5a2d41f3b: WebShell – Deleter (sklqbpbl.aspx)

– 5f3dd0514c98bab7172a4ccb2f7a152d: GodPotato (gp1.exe)

– 493aaca456d7d453520caed5d62fdc00: PrintNotifyPotato (pp.exe)

– 87562e70e958c0a0e13646f558a85d04: Privilege escalation tool – CVE-2021-1732 (aa.aspx)

– 8f7dfbec116017d632ca77be578795fd: Fscan (fscan.exe)

– 5dcf26e3fbce71902b0cd7c72c60545b: NetCat (nc.exe)

– 523613a7b9dfa398cbd5ebd2dd0f4f38: NetCat (nc64.exe)

– d76e1525c8998795867a17ed33573552: EarthWorm (ew.exe)

– 5d93629fbc80fed017e1657392a28df4: Ladon (11.exe)

– e9cb6a37c43e0393d4c656bc9f6bf556: RingQ (ringq.exe)

– 705e5d7328ae381c5063590b4f5198da: CoinMiner downloader (gzrqo.aspx)

– b81577dbe375dbc1d1349d8704737adf: CoinMiner (aspx.exe)

C&C Server URLs

– 14.19.214[.]36:6666: NetCat

– 14.19.214[.]36:3333: NetCat

– 1.119.3[.]28:7455: Frpc

Download URLs

– hxxp://sinmaxinter[.]top:7001/services.zip: CoinMiner

– hxxp://sinmaxinter[.]top:7001/C3-server25.zip: CoinMiner

– hxxp://14.19.214[.]36:6666/pp.exe: PrintNotifyPotato

– hxxp://14.19.214[.]36/aa.aspx: Privilege escalation tool – CVE-2021-1732

– hxxp://14.19.214[.]36/fscan.exe: Fscan

– hxxp://14.19.214[.]36/ew.exe: EarthWorm

– hxxp://14.19.214[.]36/11.exe: Ladon

– hxxp://14.19.214[.]36/RingQ.exe: RingQ

– hxxp://45.130.22[.]219/aspx.exe: CoinMiner

– hxxp://192.210.206[.]76/sRDI.dat: CoinMiner

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

WhatsApp starts rolling out a new sticker type with more fluid animations and vivid colors

0
[ad_1]

WhatsApp is getting some nice enhancements to its stickers with a new type of sticker pack rolling out. WhatsApp has been constantly working on new features and updates to current features, and this latest change is another addition to an already rich feature set.

WhatsApp is reportedly quietly rolling out Lottie support for stickers with a new sticker pack, as noticed by WABetaInfo. Now, the “I’m Just a Girl” pack is available in the official Sticker Store, and it’s the first of its kind to be generated with the Lottie framework.

The sticker pack, designed by BUCK, can be downloaded and gives an idea to developers on how to make the most of the sticker framework.


Lottie basically allows developers to use vector-based animations for stickers. This pretty much means you get more eye-pleasing stickers with smoother animations and more vivid colors. The current stickers in WhatsApp are WebP-based and they are high quality indeed, but vector-based stickers have even better animations. For now, though, it seems there isn’t an option for developers to begin making Lottie stickers with third-party apps. It could be something to come in the future though.

WhatsApp beta version 2.24.5.10 was the first version to hint at Meta’s plan to roll out Lottie stickers. The new type of sticker will make the experience of sending WhatsApp stickers even more fun when more sticker packs are developed in the near future.


[ad_2]
Source link

WikiLeaks Founder Julian Assange Released in Deal with U.S.

0
[ad_1]

WikiLeaks founder Julian Assange has been released from prison after reaching a deal with the U.S. government.

The agreement, announced early today, ends the long-standing legal battle between Assange and the U.S. authorities.

Terms of the Deal

Assange, 52, was arrested at the Ecuadorian embassy in London in April 2019 and has been held in Belmarsh prison since then.

He was facing extradition to the United States on charges related to WikiLeaks’ publication of classified U.S. military records and diplomatic cables in 2010 and 2011.

Under the terms of the deal, Assange has agreed to plead guilty to one count of conspiracy to commit computer intrusion, a charge that carries a maximum sentence of five years in prison.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

However, in a surprise move, the U.S. government has agreed to drop all remaining charges against him, including espionage charges that could have carried a sentence of up to 175 years in prison.

In exchange for his guilty plea, Assange will be released from prison immediately and allowed to return to his home in London.

He will also be required to cooperate with U.S. authorities in their ongoing investigations related to WikiLeaks.

Shift in U.S. Government Stance

The deal marks a significant shift in the U.S. government’s stance on Assange, who has been a thorn in the side of successive U.S. administrations.

The Obama administration had previously declined to prosecute Assange, citing concerns about the implications for press freedom.

However, the Trump administration had taken a harder line, with then-Attorney General Jeff Sessions stating that Assange’s arrest was a “priority.”

Assange’s supporters, who have long argued that he was being unfairly targeted for his role in exposing U.S. war crimes and human rights abuses, are hailing the deal as a major victory.“

This is a huge win for Julian and press freedom,” said WikiLeaks lawyer Jennifer Robinson. “We are thrilled that Julian will finally be able to return home and resume his life.”

The deal is also seen as a significant blow to the U.S. government’s efforts to prosecute Assange, which human rights groups and journalists around the world had widely criticized.

Reactions and Implications

Amnesty International, which had campaigned for Assange’s release, welcomed the news, saying it was “a long-overdue recognition of the need to protect freedom of expression and the right to information.”

Assange’s release is expected to spark a new wave of debate about the role of whistleblowers and the importance of protecting press freedom in the digital age.

As the world becomes increasingly interconnected and dependent on digital technologies, the question of balancing national security with the need for transparency and accountability will only likely become more pressing in future years.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

The future of forex trading apps using AI features

0
[ad_1]

We all witnessed the advent of AI, but nothing prepared us for its quick takeover, given the debate over regulated acceptance that AI came with. Everywhere you turn, you will encounter an AI feature, whether directly or on the backend. AI isn’t stopping at social media apps but also crossing into trading apps. Developers are hoping to improve analysis and increase the probability of predictions. In the coming years, there will be specific AI features that forex traders can expect in trading apps. Let’s consider a number of them.

image1

What Is AI in Forex Trading?

Artificial intelligence in forex trading involves several processes and applications, such as machine learning, data analysis, and cognition. Over the decades, these processes have been used to identify and analyze statistical data, such as price trends. They have even been applied to help traders make accurate predictions and automate trade activities. Here are some artificial intelligence features you can expect in trading apps.

Sentiment Analysis

Sentiment analysis focuses on the prevailing emotion of the market towards a given currency, and it strongly influences investor decisions. Since sentiment analysis is a qualitative analysis where numbers are sketchy for data-driven decisions, AI provides a way to compensate for the absence of statistical evidence. In seconds, AI can fetch data from across the globe and inform traders about market sentiments. The data comes from news, expert comments, economic indicators, and social media posts from interest groups.

Risk Mitigation Systems

Risk is an ever-present factor in every business. However, its presence is even more potent in a relatively volatile market like forex. Risk mitigation systems help traders identify, analyze, and prioritize risks. These processes will inform the trader’s coordinated deployment of his funds in ways that reduce the impact of adverse outcomes or increase profitable outcomes. The data analyzed by AI usually involves historical events and market situations.

With AI’s assistance, spotting and avoiding fraudulent positions can be easier. Manipulative forces and unusual trading patterns in online trading markets negatively influence investors to buy pseudo-bullish stocks. By including this AI feature in trading apps, traders can have safer trading grounds.

Predictive Modeling

A large chunk of trading activity involves predictions and forecasting. With the large amounts of data available for analysis today, AI’s robust capabilities are a veritable tool in the arsenal of forex traders.

Now, traders can deploy more effective trading plans. With historical and current trends under the radar of AI’s investigative prowess, one can spot unusual trend patterns and predict future patterns. This feature’s incorporation of technical and fundamental analytics makes this feature powerful.

Automation

image3

Several global operations have embraced automation, and the money market is following suit. Automation reduces human involvement in tasks and processes to the barest minimum. In forex trading, automation is often referred to as robotic trading. Trading apps with this AI feature are developed with instructions already programmed to take a trading action when they observe a particular market condition.

For instance, you can set up the app to stop loss when it notices a trend you must have observed from previous analysis. AI features can help erase human bias and errors from emotional trading. Automation saves time, eases mental stress, and helps you diligently follow trading plans.

HFT Capabilities

One feature traders can look for is the High-Frequency Trading capability. HFT ensures traders can enter several markets simultaneously and earn profits quickly. The key to profit maximization using high-frequency trading opportunities is to identify several opportunities with small price disparities and make profits from them.

The collection of these small profits becomes worthwhile. Thanks to its data collection, analysis, and automation, AI can undertake intensive research and enter trades that offer arbitrage opportunities. Although many traders are concerned about the nature of HFT opportunities, the speed of execution and liquidity encourage traders desirous of quick profits to seek this feature on trading apps.

Backtesting Capabilities

With this feature, traders can ascertain the effectiveness of their online trading plans. AI gathers information about the outcome of similar plans in the past and analyzes it to show traders if the trading strategy has been effective in similar situations. The result is a pointer to what to expect in the future should the trader carry out the trade action at the current time. This feature helps traders discover possible errors and adjust their plans.

Possible Concerns Over AI in Forex Trading

It is plausible to see disruptive innovations like AI witness their fair share of disadvantages and concerns. What are these concerns?

Expensive To Implement

Developing and implementing these AI features costs developers and companies running these trading apps a fortune. The required technological sophistication and the hiring price for the professionals needed to implement these AI tasks require a lot of money. Setting these technologies up is only part of the process; it requires continuous updating and review. All these costs affect the company and the end user, who will have to pay higher usage fees.

Regulation and Ethical Issues

With AI being an innovation still under study, governing bodies are still trying to find the best way to create regulations that will not hamper its developmental use. However, work is ongoing to set up ethical guidelines to protect platforms from unfair trading and illegal data access. There is also a growing concern over AI’s ability to pry into people’s and companies’ private information, leaving identity damage in its wake.

Over-Dependence

image2

It is a known human weakness to continue an act that gives people results with less work, and AI offers just that. However, this leaves us with the problem of overdependence in online trading. This problem manifests in two ways. First, it may result in severe losses when tiny system errors produce wrong predictions. Second, with AI doing the research and even performing automated trading, traders may begin to lose touch with their skills.

Balancing Innovation and Ethics in AI-Driven Forex Trading

Numerous AI features forex traders may expect in trading apps, such as sentiment analysis tools, predictive modeling, and automation, are innovative solutions to what many traders find taxing and time-consuming. However, there are also concerns. These concerns range from over-dependence on AI to ethical issues. Going by the current trajectory of events, AI is here to stay. Regulatory bodies and financial institutions are working to reduce and eliminate threats posed by the concerns.


[ad_2]
Source link

4 Members of FIN9 Hackers Charged for Attacking U.S. Companies

0
[ad_1]

Four Vietnamese nationals have been charged for their involvement in a series of computer intrusions that caused over $71 million in losses to U.S. companies.

The indictment, unsealed today, names Ta Van Tai, aka “Quynh Hoa,” aka “Bich Thuy;” Nguyen Viet Quoc, aka “Tien Nguyen;” Nguyen Trang Xuyen; and Nguyen Van Truong, aka “Chung Nguyen,” as members of the notorious international cybercrime group known as “FIN9.”

From May 2018 through October 2021, the defendants allegedly hacked into the computer networks of various U.S. companies, stealing non-public information, employee benefits, and funds.

U.S. Attorney Philip R. Sellinger emphasized the severity of the crimes, stating, “The FIN9 defendants were prolific international hackers who, for years, allegedly used phishing campaigns, supply chain attacks, and other hacking methods to steal millions from their victims.”

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Sophisticated Hacking Techniques Unveiled

According to the indictment, the FIN9 group employed a range of sophisticated techniques to infiltrate their victims’ networks.

These included phishing campaigns and supply chain attacks, which target the computer networks of trusted third-party vendors.

Once inside, the hackers exfiltrated sensitive information, including employee benefits and gift card data, which they redirected to accounts under control.

FBI Newark Special Agent in Charge James E. Dennehy highlighted the challenges in tracking such cyber criminals, noting, “Cyber actors cloak themselves in the virtual world, hiding in a space most people can’t see and don’t understand.

However brilliant these hackers believe they are at disguising themselves, these members of the FIN9 group couldn’t conceal their exfiltration of data from their victims’ companies.”

Charges and Potential Penalties

The defendants face many charges, including conspiracy to commit fraud, extortion, wire fraud, and intentional damage to protected computers.

If convicted, they could face significant prison time. Specifically, they are charged with:

  • One count of conspiracy to commit fraud, extortion, and related activity in connection with computers, carrying a penalty of up to five years in prison.
  • One count of conspiracy to commit wire fraud, with a potential 20-year sentence.
  • Two counts of intentional damage to a protected computer, each carrying up to 10 years in prison.
  • Additional charges of conspiracy to commit money laundering, aggravated identity theft, and conspiracy to commit identity fraud, with penalties ranging from two to 20 years in prison.

U.S. Attorney Sellinger credited the FBI Newark’s Cyber squad and their counterparts in Little Rock for their diligent work in bringing these charges.

The case is being prosecuted by Assistant U.S. Attorneys Anthony P. Torntore and Vinay S. Limbachia of the U.S. Attorney’s Cybercrime Unit in Newark.

The charges and allegations in the indictment are accusations, and the defendants are presumed innocent unless and until proven guilty.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

YouTube starts testing a new way for viewers to support their favorite creators

0
[ad_1]

It’s not often that streaming services like YouTube and Twitch release new tools that are specifically designed to help smaller creators gain new followers. The new feature launched this week by YouTube introduces a new way for users to support their favorite creators.

Unlike many of the similar features released by YouTube in the past, this one only addressed to smaller creators. In addition to functions such as “Like” and “Share,” YouTube viewers will now have another feature at their disposal: Hype.

According to YouTube, the more viewers hype a video, the greater the chance of it appearing in the rankings with other hyped videos. The streaming service says that the ranking will appear in the “Explore” section, so it won’t be listed in the “Trending” section.

Apparently, the new “hype” feature isn’t used as an indicator for YouTube’s search and discovery system. More importantly, this was launched as an experiment, so not everyone will have access to it.

Only lucky viewers in Brazil, Turkey and Taiwan can take advantage of the “hype” feature and use on videos posted in the last seven days. One other thing worth mentioning is that eligibility for the experiments is limited to a subset of YouTube Partner Program content creators with fewer than 500,000 subscribers.

Obviously, the videos produced must meet YouTube’s community guidelines, otherwise “hyping” them won’t have any effect when it comes to rankings. The new feature will be tested in the coming weeks and might change based on the feedback received from YouTube viewers.

Generally speaking, the ability to “hype” a video to support your favorite creator is very nice, especially if you’re a hardcore fan. Personally, I believe that lowering the number of subscribers a creator must have to be eligible for the “hype” function will truly help smaller content creators.


[ad_2]
Source link

BREAKING: NHS England’s Synnovis Hit by Massive Cyber Attack – GBHackers on Security

0
[ad_1]

In a shocking development, the NHS has revealed that it was the victim of a major cyber attack targeting Synnovis.

Synnovis, formerly Viapath, is a London-based provider of pathology services. It is a partnership between Guy’s and St Thomas’ NHS Foundation Trust, King’s College Hospital NHS Foundation.

The attack, which occurred on June 22nd, has potentially compromised the sensitive health data of millions of NHS patients across England.

According to official statements from NHS England and NHS Digital, the cybercriminals behind the attack were able to access Synnovis’ systems.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Synnovis Response

“Synnovis, a pathology services partnership between two London hospital Trusts and SYNLAB, recently fell victim to a cyberattack. Last week, a group claimed responsibility for the attack and published data online.” Snnaovis said via press release statement.

There has been no evidence to suggest that the Laboratory Information Management Systems (LIMS) databases, which are critical for supporting laboratory operations and holding patient test requests and results, have been compromised or posted online.

“However, a partial and fragmented form of the administrative working drive has been posted. This drive contains some fragments of patient-identifiable data. Our top priority is addressing this issue and understanding the extent of the breach, Synnovis Said.

The NHS uses these systems to securely transfer patient data between different parts of the health service, which has raised serious concerns about the safety and privacy of confidential patient information.

NHS officials are scrambling to assess the full extent of the breach and determine exactly what data may have been exposed.

They have assured the public that emergency services and urgent care remain fully operational, but some non-urgent appointments and services may need to be rescheduled as they work to restore impacted systems securely.

Synnovis has taken its affected systems offline as a precautionary measure while they investigate the incident in partnership with the National Cyber Security Centre and NHS.

However, many question how such a vital part of the NHS digital infrastructure could be left vulnerable to attack.

The NHS is now facing difficult questions about its cyber security measures’ robustness and preparedness for increasingly sophisticated cyber threats.

Patients are being urged to be extra vigilant and report any suspicious communications claiming to be from the NHS.

As more details emerge about the scale and impact of this unprecedented attack on England’s health service, public trust in the NHS’ ability to keep personal data safe hangs in the balance.

This developing story has sent shockwaves through the healthcare sector and beyond.

Investigations are complex and may take weeks to identify impacted individuals. Local health systems collaborate to manage the patient impact, ensuring urgent blood samples are processed, and laboratories can access historical records. NHS officials said patients should attend appointments and seek urgent care as usual unless advised otherwise.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan


[ad_2]
Source link