Saturday, April 30, 2022

The Best Sci-Fi Movies on Prime Video - CNET

A surprisingly wide range of excellent sci-fi flicks await on Prime Video.

from CNET https://ift.tt/5HUQ6rF

Netflix: The 43 Absolute Best Movies to Watch - CNET

A host of new movies drop this week, including Guy Ritchie's The Gentlemen.

from CNET https://ift.tt/kOBRscT

Don't Forget Grandma. She Deserves a Mother's Day Gift Too - CNET

Show Grams just how much you love her this Mother's Day with these meaningful gifts.

from CNET https://ift.tt/n2Jlv5o

18 Ways to Spend That $50 Gift Card - CNET

Great deals on everything from speakers and headphones to tech and small kitchen appliances -- all for $50 or less.

from CNET https://ift.tt/0t4QmGk

10 Essential Kitchen Tools for a Vegan Kitchen in 2022 - CNET

Work smarter, not harder with these handy kitchen gadgets.

from CNET https://ift.tt/G7xC4kV

HBO Max: The 36 Best TV Shows to Watch - CNET

Watch horror comedy series The Baby and see what else is available on the Warner Bros. streamer.

from CNET https://ift.tt/TcNMmFv

HBO Max: The 28 Best Movies to Watch - CNET

From a tech thriller starring Zoƫ Kravitz to sports drama King Richard, here's what you need to see on the Warner Bros. streamer.

from CNET https://ift.tt/YC3GoX2

Friday, April 29, 2022

What to Know About Bird Flu, or Avian Influenza - CNET

The first human case of highly pathogenic bird flu in the US has been detected, but the threat to the general public is still low, the CDC says.

from CNET https://ift.tt/xjdQYD4

Save $300 on One of Our Favorite Chromebooks of the Year - CNET

The HP Chromebook x2 11 is a powerful two-in-one with a fully detachable keyboard, and right now you can pick it up for half off.

from CNET https://ift.tt/kaqO8QH

Best Women's Underwear for Workouts - CNET

Because you should be focused on your workout, not your undies.

from CNET https://ift.tt/oOPkGRB

'Pachinko' Review: Youn Yuh-jung and Minha Kim Are Magnetic in Apple TV Plus Series - CNET

Pachinko deserves its flowers. It's so beautifully done and packed with emotion that it will make you look at your own grandma with a newfound respect.

from CNET https://ift.tt/m4BZFPy

Latest Tech News

Using your favorite VPN in India may soon be impossible thanks to new regulations that will require VPN providers to collect and store a wide range of data on their customers for a period of five years.

As reported by ENTRACKR, the Computer Emergency Response Team (CERT-in) which is under the control of the country’s Ministry of Electronics and Information Technology has issued a new set of directions in an effort to “coordinate response activities as well as emergency measures with respect to cyber security incidents.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

VPN providers aren’t the only companies that will be required to store customer data though as the directions also apply to data centers, cryptocurrency exchanges and Virtual Private Server (VPS) providers as well.

Beginning in June of this year, companies in these industries will be required to register customer names, customer ownership patterns, customer contact information and the reason they have purchased their services in the first place.

Improving cyber incident response at a cost

CERT-in’s new order appears to be aimed at ensuring the government agency can respond to all manner of cyber incidents within six hours of their discovery. While the order itself may be well-intentioned, the range of data CERT-in is asking organizations to store and provide upon request is quite unusual.

CERT-in requires organizations to report data breaches, fake mobile apps, attacks on server infrastructure and even unauthorized access to a user’s social media accounts. Additionally, businesses that fail to provide the necessary information are governed by Section 70B(7) of the IT Act which could lead to up to one year in prison.

Another snag in the Indian government’s plan is that most VPNs have a ‘no-logs policy’ or at the very least, only keep user data temporarily. As a result of CERT-in’s new directions, many VPN providers and other IT companies could potentially stop doing business in India as they can no longer legally operate in the country.

The new directions will go into effect at the end of June unless the window for compliance is extended which very well could be the case. Until then though, consumers and businesses in the country should pick up one of the best India VPNs while they still can.

Via ENTRACKR



from TechRadar - All the latest technology news https://ift.tt/LUlTp15

T-Mobile Teases New 'Un-Carrier' Event for May 4 - CNET

An update on T-Mobile's 5G Home Internet offering may be coming soon.

from CNET https://ift.tt/ncEmdAW

Latest Tech News

Verizon is working with Oracle to see how ‘ultra wideband’ 5G can be used to support industrial applications and use cases.

The operator has switched on private and public 5G networks at the Oracle Industry Lab in Chicago, allowing the company’s customers and partners to identify ways next-generation networks can be applied in a variety of sectors.

Although 5G networks will allow operators to offer enhanced communications to consumers and reduce operating costs, the real value is believed to be in enterprise services.

Private 4G and 5G

The market is currently served by Wi-Fi, Bluetooth and other LPWAN standards, but 5G promises to address many shortcomings.

Unlike previous generations of mobile connectivity, the ultrafast speeds, superior capacity and ultra-low latency of 5G means mission-critical applications can be powered by cellular technology for the first time. 5G will improve reliability, availability and reduce delays.

Visitors to the Industry Lab will be able to see how 5G-supported technologies such as drones, augmented reality, robotics and artificial intelligence can be used to solve challenges, drive efficiency, and enhance productivity.

Verizon’s ultra wideband network uses frequencies located between 3.7GHz and 3.98GHz to offer a compromise between range and capacity, and plans to roll out coverage to more than 1,700 cities across the US.

“In 5G Innovation Hubs across the nation, Verizon Business has been working alongside startups, universities, and large enterprises, like Oracle, to help our partners develop and test solutions that can transform various industries — all powered by Verizon 5G Ultra Wideband,” said Tami Erwin, CEO of Verizon Business.

“The state-of-the-art Oracle Industry Lab is the perfect testing ground for this kind of next-level innovation. By uniting Oracle’s deep suite of vertical and horizontal technology with partner solutions and Verizon 5G, we will be able to help our joint customers reimagine the future of their enterprises.”

“Our mission at the lab is to bring partners and customers together to forge new paths and solve really complex problems in a hands-on testing environment,” added Mike Sicilia, EVP of Oracle’s vertical industries.

“As we tackle issues such as sustainability, smarter manufacturing, and creating more resilient energy and water systems, it will take an ecosystem worth of experience and ideas to bring viable solutions to life. Without question, 5G will be fundamental to these developments and we are honoured to be working with Verizon to help power the future of industries.”



from TechRadar - All the latest technology news https://ift.tt/miusexQ

Thursday, April 28, 2022

How to Watch the First Solar Eclipse of 2022 Take a Bite Out of the Sun - CNET

Saturday's partial solar eclipse will be visible in parts of South America and Antarctica.

from CNET https://ift.tt/X2sYymj

Snapchat Wants to Put You in the Director's Seat With Director Mode - CNET

Director Mode adds new camera and video editing tools to the disappearing messaging app.

from CNET https://ift.tt/aeKlNrS

DIY iPhone Repair: What Happened When I Replaced My Own Battery - CNET

My iPhone 6 needed a new battery so I decided to try replacing it myself. Here's what you should know before trying it yourself.

from CNET https://ift.tt/1lwDWak

Move Aside, Way Day: Amazon Offers Better Deals on These 5 Products Today - CNET

Here are the best deals we could find on Amazon that save you more money than Wayfair's sale.

from CNET https://ift.tt/4d0j1bE

New 'Jurassic World Dominion' Trailer Teases World-Saving Mission - CNET

In the words of beloved Jurassic character Ellie Sattler: "If our world's gonna survive, what matters is what we do now."

from CNET https://ift.tt/7vZstbd

Wednesday, April 27, 2022

Latest Tech News

An update coming to Microsoft 365 web apps will allow users to switch freely between work and personal accounts at last.

Managing workloads when juggling a plethora of different email accounts can be a pain for the best of us. But with the latest update, Microsoft 365 users will no longer need to rely on finicky workarounds to switch contexts effectively.

Users will now be able to sign into multiple Microsoft accounts in the same browser, and switch between these accounts without needing to sign out and back in or use private browser windows.

According to Microsoft, this feature will benefit consultants who need to regularly access emails from different external companies, as well as consumer users switching between their corporate workloads and personal tasks like holiday planning to-do lists.

New Microsoft 365 feature

To get started with account switching, users need to access any of the Microsoft 365 web app and then click on the ‘Account Manager’ icon located in the top right corner.

From here, users can then add a new account or switch to an existing signed-in account in the browser. Upon a successful add or switch, the page will refresh with content from the new account in the same browser tab.

While a user can add multiple accounts in a Microsoft 365 web app, only one account will be active per app at a time.

If a user ends up with two or more browser app tabs with different accounts, Microsoft says users will be notified to refresh the tabs with non-active accounts.

Is it secure?

Microsoft noted that the new feature is not changing data access permissions or mixing data from different accounts and organizations, but merely helping to reduce the friction users face working with multiple accounts in the Microsoft 365 web apps.

Microsoft reiterated that each account would continue to only have access to the data which it has permission to access, and that it will maintain data integrity and privacy across different account and organizational boundaries

The new functionality is scheduled to be rolled out by June across the full productivity suite, spanning Office.com, Word, Excel, PowerPoint, Outlook , OneDrive, SharePoint, and Microsoft 365 admin center.



from TechRadar - All the latest technology news https://ift.tt/361ohij

'Tornado of Fire' Is Latest Sight on the Sun's Tumultuous Surface - CNET

Sunspots, solar flares and now a cyclone on the surface of our local star as the solar cycle heats up.

from CNET https://ift.tt/f7Bs14V

Best Beer Clubs for 2022 - CNET

Thirsty for new and interesting beer? One of these monthly beer clubs is the easiest way to try it all.

from CNET https://ift.tt/FbSpgq9

Best Lego Kits for Car Lovers for 2022 - CNET

Legos are the perfect quarantine activity, and these should all keep your car-obsessed loved one busy for ages.

from CNET https://ift.tt/RthVgdX

Here's How You Can Save an Extra $40 During Wayfair's Way Day Sale - CNET

Apply for a Wayfair credit card to get access to extra savings and take $40 off your first qualifying order of $100 or more.

from CNET https://ift.tt/YowpZLk

How to Get Overwatch 2 Beta Access From Twitch Drops Today - CNET

The first beta for Overwatch 2 is finally here, and Blizzard is giving out access for watching qualifying streams.

from CNET https://ift.tt/GqWoH2g

Latest Tech News

The Overwatch 2 beta continues to flex its muscles on Twitch, hitting a staggering new peak for the game. 

Overwatch 2's beta crushed its previous record (set yesterday around 500k viewers) with the new high this afternoon shattering 1M for the first time. Leaving its own records in the dust isn't a huge surprise. While Overwatch has maintained a dedicated playerbase despite two years without much content, it's not exactly setting the gaming world alight. Even more important to the breakneck pace is the fact that you can earn access to the Overwatch 2 beta by watching enough of certain streamers.

Other big fish in the pond, like Valorant, have come to fill the hole left by Overwatch, and so Blizzard is putting it in front of as many peoples faces as possible. By creating an opportunity to access the Overwatch 2 beta by viewing streams, it's got a shot at creating a temporarily captive audience to give a second (or first) look.

The list of Twitch streamers involved in the promotion includes former Overwatch pros A_Seagull and xQc who are currently pulling in over 100k viewers each. As it snowballs, other big variety streamers will jump in, and pull their own audiences along for the ride.

Overwatch 2 tops Twitch concurrent viewers list

(Image credit: Twitch)

The beta will be around for a while yet, only ending on May 17, so Overwatch 2 will have a chance to break its own records again. The main question is: how much will the viewership fall off after the beta access program ends?

It's difficult to imagine that these huge numbers will continue, but they won't disappear either. With the surge in interest, streamers will continue to play, and viewers will pick up on that. 

Of course, Warzone also has a shot to steal a fair amount of Overwatch 2's thunder. Warzone season 3 was unleashed today – just a day after the Overwatch 2 beta, and it's viewercount is on the rise. 

My bets are on Overwatch 2 to win the dust-up between the two, but time will tell. 



from TechRadar - All the latest technology news https://ift.tt/Cv0d8Nu

Latest Tech News

Staying up to date with the ever-evolving security landscape is central to maintaining the security of webservers and keeping potential threats at bay. 

There are several key threats to webservers that are important to be aware of, to prevent and mitigate those risks. DoS and DDoS attacks, SQL injections, unpatched software and cross-site scripting, to name a few. 

Now, a recent discovery from threat researchers at Avast has shone a light on an immediate and significant risk to web developers worldwide, named Parrot TDS.

What is a TDS?

Traffic Direction Systems (TDS) are not new. They have been an enemy of web-developers for several years. Used as landing pages that direct unsuspecting users to malicious content, TDS serve as a gateway for delivering various malicious campaigns via infected sites.

Many TDS’ have reached a high level of sophistication and often allow attackers to set parameters which look at users’ geolocation, browser type, cookies, and which website they came from. 

This is used to target victims who meet certain conditions and then only display phishing pages to them. These parameters are usually set so that each user is only shown a phishing page once to prevent servers from overloading.

Parrot TDS

In February, Avast’s threat researchers discovered a swarm of attacks using a new Traffic Direction System (TDS) to take control of the victim’s devices. The new TDS, named Parrot TDS, emerged in recent months and has already reached hundreds of thousands of users worldwide, infecting various webservers hosting over 16,500 websites.

One of the main factors distinguishing Parrot TDS from other TDS is how widespread it is and how many potential victims it has. From March 1, 2022, to March 29, 2022, Avast protected more than 600,000 unique users from around the globe visiting sites infected with Parrot TDS, including over 11,000 users in the U.K. In this timeframe, Avast protected the most users in Brazil (73,000) and India (55,000); and more than 31,000 unique users from the US.

In this particular case, the infected sites’ appearances are altered by a campaign called FakeUpdate, which uses JavaScript to display fake notices for users to update their browsers, offering an update file for download. The file we have observed being delivered to victims is a remote access tool called NetSupport Manager which is misused by attackers to give them full access to victims’ computers.

Parrot TDS also creates a backdoor on the infected webservers in the form of a PHP script to act as a backup option for the attacker.

FakeUpdate

Like Parrot TDS, FakeUpdate also performs a preliminary scan to collect information about the site visitor before displaying the phishing message. The scan checks which antivirus product is on the device to determine whether or not to display the phishing message. 

The distributed tool is configured in such a way that the user has very little chance of noticing it and if the file displayed by FakeUpdate is run by the victim, the attackers gain full access to their computer. 

The researchers observed other phishing sites being hosted on the Parrot TDS infected sites, but cannot conclusively tie them to Parrot TDS. 

CMS sites

We believe attackers are exploiting webservers of poorly secured content management systems, like WordPress and Joomla sites, by logging into accounts with weak credentials to gain admin access to the servers.  

WordPress has a long history of being a very rich and desirable target for exploits. This is because the software is based on running a series of PHP scripts, which is a popular venue for hackers. The sheer number of components, including plug-ins, themes, and other scripts, makes it hard to prevent potential infections or compromises.

On top of this, many WordPress websites are running older versions that could be behind several major releases, which leads to security vulnerabilities being left unpatched. In addition, some administrators are inexperienced in IT operational security or simply overburdened with other responsibilities and can’t dedicate enough time to implementing the necessary security measures to ensure the safety of a WordPress site.

How developers can protect their servers

Nevertheless, there are steps web developers can take to protect their servers against these attacks, starting with simply scanning all files on the webserver with an antivirus program. Further steps developers can take are:

- Replace all JavaScript and PHP files on the webserver with original files
- Use the latest CMS version
- Use the latest versions of installed plugins
- Check for automatically running tasks on the webserver (for example, cron jobs)
- Check and set up secure credentials, and use unique credentials for every service
- Check administrator accounts on the server, making sure each of them belongs to developers and have strong passwords
- When applicable, set up 2FA for all the webserver admin accounts
- Use available security plugins (WordPress, Joomla)

How site visitors can avoid falling victim to phishing

For site visitors, it’s as crucial as ever to be vigilant online. If a site being visited appears different than expected, visitors should leave the site and not download any files or enter any information. 

Similarly, visitors should only download updates directly from browser settings and never via other channels.



from TechRadar - All the latest technology news https://ift.tt/cZ2LSFV

Tuesday, April 26, 2022

No Filters Allowed: This Up-and-Coming Social Media App Aims for Authenticity - CNET

Tired of curated feeds and over-edited photos? You'll find none of that on BeReal.

from CNET https://ift.tt/mp5QKqB

Latest Tech News

This gripping adaptation of Marjorie Blackman’s book series continues as star-crossed lovers Callum (Jack Rowan) and Sephy (Masali Baduza) abscond from the discriminatory government of Albion. Our guide below details how to watch Noughts and Crosses season 2 online and 100% FREE for free via BBC iPlayer in the UK.

Watch Noughts and Crosses season 2 online

Premiere date: April 26, 10.40pm GMT on BBC One

New episodes: every Tuesday at the same time

Free stream: BBC iPlayer

Watch from anywhere: tune in today with a 100% risk-free VPN

Noughts and Crosses imagines an alternative history: one in which, 700 years ago, a collective of West African nations created the Aprican Empire and colonized Europe. That resulted in a Black political orthodoxy whose elite, called “Crosses”, live a fraught co-existence with a white underclass, called the “Noughts”.

Season 2 sees the country of Albion in turmoil. A pregnant Sephy is on the run with Callum after the Nought’s terrorist attempts to derail the government – run by corrupt politician Kemal (Peterson Joseph) – while Jude (Josh Dylan) goes into hiding when the actions of the Liberation Militia result in vigilante violence.

Alongside the main cast, Cara (Top Boy’s Jasmine Jobson) makes an unlikely ally for Jude, while rapper Michael Dappah features as an influential TV personality with his onscreen foil Chidi Abara played by Judi Love.

Blackman promises fans lots of surprises and suspense. So read on as we explain how to watch Noughts and Crosses season 2 online now and stream every episode from anywhere.

UK flag

How to watch Noughts and Crosses season 2 online for FREE in the UK

Will true love overcome all? Find out when Noughts and Crosses returns to BBC One on Tuesday, April 26 at 10.40pm GMT, with episodes repeated every Wednesday at the earlier time of 9pm. 

If you’d rather watch online, however, then all 4 episodes will be on BBC iPlayer shortly after the show gets its TV debut, which means you don’t need to wait to watch the entire season.

BBC iPlayer is 100% free to stream, but you will need a valid TV licence. And whether you want to watch live or on catch-up, you can access iPlayer on any of the following devices: desktop on Windows and Mac machines, on smartphone apps for Android and iOS, as well as media streaming devices like Apple TV, Amazon Fire, Chromecast, Roku and more. You can also get BBC iPlayer on PlayStation and Xbox consoles.

How to watch Noughts and Crosses season 2 online from outside your country

Don't let geo-restrictions prevent you from watching brand-new episodes of Noughts and Crosses. If you’re travelling abroad when the show airs, you’ll struggle to access your normal streaming service. However, we can get you out of this sticky situation with the help of a VPN.

The best VPN – otherwise known as a virtual private network – offers a simple solution. This piece of software alters your IP address to appear as though you're based in another country, allowing you to gain access to your preferred streaming platform, and watch episodes live or on-demand just like you would at home.

Use a VPN to watch Noughts and Crosses online from anywhere

ExpressVPN is the world's top VPN right now
Our experts have tried and tested some of the best VPNs on the market so you don't have to and recommend ExpressVPN as their top pick. Not only is it one of the fastest and easiest to use, but this VPN is compatible with a whole host of devices, including Amazon Fire TV Stick, Xbox, Playstation, and iOS and Android devices.

Get an extra 3 months completely FREE when you sign up for an annual Express VPN plan now. If you're not happy with the service within the first 30 days, let them know and they'll give you your money back.

- Try ExpressVPN 100% risk-free for 30 daysView Deal

Three simple steps to using a VPN to watch Noughts and Crosses

1. Download and install a VPN - we recommend ExpressVPN

2. Connect to the relevant server location - launch the VPN app, click on 'choose location' and select the right location i.e. UK for iPlayer

3. Head to the chosen broadcaster's live stream - in this case, head to BBC iPlayer




from TechRadar - All the latest technology news https://ift.tt/vOrNCz4

More Building Blocks of DNA Seen in Meteorites, Boosting Wild Theory of Life on Earth - CNET

We are all made of star dust, or maybe more specifically, star dust that hitched a ride on an asteroid and smashed into Earth as a meteorite.

from CNET https://ift.tt/QDsrcmR

Latest Tech News

Random numbers are in demand for a wide variety of use cases, from computer encryption to lotteries and gambling, as well as for scientific research.

Amazon Web Services (AWS) Marketplace now offers a quantum computing-based random number generation service, developed by the Australian National University’s Quantum Numbers project (AQN).

AQN said the project, which has been operating out of ANU’s campus lab for the last 10 years, uses quantum technology to generate true random numbers in real time by measuring the quantum fluctuations of a vacuum.

How can it be used?

AQN researcher Dr Syed Assad said that the random number service can help meet users’ needs in “IT, data science and modeling” and that “you can’t have reliable models for forecasting and research simulation” without random numbers.

Assad also highlighted creative use cases for the quantum solution, saying the number can also be used by artists to “help with removing human biases from their creative work”.

“In computer gaming and smart contracts, true random numbers are also an indispensable resource,” said Assad. “We’ve even had a request from a father to generate random numbers that he then used as inspiration for his daughter’s name!”

AQN says it has received over two billion requests for random numbers from 70 countries since the project began, including clinical trials, simulating processes and events in computer games, generating secure passwords, simulating virus outbreak behaviors, and predicting the weather.

How does the service work?

AQN team leader Professor Ping Koy Lam said its use of lasers at the quantum level is what makes the solution distinct.

"Quantum physics practically provides an infinite source of truly random numbers,” said Professor Lam. “These quantum random numbers are guaranteed by the laws of physics to be unpredictable and unbiased."

"This technology relies on the detection of vacuum. Vacuum is not a region of space that is completely empty and devoid of energy. In fact, it still contains noise at the quantum level.”

"Through AWS Marketplace, ANU is offering an incredibly powerful source of randomness easily accessible to customers across the globe."

AWS Marketplace users can make 100 random number requests per second via the service, at a cost of $0.005 per request.

Amazon is not the only BigTech firm to keeping a foot in the quantum computing race, though. Alphabet has revealed it is spinning off its Palo Alto-based quantum technology group Sandbox into an independent firm.

Sandbox has been operating as a separate group outside the company’s moonshot division X for almost two years, having been launched in 2016.



from TechRadar - All the latest technology news https://ift.tt/BpCMTrJ

Latest Tech News

Arm is expanding its Total Solutions for IoT portfolio with two new solutions for its Cortex-M and Cortex-A processors.

First launched six months ago, Arm Total Solutions for IoT represented a radical shift in the design approach for the IoT and embedded markets by combining hardware IP, platform software, machine learning models, tools and more to help simplify product development and accelerate product design.

As part of its expanded IoT roadmap, Arm is launching the highest-performing and most secure Cortex-M chip to date in the form of the new Cortex-M85 processor. At the same time though, the company is expanding its Arm Virtual Hardware to more platforms including third-party devices to make the development process more accessible.

VP of IoT and Embedded at Arm, Mohamed Awad provided further insight on the company’s decision to bolster its IoT portfolio in a press release, saying:

“Developers drive the future of the IoT, but they face an ever-increasing demand for higher performance, increased security and less complex development flows. The IoT runs on Arm, and we have a responsibility to create greater opportunities for IoT innovation and scale by continually raising the bar on performance, simplified development, and software reuse for our ecosystem.”

Arm Total Solutions

As part of its expansion in the IoT space, the Arm Total Solution for Cloud Native Edge Devices is launching today and is the first designed for Cortex-A and based on Cortsone-1000. For those unfamiliar, Arm Cortsone, which is a pre-integrated, pre-verified IP subsystem that allows silicon designers to focus their time and efforts on differentiation, is at the heart of the company’s Total Solutions portfolio.

Arm Total Solution for Cloud Native Edge Devices provides IoT developers with the full power and potential of platform operating systems like Linux so that application-class workloads can be developed for devices such as wearables, gateways and high-end smart cameras.

Meanwhile, Arm’s new Total Solution for Voice Recognition is based on the Corstone-310 subsystem and is pre-integrated with both the new Cortex-M85 and Arm Ethos-U55 to create the company’s highest ever performance MCU-based design. It’s primarily targeted at use-cases ranging from smart speakers and thermostats to drones and factory robots.

Finally, Arm Virtual Hardware now addresses existing devices, hardware and projects so that developers don’t need to invest in large custom hardware farms. Arm is also expanding its library of virtual devices to include third-party hardware from a number of partners including NXP, ST Microelectronics and Raspberry Pi.

Now that Arm has equipped IoT developers with the hardware, software and tools they need, we could soon see the IoT and embedded market expand even further.



from TechRadar - All the latest technology news https://ift.tt/SeRZjJw

Latest Tech News

Phishing is, unfortunately, profitable, hard to detect, and relatively easy to engage in. With digital transformations expedited across the globe, phishing is bound to experience continued explosive growth.

According to Phishlabs, the number of phishing attempts over Q1 2021 increased by nearly 50%. There’s no reason to believe it will stop climbing either.

That means increased levels of digital harm and risk. To counteract such an uptick, new approaches to phishing detection should be tested or current ones improved. One way to improve existing approaches is to make use of web scraping.

Poking phish

Phishers would be hard-pressed to completely replicate the original website. Placing all URLs identically, replicating images, cooking the domain age, etc. would take more effort than most people would be willing to dedicate. 

Additionally, a perfect spoof would likely have a lower success rate due to the ability for the target to get lost (by clicking on an unrelated URL). Finally, just like with any other scam, duping everyone is not necessary, therefore the perfect replica would be a wasted effort in most cases.

However, those who do phishing aren’t dumb. Or at least those who are successful at it aren’t. They still do their best to make a believable replica with the least effort required. It may not be effective against those who are tech-savvy, but even a perfect replica might not be effective against the wary. In short, phishing relies on being “just good enough”.

Therefore, due to the nature of the activity, there’s always a glaring hole or two that can be discovered. Two good ways to get a head start is to either look for similarities between frequently-phished-websites (e.g. fintech, SaaS, etc.) and suspected phishing websites or to collect patterns of known attacks and work your way up from there.

Unfortunately, with the volume of phishing websites appearing daily and the intent to target less tech-savvy people, solving the issue may not be as simple as it seems at first glance. Of course, as is often the case, the answer is automation. 

Looking for phish

There have been more methods developed over the years. An overview article written in 2018 by ScienceDirect lists out URL-based detection, layout recognition, content-based detection. The former often lags behind phishers as databases are updated slower than new websites appear. Layout recognition is based on human heuristic and is thus more prone to failure. Content-based detection is computational heavy.

We will be paying slightly more attention to layout recognition and content-based detection as these are complicated processes that benefit greatly from web scraping. Back in the day, a group of researchers had created a framework for detecting phishing websites called CANTINA. It was a content-based approach which would check for data such as TF-IDF ratios, domain age, suspicious URLs, improper usage of punctuation marks, etc. However, the study had been released in 2007 when automation opportunities were limited.

Web scraping can improve the framework immensely. Instead of manually attempting to find the outliers, automated applications can breeze through websites and download the relevant content within. Important details such as the ones outlined above can be extracted from the content, parsed, and evaluated.

Building a net

CANTINA, developed by the researchers, had a drawback - it was only used to prove a hypothesis. For these purposes, a database of phishing and legitimate websites had been compiled. The status of both was known a priori.

Such methods are suitable for proving a hypothesis. They are not as good in practice where we don’t know the status of the websites ahead of time. Practical applications of projects similar to CANTINA would require a significant amount of manual effort. At some point, these applications would no longer stand as “practical”.

Theoretically, though, content-based recognition seems like a strong contender. Phishing websites have to reproduce content in a nearly identical manner to the original. Any incongruences such as misplaced images, spelling mistakes, missing pieces of texts can trigger suspicion. They can never stray too far from the original, which means metrics such as TF-IDF would have to be similar by necessity.

Content-based recognition’s drawback has been the slow and costly side of manual labor. Web scraping, however, moves most of the manual effort into complete automation. In other words, it enables us to use existing detection methods on a significantly larger scale.

First, instead of manually collecting URLs or taking them from an already existing database, scraping can create its own quickly. They can be collected through any content that has hyperlinks or links to these supposed phishing websites in any shape or form.

Second, a scraper can traverse a collection of URLs faster than any human ever could. There are benefits to manual overview such as the ability to see the structure and content of a website as it is instead of retrieving raw HTML.

Visual representations, however, have little utility if we use mathematical detection methods such as link depth and TF-IDF. They may even serve as a distraction, pulling us away from the important details due to heuristics.

Parsing also becomes an avenue for detection. Parsers frequently fall apart if any layout or design changes happen within the website. If there are some unusual parsing errors when compared to the same process performed on parent websites, these may serve as an indication of a phishing attempt.

In the end, web scraping doesn’t produce any completely new methods, at least as far as I can see, but it enables older ones. It provides an avenue for scaling methods that might otherwise be too costly to implement.

Casting a net

With the proper web scraping infrastructure, millions of websites can be checked daily. As a scraper collects the source HTML, we have all the text content stored wherever we’d like. Some parsing later, the plain text content can be used to calculate TF-IDF. A project would likely start out by collecting all the important metrics from popular phishing targets and move on to detection.

Additionally, there’s a lot of interesting information we can extract from the source. Any internal links can be visited and stored in an index to create a representation of the overall link depth.

It’s possible to detect phishing attempts by creating a website tree through indexing with a web crawler. Most phishing websites will be shallow due to the reasons outlined previously. On the other hand, phishing attempts copy websites of highly established businesses. These will have great link depths. Shallowness by itself could be an indicator for a phishing attempt.

Nevertheless, the collected data can then be used to compare the TF-IDF, keywords, link depth, domain age, etc., against the metrics of legitimate websites. A mismatch would be cause for suspicion. 

There is one caveat that has to be decided “on the go” - what margin of difference is a cause to investigate? A line in the sand has to be drawn somewhere and, at least at first, it will have to be fairly arbitrary.

Additionally, there’s an important consideration for IP addresses and locations. Some content on a phishing website might only be visible to IP addresses from a specific geographical location (or not from a specific geographical location). Getting around such issues, in regular circumstances, is challenging, but proxies provide an easy solution.

Since a proxy always has an associated location and IP address, a sufficiently large pool will provide global coverage. Whenever a geographically-based block is encountered, a simple proxy switch is all it takes to hop over the hurdle.

Finally, web scraping, by its nature, uncovers a lot of data on a specific topic. Most of it is unstructured, something usually fixed by parsing, and unlabeled, something usually fixed by humans. Structured, labeled data may serve as a great ground for machine learning models.

Terminating phish

Building an automated phish detector through web scraping produces a lot of data for evaluation. Once evaluated, the data would usually lose its value. However, like with recycling, that information may be reused with some tinkering.

Machine learning models have the drawback of requiring enormous amounts of data in order to begin making predictions of acceptable quality. Yet, if phishing detection algorithms start making use of web scraping, that amount of data would be produced naturally. Of course, labeling might be required which would take a considerable amount of manual effort.

Regardless of this, the information would already be structured in a manner that would produce acceptable results. While all machine learning models are black boxes, they’re not entirely opaque. We can predict that data structured and labeled in a certain manner will produce certain results.

For clarity, machine learning models might be thought of as the application of mathematics to physics. Certain mathematical modeling seems to fit exceptionally well with natural phenomena such as gravity. Gravitational pull can be calculated by multiplying the gravitational constant by the mass of two objects and dividing the result by the distance between them squared. However, if we knew only the data required, that would give us no understanding about gravity itself.

Machine learning models are much the same. A certain structure of data produces expected results. However, how these models arrive at their predictions will be unclear. At the same time, at all stages the rest is as predicted. Therefore, outside of fringe cases, the “black box” nature doesn’t harm the results too much.

Additionally, machine learning models seem to be among the most effective methods for phishing detection. Some automated crawlers with ML implementations could reach 99% accuracy, according to research by Springer Link.

The future of web scraping

Web scraping seems like the perfect addition to any current phishing solutions. After all, most of cybersecurity is going through vast arrays of data to make the correct protective decisions. Phishing is no different. At least through the cybersecurity lens.

There seems to be a holy trinity in cybersecurity waiting to be harnessed to its full potential - analytics, web scraping, and machine learning. There have been some attempts to combine two of three together. However, I’ve yet to see all three harnessed to their full potential. 



from TechRadar - All the latest technology news https://ift.tt/mcbuKng

Monday, April 25, 2022

Latest Tech News

Taiwanese electronics company and major Apple supplier Foxconn is going to be shutting down two of its factories in the city of Kushan, China, as COVID-19 cases surge in the area. 

According to the South China Morning Post, the factories are near Shanghai, and to prevent COVID spillover, the city of Kushan enacted a citywide lockdown to prevent further contamination. On the surface, this appears to be a major blow for Apple, but Foxconn reassures it has things covered.

Another COVID shutdown

According to another report by Reuters, a spokesperson for Foxconn stated that production has moved over to other factories and plenty of Apple products are housed in overseas warehouses. So, the overall impact on both Apple and Foxconn will be minimal, at best.

The same can’t be said for Foxconn’s other production lines. Manufacturing for data transmission equipment and connectors will stay on hold until Chinese authorities give them the green light to start again.

Despite Foxconn’s reassurance, this isn’t the first time something like this has happened. Back in March 2022, a COVID-19 outbreak in the city of Shenzhen caused all production in the area to shut down.

This included Foxconn’s Longhua and Guanlan factories where they manufactured products for various tech giants like Apple and Samsung. Incidents like these have been occurring almost routinely during the pandemic, such as the May 2021 shutdown.

We reached out to Apple for comment on the sudden shutdown and how it will impact future products and will update this story when and if it responds.

Migrating production

Foxconn has been making moves recently to shift iPhone production away from the Chinese mainland.

iPad and MacBook production moved over to Vietnam back in 2020 after Apple specifically requested it due to the US-China trade war. More recently, Foxconn’s factory in Sriperumbudur, India, is going to start pumping out iPhone 13 devices after getting government clearance.

The future looks bright for Apple and Foxconn, but the former employees may be left holding the short end of the stick. For starters, Foxconn shut down the factories even though the local government gave 60 companies permission to reopen production lines.

The employees have also been under a “closed-loop system” meaning they’ve been confined to their dormitories inside the two Foxconn campuses by order of the authorities.



from TechRadar - All the latest technology news https://ift.tt/vxCKf4t

Best Cloud Storage for 2022: How to Choose Between Google Drive, OneDrive, Dropbox, Box - CNET

Looking for a way to store files and photos in the cloud? We've compared features and prices on the top options.

from CNET https://ift.tt/5uGpCIT

Pokemon Go May 2022 Community Day Features Alolan Geodude - CNET

The game's next Community Day event takes place May 21.

from CNET https://ift.tt/BnPXdTC

Latest Tech News

After upgrading its own business PCs to its latest operating system, Microsoft has reached a rather unsurprising conclusion: Windows 11 is good.

In a new blog post, Microsoft explained it has now upgraded almost the entirety of its circa 182,000-strong workforce to Windows 11, claiming it had no increase in support tickets in the process.

Microsoft attributed the successful rollout to having far fewer app compatibility challenges than in the past, not needing to build out a plethora of disk images, and delivery processes and tools that were greatly improved during the rollout of Windows 10. The update utilized a gradual ‘ring-based’ approach.

Windows 11 rollout

Microsoft said it identified which of its devices were upgradable first, using its Update Compliance tool and Microsoft Endpoint Manager's Endpoint analytics, allowing the firm to create a clear timeline for the rollout.

Windows 11 has specific hardware requirements, and a percentage of Microsoft’s devices were not upgraded. The employees with these incompatible devices will continue to run Windows 10 in parallel, before getting a Windows 11 device at their next device refresh.

Microsoft said that, in total, 190,00 devices qualified for the upgrade and that its upgrade process was 99% successful.

The company also explained the importance of preparing readiness content for its employees during the internal rollout process.

The software giant said that Yammer, FAQs, Microsoft SharePoint, email, Microsoft Teams, its internal homepage, and digital signage were some of the tools used to bring the message to its employees.

Microsoft said its communications team focused on promoting the new look and features of Windows 11, including the speed of the update and its flexible scheduling.

The news comes as adoption of Windows 11 by the wider market seems to be moving relatively slowly.

In March 2022, Windows 11 took just 0.1% market share from other editions of Microsoft's software, accounting for 19.4% of the overall usage, with a further 0.6% using a Windows 11 Insider build.

It seems consumers also need to be wary of installing and managing their own Windows 11 updates, as some cybercriminals seem to be snapping up the opportunity to attack devices.

Security researchers found a fake Windows 11 upgrade website that promises to offer a free Windows 11 install for PCs that don’t meet the minimum specifications, but instead installs data-stealing malware.



from TechRadar - All the latest technology news https://ift.tt/QI3Xxzj

Latest Gadgets News

Elon Musk clinched a deal to buy Twitter Inc for $44 billion on Monday in a transaction that will shift control of the social media platform populated by millions of users and global leaders to the world's richest person.

from Gadgets 360 https://ift.tt/Z8ryfoi

Wayfair Way Day 2022: 48 Hours of Deals Starting April 27, Early Deals Available Now - CNET

Way Day 2022 is now official and it's happening later this week. Some early deals are live now, with a bunch more coming on April 27.

from CNET https://ift.tt/o5qDF0A

Latest Tech News

You don't even need 280 characters to deliver this momentous news: Elon Musk just bought Twitter.

The Tesla CEO and SpaceX founder has been circling the popular social media platform for weeks, using Twitter itself as a medium to announce both his intentions and ongoing frustrations with the platform in its current form.

Now, after lining up the funds (his own and hefty support from Morgan Stanley) Musk will pay $43.4 billion -- roughly $54.20 per share -- in a tender offer that gives him control of the company. The deal now faces regulatory approval.

With Twitter's earnings report just days away, it's likely the new owner will show up during the company's Q1 earnings call - at least just to say "hi," and demurely refuses to answer most analysts' questions directly.

In a release on the acquisition, Musk said, "Free speech is the bedrock of a functioning democracy, and Twitter is the digital town square where matters vital to the future of humanity are debated.

"I also want to make Twitter better than ever by enhancing the product with new features, making the algorithms open source to increase trust, defeating the spam bots, and authenticating all humans. Twitter has tremendous potential – I look forward to working with the company and the community of users to unlock it."

See more

Bret Taylor, Twitter's Independent Board Chair noted in the release that "The proposed transaction will deliver a substantial cash premium, and we believe it is the best path forward for Twitter's stockholders."

Parag Agrawal, Twitter's CEO and the person who may end up working most closely with Musk said in the release, "Twitter has a purpose and relevance that impacts the entire world. Deeply proud of our teams and inspired by the work that has never been more important." He notably did not reference Musk directly.

Musk's triumph comes after a circuitous path to ownership: First he bought almost 10% of Twitter shares, giving him a seat at the table and inviting him to the board. Musk accepted and then just as quickly backed out. But he wasn't finished. Soon, he was offering $43 billion for the company, which prompted Twitter's board to adopt a poison-pill plan that would have sold cheaper shares to shareholders had Musk sought to purchase more than 15% of the company's shares.

Soon after, Musk, who has been on the platform since 2009, returned to a tender offer, which meant he'd need to pull together all the money to buy the company. As of last week, Musk secured the funds, and over the weekend, Musk and Twitter's executive team met in person to hammer out the details.

A bumpy road

Not everyone is thrilled at the prospect of a Musk-owned Twitter. In the run-up to the announcement, #RIPTwitter was trending on the platform.

As for what comes next, Musk has made clear his intentions to ensure that Twitter supports free speech from all sides (the implication being that it currently does not, though there is no empirical evidence to support this).

He may revisit some user bans, including that of former President Trump.

He'll likely open-source Twitter's code.

A fan of blockchain and NFTs, Musk might push the platform more aggressively into the crypto space.

But investors and backers will be most interested in Musk's growth plan. Twitter has done a decent job of generating more revenue from existing users, but its growth has in recent years been relatively slow and flat. It's not clear that Twitter could ever have the broad-based, global appeal of, say Facebook (which has its own growth struggles) or TikTok.

It's unclear what Musk can do to reenergize some of Twitter's biggest celebrity accounts.

Musk will probably fast-track the already-under-development Tweet Edits feature, since he made it clear during the acquisition effort that he's a fan.

What will Elon do?

What happens next depends on Elon Musk, or rather the Elon Musk who shows up to run Twitter. Will it be the brilliant, sure hand that, through SpaceX, regularly ferries astronauts and supplies to the International Space Station? The man who basically created the EV market with Tesla? 

Maybe.

It might also be the man who impulsively tweets his inner ID and EGO. Who jokes that "The next Twitter board meet's gonna be lit," with a picture of him smoking a joint on Joe Rogan's podcast.

There sometimes seems to be little middle ground for Musk, who is both extremely successful and rich and extremely impulsive and emotional.

The fear that Musk will let the worst element back on Twitter -- Nazis, trolls, anti-vaxxers, Donald Trump, and so on -- is real. A free-speech absolutist might demand ALL voices be heard, even the dangerous ones.

Still, Musk doesn't truly know the inner workings of Twitter's extensive (and still flawed) content moderation system. He soon will. That may inspire some different and more rational thinking about how to excite and energize Twitter for the future while protecting the most vulnerable who still use it every day.



from TechRadar - All the latest technology news https://ift.tt/J0cGZU4

Sunday, April 24, 2022

Twitter Said to Be Re-examining Elon Musk's $43B Takeover Bid - CNET

Meeting between the two sides Sunday suggest company might be open to the proposal, The Wall Street Journal reports.

from CNET https://ift.tt/p9cb453

Amazon Astro Can Do More Than Patrol Your Home - CNET

We rounded up everything Amazon's home robot can do, from delivering beers to beatboxing.

from CNET https://ift.tt/hb31NlA

Confused on Masks? Learn the Latest Rules for Planes, Buses, Trains and Ride Sharing - CNET

Masks are now mostly optional on public transit across the US, but some cities are still requiring them.

from CNET https://ift.tt/ClNziAZ

There's Actually a Better Place to Mount Your TV - CNET

We'll break down the do's and don'ts of TV placement.

from CNET https://ift.tt/rLUtaki

6 Best Peloton Alternatives for 2022: Get the Same Great At-Home Workout for Less - CNET

Before you splurge on a Peloton, check out these more affordable options from Bowflex, Echelon, Myx Fitness, NordicTrack and ProForm.

from CNET https://ift.tt/O7iEmox

Saturday, April 23, 2022

Best Gaming Chair for 2022 - CNET

We tried gaming chairs from DXRacer, Secretlab and others to help you find the size and style that's right for you.

from CNET https://ift.tt/6dmltG2

Why Thousands of Netflix Users Are Canceling, and How to Quit - CNET

Learn why some are leaving the video streaming service behind and how to end your own subscription if you choose.

from CNET https://ift.tt/VXqHItU

'Old Enough' on Netflix: Why I Can't Stop Watching 2-Year-Olds Run Errands - CNET

Commentary: I'm rooting for these toddlers from Japan who are taking care of business.

from CNET https://ift.tt/TMrte74

NBA Playoffs 2022: Livestream Raptors vs. 76ers, Mavericks vs. Jazz, Nets vs. Celtics - CNET

The first round of the 2022 NBA playoffs continues with games on ESPN and TNT.

from CNET https://ift.tt/Ghqr02A

Why Blood Type Matters for Heart Health, According to Science - CNET

People with type A and B blood might be more susceptible to heart disease and blood clots.

from CNET https://ift.tt/yClFIwW

Best Gaming Laptop for 2022 - CNET

Our picks of the best gaming laptops for when it's time to play.

from CNET https://ift.tt/ordS4Mw

Keep Cables and Cords Concealed and Save Up to 28% - CNET

Wrangle your wires in the office, living room, bedroom and anywhere else you need organization to keep things tidy.

from CNET https://ift.tt/LTnZFHs

Friday, April 22, 2022

Latest Tech News

After a groundswell of complaints from customers and reviewers alike, it looks like there might be a fix coming for the ridiculously loud fans on the Steam Deck, courtesy of iFixit.

Since its launch in late February, some Steam Deck owners have complained about the high-pitched whirring of the handheld's fans, with some finding it especially bothersome like our colleagues over at PC Gamer – though our own Matt Hanson wasn't especially bothered by the noise.

See more

The difficulty seems to be availability of the 50mm x 10mm 5V fan, which might have some inconsistent performance since there aren't a whole lot of those in supply chains, and Valve has been looking at different fans to address the issue.

Fortunately, iFixit is on the case. The online self-repair clearinghouse has partnered with Valve to provide support for fixing and modding the Steam Deck -- and in response to a user request on Twitter, iFixit confirmed that it is looking to sell quieter replacement fans for the Steam Deck.

There's no word yet on if and when such replacement fans would become available, but hopefully it won't be too much longer.


Analysis: another win for right-to-repair

Right-to-repair has been in the news lately, driven both by legislation and advocacy on behalf of consumers, but also because companies like Apple and Google are softening previously rigid stances on the matter.

The question of who owns a product once it's purchased should be straightforward, but it's really not. Due to the increasing amount of proprietary technology in everything from cars to iPhones, many manufacturers lock customers out of the products they've purchased. 

Companies argue that due to the deeply intertwined nature of so many of these components, tinkering with a product's innards raise more concern than merely a voided warranty; it could pose serious safety issues for customers and those around them.

Consumer advocates have pushed back, however, pointing to the very old legal principle that once you purchase something, no one should be allowed to tell you what you can and can't do with it, so long as you are not breaking any laws.

Many of today's engineers first got into engineering by disassembling and reassembling existing products, and so right-to-repair has been seen as a crucial way for someone's engineering education to begin and progress. Take that away, and what happens to future of the engineering profession itself?

Fortunately, common sense seems to be making headway in this space, and Valve especially should be commended for leading the way with the Steam Deck.



from TechRadar - All the latest technology news https://ift.tt/c9YjlCX

4 Things Elon Musk Could Change if He Buys Twitter - CNET

The Tesla boss has been throwing out ideas in his tweets and public remarks.

from CNET https://ift.tt/8IGOgJ7

Latest Tech News

Replacing the hard drive or SSD in your laptop can be a daunting task and this is even more true on a MacBook which is why many users turn to external hard drives or cloud storage services instead.

With the release of the MacBook Pro 2021 though, Apple decided to bring back the SD card slot so that creative professionals could easily download photos and videos from their DSLR cameras. Even if you’re not a photographer though, you can still leverage the SD card slot in the new MacBook Pro to easily expand the storage capacity of your Mac.

This is the idea behind Transcend’s latest SD card which was exclusively designed for the MacBook Pro 2021 and allows users to add up to 1TB of additional storage to their laptops at a fraction of what it would cost to do so through Apple.

Transcend JetDrive Lite 330

The Transcend JetDrive Lite 330 is available in several different configurations depending on your storage needs and MacBook Pro users can add either 128GB, 256GB, 512GB or even 1TB of storage to their device in just a few seconds.

The SD card itself is built using high-quality NAND flash and it delivers read speeds of up 95 Mbps and write speeds of up to 75Mbps. According to a press release from Transcend, the JetDrive Lite 330 is manufactured using chip-on-board technology and the SD card is resistant to water, dust and shock to provide extra protection for the data stored on it.

Transcend also provides a free data recovery tool called RecoveRx which allows users to bring back their deleted files. Due to the high capacity of the JetDrive Lite 330, the SD card is well suited for both Time Machine backups and large iTunes libraries.

In addition to the MacBook Pro 2021, the JetDrive Lite 330 also supports the MacBook Pro 13 from late 2012 to early 2015. However, Transcend makes other JetDrive Lite expansion cards to support other MacBook models.

Starting at just $37 for the 128GB model and going all the way up to $250 for the 1TB model, the Transcend JetDrive Lite 330 provides an affordable way to add storage space to your existing MacBook without having to purchase a new device.



from TechRadar - All the latest technology news https://ift.tt/ToPWsyk

The Best Sheets for 2022 - CNET

Need sheets for a cold or hot sleeper? Got pets? We have the best sheets for you.

from CNET https://ift.tt/Umu8lt5

Scientists Prove Indiana Jones Right: Smaller Scorpions Are Deadlier - CNET

Scorpions. Why did it have to be scorpions?

from CNET https://ift.tt/c0IG4XT

Latest Tech News

Twitter has changed a lot in recent years, and especially more recently with a subscription service, Spaces, and the ability to remove followers. Some might say the social media platform is virtually unrecognizable from the platform they first joined back in 2006. 

Actually, I might say that but now Twitter is, according to Tech Blogger and code-sleuth Jane Manchin Wong, a new feature that takes me all the way back to my own first Tweet on March 19, 2007. 

Code-named "Vibe," the "Set a status" feature would let you show followers what you're doing right now.

See more

In the captured feature screen, there's a "What are you doing?" prompt with a dropdown list of options like, "Driving highway," "Shopping grocery," and "Lurking Twitter".

This might appear with your profile, possibly even above your tweets. Wong likens it to what Instagram Threads does with "Status."

I, however, see it differently.

When Twitter launched in 2006, the idea was to let followers (usually co-workers, colleagues, friends) know what you were doing at any given moment.

The service's tag line back then was quite clear: "A global community of friends and strangers answering one simple question: What are you doing?"

Twitter in 2006

(Image credit: Future)

The last sentence appears in bright yellow as if Twitter had run a highlighter across it.

That's right. The wording is exactly the same.

Fifteen years ago, I had no idea how to use Twitter, so I followed the platform's instructions and simply listed what I was doing: "Listening to TWiT. Eating a bagel. Drinking my coffee. Typing this note."

See more

It was arguably a terrible post, but it did answer the question, "What are you doing?"

The Twitter of 2022 is, obviously, a far different beast. It asks "What's happening?" It's a place to post what you're thinking, explore ideas, argue, and share a wide array of information, photos, video, and audio. It's a media platform.

Twitter, perhaps sensing that it has moved oceans away from its original intent, is thinking that just a little hint of the past - of its roots - might make Twitter more engaging, fun, and less of a self-serious place.

Instead of an angry tweet about the latest political debate or a pitched battle regarding Android versus iOS, there might just be an old-school status update, one that says the Twitter member is driving, walking, or eating a bagel.

I have no idea if Twitter fully plans to launch "Set a status" (I've asked Twitter directly and am awaiting a response"), but I think it could use this nostalgic feature, especially as it faces the prospect of new ownership (Hi, Elon Musk!) and maybe some significant changes that could, again, change the face of the venerable platform.



from TechRadar - All the latest technology news https://ift.tt/sOi5Ykq

Thursday, April 21, 2022

Best Headphones and Wireless Earbuds for iPhone 12 - CNET

Looking for a new pair of headphones for your iPhone 12? Here's a look at CNET's top picks -- from full-size noise-canceling models to tiny wireless earbuds.

from CNET https://ift.tt/diureaD

Latest Tech News

Razer has released its newest gaming soundbar, the Leviathan V2, complete with two full-range drivers, a down-firing subwoofer, THX Spatial Audio, and the company’s signature Chroma RGB lights.

As the name suggests, this is a follow-up to the Leviathan soundbar which was released back in 2014 to critical acclaim. Since then, Razer made a number of improvements in terms of performance and the signature Razer features.

Leviathan V2 specs

The Leviathan V2 has a wider output range than its predecessor, with multiple types of drivers, while also being lighter. In addition to the two full-range drivers, you’ll get two tweeters for high-frequency sound and two passive radiators for an enhanced sound.

It’s called ‘passive’ because those types of speakers don’t directly take electricity. Rather, they work as a loudspeaker for a smaller driver behind it and boost that output.

It’s worth pointing out that the subwoofer aims down into the ground for deeper bass.

The Leviathan V2 soundbar weighs just over three pounds, while the subwoofer weighs comes in at a more substantial 6.61 pounds. This new soundbar is slightly bigger than the first Leviathan, coming in at 19.7 x 3.6 x 3.3 inches (W x H x D).

On the back, there’s a USB Type-C port for a PC connection and a subwoofer output. The V2 also has Bluetooth 5.2 capability to wirelessly connect to other devices.

Spatial Audio and rainbow lights

Features are pretty stacked. THX Spatial Audio is a 7.1 surround sound that can accurately deliver sound for a realistic gaming session. With its high level of positional accuracy, it'll sound like in-game enemies are sneaking up behind you.

As mentioned above, the V2 supports Razer Chroma RGB, so you can customize the rainbow lights that shine from below the soundbar. You can tweak the lighting settings to make the lights shine in a Wave pattern or a static Spectrum Cycling via the Chroma Studio app.

And you can tweak the settings from your phone via the official Razer app or from afar via the cloud thanks to Razer Synapse.

The Leviathan V2 is currently available for purchase at $249.99.



from TechRadar - All the latest technology news https://ift.tt/SDwgKZN

'Russian Doll' Season 2: That Ending Explained, All Your Questions Answered - CNET

Does time collapse? Does Nadia get her family's gold back? Here's what happens at the end of season 2 of the Netflix show. Get ready for spoilers.

from CNET https://ift.tt/eO53vbk

Lyrid Meteor Shower Peaks Tonight and Tomorrow: How to See It Sizzle - CNET

Shooting star season starts with the first major shower since the Quadrantids back in early January.

from CNET https://ift.tt/0cFM4Hx

Latest Tech News

Almost all Android smartphones could be vulnerable to remote code execution as a result of vulnerabilities discovered in the audio decoders of Qualcomm and MediaTek chips.

The discovery of these vulnerabilities was made by Check Point Research (CPR) and if left unpatched, an attacker could exploit them to remotely gain access to a device’s camera and microphone by using a malformed audio file. At the same time, an unprivileged Android app could leverage these vulnerabilities to escalate its privileges in order to spy on a user’s media data and listen in on their conversations.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Since most Android devices are powered by either Qualcomm or MediaTek chips, the impact of these vulnerabilities is wide reaching but thankfully, CPR responsibly disclosed its findings to both chipmakers who have since issued fixes.

Check Point security researcher Slava Makkaveev provided further insight on the firm’s findings regarding these high and critical severity vulnerabilities in a press release, saying:

"We've discovered a set of vulnerabilities that could be used for remote execution and privilege escalation on two-thirds of the world's mobile devices. The vulnerabilities were easily exploitable. A threat actor could have sent a song (media file) and when played by a potential victim, it could have injected code in the privileged media service. The threat actor could have seen what the mobile phone user sees on their phone. In our proof of concept, we were able to steal the phone's camera stream. What is the most sensitive information on your phone? I think it's your media: audio and videos. An attacker could have stolen that through these vulnerabilities.”

Vulnerable audio decoders

The vulnerabilities themselves were found in Apple Lossless Audio Codec (ALAC) which is also known as Apple Lossless.

First introduced back in 2004 for lossless data compression of digital music, at the end of 2011 Apple made ALAC open source and the format is now embedded in many non-Apple audio playback devices and programs including Android smartphones as well as Linux and Windows media players and converters.

While Apple has updated the proprietary version of its decoder by fixing and patching security issues several times, the shared code in the open source version of ALAC has not been patched since 2011. CPR discovered that Qualcomm and MediaTek ported the vulnerable ALAC code into their own audio decoders which is why so many Android smartphones are now at risk.

CPR responsibly disclosed its findings to both chipmakers last year and they in turn released patches to fix all of their vulnerable audio decoders back in December. To avoid falling victim to any potential attacks though, you should make sure that your Android device has been updated with all of the latest patches.



from TechRadar - All the latest technology news https://ift.tt/fuQbXPB

Wednesday, April 20, 2022

How Long Will It Take to Get Your Tax Refund? Here's How to Track Your Money - CNET

If you got your taxes submitted by the tax deadline day, you can start checking the status to see when your refund will arrive.

from CNET https://ift.tt/agQOcmP

Latest Tech News

Apple Music is launching a series of new DJ mixes in Spatial Audio with Dolby Atmos enabled and fifteen new Boiler Room recordings on its app.

It's all a part of Apple’s continuous efforts to provide high-quality audio - and maybe a more engaging (thanks, Spatial Audio) experience. The company, which announced the update on Wednesday, goes as far as to call these mixes an “ …immersive audio experience with multidimensional sound and clarity.”

Monthly Spatial Audio series

The Spatial Audio remixes will come out monthly on the revamped One Mix series starting with “Outer to Inner Atmosphere: The Escape Velocity Mix” by acclaimed DJ and producer Jeff Mills. The hour-long set is currently available on the Apple Music app.

The Boiler Room recordings are newly mixed in the same Spatial Audio with Dolby Atmos format and come from a variety of nightclubs and festivals across different dates. It’s meant to emulate an actual clubbing experience.

Spatial audio uses Dolby Atmos, directional audio filters, and frequency adjustments on each ear to place parts of the audio in a virtual 3D space around the listener's head.

The initial fifteen recordings cover a wide array of artists like India Jordan, Analog Soul, and The Blessed Madonna. More DJ sets in Spatial Audio will release throughout the year and will be part of the overall Boiler Room collection on Apple Music.

Supporting hardware

If you own a pair of AirPods or Beats headphones that have either an H1 or W1 chip installed, you’ll be able to enjoy the high-quality remixes by default. What’s special about those AirPods and headphones are the accelerometers and gyroscopes inside them that track your head’s position and the iPhone’s placement.

That way, no matter how you turn, the audio doesn’t shift in quality and stays consistent.

Speaking of which, the speakers on the latest iPhones and iPads also support Spatial Audio. Some of the devices that support Spatial Audio include the iPhone 7 and later, the 6th generation iPad and later, iPad Air 3rd generation, and the iPad mini 5th generation.

It’s unknown if Apple plans on doing something similar for other genres, but it’s worth pointing out that the company spends a lot of time and money on DJ remixes and electronic music in particular.

For example, Apple uses Shazam’s music identifying tech to analyze a remix in order to make sure everyone involved in that song is paid fairly. If that’s the case, other genres may be left behind.

  • If you're looking for headphones that can supply that Spatial Audio experience, you might want to read our AirPods Pro review.


from TechRadar - All the latest technology news https://ift.tt/YTl43aN

Could Apple's New Adaptive Power Feature Extend Your iPhone's Battery Life?

With this new feature being tested in the iOS 26 developer beta, you may be able to ditch the Low Power Mode setting in the future. from C...