Tuesday, April 26, 2022

Latest Tech News

Random numbers are in demand for a wide variety of use cases, from computer encryption to lotteries and gambling, as well as for scientific research.

Amazon Web Services (AWS) Marketplace now offers a quantum computing-based random number generation service, developed by the Australian National University’s Quantum Numbers project (AQN).

AQN said the project, which has been operating out of ANU’s campus lab for the last 10 years, uses quantum technology to generate true random numbers in real time by measuring the quantum fluctuations of a vacuum.

How can it be used?

AQN researcher Dr Syed Assad said that the random number service can help meet users’ needs in “IT, data science and modeling” and that “you can’t have reliable models for forecasting and research simulation” without random numbers.

Assad also highlighted creative use cases for the quantum solution, saying the number can also be used by artists to “help with removing human biases from their creative work”.

“In computer gaming and smart contracts, true random numbers are also an indispensable resource,” said Assad. “We’ve even had a request from a father to generate random numbers that he then used as inspiration for his daughter’s name!”

AQN says it has received over two billion requests for random numbers from 70 countries since the project began, including clinical trials, simulating processes and events in computer games, generating secure passwords, simulating virus outbreak behaviors, and predicting the weather.

How does the service work?

AQN team leader Professor Ping Koy Lam said its use of lasers at the quantum level is what makes the solution distinct.

"Quantum physics practically provides an infinite source of truly random numbers,” said Professor Lam. “These quantum random numbers are guaranteed by the laws of physics to be unpredictable and unbiased."

"This technology relies on the detection of vacuum. Vacuum is not a region of space that is completely empty and devoid of energy. In fact, it still contains noise at the quantum level.”

"Through AWS Marketplace, ANU is offering an incredibly powerful source of randomness easily accessible to customers across the globe."

AWS Marketplace users can make 100 random number requests per second via the service, at a cost of $0.005 per request.

Amazon is not the only BigTech firm to keeping a foot in the quantum computing race, though. Alphabet has revealed it is spinning off its Palo Alto-based quantum technology group Sandbox into an independent firm.

Sandbox has been operating as a separate group outside the company’s moonshot division X for almost two years, having been launched in 2016.



from TechRadar - All the latest technology news https://ift.tt/BpCMTrJ

Latest Tech News

Arm is expanding its Total Solutions for IoT portfolio with two new solutions for its Cortex-M and Cortex-A processors.

First launched six months ago, Arm Total Solutions for IoT represented a radical shift in the design approach for the IoT and embedded markets by combining hardware IP, platform software, machine learning models, tools and more to help simplify product development and accelerate product design.

As part of its expanded IoT roadmap, Arm is launching the highest-performing and most secure Cortex-M chip to date in the form of the new Cortex-M85 processor. At the same time though, the company is expanding its Arm Virtual Hardware to more platforms including third-party devices to make the development process more accessible.

VP of IoT and Embedded at Arm, Mohamed Awad provided further insight on the company’s decision to bolster its IoT portfolio in a press release, saying:

“Developers drive the future of the IoT, but they face an ever-increasing demand for higher performance, increased security and less complex development flows. The IoT runs on Arm, and we have a responsibility to create greater opportunities for IoT innovation and scale by continually raising the bar on performance, simplified development, and software reuse for our ecosystem.”

Arm Total Solutions

As part of its expansion in the IoT space, the Arm Total Solution for Cloud Native Edge Devices is launching today and is the first designed for Cortex-A and based on Cortsone-1000. For those unfamiliar, Arm Cortsone, which is a pre-integrated, pre-verified IP subsystem that allows silicon designers to focus their time and efforts on differentiation, is at the heart of the company’s Total Solutions portfolio.

Arm Total Solution for Cloud Native Edge Devices provides IoT developers with the full power and potential of platform operating systems like Linux so that application-class workloads can be developed for devices such as wearables, gateways and high-end smart cameras.

Meanwhile, Arm’s new Total Solution for Voice Recognition is based on the Corstone-310 subsystem and is pre-integrated with both the new Cortex-M85 and Arm Ethos-U55 to create the company’s highest ever performance MCU-based design. It’s primarily targeted at use-cases ranging from smart speakers and thermostats to drones and factory robots.

Finally, Arm Virtual Hardware now addresses existing devices, hardware and projects so that developers don’t need to invest in large custom hardware farms. Arm is also expanding its library of virtual devices to include third-party hardware from a number of partners including NXP, ST Microelectronics and Raspberry Pi.

Now that Arm has equipped IoT developers with the hardware, software and tools they need, we could soon see the IoT and embedded market expand even further.



from TechRadar - All the latest technology news https://ift.tt/SeRZjJw

Latest Tech News

Phishing is, unfortunately, profitable, hard to detect, and relatively easy to engage in. With digital transformations expedited across the globe, phishing is bound to experience continued explosive growth.

According to Phishlabs, the number of phishing attempts over Q1 2021 increased by nearly 50%. There’s no reason to believe it will stop climbing either.

That means increased levels of digital harm and risk. To counteract such an uptick, new approaches to phishing detection should be tested or current ones improved. One way to improve existing approaches is to make use of web scraping.

Poking phish

Phishers would be hard-pressed to completely replicate the original website. Placing all URLs identically, replicating images, cooking the domain age, etc. would take more effort than most people would be willing to dedicate. 

Additionally, a perfect spoof would likely have a lower success rate due to the ability for the target to get lost (by clicking on an unrelated URL). Finally, just like with any other scam, duping everyone is not necessary, therefore the perfect replica would be a wasted effort in most cases.

However, those who do phishing aren’t dumb. Or at least those who are successful at it aren’t. They still do their best to make a believable replica with the least effort required. It may not be effective against those who are tech-savvy, but even a perfect replica might not be effective against the wary. In short, phishing relies on being “just good enough”.

Therefore, due to the nature of the activity, there’s always a glaring hole or two that can be discovered. Two good ways to get a head start is to either look for similarities between frequently-phished-websites (e.g. fintech, SaaS, etc.) and suspected phishing websites or to collect patterns of known attacks and work your way up from there.

Unfortunately, with the volume of phishing websites appearing daily and the intent to target less tech-savvy people, solving the issue may not be as simple as it seems at first glance. Of course, as is often the case, the answer is automation. 

Looking for phish

There have been more methods developed over the years. An overview article written in 2018 by ScienceDirect lists out URL-based detection, layout recognition, content-based detection. The former often lags behind phishers as databases are updated slower than new websites appear. Layout recognition is based on human heuristic and is thus more prone to failure. Content-based detection is computational heavy.

We will be paying slightly more attention to layout recognition and content-based detection as these are complicated processes that benefit greatly from web scraping. Back in the day, a group of researchers had created a framework for detecting phishing websites called CANTINA. It was a content-based approach which would check for data such as TF-IDF ratios, domain age, suspicious URLs, improper usage of punctuation marks, etc. However, the study had been released in 2007 when automation opportunities were limited.

Web scraping can improve the framework immensely. Instead of manually attempting to find the outliers, automated applications can breeze through websites and download the relevant content within. Important details such as the ones outlined above can be extracted from the content, parsed, and evaluated.

Building a net

CANTINA, developed by the researchers, had a drawback - it was only used to prove a hypothesis. For these purposes, a database of phishing and legitimate websites had been compiled. The status of both was known a priori.

Such methods are suitable for proving a hypothesis. They are not as good in practice where we don’t know the status of the websites ahead of time. Practical applications of projects similar to CANTINA would require a significant amount of manual effort. At some point, these applications would no longer stand as “practical”.

Theoretically, though, content-based recognition seems like a strong contender. Phishing websites have to reproduce content in a nearly identical manner to the original. Any incongruences such as misplaced images, spelling mistakes, missing pieces of texts can trigger suspicion. They can never stray too far from the original, which means metrics such as TF-IDF would have to be similar by necessity.

Content-based recognition’s drawback has been the slow and costly side of manual labor. Web scraping, however, moves most of the manual effort into complete automation. In other words, it enables us to use existing detection methods on a significantly larger scale.

First, instead of manually collecting URLs or taking them from an already existing database, scraping can create its own quickly. They can be collected through any content that has hyperlinks or links to these supposed phishing websites in any shape or form.

Second, a scraper can traverse a collection of URLs faster than any human ever could. There are benefits to manual overview such as the ability to see the structure and content of a website as it is instead of retrieving raw HTML.

Visual representations, however, have little utility if we use mathematical detection methods such as link depth and TF-IDF. They may even serve as a distraction, pulling us away from the important details due to heuristics.

Parsing also becomes an avenue for detection. Parsers frequently fall apart if any layout or design changes happen within the website. If there are some unusual parsing errors when compared to the same process performed on parent websites, these may serve as an indication of a phishing attempt.

In the end, web scraping doesn’t produce any completely new methods, at least as far as I can see, but it enables older ones. It provides an avenue for scaling methods that might otherwise be too costly to implement.

Casting a net

With the proper web scraping infrastructure, millions of websites can be checked daily. As a scraper collects the source HTML, we have all the text content stored wherever we’d like. Some parsing later, the plain text content can be used to calculate TF-IDF. A project would likely start out by collecting all the important metrics from popular phishing targets and move on to detection.

Additionally, there’s a lot of interesting information we can extract from the source. Any internal links can be visited and stored in an index to create a representation of the overall link depth.

It’s possible to detect phishing attempts by creating a website tree through indexing with a web crawler. Most phishing websites will be shallow due to the reasons outlined previously. On the other hand, phishing attempts copy websites of highly established businesses. These will have great link depths. Shallowness by itself could be an indicator for a phishing attempt.

Nevertheless, the collected data can then be used to compare the TF-IDF, keywords, link depth, domain age, etc., against the metrics of legitimate websites. A mismatch would be cause for suspicion. 

There is one caveat that has to be decided “on the go” - what margin of difference is a cause to investigate? A line in the sand has to be drawn somewhere and, at least at first, it will have to be fairly arbitrary.

Additionally, there’s an important consideration for IP addresses and locations. Some content on a phishing website might only be visible to IP addresses from a specific geographical location (or not from a specific geographical location). Getting around such issues, in regular circumstances, is challenging, but proxies provide an easy solution.

Since a proxy always has an associated location and IP address, a sufficiently large pool will provide global coverage. Whenever a geographically-based block is encountered, a simple proxy switch is all it takes to hop over the hurdle.

Finally, web scraping, by its nature, uncovers a lot of data on a specific topic. Most of it is unstructured, something usually fixed by parsing, and unlabeled, something usually fixed by humans. Structured, labeled data may serve as a great ground for machine learning models.

Terminating phish

Building an automated phish detector through web scraping produces a lot of data for evaluation. Once evaluated, the data would usually lose its value. However, like with recycling, that information may be reused with some tinkering.

Machine learning models have the drawback of requiring enormous amounts of data in order to begin making predictions of acceptable quality. Yet, if phishing detection algorithms start making use of web scraping, that amount of data would be produced naturally. Of course, labeling might be required which would take a considerable amount of manual effort.

Regardless of this, the information would already be structured in a manner that would produce acceptable results. While all machine learning models are black boxes, they’re not entirely opaque. We can predict that data structured and labeled in a certain manner will produce certain results.

For clarity, machine learning models might be thought of as the application of mathematics to physics. Certain mathematical modeling seems to fit exceptionally well with natural phenomena such as gravity. Gravitational pull can be calculated by multiplying the gravitational constant by the mass of two objects and dividing the result by the distance between them squared. However, if we knew only the data required, that would give us no understanding about gravity itself.

Machine learning models are much the same. A certain structure of data produces expected results. However, how these models arrive at their predictions will be unclear. At the same time, at all stages the rest is as predicted. Therefore, outside of fringe cases, the “black box” nature doesn’t harm the results too much.

Additionally, machine learning models seem to be among the most effective methods for phishing detection. Some automated crawlers with ML implementations could reach 99% accuracy, according to research by Springer Link.

The future of web scraping

Web scraping seems like the perfect addition to any current phishing solutions. After all, most of cybersecurity is going through vast arrays of data to make the correct protective decisions. Phishing is no different. At least through the cybersecurity lens.

There seems to be a holy trinity in cybersecurity waiting to be harnessed to its full potential - analytics, web scraping, and machine learning. There have been some attempts to combine two of three together. However, I’ve yet to see all three harnessed to their full potential. 



from TechRadar - All the latest technology news https://ift.tt/mcbuKng

Monday, April 25, 2022

Latest Tech News

Taiwanese electronics company and major Apple supplier Foxconn is going to be shutting down two of its factories in the city of Kushan, China, as COVID-19 cases surge in the area. 

According to the South China Morning Post, the factories are near Shanghai, and to prevent COVID spillover, the city of Kushan enacted a citywide lockdown to prevent further contamination. On the surface, this appears to be a major blow for Apple, but Foxconn reassures it has things covered.

Another COVID shutdown

According to another report by Reuters, a spokesperson for Foxconn stated that production has moved over to other factories and plenty of Apple products are housed in overseas warehouses. So, the overall impact on both Apple and Foxconn will be minimal, at best.

The same can’t be said for Foxconn’s other production lines. Manufacturing for data transmission equipment and connectors will stay on hold until Chinese authorities give them the green light to start again.

Despite Foxconn’s reassurance, this isn’t the first time something like this has happened. Back in March 2022, a COVID-19 outbreak in the city of Shenzhen caused all production in the area to shut down.

This included Foxconn’s Longhua and Guanlan factories where they manufactured products for various tech giants like Apple and Samsung. Incidents like these have been occurring almost routinely during the pandemic, such as the May 2021 shutdown.

We reached out to Apple for comment on the sudden shutdown and how it will impact future products and will update this story when and if it responds.

Migrating production

Foxconn has been making moves recently to shift iPhone production away from the Chinese mainland.

iPad and MacBook production moved over to Vietnam back in 2020 after Apple specifically requested it due to the US-China trade war. More recently, Foxconn’s factory in Sriperumbudur, India, is going to start pumping out iPhone 13 devices after getting government clearance.

The future looks bright for Apple and Foxconn, but the former employees may be left holding the short end of the stick. For starters, Foxconn shut down the factories even though the local government gave 60 companies permission to reopen production lines.

The employees have also been under a “closed-loop system” meaning they’ve been confined to their dormitories inside the two Foxconn campuses by order of the authorities.



from TechRadar - All the latest technology news https://ift.tt/vxCKf4t

Best Cloud Storage for 2022: How to Choose Between Google Drive, OneDrive, Dropbox, Box - CNET

Looking for a way to store files and photos in the cloud? We've compared features and prices on the top options.

from CNET https://ift.tt/5uGpCIT

Pokemon Go May 2022 Community Day Features Alolan Geodude - CNET

The game's next Community Day event takes place May 21.

from CNET https://ift.tt/BnPXdTC

Latest Tech News

After upgrading its own business PCs to its latest operating system, Microsoft has reached a rather unsurprising conclusion: Windows 11 is good.

In a new blog post, Microsoft explained it has now upgraded almost the entirety of its circa 182,000-strong workforce to Windows 11, claiming it had no increase in support tickets in the process.

Microsoft attributed the successful rollout to having far fewer app compatibility challenges than in the past, not needing to build out a plethora of disk images, and delivery processes and tools that were greatly improved during the rollout of Windows 10. The update utilized a gradual ‘ring-based’ approach.

Windows 11 rollout

Microsoft said it identified which of its devices were upgradable first, using its Update Compliance tool and Microsoft Endpoint Manager's Endpoint analytics, allowing the firm to create a clear timeline for the rollout.

Windows 11 has specific hardware requirements, and a percentage of Microsoft’s devices were not upgraded. The employees with these incompatible devices will continue to run Windows 10 in parallel, before getting a Windows 11 device at their next device refresh.

Microsoft said that, in total, 190,00 devices qualified for the upgrade and that its upgrade process was 99% successful.

The company also explained the importance of preparing readiness content for its employees during the internal rollout process.

The software giant said that Yammer, FAQs, Microsoft SharePoint, email, Microsoft Teams, its internal homepage, and digital signage were some of the tools used to bring the message to its employees.

Microsoft said its communications team focused on promoting the new look and features of Windows 11, including the speed of the update and its flexible scheduling.

The news comes as adoption of Windows 11 by the wider market seems to be moving relatively slowly.

In March 2022, Windows 11 took just 0.1% market share from other editions of Microsoft's software, accounting for 19.4% of the overall usage, with a further 0.6% using a Windows 11 Insider build.

It seems consumers also need to be wary of installing and managing their own Windows 11 updates, as some cybercriminals seem to be snapping up the opportunity to attack devices.

Security researchers found a fake Windows 11 upgrade website that promises to offer a free Windows 11 install for PCs that don’t meet the minimum specifications, but instead installs data-stealing malware.



from TechRadar - All the latest technology news https://ift.tt/QI3Xxzj

Latest Gadgets News

Elon Musk clinched a deal to buy Twitter Inc for $44 billion on Monday in a transaction that will shift control of the social media platform populated by millions of users and global leaders to the world's richest person.

from Gadgets 360 https://ift.tt/Z8ryfoi

Wayfair Way Day 2022: 48 Hours of Deals Starting April 27, Early Deals Available Now - CNET

Way Day 2022 is now official and it's happening later this week. Some early deals are live now, with a bunch more coming on April 27.

from CNET https://ift.tt/o5qDF0A

Latest Tech News

You don't even need 280 characters to deliver this momentous news: Elon Musk just bought Twitter.

The Tesla CEO and SpaceX founder has been circling the popular social media platform for weeks, using Twitter itself as a medium to announce both his intentions and ongoing frustrations with the platform in its current form.

Now, after lining up the funds (his own and hefty support from Morgan Stanley) Musk will pay $43.4 billion -- roughly $54.20 per share -- in a tender offer that gives him control of the company. The deal now faces regulatory approval.

With Twitter's earnings report just days away, it's likely the new owner will show up during the company's Q1 earnings call - at least just to say "hi," and demurely refuses to answer most analysts' questions directly.

In a release on the acquisition, Musk said, "Free speech is the bedrock of a functioning democracy, and Twitter is the digital town square where matters vital to the future of humanity are debated.

"I also want to make Twitter better than ever by enhancing the product with new features, making the algorithms open source to increase trust, defeating the spam bots, and authenticating all humans. Twitter has tremendous potential – I look forward to working with the company and the community of users to unlock it."

See more

Bret Taylor, Twitter's Independent Board Chair noted in the release that "The proposed transaction will deliver a substantial cash premium, and we believe it is the best path forward for Twitter's stockholders."

Parag Agrawal, Twitter's CEO and the person who may end up working most closely with Musk said in the release, "Twitter has a purpose and relevance that impacts the entire world. Deeply proud of our teams and inspired by the work that has never been more important." He notably did not reference Musk directly.

Musk's triumph comes after a circuitous path to ownership: First he bought almost 10% of Twitter shares, giving him a seat at the table and inviting him to the board. Musk accepted and then just as quickly backed out. But he wasn't finished. Soon, he was offering $43 billion for the company, which prompted Twitter's board to adopt a poison-pill plan that would have sold cheaper shares to shareholders had Musk sought to purchase more than 15% of the company's shares.

Soon after, Musk, who has been on the platform since 2009, returned to a tender offer, which meant he'd need to pull together all the money to buy the company. As of last week, Musk secured the funds, and over the weekend, Musk and Twitter's executive team met in person to hammer out the details.

A bumpy road

Not everyone is thrilled at the prospect of a Musk-owned Twitter. In the run-up to the announcement, #RIPTwitter was trending on the platform.

As for what comes next, Musk has made clear his intentions to ensure that Twitter supports free speech from all sides (the implication being that it currently does not, though there is no empirical evidence to support this).

He may revisit some user bans, including that of former President Trump.

He'll likely open-source Twitter's code.

A fan of blockchain and NFTs, Musk might push the platform more aggressively into the crypto space.

But investors and backers will be most interested in Musk's growth plan. Twitter has done a decent job of generating more revenue from existing users, but its growth has in recent years been relatively slow and flat. It's not clear that Twitter could ever have the broad-based, global appeal of, say Facebook (which has its own growth struggles) or TikTok.

It's unclear what Musk can do to reenergize some of Twitter's biggest celebrity accounts.

Musk will probably fast-track the already-under-development Tweet Edits feature, since he made it clear during the acquisition effort that he's a fan.

What will Elon do?

What happens next depends on Elon Musk, or rather the Elon Musk who shows up to run Twitter. Will it be the brilliant, sure hand that, through SpaceX, regularly ferries astronauts and supplies to the International Space Station? The man who basically created the EV market with Tesla? 

Maybe.

It might also be the man who impulsively tweets his inner ID and EGO. Who jokes that "The next Twitter board meet's gonna be lit," with a picture of him smoking a joint on Joe Rogan's podcast.

There sometimes seems to be little middle ground for Musk, who is both extremely successful and rich and extremely impulsive and emotional.

The fear that Musk will let the worst element back on Twitter -- Nazis, trolls, anti-vaxxers, Donald Trump, and so on -- is real. A free-speech absolutist might demand ALL voices be heard, even the dangerous ones.

Still, Musk doesn't truly know the inner workings of Twitter's extensive (and still flawed) content moderation system. He soon will. That may inspire some different and more rational thinking about how to excite and energize Twitter for the future while protecting the most vulnerable who still use it every day.



from TechRadar - All the latest technology news https://ift.tt/J0cGZU4

Sunday, April 24, 2022

Twitter Said to Be Re-examining Elon Musk's $43B Takeover Bid - CNET

Meeting between the two sides Sunday suggest company might be open to the proposal, The Wall Street Journal reports.

from CNET https://ift.tt/p9cb453

Amazon Astro Can Do More Than Patrol Your Home - CNET

We rounded up everything Amazon's home robot can do, from delivering beers to beatboxing.

from CNET https://ift.tt/hb31NlA

Confused on Masks? Learn the Latest Rules for Planes, Buses, Trains and Ride Sharing - CNET

Masks are now mostly optional on public transit across the US, but some cities are still requiring them.

from CNET https://ift.tt/ClNziAZ

There's Actually a Better Place to Mount Your TV - CNET

We'll break down the do's and don'ts of TV placement.

from CNET https://ift.tt/rLUtaki

6 Best Peloton Alternatives for 2022: Get the Same Great At-Home Workout for Less - CNET

Before you splurge on a Peloton, check out these more affordable options from Bowflex, Echelon, Myx Fitness, NordicTrack and ProForm.

from CNET https://ift.tt/O7iEmox

Here Are the Best Nintendo Switch 2 Deals to Snag Before the Price Increases

Nintendo recently announced a $50 price increase on the Nintendo Switch 2, so any discount available now is well-worth considering. We'v...