Wednesday, April 27, 2022

Here's How You Can Save an Extra $40 During Wayfair's Way Day Sale - CNET

Apply for a Wayfair credit card to get access to extra savings and take $40 off your first qualifying order of $100 or more.

from CNET https://ift.tt/YowpZLk

How to Get Overwatch 2 Beta Access From Twitch Drops Today - CNET

The first beta for Overwatch 2 is finally here, and Blizzard is giving out access for watching qualifying streams.

from CNET https://ift.tt/GqWoH2g

Latest Tech News

The Overwatch 2 beta continues to flex its muscles on Twitch, hitting a staggering new peak for the game. 

Overwatch 2's beta crushed its previous record (set yesterday around 500k viewers) with the new high this afternoon shattering 1M for the first time. Leaving its own records in the dust isn't a huge surprise. While Overwatch has maintained a dedicated playerbase despite two years without much content, it's not exactly setting the gaming world alight. Even more important to the breakneck pace is the fact that you can earn access to the Overwatch 2 beta by watching enough of certain streamers.

Other big fish in the pond, like Valorant, have come to fill the hole left by Overwatch, and so Blizzard is putting it in front of as many peoples faces as possible. By creating an opportunity to access the Overwatch 2 beta by viewing streams, it's got a shot at creating a temporarily captive audience to give a second (or first) look.

The list of Twitch streamers involved in the promotion includes former Overwatch pros A_Seagull and xQc who are currently pulling in over 100k viewers each. As it snowballs, other big variety streamers will jump in, and pull their own audiences along for the ride.

Overwatch 2 tops Twitch concurrent viewers list

(Image credit: Twitch)

The beta will be around for a while yet, only ending on May 17, so Overwatch 2 will have a chance to break its own records again. The main question is: how much will the viewership fall off after the beta access program ends?

It's difficult to imagine that these huge numbers will continue, but they won't disappear either. With the surge in interest, streamers will continue to play, and viewers will pick up on that. 

Of course, Warzone also has a shot to steal a fair amount of Overwatch 2's thunder. Warzone season 3 was unleashed today – just a day after the Overwatch 2 beta, and it's viewercount is on the rise. 

My bets are on Overwatch 2 to win the dust-up between the two, but time will tell. 



from TechRadar - All the latest technology news https://ift.tt/Cv0d8Nu

Latest Tech News

Staying up to date with the ever-evolving security landscape is central to maintaining the security of webservers and keeping potential threats at bay. 

There are several key threats to webservers that are important to be aware of, to prevent and mitigate those risks. DoS and DDoS attacks, SQL injections, unpatched software and cross-site scripting, to name a few. 

Now, a recent discovery from threat researchers at Avast has shone a light on an immediate and significant risk to web developers worldwide, named Parrot TDS.

What is a TDS?

Traffic Direction Systems (TDS) are not new. They have been an enemy of web-developers for several years. Used as landing pages that direct unsuspecting users to malicious content, TDS serve as a gateway for delivering various malicious campaigns via infected sites.

Many TDS’ have reached a high level of sophistication and often allow attackers to set parameters which look at users’ geolocation, browser type, cookies, and which website they came from. 

This is used to target victims who meet certain conditions and then only display phishing pages to them. These parameters are usually set so that each user is only shown a phishing page once to prevent servers from overloading.

Parrot TDS

In February, Avast’s threat researchers discovered a swarm of attacks using a new Traffic Direction System (TDS) to take control of the victim’s devices. The new TDS, named Parrot TDS, emerged in recent months and has already reached hundreds of thousands of users worldwide, infecting various webservers hosting over 16,500 websites.

One of the main factors distinguishing Parrot TDS from other TDS is how widespread it is and how many potential victims it has. From March 1, 2022, to March 29, 2022, Avast protected more than 600,000 unique users from around the globe visiting sites infected with Parrot TDS, including over 11,000 users in the U.K. In this timeframe, Avast protected the most users in Brazil (73,000) and India (55,000); and more than 31,000 unique users from the US.

In this particular case, the infected sites’ appearances are altered by a campaign called FakeUpdate, which uses JavaScript to display fake notices for users to update their browsers, offering an update file for download. The file we have observed being delivered to victims is a remote access tool called NetSupport Manager which is misused by attackers to give them full access to victims’ computers.

Parrot TDS also creates a backdoor on the infected webservers in the form of a PHP script to act as a backup option for the attacker.

FakeUpdate

Like Parrot TDS, FakeUpdate also performs a preliminary scan to collect information about the site visitor before displaying the phishing message. The scan checks which antivirus product is on the device to determine whether or not to display the phishing message. 

The distributed tool is configured in such a way that the user has very little chance of noticing it and if the file displayed by FakeUpdate is run by the victim, the attackers gain full access to their computer. 

The researchers observed other phishing sites being hosted on the Parrot TDS infected sites, but cannot conclusively tie them to Parrot TDS. 

CMS sites

We believe attackers are exploiting webservers of poorly secured content management systems, like WordPress and Joomla sites, by logging into accounts with weak credentials to gain admin access to the servers.  

WordPress has a long history of being a very rich and desirable target for exploits. This is because the software is based on running a series of PHP scripts, which is a popular venue for hackers. The sheer number of components, including plug-ins, themes, and other scripts, makes it hard to prevent potential infections or compromises.

On top of this, many WordPress websites are running older versions that could be behind several major releases, which leads to security vulnerabilities being left unpatched. In addition, some administrators are inexperienced in IT operational security or simply overburdened with other responsibilities and can’t dedicate enough time to implementing the necessary security measures to ensure the safety of a WordPress site.

How developers can protect their servers

Nevertheless, there are steps web developers can take to protect their servers against these attacks, starting with simply scanning all files on the webserver with an antivirus program. Further steps developers can take are:

- Replace all JavaScript and PHP files on the webserver with original files
- Use the latest CMS version
- Use the latest versions of installed plugins
- Check for automatically running tasks on the webserver (for example, cron jobs)
- Check and set up secure credentials, and use unique credentials for every service
- Check administrator accounts on the server, making sure each of them belongs to developers and have strong passwords
- When applicable, set up 2FA for all the webserver admin accounts
- Use available security plugins (WordPress, Joomla)

How site visitors can avoid falling victim to phishing

For site visitors, it’s as crucial as ever to be vigilant online. If a site being visited appears different than expected, visitors should leave the site and not download any files or enter any information. 

Similarly, visitors should only download updates directly from browser settings and never via other channels.



from TechRadar - All the latest technology news https://ift.tt/cZ2LSFV

Tuesday, April 26, 2022

No Filters Allowed: This Up-and-Coming Social Media App Aims for Authenticity - CNET

Tired of curated feeds and over-edited photos? You'll find none of that on BeReal.

from CNET https://ift.tt/mp5QKqB

Latest Tech News

This gripping adaptation of Marjorie Blackman’s book series continues as star-crossed lovers Callum (Jack Rowan) and Sephy (Masali Baduza) abscond from the discriminatory government of Albion. Our guide below details how to watch Noughts and Crosses season 2 online and 100% FREE for free via BBC iPlayer in the UK.

Watch Noughts and Crosses season 2 online

Premiere date: April 26, 10.40pm GMT on BBC One

New episodes: every Tuesday at the same time

Free stream: BBC iPlayer

Watch from anywhere: tune in today with a 100% risk-free VPN

Noughts and Crosses imagines an alternative history: one in which, 700 years ago, a collective of West African nations created the Aprican Empire and colonized Europe. That resulted in a Black political orthodoxy whose elite, called “Crosses”, live a fraught co-existence with a white underclass, called the “Noughts”.

Season 2 sees the country of Albion in turmoil. A pregnant Sephy is on the run with Callum after the Nought’s terrorist attempts to derail the government – run by corrupt politician Kemal (Peterson Joseph) – while Jude (Josh Dylan) goes into hiding when the actions of the Liberation Militia result in vigilante violence.

Alongside the main cast, Cara (Top Boy’s Jasmine Jobson) makes an unlikely ally for Jude, while rapper Michael Dappah features as an influential TV personality with his onscreen foil Chidi Abara played by Judi Love.

Blackman promises fans lots of surprises and suspense. So read on as we explain how to watch Noughts and Crosses season 2 online now and stream every episode from anywhere.

UK flag

How to watch Noughts and Crosses season 2 online for FREE in the UK

Will true love overcome all? Find out when Noughts and Crosses returns to BBC One on Tuesday, April 26 at 10.40pm GMT, with episodes repeated every Wednesday at the earlier time of 9pm. 

If you’d rather watch online, however, then all 4 episodes will be on BBC iPlayer shortly after the show gets its TV debut, which means you don’t need to wait to watch the entire season.

BBC iPlayer is 100% free to stream, but you will need a valid TV licence. And whether you want to watch live or on catch-up, you can access iPlayer on any of the following devices: desktop on Windows and Mac machines, on smartphone apps for Android and iOS, as well as media streaming devices like Apple TV, Amazon Fire, Chromecast, Roku and more. You can also get BBC iPlayer on PlayStation and Xbox consoles.

How to watch Noughts and Crosses season 2 online from outside your country

Don't let geo-restrictions prevent you from watching brand-new episodes of Noughts and Crosses. If you’re travelling abroad when the show airs, you’ll struggle to access your normal streaming service. However, we can get you out of this sticky situation with the help of a VPN.

The best VPN – otherwise known as a virtual private network – offers a simple solution. This piece of software alters your IP address to appear as though you're based in another country, allowing you to gain access to your preferred streaming platform, and watch episodes live or on-demand just like you would at home.

Use a VPN to watch Noughts and Crosses online from anywhere

ExpressVPN is the world's top VPN right now
Our experts have tried and tested some of the best VPNs on the market so you don't have to and recommend ExpressVPN as their top pick. Not only is it one of the fastest and easiest to use, but this VPN is compatible with a whole host of devices, including Amazon Fire TV Stick, Xbox, Playstation, and iOS and Android devices.

Get an extra 3 months completely FREE when you sign up for an annual Express VPN plan now. If you're not happy with the service within the first 30 days, let them know and they'll give you your money back.

- Try ExpressVPN 100% risk-free for 30 daysView Deal

Three simple steps to using a VPN to watch Noughts and Crosses

1. Download and install a VPN - we recommend ExpressVPN

2. Connect to the relevant server location - launch the VPN app, click on 'choose location' and select the right location i.e. UK for iPlayer

3. Head to the chosen broadcaster's live stream - in this case, head to BBC iPlayer




from TechRadar - All the latest technology news https://ift.tt/vOrNCz4

More Building Blocks of DNA Seen in Meteorites, Boosting Wild Theory of Life on Earth - CNET

We are all made of star dust, or maybe more specifically, star dust that hitched a ride on an asteroid and smashed into Earth as a meteorite.

from CNET https://ift.tt/QDsrcmR

Latest Tech News

Random numbers are in demand for a wide variety of use cases, from computer encryption to lotteries and gambling, as well as for scientific research.

Amazon Web Services (AWS) Marketplace now offers a quantum computing-based random number generation service, developed by the Australian National University’s Quantum Numbers project (AQN).

AQN said the project, which has been operating out of ANU’s campus lab for the last 10 years, uses quantum technology to generate true random numbers in real time by measuring the quantum fluctuations of a vacuum.

How can it be used?

AQN researcher Dr Syed Assad said that the random number service can help meet users’ needs in “IT, data science and modeling” and that “you can’t have reliable models for forecasting and research simulation” without random numbers.

Assad also highlighted creative use cases for the quantum solution, saying the number can also be used by artists to “help with removing human biases from their creative work”.

“In computer gaming and smart contracts, true random numbers are also an indispensable resource,” said Assad. “We’ve even had a request from a father to generate random numbers that he then used as inspiration for his daughter’s name!”

AQN says it has received over two billion requests for random numbers from 70 countries since the project began, including clinical trials, simulating processes and events in computer games, generating secure passwords, simulating virus outbreak behaviors, and predicting the weather.

How does the service work?

AQN team leader Professor Ping Koy Lam said its use of lasers at the quantum level is what makes the solution distinct.

"Quantum physics practically provides an infinite source of truly random numbers,” said Professor Lam. “These quantum random numbers are guaranteed by the laws of physics to be unpredictable and unbiased."

"This technology relies on the detection of vacuum. Vacuum is not a region of space that is completely empty and devoid of energy. In fact, it still contains noise at the quantum level.”

"Through AWS Marketplace, ANU is offering an incredibly powerful source of randomness easily accessible to customers across the globe."

AWS Marketplace users can make 100 random number requests per second via the service, at a cost of $0.005 per request.

Amazon is not the only BigTech firm to keeping a foot in the quantum computing race, though. Alphabet has revealed it is spinning off its Palo Alto-based quantum technology group Sandbox into an independent firm.

Sandbox has been operating as a separate group outside the company’s moonshot division X for almost two years, having been launched in 2016.



from TechRadar - All the latest technology news https://ift.tt/BpCMTrJ

Latest Tech News

Arm is expanding its Total Solutions for IoT portfolio with two new solutions for its Cortex-M and Cortex-A processors.

First launched six months ago, Arm Total Solutions for IoT represented a radical shift in the design approach for the IoT and embedded markets by combining hardware IP, platform software, machine learning models, tools and more to help simplify product development and accelerate product design.

As part of its expanded IoT roadmap, Arm is launching the highest-performing and most secure Cortex-M chip to date in the form of the new Cortex-M85 processor. At the same time though, the company is expanding its Arm Virtual Hardware to more platforms including third-party devices to make the development process more accessible.

VP of IoT and Embedded at Arm, Mohamed Awad provided further insight on the company’s decision to bolster its IoT portfolio in a press release, saying:

“Developers drive the future of the IoT, but they face an ever-increasing demand for higher performance, increased security and less complex development flows. The IoT runs on Arm, and we have a responsibility to create greater opportunities for IoT innovation and scale by continually raising the bar on performance, simplified development, and software reuse for our ecosystem.”

Arm Total Solutions

As part of its expansion in the IoT space, the Arm Total Solution for Cloud Native Edge Devices is launching today and is the first designed for Cortex-A and based on Cortsone-1000. For those unfamiliar, Arm Cortsone, which is a pre-integrated, pre-verified IP subsystem that allows silicon designers to focus their time and efforts on differentiation, is at the heart of the company’s Total Solutions portfolio.

Arm Total Solution for Cloud Native Edge Devices provides IoT developers with the full power and potential of platform operating systems like Linux so that application-class workloads can be developed for devices such as wearables, gateways and high-end smart cameras.

Meanwhile, Arm’s new Total Solution for Voice Recognition is based on the Corstone-310 subsystem and is pre-integrated with both the new Cortex-M85 and Arm Ethos-U55 to create the company’s highest ever performance MCU-based design. It’s primarily targeted at use-cases ranging from smart speakers and thermostats to drones and factory robots.

Finally, Arm Virtual Hardware now addresses existing devices, hardware and projects so that developers don’t need to invest in large custom hardware farms. Arm is also expanding its library of virtual devices to include third-party hardware from a number of partners including NXP, ST Microelectronics and Raspberry Pi.

Now that Arm has equipped IoT developers with the hardware, software and tools they need, we could soon see the IoT and embedded market expand even further.



from TechRadar - All the latest technology news https://ift.tt/SeRZjJw

Latest Tech News

Phishing is, unfortunately, profitable, hard to detect, and relatively easy to engage in. With digital transformations expedited across the globe, phishing is bound to experience continued explosive growth.

According to Phishlabs, the number of phishing attempts over Q1 2021 increased by nearly 50%. There’s no reason to believe it will stop climbing either.

That means increased levels of digital harm and risk. To counteract such an uptick, new approaches to phishing detection should be tested or current ones improved. One way to improve existing approaches is to make use of web scraping.

Poking phish

Phishers would be hard-pressed to completely replicate the original website. Placing all URLs identically, replicating images, cooking the domain age, etc. would take more effort than most people would be willing to dedicate. 

Additionally, a perfect spoof would likely have a lower success rate due to the ability for the target to get lost (by clicking on an unrelated URL). Finally, just like with any other scam, duping everyone is not necessary, therefore the perfect replica would be a wasted effort in most cases.

However, those who do phishing aren’t dumb. Or at least those who are successful at it aren’t. They still do their best to make a believable replica with the least effort required. It may not be effective against those who are tech-savvy, but even a perfect replica might not be effective against the wary. In short, phishing relies on being “just good enough”.

Therefore, due to the nature of the activity, there’s always a glaring hole or two that can be discovered. Two good ways to get a head start is to either look for similarities between frequently-phished-websites (e.g. fintech, SaaS, etc.) and suspected phishing websites or to collect patterns of known attacks and work your way up from there.

Unfortunately, with the volume of phishing websites appearing daily and the intent to target less tech-savvy people, solving the issue may not be as simple as it seems at first glance. Of course, as is often the case, the answer is automation. 

Looking for phish

There have been more methods developed over the years. An overview article written in 2018 by ScienceDirect lists out URL-based detection, layout recognition, content-based detection. The former often lags behind phishers as databases are updated slower than new websites appear. Layout recognition is based on human heuristic and is thus more prone to failure. Content-based detection is computational heavy.

We will be paying slightly more attention to layout recognition and content-based detection as these are complicated processes that benefit greatly from web scraping. Back in the day, a group of researchers had created a framework for detecting phishing websites called CANTINA. It was a content-based approach which would check for data such as TF-IDF ratios, domain age, suspicious URLs, improper usage of punctuation marks, etc. However, the study had been released in 2007 when automation opportunities were limited.

Web scraping can improve the framework immensely. Instead of manually attempting to find the outliers, automated applications can breeze through websites and download the relevant content within. Important details such as the ones outlined above can be extracted from the content, parsed, and evaluated.

Building a net

CANTINA, developed by the researchers, had a drawback - it was only used to prove a hypothesis. For these purposes, a database of phishing and legitimate websites had been compiled. The status of both was known a priori.

Such methods are suitable for proving a hypothesis. They are not as good in practice where we don’t know the status of the websites ahead of time. Practical applications of projects similar to CANTINA would require a significant amount of manual effort. At some point, these applications would no longer stand as “practical”.

Theoretically, though, content-based recognition seems like a strong contender. Phishing websites have to reproduce content in a nearly identical manner to the original. Any incongruences such as misplaced images, spelling mistakes, missing pieces of texts can trigger suspicion. They can never stray too far from the original, which means metrics such as TF-IDF would have to be similar by necessity.

Content-based recognition’s drawback has been the slow and costly side of manual labor. Web scraping, however, moves most of the manual effort into complete automation. In other words, it enables us to use existing detection methods on a significantly larger scale.

First, instead of manually collecting URLs or taking them from an already existing database, scraping can create its own quickly. They can be collected through any content that has hyperlinks or links to these supposed phishing websites in any shape or form.

Second, a scraper can traverse a collection of URLs faster than any human ever could. There are benefits to manual overview such as the ability to see the structure and content of a website as it is instead of retrieving raw HTML.

Visual representations, however, have little utility if we use mathematical detection methods such as link depth and TF-IDF. They may even serve as a distraction, pulling us away from the important details due to heuristics.

Parsing also becomes an avenue for detection. Parsers frequently fall apart if any layout or design changes happen within the website. If there are some unusual parsing errors when compared to the same process performed on parent websites, these may serve as an indication of a phishing attempt.

In the end, web scraping doesn’t produce any completely new methods, at least as far as I can see, but it enables older ones. It provides an avenue for scaling methods that might otherwise be too costly to implement.

Casting a net

With the proper web scraping infrastructure, millions of websites can be checked daily. As a scraper collects the source HTML, we have all the text content stored wherever we’d like. Some parsing later, the plain text content can be used to calculate TF-IDF. A project would likely start out by collecting all the important metrics from popular phishing targets and move on to detection.

Additionally, there’s a lot of interesting information we can extract from the source. Any internal links can be visited and stored in an index to create a representation of the overall link depth.

It’s possible to detect phishing attempts by creating a website tree through indexing with a web crawler. Most phishing websites will be shallow due to the reasons outlined previously. On the other hand, phishing attempts copy websites of highly established businesses. These will have great link depths. Shallowness by itself could be an indicator for a phishing attempt.

Nevertheless, the collected data can then be used to compare the TF-IDF, keywords, link depth, domain age, etc., against the metrics of legitimate websites. A mismatch would be cause for suspicion. 

There is one caveat that has to be decided “on the go” - what margin of difference is a cause to investigate? A line in the sand has to be drawn somewhere and, at least at first, it will have to be fairly arbitrary.

Additionally, there’s an important consideration for IP addresses and locations. Some content on a phishing website might only be visible to IP addresses from a specific geographical location (or not from a specific geographical location). Getting around such issues, in regular circumstances, is challenging, but proxies provide an easy solution.

Since a proxy always has an associated location and IP address, a sufficiently large pool will provide global coverage. Whenever a geographically-based block is encountered, a simple proxy switch is all it takes to hop over the hurdle.

Finally, web scraping, by its nature, uncovers a lot of data on a specific topic. Most of it is unstructured, something usually fixed by parsing, and unlabeled, something usually fixed by humans. Structured, labeled data may serve as a great ground for machine learning models.

Terminating phish

Building an automated phish detector through web scraping produces a lot of data for evaluation. Once evaluated, the data would usually lose its value. However, like with recycling, that information may be reused with some tinkering.

Machine learning models have the drawback of requiring enormous amounts of data in order to begin making predictions of acceptable quality. Yet, if phishing detection algorithms start making use of web scraping, that amount of data would be produced naturally. Of course, labeling might be required which would take a considerable amount of manual effort.

Regardless of this, the information would already be structured in a manner that would produce acceptable results. While all machine learning models are black boxes, they’re not entirely opaque. We can predict that data structured and labeled in a certain manner will produce certain results.

For clarity, machine learning models might be thought of as the application of mathematics to physics. Certain mathematical modeling seems to fit exceptionally well with natural phenomena such as gravity. Gravitational pull can be calculated by multiplying the gravitational constant by the mass of two objects and dividing the result by the distance between them squared. However, if we knew only the data required, that would give us no understanding about gravity itself.

Machine learning models are much the same. A certain structure of data produces expected results. However, how these models arrive at their predictions will be unclear. At the same time, at all stages the rest is as predicted. Therefore, outside of fringe cases, the “black box” nature doesn’t harm the results too much.

Additionally, machine learning models seem to be among the most effective methods for phishing detection. Some automated crawlers with ML implementations could reach 99% accuracy, according to research by Springer Link.

The future of web scraping

Web scraping seems like the perfect addition to any current phishing solutions. After all, most of cybersecurity is going through vast arrays of data to make the correct protective decisions. Phishing is no different. At least through the cybersecurity lens.

There seems to be a holy trinity in cybersecurity waiting to be harnessed to its full potential - analytics, web scraping, and machine learning. There have been some attempts to combine two of three together. However, I’ve yet to see all three harnessed to their full potential. 



from TechRadar - All the latest technology news https://ift.tt/mcbuKng

Monday, April 25, 2022

Latest Tech News

Taiwanese electronics company and major Apple supplier Foxconn is going to be shutting down two of its factories in the city of Kushan, China, as COVID-19 cases surge in the area. 

According to the South China Morning Post, the factories are near Shanghai, and to prevent COVID spillover, the city of Kushan enacted a citywide lockdown to prevent further contamination. On the surface, this appears to be a major blow for Apple, but Foxconn reassures it has things covered.

Another COVID shutdown

According to another report by Reuters, a spokesperson for Foxconn stated that production has moved over to other factories and plenty of Apple products are housed in overseas warehouses. So, the overall impact on both Apple and Foxconn will be minimal, at best.

The same can’t be said for Foxconn’s other production lines. Manufacturing for data transmission equipment and connectors will stay on hold until Chinese authorities give them the green light to start again.

Despite Foxconn’s reassurance, this isn’t the first time something like this has happened. Back in March 2022, a COVID-19 outbreak in the city of Shenzhen caused all production in the area to shut down.

This included Foxconn’s Longhua and Guanlan factories where they manufactured products for various tech giants like Apple and Samsung. Incidents like these have been occurring almost routinely during the pandemic, such as the May 2021 shutdown.

We reached out to Apple for comment on the sudden shutdown and how it will impact future products and will update this story when and if it responds.

Migrating production

Foxconn has been making moves recently to shift iPhone production away from the Chinese mainland.

iPad and MacBook production moved over to Vietnam back in 2020 after Apple specifically requested it due to the US-China trade war. More recently, Foxconn’s factory in Sriperumbudur, India, is going to start pumping out iPhone 13 devices after getting government clearance.

The future looks bright for Apple and Foxconn, but the former employees may be left holding the short end of the stick. For starters, Foxconn shut down the factories even though the local government gave 60 companies permission to reopen production lines.

The employees have also been under a “closed-loop system” meaning they’ve been confined to their dormitories inside the two Foxconn campuses by order of the authorities.



from TechRadar - All the latest technology news https://ift.tt/vxCKf4t

Best Cloud Storage for 2022: How to Choose Between Google Drive, OneDrive, Dropbox, Box - CNET

Looking for a way to store files and photos in the cloud? We've compared features and prices on the top options.

from CNET https://ift.tt/5uGpCIT

Pokemon Go May 2022 Community Day Features Alolan Geodude - CNET

The game's next Community Day event takes place May 21.

from CNET https://ift.tt/BnPXdTC

Latest Tech News

After upgrading its own business PCs to its latest operating system, Microsoft has reached a rather unsurprising conclusion: Windows 11 is good.

In a new blog post, Microsoft explained it has now upgraded almost the entirety of its circa 182,000-strong workforce to Windows 11, claiming it had no increase in support tickets in the process.

Microsoft attributed the successful rollout to having far fewer app compatibility challenges than in the past, not needing to build out a plethora of disk images, and delivery processes and tools that were greatly improved during the rollout of Windows 10. The update utilized a gradual ‘ring-based’ approach.

Windows 11 rollout

Microsoft said it identified which of its devices were upgradable first, using its Update Compliance tool and Microsoft Endpoint Manager's Endpoint analytics, allowing the firm to create a clear timeline for the rollout.

Windows 11 has specific hardware requirements, and a percentage of Microsoft’s devices were not upgraded. The employees with these incompatible devices will continue to run Windows 10 in parallel, before getting a Windows 11 device at their next device refresh.

Microsoft said that, in total, 190,00 devices qualified for the upgrade and that its upgrade process was 99% successful.

The company also explained the importance of preparing readiness content for its employees during the internal rollout process.

The software giant said that Yammer, FAQs, Microsoft SharePoint, email, Microsoft Teams, its internal homepage, and digital signage were some of the tools used to bring the message to its employees.

Microsoft said its communications team focused on promoting the new look and features of Windows 11, including the speed of the update and its flexible scheduling.

The news comes as adoption of Windows 11 by the wider market seems to be moving relatively slowly.

In March 2022, Windows 11 took just 0.1% market share from other editions of Microsoft's software, accounting for 19.4% of the overall usage, with a further 0.6% using a Windows 11 Insider build.

It seems consumers also need to be wary of installing and managing their own Windows 11 updates, as some cybercriminals seem to be snapping up the opportunity to attack devices.

Security researchers found a fake Windows 11 upgrade website that promises to offer a free Windows 11 install for PCs that don’t meet the minimum specifications, but instead installs data-stealing malware.



from TechRadar - All the latest technology news https://ift.tt/QI3Xxzj

Latest Gadgets News

Elon Musk clinched a deal to buy Twitter Inc for $44 billion on Monday in a transaction that will shift control of the social media platform populated by millions of users and global leaders to the world's richest person.

from Gadgets 360 https://ift.tt/Z8ryfoi

Latest Tech News

A new study warns evolvable AI systems could adapt and reproduce faster than any biological species, escaping ...