Thursday, December 15, 2022

Facebook Memories You'd Rather Forget? Here's How to Block Them - CNET

Not all memories are good ones. Here's how to prioritize your mental well-being on social media.

from CNET https://ift.tt/dHvyEVQ

Google Nest and Android Devices Now Work With Matter - CNET

Matter is an agnostic smart-home platform that lets users connect devices from different manufacturers.

from CNET https://ift.tt/RkIxm9z

Latest Tech News

Microsoft has officially banned cryptomining within its Azure cloud services in a rather inconspicuous way. 

An update to its Universal License Terms for Online Services, which mainly applies to its cloud platform, states that "mining cryptocurrency is prohibited without prior Microsoft approval."

The post goes on to explain that written approval is needed for those looking to use the company's services for cryptomining, clarifying that "neither customer, nor those that access an online service through customer" are permitted to leverage them for this purpose.

Dangers of mining

The policy change was also posted in the Azure Solution Area of Microsoft's Partner Community webpage, under the heading "Important actions partners need to take to secure the partner ecosystem".

Here, it was listed as among the changes to "minimize potential fraud damage to your customers’ subscriptions". Again, it stressed the need for "written pre-approval... granted by Microsoft" to sanction the use of its servers for sourcing the digital tokens.

Microsoft is concerned about the dangers such activities present to their infrastructure. In responding to a query from the The Register, the tech giant commented that mining for cryptocurrencies can "cause disruption or even impairment to online services and its users", adding that cryptomining "can often be linked to cyber fraud and abuse attacks such as unauthorized access to and use of customer resources."

They did add the caveat, however, that cryptomining "may be considered for testing and research for security detections."

Microsoft isn't alone in restricting cryptomining on its cloud platforms. Google Cloud, Oracle and OHVcloud have all banned it from their services, and Amazon Web Services only allows it within its paid subscription tiers. 

Microsoft has prohibited mining for a while on its free tier, but has only now escalated its policy to its paid-for options as well.



from TechRadar - All the latest technology news https://ift.tt/BWcU9w8

Latest Tech News

Microsoft has identified a huge number of IoT security issues, finding unpatched, high-severity vulnerabilities in 75% of the most common industrial controllers in customer operational technology (OT) networks.

The tech giant's research also found that 72% of the software exploits utilized by what Microsoft terms “Incontroller” are now available online. 

"Incontroller" is what the Cybersecurity and Infrastructure Security Agency (CISA) describes as a "novel set of state-sponsored, industrial control system (ICS) oriented cyberattack tools".

What is true scale of the issue?

Microsoft cited recent IDC figures that estimate there will be 41.6 billion connected IoT devices by 2025, a growth rate much higher than that of traditional IT equipment.

However, it claims that the development of IoT and OT device security has not kept pace with that of other IT systems, and threat actors are exploiting these devices.

Microsoft pointed towards Russia’s cyberattacks against Ukraine, as well as other nation-state-sponsored cybercriminal activity, saying these demonstrate that "some nation-states view cyberattacks against critical infrastructure as desirable for achieving military and economic objectives".

You certainly do not have to look far to see examples of these types of industrial IoT attacks wreaking havoc on all involved.

In May 2021, the Colonial Pipeline ransomware attack disrupted the supply of natural gas in much of the Southern US, causing widespread price rises.

To mitigate these types of risks, Microsoft recommends customers work with stakeholders to map business-critical assets, in IT and OT environments, as well as work to identify what IoT and OT devices are critical assets by themselves, and which are associated with other critical assets.

Microsoft also recommends that organizations perform a risk analysis on critical assets, focusing on the business impact of different attack scenarios.

  • Interested in keeping your organization safe from cyber threats? Check out our guide to the best firewalls


from TechRadar - All the latest technology news https://ift.tt/90B7JMf

Latest Gadgets News

OnePlus is all set to unveil its first customisable mechanical keyboard. The product, which will launch for global markets, is a part of products that will be unveiled through OnePlus Featuring. It will be compatible for Mac, Windows and Linux. The layout will be similar to MacBook keyboard, but can work with MS Windows as well. 

from Gadgets 360 https://ift.tt/rLWKlOi

Spider-Man 2 Hits PS5 Next Fall - CNET

Marvel heroes will take on an alien symbiote nemesis in developer Insomniac's sequel.

from CNET https://ift.tt/jaicRU4

Latest Tech News

A popular Android browser app with more than five million downloads on the Google Play Store may have been leaking user data including browser history, experts have claimed.

Cybernews says it discovered that the ‘Web Explorer - Fast Internet’ app had left its Firebase instance open - a mobile application development platform that’s designed to assist with analytics, hosting, and cloud storage

At risk is five days’ worth of redirect data, including country, direct initiating address, redirect destination address, and user country, all presented by user ID.

Android Web Explorer data leak

Cybernews senior journalist Vilius Petkauskas, explains that getting their hands on this data alone may not be enough to give threat actors what they seek, however cross-referencing it with additional details could prove harmful.

The app was also found to be hardcoding on the client side, including keys relating to anonymized partial user browsing history, unique public identifiers, and a cross-server communication enabler.

“If threat actors could de-anonymize the app’s users, they would be able to check a bunch of information on browsing history for a specific user and use it for extortion,” CyberNews noted.

It has since been discovered that the open Firebase instance has been closed and is no longer accessible, which means that threat actors can no longer access sensitive data. However, it’s not all good news: Cybernews reached out to the app’s team about its findings, but it’s yet to receive a reply.

Further digging also uncovers that the app was last updated in October 2020, meaning that the hardcoded ‘secrets’ are likely still there. The researchers write: “...we can only guess what other information could be leaking through the application’s secrets”.



from TechRadar - All the latest technology news https://ift.tt/LFqYK8B

Wednesday, December 14, 2022

Major Energy Breakthrough: Milestone Achieved in US Fusion Experiment - CNET

The National Ignition Facility achieves ignition in a fusion reactor.

from CNET https://ift.tt/TUPgreO

Latest Tech News

Businesses have become more reliant on their IT hardware every year, as their activities go through increasing digital transformation. The move towards hybrid working during the pandemic has further accentuated the importance of computing to economic success. But while small- and medium-sized businesses (SMBs) have been swept along by this trend as much as larger ones, their ability to roll out the necessary hardware upgrades is more financially constrained. Your choices should prioritize devices that are made to last, so the maximum amount of utility can be obtained from the IT equipment purchased over the longest period.

This goes well beyond merely ensuring that IT purchases deliver the most features possible for the money and are obtained from reputable brands. Computer equipment typically has a three- to five-year lifespan, and it will need to deliver the best possible performance during this period. Not only must the hardware provide performance and features to run contemporary applications, but also fit with emerging work patterns. Most important of all, it must be able to resist current and emerging cyber threats, which are constantly evolving and gaining sophistication.

The right PC for the job

The changing nature of work from being primarily on-premises to hybrid models has meant that employees now use a much wider range of devices than before. Gone are the days when a standard desktop configuration could be rolled out across everyone’s desk, with a fixed specification guaranteed for a long period of time so administrators always knew what they were managing. Now, while some employees will still be in the office, many will divide their time between home and workplace, some will be mostly on the road, and some may even operate almost exclusively from where they live. It may even be necessary to onboard new employees remotely.

While you can’t apply a ‘one size fits all’ approach anymore, you can still unify within a family of systems that offer a reliable set of features. Standardizing on devices based on the Intel vPro®, An Intel® Evo™ Design platform ensures that your fleet will share core capabilities including performance, connectivity, management, updating methods and security. For example, Dell’s Latitude 7420 and 7430 notebooks provide baseline performance that can be enhanced for more demanding workloads, alongside cutting-edge features.

The Dell Latitude 7420 and 7430 powered by Intel vPro®, An Intel® Evo™ Design, offer a dependable level of hardware-enhanced security, business-grade performance, efficient remote management, reliability, and stability. The platform also promises consistent system responsiveness, a long-lasting battery and comprehensive state-of-the-art connectivity. Both Dell devices have a 2-in-1 form factor, with touch screen and foldable hinge, delivering flexible use for employees who need to hot desk, work on the move, present and browse information in a tablet configuration.

For organizations that require a blend of desktops and notebooks, Intel vPro®, An Intel® Evo™ Design features are also available in desktop computers. For example, the Dell OptiPlex 7000 series comes in a broad range of formats, from micro and small form factor to all-in-one, meeting space solutions and medium towers. Virtually any computing need from tiny and inconspicuous to power systems for more gruelling workloads can be accommodated. These systems can be managed alongside Intel vPro®, An Intel® Evo™ Design notebooks as part of a common fleet.

This is a fundamentally valuable characteristic, because keeping systems healthy and running smoothly will extend their useful life for as long as possible. All hardware becomes obsolete eventually, but a lot of it may cease to be used before then because the operating system and software hasn’t been updated, has become corrupted by malware or the device itself hasn’t been repaired in the case of a hardware failure. Intel vPro®, An Intel® Evo™ Design facilitates this process by providing a common interface for management. For example, the Dell Command Intel vPro® Out of Band console, through its support for Intel vPro®, An Intel® Evo™ Design, can remotely manage a range of disparate devices. This enables remote onboarding and offboarding of employees who never come to the central office.

Security and sustainability

Security is another central feature of maintaining system uptime. Intel vPro®, An Intel® Evo™ Design provides built-in hardware security out of the box including Intel Hardware Shield. This delivers protection from malware that is baked into the hardware, allowing devices to be easily and cleanly rebooted if compromised. Alongside these built-in features, the system can use AI to detect new threats as they emerge. Alongside remote management, it’s possible to provide constant additional improvement to security as threats are detected on devices, whether on a local network or remotely connected. So an Intel vPro®, An Intel® Evo™ Design always has the latest protection from cyberattacks.

Keeping systems running through a hardware failure is also key. Upgrading an entire system when a single component has broken is a waste of resources and will also work against sustainability targets. Although functional integration has made this harder, even portable systems can be manufactured in a way that enables repair. Purchasing one of these expands the possibility of keeping systems running longer. Dell’s laptops also score highly amongst independent hardware repairers for being constructed in a way that makes fixing them easier than most other brands. Dell’s commitment to sustainability stretches back some years and underpins this facility. Dell has even pioneered the use of augmented reality to facilitate this process with its AR Assistant.

With the increasing importance of IT in delivering value and enabling a distributed workforce to operate efficiently as a team, ensuring hardware is based on the right platform is paramount. Client systems must be kept healthy, usable and fully operational for the longest time possible. Selecting devices based on Intel vPro®, An Intel® Evo™ Design, such as from Dell’s extensive portfolio, can help deliver the best possible service. That way, companies can get the most enduring service out of their IT spend.

Intel technologies may require enabled hardware, software or service activation.

No product or component can be absolutely secure.

Your costs and results may vary.

@Intel Corp. Intel, the Intel logo, Intel vPro® and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.



from TechRadar - All the latest technology news https://ift.tt/5KnUviu

Latest Gadgets News

Realme GT Neo5 is reportedly in the works. The purported renders of this smartphone surfaced online revealing the expected camera module and rear panel design. It is believed to have a similar camera module as the Realme 10 Pro series launched last week. The phone is likely to be powered by a MediaTek Dimensity 8200 SoC.

from Gadgets 360 https://ift.tt/g8uRUED

'Slugging': TikTok's Skin Hack That Has Everyone Slathering Vaseline on Their Faces - CNET

Take care of your skin this winter. Try this affordable, dermatologist-approved skin care technique.

from CNET https://ift.tt/p3tAFBX

Latest Tech News

Technology has long sat at the heart of businesses of all sizes, and the developments of recent years have led to these organizations relying more heavily on their tech than ever. But for small and medium-sized businesses (SMBs), the importance of technology does not necessarily match the amount of resource they have to support it.

TechRadar Pro spoke to Sarah Burkhart, senior director of client software and experiences at Dell, about the challenges facing SMBs and how choosing the right laptops for their staff can help to protect and expand their operations no matter the level of immediate tech support they have on the ground.

“My husband owns a small business,” says Burkhart. “And I can tell you, as a small business owner, he does not have an IT department. That is so common amongst small businesses. Inevitably, the owner or whoever is most technically inclined becomes the IT department. 

“[As] the technology landscape continues to change, small businesses are caught up in all of the changes that so many of us are caught up in, in terms of the need to be able to access data from anywhere, and the desire to work both synchronously with colleagues and asynchronously. All of that continues to be a problem for small businesses. But then you add on the fact that they have limited resources that are specifically dedicated to technology, and it can become overwhelming for small businesses to navigate these decisions that they need to make around what is the right technology to serve their needs.”

SMBs would much rather be focusing on serving their customers’ needs and the other key aims of the business than worrying about the minutiae of IT infrastructure and security. One of the first steps in ensuring this balance is ensuring that your company is equipped with the right technology to meet its needs.

“Probably the most important thing is to understand that not all technology is created with small businesses in mind,” Burkhart tells us. “But there is technology that absolutely is created with business environments in mind. When you look at, for example, Dell's portfolio, we have PCs that run the gamut from gaming PCs to commercial enterprise systems. There are plenty of solutions within our portfolio where we partner with Intel®. vPro from Intel is kind of a check mark, that you look for to say this is suited for my business's needs.

“I think the first step is to recognise that there is a set of products that are uniquely designed to fit the needs of the small business community,” she continues. “That's where you start and then dig in from there. Otherwise, the tech in the tech landscape is just too confusing and overwhelming.”

Security is key to ensuring a reliable, stable foundation for SMB technology. Users have different requirements, and are best served from being able to choose from a range of laptop and desktop PCs. Business leaders need to be able to choose from ranges of PCs – whether laptops to desktops – that fit these different requirements, while knowing that they are based on a secure and reliable platform that ensures compatibility between these differing devices.

“Looking at Dell PCs that are Intel vPro® enabled ensures that there's compatibility under the hood, if you will, so that those devices all share the same type of security capabilities,” says Burkhart. “Dell and Intel work really closely together to ensure that our devices are the most secure commercial PCs. And they are hardened and protected against threats from malicious actors. I think those are the indicators that small business leaders want to have as they look for new technology that can not only last for as long as possible – are a good buy in terms of their tech spend – but also has compatibility with the other devices in their environment.”

To hear our full conversation with Dell’s Sarah Burkhart and learn more about how to identify the technology that will best support your SMB, watch the video above.

Intel technologies may require enabled hardware, software or service activation. No product or component can be absolutely secure. Your costs and results may vary.

@Intel Corp. Intel, the Intel logo, Intel vPro® and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.



from TechRadar - All the latest technology news https://ift.tt/rB4Qq0W

Tuesday, December 13, 2022

CFG Bank: 2022 Banking Review - CNET

This community bank serves residents of Baltimore and Annapolis, Maryland, offering high-yielding CDs and money market accounts. But fees are numerous.

from CNET https://ift.tt/xRwuX3M

Latest Tech News

Google has announced that the API for its latest extension platform for Chromium-based web browsers, Manifest V3 (MV3), has been delayed once again, with an update from the company expected by March 2023. 

The latest development comes just a month before the original January 2023 deadline, announced in early September 2022, was due to take effect. Google seems to be in disarray over the change, as a further delay until January 2024 followed in late September, albeit only for enterprise users of Google Chrome.

Extensions are currently built on the Manifest V2 (MV2)  API, which offers robust functionality to developers, allowing effective privacy tools, such as uBlock Origin and Decentraleyes, to flourish. Google is looking to curb that functionality with MV3 by reducing the number of permissions available to developers, which it claims will boost user privacy and performance.

Manifest V3’s privacy implications

While Google has long maintained that it intends to support content blocking extensions after the transition, some app developers are finding that this may not end up being the reality. 

TechRadar Pro noted in our reporting of the original deadline that core uBlock Origin developer Raymond Hill had developed an MV3-compatible version of the extension, but noted that the functionality was so reduced that there wasn’t “much point” to release.

The Register has noted that complaints around functionality and privacy have also come from the Electronic Frontier Foundation, and Jean-Paul Schmetz, CEO of privacy suite provider Ghostery, to name but a few. 

However, it’s also the case that, perhaps up to now, the transition to MV3 has been happening while the API is an experimental, buggy mess. 

The Register found that The Chromium bug report system has a litany of bugs pertaining to it alone, while the new Service Workers function, replacing scripts that run in the background that stop and start as needed, is largely broken, and has been since at least November 2020.

However, it isn’t all bad news: users looking for a truly secure browsing experience aren’t out of options just yet.

Alternative browsers built on Chromium, the same underlying engine as Google Chrome, such as Microsoft Edge, are largely being roped into the change. However, the more privacy-focussed Brave and Vivaldi both have ad and tracker blockers built in that shouldn’t be affected by the move to MV3.

Mozilla Firefox, which claims to be one of the few remaining browsers not built on Chromium, plans to implement MV3 while retaining some of functionality of MV2. As TechRadar Pro reported back in late September, Mozilla intends to keep WebRequest, an API integral to blocking web content and trackers.

Via The Register



from TechRadar - All the latest technology news https://ift.tt/jNp2Wf8

Latest Gadgets News

After months of trials, 5G support finally arrives on the iPhone 12 and above in India, for Jio and Airtel subscribers.

from Gadgets 360 https://ift.tt/vi3DG8u

Latest Tech News

They say fortune favors the bold, so why not rebel from cookie-cutter colorways and mix things up with some eye-catching tech instead? As a...