Saturday, February 4, 2023

Vivo Claims Its New X90 Pro Phone Can Charge Completely in 30 Minutes - CNET

The X90 Pro comes with a 120-watt charger inside the box.

from CNET https://ift.tt/rjW2suQ

Watch 2023 Super Bowl Ads Before the Big Game: Every Commercial So Far - CNET

You can already watch a bunch of them, including Budweiser and Michelob Ultra ads and that Breaking Bad commercial.

from CNET https://ift.tt/PJN13wb

More People Need to Watch This Twisted Horror-Thriller on Prime Video - CNET

Pick up The Black Phone for your fix of It and Stranger Things vibes.

from CNET https://ift.tt/9P0tNh5

NHL All-Star Game 2023: How to Watch, Stream the Tournament Today - CNET

The top players in hockey compete in a 3-on-3 tournament to crown the best division in the NHL.

from CNET https://ift.tt/xPMvVI4

Samsung Galaxy S23 Ultra First Look: Going Big On the Camera - CNET

Samsung's new top-of-the-line phone has a new 200-megapixel camera sensor and other improvements.

from CNET https://ift.tt/F1COhyN

Friday, February 3, 2023

2023 Tax Season: When Is the Filing Deadline? When Do I Get My Refund? - CNET

Should you file early? It depends.

from CNET https://ift.tt/aAMuQlf

Chelsea vs. Fulham Livestream: How to Watch Premier League Soccer From Anywhere - CNET

Chelsea look to avenge last month's defeat to their West London rivals Fulham, in a match that could see record signing Enzo Fernández make his EPL debut.

from CNET https://ift.tt/VDb1yUi

Latest Tech News

Cisco has confirmed it patched a high-severity flaw that was impacting its IOx application hosting environment. 

Cisco IOx is an application environment that allows consistent deployment of applications that are independent of the network infrastructure and docker tooling for development. It is used by a wide range of businesses, from manufacturing, to energy, to the public sector.

The flaw, tracked as CVE-2023-20076, allowed threat actors to achieve persistence on the operating system, thus gaining the ability to execute commands, remotely.

Who is affected?

"An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file," Cisco said in its security advisory. 

Users running IOS XE without native docker support are affected, as well as those running 800 Series Industrial ISR routers, CGR1000 compute modules, IC3000 industrial compute gateways, IR510 WPAN industrial routers, and Cisco Catalyst access point (COS-APs) endpoints.

Catalyst 9000 Series switches, IOS XR and NX-OS software, and Meraki products, are unaffected by the flaw, the company added.

The caveat with this vulnerability is that the threat actors need to already be authenticated as an administrator on the vulnerable systems. 

Still, researchers from Trellix, who first discovered the flaw, said crooks could easily pair this vulnerability with others, in their malicious campaigns. Authentication can be obtained with default login credentials (many users never change them), as well as through phishing and social engineering. 

After authenticating, CVE-2023-20076 can be abused for "unrestricted access, allowing malicious code to lurk in the system and persist across reboots and firmware upgrades."

"Side-stepping this security measure means that if an attacker exploits this vulnerability, the malicious package will keep running until the device is factory reset or until it is manually deleted."

The good news is that so far there is no evidence of the flaw being exploited in the wild but still, if you use this solution, make sure it's updated to the latest version. 

Via: BleepingComputer



from TechRadar - All the latest technology news https://ift.tt/Qv71kn3

Latest Gadgets News

One97 Communications, which owns the payments and financial services platform Paytm, continue to witness strong revenue momentum across its business verticals. The fintech firm on Friday reported its revenue from operations increased to Rs. 2,062 crore, a growth of 42 percent on a yearly basis and 8 percent on a quarterly basis.

from Gadgets 360 https://ift.tt/7eCmWhs

Latest Tech News

Chinese firm Origin has produced the country's useable quantum computer that has real-world applications.

A report from Science and Technology Daily, one of the nation's state-run newspapers, confirmed that Origin's Wuyuan quantum computer has been in use for a year now, but did not say which client or industry was using it.  

China now joins the US and Canada as the only known countries to have this bleeding-edge technology on an applicable scale. 

More to come?

Origin's Wuyuan has some impressive specs, featuring a 24-qubit processor with superconducting chip technology. It also has its own suite of software, as well as the ability to work over the cloud, so it can be used remotely.

What's more, Origin is working on its next quantum computer called Wukong, that is said to be coming in the near future. Interesting, in the ongoing chip war between USA and China, Origin hasn't been blacklisted from using US quantum computing technologies like other vendors have, suggesting that perhaps Origin's creations are wholly its own. 

Even though it looks as if there is only one Wuyuan in use, there are reports that more may be coming or in fact already be in use by other clients.

Quantum computers are the next stage in super computing, using the principles of quantum mechanics to radically change the architecture of how computers work to achieve exponentially higher speeds than standard supercomputers can. The high level applications of quantum computers include weapon development, complex problem solving, codebreaking and scientific research, to name a few. 

Major chip makers are getting involved in this state-of-the-art technology. IBM, for instance, recently developed a massive 433-qubit processor, and even hopes to rapidly progress beyond this, boldly claiming that a 4,000 qubit processor will be made by 2025. 

If such claims are realized and the general air of optimism around quantum computing turns out to be warranted, then there may be some seismic discoveries and breakthroughs in all kinds of fields laying in wait.

  • For now, you'll have to make do with the best computers you can currently buy


from TechRadar - All the latest technology news https://ift.tt/g2sb7a0

Thursday, February 2, 2023

Latest Gadgets News

Samsung on Thursday said it will manufacture premium Galaxy S23 smartphones in India to cater to the local market requirements. The launch price of the Galaxy S23 series in India is in the range of Rs. 75,000 to Rs. 1.55 lakh per piece. At present, Galaxy S Series smartphones are being manufactured at Samsung's Vietnam factory and the company imports them for sale in ...

from Gadgets 360 https://ift.tt/AkRJ4Hh

What to Expect From Samsung and Google's Mixed Reality Partnership - CNET

No headset was announced, but here's what we think might happen.

from CNET https://ift.tt/V0xYcph

Latest Tech News

The use of Microsoft OneNote documents to distribute malware to unsuspecting users is picking up pace, cybersecurity researchers from Proofpoint have claimed.

OneNote is Microsoft’s digital note-taking app, which comes as part of the Office productivity suite. As such, cybercriminals can assume that most of their victims already have the app installed on their endpoints

OneNote’s files, called NoteBooks, allow users to add attachments, which can download malware from remote locations. All users need to do is double-click the file, which they can be easily tricked into doing. Recent reports saw hackers distribute blurred NoteBooks with the message “double-click to view the contents”, tricking victims into believing the file’s contents are being protected. 

Low detection rates

In a detailed report published on the company blog earlier this week, Proofpoint’s researchers said they identified six campaigns in December 2022, using OneNote to deliver the AsyncRAT malware.

A month later, in January 2023, they discovered more than 50 campaigns. Besides AsyncRAT, the crooks were delivering Redline Stealer, AgentTesla, and DOUBLEBACK. More recently, the threat actor known as TA577 used it to deliver Qbot. 

Proofpoint’s researchers believe hackers turning to OneNote is in fact the result of extensive research. After experimenting with different attachment types, they settled on OneNote as so far, the detection rates are minimal.

At press time, Proofpoint says that “multiple” malware samples were not getting detected by antivirus vendors on VirusTotal. 

The best way to protect against these attacks is the same as it always was - educate your employees not to download attachments and click on email links from people they don’t know, don’t trust, or whose identity cannot be confirmed. Also, they should be educated not to ignore warning messages prompted in programs such as Word, Excel, or OneNote. Other than that, having a strong antivirus solution, and a firewall, is welcome. 

Finally, activating multi-factor authentication (MFA) wherever possible greatly reduces the chances of more serious compromise. 



from TechRadar - All the latest technology news https://ift.tt/wdHLOnc

Latest Gadgets News

India is among the top three nations contributing active users growth for Facebook as of December 31, 2022, social media major Meta said in a regulatory filing. The company has reported a 4 percent increase in worldwide daily active users (DAUs) to 2 billion on average during December 2022 from 1.93 billion during December 2021.

from Gadgets 360 https://ift.tt/eAyng5K

EzriCare Eye Drops Linked to Dangerous Infections, CDC Says Don't Use Them - CNET

The CDC is investigating a link between artificial tears and antibiotic-resistant infections.

from CNET https://ift.tt/GYIrEjV

I Used AI to Track My Blood Sugar With My Oura Ring. These 3 Takeaways Surprised Me

I paired my Oura ring with Dexcom's Stelo AI-powered CGM to track my glucose and got these three important things about my eating habits...