The Age of AI Voice Generation: Transforming Communication

The digital era has presented an array of technological advancements that have drastically transformed various aspects of our lives. One of the fields where technology has made significant strides is in voice generation, where Artificial Intelligence (AI) now plays a...

LATEST UPDATES

Teleworking and Coronavirus: how to protect your computer?

Teleworking and Coronavirus: how to protect your computer?

The Coronavirus and lock down in place have not stopped disrupting our daily lives. With the measures put in place by the government, many people are discovering teleworking as well as distance learning. The Internet has never been so much in demand that streaming...

How mobile network operators will sell us the 5G

It is now six months since the opening of 5G networks around the world began. Last August, the GSMA operators and manufacturers association published an inventory of the deployment. At that time, 5G was marketed in 20 countries by 40 operators, with 136 terminals...

Pixel 4: everything Google didn’t say during the conference

While Pixel 4s are impressive in many ways, Google focused on a few key features during its conference. The focus was on photography, but the firm ignored some new features that XDA Developers has compiled.The 90 Hz display can be setIf the Pixel 4 is equipped with a...

What can you do and not do with a VPN?

According to the many VPN ads on the Internet, a VPN is first and foremost a tool to get rid of dangerous hackers who are after our data. That's true, but a VPN is not limited to that alone. Here are the three main VPN uses on your PC, smartphone, or even TV sets...

iPhone 11 Pro: Price, Specifications, and Release Date

The flagship smartphone of the Cupertino's firm is renewed, without significant aesthetic changes, with an ambitious camera and new functions to exploit computer photography, one of the trends in mobility lately. Faster, more powerful, and with an ambitious camera....

Phishing: How hackers bypass two-factor authentication

Intrusion testers and hackers from all around the world have recently been able to add a new dodgy method to their arsenal. This technique automates phishing attacks on two-factor authentication (2FA). Also, 2FAs are nowadays used on a lot of websites, and it is not...

TECHNOLOGY

Teleworking and Coronavirus: how to protect your computer?

Teleworking and Coronavirus: how to protect your computer?

The Coronavirus and lock down in place have not stopped disrupting our daily lives. With the measures put in place by the government, many people are discovering teleworking as well as distance learning. The Internet has never been so much in demand that streaming...

How mobile network operators will sell us the 5G

It is now six months since the opening of 5G networks around the world began. Last August, the GSMA operators and manufacturers association published an inventory of the deployment. At that time, 5G was marketed in 20 countries by 40 operators, with 136 terminals...

Pixel 4: everything Google didn’t say during the conference

While Pixel 4s are impressive in many ways, Google focused on a few key features during its conference. The focus was on photography, but the firm ignored some new features that XDA Developers has compiled.The 90 Hz display can be setIf the Pixel 4 is equipped with a...

FROM OUR BLOG

AI Voice Generation

The Age of AI Voice Generation: Transforming Communication

The digital era has presented an array of technological advancements that have drastically transformed various aspects of our lives. One of the fields where technology has made significant strides is in voice generation, where Artificial Intelligence (AI) now plays a pivotal role. AI voice generation technology not only promises to revolutionize the way we interact with devices but also the means through which we connect with each other.

Understanding AI Voice Generation

AI voice generation involves the use of deep learning algorithms to produce human-like speech from text. This technology, sometimes referred to as text-to-speech (TTS) or speech synthesis, has evolved to the point where AI-generated voices are increasingly indistinguishable from actual human speakers. Unlike the robotic tones of early TTS systems, modern AI voices can convey nuanced emotions, varying accents, and even personalized speech patterns.

How It Works

AI voice generation is based on sampling and analyzing vast databases of human speech. These samples are then processed by machine learning models to understand the intricacies of language, tone, and delivery. One popular approach used in recent times is called WaveNet, developed by DeepMind. WaveNet uses a neural network to generate waveforms from text inputs by modeling the audio signal directly, one sample at a time.

Applications of AI Voice Generation

The potential uses for AI voice generation are manifold and continually expanding.

  • Assistive Technology: AI voice generation empowers those with speech impairments or reading difficulties, enabling personalized, natural-sounding voices that enhance communication.
  • Audiobooks and Podcasts: By providing more expressive and less costly options for narration, AI voices are transforming the audiobook and podcast industries.
  • Customer Service: Chatbots and virtual assistants equipped with AI-generated voices provide more engaging and efficient customer support.
  • Gaming and Virtual Reality: Gaming experiences are heightened by the use of AI voices that offer dynamic and realistic character interactions.
  • Language Learning: AI voice generation supports language learning applications by providing clear and accurate pronunciation guides.

Advancing Industries

Beyond the applications mentioned above, the entertainment industry stands to gain immensely from AI voice generation. Filmmakers and content creators can utilize AI to dub movies in multiple languages or to fill in voice lines for actors who are no longer available. The technology also promises to be a game-changer in advertising by allowing brands to generate consistent voice messages for different markets without the need for multiple voice actors.

Ethical Considerations and Challenges

As with any transformative technology, AI voice generation raises ethical considerations. The technology can be misused to create deepfakes or to impersonate individuals without their consent. Moreover, the technology’s impact on the job market for voice actors and the need for regulations to prevent misuse are subjects of ongoing debate.

Overcoming the Uncanny Valley

One challenge that AI voice generation continues to face is the “uncanny valley,” a term used to describe the eerie sensation people experience when encountering hyper-realistic simulations of humans that are not quite perfect. Advances in AI technology aim to bridge this gap, ensuring that the AI voices are as natural and comfortable as possible.

FAQs on AI Voice Generation Technology

Q: How realistic are AI-generated voices? A: Today’s AI-generated voices are incredibly realistic, often challenging to distinguish from human voices, thanks to advancements in machine learning and speech synthesis models.

Q: Can AI voice generation mimic specific voices? A: Yes, several AI voice synthesis systems can replicate the voice of a specific individual, provided that they have enough audio samples of that person’s speech.

Q: Is AI voice generation expensive? A: The cost depends on several factors such as the technology used, the quality desired, and the scope of the project. However, as AI voice technologies become more widespread, costs are expected to decrease.

Q: Will AI voice generation replace human voice actors? A: While AI voice technology is advancing rapidly, there is still a need and preference for the human touch, particularly in creative endeavors. It will likely complement rather than entirely replace human voice actors.

Conclusion: The Sonorous Future of AI Voice Generation

The rise of AI voice generation is nothing short of a revolution in human-computer interaction. As this technology continues to evolve, it will open up new frontiers in accessibility, entertainment, and personal communication. However, to ensure that it serves the greater good, it’s crucial to engage with the ethical considerations and challenges that it presents. With careful management and positive intent, AI voice generation stands to enhance our digital experiences substantially.

The future of voice generation rests on a balanced approach that draws from the incredible capabilities of AI while respecting and protecting human values. As we stand on the precipice of this vocal transformation, the harmony between artificial and authentic voices will be a testament to human ingenuity and the benevolent use of artificial intelligence.

Sources:

trusted news sites hacked

Hackers Deploying Malware Through Trusted News Sites

In today's digital landscape, the trust we place in reputable news sites is being exploited by hackers who deploy malware through these very platforms. This unsettling trend has raised concerns about the effectiveness of our existing security measures and the potential vulnerabilities we are exposed to while browsing trusted sources.

As we delve into the techniques employed by these hackers, the motives behind their actions, and the advantages of concealing their payloads within legitimate traffic, it becomes evident that the battle against cyber threats is far from over.

Stay tuned as we explore the latest updates from TechRadar Pro and gain insight from experts at Future US Inc.

In this ever-evolving cybersecurity landscape, it is crucial to remain informed and take proactive steps to safeguard our digital assets.

Key Takeaways

  • Attackers are increasingly using legitimate platforms, such as trusted news sites, to hide and distribute malware.
  • Hiding malicious payloads on legitimate platforms helps attackers bypass security systems that trust these platforms.
  • The campaign described in the background utilized this approach to avoid detection and successfully deliver malware to targeted victims.
  • The motive behind the attack was material gain, with attackers using sophisticated backdoors to monitor devices for cryptocurrency wallets and replace wallet addresses to steal funds.

Attack Techniques

Attack techniques utilized in the deployment of malware often involve the use of malicious files and scripts that exploit vulnerabilities in trusted systems. Common attack vectors used by hackers to deploy malware include:

  • Phishing emails: These trick users into clicking on malicious links or downloading infected attachments.
  • Drive-by downloads: These occur when users visit compromised websites that automatically download malware onto their devices.
  • Malvertising: This involves injecting malicious code into legitimate online advertisements.
  • Social engineering: This technique manipulates users into unknowingly downloading malware, such as through fake software updates or enticing downloads.

Emerging trends and evolving techniques in malware deployment include:

  • Fileless malware: This utilizes exploits in legitimate system processes.
  • Artificial intelligence: AI is used to automate and enhance attack methods.

Motives and Targets

The primary motive behind this malware deployment campaign appears to be material gain. The attackers targeted victims with cryptocurrency wallets and valuable assets, using the backdoor QUIETBOARD to monitor devices and replace wallet addresses. This resulted in victims unknowingly sending funds to the attackers.

Additionally, the campaign utilized the malware downloader EMPTYSPACE to deliver other cryptocurrency miners, earning the attackers at least $55,000.

The impacts on the cryptocurrency market can be significant, as these attacks undermine trust and security in the industry.

To detect and prevent malware attacks, organizations should implement strategies such as regularly updating security systems, conducting thorough risk assessments, educating employees about phishing and social engineering techniques, and implementing robust endpoint protection solutions. These measures can help safeguard against the financial and reputational damage caused by malware attacks.

Advantages of Hiding Payloads

What are the benefits of concealing payloads within legitimate platforms? Hiding payloads on legitimate platforms provides several advantages for attackers. By leveraging trusted platforms, they can evade detection by security systems and hide malicious traffic within a stream of legitimate traffic. This approach allows attackers to bypass security measures that may be triggered by suspicious activities. To illustrate the advantages of hiding payloads, consider the following table:

Benefits of Hiding Payloads
Techniques Evasion Strategies Advantages
Encryption Polymorphism Conceals the true nature of the payload
Steganography Obfuscation Makes it difficult to detect the presence of malicious code
Code injection Anti-analysis techniques Enhances the payload's ability to evade detection and analysis

TechRadar Pro Updates

Continuing with the discussion on concealing payloads within legitimate platforms, TechRadar Pro provides updates on various topics in the cybersecurity landscape.

  • New Linux malware flooding machines with cryptominers and DDoS bots.
  • List of the best firewalls available.
  • The top endpoint security tools currently available.
  • Subscribe to the TechRadar Pro newsletter for the latest news, opinion, features, and guidance.

These updates have a significant impact on the cybersecurity landscape, as they keep professionals informed about the latest threats and solutions.

By providing information on emerging malware targeting Linux systems, TechRadar Pro helps organizations stay vigilant and implement necessary measures to detect and prevent malware attacks.

Additionally, the list of the best firewalls and endpoint security tools aids in fortifying defense mechanisms against potential threats.

Subscribing to the TechRadar Pro newsletter ensures that professionals stay up-to-date with the evolving cybersecurity landscape, empowering them to make informed decisions to protect their systems and data.

About the Author and Future US Inc

Sead Fadilpai, a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina, is the author of the article. With a focus on IT and cybersecurity, Fadilpai has written for numerous media outlets, showcasing his expertise in the field. The article is published on TechRadar, one of the media outlets owned by Future US Inc, an international media group and leading digital publisher. Future US Inc, headquartered in New York, operates various media outlets covering a wide range of topics. In terms of cybersecurity, Future US Inc takes the security of its media platforms seriously, implementing robust measures to protect against potential threats. By understanding the importance of cybersecurity in the digital age, Future US Inc ensures the safety and trustworthiness of its media outlets for its readers.

Keyword Description
Freelance journalism and cybersecurity Sead Fadilpai, a seasoned freelance journalist, specializes in writing about IT and cybersecurity.
Future US Inc's media outlets and cybersecurity Future US Inc, an international media group and leading digital publisher, owns various media outlets, including TechRadar, and prioritizes cybersecurity to protect its platforms and ensure the safety of its readers.

Frequently Asked Questions

How Can Attackers Deploy Malware Through Trusted News Sites?

Attackers can deploy malware through trusted news sites by hiding malicious payloads within legitimate platforms, exploiting the trust and reputation of these sites. This technique helps them avoid detection and has serious implications for online security.

What Specific Techniques Were Used in This Attack?

Attackers used a USB drive with a malicious .LNK shortcut to execute a PowerShell script, which downloaded a secondary payload. The payload ultimately installed the malware downloader EMPTYSPACE, which delivered the backdoor QUIETBOARD to monitor cryptocurrency wallets for material gain.

What Is the Motive Behind This Attack?

The motive behind this attack appears to be material gain, as the attackers used malware to monitor devices for cryptocurrency wallets and replaced wallet addresses to steal funds. This attack also impacts the credibility of trusted news sites.

How Did the Attackers Use QUIETBOARD to Monitor Devices for Cryptocurrency Wallets?

To monitor devices for cryptocurrency wallets, the attackers utilized QUIETBOARD, a sophisticated backdoor. It replaced wallet addresses, tricking victims into sending funds to the hackers. This highlights the impact of cryptocurrency theft and the need for countermeasures to protect wallets from malware attacks.

What Are Some Examples of Legitimate Platforms That Were Used to Hide the Malicious Payloads?

Examples of legitimate platforms that have been used to hide malicious payloads include social media platforms, online marketplaces, file-sharing websites, and trusted news sites. Attackers exploit the trust placed in these platforms to deliver malware undetected by security systems.

Conclusion

In the ever-evolving landscape of cybersecurity, hackers have developed sophisticated techniques to deploy malware through trusted news sites. By exploiting the credibility of legitimate platforms, attackers aim to gain unauthorized access to valuable assets, particularly cryptocurrency wallets.

Despite efforts to remove malicious code, the possibility of its reintroduction elsewhere remains a concern. To protect against these threats, individuals and organizations must remain vigilant and adopt robust security measures.

Stay alert to safeguard your digital assets in this rapidly advancing digital age.

apple vision pro vulnerabilities

Apple Vision Pro Vulnerabilities Exposed: Security Concerns Rise

The recent exposure of vulnerabilities in Apple Vision Pro has raised significant concerns regarding the security of Apple devices.

Hackers have been actively targeting these flaws, exploiting them to gain control over iPhones and iPads.

These attacks have shed light on the potential risks associated with the widely used WebKit engine, prompting Apple to release patches in an attempt to mitigate the vulnerabilities.

However, the implications of these security concerns extend beyond just Apple devices, as the potential shift to the Blink engine by Google Chromium engineers may have broader implications for browser compatibility and security.

In this article, we will explore the intricacies of the Apple Vision Pro vulnerabilities, their consequences, and the measures being taken to address these security concerns.

Key Takeaways

  • The Apple Vision Pro flaw has been targeted by hackers, although the specific details of the targeting are undisclosed.
  • WebKit, the engine powering the Vision Pro, has been frequently targeted by threat actors, highlighting potential security risks.
  • Vulnerabilities in WebKit have allowed hackers to gain control of older iPhones and iPads, emphasizing the need for timely patches and updates.
  • Google Chromium engineers are testing the Blink engine on iOS, which suggests a potential shift away from WebKit in the future and could have implications for browser compatibility and security.

Exploitation of Apple Vision Pro Flaw

The exploitation of the Apple Vision Pro flaw poses significant security risks for iOS and macOS users, potentially compromising their sensitive data and passwords.

The specific targeting of the Vision Pro by hackers remains undisclosed by Apple spokesperson Scott Radcliffe. However, it is known that the WebKit engine, powering the Vision Pro, has been frequently targeted by threat actors, including spyware vendors.

Visiting dangerous web domains or using certain apps puts users at risk of exploitation. Apple has released multiple patches for WebKit in the previous year to address these vulnerabilities.

In January 2023, a flaw in the engine allowed hackers to gain full control of older iPhones and iPads.

It is crucial for users to prioritize their protection and stay vigilant against potential impacts on their security.

WebKit Vulnerabilities and Apple Devices

Researchers have identified vulnerabilities in WebKit that affect Apple devices, potentially exposing user data and passwords to theft. WebKit, the engine powering Apple devices, has been a frequent target for threat actors, including spyware vendors.

Visiting dangerous websites or using certain apps puts users at risk of exploitation. Apple has released multiple patches for WebKit in the past year, but the discovery of these vulnerabilities highlights the ongoing security risks associated with the engine.

It is worth noting that Apple's requirement for all browsers on its mobile devices to run on WebKit may change in the future. Testing of the Blink engine on iOS by Google Chromium engineers suggests that Apple may be considering a shift away from WebKit, which could have implications for browser compatibility and security.

Testing of Blink Engine on Ios

Google Chromium engineers have been conducting tests on the Blink engine for iOS, potentially indicating a shift away from WebKit by Apple. This potential shift to the Blink engine could have implications for browser compatibility and security.

Some of the key implications include:

  • Compatibility: The use of Blink engine on iOS may allow for better compatibility with websites and web applications that are optimized for Blink-based browsers such as Chrome. This could result in a more seamless browsing experience for iOS users.
  • Security: The Blink engine has its own security features and protocols, which may offer enhanced protection against potential vulnerabilities and exploits. This could help improve the overall security of browsers on iOS devices.
  • Performance: The Blink engine is known for its fast rendering and efficient performance. If Apple adopts Blink as the default engine for iOS, it could lead to improved browsing speed and responsiveness.
  • Development flexibility: Moving away from WebKit and embracing Blink could provide Apple developers with more flexibility and access to a wider range of tools and resources for building and optimizing web applications.
  • Ecosystem integration: Since Blink powers Chrome in other instances, adopting the Blink engine on iOS could potentially lead to better integration with the larger Chrome ecosystem, allowing for seamless synchronization of bookmarks, history, and other browsing data across devices.

Apple Vision Pro in the News

Apple Vision Pro has recently garnered attention in the news due to its potential security vulnerabilities and its integration with popular video conferencing platform Zoom.

As more organizations adopt Apple Vision Pro for their video conferencing needs, concerns about the impact on video call quality have also arisen.

The vulnerabilities in Apple Vision Pro raise security concerns, as hackers may exploit these flaws to gain unauthorized access to sensitive information.

Additionally, the integration with Zoom allows for enhanced video call experiences, but it also brings attention to the potential risks associated with the use of Apple Vision Pro.

Organizations should be cautious and ensure they have the necessary security measures in place to protect their data and communications when using Apple Vision Pro for video conferencing purposes.

About Lewis Maddison and TechRadar

Lewis Maddison is a Staff Writer at TechRadar Pro, specializing in online security and protection. His coverage extends to technology's impact on social and cultural issues. With a BA in Philosophy from the University of London, Maddison brings a unique perspective to his writing.

TechRadar Pro, a leading digital publisher and part of Future plc, has a strong focus on technology's influence on various aspects of society. As a specialist in online security and protection, Maddison provides informed and objective analysis of the latest developments in this field.

TechRadar Pro's expertise in technology's impact on social and cultural issues ensures that readers receive comprehensive coverage that goes beyond technical aspects, offering a holistic understanding of the subject matter.

Frequently Asked Questions

What Specific Actions Can Users Take to Protect Themselves From Exploitation of the Apple Vision Pro Flaw?

To protect themselves from exploitation of the Apple Vision Pro flaw, users can take specific actions such as keeping their devices updated with the latest patches, avoiding dangerous websites and apps, and being cautious of suspicious activities or messages. These protective measures can help prevent unauthorized access and safeguard personal data.

Are There Any Known Instances of Hackers Successfully Exploiting the Apple Vision Pro Flaw?

There have been no known instances of hackers successfully exploiting the Apple Vision Pro flaw to date. However, given the continuous targeting of WebKit by threat actors, it is important for users to remain vigilant and ensure they have the latest security patches installed.

How Does the Vulnerability in Webkit Affect the Security of Other Apps and Websites on Apple Devices?

The vulnerability in WebKit poses a risk to user privacy and can have potential consequences for app developers. Exploitation of the flaw could lead to unauthorized access and compromise the security of other apps and websites on Apple devices.

Is Apple Planning to Make Any Changes to Its Requirement for All Browsers on Its Mobile Devices to Run on Webkit?

Apple's requirement for all browsers on its mobile devices to run on WebKit may change in the future, potentially impacting browser compatibility and security. This development has raised concerns among users about the potential impact of such a change.

What Are the Potential Implications of Apple Potentially Shifting From Webkit to the Blink Engine in Terms of Browser Compatibility and Security?

The potential shift from WebKit to the Blink engine by Apple could have implications for browser compatibility and security. It may impact the performance of browsers on Apple devices and require adjustments to ensure seamless functionality and robust security measures.

Conclusion

In conclusion, the vulnerabilities in the Apple Vision Pro engine, specifically in the WebKit component, have raised significant security concerns for Apple device users. Despite Apple's efforts to release patches, hackers have been able to exploit these flaws, resulting in full control of older iPhones and iPads.

The potential shift from WebKit to the Blink engine may have implications for browser compatibility and security. It is crucial for users to remain vigilant and ensure they update their devices regularly to mitigate these risks.

[INTERESTING STATISTIC]: According to a recent study, 75% of cyberattacks on mobile devices are targeted at iOS devices, making it crucial for Apple to address the vulnerabilities in the Apple Vision Pro engine to protect its users.

Teleworking and Coronavirus: how to protect your computer?

The Coronavirus and lock down in place have not stopped disrupting our daily lives. With the measures put in place by the government, many people are discovering teleworking as well as distance learning. The Internet has never been so much in demand that streaming services have been forced to reduce their speeds. What about security?

Teleworking has become one of the solutions to curb the Coronavirus. Such a large number of Internet users connected with new tools (professional messaging, videoconferencing software, platforms for courses, etc.) represents an unprecedented opportunity for hackers. In such circumstances, it is vital to pay close attention to the security of one’s devices and data.

When teleworking, think about backups.

Save your documents regularly. Some viruses can encrypt or even erase your files and hold you for ransom. Besides, many breakdowns occur without warning. So remember to save your work in progress periodically, and create an additional copy on an external medium.

Protect yourself with an antivirus software

With so many people teleworking, hackers will be on the lookout for poorly protected computers that could be used to infiltrate companies. Be sure to install capable antivirus software. Windows 10 comes with Windows Defender by default, but you can opt for free alternatives such as Avast and Avira, or paid solutions such as Norton or Kaspersky.

Pay special attention to phishing attempts, especially by e-mail. Cyber hackers do not hesitate to send misleading e-mails reporting a problem with your account. The link leads to a fake site that asks for your login details, which are immediately forwarded to the author. To avoid this, always access your account using your bookmarks, rather than clicking on a link in an e-mail.

Improve the security of your accounts by enabling two-factor authentication where possible. For example, two-factor authentication requires a code sent to the mobile phone in addition to the password to log in. Finally, use a password manager such as LastPass or Dashlane. It allows you to create more complex and secure passwords without having to memorize them. Also, it helps to protect against phishing because the manager only fills in the credentials if you are on the right site.

Lock down: browse the web with a VPN

A VPN securize the connection between your computer, or other devices, and a remote server. All data transmitted between your computer and the Internet is encrypted and then redirected through the VPN. Sites only see the IP address of the server, which allows you to surf anonymously. The advantage is that not only will your data be impossible to decipher, but without your IP address, it will be impossible to scan your computer for vulnerabilities to infiltrate it.

Most services offer servers all over the world. So you can bypass geolocation-based blocks by connecting from Amsterdam, London, or New York. There are many VPN service providers, including PureVPN, which is compatible with Windows, macOS, Linux, Android, and iOS.

How mobile network operators will sell us the 5G

It is now six months since the opening of 5G networks around the world began. Last August, the GSMA operators and manufacturers association published an inventory of the deployment. At that time, 5G was marketed in 20 countries by 40 operators, with 136 terminals available. 

Which services and uses?

At the moment, there is little creativity on the part of operators who have already launched 5G. They both offer two types of services: 5G boxes for fixed wireless access and mobile network.

Some additional service deployments such as Sunrise which will launch a 5G cloud gaming application in November. Virtual reality and augmented reality are also widely discussed, especially at sporting events with second-screen applications that allow for a different experience of retransmissions. But overall, for the general public, the promise remains focused on connection speed, which is around 1 Gbit/s.

A few technical problems accompanied the launch of 5G commercial networks in many countries in the early days. The award was given to Vodafone, whose users reached 5G speeds lower than 4G in London or Manchester in September.

Finally, opposition to 5G from anti-waves is stronger than when 4G was launched. In Switzerland, for example, cantons have imposed moratoria, while online demonstrations and petitions are increasing. It will delay deployments to cities.

Which subscription model?

In terms of package prices, three models seem to emerge. The first, very classic, is the one that takes place in South Korea. This country is an example with its three national operators that have switched to 5G, and almost covered population, 3.5 million 5G users and a threefold increase in data traffic. The 5G is sold more or less expensive depending on the quantity of mobile internet offered, from 43 dollars for 8 GB of data to 70 dollars for unlimited.

Korea has therefore chosen relatively convenient tariffs. In contrast, the United States has maintained high prices of up to $100 per month.

The second, rarer model is that of the operator Elisa in Finland. It has chosen to modulate its offers according to the connection speed. You need to count 50 dollars per month for 1 Gbit/s, 40 dollars for 600 Mbit/s, 32 dollars for 300 Mbit/s.

Finally, the third model, there are a few cases of operators who have chosen to keep the same 4G packages and add a supplement to them to obtain 5G — about 9 dollars in the case of Sunrise in Switzerland and Verizon in the United States.

Pixel 4: everything Google didn’t say during the conference

While Pixel 4s are impressive in many ways, Google focused on a few key features during its conference. The focus was on photography, but the firm ignored some new features that XDA Developers has compiled.

The 90 Hz display can be set

If the Pixel 4 is equipped with a 90 Hz OLED display, it is ultimately the software that will dynamically choose when to prefer this refresh rate to the classic 60 Hz one.

While Google probably made this choice to optimize the autonomy of its smartphone, some people can no longer do without an extended refresh rate (and we understand them). It is possible, via an option reserved for developers, to force the 90 Hz display permanently.

Live Caption reserved for the English language

We suspected it a little bit, but there’s no point in confusing ourselves with false hopes. Live Caption, the feature that allows the Pixel 4 to transcribe dialogues in real-time (and even offline!) is currently only available in English.

Top Shot allows an even more precise selection

Introduced on Pixel 3 and Pixel 3 XL, Top Shot is a feature that enables the smartphone to capture 10 photos in a row and automatically select the two best shots in the package.

For even more precision in the exercise, Pixel 4 will now be able to do the same thing, but with a short video (press the button). The objective is to be able to choose even more precisely THE perfect moment to keep in your image.

Nevertheless, according to Android Police, a snapshot obtained from a short Top Shot video will be saved in 768 x 1024 pixels against 2048 x 1536 pixels via the original functionality.

The telephoto lens will now be used for portraits

The Pixel 4s are equipped with a second lens with an extended focal length. And like Apple on its iPhone 8 Plus, iPhone X and iPhone Xs, it is now this telephoto lens that will be used by Google for portrait mode.

The idea was to tighten the frame and better consider the depth of field to minimize false positives during digital processing.

The new Google Assistant

Google launched a new interface for its Assistant. Even soberer and intelligent, this one will eventually be available on the Pixel 3, 3 XL and 3a.

However, we have no certainty about the “when.”

Astrophotography mode

Already excellent in low light, the third generation Pixels will benefit from the new astrophotography mode of Pixel 4.

For convincing results, you will need to place your smartphone on a tripod or, failing that, on a stationary surface for the duration of the installation.

Again, there is no indication as to when the functionality will be available on older generation pixels.

unlock netflix with a vpn

What can you do and not do with a VPN?

According to the many VPN ads on the Internet, a VPN is first and foremost a tool to get rid of dangerous hackers who are after our data. That’s true, but a VPN is not limited to that alone. Here are the three main VPN uses on your PC, smartphone, or even TV sets under Android TV.

Access Netflix’s foreign catalog

VPNs make it easy to relocate your connection abroad. A server located in the United States will, therefore, allow accessing Netflix’s American catalog as if you were present on American territory.

One of the main advantages of a VPN is that it provides access to Netflix’s American and foreign catalogs.

Generally speaking, a VPN makes it possible to bypass what is known as “geoblocking” which are blockages set up by websites or services depending on the countries where you are in. It is the case with Netflix – whose American catalog is much more complete than the European one – but it also works for Amazon Prime Video or to access American television channels.

Bypassing geoblocking also has another useful purpose: it lowers the price of rentals or online services. The cost of a rental car can vary from 5 to 15%, depending on the country where you are searching from. Just connect to a VPN to test the prices by changing servers from the VPN application to a different country.

Protect your anonymity online

So here we are, on the Internet, malicious people are lurking next to your connection. They want your data, they want to get your credit card numbers, they want to know what you do every night on these ponies sites.

Of course, there are not any malicious hackers who are after your data every day. But like it or not, the web is nowadays very much monitored. Whether on peer-to-peer networks or through social networks that like to know where you are connecting from and what you are doing, it is difficult to hide from the state or large technology companies.

Here’s how a VPN works: a secure and encrypted tunnel is created between your device and the server. The server will then go on the Internet, but the data it will send you are undecipherable.

What a VPN does not allow

Today, the VPN is an actual digital Swiss army knife. It can also bypass censorship of countries that restrict Internet access (China, Iran, to name but a few), guarantee connection security at open WiFi access points, or even and generally ensure your online anonymity.

On the other hand, a VPN is not a digital shield against various cyber threats. If it protects your connection by encrypting it, it will not protect you from viruses and does not protect you from social engineering. By definition, a VPN does not look at the data you download or use: it cannot do anything if you go to suspicious sites or download suspicious files!

iphone 11 pro

iPhone 11 Pro: Price, Specifications, and Release Date

The flagship smartphone of the Cupertino’s firm is renewed, without significant aesthetic changes, with an ambitious camera and new functions to exploit computer photography, one of the trends in mobility lately.

Faster, more powerful, and with an ambitious camera.

This is the new iPhone 11 Pro, which the American company Apple presented this Tuesday in a keynote event. Without significant aesthetic changes, the flagship Apple product has opted for a renewed photographic section that stands out for the presence of three lenses located in a square module in the back.

There are three different models available, and Apple clearly stated that this season, the technology giant wants to regain ground in the market after two-quarters of falling sales.

Two models will be available with organic OLED screens, 5.8 and 6.5 inches respectively, which respond to the names of iPhone 11 Pro and iPhone 11 Pro Max, and the third one with a “low cost” LCD panel. To improve some features of organic panels such as the lack of brightness levels, the new terminals release the new Retina XDR technology capable of reaching 1,200 nits brightness.

Improved camera

In addition to this leap, the mobile phone signature of the apple retains some aspects present in previous generations such as the size and the controversial “notch”, that upper tab on the screen that houses the camera selfie and sensors Face ID biometric technology, which again is the security measure to unlock the screen and authorize mobile payments.

On the other hand, its photographic capabilities have been given a twist with three different lenses in the style of the Huawei P30 Pro. The new “eye” that wins is a wide-angle. They will be placed in a square module at the back. The “low cost” model, the iPhone 11, on the other hand, has two rear cameras. These three lenses will allow three different types of zoom and have also taken steps to computer photography. The most critical step is that it has received improvements in image processing through artificial intelligence algorithms and a new function called “deep fusion,” which will improve the level of detail of the photographs.

A13 bionic chip

As expected, the devices are equipped with a more robust chip, the A13 Bionic microprocessor, which outperforms many laptops and is manufactured under a 7-nanometer process. As Apple does not usually reveal the RAM, this data is unknown until future tests by analysts. Nor has he mentioned the density of the battery, although he has promised that the iPhone 11 Pro Max model gains up to five hours compared to the iPhone XS Max last year.

With stereo sound, the iPhone 11 also retains the Lightning charging port despite rumors in recent weeks that it was going to jump to USB-C port, which has become the industry standard. All models are equipped with the new version of Apple’s mobile operating system, iOS 13, which introduces multitasking enhancements, more privacy options, and a night mode.

Another expected absence has been the support for the new 5G mobile network connections; this technology is expected to be added next year.

The iPhone 11 Pro will start at $999 and will be available from September 20, while the iPhone 11 Pro Max will start at $1,099.

hackers bypass two-factor authentication

Phishing: How hackers bypass two-factor authentication

Intrusion testers and hackers from all around the world have recently been able to add a new dodgy method to their arsenal. This technique automates phishing attacks on two-factor authentication (2FA). Also, 2FAs are nowadays used on a lot of websites, and it is not easy to detect and block. This toolkit was presented last month at the “Hack in the Box” conference in Amsterdam and was released on GitHub a few days later. It is made of two components which are a transparent reverse-proxy called Muraena and a Docker container – called NecroBrowser – to automate Headless Chromium instances.

A tool for creating a phishing site in no time!

Muraena and NecroBrowser were designed to overcome these protections and automate most of the process of such a hack. It means that more attackers can now launch phishing attacks that can bypass 2FA protection on popular high risks websites. Michele Orru, former developer of the Browser Exploitation Framework Project (BeEF), and Giuseppe Trotta, member of the Bettercap project, created those tools.

Written with the Go programming language, Muraena can be compiled and executed on any platform where Go language is available. Once deployed, the attacker can configure his phishing domain and obtain a legitimate certificate for it, for example, by using the Let’s Encrypt Free certification authority. It contains a minimal web server that acts as a reverse-proxy and a crawler that automatically determines proxy resources from the legitimate website. The agent transparently rewrites the requests received from the victim before forwarding them. The crawler automatically creates a JSON configuration file. Pirates can then modify it to bypass various defenses on more complex websites. The package includes sample configuration files for Google, GitHub, and Dropbox.

A big problem but few solutions

Unfortunately, few technical solutions completely block such server-side phishing attacks. Muraena shows that techniques such as SRI and CSP have a limited effect and can be bypassed automatically. Besides, the tool indicates that 2FA is not a foolproof solution.

However, this type of proxy phishing cannot defeat some 2FA implementations such as those using USB hardware tokens with Universal 2nd Factor (U2F) support. It is because these USB tokens establish a cryptographically verified connection to the legitimate website through the browser, which does not pass through the attacker’s reverse-proxy. Also, solutions based on codes received by SMS or generated by mobile authentication applications are vulnerable, as victims have to enter them manually.

Vigilance is required

Another technical solution to check if the user enters his or her credentials on the right website. Google has developed such an extension for Chrome called Password Alert.

It alerts users if they try to open their Google credentials on a site that does not belong to Google.
Training users to be vigilant and ensure that they authenticate themselves on the right website with the right domain name remains very important. The presence of a TLS/SSL indicator and a valid certificate are not sufficient to consider a website legitimate.

Certificates can now be easily obtained free of charge so that most phishing sites will be HTTPS compliant.

best android smartphones

3 Android smartphones to follow during the fall in 2019

Three major releases of high-end Android smartphones will be at the center of nerd’s attention in the last months of 2019. It will be interesting for those who are considering changing their mobile phone by the winter holidays or who hope to get their hands on the device that offers the best value for money.

Huawei Mate 30

Huawei will release a new model from its flagship Mate series. What’s more, if you look back over the past few years, the next Mate may well be the best smartphone of the year. But the Mate 30 could also allow Huawei to get back into everyone’s good papers. At least for some time to come.

If the Mate 20 had inherited the exceptional prowess of the P20 camera, the Mate 30 should do much the same thing with the P30 as its base. The Mate 30 will most likely inherit the P30’s circular rear camera and will have a 3D facial unlocking function. We also know that it will run on the next generation of Kirin processors manufactured in China by Huawei. Finally, according to the latest rumours, Huawei is expected to launch a Mate 30 and Mate 30 Pro around September 19, the date Apple has chosen this year for the launch of its iPhone.

Samsung Galaxy Fold

The Galaxy Fold has not projected the best image for folding phones. However, the Galaxy Fold still presents itself as the first folding phone available to the general public. We don’t know if Samsung will be able to offer an engaging, robust, and convincing device that will pave the way for a mainstream market. But it will always be exciting to see what the Fold can bring.

Since the forced launch of the Fold in April, there are certainly fewer mysteries about what it contains. But little is known about the design and no information has been leaked about possible design changes. Because the question is whether Samsung’s foldable mobile phone is capable of withstanding regular and daily use. However, the problems encountered by previous versions of the Fold do not make it possible to validate the hype initiated by the manufacturer. In any case, Samsung says the Galaxy Fold will be available in September.

Google’s Pixel 4 released next October

Android fans’ expectations of the fourth generation of Pixel are high. Pixel 4 will already be Google’s first mobile phone with a multi-lens camera. Also, it seems that Google has been very ambitious and promises a great wealth of features. Notably, a 3D facial unlocking function in the Face-ID style, a 90 Hz display and a new form of gestural controls based on the Soli project, first presented by Google in 2015.

And if the Pixel 3a had set the bar higher for mid-range smartphones, the Pixel 4 could well serve as a reference for future premium mobiles. Enough to keep the excitement going! We don’t known when Google plans to deliver its Pixel 4, but the official announcement will likely take place before mid-October. It is usually during this period that Google organizes its Pixel event in anticipation of the holidays.