article_text
stringlengths
294
32.8k
topic
stringlengths
3
42
Apple continues to lead the “global best-selling smartphone list,” according to new data from Counterpoint Research. According to data for the month of April, Apple took the top four spots and five of the top 10 spots. In total, the “top 10 models captured 21% of the total smartphone market.” The iPhone 13 remains the best-selling global smartphone, accounting for 5.5% of total smartphone sales for the month of April. The most expensive iPhone model on the market, the iPhone 13 Pro Max, came in as the runner up with 3.4% of the total sales. The iPhone 13 Pro and iPhone 12 rounded out Apple’s top four positioning with 1.8% and 1.6% of sales, respectively. Samsung locked in the fifth and sixth laces, while the iPhone SE (2022) secured seventh place. Counterpoint explains: The month’s best-sellers list saw an increase in the number of 5G-enabled smartphones, rising to a new high of seven models and up from four in the same month last year. The 5G smartphones on the list represent a third of the total 5G smartphone sales. 5G capability has become a standard offering in flagships and its presence is increasing in lower price bands as well. For the iPhone specifically, Counterpoint had a few specific details to share: iPhone 12 sales were driven by increased sales in Japan and India The iPhone SE 2022 saw triple-digit month-on-month growth, again driven by Japan where it captured 18% of smartphone sales for the month. The non-Pro iPhone 13 “has maintained a lead every month since launch,” unlike last year’s iPhone 12. The full report from Counterpoint Research is worth a read and includes some details on the broader smartphone market and other manufacturers. FTC: We use income earning auto affiliate links. More. Check out 9to5Mac on YouTube for more Apple news: About the Author Chance Miller @ChanceHMiller Chance is an editor for the entire 9to5 network and covers the latest Apple news for 9to5Mac. Tips, questions, typos to chance@9to5mac.com Chance Miller's favorite gear
Tech Giants
Oct 27 (Reuters) - Amazon.com Inc (AMZN.O) projected current-quarter sales below Wall Street estimates on Thursday as decades-high inflation and intense competition from rivals such as Walmart (WMT.N) weigh on its retail business.Shares of the world's largest e-commerce company fell nearly 19% in trading after the bell.After recording blistering growth during the pandemic, tech giants including Amazon are seeing a slowdown in demand as people return to outdoor activities and rely less on the internet for their day-to-day needs.The world's biggest online retailer forecast net sales of between $140 billion and $148 billion for the fourth quarter. Analysts were expecting $155.15 billion, according to IBES data from Refinitiv.Amazon's net sales were $127.1 billion in the third quarter ended Sept. 30, little lower than analysts' expectations of $127.46 billion, according to IBES data from Refinitiv.Reporting by Tiyashi Datta in Bengaluru; Editing by Anil D'SilvaOur Standards: The Thomson Reuters Trust Principles.
Tech Giants
The European Commission has urged tech giants that use AI tools like Google Bard and OpenAI's ChatGPT to label AI-generated content. The European Union's executive body wants Google, YouTube, Facebook, TikTok, and other tech platforms to detect AI-generated photos, videos, and text and label them for users. This is part of the European Commission's attempt to curb disinformation, which EU officials claim has been floating around the web more frequently since the Russo-Ukrainian war began. According to Brussels, AI tools are allowing criminals to spread false information. In fact, some cybercriminals are using ChatGPT-like chatbots to create fake news websites. European Commission Vice President Vera Jourova told reporters on Monday that advanced AI tools including ChatGPT can effortlessly create complex, seemingly realistic content and visuals in a few seconds. Jourova also pointed out that people can use image generators to make realistic pictures of events that never took place. "Voice generation software can imitate the voice of a person based on a sample of a few seconds," she added. In fact, Spotify is reportedly prepping to use the AI-trained voices of popular hosts with the help of similar technology. Jourova also warned of Russian disinformation, which is spreading like wildfire in Central and Eastern Europe. Moreover, she noted that machines did not have "any right" to freedom of speech. Jourova has asked the 44 signatories of the European Union's code of practice against disinformation to help users identify AI-generated content. "The labelling should be done now — immediately," she insisted. Will tech companies act in accordance with this request? It is worth noting that tech firms do not need to comply with Brussels' latest request, considering the code of practice is voluntary. Andrea Renda, who is a senior research fellow on the digital economy with the Centre for European Policy Studies, believes there may also be a few technical barriers. "Nothing guarantees that they will be able to detect in real time that something is generated by AI," Renda told DW. According to Renda, a considerable number of companies will choose to work on a "best-effort basis." So, the result isn't likely to be close to 100 per cent. Jourova, on the other hand, said Google CEO Sundar Pichai reassured her. Apparently, she asked the top executive whether he developed a technology that can detect AI-generated content and label it to let people differentiate between real and AI-produced content. "Yes, but we are developing, we are improving the technologies further," Pichai told Jourova. Twitter is unlikely to comply Back in May, Twitter decided to withdraw from the EU Code of Practice. Jourova, who was understandably not impressed by the platform's decision to opt-out, said Twitter "chose confrontation." Jourova told reporters that the actions and compliance with EU law of the Elon Musk-owned social media platform will be urgently and vigorously scrutinised. Notably, major content moderation obligations are slated to kick in for popular online platforms including Twitter under new EU legislation in May. The regulations (known as Digital Services Act) will ensure companies are more transparent when it comes to their algorithms. Also, it will encourage these platforms to stop the spread of harmful posts. Moreover, the upcoming regulations will require companies to restrict targeted advertising based on sexual orientation, religion, and other sensitive data. Renda describes the new rule book as "groundbreaking." Companies that do not comply with the new legislation would face fines of up to 6 per cent of global annual turnover. These companies might even be banned from operating in the EU. In other words, Twitter will have no choice but to comply with broader EU rules. In the meantime, the microblogging website can dodge Brussels' latest request to immediately label AI-generated images or videos. Aside from this, Brussels is gearing up to introduce new laws, known as the AI Act to regulate artificial intelligence. The majority of European lawmakers on the committee on civil liberties and consumer protection supported the draft AI Act. A statement released after the vote comprises rules on how AI technology can be used across Europe without restricting innovation. - ✔️ Unlock the full content of International Business Times UK for free offer available for a limited time only - ✔️ Easily manage your Newsletters subscriptions and save your favourite articles - ✔️ No payment method required This article is copyrighted by International Business Times, the business news leader
Tech Giants
Their thirst for power is immense: In just a few years, US digital platforms have seized control of the internet. They've established impenetrable monopolies using unethical tactics, manipulating both web traffic and revenue to reap substantial profits, writes German media expert Martin Andree, who has just published the book "Big Tech muss weg!" (Big Tech Must Go!). In his book, Andree suggests that there's room for resistance until 2029, but, after that, it may become impossible. "If we don't act soon, it could spell the demise of our democracy!" he told DW. Martin Andree works as a media researcher at the University of Cologne. In his previous book — "Atlas der digitalen Welt" (Atlas of the Digital World), published in 2020 — he had already examined the immense influence being amassed by major US internet platforms. Andree found in his research that the majority of online activity is concentrated in just a handful of websites, gathering 70% of internet traffic, while the remaining digital space resembles a "vast graveyard." 'Hostile takeover' of the internet According to Andree, Google, Facebook, Amazon and their counterparts have executed a "hostile takeover" of the internet by exploiting regulatory loopholes and thus misleading state institutions. "This leads to a glaring and feudalistic system of regulation," he says, meaning that the companies can dictate the conditions for e-commerce on their platforms or which user data they can collect. Through strategic lobbying tactics, they have engaged in a protracted game of cat-and-mouse with the authorities for years. Furthermore, advertising invariably gravitates toward where the audience and purchasers are. Consequently, profits funnel into the treasuries of tech giants, helping them to amass wealth and, in turn, purchase competitors. Case in point: Facebook (now Meta) acquired the messaging service WhatsApp in 2014. Another instance: Elon Musk's billion-dollar acquisition of Twitter (now X) a year ago. Total control of the public Media companies, bloggers, public broadcasters, and even global corporations, are the primary victims. They stand no chance against the tech giants. Fewer people visit their websites. When editorial media share content on platforms like Youtube or Instagram, they do so on the platform's terms, without the option to redirect users to their own websites using outlinks. Andree warns that in a few years, a handful of US platforms will control the foundation of our political opinion formation. Furthermore, the economy is increasingly falling under the dominance of internet giants. More sales and transactions are occurring on these major platforms, all subject to the terms set by big tech companies. Valuable user data is also flowing into their hands. Andree points out that knowledge about customer preferences can be used to unfair advantage and turned into profit, like producing custom products "bypassing manufacturers." For instance, Amazon offers its product line, "Amazon Basics." Apple, with its payment service, has long been entrenched in the financial industry. Fair competition, Andree states, is a thing of the past. David against Goliath Martin Andree's criticism may sound sharp and, at times, alarmist. Many voices of caution have emerged since the tech industry's initial mission, rooted in the Californian spirit of the 1960s, to bring new freedom, exchange and transparency to the world. Yet, few have explained the "brave new internet world" as comprehensively as Andree, outlining winners and losers so clearly and highlighting the undeniable risks to democracy and the economy. But Andree remains hopeful: "The internet corporations' concentration of power can be dismantled," he asserts. "We can easily free the internet, reintroduce pluralism into the traffic, and eliminate the existing misregulation." Liberating the Internet Andree's blueprint for "liberating the internet" is based on 15 core principles. Enforcing open standards to enable users to share videos, images and texts across platforms is paramount. Furthermore, content providers must be granted the freedom to directly link to their websites. Tech giants should also disclose their revenues and profits for proper taxation by countries. Also, it must be ensured that user data is accessible to all competitors. The call is now for legislators and regulators to take action. "All these measures are cost-effective, and most of them can be swiftly implemented if we genuinely seek a solution," states the author. This article was originally written in German.
Tech Giants
Google AR glasses prototypeGoogleGoogle will test augmented reality prototypes in public settings, the company said in a blog post on Tuesday.Some prototypes will look like normal glasses and will be equipped with microphones and cameras as well as transparent displays.The new glasses aren't a product yet and aren't available to the public, but Google wants to test apps like real-time translation or showing the user directions inside glasses lenses, especially in environments like busy intersections.The tests represent a significant advance in Google's development of augmented reality, a technology that many in Silicon Valley believe could be a major shift in computing like the smartphone and PC before it. Augmented reality superimposes computer-generated images over the real world, unlike virtual reality, which completely immerses the viewer in an artificial world or "metaverse."By announcing plans to test in public, Google is also trying to get ahead of the kind of privacy concerns that helped sink Google Glass, one of the first augmented reality devices, almost a decade ago.Google Glass was equipped with a front-facing camera, and critics worried about users recording people without their permission. Glass wearers received a derogatory nickname, and in 2014 a woman wearing the glasses said she was attacked at a San Francisco bar. Eventually, Google repurposed the glasses to focus on business customers rather than consumers."It's early, and we want to get this right, so we're taking it slow, with a strong focus on ensuring the privacy of the testers and those around them," Google product manager Juston Payne wrote in the blog post about the new product."These research prototypes look like normal glasses, feature an in-lens display, and have audio and visual sensors, such as a microphone and camera," Google said in a support page about the testing. The device features an LED light that turns on when the glasses are recording image data. Google says the glasses will not record video or take photographs for users to store and view later, but they may capture and use image data to perform functions like identifying objects or showing directions. Testers won't wear the glasses in schools, government buildings, healthcare locations, churches, protests, or other sensitive areas, Google said. The testing will be conducted by "a few dozen Googlers and select trusted testers" and will take place somewhere in the U.S.Google revealed its AR glasses at its developers conference in May with a focus on translating speech in real time, so that a person would see a foreign language translated in front of their eyes. One Google employee called the glasses "subtitles for the world" during the presentation.Google is fiercely competing with other tech giants including Apple, Meta, and Microsoft to build the first next-generation augmented reality glasses. All four companies have invested billions in augmented reality software and hardware, hoping for a breakthrough that could enable a new computing platform, but current products have yet to catch on."The magic will really come alive when you can use them in the real world without the technology getting in the way," Pichai said.Apple is reportedly preparing to announce a mixed reality headset as soon as next year. Meta has announced an advanced mixed reality headset that supports augmented reality features releasing later this year. Microsoft's Hololens is the most advanced augmented reality hardware on the market from a big tech company for now.
Tech Giants
SummaryCompaniesProbe follows consultationTo examine whether new rules are needed to boost competitionGoogle says it builds open platforms that benefit usersApple says its promotes competition and choiceLONDON, Nov 22 (Reuters) - Britain's competition watchdog on Tuesday launched an in-depth investigation into the dominance of the mobile browsers of Apple (AAPL.O) and Google (GOOGL.O).Responses to a consultation it launched in June revealed "substantial support" for a fuller investigation into the matter and into whether iPhone-maker Apple restricts cloud gaming through its app store, the Competition and Markets Authority (CMA) said."Many UK businesses and web developers tell us they feel that they are being held back by restrictions set by Apple and Google," Sarah Cardell, interim chief executive of the CMA, said in a statement."We plan to investigate whether the concerns we have heard are justified and, if so, identify steps to improve competition and innovation in these sectors."Google said its Android mobile operating system gave users a greater choice of apps and app stores than any other mobile platform."It also enables developers to choose the browser engine they want, and has been the launchpad for millions of apps," a spokesperson said."We're committed to building thriving, open platforms that empower consumers and help developers build successful businesses."Apple said it would "constructively" engage with the CMA to explain how its approach "promotes competition and choice, while ensuring consumers' privacy and security are protected."U.S. tech giants, including Google's owner Alphabet and Apple, are drawing increasing attention from competition regulators in Brussels, London and elsewhere.Google's Play Store is the subject of separate investigations by anti-trust authorities in the EU and Britain, the company said last month. read more Reporting by Paul Sandle in London and Pushkala Aripaka in Bengaluru; editing by Shinjini Ganguli and Jason NeelyOur Standards: The Thomson Reuters Trust Principles.
Tech Giants
U.S. Senator Amy Klobuchar (D-MN), chair of the Senate Judiciary Subcommittee on Competition Policy, Antitrust, and Consumer Rights, speaks during a hearing on "Big Data, Big Questions: Implications for Competition and Consumers" in Washington, D.C., U.S., September 21, 2021.Ting Shen | Pool | ReutersDozens of companies and business organizations sent a letter to U.S. Congress members on Monday, urging them to support a bill that would rein in the biggest tech companies such as Amazon and Alphabet's Google.Last week, Democratic U.S. Senator Amy Klobuchar and lawmakers from both parties said they had the Senate votes needed to pass legislation that would prevent tech platforms, including Apple and Facebook, from favoring their own businesses.Companies supporting the measure, which include Yelp, Sonos, DuckDuckGo and Spotify, called it a "moderate and sensible bill aimed squarely at well-documented abuses by the very largest online platforms."Other signatories included the American Booksellers Association, the American Independent Business Alliance, the Institute for Local Self-Reliance and Kelkoo Group. Amazon.com, the Chamber of Commerce and others oppose the measure. Supporters urged lawmakers to pass the bill, saying it would modernize antitrust laws so smaller companies can compete.Last week, Klobuchar said she believed she had the 60 Senate votes needed to end debate and move to a vote on final passage. There is a similar bill in the House of Representatives."It's no surprise that Yelp and Spotify like the bill since it's designed to help them. But senators are telling us that they just aren't hearing their voters demanding changes to Amazon Basics and Google Maps," the pro-tech Chamber of Progress said in a statement.The tech giants have said the bill would imperil popular consumer products like Google Maps and Amazon Basics and make it harder for the companies to protect their users' security and privacy.Carl Szabo of NetChoice said the pressure being exerted to get a vote on the bill was a sign that it did not have enough support to pass. "This is a drowning bill's last gasp for air," he said.
Tech Giants
Last night, Motier Ventures held a tech meetup focused on AI startups featuring some of the most hyped tech startups in the French tech ecosystem, Dust, Finegrain, Gladia, Mistral AI and Scenario — all of them are portfolio companies of Motier Ventures. And you could feel a sense of excitement both on stage and in the audience. Artificial intelligence, just like in the U.S., has quickly become a buzzy vertical within the French tech industry. But this time, France seems particularly well positioned to become one of the main AI hubs of the world. And it shouldn’t come as a surprise. Tech giants have historically set up AI research labs in Paris as there’s a large talent pool of PhD students in math, computer science and engineering. They usually graduate from Polytechnique, ENS or Inria. They sometimes move to the U.S. for postdoctoral research and then move back to France to join a research lab. For instance, Facebook (now Meta) created its Paris research lab back in 2015 with Yann Le Cun at the helm of the AI initiative — this research group is called FAIR, for Facebook Artificial Intelligence Research. Google followed suit with its own AI research center dedicated to AI in Paris. “The FAIR team is extremely impressive. Just look at what they’ve done with Llama,” an entrepreneur told me yesterday. He recently had a private meeting with some of the engineers and scientists working on AI projects. And if you look at the founders of Mistral AI, the French AI startup working on open-source large language models that raised a €105 million seed round ($112 million at today’s exchange rate), all three co-founders Arthur Mensch, Timothée Lacroix and Guillaume Lample previously worked at Google’s DeepMind or FAIR. Last night, Mistral’s co-founders put together a demo of Mistral AI in a ChatGPT-like interface called Mistral AI Chat. The demo was based on new model called “mistral-70b-instruct-alpha01”, indicating that the team is actively working on a new model with more parameters so that it can be more competitive with sophisticated LLMs. According to a recent report from The Information, Mistral AI plans to raise as much as $300 million in the coming weeks. Mistral isn’t the only high-profile AI company in France. Poolside, a company that recently raised a $126 million seed round, plans to use AI to make it drastically easier to write code. Co-founded by Jason Warner, the former CTO of GitHub, and Eiso Kant, a serial entrepreneur who worked on Athenian and source{d}, the company has picked Paris as its home base. Dust, a company that is working on integrating large language models with internal corporate data from GitHub, Notion or Slack, also took the stage for a demo last night. At Dust’s office warming party, I realized that Dust shares its beautiful office building with Nabla, another French AI startup focused on helping doctors leverage large language models and co-founded by former FAIR engineers. This proves once again that an AI ecosystem is emerging. The founders of Mistral AI and Dust had to leave the meetup quickly after their demos as they were both invited for dinner at the Elysée Palace, the residence of Emmanuel Macron. So there’s also some public support for AI startups in France. An entrepreneur recently told me that multiple AI startups are working together on public tenders for government grants worth millions of euros as part of France 2030. One thing that might differentiate European AI startups from AI giants like OpenAI and Anthropic is that they’re thinking about regulation and compliance from day one. An interesting French AI startup in this field is Giskard, which is developing an open-source testing framework, or “the best LLM antivirus in the market,” as Giskard co-founder and CEO Alex Combessie told me. I’ll have more to write about Giskard in the coming days. And another wave of stealth AI startups Earlier this week, The Information reported that Adaptive, an AI startup based in Amsterdam and co-founded by French AI researcher Julien Launay was about to raise a seed around at a $100 million valuation. Adaptive helps companies iterate on their AI applications without relying on external data or annotations. A source confirmed that Index Ventures is leading the Adaptive round with Iconiq and Motier Ventures participating. Another source told me that Wiem Gharbi is also raising a seed round with Index Ventures for an AI startup with a team split between Paris and London. In other news, I’ve heard that Steeve Morin, a key member of the team behind Zenly, a popular consumer app that was acquired by Snap, is also creating an AI startup called ZML. The team will focus on improving machine learning inference and other low-level tools. Maxime Germain, the founder of mental health startup Jour, which was acquired by Alan, is leaving Alan to start Heart Hands, an AI startup that is developing a “second brain in your pocket,” as an investor described it to me. I think it’s safe to call this new wave of startups a trend. While the overall tech ecosystem is still experiencing a downturn, there’s an absurd amount of activity among French startups at the early stage with new AI startups getting founded at a rapid pace and VC firms fighting for the most competitive funding rounds.
Tech Giants
From phones to Wi-Fi routers to smart home devices and lots more, Google pretty much does it all. And right now, one of its biggest competitors is offering a chance to snag some top Google gear at a bargain. Amazon is currently offering up to 33% off on a variety of different Google devices, including some of our favorites on the market like the Chromecast with Google TV media streamer and the Pixel 6 Pro. There's not a set expiration on these deals, but given how popular some of these devices are, we wouldn't expect them to last for long. We'd recommend acting sooner rather than later if you're hoping to snag one of these items at a discount.There are a few different devices discounted at this sale, so no matter what you're looking for, there's a chance you'll be able to find it for less here. If you're in the market for a new smartphone, you can't do much better than the Pixel 6 Pro. It was named one of our favorites of the year, and this is a rare chance to grab an unlocked model at a discount with no strings attached. You can pick up the 128GB model for $796, or the 256GB model for $899, roughly $100 off the usual price. And speaking of favorites, this is also a chance to grab a Chromecast with Google TV on sale for $40, $10 off the usual price and tying the lowest price we've seen. This streaming device was a close runner-up to our favorite of the year, and features a voice remote, supports 4K content and allows you to cast directly from your phone or laptop.Or, if you're trying to make your home just a little smarter, you could grab this Nest smart thermostat on sale for $100, a discount of $30. It allows you to adjust your home's temperature from anywhere, monitors your HVAC system to alert you of any problems and will automatically turn down the temperatures when you're not home to help save you money on utilities.
Tech Giants
An influential industry group that represents Google, Meta and Amazon among other tech firms has expressed concerns about the digital competition law recommended by an Indian parliamentary panel that seeks to regulate their alleged anticompetitive practices, calling the proposal “absolutist and regressive” in nature in the latest escalation of tension between U.S. tech giants and New Delhi. The Parliamentary Standing Committee on Finance recommended last month that the government enact a digital competition act to regulate anticompetitive business practices by Big Tech companies on its platforms, prohibiting them from preferentially promoting their in-house brands or not supporting third-party systems. The competition act, the panel said, “will be a boon not only for our country and its nascent startup economy but also for the entire world.” Industry group Asia Internet Coalition said in a statement that the proposed digital competition law may hurt digital innovation in India and could impact the investments by businesses in India and have “disproportionate costs” to consumers in the South Asian market. “The report put forward by the committee is prescriptive, absolutist and regressive in nature,” it added. The Indian panel said last month that its recommendation was systemically important to counter monopoly and warned that tech giants “must not favour its own offers over the offers of its competitors” when acting as mediators to supply and sales markets. The parliamentary panel’s recommendation cites the EU’s proposed Digital Markets Act and the U.S.’s American Innovation and Choice Online Act and the Open App Market Act. The industry group AIC said that both AICOA and OAMA have “failed to attain bipartisan support due to substantive disagreements and concerns for unintended consequences on consumers, growth, and innovation. In sum, there is no consensus that a DMA-style ex ante legislation is the way forward for addressing potential competition concerns in the digital space,” it said in the statement. India is the world’s second largest internet market and has attracted over $75 billion in investment from firms including Google, Meta, Amazon and investment shops Sequoia, Lightspeed, SoftBank and Tiger Global in the past decade. New Delhi has enforced and proposed a number of policy changes in the past three years to bring more accountability and fairness in how the tech firms operate in the country in moves that have rattled many U.S. giants. New Delhi is entering 2023 with several more such policy changes, including a telecom law that would tighten the government’s grip on internet firms. “We urge the government to first observe whether these overseas regulatory developments bring about benefits that outweigh costs. Specifically, it is important to note that the government has recently proposed two significant bills, i.e the Digital Personal Data Protection Bill and the Competition Amendment Bill (CAB), both of which seek to protect consumers, preserve competition and promote tech innovation, with a special focus on digital markets,” said Asia Internet Coalition. “Accordingly, it is critical to first understand the effects of these two bills on the digital ecosystem before introducing any new legislative proposals.” Google chief executive Sundar Pichai said last month that India was going through an important period of time as it drafts several key regulations and asserted that it stands to benefit from open and connected internet.
Tech Giants
Intel has announced an intriguing new app called Unison, which aims to “seamlessly” connect Intel-powered computers to smartphones — not just Android phones but iOS devices as well. Following what Intel says is a “simple pairing process,” the Unison app will allow PCs to replicate four key features of the connected phone. They can answer and make calls; they can share photos and files (pictures taken with the phone will show up in a specific Unison gallery on the PC); they can send and receive texts; and they can receive (and, in some cases, respond to) notifications that the phone receives — though if Unison is closed, they’ll go to the Windows notification center.“The advantage we can bring to a PC user that’s got a well-designed Windows PC is not having to choose their device based on the PC they have. They have an iPhone, they have an Android phone, any device they want to use will be able to connect with this capability,” Josh Newman, Intel’s VP of mobile innovation, told The Verge. “When you’re ... on your laptop, and you get notifications or texts on your phone, you can keep it in your bag and get right back into the flow of your work.”iOS users, Newman says, may see “subtle differences” from the experience of Android owners using Unison, but most of the core capabilities will be the same. Mainly, Newman says, iPhone users won’t have access to some more advanced messaging features, including full multiparty messaging, while Android users will. The amount Unison users can do with certain notifications from third-party apps may also vary based on the way the iOS and Android versions of those apps behave.Here’s what it looks like in action. Image: IntelUnison will have a fairly limited release at the start, launching on “select Intel Evo laptops” with 12th Gen processors from Acer, HP, and Lenovo this year. Intel plans to expand the feature to “a much broader range” of 13th Gen designs next year, Newman says.Some manufacturers, such as Samsung, already have features that can create a fairly seamless experience between their own PCs and mobile devices. But this still seems to be an exciting development for Intel, which has struggled to compete with Apple’s and AMD’s chips in a number of categories recently (and, of course, has been cut out of Apple’s computers entirely). A big benefit of the MacBook to iPhone users has traditionally been the interconnectedness of the devices. The ability to receive texts and reminders on a MacBook can be hugely convenient for an iOS user. Unison could eat into that advantage by allowing iPhone owners (as well as Android owners who aren’t all-in on one manufacturer) to access some version of those benefits on an Intel-powered Windows computer.
Tech Giants
Meta has made good on its threat to block news via Facebook and Instagram in Canada. Starting Tuesday, Aug. 1, Meta is ending the availability of news for Facebook and Instagram users in Canada. Meta's decision to block news-related content for Canadian users is in response to the Online News Act, which was passed by Canada's Parliament in June 2023. Following in the footsteps of similar laws proposed in Australia and California, the Online News Act (Bill C-18) "ensures fair revenue sharing between digital platforms and news outlets." In other words, Canada's government wants tech giants like Meta and Google to pay Canadian news outlets for driving valuable traffic and profiting from posts published on their sites. Local newsrooms in particular have been greatly impacted by social media's disruption of the traditional news distribution model. In response, Meta says, the legislation "is based on the incorrect premise that Meta benefits unfairly from news content shared on our platforms, when the reverse is true." Meta had been threatening to block news in Canada instead of engaging with Canadian lawmakers and has instead decided to comply with the law by removing access to news on its platforms altogether. Canadian journalists and news outlets have already begun reporting on the effects of Meta's decision. Local newsrooms that were already vulnerable to the whims of Meta's publishing policies now have zero visibility on its platforms. "This fight with Meta is making that harder and harder. Our livelihoods are at stake," Tweeted Christopher Curtis, co-founder of a newsletter called The Rover. The accounts from Cult MTL and indigenous writer Anna Mary McKenzie also tweeted about their content being blocked. Tweet may have been deleted Tweet may have been deleted
Tech Giants
A logo of Meta Platforms Inc. is seen at its booth, at the Viva Technology conference dedicated to innovation and startups, at Porte de Versailles exhibition center in Paris, France June 17, 2022. REUTERS/Benoit TessierRegister now for FREE unlimited access to Reuters.comCompaniesNEW YORK, June 21 (Reuters) - The United States and Facebook owner Meta Platforms Inc have settled a lawsuit over a housing advertising system that illegally discriminated against users based on race and other characteristics, the Department of Justice said on Tuesday.In a lawsuit filed in federal court in Manhattan, the Department of Justice (DOJ) said Meta encouraged advertisers to target users based on features like race, religion, and sex, in violation of the Federal Housing Act. That law prohibits discrimination in housing based on such characteristics.Meta denied wrongdoing, but agreed to pay a $115,054 civil penalty, the highest allowed under the law. Complaints over ads-based discrimination have dogged the company since 2016, and the company has reached settlements with Washington state and rights groups over similar allegations.Register now for FREE unlimited access to Reuters.comAs part of the deal, the company agreed to stop using an algorithmic tool known as "Special Ad Audience" and design a new housing advertising tool by the end of the year."Because of this ground-breaking lawsuit, Meta will — for the first time — change its ad delivery system to address algorithmic discrimination," Damian Williams, the U.S. Attorney for Manhattan, said in a statement.Meta said it would also use the new system for advertisements related to jobs and credit."Discrimination in housing, employment and credit is a deep-rooted problem with a long history in the U.S., and we are committed to broadening opportunities for marginalized communities in these spaces and others," the company said in a statement.The case stems from a 2019 civil charge filed by the U.S. Department of Housing and Urban Development.The DOJ said Facebook made some changes as part of its 2019 settlement with rights groups, but said that deal did not address the delivery of ads through machine-learning algorithms.The settlement reached on Tuesday is subject to review by a judge.Register now for FREE unlimited access to Reuters.comReporting by Jonathan Stempel and Luc Cohen in New York Editing by Jonathan Oatis, Mark Potter and Nick ZieminskiOur Standards: The Thomson Reuters Trust Principles.
Tech Giants
The company formerly known as Facebook is going to spend $10 billion this year on research and development on virtual reality and augmented reality technologies, including computerized glasses or headsets.On Monday, Meta CEO Mark Zuckerberg showed off how much progress the social media company has made towards that goal by revealing many of the unfinished headset prototypes the company has built in its labs.Zuckerberg has bet the future of the social networking company he founded on virtual reality, which immerses users in a computer-generated world, and augmented reality, which superimposes computer-generated objects over the real world. Last year, the company changed its name to Meta emphasize the company's new emphasis on the metaverse, a virtual world where Zuckerberg imagines people will spend increasing amounts of time — ideally, through advanced computerized glasses.If Zuckerberg succeeds in making head-worn computers mainstream, then Meta would have a new revenue stream of hardware sales, and it would control its own hardware platform, which would make it less susceptible to platform changes from other companies. For instance, on its last earnings call, Meta said that recent privacy changes Apple made to the iPhone could cost it $10 billion in foregone revenue this year, as it hampers the company's ability to target ads to precise audiences.The VR market is currently small and there are questions about how big it could get. Meta currently dominates headset sales, with its current $299 Quest 2 accounting 78% of all headset sales in 2021, according to an estimate from IDC. But there were only 11.2 million VR headsets sold total during the year — a far smaller number than smartphones or PCs.Meanwhile, investors are skeptical about Meta's pivot away from its core business of ads and apps. The stock has fallen over 53% so far 2022 on fears of growing expenses, light growth forecasts, increased competition from TikTok, and effects from Apple's iPhone privacy change that hampered mobile ads.Monday's demonstration did little to calm those fears — Meta's stock was down more than 4% in late-day trading Tuesday, despite a broader rally in tech stocks. (U.S. markets were closed Monday for the Juneteenth holiday observation.)What Zuckerberg showedMeta is developing next-generation virtual reality displays designed to provide a realistic enough experience for users to feel like they're in the same room with other virtual people, Zuckerberg said during his demonstration. Current displays have low resolution, display distortion artifacts, and can't be worn for long periods of time."It's not going to be that long before we can create scenes in perfect fidelity," Zuckerberg said on a call with media about the company's virtual reality efforts. "Only instead of looking at them on a screen, you'll feel like you're there.""The issue today is that the vividness of screens that we have now compared to what your eye sees in the physical world is off by an order of magnitude or more," Zuckerberg said.For the past few years Meta has regularly shown its progress working on virtual reality headsets and augmented reality glasses to partners and the press, to encourage investors to regard the project as worthwhile, and to help recruit highly-paid developers and executives with experience in VR and AR.In these roundtable presentations, Meta regularly shows off unfinished prototypes for use in research, which is unusual in consumer electronics. Gadget companies like to complete products and figure out how they are going to be manufactured before talking about them with the press. For example, Apple, which is working on headsets of its own, never shows off prototypes."These prototypes, they're custom and bespoke models that we built in our lab, so they're not products that are ready to ship," Zuckerberg said.Here were the prototypes he showed:Butterscotch. Butterscotch is designed to test higher-resolution displays that have pixels small enough so that the human eye can't tell them apart. Butterscotch has a new lens Meta developed that limits the headset's field of view, making it possible to present fine text and display increased realism.However, Meta says the prototype was "nowhere near shippable" because of how heavy and bulky it is — plus, the prototype still has exposed circuit boards.Half Dome 3. Meta has been working on Half Dome headsets since at least 2017 in order to test a kind of display that can shift how far away the focus point of the headset's optics is. With Half Dome's technology, Meta says, the resolution and image quality could improve enough for users to create giant computer monitors inside a headset to work on. The newest version, 3, replaces mechanical parts with liquid crystal lenses.Holocake 2. Meta says this is the thinnest and lightest VR headset it's made and that it's fully capable of running any VR software if it's hooked up to a PC. However, it requires specialized lasers that are too expensive for consumer use and require additional safety precautions."In most VR headsets, the lenses are pretty thick and they have to be positioned a few inches from the display so they can properly focus and direct light directly into your eyes," Zuckerberg said. In Holocake 2, Meta uses a flat, holographic lens to reduce bulk (in addition to the lasers.)Starburst. Starburst is a research prototype focusing on high-dynamic range displays which are brighter and show a wider range of colors. Meta says that HDR is the single technology that's most linked to additional realism and depth."The goal of all this work is to identify which technical paths are going to allow us to meaningfully improve in ways that start to approach the visual realism that we need," Zuckerberg said.Mirror Lake. Meta also showed off a concept design called Mirror Lake for a ski-goggle style headset. Mirror Lake is designed to combine all the different Meta headset technologies it's developing into a single, next-generation display."The Mirror Lake concept is promising, but right now it's only a concept with no fully functional headset yet built to conclusively prove out the architecture," Meta Reality Labs chief scientist Michael Abrash said. "But if it does pan out, it will be a game changer for the VR visual experience."
Tech Giants
India Seeks To Relax Data Storage Rules In Boost For Business India plans to further relax its approach to data storage, processing and transfer beyond its borders, a boon for global companies such as Alphabet Inc.’s Google as well as Indian firms seeking growth abroad. (Bloomberg) -- India plans to further relax its approach to data storage, processing and transfer beyond its borders, a boon for global companies such as Alphabet Inc.’s Google as well as Indian firms seeking growth abroad. A draft version of a new privacy bill allows companies to export data to any country except those specifically named by New Delhi, people familiar with the matter said, asking not to be named as the bill isn’t yet public. A previous draft released publicly in November, conversely, restricted the export of data to all regions except those named by the government. India, like governments around the world, is trying to balance the needs of business with individuals’ rights to data privacy. With its population of 1.4 billion, the country is an attractive growth market for global internet giants, but corporations are regularly clashing with authorities focused on protecting consumers’ interests and aiding home-grown enterprises. The Digital Personal Data Protection Bill 2023 requires companies to get consent before collecting personal data and prevents them from using it for any purposes other than those mentioned in the contract between the parties, the people said. That means companies can’t anonymize personal data and use it for products such as artificial intelligence models, they said. The bill grants sector-specific regulators, such as the central bank, a wider say over data rules for the industries they oversee. It lets companies doing mergers, acquisitions or spinoffs to export and store data where necessary. India’s technology ministry didn’t respond to a request for comment. The amended bill was approved by Prime Minister Narendra Modi’s cabinet this month, and it is slated to be presented for parliament approval in a session that begins July 20. The proposed legislation comes as digitization thrives in the world’s most-populous nation, thanks to a surge in the use of smartphones and mobile apps. India’s privacy push, which has been years in the making, aligns with similar actions by other countries. Other key aspects of the bill — such as the setting up of a Data Protection Board of India to determine non-compliance and impose penalties for breaches, and the requirement for companies such as Amazon.com Inc. and Meta Platforms Inc. to appoint India-based data protection officers — remain unchanged from the previous drafts. An order of the Data Protection Board can be challenged in an appellate tribunal and then a high court. More stories like this are available on bloomberg.com ©2023 Bloomberg L.P.
Tech Giants
If you thought folding phones and four-legged robots were futuristic, just wait to see what tech giants have in store for the near future. DailyMail.com has looked at 12 of the most futuristic patents taken out by companies like Apple, Amazon and Google in recent years. A patent is a government license that gives the holder exclusive rights to a new invention for a designated period of time. They don't always make it to the production line, but they can indicate what companies are working on. A 2017 Apple patent showed off a hybrid device that resembled a Mac laptop into which users can 'dock' an iPhone. The patent describes, 'An electronic accessory device, comprising: an operational component that provides an output to a user; a housing carrying the operational component, the housing having a recess.' It is unclear how this will work, but the laptop will appear to be a display for the phone. This would allow someone to use the bigger screen and full keyboard to play games or write notes on their phone. No such device has ever been released. One day, could huge fulfillment centers float over cities, with Amazon drones darting down to the surface with deliveries? Amazon takes the idea seriously enough that it patented the idea of 'aerial fulfillment centers' (or AFCs) in 2018. The patent says, 'An AFC may be positioned at an altitude above a metropolitan area and be designed to maintain an inventory of items that may be purchased by a user and delivered to the user by a UAV deployed from the AFC.' In short, it will be a floating warehouse above the ground and attached to a blimp. When you order a package, a drone will grab it from the blimp instead of being delivered by a truck and bring it down to your door. In 2021, Facebook, now Meta, patented the idea of an 'artificial reality hat,' where lenses containing virtual or augmented reality screens could be mounted on a baseball cap or other headwear. The cap is a standard baseball cap with goggles attached to it. They will allow a person to view the world through augmented reality. The device also serves as just a normal hat, as the glasses can be tucked into its brim. It might sound silly, but the idea is to reduce the amount of weight on the user's nose compared to standard AR and VR glasses. Meta has emerged as one of the leaders in this space, purchasing VR leader Oculus in 2014 and investing substantially into the Metaverse last year. The car of the future might have no glass at all if one 2022 Apple patent is anything to go by. Instead, passengers in the car would look 'through' the car's solid body via VR headsets, seeing views generated by cameras. The patent says, ''The VR system may provide virtual views that match visual cues with the physical motions that a passenger experiences. Passengers could also enjoy high-quality VR experiences while driving - some of them controlled by the car's own controls. The patent says, 'Active vehicle systems and/or vehicle control systems may be integrated with the VR system to provide physical effects with the virtual experiences. Imagine if your keyboard could detect your emotion from how you are typing (force, speed and so on) and add emojis and formatting to reflect that. A 2017 Facebook patent, 'Augmenting Text Messages With Emotion Information,' does just that, adding emotion information based on input. The idea is that messages can be more communicative - and avoid misinterpretation. It will adjust messages to display the correct emotion someone is hoping to portray properly. It is unclear how this will work, though. Google is building a walking stick that can record an entire 360 look around a person as they walk. It is similar to what the firm already uses to catalog remote areas of the world where driving is not feasible. They attach a camera on a pole to someone's back and wander around, catching imagery as they move. It is unclear how similar the consumer version of the product will be to the You might be forgiven for thinking that Google had completely lost the plot with a 2013 patent for a camera walking stick - but similar devices are used in remote areas for Google Street View. Could those trademark brown packages one day appear in your backyard, having traveled to your house via an underground tunnel? Amazon patented the idea of a delivery system that could deliver packages underground via rails or even pneumatic tubes back in 2018. The invention would use underground tunnels and conveyer belts to carry packages directly to someone's home. It is unclear how it will get from below ground to their front door as the retail giant continues to work out some of the kinks. It is also unknown whether this underground network will work with the company's plans to put fulfillment centers in the sky. Most people are happy to wear earpieces from the 'Big Tech' companies - but would you get a tattoo on your body? A 2013 Google patent describes a 'tattoo' device that users can stick to their throats to communicate with their devices. The patent says the device 'comprises an electronic skin tattoo capable of being applied to a throat region of a body.' The data the device on the neck would want to gather and send to the phone is unknown. But similar arm patches and other devices are used to communicate information on blood sugar for diabetics so that this technology could be health use. A 2021 patent by Apple suggests iPhone users could one day wear screen-unscrambling 'privacy goggles' so that nearby people can't read what's on screen. The patent says, 'If a user desires privacy or doesn't want a nearby person to view what is presented on the display, the user may interact with the calibration graphic to make the graphical output illegible. A person wearing the glasses would be the only one able to see what is happening on the computer screen. It is unclear what kind of technology would be used and how the glasses would be built to decode it specifically. Apple's idea for preventing the recording of concerts One 2016 Apple patent describes a system using infrared signals to prevent iPhone users from lifting up their handsets to record gigs. As anyone who has been to a gig in recent years can attest, the system has never been commercialized. But, it would force people to put away their phones during concerts and prevent the wave of recording devices from dominating a crowd. It would be valuable for comedy and stage shows too, which already ban phones but may have a hard time making sure they confiscate each device at the door. Most of us want to stop pesky scratching noises as soon as possible. But Apple has patented a device that they say could actually be controlled by the sound of scratching or tapping. Patented in 2013, the document describes how the noises could be used to control the futuristic gadget. It is named the 'Electronic Device Housing as Acoustic Input device'. Developers have previously tried to make other devices that could be controlled via scratching, including glasses under development in 2017 that would let you read texts when you scratch your nose. As if land-based data centers aren't enough, Google has secured the rights to one that can float. Patented in 2007, the system includes a 'floating platform-mounted' data center that could hold many 'computing units'. It also contains plans for a 'sea-based electrical generator' to power the facility and one or more units using seawater to cool the machines. A computer data center is a facility that houses an organization's core IT and computing services and infrastructure. Google currently has at least five data centers based in Pryor in Oklahoma, Lenoir in North Carolina, The Dalles in Oregon, Council Bluff in Iowa and Berkely in South Carolina. Its biggest, in Pryor, is also believed to be the second-biggest data center in the world and measures about 980,000 square feet — or is about the same size as 17 American football fields.
Tech Giants
WASHINGTON (AP) — The Justice Department and eight states filed an antitrust suit against Google on Tuesday, seeking to shatter its alleged monopoly on the entire ecosystem of online advertising as a hurtful burden to advertisers, consumers and even the U.S. government. Watch the announcement in the player above. The government alleges that Google’s plan to assert dominance has been to “neutralize or eliminate” rivals through acquisitions and to force advertisers to use its products by making it difficult to use competitors’ products. The antitrust suit was filed in federal court in Alexandria, Virginia. Attorney General Merrick Garland said in a press conference Tuesday that “for 15 years, Google has pursued a course of anti-competitive conduct” that has halted the rise of rival technologies and manipulated the mechanics of online ad auctions to force advertisers and publishers to use its tools. In so doing, he added, “Google has engaged in exclusionary conduct” that has “severely weakened,” if not destroyed, competition in the ad tech industry. “First, Google controls the technology used by nearly every major website publisher to offer advertising space for sale. Second, Google controls the leading tool used by advertisers to buy that advertising space. And third, Google controls the largest ad exchange that matches publishers and advertisers together each time that ad space is sold,” Garland said. As a result, he added, “website creators earn less and advertisers pay more.” And this means fewer publishers can offer their content without subscriptions, paywalls and other fees to make up for revenue. The department’s suit accuses Google of unlawfully monopolizing the way ads are served online by excluding competitors. This includes its 2008 acquisition of DoubleClick, a dominant ad server, and subsequent rollout of technology that locks in the split-second bidding process for ads that get served on web pages. READ MORE: Google settles charges of user location-tracking for $391.5 million Google’s ad manager lets large publishers who have significant direct sales manage their advertisements. The ad exchange, meanwhile, is a real-time marketplace to buy and sell online display ads. The lawsuit demands that Google break off three different businesses from its core business of search, YouTube and other products such as Gmail: the buying and selling of ads and ownership of the exchange where that business is transacted. Alphabet Inc., Google’s parent company, said in a statement that the suit “doubles down on a flawed argument that would slow innovation, raise advertising fees, and make it harder for thousands of small businesses and publishers to grow.” An internet services trade group that includes Google as a member described the lawsuit and its “radical structural remedies” as unjustified. Matt Schruers, president of the Computer & Communications Industry Association, said competition for advertising is fierce and the “governments’ contention that digital ads aren’t in competition with print, broadcast, and outdoor advertising defies reason.” Dina Srinivasan, a Yale University fellow and adtech expert, said the lawsuit is “huge” because it aligns the entire nation — state and federal governments — in a bipartisan legal offensive against Google. The current online ad market, Srinivasan said, “is broken and totally inefficient.” The fact that intermediaries are getting 30 percent to 50 percent of the take on each ad trade is “an insane inefficiency to have baked into the U.S. economy.” She called it “a massive tax on the free internet and consumers at large. It directly affects the viability of a free press” as well. EXPLAINER: How many tech industry jobs have been cut in the past few months? As with many highly complex technical markets, it has taken time for federal and state regulators and policymakers to catch up with and understand the online ad market. Srinivasan noted that it took a decade before they woke up to the perils of high-speed trading in financial markets and began adopting measures to discourage it. Google held nearly 29 percent of the U.S. digital advertising market — which includes all the ads people see on computers. phones, tablets and other internet-connected devices — in 2022, according to research firm Insider Intelligence. Facebook parent company Meta is second, commanding nearly 20 percent of the market. Amazon is a distant, but growing, third at more than 11 percent. Insider is estimating that both Google and Meta’s share of the ad market will decline, while rivals such as Amazon and TikTok are expected to see gains. This is the latest legal action taken against Google by either the Justice Department or local state governments. In October 2020, for instance, the Trump administration and 11 state attorneys general sued Google for violating antitrust laws, alleging anticompetitive practices in the search and search advertising markets. Asked why the Justice Department would bring the suit when a similar complaint has already been filed by states, Assistant Attorney General Jonathan Kanter, the department’s top antitrust official, said, “We conducted our own investigation, and that investigation occurred over many years.” He said the Justice Department lawsuit, totaling roughly 150 pages, details “many facts, many episodes that individually and in the aggregate” reveal numerous monopolies. Tuesday’s lawsuit in essence aligns the Biden administration and new states with the 35 states and District of Colombia that sued Google in December 2020 over the exact same issues. The states taking part in the suit include California, Virginia, Connecticut, Colorado, New Jersey, New York, Rhode Island and Tennessee. AP Technology Writer Ortutay reported from San Francisco. AP Technology Writers Frank Bajak and Matt O’Brien contributed.
Tech Giants
Elon Musk To Join Rishi Sunak To Discuss AI Risks After U.K. Summit Rishi Sunak plans to hold a live-streamed conversation with Elon Musk after his AI summit wraps up Thursday, lending some star power to an event that the British prime minister hopes could shape regulation of the emerging technology. (Bloomberg) -- Rishi Sunak plans to hold a live-streamed conversation with Elon Musk after his AI summit wraps up Thursday, lending some star power to an event that the British prime minister hopes could shape regulation of the emerging technology. Sunak on Monday announced the discussion with Musk on the billionaire’s social media platform, X. The prime minister’s aides touted the event as evidence that the summit planned for Wednesday and Thursday at the hub of Britain’s World War II code breakers was gaining traction. Three UK government officials said they also expect Musk to attend the summit at Bletchley Park, although Musk hasn’t publicly confirmed his attendance. Neither Musk nor representatives for X and Tesla Inc., where Musk is chief executive, responded to requests for comment. Musk, the world’s richest man and owner of social media platform X, formerly known as Twitter, started engaging with the UK in the last few days, the people said, asking not to be named because the discussions were private. His attendance would add some celebrity to the summit, which Sunak hoped would attract leaders of the world’s biggest powers, as well as top tech executives. World leaders expected to attend include Italian Prime Minister Giorgia Meloni and US Vice President Kamala Harris. Sunak called the summit in an effort to begin charting an international approach to regulating AI in order to protect against some of its worst potential uses, including the rigging of elections, enabling terrorists to spread destruction and making it easier to build chemical and biological weapons. In a speech on Thursday, Sunak also warned of an “unlikely” existential threat if humanity loses control of the technology. In July, Musk founded xAI, an artificial intelligence company separate to his other companies but that plans to work together with them, according to its website. He was involved in the creation of OpenAI, the highest-profile AI startup and developer of ChatGPT, but since leaving the board in 2018 he has criticized that company, especially after it created a for-profit arm the following year. In September, he said it’s important for AI to have a “referee” at a meeting in Washington. In March, he was one of hundreds of tech leaders to call for a pause on the technology’s development. Microsoft Corp.’s Brad Smith, former UK Deputy Prime Minister Nick Clegg, now president of global affairs at Meta Platforms Inc., and James Manyika and Demis Hassabis, from Alphabet Inc.’s Google and DeepMind Technologies Ltd. are likely to be among some 100 people from 28 nations attending the summit. --With assistance from Dana Hull. More stories like this are available on bloomberg.com ©2023 Bloomberg L.P.
Tech Giants
Microsoft Threatens Data Restrictions In Rival AI Search Microsoft has told at least two customers that using its Bing search index to feed their AI chat tools violates terms of contract. (Bloomberg) -- Microsoft Corp. has threatened to cut off access to its internet-search data, which it licenses to rival search engines, if they don’t stop using it as the basis for their own artificial intelligence chat products, according to people familiar with the dispute. The software maker licenses the data in its Bing search index — a map of the internet that can be quickly scanned in real time — to other companies that offer web search, such as Apollo Global Management Inc.’s Yahoo and DuckDuckGo. In February, Microsoft integrated a cousin of ChatGPT, OpenAI’s AI-powered chat technology, into Bing. Rivals quickly moved to roll out their own AI chatbots as hype built around the buzzy technology. This week, Alphabet Inc.’s Google publicly released Bard, its conversational AI product. DuckDuckGo, a search engine that emphasizes privacy, introduced DuckAssist, a feature that uses artificial intelligence to summarize answers to search queries. You.com and Neeva Inc. — two newer search engines that debuted in 2021 — have also debuted AI-fueled search services, YouChat and NeevaAI. These search chatbots aim to combine the conversational skills of ChatGPT with the information provided by a conventional search engine. DuckDuckGo, You.com and Neeva’s regular search engines all use Bing to provide some of their information, because indexing the entire web is costly — it requires servers to store data and a constant crawl of the internet to incorporate updates. It would be similarly complex and pricey to get together that data for a search chatbot. Microsoft has told at least two customers that using its Bing search index to feed their AI chat tools violates the terms of their contract, according to the people, who spoke anonymously because they were discussing a confidential dispute. The Redmond, Washington-based technology company said it may terminate the licenses providing access to its search index, the people said. “We’ve been in touch with partners who are out of compliance as we continue to consistently enforce our terms across the board,” Microsoft said in a statement. “We’ll continue to work with them directly and provide any information needed to find a path forward.” If they were cut off from Microsoft’s index, smaller search engines would have a hard time finding an alternative. Microsoft and Google are the only two companies that index the entire web, and Google’s limitations on the use of its index have led nearly all other search engines to use Bing. (Updates with Microsoft comment, in sixth paragraph.) More stories like this are available on bloomberg.com ©2023 Bloomberg L.P.
Tech Giants
(Bloomberg) -- China imposed more than $1 billion in fines on tech giants Ant Group Co. and Tencent Holdings Ltd., signalling an end to a crackdown on the sector that had wiped out billions in market value and derailed the world’s biggest initial public offering. Most Read from Bloomberg The People’s Bank of China said financial regulators fined Ant 7.12 billion yuan ($984 million), wrapping up more than two years of probes into the finance technology firm founded by billionaire Jack Ma. Tencent was levied a 2.99 billion yuan fine, according to statements from the central bank Friday. Shares in Ant affiliate Alibaba Group Holding Ltd. soared more than 6% in New York trading. Investors are betting the fines draw a line under the multi-year crackdown that torpedoed Ant’s planned IPO in 2020 and ensnared some of the nation’s most powerful private firms in sectors from online education to gaming. It paves the way for Ant to revive growth and eventually resurrect plans for an IPO. “The market likes it because scrutiny looks likely to be over and the fine, though big in absolute terms, is very manageable for such a big company,” said Vey-Sern Ling, managing director at Union Bancaire Privee, referring to Ant. The levy is less than the 9.6 billion yuan profit that Ant generated in the December quarter. The People’s Bank of China said fines were imposed on Ant Group and its subsidiaries in response to violations of laws and regulations in areas including financial consumer protection, payment and settlement business and anti-money laundering obligations. Ant said it has completed the rectification required by China’s financial regulators, according to a company statement. Strong Signal A meaningful relaxation of curbs on Ant — one of the most high-profile casualties of President Xi Jinping’s sweeping clampdown on the country’s tech giants — would send a strong signal that policymakers are following through on recent pledges to support the industry. The Communist Party’s evolving stance toward the private sector has become one of the most closely watched developments in global markets in recent years, with some observers even calling China’s sprawling internet sector uninvestable. “The decision addresses market concerns about fintech and the overall Internet sector,” Jefferies analysts including Thomas Chong said in a note. They said it “removes overhang” on Alibaba’s shares. Most of the key problems in financial platform enterprises such as Ant Group and Tencent have been rectified, the central bank said in the statement. Ant’s bottom line has eroded since the days it was preparing for the world’s largest IPO in 2020, while its affiliate Alibaba is in the process of splitting into six main businesses from cloud services to meal delivery and logistics. While investors initially cheered the potential creation of value, Alibaba’s shares have come off their 2023 highs and have shed more than $600 billion of their value since the Ant episode began. Fines were also issued to PICC Property & Casualty Co., Postal Savings Bank of China Co. and Ping An Bank Co. given the problems found in previous law enforcement inspections, according to the statement. It’s unclear why Tencent also received a fine. The WeChat operator’s executives have stressed repeatedly since 2022 that their financial businesses are in full compliance with the law, and that they’re in constant dialogue with Beijing. In a statement, Tencent said it sees no adverse impact from the fine, and that it expects China will focus on “normalized regulation” going forward. Ant co-founder Ma returned to China in early March after a prolonged period of traveling overseas. The government persuaded Ma to go back to the mainland as a means to showcase authorities’ support for private entrepreneurs, Bloomberg News had reported. The move follows Ma’s decision to cede control of Ant in January, holding about 6.2% voting rights after the change. Following that, the Communist Party chief of Hangzhou city praised Ant for abiding by the party’s leadership, and required local government departments to solve problems raised by the fintech company. Ant said in January it has no plans for an IPO now and is focusing on its business. Still, the company’s Chairman Eric Jing said in 2021 that it would eventually go public. More than two years ago, Chinese regulators abruptly halted Ant’s IPO, sending shock waves across global capital markets. New rules have been slapped on the fintech giant, which has operations ranging from consumer lending and wealth management to online payments. The central bank ordered Ant to fold all financial units into a holding company. It also told the firm to open up its payments app to competitors and sever improper linking of payments with other products including its lending services. Still, China’s latest measures don’t represent a return to low-regulation growth, said Martin Chorzempa, fellow at the Peterson Institute for International Economics. “Instead it is the permanent installation of a much higher regulatory barrier for this sector,” he said. “Authorities clearly have struggled to determine exactly what they want the financial technology space to look like and the role of big technology firms in it.” For Ant, it may take longer than anticipated to resume an IPO. Companies can’t list domestically on the country’s so-called A-share market if they have had a change in control in the past three years — or in the past two years if listing on Shanghai’s STAR market, which is geared toward new technology companies. For Hong Kong’s stock exchange, this waiting period is one year. Ant’s valuation will also look different if it were to go public again. While Ant fetched a valuation of $280 billion pre-IPO, the myriad regulations imposed over the past two-plus years mean it’s now worth a fraction of that, as it’s now more “fin” than “tech.” Ant could also spin out some of the businesses such as blockchain technology, its database operation known as OceanBase and global services, people familiar have said. Those deliberations are preliminary and could be subject to change. Ant Could be Valued at Only $22 Billion-$57 Billion: BI --With assistance from Evelyn Yu, Yiqin Shen and Tom Hancock. (Updates with comments in eighth paragraph) Most Read from Bloomberg Businessweek ©2023 Bloomberg L.P.
Tech Giants
- Australia's eSafety commissioner fined X, the social media platform formerly known as Twitter, 610,500 Australian dollars, or over $380,000, for failing to properly disclose information about how it is cracking down on child abuse content. - The commissioner's office also found "serious shortfalls" in how other tech giants like TikTok, Twitch and Discord police child exploitation content. - Elon Musk has publicly announced his commitment to addressing child abuse content, but internal reports have shown that he has cut safety jobs and watchdogs within the company. Australia's eSafety commissioner on Sunday fined X, the social media platform formerly known as Twitter, 610,500 Australian dollars, over $380,000 U.S., for failing to properly disclose information about how it polices child abuse content. "Twitter/X has stated publicly that tackling child sexual exploitation is the number 1 priority for the company, but it can't just be empty talk, we need to see words backed up with tangible action," Commissioner Julie Inman Grant said in a statement. X has 28 days to respond to or pay the eSafety office's fine. It's a relatively small price tag for the multibillion-dollar tech platform, but it represents another nail in the coffin for a company that has come under fire for its content moderation practices, especially after it was acquired and rebranded by Elon Musk. Australia issued the fine under its Online Safety Act, introduced in 2021. The legislation requires online service providers to report how they crack down on child abuse content on their platforms. Under that law, companies can face civil penalties for failing to meet that reporting requirement. In February, Australia's eSafety office sent a legal memo to X, which was at that point Twitter, along with other tech companies like Google, TikTok, Twitch and Discord. The notices had specific questions for the companies to answer about how they handle child exploitation content. According to the eSafety commissioner, X did not answer many of the questions and left "some sections entirely blank." X was not the only tech giant that the eSafety office took issue with. It said it found "serious shortfalls" in how child abuse content is policed on the five platforms it filed legal notices to. The office also noted that Google has been issued "a formal warning" for giving "generic responses to specific questions." However, X received an official fine because its failure to comply with Australia's reporting standards was more egregious, according to the commissioner. For example, the company did not provide information on how long it takes to respond to child abuse reports, how it detects child sexual exploitation on its platform and how many safety and public policy employees it has. In December 2022, NBC News and CNBC obtained internal records showing that about 25 employees held titles related to "Trust and Safety" out of roughly a total of 1,600 staff members who were still employed there at the time.
Tech Giants
The Apple logo is seen at an Apple Store in Brooklyn, New York, U.S. October 23, 2020. REUTERS/Brendan McDermid/File PhotoROME, Oct 3 (Reuters) - An Italian administrative court scrapped a fine imposed by the country's antitrust authority on U.S. tech giants Apple (AAPL.O) and Amazon (AMZN.O) for alleged collusion, a document showed on Monday.The antitrust authority had fined both companies a total of more than 200 million euros ($195.3 million) in 2021, citing alleged anti-competitive cooperation in the sale of Apple and Beats products. read more Earlier this year, the fine was reduced to an overall 173.3 million euros due to a "material error" in the first calculation. read more Register now for FREE unlimited access to Reuters.comAmazon said in a statement it welcomed the court's decision.The antitrust authority declined to comment, while Apple had no immediate comment.(This story refiles to remove superfluous word, no changes to text)($1 = 1.0242 euros)Register now for FREE unlimited access to Reuters.comReporting by Marco Carta and Elvira Pollina, writing by Federico Maccioni; editing by Agnieszka FlakOur Standards: The Thomson Reuters Trust Principles.
Tech Giants
Apple CEO Tim Cook poses for a portrait next to a line of new MacBook Airs as he enters the Steve Jobs Theater during the Apple Worldwide Developers Conference (WWDC) at the Apple Park campus in Cupertino, California on June 6, 2022 .Chris Tuite | AFP | Getty ImagesApple CEO Tim Cook recently gave the closest thing to a confirmation that Apple's building a headset.Cook was asked in a recent interview with China Daily USA what he thinks the key factors are for augmented reality, or AR, to succeed in the consumer market."I am incredibly excited about AR as you might know. And the critical thing to any technology, including AR, is putting humanity at the center of it," he said, echoing comments he's made in the past about how important AR is to the company. He then described Apple's work in the space so far, which has been focused on AR apps on the iPhone and iPad, before adding, "But I think we're still in the very early innings of how this technology will evolve. I couldn't be more excited about the opportunities we've seen in this space, and sort of stay tuned and you'll see what we have to offer."AR or "mixed reality" describes technology that superimposes computer-generated images over views of the real world, contrasted with virtual reality, or VR, which completely immerses the viewer in a computer-generated world. It's one of the clearest examples yet of Cook acknowledging that Apple has something bigger in the works. While the current apps can be useful for things like mapping a room or seeing if a new piece of furniture might fit, it seems more likely that Apple has been building the library and tools for developers to build apps for something like a headset.Bloomberg said in May that Apple recently showed its AR/VR headset to the Apple board and that the company plans to announce it as early as the end of this year, although it could slip into next year. The same report said Apple plans to sell the headset in 2023.Apple would be playing catch-up with a number of other big tech companies, particularly Meta, which changed its name from Facebook last year to signify its revamped focus on immersing users in virtual worlds known as the "metaverse," and Microsoft, which first introduced its Hololens AR glasses in 2016.
Tech Giants
Microsoft is holding an event on February 7th to “share some progress on a few exciting projects,” according to CEO Satya Nadella. The company is expected to announce its ChatGPT-powered version of Bing, which started appearing for some users last week. If it does, this may be the dawn of a new battle between AI chatbot-powered search engines; on Monday, Google announced Bard, an “experimental conversational AI service” meant to help you plan dinner based on the ingredients you have in your fridge or explain the latest scientific discoveries to a nine-year-old. We may also get to see other AI integrations into Microsoft products. Rumors have been circulating that Microsoft is looking into integrating OpenAI’s GPT tech into productivity apps like Word, PowerPoint, and Outlook, as it has with Teams Premium. Microsoft and OpenAI have a tight relationship at this point, with the tech giant investing billions in the AI research firm and giving it access to vast computing resources and Azure. The companies have previously collaborated on things like GitHub’s Copilot feature, which promises to be a superpowered autocomplete for code. OpenAI’s CEO Sam Altman has basically confirmed that he’ll be at the event. Microsoft is holding a surprise in-person event where it’s likely to demo a version of Bing with ChatGPT integrated and much more. After six years of peace, the two tech giants are on course to butt heads again over the future of artificial intelligence. - TIs that GPT-4 I can see? Microsoft is holding a special in-person event at its Redmond headquarters tomorrow, where it’s expected to announce a ChatGPT version of Bing. OpenAI powers ChatGPT and now CEO Sam Altman is posing for a selfie with Microsoft CEO Satya Nadella, confirming tomorrow is all about AI. With rumors of the unannounced GPT-4 powering Microsoft’s ChatGPT integration, it looks set to be an interesting day ahead. The Verge will be covering everything live as it happens. Microsoft is holding a special press event at its Redmond headquarters today, and it’s expected to focus primarily on its OpenAI partnership and ChatGPT for Bing.
Tech Giants
Microsoft is working to make your and your family’s online experience safer. Today the company is launching its new Defender security dashboard for 365 subscribers. Users on iPhone, Mac, Windows, and Android devices have access to the Microsoft Defender security app that utilizes existing antivirus software or other protections. Microsoft Defender is simplified online security that meets you and your family where you are by bringing multiple protections together into a single dashboard. It provides online protection across the devices you and your family use. It offers tips and recommendations to strengthen your protection further. And, as you grow your digital footprint by adding family members and devices, Defender grows with you and keeps your defenses up-to-date using trusted technology.   According to The Verge, Microsoft Defender’s features will vary by which platform. For instance, on iPhone and iPad, Microsoft Defender users won’t have antivirus protection. However, they’ll have some phishing protections alongside their dashboard that features alerts for their other devices. Additionally, the new app includes security alerts for your devices to ensure maximum protection. While not on iPhone, you can also view Microsoft Defender’s cybersecurity tips on your Mac or Windows computer. This is just the start. As we look forward, we will continue to bring more protections together under a single dashboard, including features like identity theft protection and secure online connection. Microsoft Defender is simplified online security that grows with you and your family to help keep you safe. Vasu Jakkal, Microsoft’s Corporate Vice President, Security, Compliance, Identity, and Management Since Microsoft Defender is included with a 365 subscription, will you try it out on your iPhone or Mac? Let us know your thoughts in the comments! FTC: We use income earning auto affiliate links. More. Check out 9to5Mac on YouTube for more Apple news: About the Author Allison McDaniel @aamcdani Allison is a News Writer at 9to5Mac covering Apple news and rumors. You can email her directly at allison@9to5mac.com or catch her on Twitter at @aamcdani Allison McDaniel's favorite gear
Tech Giants
Google can now decode the infamous 'doctor handwriting' to help people translate the unfathomable texts. The tech giants in India on Monday, announced that they are working with pharmacists to find ways to translate the handwritings of doctors. Doctor’s Prescriptions,The sloppy handwriting of doctors would be difficult to read for everyone. The solution to this issue is now possible thanks to Google. Google’s New Feature: You must have had an illness at some point or visited the doctor with friends or family. Have you ever considered reading the prescription that the doctor wrote? because it might be difficult to read terrible handwriting. The sad reality is that only pharmacists can read doctors’ handwriting today. But now it has a permanent treatment. The well-known company Google has announced the development of an AI that can understand prescriptions even when they are written in a doctor’s sloppy handwriting. This AI will be created specifically to read sloppy handwriting. This Google app will identify and highlight the medicines mentioned in the prescription. The company unveiled the feature during its “AI for India” event in Delhi. The feature is currently a research prototype and not available to the general public yet. Doctor’s Prescriptions Now read by Google , Know How To Use This New Feature Google announced as a part of an event in India this morning that the company is working on a new feature for Google Lens which is aimed at trying to decipher prescriptions written by doctors that are tough to read. The feature is being worked on with the help of pharmacists, Google said (via TechCrunch). A Google spokesperson has reached out to clarify that this feature is not set for a public launch just yet, and is being treated as a “research prototype.” Our coverage has been updated accordingly. If launched, the feature will allow users to use a picture of their written prescription (either taken directly in Google Lens or imported after the fact) and Lens will then process the image to detect medications on the note. The company said in a statement: This will act as an assistive technology for digitizing handwritten medical documents by augmenting the humans in the loop such as pharmacists, however no decision will be made solely based on the output provided by this technology The margin of error on medications is certainly abnormally high, so it will be rather interesting to see exactly how this feature comes to life. Google hasn’t confirmed a timeline for exactly when this functionality would arrive for the masses, but did offer a preview of the functionality on Twitter. Notably, too, Google mentioned at the event that India is home to the largest number of Google Lens users in the world. Why do doctors have bad handwriting skills? How it will work ? “This will act as an assistive technology for digitizing handwritten medical documents by augmenting the humans in the loop such as pharmacists, however no decision will be made solely based on the output provided by this technology,” the company said in a statement. At the event, Google has announced that it is also planning to introduce a Multisearch feature for Search. It will allow the users to take pictures or screenshots and put text to their query for easy searching. Google announced that the feature will be available in multiple Indian languages such as Hindi, Punjabi and more. The company also announced a new feature related to search at the Google for India event in New Delhi. Now, users will be able to look for specific moments within a YouTube video and it is currently being tested with the beta version. The Google for India’s annual event, the company shared that they are also working on a single unified model that would cover over 100 Indian regional languages for speech and text. This would empower users from their South Asian Market. Google hasn’t fixed any launch date for the new decipher feature and it remains in the prototype stage. Read few tips  Stay Tuned…
Tech Giants
OTTAWA, April 27 (Reuters) - Canada's Senate on Thursday passed the government's online streaming legislation after a 10-month debate over a law that will force firms like Netflix (NFLX.O) and Alphabet Inc-owned (GOOGL.O) YouTube to offer more Canadian content. Bill C-11, or the Online Streaming Act, cleared the unelected upper chamber of the Canadian parliament with 52 votes to 16 and one abstention. With the Senate's approval, the bill just needs royal assent from the governor general to become law. The legislation aims to bring the likes of Spotify (SPOT.N), Disney+ (DIS.N) and other online streaming platforms under the stewardship of broadcasting regulator CRTC, and hold them to the Canadian content requirements that apply to TV and Radio channels. It was proposed by Prime Minister Justin Trudeau's Liberal government last year, and passed in the lower house of the parliament in June, with support from the opposition New Democrats and Bloc Quebecois. The government says the legislation will ensure that online streaming services promote Canadian music and stories, and support Canadian jobs. Opponents, including Canada's main opposition Conservative party, have criticized the bill as an overreaching measure that would impact freedom of expression and choice on the internet. YouTube has said it does not oppose the bill in its entirety, but has raised concerns over its impact to user-generated content. The video platform says the law would force it to recommend Canadian content on its homepage, rather than videos tailored to a user's specific interests. Heritage Minister Pablo Rodriguez, who introduced the bill in February 2022, says the changes are meant for commercial programs streamed online and would not apply to individual content creators. Once it becomes a law, the CRTC will develop and implement regulations for both traditional and online broadcasting services. Our Standards: The Thomson Reuters Trust Principles.
Tech Giants
Microsoft on Thursday trumpeted its latest plans to put artificial intelligence into the hands of more users, answering a spate of unveilings this week by its rival Google with upgrades to its own widely used office software. The company previewed a new AI "copilot" for Microsoft 365, its product suite that includes Word documents, Excel spreadsheets, PowerPoint presentations and Outlook emails. Going forward, AI can offer a first draft in Microsoft's applications, speeding up content creation and freeing up workers' time, the company said. "We believe this next generation of AI will unlock a new wave of productivity growth," Satya Nadella, Microsoft's chief executive, said in a livestreamed presentation. This week's drumbeat of news including new funding for AI startup Adept reflects how companies large and small are locked in a fierce competition to deploy software that could reshape how people work. At the center are Microsoft and Google-owner Alphabet Inc, which on Tuesday touted AI features for Gmail and a "magic wand" to draft prose in its own word processor. The frenzy to invest in and build new products began with the launch last year of ChatGPT, from the Microsoft-backed startup OpenAI. Chatbot showed the potential of so-called large language models, technology that learns from past data how to create content anew. It is rapidly evolving. Just this week, OpenAI began the release of a more powerful version known as GPT-4.
Tech Giants
Register now for FREE unlimited access to Reuters.comCompaniesSAN FRANCISCO, Sept 14 (Reuters) - California filed a lawsuit against Amazon.com (AMZN.O) on Wednesday, alleging that the company violated antitrust law by blocking price competition and pushing up prices for consumers.California Attorney General Rob Bonta said Amazon's rules bar merchants from selling products at lower prices on their own websites or at the stores of Amazon's rivals."Through its actions, the everything store has effectively set a price floor, costing Californians more for pretty much everything," Bonta said.Register now for FREE unlimited access to Reuters.comThe lawsuit was filed in San Francisco Superior Court.Amazon said in response to the filing that consumers could see higher prices if the lawsuit succeeds. The company has the "right not to highlight offers to customers that are not priced competitively," it said. "The relief the (attorney general) seeks would force Amazon to feature higher prices to customers, oddly going against core objectives of antitrust law."California Attorney General Rob Bonta, at lectern and flanked by staff, announces an antitrust lawsuit against Amazon.com Inc during a news conference in San Francisco, California, U.S. September 14, 2022. REUTERS/Paresh DaveThe company is the world's largest online retailer and grew even bigger during the pandemic. Over 200 million users are Prime members, paying for faster shipping and other benefits."Amazon coerces merchants into agreements that keep prices artificially high, knowing full well that they can't afford to say no. With other e-commerce platforms unable to compete on price, consumers turn to Amazon as a one-stop shop for all their purchases," Bonta said. "This perpetuates Amazon's market dominance."In its lawsuit, Bonta's office asked the court to prohibit Amazon from enforcing Amazon contracts that bar the sale of goods more cheaply elsewhere and to pay damages and penalties.Washington, D.C., filed a similar lawsuit against Amazon in May 2021. Amazon won dismissal of it earlier this year. read more The California lawsuit is based on different laws.Amazon offered to make changes to stave off California's lawsuit, Bonta said, but he deemed them unsatisfactory.Register now for FREE unlimited access to Reuters.comReporting by Paresh Dave in San Francisco and Diane Bartz in Washington; Editing by Mark Porter and Lisa ShumakerOur Standards: The Thomson Reuters Trust Principles.Paresh DaveThomson ReutersSan Francisco Bay Area-based tech reporter covering Google and the rest of Alphabet Inc. Joined Reuters in 2017 after four years at the Los Angeles Times focused on the local tech industry.Diane BartzThomson ReutersFocused on U.S. antitrust as well as corporate regulation and legislation, with experience involving covering war in Bosnia, elections in Mexico and Nicaragua, as well as stories from Brazil, Chile, Cuba, El Salvador, Nigeria and Peru.
Tech Giants
prime day is as good a time as any to drop money on Amazon devices. It's when you can take advantage of the best deals. Whether you've been eyeing a Kindle e-reader, an Echo smart display, or a Fire tablet, Amazon has a wide variety of its own gadgets on sale during the annual two-day event. We've rounded up all of our WIRED-approved devices, below.The WIRED Gear team tests products year-round. We sorted through hundreds of thousands of deals by hand to make these picks. Crossed out products are out of stock or no longer discounted. Our Amazon Prime Day coverage page has the latest stories, and our Prime Day Shopping Tips will help you avoid bad deals. You can also get a 1-Year Subscription to WIRED for $5 here. Table of ContentsKindle DealsEcho Speaker DealsFire Tablet DealsFire TV DealsOther Amazon Device DealsIf you buy something using links in our stories, we may earn a commission. This helps support our journalism. Learn more.We're big fans of Kindles at WIRED, for multiple reasons—they're easy to use, dependable, and work as intended. They can hold thousands of books, a month worth of battery life, and more. If you want to explore more options than the ones listed below, be sure to check out our guide to the Best Amazon Kindle.Kindle Paperwhite Photograph: AmazonAmazon's newest Kindle Paperwhite is our favorite to suggest to most people. It has a bright 6.8-inch screen, a bright display (with adjustable warm lighting), and it's waterproof—making it a great option if you like to read by the pool, at the beach, or in the bathtub. It's a great alternative to the pricier Kindle Oasis below. If you have extra cash to spend, the Paperwhite Signature Edition (8/10, WIRED Recommends) comes with a few more features than the standard Paperwhite. The display can auto-adjust brightness based on the lighting in your environment, the page-turn rate is faster, and there's more storage—the Signature version has 32 gigabytes while the standard has 8 gigabytes. We recommend this one if you listen to a lot of audiobooks.The basic Kindle (8/10, WIRED Recommends) is the best option for those that want a super-simple ebook reader. It packs with a 6-inch E Ink touchscreen and a built-in front light for reading at night. You'll also get 8 gigabytes of storage, which can hold around 5,000 books. This is also the lowest price we've tracked. Kindle Oasis Photograph: AmazonFor a luxurious experience, you'll want to go with the Kindle Oasis. It has an aluminum body, a large 7-inch display with auto-adjust brightness, tactile page-turn buttons, and fast performance. It's worth the steep price if you're looking for a feature-packed Kindle.We think the Kindle Kids Edition is a solid, affordable ebook reader for children—it's also at the lowest price we've seen, yet. Amazon will throw in a protective case, a free year of Amazon Kids+ (where parents can add books to their child's library, set reading goals, add age filters, and more), and a two-year warranty with your purchase, too. If you want something more rugged than the Kids Edition, you're better off with the Paperwhite because it's waterproof. At 6.8-inches, you'll also get a larger display than the 6-inch screen on the standard model.We've tested a wide range of speakers and smart displays, in addition to the ones below. You can read our Best Echo & Alexa Speakers guide for more Alexa-powered devices. If you want to go beyond Amazon's very own, check out our Best Smart Speakers guide and Best Smart Displays guide.Echo Show 8 Photograph: AmazonThe Amazon Echo Show 8 is our favorite Alexa-powered smart display. The 8-inch display is a great size for watching movies, reading recipes, making video calls (it has an auto-pan and zoom feature to keep you in frame), checking your calendar, and more. Its compact size makes it a great addition to your kitchen counter or nightstand too.  We've also never seen it dip this low in price.In our review of the Echo Show 5, we criticized the device for its small screen—because it's slightly too small to navigate comfortably. But it's still a good option if you want a smart display that's compact enough to fit on your desk or nightstand. It also has a physical mute button and a camera shutter for privacy. But if you want a larger display, we recommend the Echo Show 8 instead. It often fluctuates in price, but this is the lowest we've seen.We've crowned the Echo Dot (8/10, WIRED Recommends) as the Best Alexa Speaker in our buying guide. The spherical speaker fits anywhere in the house and fills the room with 360-degree sound. Thanks to Alexa, you'll also stay updated on the weather and news, along with the ability to set timers and alarm clocks. Worried about privacy? There's a physical button that allows you to turn the microphones off too. It's also $5 cheaper than its lowest sale price.Echo Dot Kids Edition Photograph: AmazonIt's hard not to smile at the panda and tiger prints on the kids' edition of the Echo Dot. In addition to fun prints, the smart speaker comes with great sound quality, parental controls, and a free year of Amazon Kids+ with access to Audible books, Alexa skills, and games. The Echo Buds (8/10, WIRED Recommends) pack a ton of features including noise cancellation, wireless charging, and customizations via its connected app. But we particularly love these earbuds for the Alexa integration, allowing you to check the weather, set timers, and update your grocery list via voice commands—all while listening to your music. These earbuds dipped to $50 in April, but this is still a solid deal.Interested in a Fire tablet? We don't blame you. They're affordable, capable, and practical slates—although, the software could use some improvements. Make sure to also check out our buying guide on Best Amazon Fire Tablets.Fire HD 8 Photograph: AmazonWIRED reviewer Scott Gilbertson says the Fire HD 8 is “one of the best values around for a tablet.” It has an updated processor for fast performance, an HD display, and 12 hours of battery life. If you want additional features like more RAM and wireless charging, the Fire HD 8 Plus is also on sale for $50 ($60 off).The Fire HD 10 (7/10, WIRED Recommends) is our favorite Fire tablet of them all. The latest version has a brighter screen, solid battery life, and extra RAM for smoother performance. We also recommend the HD 10 With Bluetooth Keyboard, which is also on sale for $170 ($25 off). It comes with a free year of Microsoft 365 and is an ideal setup for getting some light work done.If you want a larger display, there's also the Fire HD 10 Plus. The 10.1-inch screen, complete with 1080p resolution, is a great option if you're planning to use it to watch movies, tv shows, and videos. It also has slightly more RAM than the standard version, at 4 gigabytes.Fire HD 8 Kids Photograph: AmazonWe think the Fire HD 8 Kids Edition is the best Fire Tablet for kids. It packs the same features as the standard Fire tablets, but also comes with a durable case and a two-year warranty—so, Amazon will replace it if your child accidentally breaks it. As with Amazon's other devices aimed toward kids, this one comes with one year of Amazon Kids+.For those with older children, we recommend the Fire HD 10 Kids Pro since it's bigger than the Fire HD 8. It is more expensive, but in addition to a larger display, children can also request to install apps from a Kids app store—which parents have to manually approve. It comes with a less heavy-duty protective case, too. Don't Buy Older Fire 7 TabletsAmazon's previous model Fire 7 tablet is on sale, but we don't recommend it. The new Fire 7 isn't terrible—it's still awfully small, but it's more powerful than previous models—but at this point, the 2019 model, which was never stellar, is next to useless.If you love watching most of your content on Amazon Prime, then you'll want to add a Fire TV Stick to your entertainment system. It prioritizes Amazon content over other popular streaming services like Netflix and Hulu, but still offers access to all the major streaming services. Be sure to check out our buying guide Best TV Streaming Devices for more options too. It's also worth noting all three streaming sticks below are at the lowest prices we've tracked, yet.Photograph: AmazonIt streams in HD—not 4K—and has the same interface as the rest of Amazon's smart devices. The remote also comes with power and volume buttons, along with Alexa Voice which you can use to launch and search shows using your voice.The Fire TV Stick 4K Max is our go-to option for Amazon loyalists since the menus are targeted toward the company's Prime Video app and purchasing content from its store. It also comes with a number of upgrades compared to its predecessor, including more memory (2 gigabytes versus 1.5), a picture-in-picture feature for pulling up your security camera feed, and support for Wi-Fi 6. We suggest the Fire TV Stick Lite if you have a standard HD TV and don't have plans to upgrade to a 4K TV. The Lite version comes with access to all major streaming apps and a more basic version of the Alexa remote—sans dedicated buttons for Netflix, a button for TV power, or volume controls. But you can download another app for that. Other Amazon Device DealsEero 6 Mesh System Photograph: AmazonEero's 6 Mesh System is super easy to set up and use. In our testing, we had solid coverage and stable connectivity. And since Eero is owned by Amazon, you'll also get support for Alexa. It's worth noting that it is one of the slower systems we've tried (it had trouble with long distances), but it should work just fine for most people.The Halo View received an honorable mention in our Best Fitness Trackers buying guide. It's also at the lowest price we've seen. It's affordable, comfortable on the wrist, and has an easy-to-use companion app. However, WIRED senior associate editor Adrienne So says she doesn't like how it pushes business partnerships or tells you to strip down to your underwear in order to measure your body fast composition.
Tech Giants
[1/2] A person stands by a sign of Huawei during World Artificial Intelligence Conference, following the coronavirus disease (COVID-19) outbreak, in Shanghai, China, September 1, 2022. REUTERS/Aly Song/File PhotoNov 25 (Reuters) - The Biden administration has banned approvals of new telecommunications equipment from China's Huawei Technologies and ZTE (000063.SZ) because they pose "an unacceptable risk" to U.S. national security.The U.S. Federal Communications Commission said on Friday it had adopted the final rules, which also effectively bar the sale or import of new equipment made by Chinese surveillance equipment maker Dahua Technology Co (002236.SZ), video surveillance firm Hangzhou Hikvision Digital Technology Co Ltd (002415.SZ) and telecoms firm Hytera Communications Corp Ltd (002583.SZ).The move represents Washington's latest crackdown on the Chinese tech giants amid fears that Beijing could use them to spy on Americans."These new rules are an important part of our ongoing actions to protect the American people from national security threats involving telecommunications," FCC Chairwoman Jessica Rosenworcel said in a statement.Huawei declined to comment. ZTE Hytera and the Chinese embassy in Washington did not respond to requests for comment.Hikvision said in a statement that its products don't threaten U.S. security."This decision by the FCC will do nothing to protect U.S. national security, but will do a great deal to make it more harmful and more expensive for U.S. small businesses, local authorities, school districts, and individual consumers to protect themselves, their homes, businesses and property," Hikvision said, adding that it will continue to serve U.S. customers "in full compliance" with U.S. regulations.Dahua said in a statement that the order went "far beyond" the FCC's statutory authority and would do "little or nothing" to protect U.S. national security. It also stressed that the FCC move allows the company to sell previously authorized products and obtain new authorizations, as long as they are not marketed for public safety, government facilities, critical infrastructure, or national security."Given that Dahua’s products are not currently marketed for those purposes..., we are reasonably confident that this Order will allow us to continue to serve most of our U.S. customers for years to come," Dahua said.Rosenworcel circulated the proposed measure to the other three commissioners for final approval last month.The FCC said in June 2021 it was considering banning all equipment authorizations for all companies on the covered list.That came after a March 2021 designation of five Chinese companies on the so-called "covered list" as posing a threat to national security under a 2019 law aimed at protecting U.S. communications networks: Huawei, ZTE, Hytera Communications Corp Hikvision and Dahua.All four commissioners at the agency, including two Republicans and two Democrats, supported Friday's move. The agency said it has authority to revoke prior authorizations, but declined to do so, meaning that the sale of currently authorized products in the United States can continue.Reporting by Diane Bartz and Alexandra Alper in Washington and Ismail Shakil in Ottawa; Editing by Caitlin Webber, Alexandra Alper, Lisa Shumaker, Kim Coghill and Lincoln Feast.Our Standards: The Thomson Reuters Trust Principles.Diane BartzThomson ReutersFocused on U.S. antitrust as well as corporate regulation and legislation, with experience involving covering war in Bosnia, elections in Mexico and Nicaragua, as well as stories from Brazil, Chile, Cuba, El Salvador, Nigeria and Peru.
Tech Giants
Foldable phones have been around for three years, but they're still missing their breakout moment. Can Samsung make it happen? Robert Rodriguez/CNET Three years later, Samsung is still proving the promise behind foldable phones. Lisa Eadicicco Senior Editor Lisa Eadicicco is a senior editor for CNET covering mobile devices. Prior to joining CNET, Lisa served as a senior tech correspondent at Insider covering Apple and the broader consumer tech industry. She was also previously a tech columnist for Time Magazine and got her start as a staff writer for Laptop Mag and Tom's Guide. See full bio 8 min read Tyler Reeves, a 28-year-old computer engineering student living in California, bought Samsung's first Galaxy Fold shortly after it launched in 2019. It was an expensive and bold choice for someone like Reeves, who enjoys outdoor sports like rock climbing and backpacking. Most people would be reluctant to take a nearly $2,000 phone up a mountain, especially since Samsung delayed the device's originally planned launch over durability issues. But that didn't bother Reeves. In fact, his first-gen Galaxy Fold is still in good condition aside from a few scratches."I tend to bring my phone in places where you usually wouldn't want to bring something like that," he said. Reeves is the exception rather than the norm. Foldable phones are a nascent but growing part of the broader smartphone market, with sales booming in 2021 compared to 2020. Research firm Omdia says 11.5 million foldables were shipped in 2021, representing a 309% year over year increase. The International Data Corporation pegs global shipments at 7.1 million in 2021, a 264.3% jump compared to 2020. The industry is only expected to continue growing, with shipments hitting 14 million units in 2022 according to Omdia. Even though foldable devices represent a sliver of the overall market (286 million phones were shipped in the second quarter of 2022 alone, says the IDC), these statistics underscore a similar point. There are more and more people like Reeves, who are interested in buying foldable phones.Samsung is as convinced as ever that foldable phones are the future. It announced its fourth-gen Galaxy Z Flip 4 and Galaxy Z Fold 4 on Aug. 10, cementing these devices as regular fixtures in the tech giant's sprawling phone lineup. With companies like Google and Apple also rumored to be working on phones that can bend and twist, foldable phones aren't going away anytime soon.Answering the "why" behind foldables is easy for Samsung. Just think about all the other products in your life that fold in half, like laptops and notebooks. Their ability to fold is precisely what makes these tools useful. "So this sort of a foldable format is really something that has been with humanity for such a long time across the world," TM Roh, president and head of Samsung's mobile experience business, said in an interview with CNET. "And that really makes the case for the foldable form factor."What's less clear is precisely how impactful foldable phones will be in our everyday lives. Three years after the first crop of bendable devices arrived in 2019, their breakout moment has yet to arrive. The modern smartphone revolutionized the way we work, communicate, record personal memories and learn about the world. Tech companies are searching for the next major iteration of the personal computer, Samsung sees foldables as the key to answering that question. Samsung is the king of foldable phones today The Galaxy Z Fold 4 (left) and Galaxy Z Flip 4 (right) Lisa Eadicicco/CNETAlmost every major smartphone manufacturer has released or announced a foldable phone at this point. And the ones who haven't are heavily rumored to do so. Motorola just announced its third foldable Razr flip phone, while Chinese tech giant Oppo debuted the Find N in December 2021. Huawei, the second biggest foldable phone maker behind Samsung, has already released several foldable phones, including its Mate X phone-tablet hybrid and P-series flip phone. Even Microsoft has released two foldable Android phones: the Surface Duo and Surface Duo 2. Google is rumored to be working on a foldable Pixel, according to 9to5Google, although a report from The Elec says the project has been delayed. Apple has begun early testing on a foldable iPhone, according to Bloomberg.  Microsoft's Surface Duo 2 Lisa Eadicicco/CNETBut for now, Samsung leads the foldable phone market by a wide margin. Display Supply Chain Consultants reports that Samsung accounts for 74% of foldable phone shipments, while Omdia says the South Korean electronics manufacturer is responsible for 88% of the foldable market. Samsung's flip phone is especially popular, with both reports citing Z Flip 3 as the top-selling foldable.Samsung's lead isn't just about being early to the market. Its presence in the display supply chain also gives Samsung an advantage over the competition. "The supply chain is always important," said Ross Young, cofounder and CEO of Display Supply Chain Consultants. "And particularly in this case, when so much of the technology and know-how is owned by one player, being Samsung."Young thinks it's unlikely that current contenders will challenge Samsung's leading position. But who will take second place? Oppo is expected to tie Huawei next year thanks to rumored upcoming foldables that could include a sequel to the Find N and a clamshell-style flip phone similar to the Z Flip. Oppo's rumored flip phone is expected to be priced aggressively, according to Young, potentially taking share away from Huawei and Samsung.Foldables still need a breakout momentSeveral hurdles are preventing foldable phones from becoming as ubiquitous as standard mobile devices. For one, they're more expensive than your average phone. And two, companies like Samsung are still figuring out how to put those bendable screens to use in a way that meaningfully distinguishes them from standard phones. Since foldable phones have only been widely available for roughly three years, it's also unclear how well they'll hold up over long periods of usage. For the most part, Roh agrees. Speaking to CNET in a rare interview through a translator, Roh pointed to three ways foldables could improve: They need to be more affordable, the battery life should be longer and the software needs to be better tailored for their unique screens. The Z Flip 4 and Z Fold 4 are the result of Samsung's latest effort to address these issues and prove the promise behind foldable phones. But these phones also illustrate the challenge in doing so. Both phones include new software features meant to make better use of their bendable screens along with upgraded cameras. The Z Flip 4 also has a bigger battery than its predecessor. But Samsung's new foldables also feel more like iterative updates that lack some of the wow factor found in earlier foldables. It's a challenging balance to strike, but Roh is confident that these devices will get better over time."We will continue our endeavor to perfect the experience with a thinner and even more portable device," he said. "And this will play a significant role in bringing about that breakthrough for mainstreaming of the foldable category." The Galaxy Z Fold 4 has a tablet-sized screen inside. Richard Peterson/CNETBoth new phones are also priced higher than the average smartphone -- especially the $1,800 Z Fold 4. It's a chicken-and-egg dilemma: Prices need to be more accessible for foldable phones to gain wider traction. But costs likely won't come down until foldables become more mainstream. That's often the case with new mobile technologies, like 5G support, which once demanded premium prices but can now be found in phones that cost less than $500. Samsung did not lower the prices of the Galaxy Z Flip 4 and Z Fold 4 compared to last year, although it is continuing to sell the Z Flip 3 at a $100 discount. "It's definitely a challenge that we are tackling, and we will need to tackle," said Roh regarding the Z Fold's price. Even though Samsung is convinced of the promise behind foldable phones, the question of whether they will ever replace traditional smartphones isn't as simple to answer. Foldables will likely drive sales of high-end, premium phones in the future, possibly playing a similar role as the Galaxy S22 Ultra and iPhone 13 Pro Max, according to Roh. But regular bar-style phones will continue to co-exist as affordable options.  "I would not see either just a bar-type, or just a foldable, or just another potentially new form factor dominating the market ," he said. But rather I see the different categories coexisting together."A big thing that could determine whether foldables become a hit would be Apple deciding to join the fold. After all, it's the world's second-largest phone-maker behind Samsung.Although Apple has filed patents for devices with foldable screens, there's little evidence suggesting a foldable iPhone is in development. Bloomberg's report from early 2021 is the most concrete indication we've seen yet, but even that story suggested Apple was only experimenting with the technology. Analysts like Young and TF International Securities Ming-Chi Kuo, who has a reputation for making Apple product predictions, forecast that 2025 is the earliest we'll see a foldable iPhone."You just pick up any device and it will work straight away," said David McQueen, research director for ABI Research, in reference to Apple devices. "And I think that's probably the key for why Apple has been so successful." Where foldable phones are going next Samsung Display revealed several foldable concepts at CES 2022, including the Flex S tablet shown here. SamsungSamsung's current foldables are barely three years old, but the company is already thinking about where it may go next. And there's a good reason why: It took eight years for Samsung to launch its first-gen foldables after conceptualizing them, says Roh. The tech giant previewed a few of these ideas at CES 2022 in January. The Flex S concept, for example, has an accordion-style tri-folding display that unfolds into a tablet. The Flex G concept also folds in two places, but the left and right panels fold over the inner screen to provide protection. Then there's the Flex Slidable, which as its name implies has an extendable screen. Roh couldn't comment specifically on which one, if any, would come to market. But he did say these designs, as well as many others, are under consideration. "It's everything you saw [at CES] plus more," he said.Young agrees that there are plenty of ways for book-style, large-format foldables to evolve."The rollable concept has a lot of potential to replace that book-type device in my mind," said Young. "Because it's going to be a lot thinner. And it should be a lot lighter."There's certainly no shortage of interest from tech companies. TCL, which has yet to release a foldable phone, has also been busy developing prototypes. In February, the Chinese electronics maker demonstrated foldable phone concepts with hinges that can bend 360 degrees and rollable displays. But new types of large-screened foldables may also present more production challenges for the industry, especially if companies plan to use bendable glass in future designs. It can be challenging for supply chains to handle that type of glass properly since foldable phones are still relatively new, according to Mathias Mydlak, senior manager of business development for glass maker Schott's ultra thin glass cover product group. Schott's flexible glass is used in the Vivo X Fold, a book-style foldable phone that debuted in April. As smartphones have matured, annual updates have begun to feel more incremental and less innovative. Foldable phones are Samsung's way of changing that, but it's going to take more than three years to figure out what the next major evolution of the smartphone might be. Samsung is off to a strong start, even if it only has niche shoppers like Reeves convinced for now. "It'll be another foldable," Reeves said when asked what phone he plans to buy when it's time to replace his aging Galaxy Fold. "I don't think I could go back."
Tech Giants
- E-commerce giant Amazon on Monday said it will invest up to $4 billion in artificial intelligence firm Anthropic and take a minority ownership position in the company. - The move underscores Amazon's aggressive AI push as it looks to keep pace with rivals such as Microsoft and Alphabet's Google. - The two firms on Monday said that they are forming a strategic collaboration to advance generative AI, with the startup selecting Amazon Web Services as its primary cloud provider. E-commerce giant Amazon on Monday said it will invest up to $4 billion in artificial intelligence firm Anthropic and take a minority ownership position in the company. Anthropic was founded roughly two years ago by former OpenAI research executives and recently debuted its new AI chatbot called Claude 2. Amazon is looking to capitalize on the hype and promise of so-called generative AI, which includes technology like OpenAI's ChatGPT, as well as Anthropic's Claude chatbots. The two firms on Monday said that they are forming a strategic collaboration to advance generative AI, with the startup selecting Amazon Web Services as its primary cloud provider. Anthropic said it will provide AWS customers with early access to unique features for model customization and fine-tuning capabilities. Anthropic will also use custom AWS-designed semiconductors to train the foundational models that underpin its AI applications. Foundation models are large AI programs trained on vast amounts of data so that they can be adapted to solve a wide range of tasks. This year, chip firm Nvidia is the chip firm that has seen the biggest gains from the generative AI boom. Nvidia's key product is a type of semiconductor known as a graphics processing unit, which can be used to train huge AI models. At one point Nvidia's stock had rallied more than 200%, as the company smashed through financial forecasts on the rising adoption of AI. To an extent, Amazon's deal with Anthropic aims to show that there are alternative chips that can be used for AI applications. AWS customers will be able to build on Anthropic's AI models via Amazon Bedrock — a service that lets customers build generative AI applications in the cloud via existing models, rather than train their own models. Amazon is looking to position itself as the one-stop shop for AI. The e-commerce giant designs its own chips for training huge AI models. Through Amazon Bedrock customers can also design their own generative AI applications using existing models, which are all run on the Amazon cloud. The company sells its own AI applications too. Anthropic already counts some high-profile backers, including Google and Salesforce Ventures. This support comes as tech giants continue to make massive bets on AI companies, a move sparked by Microsoft's multi-billion dollar investment in ChatGPT maker OpenAI in January.
Tech Giants
Nearly three years after a 2020 court decision threatened to grind transatlantic e-commerce to a halt, the European Union has adopted a plan that will allow US tech giants to continue storing data about European users on American soil. In a decision announced Monday, the European Commission approved the Trans-Atlantic Data Privacy Framework. Under the terms of the deal, the US will establish a court Europeans can engage with if they feel a US tech platform violated their data privacy rights. President Joe Biden announced the creation of the Data Protection Review Court in an executive order he signed last fall. The court can order the deletion of user data and impose other remedial measures. The framework also limits access to European user data by US intelligence agencies. The Trans-Atlantic Data Privacy Framework is the latest chapter in a saga that is now more than a decade in the making. It was only earlier this year the EU fined Meta a record-breaking €1.2 billion after it found that Facebook's practice of moving EU user data to US servers violated the bloc's digital privacy laws. The EU also ordered Meta to delete the data it already had stored on its US servers if the company didn't have a legal way to keep that information there by the fall. As The Wall Street Journal notes, Monday's agreement should allow Meta to avoid the need to delete any data, but the company may end up still paying the fine. Even with a new agreement in place, it probably won't be smooth sailing just yet for the companies that depend the most on cross-border data flows. Max Schrems, the lawyer who successfully challenged the previous Safe Harbor and Privacy Shield agreements that governed transatlantic data transfers before today, told The Journal he plans to challenge the new framework. "We would need changes in US surveillance law to make this work and we simply don't have it," he said. For what it's worth, the European Commission says it's confident it can defend its new framework in court.
Tech Giants
ByteDance has been investing in its mobile gaming business through key acquisitions and is finding success outside of China.Omar Marques | Sopa Images | Lightrocket | Getty ImagesChinese internet giant ByteDance's nascent foray into gaming is showing signs of promise with spending across its mobile titles growing over the past year as it looks to challenge rivals Tencent and NetEase.The TikTok owner generated $1 billion of player spending across its mobile games between June 21, 2021 and June 20, 2022, a 16% increase from the same period last year, according to data analytics company Sensor Tower. This figure includes data from Apple's App Store and Google Play, but not third-party Android stores in China.ByteDance, best known for it short video app TikTok and the Chinese version Douyin, has looked to aggressively expand into mobile gaming, an area that Tencent and NetEase have dominated in China. Earlier this year, ByteDance set up a dedicated gaming business unit internally.Last year, ByteDance acquired major gaming studios Moonton and C4, helping to give its efforts a big boost overseas by buying popular games as part of the deals.The bulk of player spending was on games that ByteDance acquired. Mobile Legends: Bang Bang from Moonton generated $317.7 million, accounting for 32% of the annual $1 billion figure, Sensor Tower said. C4's Girls Chronicle: Idle Heroine, follows closely in second."ByteDance's deals for Mobile Legends developer Moonton and Girls Chronicle studio C4 have been transformative," Craig Chapple, mobile insights strategist at Sensor Tower, told CNBC via email."It's built up its games operations so quickly that it's already becoming a significant mobile games publisher, particularly in China and Asia. It has a long way to go to catch up with heavyweights like NetEase and Tencent, of course, but it's moving in the right direction."For comparison between June 21, 2021 and June 20, 2022, player spending across Tencent mobile games totaled $7.9 billion globally, while NetEase's figure totaled $3.1 billion, compared with ByteDance's $1 billion.International successByteDance has found success globally with its TikTok app and the Beijing-headquartered company is starting to see results in gaming thanks to those acquisitions.The company's largest markets are in Asia, with Japan accounting for 34% of player spending on its mobile titles, while China ranks second and the United States third, Chapple said."What I find most interesting is how significant its deals for Moonton and C4 have been in that international expansion," he added.Over the last year, the biggest market by revenue for Moonton's Mobile Legends was the United States at over $50 million, Sensor Tower data showed. C4's Girls Chronicle: Idle Heroine, meanwhile, generated $303.5 million during that period in Japan, according to the data.International expansion is key for ByteDance as regulators in China have tightened scrutiny of the domestic gaming sector. Last year, Beijing said that children under 18 years old were only allowed to play online games for up to three hours per week. And China's gaming industry is only just emerging from a months-long approval freeze. In China, games need regulatory approval to be monetized.These strict measures have hit China's gaming giants with Tencent posting its slowest ever revenue growth in the second quarter of the year.Both Tencent and NetEase have looked to international markets for growth, a tactic that ByteDance appears to be replicating amid regulatory headwinds at home."The company has spent the last year growing its operations both in China and internationally. In the face of regulatory challenges in China, we may see ByteDance joining Tencent and NetEase and expanding its operations further internationally, something the company already has huge experience and success in with TikTok," Chapple said.
Tech Giants
(Bloomberg) -- Elon Musk is making plans for an artificial intelligence startup that will rival OpenAI, according to the Financial Times, which said the billionaire is assembling a team of researchers and engineers to work on the project. Most Read from Bloomberg Musk also is holding discussions with Tesla Inc. and Space Exploration Technologies Corp. investors about helping fund the project, the newspaper reported, citing unidentified people familiar with the matter. The billionaire has acquired thousands of processors from Nvidia Corp. for the new project, according to the Financial Times. That news helped boost shares of the chipmaker Friday, with the stock gaining as much as 1.6% following a decline earlier in the session. Musk was among a group of AI researchers and tech industry leaders that last month called for developers to pause the training of powerful AI models. At the same time, however, he had been linked to discussions about creating a new research lab with those in the field including Igor Babuschkin, a former employee at Alphabet Inc.’s DeepMind, according to the tech website the Information. Musk helped start OpenAI in 2015 and served as as co-chair along with Sam Altman, who is OpenAI’s current chief executive officer. At the time, OpenAI’s goal was to “advance digital intelligence in the way that is most likely to benefit humanity as a whole, unconstrained by a need to generate financial return.” Musk left OpenAI’s board in 2018 and has since criticized the organization, which created a for-profit arm in 2019. He has expressed worry that it was “training AI to be woke” and said it was “effectively controlled by Microsoft.” Microsoft Corp. has invested $10 billion into OpenAI. Altman, talking in a podcast about Musk’s concerns, called him a “jerk” while noting he believes Musk is “feeling very stressed about what the future’s going to look like for humanity.” Musk, who also owns Twitter, recently merged that company into a larger parent corporation called X Corp. Musk has said that the social network would be an “accelerant” for creating X — which he dubbed an “everything app.” Most Read from Bloomberg Businessweek ©2023 Bloomberg L.P.
Tech Giants
Just a day after two of Instagram's biggest users complained about changes being made to the social network, Instagram CEO Adam Mosseri issued a public statement acknowledging that the platform's pivot to video is "not yet good." Mosseri posted the mea culpa to his Twitter profile following negative feedback from celebrities Kylie Jenner and Kim Kardashian, who between them have 686 million followers on the platform. The sisters both shared a message reading "Make Instagram Instagram Again," complaining that it was "trying to be TikTok" instead of focusing on photo sharing. As CNBC reports, Mark Zuckerberg — CEO of Instagram parent company Meta — has been pushing into shortform video content, a market that TikTok dominates. But Instagram's video push has been met with backlash from users, who have used social media to voice their displeasure. The post shared by Jenner, who is the platform's most-followed woman, has nearly 1.7 million likes. A Change.org petition demanding, in all caps, "CHRONOLOGICAL TIMELINES" and "AN ALGORITHM THAT FAVORS PHOTOS" has racked up more than 148,000 signatures. In his video, Mosseri insisted that the TikTok-like full-screen version of Instagram's feed is a test that is only seen by "a few percentage of people out there," and admitted that it would need to be greatly improved if it is ever going to be given to all users.But replies to the executive's video were far from positive, with many continuing to criticize the platform for its efforts to take on TikTok. Others railed against the company's efforts to diversify users' feeds with posts from accounts other than the ones they already follow. Still, it appears that whether the backlash comes from users or from Kim Kardashian, Instagram will continue its video-centric push. In his video, Mosseri said that the company will "continue to support photos," but noted that he believes "that more and more of Instagram is going to become video" whether or not the company proactively pushes it in that direction."If you look at what people share on Instagram, that's shifting more and more to video over time," he said. "If you look at what people like and consume and view on Instagram, that's also shifting more and more to video over time, even when we stop changing anything. So we're going to have to lean into that shift."Sign up now: Get smarter about your money and career with our weekly newsletterDon't miss: 'Top Gun: Maverick' is the first billion-dollar movie in Tom Cruise's 40-year career
Tech Giants
OpenAI Unveils Enhanced DALL-E 3 Image Generator, Integrates It with ChatGPT On Wednesday, OpenAI, the San Francisco-based AI startup, introduced an upgraded version of its DALL-E image generator to a select group of testers, seamlessly integrating this technology into ChatGPT, its widely popular online chatbot. Termed as DALL-E 3, this new iteration boasts remarkable image generation capabilities, with a notable proficiency in crafting detailed images involving letters, numbers, and human hands, according to the company. Aditya Ramesh, an OpenAI researcher, stated, "It is far better at understanding and representing what the user is asking for," emphasizing its improved precision in interpreting the English language. The addition of DALL-E's latest iteration to ChatGPT positions OpenAI's chatbot as a central hub for generative AI, capable of producing text, images, sounds, software, and various digital media independently. This development has ignited competition among tech giants in Silicon Valley to lead the field of AI advancements. OpenAI has not yet made DALL-E 3 available to the wider public, with plans to release it next month through ChatGPT Plus, a subscription service priced at $20 per month. Recognizing the potential misuse of image-generating technology for spreading disinformation, OpenAI has incorporated safeguards in DALL-E 3 to prevent problematic content, including sexually explicit images and depictions of public figures. Efforts are also underway to restrict DALL-E's ability to mimic specific artistic styles. Although OpenAI intends not to broadly censor content from DALL-E 3, the company acknowledges the need for context-aware considerations due to the diverse interpretations and implications of generated images in different scenarios.
Tech Giants
Apple is reportedly planning to slow hiring and spending growth next year to cope with an economic downturn, which would place it in the company of American tech companies including Facebook, Amazon and Google in enacting similar measures.The changes, first reported by Bloomberg, would not affect all teams, and Apple is reportedly still planning a major product launch scheduled for next year that includes a mixed-reality headset, its first significant new category since the Apple Watch in 2015.While Apple has not confirmed its plan to slow hiring, the report comes as earnings season enters full-swing. Late Tuesday, Netflix is expected to announce a sharp fall in subscribers, indicating in part that consumers are cutting back on discretionary spending as consumer confidence plummets in a highly inflationary environment.Last week, Google announced it will slow down hiring for the remainder of the year. In a memo to employees, CEO Sundar Pichai said the company would have to “be more entrepreneurial” and for employees to work with “greater urgency, sharper focus, and more hunger than we’ve shown on sunnier days”.Earlier, Microsoft said it planned to cut some jobs as it realigned business groups but overall expected to increase its headcount. “We will continue to invest in our business and grow headcount overall in the year ahead,” the company said.Facebook parent Meta Platforms has also announced a hiring reduction in some high-level positions as it seeks to cut expenses by $3bn this year.In June, it was reported that Tesla’s CEO, Elon Musk, had a “super bad feeling” about the US economy and was determined to cut about 10% of the auto company’s workforce and to “pause all hiring worldwide”.Other winners during the pandemic economy have also announced layoffs, including Peloton and Netflix, which laid off 300 employees as it seeks to re-engineer its business as subscribers cancel subscriptions.Apple, with 17% of the smartphone market, reports its earnings on 28 July, when investors will get a more complete picture of supply chain problems and any sign of a slowdown in consumer demand for products and services that have made it the world’s most valuable company.“Apple’s move reflects a broader slowdown in investing in new things, new companies and new products,” Kim Forrest, chief investment officer at Bokeh Capital Partners, told Reuters. “It signifies that inflation is an issue for these companies.”
Tech Giants
The roof of a Google fiber instillation truck is pictured Salt Lake City, Utah, U.S., September 28, 2017. REUTERS/Mike BlakeRegister now for FREE unlimited access to Reuters.comAug 10 (Reuters) - Google Fiber plans to bring its high-speed internet service to multiple cities in Arizona, Colorado, Idaho, Nebraska and Nevada over the next several years in its first big expansion since it spun out as an independent Alphabet Inc (GOOGL.O) unit in 2015.In his first media interview since becoming chief executive of Google Fiber in February 2018, Dinni Jain told Reuters on Wednesday that his team was finally prepared to "add a little bit more build velocity" after over four years of sharpening operations.The anticipated expansion to 22 metro areas across the United States from 17 today includes previously announced projects to launch in Mesa, Arizona and Colorado Springs, Colorado. The choices were based the company's findings of where speeds lag.Register now for FREE unlimited access to Reuters.com"There was an impression 10 years ago that Google Fiber was trying to build the entire country," Jain said. "What we are gesturing here is, 'No, we are not trying to build the entire country.'"Jain declined to comment on Fiber's financial results or fundraising plans.Some other Alphabet subsidiaries have raised outside funding to independently validate their value, been shut down or subsumed by other entities. Fiber could face similar choices as the expansion materializes over the next three to five years.The growth plan comes as Alphabet and other companies slow hiring and shutter some fringe projects as worries about a global recession rise."The intent is to build businesses that will be successful in and of their own right and that is what we are trying to do at Google Fiber for sure," Jain said. He added that the company could not rely on dipping into "a rich parent's wallet."Google began taking on internet service stalwarts such as Comcast Corp (CMCSA.O) and AT&T Inc (T.N) in 2010 with co-founders Larry Page and Sergey Brin declaring they were tired of waiting on Congress to drive the industry toward faster speeds at lower costs.The project worked. Competitors scrambled to match Google Fiber's gigabit per second offerings in initial launch sites such as Austin, Texas and even in Los Angeles and other areas under consideration."We were so paranoid," Jain said of his prior role as Time Warner Cable's chief operating officer.But Google in 2015 separated its core business from other bets such as Fiber, delivery drones and anti-aging solutions. Brin and Page also ceded some oversight.Fiber had to pare its hundreds of millions of dollars in annual losses, which had gone toward construction, experimenting with new ways to ground fiberoptic cables and subsidizing some service.While Wall Street cheered cost controls and transparency, Fiber over the last few years minimized expansion to West Des Moines, Iowa and within existing metropolitan areas. Jain honed processes and dumped failed ideas aimed at saving time like taping cables to sidewalks.Last year, it did more building than the previous few years combined."We’ve had to go from spirit and culture of tremendous innovation to one of operational excellence," Jain said.Fiber maintains some edge in its view. Burying trenches less deep than others should save time, while streamlining prices and setup to limit help calls from customers should hold down costs.Jain said customers contacted Fiber a third less than what he has witnessed at similar companies, and he described sign-ups as "very healthy" and higher than what he expected before joining.Fiber will continue to pursue wireless service, through its Webpass brand, for multi-unit buildings, Jain added. In some cases, it will lease local fiber networks from other providers.Register now for FREE unlimited access to Reuters.comReporting by Paresh Dave; Editing by Kenneth Li and Edwina GibbsOur Standards: The Thomson Reuters Trust Principles.Paresh DaveThomson ReutersSan Francisco Bay Area-based tech reporter covering Google and the rest of Alphabet Inc. Joined Reuters in 2017 after four years at the Los Angeles Times focused on the local tech industry.
Tech Giants
Google has unveiled a huge update that signals 'the beginning of the end' for using passwords to access Gmail accounts. The web giant has started to roll out its new passkey technology, which will allow billions of users to sign in to websites and apps the way they unlock a device — with a fingerprint, face scan or a device PIN that can verify their identity. It is expected that the new type of online sign-in will eventually replace passwords, although it will be a while before this happens because the technology is still in its infancy. Experts say it will allow people to access and use their new password-less sign-in credentials – or passkey – across different devices. This will prevent them from having to sign in to every account again on each device, reducing the risk of using easily-guessable passwords and therefore creating a more secure system. The technology has also been rolled out in Apple's iOS16 and the latest MacOS release, while Microsoft has been running it through the Authenticator app. WHAT ARE PASSKEYS AND HOW DO I SET THEM UP? Passkeys are a new way to sign in to apps and websites. Tech giants say they are both easier to use and more secure than passwords, so users no longer need to rely on the names of pets, birthdays or the infamous 'password123'. Instead, passkeys let people sign in to apps and sites the same way they unlock their devices: with a fingerprint, a face scan or a screen lock PIN. To create one for your Google account, follow these steps below: 2. Enter your password to access your account 4. Select 'Continue' to set one up for the device you are using, or 'Use another device' for a different one 5. Place your fingerprint on your device as you normally would to unlock it and the passkey will be created Ebay, PayPal and Docusign are already using the passkey, too, along with a number of other businesses. It was created by industry body the FIDO (Fast Identity Online) Alliance and World Wide Web Consortium, with Google, Apple and Microsoft the primary drivers. The tech giants said the new system also allows people to use a fingerprint or facial scan authentication on their smartphone as a way of signing in on another device nearby, regardless of which operating system or browser they are running. This is a feature already in place for Apple devices, where someone wearing an Apple Watch can unlock a phone or MacBook. This reduces the need for people to remember a wide range of username and password combinations to log in to different services, which has often led to passwords being reused across multiple accounts. Experts have previously warned that this is one of the biggest security risks in the digital world. Users can create and store a passkey on any compatible device they use – such as iPhones running iOS16 and Android devices running Android 9. They will also be able to share it to other devices from the OS using services such as iCloud or password managers like Dashlane and 1Password. To set one up, visit g.co/passkeys. Enter your password to access your account, then click 'Create a passkey'. You will be asked to select 'Continue' to set one up for the device you are using, or 'Use another device' for a different one. Once you've done this, you will be asked to place your fingerprint on your device as you normally would to unlock it, at which point the passkey will be created. If at any point you suspect someone else can access your account, or if you lose the only device that the passkey is stored on, you can revoke passkeys in the Google account settings. The technology works by storing a cryptographic private key on a user's device, while there is a corresponding public key uploaded to Google. When a user signs in, the device uses the private key to generate a signature once it has solved a unique challenge. This signature is in turn verified using the public key which then allows the user to access their account. Google never sees the private key or biometrics used, only the signature generated and the public key. The internet giant says this will prevent people using phishing, SIM-swap and other methods to obtain passwords or bypass existing authentication methods. However, Google stresses that users should never create passkeys on a shared device because anyone that can access and unlock that device would then be able to access your Gmail account. 'While passwords will be with us for some time to come, they are often frustrating to remember and put you at risk if they end up in the wrong hands,' Google said in its announcement. 'Last year – alongside FIDO Alliance, Apple and Microsoft – we announced we would begin work to support passkeys on our platform as an easier and more secure alternative to passwords. 'And today, we've begun rolling out support for passkeys across Google Accounts on all major platforms. 'They'll be an additional option that people can use to sign in, alongside passwords, 2-Step Verification (2SV), etc.' Despite the rollout, Jake Moore, Global cybersecurity adviser at ESET, said we are still a long way from the end of the password. But he added that 'at least Microsoft, Google and Apple are attempting to pave the way to make account access for secure as well as convenient'. 'It isn't something that can be achieved overnight but it highlights that more needs to be done when it comes to people's password security.' Andrew Shikiar, executive director of FIDO Alliance, said: 'We're thrilled with Google's announcement today as it dramatically moves the needle on passkey adoption due both to Google's size, and to the breadth of the actual implementation — which essentially enables any Google account holder to use passkeys. 'I also think that this implementation will serve as a great example for other service providers and stands to be a tipping point for the accelerated adoption of passkeys.'
Tech Giants
Epic Games, the maker of the popular game “Fortnite,” launches a battle against Google in federal court today in a closely watched antitrust showdown that could reshape how smartphone users get Android apps and pay for in-app content. Epic’s lawsuit in the US District Court in California’s Northern District targets the Google Play Store, focusing on Google’s fees for in-app subscriptions and one-off transactions, along with other terms that app developers such as Epic say helped Google maintain an illegal monopoly in app distribution. The legal battle follows a years-long debate about whether app store operators such as Google and Apple foster an open, competitive app ecosystem. The two companies argue their app stores help unlock billions in revenue for small businesses, while ensuring that Android and iOS users benefit from security oversight that the technology giants provide. The jury may hear high-profile witnesses testify from both sides, including Google CEO Sundar Pichai and Epic CEO Tim Sweeney. The court fight traces back to 2020, when Epic launched Project Liberty, a plan to circumvent Apple and Google’s app store terms. That move by Epic forced a confrontation with the tech giants. Epic updated the Fortnite app to encourage players to pay for in-app content directly through Epic’s own website — rather than through Apple and Google’s in-app payment systems. That gambit triggered a violation of the app stores’ developer terms. The move also prompted both app stores to remove the Fortnite app from their platforms. It meant Apple users could no longer play Fortnite on iOS devices. Epic’s case involving Apple may soon be reviewed by the Supreme Court. Fortnite is still available on Android devices through a variety of non-Google channels. In the meantime, Sweeney has alleged that Google “controls, surveils, and taxes transactions between users and developers” in violation of US antitrust law. Google has argued Epic simply wants access to the Play Store’s 2.5 billion users worldwide without having to pay to support the platform, and that a victory for Epic could harm Google’s ability to offer a competitive Android alternative to Apple’s iOS. “The most relevant thing for us is showcasing to the jury how Android has created more choice, flexibility and openness than any other platform, and that Epic has actually availed itself of that level of choice and flexibility,” said Wilson White, Google’s vice president of public policy and government affairs. “As a result, these needless claims that they’ve brought should fail.” The suite against Google initially involved a wide range of plaintiffs, including dozens of state attorneys general and individual consumers, as well as Match Group, the online dating giant that owns apps including Tinder, Hinge and Match. But Google successfully narrowed the list of opponents it would face at trial as it reached multiple settlements removing other plaintiffs from the case. Epic will now face off against Google in court alone. For more CNN news and newsletters create an account at CNN.com
Tech Giants
I believe that password manager apps like 1Password and Proton Pass are among the most important applications you can install on a new device. Password managers securely hold all your login credentials, credit card data, and notes. The emphasis is on the login data, as not all password managers offer similar features. The point is, I’d need a password manager to sign into everything else securely. And thankfully, some operating systems and browsers have built-in password managers. Apple’s iPhone, iPad, and Mac ecosystem is one such example. Apple offers a built-in iCloud Keychain password manager that lets you save passwords securely. The tool syncs the passwords across devices. It’s not a standalone app like 1Password or Proton Pass, but the iCloud password manager is there, ready to provide protection to your most critical data. And the tool just got a big update in macOS Sonoma. The new OS brings the iCloud Passwords extension to third-party browsers, including Google Chrome and Microsoft Edge. That’s great news for all those Mac users not happy with what Safari can offer. Password manager apps typically require a paid subscription though free versions exist. Proton Pass is one example where you don’t need to pay for the app to benefit from secure, end-to-end encrypted passwords. While I routinely advocate for premium versions of the apps, I also point out that Apple’s password manager feature is available for free. You’re already paying for the hardware, whether iPhone, iPad, or Mac. All the software comes free, iCloud Passwords included. This gives you a tremendous tool to protect your password. One that’s at least as good as standalone apps and comes with a few exciting features. Apple’s password manager autofills passwords, handles two-factor authentication codes, and supports passkeys. The problem with Apple’s iCloud password manager is that it might not be immediately obvious to the user. It’s not a standalone app that runs alongside your other apps on Mac. Or a standalone iPhone app. Instead, it’s part of the Settings app, and it’s supposed to just work. Whenever you have to fill in login data on iPhone or iPad, the iCloud password manager does the trick. It’s on the Mac that things get trickier. To work where it matters, a password manager needs browser extensions. That way, you can seamlessly fill in login details without worrying about copying and pasting. That’s where macOS Sonoma comes in handy. Available in beta, the operating system brings a new iCloud Passwords extension for Google Chrome. The extension will also work on any Chromium-based internet browser, including Microsoft Edge, Brave, and others. Apple has made the iCloud Passwords extension available to download, and you can install it immediately. All you need to do is also install macOS Sonoma public beta to test it. Or wait for this fall for the official Sonoma release to become available. Once you’ve installed everything, just sign into your Apple ID to access your iCloud passwords in your macOS browser of choice. Your Apple ID protects your iCloud data, including the passwords you store in it. If you’re struggling with passwords, you should take advantage of this great tool that Apple built into its operating systems. You can also consider using iCloud Passwords even if you already use a standalone password manager. That way, you have a couple of secure password managers available to you at all times.
Operating Systems
iOS 17 and macOS Sonoma include even more privacy-preserving features while browsing the web. Link Tracking Protection is a new feature automatically activated in Mail, Messages, and Safari in Private Browsing mode. It detects user-identifiable tracking parameters in link URLs, and automatically removes them. Adding tracking parameters to links is one way advertisers and analytics firms try to track user activity across websites. Rather than storing third-party cookies, a tracking identifier is simply added to the end of the page URL. This would circumvent Safari’s standard intelligent tracking prevention features that block cross-site cookies and other methods of session storage. Navigating to that URL allows an analytics or advertising service at the destination to read the URL, extract those same unique parameters, and associate it with their backend user profile to serve personalized ads. Apple is attempting to crack down on this behavior across its operating systems this year. Safari will automatically detect which parts of the URL are identifying, and remove only those parts, leaving the rest of the URL intact so you still get to the web page you intended to visit. This process happens transparently during browser navigation in Safari Private Browsing mode, and links that the user clicks on from Mail and Messages app. As a partial mitigation, Apple is enabling an alternative way for advertisers to measure campaign success, with Private Click Measurement ad attribution now available in Safari Private Browsing mode. Private Click Measurement allows advertisers to track ad campaign conversion metrics, but does not reveal individual user activity. FTC: We use income earning auto affiliate links. More.
Operating Systems
Ubuntu Pro, Canonical’s comprehensive subscription for secure open source and compliance, is now generally available. Ubuntu Pro, released in beta in October last year, helps teams get timely CVE patches, harden their systems at scale and remain compliant with regimes such as FedRAMP, HIPAA and PCI-DSS. The subscription expands Canonical’s ten-year security coverage and optional technical support to an additional 23,000 packages beyond the main operating system. It is ideal for organisations looking to improve their security posture, not just for the Main repository of Ubuntu, but for thousands of open-source packages and toolchains. Timely patching for your favourite open-source toolchains Canonical has an 18-year track record of timely security updates for the main Ubuntu OS, with critical CVEs patched in less than 24 hours on average. Ubuntu Pro’s coverage spans critical, high and selected medium CVEs for thousands of applications and toolchains, including Ansible, Apache Tomcat, Apache Zookeeper, Docker, Nagios, Node.js, phpMyAdmin, Puppet, PowerDNS, Python, Redis, Rust, WordPress, and more. Ubuntu Pro is available for every Ubuntu LTS from 16.04 LTS. It is already in production for large-scale customers offering global services. The beta release was welcomed by the likes of NVIDIA, Google, Acquia, VMWare and LaunchDarkly. Since the beta announcement in October 2022, tens of thousands of Ubuntu users have signed up for the service. “I manage my own compute cluster leveraging MAAS and other Canonical tools to support my research. The open source security patches delivered through Ubuntu Pro give my team peace of mind, and ensure my servers are secure. Canonical is continuously delivering timely CVE patches covering a broad portfolio of open source applications for the entire ten-year lifetime of an Ubuntu LTS. This brings much needed stability and compliance”, said David A Gutman, MD PhD, Associate Professor of Pathology, Emory University School of Medicine. A single subscription for security and compliance Besides providing timely security patches, Ubuntu Pro includes tools for compliance management in regulated and audited environments. Ubuntu Security Guide (USG) enables best-in-class hardening and compliance standards such as CIS benchmarks and DISA-STIG profiles. Ubuntu Pro users can access FIPS-certified cryptographic packages necessary for all Federal Government agencies as well as organisations operating under compliance regimes like FedRAMP, HIPAA, and PCI-DSS. System management and automated patching at scale are facilitated through Landscape. Ubuntu Pro also includes Livepatch, which patches critical and high-severity kernel vulnerabilities at runtime to minimise the need for unplanned reboots of your Ubuntu estate. Subscription types and pricing The standard Ubuntu Pro subscription covers the full set of security updates for all packages in Ubuntu Main and Universe repositories – this is the most suitable choice in most cases. Ubuntu Pro costs $25 per year for workstation or $500 per year for server and is available directly from ubuntu.com/pro/subscribe with a 30-day free trial. Ubuntu Pro is also available through our public cloud partners’ marketplaces – AWS, Azure and Google Cloud. It is offered on a per-hour basis, billed directly by the cloud, and priced at approximately 3.5% of the average underlying compute cost. An Ubuntu Pro (Infra-only) subscription (formerly offered as Ubuntu Advantage for Infrastructure) covers the base OS and the private cloud components needed for large-scale bare-metal deployments, but excludes the new broader application coverage. It is useful for organisations building private clouds that use other guest operating systems for applications. A free tier is available for personal and small-scale commercial use in up to 5 machines. Official Ubuntu community members can benefit from Ubuntu Pro on up to 50 machines. In order to get the token, log in with your existing Ubuntu One account or create a free account. Optional support Ubuntu Pro can be combined with up to 24×7 enterprise-grade support coverage for the Ubuntu operating system, MAAS, LXD, Kubernetes, OpenStack or Ceph storage, and now also a range of open source applications. Get started today To explore the benefits of Ubuntu Pro, discover the scope of coverage and additional security updates available, follow these steps.
Operating Systems
Devices like the Steam Deck, Ayaneo 2, and even the Nintendo Switch have taken the world by storm in recent years. Portable handheld consoles open up a new world of experience. While Nintendo has been making handhelds for years, the first two offer PC gaming on the go, complete with good performance, excellent battery life, and the ability to do so much more with the software. However, the Steam Deck has a leg-up over the Ayaneo 2 in one big department: the operating system. It's so much easier to do whatever you want on SteamOS, a fork of Arch Linux, not to mention the reduced overhead. On the one hand, this decreases the cost since there's no need to shell out for a software license for its distribution. However, there are disadvantages to using Linux, such as the requirement for the Proton compatibility layer to ensure that games built for Windows are still playable. Nevertheless, it seems clear that the future of handheld gaming is likely going to be a combination of both Android and Linux, and there are a few reasons why. Linux is open and free In terms of software, Linux is an obviously attractive choice to any company looking to build a new gaming machine. Not only is it an open and free kernel to start from, but there are plenty of distributions out there that companies can inherit and develop their systems on top of. (See SteamOS, based on Arch.) As handhelds aim to try and cut costs as much as possible while making the most of limited hardware, Linux becomes a more attractive option. Of course, the biggest downside is that the Linux base would likely require the operating system to be open-source. For example, you can browse through the code of SteamOS, even if the Steam Client itself is proprietary. Companies like Microsoft, Sony, and Nintendo rely on anti-piracy and locked-down systems to protect their game sales, and an open-source operating system may scare those companies off. However, handhelds like the Nintendo DS showed that even in the face of rampant piracy, games can still sell incredibly well and prove profitable. With PC being as open as it is, cracked games are everywhere, but players still buy games. Proving that to the companies is in itself a feat, but it can be done, and the PC market proves that people, by and large, will buy their games instead of pirating them. Android gaming handhelds are already here Meanwhile, the precedent for gaming handhelds running Android has already been set. Devices like the Logitech Cloud and the Razer Edge are Android-based, and there's already a huge variety of games playable on those systems. Not only that, but smartphone GPUs are quite powerful. After all, the Nintendo Switch uses a Tegra X1, and the Maxwell GPU on that SoC (which runs at a lower clock speed when undocked, too) has long been outclassed by GPUs like the Adreno 740 in the Snapdragon 8 Gen 2. That's not even mentioning how people have been emulating games on Android for years. Mobile gaming has also only been increasing in popularity, with graphically intensive titles like Genshin Impact and Call of Duty Mobile topping the charts. Android is already a serious gaming platform, and handhelds taking advantage of that are starting to release more frequently. Sure, primarily gaming on mobile still carries a stigma among others in the video game community, but that perception is starting to shift as even the most skeptical realize the true power of what a modern Android flagship can do. The Logitech Cloud is basically a mid-range Android smartphone, but its cloud gaming capabilities are made possible through the openness of the operating system. Even the Nintendo Switch makes use of Android A little-known fact is that even the Nintendo Switch uses Android to a certain extent. It uses a display manager called "SurfaceFlinger" inside the hosbinder service, alongside the Stagefright multimedia framework. These are implemented with modifications to make them fit with HorizonOS, the codename for the Nintendo Switch's operating system. This was likely done because Nvidia had already done the legwork on making a graphical display manager that worked with the Tegra X1 chipset it used in Android-powered devices. Interestingly, years ago, it was asserted by now-defunct Cyanogen founder and CEO Kirt McMaster that Nintendo had wanted to work with Cyanogen to create an operating system for an upcoming device that later became the Switch. He had told them to "stick it," which is why it never materialized. This isn't exactly surprising, especially given the Tegra roots of the Switch. If Android's graphics stack is good enough for a handheld like the Nintendo Switch, one of the best-selling gaming devices since its 2017 debut, then it's clearly good enough for companies to consider using as their primary operating system for gaming as a whole. Thanks to Mark from the Skyline team for his assistance in this portion of the article! Consoles and handhelds will use Android and Linux in the future I'm not sure if it'll be the next generation, but I'm certain consoles and handhelds will use some version of an Android or Linux basis in the future. It saves on development costs and time, allowing even smaller companies to test out these operating systems for gaming. That isn't to say that companies will grant access to the system should it come with an Android or Linux distribution. In fact, it's quite unlikely that they would. For example, PlayStation runs Orbis OS, an operating system based on FreeBSD. While it's possible to run Linux on it if you jailbreak it, Sony has locked down its most recent consoles. For the next generation of handhelds, companies will probably use heavily locked-down versions of Android and Linux, possibly unrecognizable aside from a mention in a license disclosure in the settings. It's unlikely that companies would rescind their control over the software in fear of piracy and even cheating in online games. Nevertheless, it's pretty clear that companies are beginning to factor Android and Linux into their software roadmaps for consoles. Nintendo already considered it for the Switch (and even executed on it to an extent), and companies like Valve with the Steam Deck have shown that it can work very, very well. It's an exciting time to be a gamer, and the technology being used is a big part of the reason why.
Operating Systems
Published July 20, 2022 12:04AM Updated 12:05AM PHOENIX - It has become an annual tradition of sorts for Apple users, but in a matter of months, people with devices running iOS will be updating to a new operating system. The new operating system, iOS 16, was announced during apple's World Wide Developer Conference (WWDC) in June. Here's what you should know about Apple's upcoming iOS. What's iOS? iOS is the operating system that runs on Apple's iPhones. I download updates all the time for my iPhone. What's the difference with this one? While Apple regularly issues minor updates for iPhones, they also release a new version of iOS once a year, and iOS 16 is a new version of iOS. According to Apple, there are a number of changes for iOS 16, but two major changes include lock screen customization and recalling sent messages. Lock screen customization A look at the new, customizable lock screen on iOS 16. Up until now, an iPhone user can only personalize their lock screens with different wallpapers. Now, Apple says people can now put widgets on their lock screen, which will allow them to access various information, like calendar events, alarms and time zones, among other things, without actually unlocking the phone. A number of new wallpaper options were also introduced, such as astronomy-related wallpapers, weather-related wallpapers, among other selections. Live Activities is another new lock screen feature, which Apple officials say will allow viewers to stay on top of things that are happening in real-time, like sports games, rideshare, or food delivery orders, right from the lock screen. As for notifications, Apple officials say they will roll up from the bottom in iOS 16. Recalling messages Apple officials say with iOS 16, users can now edit or recall messages that were recently sent, and recover recently deleted messages. In addition, officials say in the new iOS, users can mark conversations as unread so that they can come back to them later. Are there other new features for iOS 16? Yes. According to Apple officials, the new iOS contains other updates, including, but not limited to: Scheduling out e-mailsCanceling an e-mail's delivery, within a set amount of time.Enhancement to live text: text appearing in video can now be detected by the phone, just like texts in images. Users can interact with the text, such as translation or currency conversion, among other options.Addition of Apple Pay Later (U.S. users only) into Apple Wallet.Multi-stop routing for Apple Maps I think I've seen some of these new features elsewhere… According to the website Android Authority, Android gives its users the opportunity to customize their home screen, and while it is not a default Android feature right now, lock screen widgets are supported by some Android phones. What iPhones can install iOS 16? Apple officials say any iPhone 8s, along with later iterations of iPhones, can run iOS 16. Will the new iOS affect my other Apple devices? iOS only runs on iPhones. Apple's computers, tablets, Apple Watch, and AppleTV run on operating systems that are designed specifically for them (macOS, iPadOS, watchOS and tvOS, respectively). It should be noted that major operating system updates have been announced for all operating systems. I have an Android phone. What does this mean for me? iOS only runs on iPhones, so Android users will not be impacted by any iOS releases. Can I download the new iOS now? Yes and no. iOS 16 has not been officially released to the public, as it is scheduled for a fall 2022 debut. However, people can enroll their iPhone in the Apple Beta Software Program to test out the new iOS. Beta software, however, may not work as well as software that are officially released.
Operating Systems
|Webcam Name:||Not selected| |Quality Rating:||—| |Built-in Microphone:||—| |Built-in Speaker:||—| |Frame rate:||—| |Stream Type:||—| |Image Mode:||—| |Webcam MegaPixels:||—| |Webcam Resolution:||—| |Video Standard:||—| |Aspect Ratio:||—| |PNG File Size:||—| |JPEG File Size:||—| |Bitrate:||—| |Number of Colors:||—| |Average RGB Color:||—| |Lightness:||—| |Luminosity:||—| |Brightness:||—| |Hue:||—| |Saturation:||—| Check out how good your web camera is! Leave a review about your camera and find out the place in the rating of the best cameras. i really liked it its fun more fun w friends— isaiahh it was good— ajit good service— xyz very nice page— dora i like this tool, it's very good/— emily kuo This site provides a free tool to test your webcam online and check if it is working properly. In other words, you can test it directly from your browser without the need to install third-party software. Despite such an easy way, you can start testing your webcam “in one click” on different devices, including laptops, smartphones, TVs, tablets and others. Regardless of the device and the operating system, as a result of testing, you will not only know if your webcam is working, but also find out a lot of useful information about it (i.e, webcam name, resolution, frame rate, number of colors, image quality and many other specifications). In addition, if the testing tool detects any problems with your web camera, you will receive some hints on how to fix them. After completing the webcam testing, among other things, you can take photos with your webcam and download them. Also you can view it in fullscreen and rate your webcam. Testing your webcam with our online tool is very easy: just wait until the web cameras are detected and press the “Test my cam” button. If you do not see this button and don’t receive any notifications, most likely an error occurred with your browser. To help you, please email us at info@webcamtests.com Once testing is complete, you can leave a review about your webcam. This is not required, but we encourage you to do so in order to help other people to purchase a good webcam and get around the bad ones. In addition, after publishing your review, you will see how good is your compared camera to others. To test your camera, all you need is a modern browser (unfortunately, Internet Explorer does not belong to them) that supports features for accessing media devices. As you noticed, this webcam testing tool does not require any additional software like Adobe Flash, Microsoft Silverlight or browser add-ons. Below are listed the operating systems and the minimum versions of supported browsers: If your operating system or browser is not listed here, this does not mean that it is not supported. It just has not been tested yet. Therefore, feel free to check yourself. The test results depend on various factors, which is why it is impossible to guarantee an error-free testing algorithm. Nevertheless, we will always improve our testing tool and fix any errors found. If you find any errors or you have any suggestions, please contact us at info@webcamtests.com
Operating Systems
Why it matters: Microsoft has issued guidance for fixing a serious Secure Boot vulnerability that affects all Windows systems and is actively being exploited in the wild. Normally, this kind of issue would be patched via monthly servicing updates but the Redmond company has chosen a phased approach to reduce the risk of you or your organization ending up with devices that won't boot. The fix will require some manual steps for now, but will be applied automatically on all supported Windows systems starting next year. Microsoft's latest Patch Tuesday updates are out for Windows 11 and Windows 10 with several fixes for two operating systems. In the case of Windows 11, the KB5026372 cumulative update introduces no less than 20 changes that improve the user experience as well as fixes for 38 security vulnerabilities and three zero-days affecting various Microsoft products. At the same time, the Redmond company has released an optional security update addressing a vulnerability in Secure Boot that has been exploited in the wild through the BlackLotus UEFI malware, affecting even up-to-date Windows systems. This affects all supported versions of Windows 11 and Windows 10 and is tracked under CVE-2023-24932. Ironically, the main purpose of Secure Boot is to protect your PC from loading any untrusted code between the time you power it on and the point where Windows takes control. In other words, it is supposed to prevent hackers who gain physical access to your machine from injecting booby-tapped code known as a "bootkit" that modifies the startup process. This exploit is known as an "evil cleaner" attack, and allows a malicious actor to introduce malware that can log anything you type and extract it later with very little effort. It can be as simple as booting your machine with a USB drive and letting an automated script do all the work. Microsoft explains that all Windows systems with Secure Boot enabled are affected by the new flaw, including on-premises devices, virtual machines, and even cloud-based devices. It also affects devices running any major Linux distributions, and we're told a fix is in the works. That said, Microsoft is taking a phased approach to address this vulnerability to minimize disruption and simplify deployment for large organizations. This means the fix is already present in the latest Patch Tuesday update, but for now it requires some manual steps to enable it: 1. Install the monthly servicing update released on May 9 or later on all of your Windows devices and reboot them before moving on to the next step. 2. Update any bootable media and full backups of Windows you have to ensure they all have the fix for CVE-2023-24932. 3. Apply the Windows Boot Manager revocations to fully protect your systems from attacks that exploit the new vulnerability. As part of the second phase, Microsoft will release new guidance on July 11, 2023 with simplified update options that achieve the same level of protection against this attack. The final phase will start sometime in the first quarter of 2024, and it will see the fix for CVE-2023-24932 as well as the Windows Boot Manager revocations applied to all supported Windows systems automatically. It's worth noting that once you deploy all the mitigations for the new flaw on a system, you won't be able to revert those changes. Also, to find out if Secure Boot is enabled on your device, simply open the command prompt and run the "msinfo32," which opens System Information. You should be able to find an entry called "Secure Boot State" in the System Summary section. Masthead credit: FLY:D
Operating Systems
If you're using Google Chrome or a Chromium-based browser -- whether on MacOS, Windows or Linux -- it's time to check for a critical security update. On Friday, Google released a Chrome update to patch a significant vulnerability that is actively being exploited in ongoing cyberattacks. Google urged users on all operating systems to update Chrome as soon as possible.  The security lapse involves a collection of back-end libraries called Mojo, that are used by Chromium-based browsers. The zero-day vulnerability is classified as high severity and has been labeled CVE-2022-307. Google's update patch fixes the vulnerability and updates your current version of Chrome to version 105.0.5195.102. If you haven't applied a recent update -- or if your updates aren't automatically enabled -- here's how to check your version of Chrome and get updated quickly. Read more: Change These Browser Settings Right Now to Boost Your PrivacyHow to update Chrome on Android By default, Android phones and tablets are set to allow Google Chrome to automatically check for and install updates. If you've disabled this setting, you can easily re-enable it by opening your Play Store app, selecting Google Chrome, then tapping the three-dot menu on the app's Play Store page to open your update settings. Here's how to check whether your Google Chrome app is updated in Android. 1. Open your Play Store app. In the top right corner, tap your profile icon. 2. Tap Manage apps & device to bring up the Overview tab3. The second option on the Overview tab will either say All apps up to date or Updates available. If you see Updates Available, tap it.4. In the list of apps that appears, find Google Chrome. Beside the app's name, tap Update.How to update Chrome on iPhone or iPadFor App Store users, Google Chrome should be automatically set to search for and install app updates. Here's how to manually check whether updates have been applied. 1. Open the App Store app on your iPhone or iPad.2. Tap Profile Properties in the top right corner, then scroll down to Available Updates.3. Search for Google Chrome. If Chrome is listed, tap Update to install the latest browser updates. You may be asked to provide the App Store with your Apple ID and password. If so, supply them and the updates will begin downloading and installing. On your iPhone or iPad, open the App Store.How to update Chrome on desktopWhether you're using MacOS or Windows, your Google Chrome update process is the same. Here's how to check for updates and get them installed quickly. 1. On you computer or laptop, open Google Chrome and click on the More menu found in the top right corner of the browser (it looks like three dots, stacked vertically).2. Here you'll be able to see if an update has recently been released. If you see a green icon, an update was released less than two days ago. An orange one means there's been a pending update for 4 days now. And a red icon means an update has been waiting for you for at least a week. 3. Near the bottom of the More menu, click Help and then click About Google Chrome. 4. In the new screen that opens, click Update Google Chrome button. Can't find the button? Great. That means you're already up to date. 5. If you've clicked the Update Google Chrome button, finish by clicking Relaunch. Chrome will now restart and you'll be totally up to date.
Operating Systems
Update 7/24/23 5:40pm PT: Added a statement from Google and also a full list of all impacted processors and the expected dates for patches for each model. Update 7/24/23 1:30pm PT: AMD has responded with key details and published a security advisory with the expected dates for new firmwares, many of which don't arrive until the end of the year. We have added that information to the original article below. Original Article Published 7/24/23 8:45am PT: Tavis Ormandy, a researcher with Google Information Security, posted today about a new vulnerability he independently found in AMD's Zen 2 processors. The 'Zenbleed' vulnerability spans the entire Zen 2 product stack, including AMD's EPYC data center processors and the Ryzen 3000/4000/5000 CPUs, allowing the theft of protected information from the CPU, such as encryption keys and user logins. The attack does not require physical access to the computer or server and can even be executed via javascript on a webpage. AMD didn't have an advisory ready at the time of publication, but the company did add the AMD-SB-7008 Bulletin several hours later. AMD has patches ready for its EPYC 7002 'Rome' processors now, but it will not patch its consumer Zen 2 Ryzen 3000, 4000, and some 5000-series chips until November and December of this year. AMD's processors used in the PS5, Xbox Series X and S, and Steam Deck are all also powered by Zen 2 chips, but it remains unclear if those are impacted. We're following up for more details. We have added details further below about mitigation schedules. AMD hasn't given specific details of any performance impacts but did issue the following statement to Tom's Hardware: “Any performance impact will vary depending on workload and system configuration. AMD is not aware of any known exploit of the described vulnerability outside the research environment.” AMD's statement implies there will be some performance impact from the patches, but we'll have to conduct independent benchmarks when the patches arrive for the consumer Ryzen products. In the meantime, we've asked AMD for any ballpark figures it can share. The Zenbleed vulnerability is filed as CVE-2023-20593 and allows data exfiltration (theft) at a rate of 30kb per core, per second, thus providing adequate throughput to steal sensitive information flowing through the processor. This attack works across all software running on the processor, including virtual machines, sandboxes, containers, and processes. The ability for this attack to read data across virtual machines is particularly threatening for cloud service providers and those who use cloud instances. The attack can be accomplished via unprivileged arbitrary code execution. Ormandy has posted a security research repository and code for the exploit. The attack works by manipulating the register files to force a mispredicted command (meaning it eploits the speculative execution engine), as described below: "The bug works like this, first of all you need to trigger something called the XMM Register Merge Optimization2, followed by a register rename and a mispredicted vzeroupper. This all has to happen within a precise window to work. We now know that basic operations like strlen, memcpy and strcmp will use the vector registers - so we can effectively spy on those operations happening anywhere on the system! It doesn’t matter if they’re happening in other virtual machines, sandboxes, containers, processes, whatever! This works because the register file is shared by everything on the same physical core. In fact, two hyperthreads even share the same physical register file," says Ormandy. AMD describes the exploit much more simply, saying, "Under specific microarchitectural circumstances, a register in “Zen 2” CPUs may not be written to 0 correctly. This may cause data from another process and/or thread to be stored in the YMM register, which may allow an attacker to potentially access sensitive information." Ormandy says the bug can be patched through a software approach for multiple operating systems (e.g., Windows -"you can set the chicken bit DE_CFG[9]"), but this might result in a performance penalty. Ormandy says it is highly recommended to get the microcode update, but his post also has examples of software mitigations for other operating systems, too. Here's a list of the impacted processors, and the schedule for the release of the AGESA versions to OEMs: |Processor||Agesa Firmware||Availability to OEMs||Microcode| |2nd-Gen AMD EPYC Rome Processors||RomePI 1.0.0.H||Now||0x0830107A| |Ryzen 3000 Series “Matisse”||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Target Dec 2023 for both||?| |Ryzen 4000 Series "Renoir" AM4||ComboAM4v2PI_1.2.0.C||Target Dec 2023||?| |Threadripper 3000-Series "Caslle Peak"||CastlePeakPI-SP3r3 1.0.0.A||Target Oct 2023||?| |Threadripper PRO 3000WX-Series "Castle Peak"||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.7||Target Nov 2023 | Target Dec 2023||?| |Ryzen 5000 Series Mobile "Lucienne"||CezannePI-FP6_1.0.1.0||Target Dec 2023||?| |Ryzen 4000 Series Mobile "Renoir"||RenoirPI-FP6_1.0.0.D||Target Nov 2023||?| |Ryzen 7020 Series "Mendocino"||MendocinoPI-FT6_1.0.0.6||Target Dec 2023||?| Below, we have a more detailed list with the model number of each impacted chip and the expected data for the new AGESA to arrive. AMD's AGESA is a code foundation upon which the OEMs build BIOS revisions. You will need to update to a BIOS with the above-listed AGESA code, or newer, to patch your system. “We are aware of the AMD hardware security vulnerability described in CVE-2023-20593, which was discovered by Tavis Ormandy, a Security Researcher at Google, and we have worked with AMD and industry partners closely. We have worked to address the vulnerability across Google platforms.” - Google spokesperson to Tom's Hardware. Ormandy says he reported the issue to AMD on May 15, 2023, but it still remains unclear if this was a coordinated disclosure — AMD didn't seem prepared for the announcement. Ormandy also credits his colleagues; "I couldn’t have found it without help from my colleagues, in particular Eduardo Vela Nava and Alexandra Sandulescu. I also had help analyzing the bug from Josh Eads." |Desktop CPU||New Agesa Firmware Version||Patch Due| |Ryzen 3 3100||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 3 3300X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 3 4100||ComboAM4v2PI_1.2.0.C||Nov 2023| |Ryzen 3 4300G||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 3 4300GE||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 4700S||ComboAM4v2PI_1.2.0.C||Nov 2023| |Ryzen 5 3500||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 5 3500X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 5 3600||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 5 3600X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 5 3600XT||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 5 4500||ComboAM4v2PI_1.2.0.C||Nov 2023| |Ryzen 5 4600G||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 5 4600GE||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 7 3700X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 7 3800X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 7 3800XT||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 7 4700G||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 7 4700GE||ComboAM4v2PI_1.2.0.C||Dec 2023| |Ryzen 9 3900||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 9 3900X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 9 3900XT||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen 9 3950X||ComboAM4v2PI_1.2.0.C | ComboAM4PI_1.0.0.C||Dec 2023| |Ryzen Threadripper 3960X||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.9||Nov 2023 / Dec 2023| |Ryzen Threadripper 3970X||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.8||Nov 2023 / Dec 2023| |Ryzen Threadripper 3990X||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.7||Nov 2023 / Dec 2023| |Ryzen Threadripper Pro 3945WX||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.13||Nov 2023 / Dec 2023| |Ryzen Threadripper Pro 3955WX||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.12||Nov 2023 / Dec 2023| |Ryzen Threadripper Pro 3975WX||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.10||Nov 2023 / Dec 2023| |Ryzen Threadripper Pro 3995WX||CastlePeakWSPI-sWRX8 1.0.0.C | ChagallWSPI-sWRX8 1.0.0.11||Nov 2023 / Dec 2023| |Mobile CPU||New Agesa Firmware Version||Patch Due| |Ryzen 3 4300U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 3 5300U||CezannePI-FP6_1.0.1.0||Dec 2023| |Ryzen 3 7320U||MendocinoPI-FT6_1.0.0.6||Dec 2023| |Ryzen 5 4500U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 5 4600H||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 5 4600HS||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 5 4600U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 5 4680U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 5 5500U||CezannePI-FP6_1.0.1.0||Dec 2023| |Ryzen 5 7520U||MendocinoPI-FT6_1.0.0.6||Dec 2023| |Ryzen 7 4700U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 7 4800U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 7 4980U||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 7 5700U||CezannePI-FP6_1.0.1.0||Dec 2023| |Ryzen 9 4900H||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 9 4800H||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 9 4800HS||RenoirPI-FP6_1.0.0.D||Nov 2023| |Ryzen 9 4900HS||RenoirPI-FP6_1.0.0.D||Nov 2023| |Server CPU||New Agesa Firmware Version||Patch Available| |EPYC 7232P||RomePI 1.0.0.H||Now| |EPYC 7252||RomePI 1.0.0.H||Now| |EPYC 7262||RomePI 1.0.0.H||Now| |EPYC 7272||RomePI 1.0.0.H||Now| |EPYC 7282||RomePI 1.0.0.H||Now| |EPYC 7302||RomePI 1.0.0.H||Now| |EPYC 7302P||RomePI 1.0.0.H||Now| |EPYC 7352||RomePI 1.0.0.H||Now| |EPYC 7402||RomePI 1.0.0.H||Now| |EPYC 7402P||RomePI 1.0.0.H||Now| |EPYC 7452||RomePI 1.0.0.H||Now| |EPYC 7502||RomePI 1.0.0.H||Now| |EPYC 7502P||RomePI 1.0.0.H||Now| |EPYC 7532||RomePI 1.0.0.H||Now| |EPYC 7542||RomePI 1.0.0.H||Now| |EPYC 7552||RomePI 1.0.0.H||Now| |EPYC 7642||RomePI 1.0.0.H||Now| |EPYC 7662||RomePI 1.0.0.H||Now| |EPYC 7702||RomePI 1.0.0.H||Now| |EPYC 7702P||RomePI 1.0.0.H||Now| |EPYC 7742||RomePI 1.0.0.H||Now| |EPYC 7F32||RomePI 1.0.0.H||Now| |EPYC 7F52||RomePI 1.0.0.H||Now| |EPYC 7F72||RomePI 1.0.0.H||Now| |EPYC 7H12||RomePI 1.0.0.H||Now|
Operating Systems
Yes! This is Chrome OS’s Virtual Desks you’re looking at! Image: GoogleGoogle’s cloud-based operating system has come a long way since its inception. Every new software update seems to bring it closer to parity with Microsoft’s Windows and Apple’s Mac operating systems. A new ChromeOS update, due this fall, brings long-awaited features like native PDF and video editing. It also adds virtual desktops, which have long been a staple of Windows and macOS. It might just be what helps convince some folks to choose a Chromebook as a primary computer.Virtual desks, as ChromeOS calls it, will make it easier to group apps you’re using so that you’re not dealing with errant windows. Once the update hits in late September, you’ll be able to save the different groups and surface them back up at will. This includes all windows and apps within the desk. It’ll be interesting to see how Chrome OS handles bundling in Android apps and Chrome windows as part of the grouping. If you work on your Chromebook, you likely let out a big, Charlie Brown-esque ARGH! when you found out there is no built-in PDF annotator on ChromeOS. Thankfully, the next update is bundling this ability directly into the Gallery app, which is your Chromebook’s default media app. You’ll be able to fill out forms, highlight, sign documents, and add text. Previously, if you wanted to do any of this, you had to find a worthy Chrome extension (I still use Kami) or some other service to do something straightforward, like sign a contract. If you’re also managing your work schedule using a Chromebook, the software will offer better Calendar integration and push notifications after the update. You’ll be able to peep on events straight from the pop-up in the taskbar rather than navigating to the Calendar page in your browser. Google Calendar will have a more streamlined experience when dealing with things like event invites. Image: GoogleG/O Media may get a commission30% offCanon Pixma MG3620A college essentialPart of Amazon’s Off to College Essentials, this Canon Pixma uses wi-fi to print from your phone, laptop, or tabletGoogle’s added a few other minor feature additions to ChromeOS to help streamline the overall experience. If you’re in a classroom or maybe even presenting a “look back” slideshow for friends and family, now you can easily cast your ChromeOS screen to a nearby compatible display. You’ll be able to record, view, and then share transcribed videos after the presentation.If you use a stylus-enabled Chromebook, the update will add the Cursive app to the desktop so you can take handwritten notes. New light and dark themes are also coming through that can help stylize your desktop. You can even choose a wallpaper from one of your Google Photos albums and have it dynamically change daily. All these new features will hit ChromeOS sometime in August. The Virtual Desks feature will roll out in late September. Making movies with your ChromebookGoogle Photos’ built-in video editor is coming first to Chromebooks this fall. Image: GoogleNo one thinks of the Chromebook as a video editor, per se, but it’s nice that you’ll soon be able to string together clips accumulated in your Google Photos album. This feature is coming to other devices down the line—presumably, Android smartphones will have access to the feature through the corresponding Photos app.Like the automatic album-making feature already available in Google Photos, the app will let you easily construct a “movie” from a bundle of clips. All you’ll have to do is choose a theme and a couple of clips, and then let the video maker run its magic. You’ll also be able to make your movie by selecting clips, arranging them in order, and editing them down. You’ll be able to apply different Google Photos filters, too, like the Real Tone Filter. For serious video editing endeavors, Google announced that LumaFusion, a video app popular with iPad users, is also making its way to Chromebooks. The app is much more sophisticated than this simple video editing suite, though you’re likely to have to pay for the app before you can access its features. Google doesn’t have an official launch date for ChromeOS’s new video editing capabilities. Only that they’ll be available first on Chromebook this fall.
Operating Systems
Apple's iOS 16, iPadOS 16, and macOS 13 operating systems are all due to be replaced with new versions in the next two or three months, but some bugs can't wait for a whole new release. The company has released iOS/iPadOS 16.6 and macOS 13.5 to fix several "actively exploited" security bugs, plus a handful of other security fixes for problems that have been reported to Apple but aren't being exploited in the wild yet. The release notes also mention unspecified "bug fixes" for each OS. The new updates don't add anything by way of new features—at least, there aren't any mentioned in the release notes. This will likely be the case for most iOS 16 and macOS 13 Ventura updates going forward, as Apple shifts its focus to newer operating systems. The iOS/iPadOS 17 and macOS 14 Sonoma updates should be available in September or October, if Apple sticks to its historical release schedule. The public betas were released earlier this month. Several of the security fixes in these updates were originally part of a Rapid Response security update for iOS 16.5.1 and macOS 13.4.1. The original version of that update was pulled post-release after it broke a few major websites on devices that installed it, but a working version with the same fixes was released soon after. Apple also released several security-only updates for older devices that can't run its current operating systems. The macOS Big Sur 11.7.9 update and the macOS Monterey 12.6.8 update will both run on any Mac still running either of those operating systems, regardless of whether it supports macOS 13. The iOS and iPadOS 15.7.8 updates only support older devices like the iPhone 6S, iPad Air 2, and first-generation iPhone SE that can't be upgraded to iOS 16.
Operating Systems
It happened a quarter of a century ago. The New York Times wrote that "An internal memorandum reflecting the views of some of Microsoft's top executives and software development managers reveals deep concern about the threat of free software and proposes a number of strategies for competing against free programs that have recently been gaining in popularity." The memo warns that the quality of free software can meet or exceed that of commercial programs and describes it as a potentially serious threat to Microsoft. The document was sent anonymously last week to Eric Raymond, a key figure in a loosely knit group of software developers who collaboratively create and distribute free programs ranging from operating systems to Web browsers. Microsoft executives acknowledged that the document was authentic... In addition to acknowledging that free programs can compete with commercial software in terms of quality, the memorandum calls the free software movement a "long-term credible" threat and warns that employing a traditional Microsoft marketing strategy known as "FUD," an acronym for "fear, uncertainty and doubt," will not succeed against the developers of free software. The memorandum also voices concern that Linux is rapidly becoming the dominant version of Unix for computers powered by Intel microprocessors. The competitive issues, the note warns, go beyond the fact that the software is free. It is also part of the open-source software, or O.S.S., movement, which encourages widespread, rapid development efforts by making the source code — that is, the original lines of code written by programmers — readily available to anyone. This enables programmers the world over to continually write or suggest improvements or to warn of bugs that need to be fixed. The memorandum notes that open software presents a threat because of its ability to mobilize thousands of programmers. "The ability of the O.S.S. process to collect and harness the collective I.Q. of thousands of individuals across the Internet is simply amazing," the memo states. "More importantly, O.S.S. evangelization scales with the size of the Internet much faster than our own evangelization efforts appear to scale." Back in 1998, Slashdot's CmdrTaco covered the whole brouhaha — including this CNN article: A second internal Microsoft memo on the threat Linux poses to Windows NT calls the operating system "a best-of-breed Unix" and wonders aloud if the open-source operating system's momentum could be slowed in the courts. As with the first "Halloween Document," the memo — written by product manager Vinod Valloppillil and another Microsoft employee, Josh Cohen — was obtained by Linux developer Eric Raymond and posted on the Internet. In it, Cohen and Valloppillil, who also authored the first "Halloween Document," appear to suggest that Microsoft could slow the open-source development of Linux with legal battles. "The effect of patents and copyright in combating Linux remains to be investigated," the duo wrote. Microsoft's slogain in 1998 was "Where do you want to go today?" So Eric Raymond published the documents on his web site under the headline "Where will Microsoft try to drag you today? Do you really want to go there?" 25 years later, and it's all still up there and preserved for posterity on Raymond's web page — a collection of leaked Microsoft documents and related materials known collectively as "the Halloween documents." And Raymond made a point of thanking the writers of the documents, "for authoring such remarkable and effective testimonials to the excellence of Linux and open-source software in general." Thanks to long-time Slashdot reader mtaht for remembering the documents' 25th anniversary... In addition to acknowledging that free programs can compete with commercial software in terms of quality, the memorandum calls the free software movement a "long-term credible" threat and warns that employing a traditional Microsoft marketing strategy known as "FUD," an acronym for "fear, uncertainty and doubt," will not succeed against the developers of free software. The memorandum also voices concern that Linux is rapidly becoming the dominant version of Unix for computers powered by Intel microprocessors. The competitive issues, the note warns, go beyond the fact that the software is free. It is also part of the open-source software, or O.S.S., movement, which encourages widespread, rapid development efforts by making the source code — that is, the original lines of code written by programmers — readily available to anyone. This enables programmers the world over to continually write or suggest improvements or to warn of bugs that need to be fixed. The memorandum notes that open software presents a threat because of its ability to mobilize thousands of programmers. "The ability of the O.S.S. process to collect and harness the collective I.Q. of thousands of individuals across the Internet is simply amazing," the memo states. "More importantly, O.S.S. evangelization scales with the size of the Internet much faster than our own evangelization efforts appear to scale." Back in 1998, Slashdot's CmdrTaco covered the whole brouhaha — including this CNN article: A second internal Microsoft memo on the threat Linux poses to Windows NT calls the operating system "a best-of-breed Unix" and wonders aloud if the open-source operating system's momentum could be slowed in the courts. As with the first "Halloween Document," the memo — written by product manager Vinod Valloppillil and another Microsoft employee, Josh Cohen — was obtained by Linux developer Eric Raymond and posted on the Internet. In it, Cohen and Valloppillil, who also authored the first "Halloween Document," appear to suggest that Microsoft could slow the open-source development of Linux with legal battles. "The effect of patents and copyright in combating Linux remains to be investigated," the duo wrote. Microsoft's slogain in 1998 was "Where do you want to go today?" So Eric Raymond published the documents on his web site under the headline "Where will Microsoft try to drag you today? Do you really want to go there?" 25 years later, and it's all still up there and preserved for posterity on Raymond's web page — a collection of leaked Microsoft documents and related materials known collectively as "the Halloween documents." And Raymond made a point of thanking the writers of the documents, "for authoring such remarkable and effective testimonials to the excellence of Linux and open-source software in general." Thanks to long-time Slashdot reader mtaht for remembering the documents' 25th anniversary...
Operating Systems
Microsoft will finally stop forcing Windows 11 users in Europe into Edge if they click a link from the Windows Widgets panel or from search results. The software giant has started testing the changes to Windows 11 in recent test builds of the operating system, but the changes are restricted to countries within the European Economic Area (EEA). “In the European Economic Area (EEA), Windows system components use the default browser to open links,” reads a change note from a Windows 11 test build released to Dev Channel testers last month. I asked Microsoft to comment on the changes and, in particular, why they’re only being applied to EU countries. Microsoft refused to comment. Microsoft has been ignoring default browser choices in its search experience in Windows 10 and the taskbar widget that forces users into Edge if they click a link instead of their default browser. Windows 11 continued this trend, with search still forcing users into Edge and a new dedicated widgets area that also ignores the default browser setting. As search and Windows Widgets are both system-level components in Windows 11, they will soon use the default browser to open links in EU countries. Previously, you could use third-party apps like EdgeDeflector to bypass Microsoft’s browser restrictions and open Start menu search results in your default browser of choice. Microsoft shut this workaround down nearly two years ago. Microsoft quietly announced its latest Windows 11 changes just days before it also announced it would start unbundling Teams from its Microsoft 365 and Office 365 productivity suites in EU markets in October. Microsoft’s Teams changes are designed to avoid further antitrust scrutiny, after the European Commission opened a formal antitrust investigation into Microsoft’s bundling of its Teams software with the Office productivity suite in July. The EU’s investigation was sparked by a complaint from rival Slack, which alleged that Microsoft had “illegally tied” its Microsoft Teams product to Office and is “force installing it for millions, blocking its removal, and hiding the true cost to enterprise customers.” It’s not clear if the Windows 11 changes are related to this EU investigation or whether Microsoft has faced further complaints from rivals about the behavior of its default apps in Windows. Microsoft initially made it difficult to switch default browsers in Windows 11, triggering complaints from rivals before the company eventually backed down. It’s hard to imagine that Microsoft is making these Windows 11 changes specifically in EU countries out of choice, though. They are likely related to the EU’s Digital Markets Act, which comes into effect in March 2024. Platforms like Windows will be required to meet a slew of interoperability and competition rules, including allowing users “to easily un-install pre-installed apps or change default settings on operating systems, virtual assistants, or web browsers that steer them to the products and services of the gatekeeper and provide choice screens for key services.”
Operating Systems
WHAT TOOK YOU SO LONG? — It only took 50 years, but there's finally a replacement that's safer and easier to use. Gertty Images For years, Big Tech has insisted that the death of the password is right around the corner. For years, those assurances have been little more than empty promises. The password alternatives—such as pushes, OAUTH single-sign ons, and trusted platform modules—introduced as many usability and security problems as they solved. But now, we’re finally on the cusp of a password alternative that’s actually going to work. The new alternative is known as passkeys. Generically, passkeys refer to various schemes for storing authenticating information in hardware, a concept that has existed for more than a decade. What’s different now is that Microsoft, Apple, Google, and a consortium of other companies have unified around a single passkey standard shepherded by the FIDO Alliance. Not only are passkeys easier for most people to use than passwords; they are also completely resistant to credential phishing, credential stuffing, and similar account takeover attacks. On Monday, PayPal said US-based users would soon have the option of logging in using FIDO-based passkeys, joining Kayak, eBay, Best Buy, CardPointers, and WordPress as online services that will offer the password alternative. In recent months, Microsoft, Apple, and Google have all updated their operating systems and apps to enable passkeys. Passkey support is still spotty. Passkeys stored on iOS or macOS will work on Windows, for instance, but the reverse isn’t yet available. In the coming months, all of that should be ironed out, though. What, exactly, are passkeys? FIDO AlliancePasskeys work almost identically to the FIDO authenticators that allow us to use our phones, laptops, computers, and Yubico or Feitian security keys for multi-factor authentication. Just like the FIDO authenticators stored on these MFA devices, passkeys are invisible and integrate with Face ID, Windows Hello, or other biometric readers offered by device makers. There’s no way to retrieve the cryptographic secrets stored in the authenticators short of physically dismantling the device or subjecting it to a jailbreak or rooting attack. Even if an adversary was able to extract the cryptographic secret, they still would have to supply the fingerprint, facial scan, or—in the absence of biometric capabilities—the PIN that’s associated with the token. What’s more, hardware tokens use FIDO’s Cross-Device Authentication flow, or CTAP, which relies on Bluetooth Low Energy to verify the authenticating device is in close physical proximity to the device trying to log in. Until now, FIDO-based security keys have been used mainly to provide MFA, short for multi-factor authentication, which requires someone to present a separate factor of authentication in addition to the correct password. The additional factors offered by FIDO typically come in the form of something the user has—a smartphone or computer containing the hardware token—and something the user is—a fingerprint, facial scan, or other biometric that never leaves the device. So far, attacks against FIDO-compliant MFA have been in short supply. An advanced credential phishing campaign that recently breached Twilio and other top-tier security companies, for instance, failed against Cloudflare for one reason: Unlike the other targets, Cloudflare used FIDO-compliant hardware tokens that were immune to the phishing technique the attackers used. The victims who were breached all relied on weaker forms of MFA. But whereas hardware tokens can provide one or more factors of authentication in addition to a password, passkeys rely on no password at all. Instead, passkeys roll multiple authentication factors—typically the phone or laptop and the facial scan or fingerprint of the user—into a single package. Passkeys are managed by the device OS. At the user’s option, they can also be synced through end-to-end encryption with a user’s other devices using a cloud service provided by Apple, Microsoft, Google, or another provider. Passkeys are “discoverable,” meaning an enrolled device can automatically push one through an encrypted tunnel to another enrolled device that’s trying to sign in to one of the user’s site accounts or apps. When signing in, the user authenticates themselves using the same biometric or on-device password or PIN for unlocking their device. This mechanism completely replaces the traditional username and password and provides a much easier user experience. “Users no longer need to enroll each device for each service, which has long been the case for FIDO (and for any public key cryptography)," said Andrew Shikiar, FIDO's executive director and chief marketing officer. "By enabling the private key to be securely synced across an OS cloud, the user needs to only enroll once for a service, and then is essentially pre-enrolled for that service on all of their other devices. This brings better usability for the end-user and—very significantly—allows the service provider to start retiring passwords as a means of account recovery and re-enrollment.” Ars Review Editor Ron Amadeo summed things up well last week when he wrote: "Passkeys just trade WebAuthn cryptographic keys with the website directly. There's no need for a human to tell a password manager to generate, store, and recall a secret—that will all happen automatically, with way better secrets than what the old text box supported, and with uniqueness enforced." Page: 1 2 Next →
Operating Systems
TL;DR: As of November 15, get Microsoft Windows 10 Pro for only $24.97 — that's 87% off. In the realm of operating systems, Microsoft Windows 10 Pro combines cutting-edge features with a user-friendly interface. Whether you're a business or creative professional or just someone who values quality security, Windows 10 Pro was designed to meet your diverse needs. And ahead of the busy holiday season, you can get Windows 10 Pro for just $24.97 (reg. $199) when you order through December 3. Engineered with professionals in mind, Windows 10 Pro features things like BitLocker encryption to safeguard your sensitive data and Azure Active Directory for simplified log-in and password management and seamless connectivity, both of which contribute to a more efficient and secure work environment. Since Windows 10 Pro has been around longer than 11, it can be a more stable OS option that's compatible with the legacy software and hardware that might not work with Windows 11. And on the security front, Windows 10 Pro comes with Windows Defender Antivirus, intelligent firewall protection, Windows Hello biometric login, and regular security updates, so your device is more protected against cyber threats. With this OS, you'll gain remote desktop access, which allows you to manage your work from anywhere and comes in very handy when traveling for work. You'll have access to this license on two devices, and updates are included. However, it is not compatible with Parallels Pro and Virtual Machines. Microsoft has been a powerful and famous name in computing for decades. Upgrade your computer to this business-friendly OS while it's on sale for this super-low price. Pick up Microsoft Windows 10 Pro for just $24.97 (reg. $199) for yourself or a friend when you order by December 3 at 11:59 p.m. PT. Prices subject to change.
Operating Systems
ZDNet's Steven Vaughan-Nichols shares what's new in the release of Linux 6.5: The biggest news for servers -- and cloud Linux users -- is AMD Ryzen processors' P-State support. This support should mean better performance and power use across CPU cores. Intel Alder Lake CPUs have also received improved load balancing in a related development. RISC-V architecture fans will be pleased to find Linux now has Advanced Configuration and Power Interface (ACPI) support. ACPI is used in Linux and other operating systems for power management. It's vital for laptops and other battery-powered systems. For better security, people using virtual machines or sandboxes based on Usermode Linux for testing, or running multiple versions of Linux at once, now have Landlock support. Landock is a Linux Security Module that enables applications to sandbox themselves by selecting access rights to directories. It's designed to be used by unprivileged processes while following the system security policy. To make talking with the rest of the world easier, Linux 6.5 now supports USB 4v2. This new USB-C standard will support up to an eye-watering 120Gbps. And while we're still getting used to Wi-Fi 6E, the Wi-Fi Alliance is already working on bringing us Wi-Fi 7. When Wi-Fi 7 arrives, with its theoretical maximum speed of 46Gbps, Linux will be ready. As usual, the new Linux has many more built-in audio and graphics drivers. The Bcachefs filesystem didn't make it into Linux 6.5, notes Vaughan-Nichols. "While the Bcachefs filesystem looks good, there's been a lot of developers fighting about the development process. These personal arguments have led Torvalds to decide not to incorporate Bcachefs into Linux 6.5." Linus Torvalds announced Linux 6.5's delivery in a brief post on August 27. For better security, people using virtual machines or sandboxes based on Usermode Linux for testing, or running multiple versions of Linux at once, now have Landlock support. Landock is a Linux Security Module that enables applications to sandbox themselves by selecting access rights to directories. It's designed to be used by unprivileged processes while following the system security policy. To make talking with the rest of the world easier, Linux 6.5 now supports USB 4v2. This new USB-C standard will support up to an eye-watering 120Gbps. And while we're still getting used to Wi-Fi 6E, the Wi-Fi Alliance is already working on bringing us Wi-Fi 7. When Wi-Fi 7 arrives, with its theoretical maximum speed of 46Gbps, Linux will be ready. As usual, the new Linux has many more built-in audio and graphics drivers. The Bcachefs filesystem didn't make it into Linux 6.5, notes Vaughan-Nichols. "While the Bcachefs filesystem looks good, there's been a lot of developers fighting about the development process. These personal arguments have led Torvalds to decide not to incorporate Bcachefs into Linux 6.5." Linus Torvalds announced Linux 6.5's delivery in a brief post on August 27.
Operating Systems
Microsoft on Tuesday disclosed it took steps to suspend accounts that were used to publish malicious drivers that were certified by its Windows Hardware Developer Program were used to sign malware. The tech giant said its investigation revealed the activity was restricted to a number of developer program accounts and that no further compromise was detected. Cryptographically signing malware is concerning not least because it not only undermines a key security mechanism but also allows threat actors to subvert traditional detection methods and infiltrate target networks to perform highly privileged operations. The probe, Redmond stated, was initiated after it was notified of rogue drivers being used in post-exploitation efforts, including deploying ransomware, by cybersecurity firms Mandiant, SentinelOne, and Sophos on October 19, 2022. One notable aspect of these attacks was that the adversary had already obtained administrative privileges on compromised systems before using the drivers. "Several developer accounts for the Microsoft Partner Center were engaged in submitting malicious drivers to obtain a Microsoft signature," Microsoft explained. "A new attempt at submitting a malicious driver for signing on September 29, 2022, led to the suspension of the sellers' accounts in early October." According to findings from Sophos, threat actors affiliated with the Cuba ransomware (aka COLDDRAW) planted a malicious signed driver in a failed attempt at disabling endpoint detection tools via a novel malware loader dubbed BURNTCIGAR, which was first revealed by Mandiant in February 2022. The company also identified three variants of the driver signed by code signing certificates that belong to two Chinese companies, Zhuhai Liancheng Technology and Beijing JoinHope Image Technology. The reasoning behind using signed drivers is that it offers a way for threat actors to get around crucial security measures which require kernel-mode drivers to be signed in order for Windows to load the package. What's more, the technique misuses the de facto trust security tools place in Microsoft-attested drivers to their advantage. "Threat actors are moving up the trust pyramid, attempting to use increasingly more well-trusted cryptographic keys to digitally sign their drivers," Sophos researchers Andreas Klopsch and Andrew Brandt said. "Signatures from a large, trustworthy software publisher make it more likely the driver will load into Windows without hindrance." Google-owned Mandiant, in a coordinate disclosure, said it observed a financially motivated threat group known as UNC3944 employing a loader named STONESTOP to install a malicious driver dubbed POORTRY that's designed to terminate processes associated with security software and delete files. Stating that it has "continually observed threat actors use compromised, stolen, and illicitly purchased code-signing certificates to sign malware," the threat intelligence and incident response firm noted that "several distinct malware families, associated with distinct threat actors, have been signed with this process." This has given rise to the possibility that these hacking groups could be leveraging a criminal service for code signing (i.e., malicious driver signing as a service), wherein the provider gets the malware artifacts signed through Microsoft's attestation process on behalf of the actors. STONESTOP and POORTRY are said to have been used by UNC3944 in attacks aimed at telecommunication, BPO, MSSP, financial services, cryptocurrency, entertainment, and transportation sectors, SentinelOne said, adding a different threat actor utilized a similar signed driver that resulted in the deployment of Hive ransomware. Microsoft has since revoked the certificates for impacted files and suspended the partners' seller accounts to counter the threats as part of its December 2022 Patch Tuesday update. This is not the first time digital certificates have been abused to sign malware. Last year, a Netfilter driver certified by Microsoft turned out to be a malicious Windows rootkit that was observed communicating with command-and-control (C2) servers located in China. It's not a Windows-only phenomenon, however, as Google this month published findings that compromised platform certificates managed by Android device makers including Samsung and LG had been used to sign malicious apps distributed through unofficial channels. The development also comes amid a broader abuse of drivers to sabotage security software in recent months. The attack, referred to as Bring Your Own Vulnerable Driver (BYOVD), involves exploiting legitimate vulnerable drivers to escalate privileges and execute post-compromise actions. Microsoft, in late October, said it's enabling the vulnerable driver blocklist (DriverSiPolicy.p7b) by default for all devices with Windows 11 2022 update, alongside validating that it's the same across Windows versions, following an Ars Technica report that highlighted inconsistencies in updating the blocklist for Windows 10 machines. "Code signing mechanisms are an important feature in modern operating systems," SentinelOne said. "The introduction of driver signing enforcement was key in stemming the tide of rootkits for years. The receding effectiveness of code signing represents a threat to security and verification mechanisms at all OS layers." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
Microsoft today released updates to fix more than five dozen security holes in its Windows operating systems and related software, including three “zero day” vulnerabilities that Microsoft warns are already being exploited in active attacks. The zero-day threats targeting Microsoft this month include CVE-2023-36025, a weakness that allows malicious content to bypass the Windows SmartScreen Security feature. SmartScreen is a built-in Windows component that tries to detect and block malicious websites and files. Microsoft’s security advisory for this flaw says attackers could exploit it by getting a Windows user to click on a booby-trapped link to a shortcut file. Kevin Breen, senior director of threat research at Immersive Labs, said emails with .url attachments or logs with processes spawning from .url files “should be a high priority for threat hunters given the active exploitation of this vulnerability in the wild.” The second zero day this month is CVE-2023-36033, which is a vulnerability in the “DWM Core Library” in Microsoft Windows that was exploited in the wild as a zero day and publicly disclosed prior to patches being available. It affects Microsoft Windows 10 and later, as well as Microsoft Windows Server 2019 and subsequent versions. “This vulnerability can be exploited locally, with low complexity and without needing high-level privileges or user interaction,” said Mike Walters, president and co-founder of the security firm Action1. “Attackers exploiting this flaw could gain SYSTEM privileges, making it an efficient method for escalating privileges, especially after initial access through methods like phishing.” The final zero day in this month’s Patch Tuesday is a problem in the “Windows Cloud Files Mini Filter Driver” tracked as CVE-2023-36036 that affects Windows 10 and later, as well as Windows Server 2008 at later. Microsoft says it is relatively straightforward for attackers to exploit CVE-2023-36036 as a way to elevate their privileges on a compromised PC. Beyond the zero day flaws, Breen said organizations running Microsoft Exchange Server should prioritize several new Exchange patches, including CVE-2023-36439, which is a bug that would allow attackers to install malicious software on an Exchange server. This weakness technically requires the attacker to be authenticated to the target’s local network, but Breen notes that a pair of phished Exchange credentials will provide that access nicely. “This is typically achieved through social engineering attacks with spear phishing to gain initial access to a host before searching for other vulnerable internal targets – just because your Exchange Server doesn’t have internet-facing authentication doesn’t mean it’s protected,” Breen said. Finally, the SANS Internet Storm Center points to two additional bugs patched by Microsoft this month that aren’t yet showing signs of active exploitation but that were made public prior to today and thus deserve prioritization. Those include: CVE-2023-36038, a denial of service vulnerability in ASP.NET Core, with a CVSS score of 8.2; and CVE-2023-36413: A Microsoft Office security feature bypass. Exploiting this vulnerability will bypass the protected mode when opening a file received via the web. Windows users, please consider backing up your data and/or imaging your system before applying any updates. And feel free to sound off in the comments if you experience any difficulties as a result of these patches.
Operating Systems
Apple is officially releasing the first public betas of iOS 17, iPadOS 17, watchOS 10, and macOS 14 Sonoma today, a little over a month after releasing the first developer betas at its Worldwide Developers Conference. Though it's not as big a milestone as it has been in past years—developer betas are now available to anyone who signs up for a free Apple developer account, and the builds being released today are essentially identical to the third developer betas Apple released last week—the public beta period typically signals that Apple's newest OSes are approaching the level of stability and polish needed for a public release. To get the new iOS or macOS betas, first sign up for Apple's public beta software program with your Apple ID. Then, on a compatible device, navigate to the Software Update page in the settings and opt into the beta of your choosing (there's also a separate beta track available for those continuing to test iOS 16 and macOS 13 updates). Per usual, you should make sure you have current backups before you upgrade, and don't install beta software on any devices you rely on day to day since the only way to go back to non-beta software is a full reset in recovery mode. The iOS 17 update will run on an iPhone XS, iPhone XR, or anything newer. The iPadOS 17 update requires a 6th-gen or newer iPad, a 5th-gen or newer iPad mini, a 3rd-gen or newer iPad Air, or a 2nd-gen or newer iPad Pro. The macOS Sonoma update generally requires an Intel or Apple Silicon Mac introduced in 2018 or later. WatchOS 10 and tvOS 17 will run on any devices compatible with watchOS 9 or tvOS 16. For those who install the betas, expect a relatively light year for major new features as Apple turns more of its development efforts to the new visionOS and developer tools for the upcoming Vision Pro headset. All of the operating system updates include improved autocorrect, new iMessage and AirDrop features, separate profiles for Safari, an Enhanced Private Browsing feature, and the removal of "Hey" from the "Hey Siri" activation phrase. The iOS update includes a new always-on smart display mode called StandBy for when your phone is plugged in and charging on a stand. Both iOS and iPadOS are also getting a new journaling app called Journal. The iPad will get the customizable lock screen features Apple introduced in iOS 16 last year, and Sonoma includes redesigned desktop widgets and the ability to sync iPhone widgets with your Mac, plus a new "game mode" and tools to help developers easily port their Windows games to the Mac. Some features available in the betas may not be available in the first "official" release of the operating systems this fall, and some previously announced features won't be available in the betas yet, either. At this point, it's common for Apple to hold a handful of announced features back for a later update to the operating system, giving the company more time to work on them without holding up the release of the rest of the operating system. The collaborative Freeform app, for example, was announced at WWDC in the summer of 2022 but was not added to the operating system until December of 2022, several months after the initial releases of iOS 16 and macOS 13 Ventura. Based on past years, we'd expect the iOS 17 update to roll out with Apple's next-generation iPhones at some point in September. The macOS update is more likely to be released in October, and iPadOS could be released in either September or October, depending on how far along it is (Apple delayed the release of iPadOS 16 last year, and the first version available to the public was actually iPadOS 16.1).
Operating Systems
Apple is releasing a slew of updates for its latest operating systems today, including iOS and iPadOS 17.1, macOS Sonoma 14.1, watchOS 10.1, and others. The company is also releasing security updates for a few previous-generation operating systems, so that people who aren't ready to upgrade (and older devices that can't upgrade) will still be protected from new exploits. Those updates include iOS and iPadOS 16.7.2 and 15.8, macOS Ventura 13.6.1, macOS Monterey 12.7.1, and the Safari 17.1 update for both of those macOS versions. At least for now, the iOS and iPadOS 16 updates cover older iPhones and iPads that can't run iOS 17 and newer devices whose owners simply don't want to install iOS 17 yet. Apple will eventually stop supporting newer hardware with iOS 16 security updates, but for now, the grace period is still in effect. This is the first security update that Apple has delivered for iOS 15 since mid-September, suggesting that the company plans to keep supporting 2021's iOS release with continued security updates for at least a while longer. The iOS 15.8 update will only run on phones and tablets that can't install iOS 16 or 17, including the iPhone 6S, the iPhone 7, the original iPhone SE, the iPad Air 2, and the last iPod Touch. Apple doesn’t publish official end-of-life notices for any of its software, so software updates for older OSes generally end with little notice. Apple at least behaves predictably with macOS; Apple provides security and feature updates to the current version (in this case, macOS 14 Sonoma) along with Safari and security updates to the two previous versions. This policy remains unwritten, but Apple has stuck to it for decades, so you can plan around it with some confidence. There's less of a track record for iOS and iPadOS. It used to be that Apple didn't update older versions at all, outside of extremely rare one-off fixes for specific problems. But Apple did provide regular security updates for iOS 12 for close to two years after it was replaced, the same timeline it uses for Mac updates. We haven't had another data point since then—everything that ran iOS 13 and 14 could also run iOS 15, so Apple didn't provide extended security updates for those two versions. Today's release doesn't confirm that Apple plans another full year of iOS 15 updates, but it is a sign that Apple plans to treat old iOS releases the same way it treats macOS; rolling over from 15.7.x to 15.8.x also follows the numbering pattern Apple has used for the last few macOS releases. As of May 30, Apple's statistics show that 13 percent of all active iPhones and 20 percent of active iPads were running iOS 15. Of those, a fair number are newer devices that can be updated to versions 16 and/or 17. But with Apple's sales volumes, that still leaves millions of devices that can benefit from continued iOS 15 security updates. If you hang on to hardware for a long time, or if you hand devices down to kids or other family members for extended use, it's worth keeping track of what operating systems Apple is still actively supporting. Devices that stop getting security updates will continue to function, and app developers can choose to target older iOS versions for as long as they want. But it will gradually become less safe to use them on the Internet, and new app updates and websites will gradually leave them behind. Regardless, Apple has said in the past that only its latest operating systems are guaranteed to be fully patched. Sometimes older versions get the same patches later, and sometimes they don't get patches at all, even if they are being actively updated. Case in point: the iOS 15.8 release lists a single kernel-level security problem, CVE-2023-32434, while the iOS 16.7.2 update fixes 17 vulnerabilities throughout the operating system, and iOS 17.1 fixes 21. Sometimes older OSes aren't affected by all the same vulnerabilities as newer ones, but this is also information Apple doesn't usually provide.
Operating Systems
Last week, Apple released iOS and iPadOS 16.4.1 and macOS Ventura 13.3.1 to patch two actively exploited security vulnerabilities and fix other small bugs. Today it’s following those up with iOS and iPadOS 15.7.5, macOS Monterey 12.6.5, and macOS Big Sur 11.7.6 to patch those same vulnerabilities in older devices that are still receiving software updates but aren’t capable of running the newest OSes. Mac owners will also want to install last week’s Safari 16.4.1 update. Safari is still updated separately from the rest of the OS on Macs, so the Safari update plugs one of the security holes (CVE-2023-28205, a WebKit arbitrary code execution vulnerability), and the macOS update patches the other (CVE-2023-28206, a graphics-related bug that can allow arbitrary code execution with kernel privileges). You'll be able to install the Mac updates on any Mac that's running Big Sur or Monterey, even if the hardware is capable of upgrading to Ventura. Apple is only providing iOS and iPadOS 15 updates to older devices that can’t run version 16. That list of old devices includes models like the iPhone 6S and 7, the original iPhone SE, the last iPod Touch, and the iPad Air 2 that Apple sold for several years in the mid-2010s. Apple has always provided at least a couple of years of security updates to older macOS versions, and in recent years the company has been extending the same courtesy to older iPhones and iPads. Releasing today’s security updates several days after patching the same security holes in newer OSes isn’t ideal—in theory, it could leave additional time for attackers to target those specific OS versions—but at least all currently supported operating systems can now be secured.
Operating Systems
Apple sometimes releases new operating systems without changing the system requirements—but this year isn't one of those years. The iOS 17 update will drop support for several older phones that can currently run iOS 16: 2017's iPhone 8 and iPhone 8 Plus, and the original iPhone X. Apple's system requirements list the "iPhone XS and newer," which should encompass the iPhone XR and all subsequent iPhone X-style notched iPhones, plus the 2nd- and 3rd-generation iPhone SE. The iPadOS 17 update also drops support for most of the pre-2018 devices that iPadOS 16 still supported, including the 5th-gen $329 iPad and the very first 12.9- and 9.7-inch iPad Pros from 2015 and 2016. All other iPad Pros, the third-generation iPad Air and later, and the 5th-generation iPad mini and later will all run iPadOS 17, though the older a device is, the more likely it is to miss out on a handful of newer features (like Stage Manager). iPhone 14 series Most of the iPhones and iPads supported include an Apple A12 Bionic chip or newer (or, for newer iPad Pros, M1 or M2 processors). The 6th-generation iPad and its A10 chip is the sole exception—these cheaper iPads usually use hardware that's a few generations old to keep the price down. As for Apple's other iOS-related platforms, watchOS 10's system requirements don't change much. It will still run on any Series 4 or newer Apple Watch, but it does require an attached iPhone running iOS 17. If you have an older phone that can't upgrade, you won't be able to run watchOS 10 even if your watch hardware meets the requirements.
Operating Systems
Apple has released iOS 16.6.1 and iPadOS 16.6.1, fixing two extremely dangerous security flaws in its mobile operating systems. One flaw fixes an issue in which "processing a maliciously crafted image may lead to arbitrary code execution." Apple says it's aware of a report that this issue, which affects all newer iPhones and iPads, may have been actively exploited in the wild, which makes it the worst kind of security flaw. The bug was found by the University of Torontoʼs Munk School security research facility Citizen Lab, which shared some more info on how it works and who's affected. Apparently, this exploit (which Citizen Lab named the Blastpass Exploit Chain) was capable of compromising iPhones running the latest version of iOS (16.6). Worse, it could do this without any interaction from the victim. The flaw was found while checking the device owned by a person employed by a civil society organization based in Washington DC. On their device, the vulnerability was use to deliver the notorious Pegasus spyware. The new iOS 16.6.1 patch fixes another critical bug, which also may have been actively exploited. It affects newer iPhones and iPads, and it also meant a hacker could take over someone's phone by sending them a maliciously crafted attachment. You can (and should) update your devices now by going to Settings - General - Software Update.
Operating Systems
SEBI Issues Advisory For Regulated Entities On Cybersecurity Practices Regulated entities will have to proactively monitor the cyberspace to identify phishing websites and report them to CSIRT-Fin. Amid increasing cybersecurity threats to the securities market, SEBI issued an advisory on Wednesday for stock exchanges, depositories and other regulated entities, asking them to define roles and responsibilities of chief information security officer and other senior personnel. It also asked them to clearly specify the reporting and compliance requirements in the security policy. Entities regulated by the Securities and Exchange Board of India have been advised to implement these cybersecurity practices as recommended by Financial Computer Security Incident Response Team, according to a circular issued by the markets watchdog. The REs have been asked to proactively monitor the cyberspace to identify phishing websites and report the same to CSIRT-Fin. SEBI noted that majority of the infections are primarily introduced through phishing e-mails, malicious adverts on websites, and third-party apps and programmes. Accordingly, thoughtfully designed security awareness campaigns that stress the avoidance of clicking on links and attachments in e-mail, can establish an important pillar of defence. "Given the sophistication and persistence of the threat with a high level of coordination among threat actors, it is important to recognise that many traditional approaches to risk management and governance that worked in the past may not be comprehensive or agile enough to address the rapid changes in the threat environment and the pace of technological change that is redefining public and private enterprise," SEBI said. The regulator said that an efficient and effective response to and recovery from a cyber-incident by REs are essential to limit any related financial stability risks. SEBI said operating systems and applications should be updated with the latest patches on a regular basis. It further said that security audit or Vulnerability Assessment and Penetration Testing of the application should be conducted at regular basis. The regulator has asked REs to take measures for data protection and data breach. SEBI has asked REs to implement strong log retention policy along with robust password mechanism. Also, it asked them to deploy web and e-mail filters on the network. The regulator noted that the interconnectedness and interdependency of the financial entities to carry out their functions, the cyber risk of any given entity is no longer limited to the entity's owned or controlled systems, networks and assets. The circular will come into force with immediate effect.
Operating Systems
At this year’s WWDC, Apple has announced a number of exciting new updates for its operating systems and there’s plenty to be intrigued by. Here’s a quick look at this year’s announced software updates for Apple computers and tablets. Apple employees’ apparent love of California wine country is on full display with the newest Mac operating system, which is named after the Norcal city known for its bountiful vineyards. Sonoma promises increased convenience, flexibility, and efficiency for MacOS 14 users, so read on below for a quick look at the highlights. One of the coolest new features included in Sonoma is Apple’s newly introduced “Game Mode,” which will surely give Mac gamers reason to get excited. When engaged, the mode significantly reduces the amount of computing power spent on background tasks, thus ensuring that the game gets the highest priority of CPU and GPU power while it’s in session. Apple says that the mode also dramatically reduces audio latency as well as reduces input latency with Xbox and Playstation controllers by doubling the Bluetooth sampling rate. In short: Game Mode promises a quicker, more responsive gaming experience—and, as Apple says, promises to “give players’ an edge when performance is measured in precious milliseconds.” A small new update that some will surely find to be quite convenient is the ability to adjust your widgets and place them wherever you want on your desktop. Whereas widgets were previously only available inside a Mac’s notification center, they can now be placed wherever you want. This change has also been designed to be as unobtrusive as possible. Widgets will fade into the background when you choose to focus on another application or program. With Sonoma, Apple has also updated its Safari browser with a number of new privacy protections that you might want to take a look at. For one thing, you can now lock your Safari browser windows when you’re not using them, ostensibly making them inaccessible to people who aren’t you. At the same time, Apple says that Safari now “completely” blocks the loading of known web trackers on the pages you visit and “removes tracking from urls as your browse in private browsing”—certainly a good thing to have if you want to avoid the roving eye of data brokers and surveillance capitalism’s worst offenders. While the particular details of some of these protections haven’t really been made super clear yet, Apple is clearly gunning for a beefed up privacy posture that should make the most paranoid among us quite happy. Meanwhile, in the security department, passwords and passkeys—the anointed heir to the password—will now be securely shareable within select groups of users via iCloud keychain. With this new feature, everyone in a select group will now be able to add and edit passwords in a shareable setting to keep security codes up to date, Apple says. Pertinently, iCloud keychain is protected by end-to-end encryption, which means that your precious codes should be relatively secure. MacOS 14 also brings with it a new feature for video conferencing that promises to make office Zoom calls a little bit less cringey and a little bit more fun. “Presenter Overlay” uses video layering techniques to superimpose video of a user over the content they need to share with co-workers—like a slideshow or Powerpoint presentation. There are two options for this: “small” overlay (where your face appears as a moveable bubble) and “large” overlay, wherein you’re featured more prominently in correlation to your presentation. Apple says the feature is compatible with “any” video conferencing app, including Zoom, Facetime, Teams, and Webex. Having officially dispensed with the most mouth watering updates to MacOS, let’s now take a quick look at the host of new features and updates for Apple’s iPad operating system. The new iPadOS is letting you customize and personalize your lock screens to a much greater degree. You’ll have a variety of wall paper options to choose from—including photo slideshows, local weather, something called “kaleidoscope,” and, for the space nerds out there, astronomy (which allows you to pick any planet in the solar system as your background). At the same time, you can also make these backgrounds more productive by integrating widgets. There’s also a new feature called “live activities,” where you can keep track of stuff like active food orders, travel plans, or ongoing sports games. Another notable feature that comes with iPadOS is a personal health app designed to maintain your personal stats and give users access to “rich details at a glance.” Surely a blessing for the gym rats among us. The app can be securely synched with your other Apple devices for interoperable viewing and can also be paired with compatible third-party apps and devices. The health app allows you to keep track of your health trends, medications, and other pertinent personal details.
Operating Systems
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue, tracked as CVE-2021-4034 (CVSS score: 7.8), came to light in January 2022 and concerns a case of local privilege escalation in polkit's pkexec utility, which allows an authorized user to execute commands as another user. Polkit (formerly called PolicyKit) is a toolkit for controlling system-wide privileges in Unix-like operating systems, and provides a mechanism for non-privileged processes to communicate with privileged processes. Successful exploitation of the flaw could induce pkexec to execute arbitrary code, granting an unprivileged attacker administrative rights on the target machine and compromising the host. It's not immediately clear how the vulnerability is being weaponized in the wild, nor is there any information on the identity of the threat actor that may be exploiting it. Also included in the catalog is CVE-2021-30533, a security shortcoming in Chromium-based web browsers that was leveraged by a malvertising threat actor dubbed Yosec to deliver dangerous payloads last year. Furthermore, the agency added the newly disclosed Mitel VoIP zero-day (CVE-2022-29499) as well as five Apple iOS vulnerabilities (CVE-2018-4344, CVE-2019-8605, CVE-2020-9907, CVE-2020-3837, and CVE-2021-30983) that were recently uncovered as having been abused by Italian spyware vendor RCS Lab. To mitigate any potential risk of exposure to cyberattacks, it's recommended that organizations prioritize timely remediation of the issues. Federal Civilian Executive Branch Agencies, however, are required to mandatorily patch the flaw by July 18, 2022. Found this article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
Officially, Intel's Itanium chips and their IA-64 architecture died back in 2021, when the company shipped its last processors. But failed technology often dies a million little deaths. From a report: To name just a few: Itanium also died in 2013, when Intel effectively decided to stop improving it; in 2017, when the last new Itanium CPUs shipped; in 2020, when the last Itanium-compatible version of Windows Server stopped getting updates; and in 2003, when AMD introduced a 64-bit processor lineup that didn't break compatibility with existing 32-bit x86 operating systems and applications. Itanium is dying another death in the next version of the Linux kernel. According to Phoronix, all code related to Itanium support is being removed from the kernel in the upcoming 6.7 release after several months of deliberation. Linus Torvalds removed some 65,219 lines of Itanium-supporting code in a commit earlier this week, giving the architecture a "well-earned retirement as planned." Itanium is dying another death in the next version of the Linux kernel. According to Phoronix, all code related to Itanium support is being removed from the kernel in the upcoming 6.7 release after several months of deliberation. Linus Torvalds removed some 65,219 lines of Itanium-supporting code in a commit earlier this week, giving the architecture a "well-earned retirement as planned."
Operating Systems
Identity and authentication management provider Okta on Friday published an autopsy report on a recent breach that gave hackers administrative access to the Okta accounts of some of its customers. While the postmortem emphasizes the transgressions of an employee logging into a personal Google account on a work device, the biggest contributing factor was something the company understated: a badly configured service account. In a post, Okta chief security officer David Bradbury said that the most likely way the threat actor behind the attack gained access to parts of his company’s customer support system was by first compromising an employee’s personal device or personal Google account and, from there, obtaining the username and password for a special form of account, known as a service account, used for connecting to the support segment of the Okta network. Once the threat actor had access, they could obtain administrative credentials for entering the Okta accounts belonging to 1Password, BeyondTrust, Cloudflare, and other Okta customers. Passing the buck “During our investigation into suspicious use of this account, Okta Security identified that an employee had signed-in to their personal Google profile on the Chrome browser of their Okta-managed laptop,” Bradbury wrote. “The username and password of the service account had been saved into the employee’s personal Google account. The most likely avenue for exposure of this credential is the compromise of the employee’s personal Google account or personal device.” This means that when the employee logged into the account on Chrome while it was authenticated to the personal Google account, the credentials got saved to that account, most likely through Chrome’s built-in password manager. Then, after compromising the personal account or device, the threat actor obtained the credentials needed to access the Okta account. Accessing personal accounts at a company like Okta has long been known to be a huge no-no. And if that prohibition wasn’t clear to some before, it should be now. The employee almost surely violated company policy, and it wouldn’t be surprising if the offense led to the employee’s firing. However, it would be wrong for anyone to conclude that employee misconduct was the cause of the breach. It wasn’t. The fault, instead, lies with the security people who designed the support system that was breached, specifically the way the breached service account was configured. A service account is a type of account that exists in a variety of operating systems and frameworks. Unlike standard user accounts, which are accessed by humans, service accounts are mostly reserved for automating machine-to-machine functions, such as performing data backups or antivirus scans every night at a particular time. For this reason, they can’t be locked down with multifactor authentication the way user accounts can. This explains why MFA wasn’t set up on the account. The breach, however, underscores several faults that didn’t get the attention they deserved in Friday’s post.
Operating Systems
Linux enthusiasts rejoice! After a long journey, according to StatCounter’s data, by June 2023, Linux has achieved a 3% desktop market share. Linux has a long history that dates back more than 30 years. However, it has never been as popular among regular computer users as other operating systems such as Microsft’s Windows or Apple’s macOS. Of course, for many years, Linux has emerged as a dominant force in the realm of server operating systems. Due to its exceptional performance, stability, reliability, and security, it has been widely adopted in server/cloud/IoT environments. However, these days, Linux is no longer limited to these environments alone; it is rapidly gaining momentum as an operating system of choice for many desktop users, especially developers. And the most recent figures confirm this, giving all advocates of Linux and open source in general reason to rejoice. Linux Operating System Achieved a 3% Desktop Market Share According to StatCounter, a web analytics company, by June 2023, Linux has reached a 3% market share in the desktop segment. This is a remarkable achievement considering its fierce competition from other operating systems. While someone may seem the figure modest, it signifies a growing acceptance and recognition of the power and versatility of Linux. In any case, the achievement of a 3% market share by Linux is undoubtedly a cause for celebration among its dedicated community. It reflects the growing recognition of Linux’s strengths and the efforts to overcome its historical barriers. Moreover, with the continued development and innovation within the Linux ecosystem, its market share will continue growing in the coming years. The growing importance of cloud computing and the rise of server infrastructure have also contributed to Linux’s success. Still, the main reason for reaching this figure is the operating system’s growing popularity among desktop users. With exceptionally easy-to-use and entirely user-centric Linux desktop distributions, the operating system is no longer what it was 20 years ago – a complex equation available only to highly technically enlightened hackers. Linux Growing Popularity among Desktop Users Yes, I know. Over the last 10+ years, each one has often been heralded as “Linux on the Desktop,” although it turns out that’s not quite the case. But still, we’re close to that point now. And for good reasons. Free, Lightweight & Customizable The main appealing aspect of Linux for desktop users is its lightweight nature, free from corporate bloatware, and especially the limitless customization options. It allows users to tailor their desktop environment to suit their preferences and workflow. With a vast selection of desktop environments like GNOME, KDE, Xfce, and many others, users can choose the one that best aligns with their needs. Valuing User Privacy Another important factor driving Linux’s growing popularity among desktop users is privacy. Compared to other mainstream operating systems, Linux generally collects no user data. While some distributions may try to collect basic telemetry data for improvement purposes, the level of data collection is typically minimal and can be disabled or opted out of entirely. This aspect appeals to privacy-conscious individuals who prefer more control over their personal information. Linux is a Developer’s Dream Come True Linux has long been the operating system of choice for developers worldwide, and its allure continues to grow. First and foremost, Linux’s open-source nature empowers developers with unparalleled freedom. They can access and modify the source code, customize their environments, and contribute to the community, fostering collaboration and innovation. Furthermore, performance is also a crucial factor. Linux’s efficiency, scalability, and ability to run on diverse hardware architectures make it ideal for resource-intensive tasks. Lastly, its command-line interface and powerful scripting capabilities offer flexibility and automation, streamlining development workflows. Bottom Line So, as Linux enthusiasts rejoice, it is essential to remember that the journey does not end here. Linux has proven its worth, and its rise to a 3% desktop market share is a testament to its resilience and adaptability in the desktop field. With ongoing advancements and increased support from the Open Source community and businesses, Linux is poised to become an even more formidable player in the world of operating systems.
Operating Systems
Intel mulls cutting ties to 16 and 32-bit support Hypothetical x86S architecture would boot straight into 64-bit mode Chip giant Intel has proposed something rather unusual: a potential simplification of the x86 architecture by removing old features. A technical note on Intel's developer blog puts forward a rather radical change to the x86-64 architecture: a new x86S architecture, which simplifies the design of future processors and a PC's start-up process, by removing 16-bit and some elements of 32-bit support from the hardware. The result would be a family of processors which boot straight into x86-64 mode. That would mean bypassing the traditional series of transitions – 16-bit real mode to 32-bit protected mode to 64-bit long mode; or 16-bit mode straight into 64-bit mode – that chips are obliged to go through as the system starts up. The developer note is accompanied by a 46-page technical white paper [PDF] that goes into considerable detail about the exact changes that Intel is considering. Some of the changes are quite dramatic, although the impact upon how most people use computers today would probably be invisible – which is undoubtedly the idea. And remember, this is Intel we're talking about; backwards compatibility is something it's been famous for, for decades. Apart from eliminating 8086-style 16-bit real mode, and 80286-style 16-bit protected mode, it would also remove 32-bit ring zero, and completely remove protection rings one and two from the architecture. Just in case the distinction between the x86 protection rings has temporarily slipped your mind, we explained them and how they work in part one of our brief history of virtualization in 2011. Quickly though: ring zero is where an OS typically lives, and ring three is where apps run. Intel's developer note suggests: Removing rings 1 and 2 (which are unused by modern software). This parallels the way The Reg FOSS desk put it a dozen years back: In fact, the vast majority of PC OSes only use 0 and 3. For the historically-inclined, only two mainstream PC OSes ever actually used more than these two rings. One was IBM's OS/2. The other exception was Novell Netware 4 and above. As it happens, both of these are operating systems of which we're quite fond. But to be honest, losing direct support for either of them on future hardware isn't going to inconvenience anybody. They, and any other operating system which starts in 16-bit mode – such as DOS or Windows 9X – won't even boot on any contemporary UEFI machine anyway. Losing ring zero in 32-bit mode means that you wouldn't be able to run an x86-32 hypervisor – but again, nobody is going to want to do that when a 64-bit one offers you so much more memory. When we initially read this proposal, we thought that it also meant eliminating x86-32 mode entirely, but that's not the case. It will just be significantly more limited. It will still be possible to start up an x86-32 operating system inside a VM – these have to emulate system firmware in any case, alongside the emulated graphics cards, network cards and so on that they must provide. You will also still be able to run x86-32 binaries and apps in ring three on your 64-bit OS in ring zero – so long as the operating system provides the appropriate libraries and APIs, of course. They nearly disappeared from Ubuntu a few years back, and it still might happen. What X86S really means is removing the ability to boot 32-bit systems on bare metal. UEFI has already effectively eliminated the ability to boot 16-bit operating systems on bare metal, and barely anybody noticed. Similarly, it's quite hard to run DOS software on a modern 64-bit system, because back at the turn of the 21st century, AMD's x86-64 removed the VM86 mode used for running real-mode code while an x86-32 chip is in 32-bit protected mode. VM86 mode was introduced with the 80386DX in 1987, disappeared about 20 years ago … and virtually nobody has noticed. There is actually another precedent for this which we are prepared to bet few remember now. Long ago, Intel for a while offered a cutdown version of the 80386 processor which could only run in 32-bit mode, and which completely eliminated 16-bit mode – which was clearly already on the way out even back in 1989. We are not talking about the famed 80386SX, but a variant of it: the little-known Intel 80376. We're amused to note that one of the few descriptions of this chip still to be found on the web hypothetically proposed – in 2010 – how handy it would be if modern processors booted directly into 32-bit mode. A big difference is that the 80376 didn't support paged memory mode, whereas the putative X86S only supports operation in paged memory mode. Historical Bootnote There are also some loose parallels here with the origins of Intel's whole x86 architecture. In the mid-1970s, Intel started work on an extremely ambitious 32-bit "micromainframe", codenamed 8800 to succeed its successful 8080 and 8085. With the recent passing of Intel cofounder Gordon Moore, what eventually became the iAPX432 has been getting a little bit of attention once again, such as this overview. It shipped as a complex of three c.100,000-transistor chips – vast for the time. - The return of the classic Flying Toasters screensaver - Apple releases Lisa source code on landmark machine's 40th birthday - Riding in Sidecar: How to get a Psion online in 2023 - HDD Clicker gizmo makes flash sound like spinning rust The iAPX432 project ran so horribly late that it only shipped in 1981. In an effort to salvage something, Intel put out a stopgap: a partially-compatible 16-bit extension of its 8080 architecture, which extended the design to allow it to access a whole megabyte of memory in 20 separate 64KB segments. This was the 16-bit 8086, launched in 1978 – the first x86 device, whose execution model Intel is still trying to get rid of in 2023. An interesting theory is that the origin story is a little more recursive than that. Realizing that the iAPX432 would be late, big, and expensive, Intel sketched out a design for a much simpler chip – with a much simpler segmented protected-memory design based on the memory architecture of the iAPX432. Although this eventually shipped in 1982 as the Intel 80286 – which Microsoft boss Bill Gates famously described as "brain dead" – Intel realized that a 120,000-transistor 80286 would be too complex and expensive to sell profitably. Thus it cut the design down even more to create the 8086. The 8086's hardware was, of course, cut down still further with an eight-bit memory bus to create a budget model: the 8088. That was the CPU that IBM used in its model 5150 – the original IBM PC, which more or less spawned the modern computer industry. ®
Operating Systems
Valve is warning Steam users on PC to update their operating systems or risk losing access to the service at the start of next year. One of the best aspects of Steam is the ease with which it is available across numerous different PC platforms. And while those who perhaps haven't updated their PC much in the past five years (for some reason) can still use Steam at this very moment, that won't hold true for much longer. In an extensive new message shared on the Steam Support page, Valve said that it will soon be discontinuing the platform for PCs that run on Windows 7, Windows 8, and Windows 8.1. This change is set to go into effect next year on January 1, 2024. At this time, PCs that still run on these older versions of Windows will no longer be able to run games that are owned through Steam or purchase any other titles through the marketplace. "This change is required as core features in Steam rely on an embedded version of Google Chrome, which no longer functions on older versions of Windows," Valve said of the reason behind the move. "In addition, future versions of Steam will require Windows feature and security updates only present in Windows 10 and above. Although support won't end until 2024, we strongly encourage all Windows 7/8/8.1 users to update sooner rather than later." All in all, this isn't a huge shock, especially since Windows 7, 8, and 8.1 haven't even been directly supported by Microsoft itself in quite some time. Windows 7 received its final update back in 2011 while Windows 8 reached its end in 2016. Valve likely could have stopped supporting most of these operating systems years ago and it wouldn't have made a major impact on its user base, but regardless, 2023 will finally bring things to a close. Is this forthcoming update to Steam going to impact the manner in which you use the platform? Or are you simply surprised that this change didn't come about sooner? Let me know either down in the comments or shoot me a message on Twitter at @MooreMan12.
Operating Systems
Mobile Security / Android Malware Researchers have shed light on a new hybrid malware campaign targeting both Android and Windows operating systems in a bid to expand its pool of victims. The attacks entail the use of different malware such as ERMAC, Erbium, Aurora, and Laplas, according to a ThreatFabric report shared with The Hacker News. "This campaign resulted in thousands of victims," the Dutch cybersecurity company said, adding, "Erbium stealer successfully exfiltrated data from more then 1,300 victims." The ERMAC infections commence with a fraudulent website that claims to offer Wi-Fi authorization software for Android and Windows that, when installed, comes with features to steal seed phrases from crypto wallets and other sensitive data. ThreatFabric said it also found a number of malicious apps that were trojanized versions of legitimate apps like Instagram, with the operators using them as droppers to deliver the obfuscated malicious payload. The rogue apps, dubbed Zombinder, are said to have been developed using an APK binding service advertised on the dark web by a well-known threat actor since March 2022. Such zombie apps have been used to distribute Android banking trojans like SOVA and Xenomorph targeting customers in Spain, Portugal, and Canada, among others. Interestingly, the download option for Windows on the booby-trapped website distributing ERMAC is designed to deploy the Erbium and Aurora information stealers on the compromised system. Erbium, which is a malware-as-a-service (MaaS) licensed for $1,000 per year, not only steals passwords and credit card information, but has also been observed acting as a conduit to drop the Laplas clipper that's used to hijack crypto transactions. "The presence of such a wide variety of trojans might also indicate that the malicious landing page is used by multiple actors and provided to them as a part of a third-party distribution service," the researchers theorized. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
I’ve long speculated that iOS 17 will support sideloading in the European Union (EU) because of the Digital Markets Act (DMA) law, and now, it’s finally official. No, Apple hasn’t actually announced that the feature is imminent for iPhones and iPads in the region. Nor do I expect an announcement anytime soon. But Apple has six months to implement sideloading in iOS 17 and potentially older iOS versions or risk billions in fines. The European Commission revealed a list of gatekeeper companies and gatekeeper apps/services. Apple’s iMessage isn’t a gatekeeper, so it doesn’t have to support interoperability with, say, Google’s RCS anytime soon. But iOS, the Safari browser, and the App Store are gatekeepers. As such, Apple has six months to make changes to these products according to the DMA rules. In other words, iPhones and iPads in the EU will soon support third-party app stores, third-party payment systems, and sideloading. And it’ll all start with iOS 17, which is set to come out next week. How the DMA forces Apple to embrace sideloading on iPhone The EU reminded users, businesses, and gatekeepers themselves about the do’s and don’t’s of the DMA legislation. The examples below will apply to Apple’s gatekeeper services, including iOS and the App Store: - Allow end users to easily un-install pre-installed apps or change default settings on operating systems, virtual assistants or web browsers that steer them to the products and services of the gatekeeper, and provide choice screens for key services; - Allow end users to install third-party apps or app stores that use or interoperate with the operating system of the gatekeeper; - Allow end users to unsubscribe from core platform services of the gatekeeper as easily as they subscribe to them; - Allow third parties to inter-operate with the gatekeeper’s own services; - Allow business users to promote their offers and conclude contracts with their customers outside the gatekeeper’s platform; - Provide business users with access to the data generated by their activities on the gatekeeper’s platform; - Ban on requiring app developers to use certain of the gatekeeper’s services (such as payment systems or identity providers) in order to appear in app stores of the gatekeeper; By issuing the first-ever tech gatekeeper designations in Europe, the EU practically ensures that the iPhone will soon support sideloading, at least in the EU member states. And since it has to happen within six months, Apple will implement the feature into iOS 17. When will Apple make changes to iOS 17? As you can see in the list above, Apple will also have to let developers promote their businesses and conclude contracts outside of its platform. That means purchasing a digital service or app outside of the App Store. Like subscribing to Netflix in a browser after seeing an offer within the official app. iOS 17 will also have to support app stores that compete with the official App Store. That’s in addition to support for downloading iPhone and iPad apps from any source (sideloading). Also, the DMA practically guarantees support for third-party payment systems. I’ve long said I won’t be sideloading any apps on my iPhone in the future even though I’ll have access to the feature. And that I won’t use third-party app stores or third-party payment systems. It’s all about convenience and security for me. But not all iPhone and iPad users feel that way. The same goes for developers. The good news is that they’ll be able to take advantage of the DMA rules in the coming months. But the caveat is that Apple will likely restrict these features to the EU region. There’s no way sideloading is coming worldwide. Also, since Apple has six months to implement the changes, don’t expect sideloading to come to your iPhone soon. It’s more likely that Apple will spend months testing it via iOS 17.x beta releases before rolling it out officially. As a reminder, the final version of iOS 17 comes out next week. Apple will continue to add features to the iPhone operating system in the following year via iOS 17.x updates. As seen above, Apple has until March 2024 to comply. Can Apple ignore the DMA? Apple could avoid implementing changes into iOS 17 to adhere to these regulations, of course. But it risks fines starting at 10% of its annual turnover. That amounts to tens of billions. It can go up to 20% for repeated offenses and could lead to more drastic measures, like the EU forcing Apple to sell a business or parts of it, or preventing acquisitions. While Apple has always opposed sideloading apps, it recently said it would comply with EU regulations. But it never offered more details about when to expect sideloading support in iOS 17. Reacting to the EU’s gatekeepers announcement, Apple said it remained concerned about the privacy and security risks coming from the DMA. But it also implied it would implement changes accordingly. “Our focus will be on how we mitigate these impacts and continue to deliver the very best products and services to our European customers,” Apple said in a statement to Reuters.
Operating Systems
Like clockwork, Apple will release the latest operating systems for its various products this fall. And, as ever, the company will leave some older generations of its devices by the wayside. If you're still clinging onto an iPhone 8 (that thing was great, so I don't blame you), iPhone 8 Plus or an iPhone X, you won't be able to update it to iOS 17. In other words, your iPhone will need to have an A12 Bionic or later chip to install the new firmware. If you have an iPhone XR, XS, XS Max, iPhone SE (second-gen) or later, you'll have access to features including Live Voicemail transcripts, the StandBy display mode and, at ducking last, better autocorrect. Folks using a fifth-generation iPad or the first-gen 12.9-inch iPad Pro will not be able to install iPadOS 17, unfortunately. Apple is adding customizable lock screens, the Health app, interactive widgets and much more to the iPad. The following tablets will be supported: iPad (6th generation and later) iPad mini (5th generation and later) iPad Air (3rd generation and later) 12.9-inch iPad Pro (2nd generation and later) 10.5-inch iPad Pro 11-inch iPad Pro (1st generation and later) As for Apple Watch users, there's some good news. Apple is continuing to support all devices that run watchOS 9. If you have an Apple Watch Series 4 or later, you'll be able to use watchOS 10, which places more focus on widgets. There are upgrades to the Cycling and Compass apps, along with a slew of other updates. Widgets are also coming to the Mac via macOS Sonoma. Along with other features, the desktop and laptop operating system will feature a new Game Mode that prioritizes CPU and GPU performance to deliver higher framerates on every game. The following Macs will support macOS Sonoma: iMac (2019 and later) Mac Pro (2019 and later) iMac Pro (2017) Mac Studio (2022 and later) MacBook Air (2018 and later) Mac mini (2018 and later) MacBook Pro (2018 and later) Last year's big update, macOS Ventura, was compatible with the 2017 and later iMac, 2019 and later Mac Pro, 2017 iMac Pro, 2018 and later Mac mini, 2018 and later MacBook Air, 2017 and later MacBook and 2017 and later MacBook Pro. Last but not least, tvOS 17 will finally bring FaceTime to Apple TV. Other new features include a way to find a misplaced remote with the help of your iPhone. The operating system will be available on Apple TV 4K and Apple TV HD. Follow all of the news from Apple's WWDC 2023 right here.
Operating Systems
Liam Proven, reporting for The Register: Over 21 years after it first came out, the Microsoft operating system that will not die is receiving another lease of life. It's possible to activate new installations, safely and securely, without a crack, off line. A blog post on tinyapps has revealed the hot news that nobody sane has been waiting for: the algorithm that Microsoft uses to validate Windows XP product keys has been cracked and reimplemented. As a result it's now possible to generate valid activation codes for Windows XP, without an internet connection, even though Microsoft has turned off all the activation servers. This is not a recommendation But first, a word of caution and restraint. Please don't take this article as a recommendation to run Windows XP. It wasn't the most secure of operating systems back in 2001, and you really should not be running it in 2023 -- especially not on anything that is connected to the internet. However, saying that, the problem is that sometimes people need to. There is, for example, hardware out there that only works with Windows XP and won't work with anything newer... and some of it might be very expensive hardware, which is still perfectly functional -- but which requires a long-obsolete version of Windows to operate it. If you are lumbered with such a device, or you have got some single specific and very particular piece of software that you need to run and which doesn't work properly on any newer version of Windows, then you may be forced to use XP. If so, one of the problems is that Microsoft has turned off the activation servers, so even if you install clean fresh copy, you can no longer activate it over the Internet. (Allegedly, the telephone activation service still works, if that's an option for you.) This is not a recommendation But first, a word of caution and restraint. Please don't take this article as a recommendation to run Windows XP. It wasn't the most secure of operating systems back in 2001, and you really should not be running it in 2023 -- especially not on anything that is connected to the internet. However, saying that, the problem is that sometimes people need to. There is, for example, hardware out there that only works with Windows XP and won't work with anything newer... and some of it might be very expensive hardware, which is still perfectly functional -- but which requires a long-obsolete version of Windows to operate it. If you are lumbered with such a device, or you have got some single specific and very particular piece of software that you need to run and which doesn't work properly on any newer version of Windows, then you may be forced to use XP. If so, one of the problems is that Microsoft has turned off the activation servers, so even if you install clean fresh copy, you can no longer activate it over the Internet. (Allegedly, the telephone activation service still works, if that's an option for you.)
Operating Systems
Those who weren't particularly internet savvy back in 2011 may be unaware of the huge step Google took when it launched its own operating system. Up until then, Google was still known fairly exclusively as a search engine. Of course, they were a behemoth of a search engine, with millions of users per day and complete domination of the search engine market for almost ten years. However, their launch of ChromeOS over a decade ago changed the industry and how we use the internet to this day. Since then, ChromeOS did some growing up. Born from a Web Browser Google ChromeOS was revolutionary for a few reasons, one of the most notable being its browser-based design. While ChromeOS was built on a Linux kernel, it was designed as a browser extension. With this system, Google was the first to launch a mainstream cloud-based and browser-exclusive OS. The Chrome system utilized the growing popularity of cloud computing to create an OS that didn't rely on local data. The revolutionary interface allowed users to use entirely web-based applications, removing the need for downloads or much memory usage. Evolving Beyond the Web Browser With their ChromeOS launch, Google brought cloud computing technology into the average household. They took it a step further by partnering with laptop manufacturers to create models that were built to run exclusively on a Chrome operating system instead of Windows or Linux. The availability of Chromebooks took Google's OS from a novelty available only to tech influencers to an easily accessible technology anyone could use. Google's ChromeOS Climb While the early days of ChromeOS may have been revolutionary, ChromeOS-based devices were still criticized for their limited functionality in comparison to non-cloud-based operating systems. Google quickly worked to change that, continuing to update Chrome with regular new features and an expanded design. The introduction of a window manager and task bar was followed by the ability to support Android apps with the inclusion of Android's Google Play store. After introducing the Crouton utility to allow Linux apps, they eventually announced the ability to run native Linux programs in 2018. Today Chromebook users enjoy Android app support as well as Linux apps on their ChromeOS devices. What Makes ChromeOS Devices Superior Current Chromebooks boast lightweight designs and low prices compared to similar models with traditional operating systems. Security has always been a standout feature of ChromeOS devices. Chromebooks have built-in sandboxing, data encryption, automatic security updates, and verified booting. In the decade-plus that Chromebooks have been available, there has never been a single case of a device falling victim to a virus, malware, or hacking attempt. The most recent version of Chromebooks has a smart lock feature that utilizes a user's Android phone as a key to unlock their device. ChromeOS devices were early adopters of touchscreen technology and continue to boast many touchscreen-enabled computers and tablets. The extended battery life of Chromebooks currently clocks in at around 12 hours before needing a change. One of the initial draws to Chrome-enabled devices was the quick set-up time. In fact, when you manage ChromeOS devices using the Google Admin console, the results are clear. Managed ChromeOS devices see a 76% time savings deployment compared to Windows devices. Because of the cloud-based programs, the OS requires little in the way of downloads and set-up. It also boasts a lightning-quick startup speed of under 10 seconds. Taking on Windows and MacOS Today, Chrome is a powerhouse that rivals Windows and MacOS in popularity. The continued production and evolution of Chromebooks and other ChromeOS native devices have made it a popular choice for users who primarily run web-based applications. Now, customers even have the option of purchasing Chrome devices with applications that run offline, eliminating the need for an internet connection entirely. Additionally, the release of ChromeOS Flex finally allows users to install ChromeOS on any device, even those built on Windows or MacOS. The combined affordability, ease of use, and continued upgrades have taken ChromeOS from a quirky browser-based OS to one of the most popular operating systems in the world. Why Promevo? Whether you’re looking to add Chromebooks to your organization, or need support navigating ChromeOS and other Google tools, Promevo can help. As a certified Google partner, Promevo helps teams get the most out of their Google journey. Our expert technicians help you harness the robust capabilities of Google to reinvent the way you do business and accelerate the growth of your company. Frequently Asked Questions How much does ChromeOS cost? ChromeOS is an open-source operating system that is completely free to use. One of the reasons Chromebooks are less expensive than their competitor counterparts is because they utilize this free operating system. You can purchase upgrade bundles from Google to use with ChromeOS, such as Chrome Enterprise Upgrade or Chrome Education Upgrade, but they are not necessary to utilize full ChromeOS functionality. Is ChromeOS a safe operating system? The Chrome operating system is incredibly safe. It has built-in sandboxing, data encryption, automatic security updates, and verified booting. In the decade-plus that Chromebooks have been available, there has never been a single case of a device falling victim to a virus, malware, or hacking attempt. What is the difference between ChromeOS and Flex? ChromeOS is only available for use on Chromebooks. ChromeOS Flex is a version of Chrome that can be run on any device, including those with Windows and MacOS. ChromeOS Flex is very similar to the original operating system but does not come with Google's security chip for verified booting. This means it is less secure than the Chromebook version of the operating system. When utilizing ChromeOS Flex you also do not get support from the Google Play store. How old is ChromeOS? Google's Chrome operating system is over a decade old. It was launched in 2011, and its Chromebooks were released later the same year. ChromeOS Flex was released in 2022 for use on all devices. The Chrome browser itself was released by Google back in 2008.
Operating Systems
You might not want to hold on to that vintage gaming PC for much longer. Valve has warned that Steam will no longer support Windows 7, Windows 8 or Windows 8.1 as of January 1st, 2024. The game client's latest features use an embedded version of Google's Chrome browser, which dropped support for those operating systems in February. Incoming versions of Steam for Windows will also require OS updates that are only available in Windows 10 and newer releases, Valve adds. As PC Gamer points out, this won't affect most Steam users. Just under 1.9 percent of the software's audience is using one of the relevant Windows versions, according to Valve's latest survey. That still affects a significant number of people, though, and may leave them no choice but to either upgrade their OS or buy a PC with a supported platform. The end of support could be particularly troublesome if you need an older version of Windows for work or a retro gaming system. There has been plenty of pressure elsewhere to move on. Microsoft stopped supporting Windows 7 in January 2020, and Windows 8.1 at the start of 2023. Epic Games no longer supports those platforms if you want to run Fortnite, for that matter. It's becoming harder and harder to use an ancient Windows machine in general — Steam's compatibility change may just be the tipping point that pushes you toward an upgrade.
Operating Systems
HomePod Software version 17 is the upcoming operating system for HomePod. While Apple previewed and released the first beta versions of iOS 17, iPadOS 17, macOS Sonoma, watchOS 10, and tvOS 17 to developers a month ago, the company didn’t say a thing about HomePod’s update. Now the public beta is available alongside the other open betas. While HomePod Software version beta builds are usually distributed by Apple, with iOS 16, the company started letting anyone enrolled with the Apple Beta Software Program try the new operating system on the HomePod mini. That said, this is how you register for version 17 of this update. The public beta is available for HomePod 2 and mini models. Here’s how you can download it after agreeing with the Beta Software Program and installing iOS 17 beta: - Open the Home app on your iPhone or iPad. - Tap the “…” button in the upper right corner of the screen. - Tap Home Settings. - Choose the Software Update option. - Go to the HomePod Beta Updates menu. - Switch on the toggles for the HomePods you want to install the beta software on. Currently, the main change coming to HomePod Software version 17 is the Enhance Dialogue feature, which Apple says analyzes audio being played and separates the actors’ speech from effects or background music. To make the most out of this operating system, it’s recommended that you download tvOS 17 beta. Unlike the other operating systems, you just need to install the beta version right from your Apple TV settings. You can learn more about the new features below.
Operating Systems
The smart TV market has largely consisted of a handful of popular platforms, and as we move forward, growth is becoming more and more difficult for smaller players. Now, Google TV is set to face a new challenge, as Samsung and LG are expanding their Tizen and WebOS-based platforms to other smart TV brands. Both Samsung and LG announced over the past week that they will expand their respective smart TV operating systems, Tizen and WebOS, to other TV manufacturers. The platform will be licensed out to be used on other brands. Historically, both Samsung and LG have restricted these platforms solely to their own smart TV lines. In LG’s case, “WebOS Hub” will expand to a “network of 200 partner brands” which includes names such as Seiki, Eko, Stream System, Konka, Aiwa, and Hyundai. However, this won’t be the exact same experience as what you’d find on LG TVs but rather a customized version designed for third parties. LG further explains: webOS Hub makes it possible for brands to customize the user interface (UI) in a variety of ways, such as fine-tuning the Home screen by selecting the color scheme, applying a visual style consistent with their identity or inserting a logo for visibility. By providing the capability to tailor webOS Hub, LG is enabling smart TV manufacturers to differentiate their offerings while delivering a more expansive and enjoyable user experience. LG technically started licensing WebOS in early 2021, but this latest expansion brings a “ten-fold increase.” Following just days behind LG’s reveal, Samsung has also confirmed that it will begin expanding Tizen to other smart TV brands this year. TV brands including Bauhn, Linsar, Sunny, and Vispera will adopt Samsung’s OS starting in Australia, with Italy, New Zealand, Spain, Türkiye, and the United Kingdom to follow later in 2022. Technically, Akai, Bauhn, and Linsar started selling Tizen TVs in Australia in September. Samsung’s version of Tizen for third-party brands brings support for Samsung TV Plus, Universal Guide, and even the Bixby voice assistant. Tizen is currently the single most popular platform for smart TVs, despite being limited to only Samsung’s first-party TVs. LG’s WebOS, meanwhile, comes in a relatively distant second. Meanwhile, Google’s Android TV OS, which is what powers Google TV, holds around 15% of the global market share. Google TV has been pushing for a bigger footprint in the smart TV market, and analysts have predicted that this year would have a huge impact on Google TV and Roku especially. With Tizen and WebOS expanding to more brands, it puts even more pressure on other players. More on Google TV: Here’s everything new in Google TV 12 on the Chromecast [Gallery] Google TV integrates with over 40 streaming services and apps, here’s the full list Chromecast with Google TV (4K) is getting updated to Android 12 soon FTC: We use income earning auto affiliate links. More.Check out 9to5Google on YouTube for more news:
Operating Systems
Even though very few of the early players in technology still exist, we use their creations to this day. Bell Labs created the transistor, and Fairchild Semiconductor created the integrated circuit, but neither company is still around. So is the case with Digital Equipment Corporation (DEC). It no longer exists, but unless you're using a handheld device to read this article, you're using a descendant of DEC technology. DEC was founded in 1957 by Ken Olsen, Harlan Anderson, and H. Edward Roberts to build small digital modules, but the team soon discovered that they could use those modules to build minicomputers—computers that were smaller and less powerful (but cheaper) than mainframes, which were the business standard at the time. In 1977, DEC introduced the VAX, a new line of minicomputers that featured a 32-bit instruction set architecture and virtual memory. Its operating system, VMS, was a multi-user, multitasking OS that provided features we now take for granted, including virtual memory, file sharing, and networking. It amassed a wide variety of third-party software packages that made it the most popular system in its class. In the late 1980s and early '90s, Andy Green ran a bulletin board system (BBS) and later an Internet service provider called Intelecom Data Systems (IDS) on a VAX 11/730 (later a VAXstation 4000) server in the basement of his parents’ house in Rhode Island. IDS had seven lines—unheard of at the time—and users could talk in a real-time chat room. All of this was written by Green in VAX BASIC. Today, Green is the owner and CEO of Acme Atronomatic, developer of the MyRadar mobile app. Green was exposed to the VAX through work and had picked up an old VAX 11/730 and started tinkering. He had previously run a BBS on a TRS-80, but the VAX, with its multitenancy, allowed for multiple concurrent users. “Prior to [IDS], the PC or TRS-80 were only engineered originally to be single-user, and they weren't set up to be multi-user,” Green told Ars. “The fact that VAX and VMS in general were designed for [multiple users] from the scratch is what facilitated the multi-user aspect.” The VAX served DEC well throughout the '80s and into the '90s, but as the latter decade went on, DEC began to face stiff competition from UNIX vendors, particularly Sun Microsystems. DEC struggled to change with the times, and the company ultimately failed. In 1998, DEC was acquired by Compaq, and in 2001, Compaq was acquired by Hewlett-Packard. The DEC line, including the VAX/VMS system, was discontinued and faded from the market. And yet it lives on today. Here’s how. VMS=WNT VMS was popular because DEC supported it so thoroughly. It had a user-friendly interface and powerful command-line tools, and it was one of the first operating systems to support networking protocols, including TCP/IP, DECnet, and SNA. It had a powerful file system that supported hierarchical directories and file permissions, and it was highly customizable. In 1988, a senior VMS engineer named David Cutler joined Microsoft to lead the development of the Windows NT operating system. Windows NT was a major departure from previous Microsoft operating systems, as it was a 32-bit, multi-user, multitasking OS. Windows client, still finding its way to usability, was a 16-bit layer that ran over MS-DOS. It wasn’t really an operating system; it was more like a program launcher. Windows NT launched in 1993 with version 3.1, matching the desktop version of Windows, which had also just been released. But while Windows 3.1 finally got it right, NT 3.1 was a bit too heavy for the PCs of the day, and it was recast as a server operating system.
Operating Systems
WiFi protocol flaw allows attackers to hijack network traffic - March 28, 2023 - 03:05 PM Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to trick access points into leaking network frames in plaintext form. WiFi frames are data containers consisting of a header, data payload, and trailer, which include information such as the source and destination MAC address, control, and management data. These frames are ordered in queues and transmitted in a controlled matter to avoid collisions and to maximize data exchange performance by monitoring the busy/idle states of the receiving points. The researchers found that queued/buffered frames are not adequately protected from adversaries, who can manipulate data transmission, client spoofing, frame redirection, and capturing. "Our attacks have a widespread impact as they affect various devices and operating systems (Linux, FreeBSD, iOS, and Android) and because they can be used to hijack TCP connections or intercept client and web traffic," reads the technical paper published yesterday by Domien Schepers and Aanjhan Ranganathan of Northeastern University, and Mathy Vanhoef of imec-DistriNet, KU Leuven. Power-saving flaw The IEEE 802.11 standard includes power-save mechanisms that allow WiFi devices to conserve power by buffering or queuing frames destined for sleeping devices. When a client station (receiving device) enters sleep mode, it sends a frame to the access point with a header that contains the power-saving bit, so all frames destined for it are queued. The standard, however, does not provide explicit guidance on managing the security of these queued frames and does not set limitations like how long the frames can stay in this state. Once the client station wakes up, the access point dequeues the buffered frames, applies encryption, and transmits them to the destination. An attacker can spoof the MAC address of a device on the network and send power-saving frames to access points, forcing them to start queuing frames destined for the target. Then, the attacker transmits a wake-up frame to retrieve the frame stack. The transmitted frames are usually encrypted using the group-addressed encryption key, shared among all the devices in the WiFi network, or a pairwise encryption key, which is unique to each device and used to encrypt frames exchanged between two devices. However, the attacker can change the security context of the frames by sending authentication and association frames to the access point, thus forcing it to transmit the frames in plaintext form or encrypt them with an attacker-provided key. This attack is possible using custom tools created by the researchers called MacStealer, which can test WiFi networks for client isolation bypasses and intercept traffic destined for other clients at the MAC layer. The researchers report that network device models from Lancom, Aruba, Cisco, Asus, and D-Link are known to be affected by these attacks, with the complete list below. The researchers warn that these attacks could be used to inject malicious content, such as JavaScript, into TCP packets. "An adversary can use their own Internet-connected server to inject data into this TCP connection by injecting off-path TCP packets with a spoofed sender IP address," warn the researchers. "This can, for instance, be abused to send malicious JavaScript code to the victim in plaintext HTTP connections with as goal to exploit vulnerabilities in the client's browser." While this attack could also be used to snoop on traffic, as most web traffic is encrypted using TLS, there would be a limited impact. Cisco acknowledges flaw The first vendor to acknowledge the impact of the WiFi protocol flaw is Cisco, admitting that the attacks outlined in the paper may be successful against Cisco Wireless Access Point products and Cisco Meraki products with wireless capabilities. However, Cisco believes says that the retrieved frames are unlikely to jeopardize the overall security of a properly secured network. Still, the firm recommends applying mitigation measures like using policy enforcement mechanisms through a system like Cisco Identity Services Engine (ISE), which can restrict network access by implementing Cisco TrustSec or Software Defined Access (SDA) technologies. "Cisco also recommends implementing transport layer security to encrypt data in transit whenever possible because it would render the acquired data unusable by the attacker," reads the Cisco security advisory. Currently, there are no known cases of malicious use of the flaw discovered by the researchers.
Operating Systems
With the beta cycle of iOS 16.4, we learned that Apple would no longer let anyone try the beta developer build without being enrolled in the company’s developer program. Now, with beta 3 of this upcoming operating system, Apple has given us a bit more information on how it will handle beta updates in the future. While this doesn’t change how people enroll in the current generation of operating systems (iOS 16, iPadOS 16, macOS 13 Ventura, tvOS 16, and watchOS 9), this will be different starting with iOS 17 beta testing cycle. According to 9to5Mac, iOS 16.4 beta 3 will let you set a different Apple ID to download a beta software update. For example, if you have a dev account for your company, but your iPhone uses your personal Apple ID, you can still keep your personal account, but you can also connect your dev information to your iPhone and download the new beta. When you go to Settings > General > Software Update > Beta Update, you’ll see a menu showing your Apple ID. Tapping there will let you enter an Apple ID other than your iCloud ID. If you’re a member of the Apple Developer Program or Apple Beta Software Program through another Apple ID, you’ll be able to download the latest beta. Apple is making this change to ensure only registered developers (the ones that pay $99/year) can test the betas for developers. Besides that, all other users can still enroll in the public beta program, which usually comes a day after the dev beta build is published. Apple started testing iOS 16.4 almost a month ago. This update includes 30+ emojis, tweaks to the Apple Music and Apple Podcasts apps, 5G Standalone support, new HomeKit architecture, and more. BGR will let you know if we discover more about this new operating system before it releases to all users.
Operating Systems
Forty years of GNU and the free software movement Computer hackers and users from across the world will celebrate GNU's anniversary with special events. These include a specially convened GNU Hackers Meeting in Biel, Switzerland and a hackday for hackers of any skill level at the FSF's headquarters in Boston, MA. On September 27, 1983, a computer scientist named Richard Stallman announced the plan to develop a free software Unix-like operating system called GNU, for "GNU's not Unix." GNU is the only operating system developed specifically for the sake of users' freedom, and has remained true to its founding ideals for forty years. Since 1983, the GNU Project has provided a full, ethical replacement for proprietary operating systems. This is thanks to the forty years of tireless work from volunteer GNU developers around the world. When describing GNU's history and the background behind its initial announcement, Stallman (often known simply as "RMS") stated, "with a free operating system, we could again have a community of cooperating hackers -- and invite anyone to join. And anyone would be able to use a computer without starting out by conspiring to deprive his or her friends." "When we look back at the history of the free software movement -- or the idea that users should be in control of their own computing -- it starts with GNU," said Zoë Kooyman, executive director of the FSF, which sponsors GNU's development. "The GNU System isn't just the most widely used operating system that is based on free software. GNU is also at the core of a philosophy that has guided the free software movement for forty years." Usually combined with the kernel Linux, GNU forms the backbone of the Internet and powers millions of servers, desktops, and embedded computing devices. Aside from its technical advancements, GNU pioneered the concept of "copyleft," the approach to software licensing that requires the same rights to be preserved in derivative works, and is best exemplified by the GNU General Public License (GPL). As Stallman stated, "The goal of GNU was to give users freedom, not just to be popular. So we needed to use distribution terms that would prevent GNU software from being turned into proprietary software. The method we use is called 'copyleft.'" The free software community has held strong for forty years and continues to grow, as exemplified by the FSF's annual LibrePlanet conference on software freedom and digital ethics. Kooyman continues, "We hope that the fortieth anniversary will inspire hackers, both old and new, to join GNU in its goal to create, improve, and share free software around the world. Software is controlling our world these days, and GNU is a critique and solution to the status quo that we desperately need in order to not have our technology control us." GNU Hacker's Meeting in Biel, Switzerland On September 27, GNUnet e.V. is celebrating GNU's fortieth anniversary with a hacker meeting in Switzerland, which will feature presentations about various GNU packages, hacking, and making new releases. Among the speakers are Richard Stallman, the founder of GNU; Free Software Award winner Sébastien Blin of GNU Jami; the president of the Free Software Foundation Europe, Matthias Kirschner; and several GNU developers. There have been few if any other occasions where so many GNU maintainers will be present in person. Hackday at the FSF Headquarters In honor of GNU's fortieth anniversary, its organizational sponsor the FSF is organizing a hackday for families, students, and anyone interested in celebrating GNU's anniversary. It will be held at the FSF's offices in Boston, MA on October 1. About the Free Software Foundation The Free Software Foundation, founded in 1985, is dedicated to promoting computer users' right to run, edit, share, contribute to, and redistribute computer programs. The FSF promotes the development and use of free (as in freedom) software -- particularly the GNU operating system and its GNU/Linux variants -- and free documentation for free software. The FSF also helps to spread awareness of the ethical and political issues of freedom in the use of software, and its Web sites, located at https://fsf.org and https://gnu.org, are an important source of information about GNU/Linux. Donations to support the FSF's work can be made at https://donate.fsf.org. More information about the FSF, as well as important information for journalists and publishers, is at https://www.fsf.org/press. About the GNU Operating System and Linux Richard Stallman announced in September 1983 the plan to develop a free software Unix-like operating system called GNU. GNU is the only operating system developed specifically for the sake of users' freedom. See http://www.gnu.org/gnu/the-gnu-project.html. In 1992, the essential components of GNU were complete, except for one, the kernel. When in 1992 the kernel Linux was re-released under the GNU GPL, making it free software, the combination of GNU and Linux formed a complete free operating system, which made it possible for the first time to run a PC without non-free software. This combination is the GNU/Linux system. For more explanation, see http://www.gnu.org/gnu/gnu-linux-faq.html. Media Contacts Greg Farough Campaigns Manager Free Software Foundation +1 (617) 542 5942 campaigns@fsf.org
Operating Systems
I was wrong; macOS Sonoma might not launch alongside iOS 17 later next month. Previously, I pointed out that Apple could have been planning to release all operating system updates together for the first time in years due to the lack of new features. But after the company seeded iOS 17 beta 6 alongside the sixth build of iPadOS 17, tvOS 17, and watchOS 10 but did not release the latest macOS Sonoma build, it’s now clear that Apple might be holding on to this operating system update to October. The reason isn’t because Apple needs more time to perfect macOS Sonoma, but mostly because it might be planning to release new Macs alongside a new operating system. Over the past weeks, Bloomberg‘s Mark Gurman reported that M3 Macs are on the horizon. That said, while iOS 17 and the other operating systems might launch alongside the iPhone 15, we’ll have to wait another month for macOS Sonoma. These are the Macs that could launch alongside macOS Sonoma Although it’s unclear if Apple is planning to hold an October event – sometimes the company only announces new products through press releases – there are several Macs that Apple could be planning to introduce. Here they are: - 13-inch MacBook Air (codenamed Mac 15,1 and J513/J613): could be announced in October with the M3 chip; it was last updated on June 2022. It’s unclear if the 15-inch variation could launch already; - 13-inch MacBook Pro (codenamed Mac 15,3 and J504): could also be announced in October with the M3 chip; it was last updated on June 2022. No design change is expected; - 24-inch iMac (codenamed Mac 15,4, Mac 15,5, J433, and J434): last updated in April 2021, Gurman expects this machine to get the M3 chip in the October event. Rumors so far point out that this Mac might maintain the same look as its 2021 version. - Mac mini (codenamed Mac 15,12): Gurman says Apple started testing what seems to be the M3 Mac mini. It includes eight CPU cores, 10 graphic processor cores, and 24GB of memory. This machine runs macOS Sonoma 14.1, but it’s unclear if it could be introduced later this October.
Operating Systems
Pixel Binary Transparency is hopefully a Pixel feature you’ll never have to worry about. That is, you’ll never have to worry about it as long as your Android phone is never hacked. Hackers have ways to install an Android version on a target phone that has built-in features to spy on everything you do on a smartphone. But Google’s new Pixel Binary Transparency security feature can be a lifesaver if you ever are a target. This is a great feature to have in this environment, where hacks can happen all the time. Even during the production and assembly of a device, when the final software is flashed onto it. Ensuring the operating system is genuine is also something you should consider doing when buying used Android handsets. The new Pixel feature in question could help with that. Other device makers have their own ways to ensure the safety of their operating systems. But they should probably copy Google’s approach. At least when it comes to allowing the customer to verify their smartphone hasn’t been hacked at any point since production. The security worries The feature isn’t entirely new, as Google announced it initially in 2021. But Pixel Binary Transparency appears to be exclusive to Pixel phones for the time being. It complements the existing Android Verified Boot feature, which ensures that software running on a phone or tablet comes from a genuine source. Pixel Binary Transparency comes in response to an increasing wave of attacks on the software supply chain. The point of this type of hack is to add backdoors to smartphone software. Malicious individuals can then exploit them to spy on their targets. Google already prevents this with Android Verified Boot. The feature checks whether the Android OS your device is running matches the audited Pixel phone firmware (factory images). With Pixel Binary Transparency on top, you’ll be able to also confirm your Pixel phone is running genuine software. How Pixel Binary Transparency works The Pixel Binary Transparency tool is a public cryptographic log that will record all metadata about Pixel factor images, Google explains. Pixel users can then use this to mathematically prove that their software is genuine. The log is built in such a way that you can only add to it. You can’t modify what was written before. You can’t delete previous additions, either. That means a hacker’s Android OS would not pass the test. Or that it’d be incredibly difficult to insert malicious code and not get caught: Being append-only provides resilience against attacks on Pixel images as attackers know that it’s more difficult to insert malicious code without being caught, since an image that’s been altered will no longer match the metadata Google added to the log. There’s no way to change the information in the log to match the tampered version of the software without detection (Ideally the metadata represents the entirety of the software, but it cannot attest to integrity of the build and release processes.) To try it out, you can go to this link and go through all the Pixel Binary Transparency technical details. The process involves extracting metadata from your phone and running the program that will let you compare it against the log. We need similar tools on other devices As cool as the Pixel Binary Transparency tool might be, it’s not something you can do with the press of a button. It’s not available directly on the phone. Maybe that’s what Google should do with a future version of the software. This security feature should be easy to use by any Pixel owner, without having to go through a complex process or learning curve. While other smartphone vendors have their own software audit and security practices in place, all Android devices could benefit from a similar feature. It’s an effortless way to check that the phone is running genuine Android software, as Google and the manufacturer intended. On the same note, maybe similar security checks could extend to other operating systems and devices. Apple could always provide similar tools for iPhones, iPads, and Macs, while Microsoft could cover Windows PCs.
Operating Systems
Windows 11 is reportedly in use by more than 400 million monthly active devices. Windows Central reports that it has seen “Microsoft internal data” that shows Windows 11 is expected to hit 500 million monthly active devices by early 2024. All signs have pointed towards a slower adoption of Windows 11 than its predecessor and this leaked data backs up the assumption. Windows 10 first reached 400 million active devices just over a year after release, an adoption rate that Microsoft proudly noted was 115 percent faster than Windows 7. It has taken Windows 11 two years to reach that same adoption rate, a significant slowdown considering Windows 10 reached 600 million devices a few months after its two-year anniversary. Microsoft first launched Windows 11 in October 2021 with strict hardware requirements. Windows 11 is only supported on CPUs released from 2018 onwards, and with devices that support TPM security chips. Microsoft shifted the minimum system requirements in order to focus on raising the security threshold in Windows 11, with modern chips capable of enabling memory integrity security features that rely on virtualization and Microsoft’s Virtual Machine Platform (VMP). These hardware requirements have meant that Windows 11 has lagged behind the Windows 10 rollout, which was also offered to Windows 7 and Windows 8 users as a free upgrade. Windows 11 was a free upgrade for Windows 10 users, but only if they met the minimum hardware requirements that left millions of machines behind. We’ve seen the slow adoption reflected in Steam survey data, with Windows 11 only counting for 37 percent of operating systems, compared to nearly 60 percent for Windows 10. Statcounter puts Windows 11’s market share at nearly 25 percent, far behind the more than 70 precent of Windows 10. Microsoft has never officially shared how many active devices are running Windows 11. The software maker used to offer a combination of Windows 10 and Windows 10 monthly active devices on its “Microsoft by the numbers” website, but that was quietly discontinued late last year. A cached page reveals there were more than 1.4 billion monthly active devices running Windows 10 or Windows 11 in April 2022, according to Microsoft. Working on Microsoft’s own numbers that would put Windows 11 at nearly 30 percent of Windows usage, with Windows 10 still in use by nearly 1 billion devices. Microsoft hit its goal of 1 billion devices running Windows 10 in March 2020, more than 18 months before the Windows 11 launch. Microsoft’s own support for Windows 10 is set to end on October 14th, 2025, meaning an end to security updates and fixes for millions of machines. If Microsoft isn’t able to convince more businesses and consumers to switch to Windows 11 (or whatever comes next) by 2025, then it seems likely that the company will need to extend that support cutoff date. Microsoft is now expected to launch Windows 12 in 2024. Intel recently teased a “Windows refresh” for 2024 which it hopes will boost its revenues. The teaser came months after references to Windows 12 were leaked from internal Intel documents. Microsoft hasn’t announced any plans for Windows 12, but there are signs a future version of Windows will be focused on AI. “As we start to develop future versions of Windows we’ll think about other places where AI should play a natural role in terms of the experience,” said Yusuf Mehdi, Microsoft’s head of consumer marketing, in an interview with The Verge earlier this year.
Operating Systems
Apple's launching a new operating system soon, and it's probably going to be called "xrOS." Apple's xrOS will power the company's upcoming mixed reality headset, likely to be unveiled at Apple WWDC in June. While the news isn't official yet, the name was all but confirmed by a wordmark registered with the New Zealand Intellectual Property Office (as noticed by Vox Media's product manager Parker Ortolani(opens in a new tab)). Note the capitalized "OS" and the San Francisco typeface used for the wordmark, the same one used for Apple's other operating systems, such as iOS and macOS. Other rumored names for the upcoming OS included realityOS, and rOS. But a Bloomberg report, published in December 2022(opens in a new tab), said it was likely going to be xrOS, where "xr" stands for "extended reality." The new OS will likely power Apple's future mixed reality products, with the first one being a mixed reality headset which will reportedly either be called Reality Pro or Reality One. Rumors and reports says the headset will be very expensive but also very powerful, with more than 10 cameras (both on the inside and outside), high-res displays, and an Apple M2-level chip inside. Design-wise, the headset will be fairly lightweight, but it will require an external battery pack, ideally worn on the waist and connected to the headset via a cable. And while xrOS itself will resemble Apple's other operating systems, it will be mostly controlled via hand gestures combined with eye tracking. Apple's WWDC 2023 event kicks off on June 5. Alongside the new OS and the headset, we'll likely see new MacBooks, and updated versions of all of Apple's other operating systems.
Operating Systems
Apple released an update for its web browser, Safari, on Thursday to address a security issue in some older operating systems. The company said Safari 15.6.1 is meant to address a WebKit vulnerability that could lead to an arbitrary code execution on MacOS Big Sur and MacOS Catalina. Apple wrote that it is aware that this vulnerability may have been exploited so people should update Safari as soon as they can.This story is being updated.
Operating Systems
Windows 8 was known for its radical change to the OS app screen. Since then, Microsoft has reincorporated default features like the Start button in Windows 10 and 11.Image: George Dolgikh (Shutterstock)Poor, beleaguered Windows 7, 8, and 8.1 are now officially strolling the Elysian Fields of dead operating systems as Microsoft that the end of its support for them finally arrived on Tuesday.OffEnglishThough the OS will continue to function, the end of support means 8.1 will no longer receive any software or security updates. It also means the company won’t provide any technical support for either operating system. Windows 8 came out back in 2012, but the company released its 8.1 patch just a year later to address criticisms like a lack of a Start button and a lack of customization. That OS was finally succeeded by Windows 10 just three years later.But more than that, Jan. 10 is the day that Microsoft is truly ending any and all support for 8’s much more popular younger brother, Windows 7.Three years ago almost to the day, Microsoft officially announced it would stop doing software updates for Windows 7, an OS that originally came out in 2009. Still, the company did offer a hand with its Extended Security Updates (ESU) service for people running Windows 7 Professional and Windows 7 Enterprise. Still, those extended security patches didn’t include Microsoft Support, and users had to pay to sign up for the service. Windows 8.1 won’t be seeing any extended security support, likely because 8 proved to be a much less popular version of the OS than 7.Of course, both operating systems will still run on computers, but a lack of software patches does open up plenty of vulnerabilities. The last patch Windows 7 received for ESU customers was back in December.G/O Media may get a commissionUp to $100 creditSamsung ReserveReserve the next gen Samsung deviceAll you need to do is sign up with your email and boom: credit for your preorder on a new Samsung device.At the end of 2020, ZDNet reported there were still millions of computers running Windows 7 even though Microsoft ended full support. Official analytics from U.S. government agencies previously suggested that 8.5% of federal computer systems were still running Windows 7 three years ago. The latest numbers from Sunday show there are still over 33,000 federal computer systems running 7. Similarly, there are over 18,000 federal systems running Windows 8 or 8.1.In the meantime, adoption of Windows 11 has been pretty slow for Microsoft’s tastes. Analytics firm Statcounter reported at the tail end of last year that the latest OS accounts for just under 17% of Windows market share. It barely beat out Windows 7, which claimed 11%. Last year, the company included a host of new features for the OS, including new accessibility and security features, but that still hasn’t made enough of a case for the 68% of Windows 10 users to finally make the switch.
Operating Systems
A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a remote adversary to break out of security barriers and perform arbitrary operations on the underlying machine. "A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox," GitHub said in an advisory published on September 28, 2022. The issue, tracked as CVE-2022-36067 and codenamed Sandbreak, carries a maximum severity rating of 10 on the CVSS vulnerability scoring system. It has been addressed in version 3.9.11 released on August 28, 2022. vm2 is a popular Node library that's used to run untrusted code with allowlisted built-in modules. It's also one of the most widely downloaded software, accounting for nearly 3.5 million downloads per week. The shortcoming is rooted in the error mechanism in Node.js to escape the sandbox, according to application security firm Oxeye, which discovered the flaw. This means that successful exploitation of CVE-2022-36067 could permit an attacker to bypass the vm2 sandbox environment and run shell commands on the system hosting the sandbox. In light of the critical nature of the vulnerability, users are recommended to update to the latest version as soon as possible to mitigate possible threats. "Sandboxes serve different purposes in modern applications, such as examining attached files in email servers, providing an additional security layer in web browsers, or isolating actively running applications in certain operating systems," Oxeye said. "Given the nature of the use cases for sandboxes, it's clear that the vm2 vulnerability can have dire consequences for applications that use vm2 without patching." Found this article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
Microsoft said it's tracking an ongoing large-scale click fraud campaign targeting gamers by means of stealthily deployed browser extensions on compromised systems. "[The] attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices," Microsoft Security Intelligence said in a sequence of tweets over the weekend. The tech giant's cybersecurity division is tracking the developing threat cluster under the name DEV-0796. Attach chains mounted by the adversary commence with an ISO file that's downloaded onto a victim's machine upon clicking on a malicious ad or comments on YouTube. The ISO file, when opened, is designed to install a browser node-webkit (aka NW.js) or rogue browser extension. It's worth noting that the ISO file masquerades as hacks and cheats for the Krunker first-person shooter game. Cheats are programs that help gamers gain an added advantage beyond the available capabilities during gameplay. Also used in the attacks are DMG files, which are Apple Disk Image files primarily used to distribute software on macOS, indicating that the threat actors are targeting multiple operating systems. The findings arrive as Kaspersky disclosed details of another campaign that lures gamers looking for cheats on YouTube into downloading self-propagating malware capable of installing crypto miners and other information stealers. "Malware and unwanted software distributed as cheat programs stand out as a particular threat to gamers' security, especially for those who are keen on popular game series," the Russian cybersecurity firm said in a recent report. Found this article interesting? Follow THN on Facebook, Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
WHAT TOOK YOU SO LONG? — It only took 50 years, but there's finally a replacement that's safer and easier to use. Gertty Images For years, Big Tech has insisted that the death of the password is right around the corner. For years, those assurances have been little more than empty promises. The password alternatives—such as pushes, OAUTH single-sign ons, and trusted platform modules—introduced as many usability and security problems as they solved. But now, we’re finally on the cusp of a password alternative that’s actually going to work. The new alternative is known as passkeys. Generically, passkeys refer to various schemes for storing authenticating information in hardware, a concept that has existed for more than a decade. What’s different now is that Microsoft, Apple, Google, and a consortium of other companies have unified around a single passkey standard shepherded by the FIDO Alliance. Not only are passkeys easier for most people to use than passwords; they are also completely resistant to credential phishing, credential stuffing, and similar account-take-over attacks. On Monday, PayPal said US-based users would soon have the option of logging in using FIDO-based passkeys, joining Kayak, eBay, Best Buy, CardPointers and WordPress.com as online services that will offer the password alternative. In recent months, Microsoft, Apple, and Google have all updated their operating systems and apps to enable passkeys. Passkey support is still spotty. Passkeys stored on iOS or macOS will work on Windows, for instance, but the reverse isn’t yet available. In the coming months, all of that should be ironed out, though. What, exactly, are passkeys? FIDO AlliancePasskeys work almost identically to the FIDO authenticators that allow us to use our phones, laptops, computers, and Yubico or Feitian security keys for multi-factor authentication. Just like the FIDO authenticators stored on these MFA devices, passkeys are invisible and integrate with Face ID, Windows Hello, or other biometric readers offered by device makers. There’s no way to retrieve the cryptographic secrets stored in the authenticators short of physically dismantling the device or subjecting it to a jailbreak or rooting attack. Even if an adversary was able to extract the cryptographic secret, they still would have to supply the fingerprint, facial scan, or—in the absence of biometric capabilities—the PIN that’s associated with the token. What’s more, hardware tokens use FIDO’s Cross-Device Authentication flow, or CTAP, which relies on Bluetooth Low Energy to verify the authenticating device is in close physical proximity to the device trying to log in. Until now, FIDO-based security keys have been used mainly to provide MFA, short for multi-factor authentication, which requires someone to present a separate factor of authentication in addition to the correct password. The additional factors offered by FIDO typically come in the form of something the user has—a smartphone or computer containing the hardware token—and something the user is—a fingerprint, facial scan, or other biometric that never leaves the device. So far, attacks against FIDO-compliant MFA have been in short supply. An advanced credential phishing campaign that recently breached Twilio and other top-tier security companies, for instance, failed against Cloudflare for one reason: Unlike the other targets, Cloudflare used FIDO-compliant hardware tokens that were immune to the phishing technique the attackers used. The victims who were breached all relied on weaker forms of MFA. But whereas hardware tokens can provide one or more factors of authentication in addition to a password, passkeys rely on no password at all. Instead passkeys roll multiple authentication factors—typically the phone or laptop and the facial scan or fingerprint of the user—into a single package. Passkeys are managed by the device OS. At the user’s option, they can also be synced through end-to-end encryption with a user’s other devices using a cloud service provided by Apple, Microsoft, Google, or another provider. Passkeys are “discoverable,” meaning an enrolled device can automatically push one through an encrypted tunnel to another enrolled device that’s trying to sign in to one of the user’s site accounts or apps. When signing in, the user authenticates themselves using the same biometric or on-device password or PIN for unlocking their device. This mechanism completely replaces the traditional username and password and provides a much easier user experience. “Users no longer need to enroll each device for each service, which has long been the case for FIDO (and for any public key cryptography)," said Andrew Shikiar, FIDO's executive director and chief marketing officer. "By enabling the private key to be securely synced across an OS cloud, the user needs to only enroll once for a service, and then is essentially pre-enrolled for that service on all of their other devices. This brings better usability for the end-user and—very significantly—allows the service provider to start retiring passwords as a means of account recovery and re-enrollment.” Ars Review Editor Ron Amadeo summed things up well last week when he wrote: "Passkeys just trade WebAuthn cryptographic keys with the website directly. There's no need for a human to tell a password manager to generate, store, and recall a secret—that will all happen automatically, with way better secrets than what the old text box supported, and with uniqueness enforced." Page: 1 2 Next →
Operating Systems
Beijing says it uncovered US National Security Agency operatives behind cyberattack on Chinese university - ‘Second Date’ software used in Northwestern Polytechnical University attack is potent cyber espionage tool developed by US agency, says state media - After global tracing, Chinese team reportedly found ‘thousands of network devices’ across the country still infected by the spyware and its derivatives State-run CCTV said on Thursday that China’s National Computer Virus Emergency Response Centre, with help from Chinese antivirus company 360 Total Security, had discovered the identity of the National Security Agency (NSA) operative or operatives – the broadcaster did not specify how many or name them – after it extracted “multiple samples” of a spyware called “Second Date”. It said the spyware was used in the cyberattack on Northwestern Polytechnical University in Shaanxi province. The report said technical analysis showed that Second Date was a cyberespionage weapon developed by the NSA to sniff out and hijack network traffic and insert malicious codes. Quoting senior engineer at the National Computer Virus Emergency Response Centre Du Zhenhua, it said software was a potent cyberespionage tool that enabled attackers to take control of target network devices and the data traffic flowing through them, and use them as a “forward base” for the next stage of attacks. It could run on various operating systems and was compatible with multiple architectures. Du was quoted as saying the spyware was usually used in conjunction with various network device vulnerability attack tools from the NSA’s Office of Tailored Access Operations (TAO). The TAO, now renamed Computer Network Operations, is a cyberwarfare intelligence-gathering unit. The report said that after global tracing, the Chinese team found “thousands of network devices” across the country were still infected by the spyware and its derivatives. It said they also found springboard servers remotely controlled by the NSA in Germany, Japan, South Korea, India and Taiwan. On Thursday, the state security ministry said China had become “a major victim of high-level persistent threats online”, and vowed to strengthen the tracking, monitoring and prevention of cyberespionage, “effectively safeguarding” China’s network security, in a commentary published on its official WeChat account. “[We] will have ‘digital spies’ reveal their true colours and have nowhere to hide!” the commentary said. Without naming a specific country or agency, it said “dozens of intelligence agencies from different countries and regions” had carried out cyberattacks in China via specific agencies and “cover companies”. Besides directly carrying out cyberattacks, foreign spies also lured Chinese companies via outsourcing arrangements, paying for data and system loopholes, it said. The commentary said these cyberattack targets extended beyond government agencies, with foreign spies and intelligence agencies aiming for “our critical information infrastructure and major infrastructure network systems and … our universities, scientific research institutions, large enterprises, hi-tech companies and other institutions as well as corporate executives, experts and scholars”.
Operating Systems
Why it matters: Over the years, Google has introduced numerous security measures to thwart evolving ever-evolving threats to Android systems. The emerging problem of pre-installed malware has pushed the company to allow users to check their operating systems against verified public records. Pixel phone and tablet owners can now use Google's Pixel Binary Transparency to ensure their firmware matches trusted installation data. The feature comes in response to the rising frequency of hackers tampering with software on Android devices before they reach customers. Security researchers have recently raised alarm bells over malware that can come pre-installed on millions of Android devices worldwide. Vendors offering cheaper phones, tablets, or other products might use Android-based firmware from dubious sources, allowing hackers to sneak malicious code onto factory-sealed devices. Attackers can also compromise the developers of the pre-installed apps that manufacturers often include in their products, eventually stealing users' information or tricking them into expensive purchases. Data suggests the problem primarily affects users in Eastern Europe and Southeast Asia. Security analysts have observed Android device brands like Oppo, OnePlus, Realme, and Xiaomi practicing insecure firmware policies. One solution from Google is Pixel Binary Transparency, which the company first mentioned in 2021 and has recently described in greater detail. The tool consists of a public cryptographic log containing metadata from official Pixel device factory images, which the company implements as a tile-based Merkel tree. Power users can compare their firmware images with Google's to check for suspicious additions to the code. Furthermore, it should be extremely difficult or impossible for attackers to change the public log to fit their infected builds without being detected because it's cryptographically guaranteed to be append-only. Information can only be added to the record but never changed or deleted. The concept is fundamentally similar to a blockchain. Google plans to improve Pixel Binary Transparency continually, but it's only available for Pixel devices. Hopefully, it or similar tools eventually become available for other Android systems. Currently, the best way to avoid pre-installed malware or compromised Android installs is to purchase hardware from large, established brands like Samsung and Google, which are more likely to enforce stringent security measures. Most pixel owners likely won't need Binary Transparency, as Google designed it for users with coding experience. The feature complements Android Verified Boot, a more accessible security measure that checks whether all executed code on a device comes from trustworthy sources.
Operating Systems
For longer than some of you have been alive, I've been preaching the gospel of using more secure desktop operating systems. You see, Windows has been insecure since 1985's Windows 1.0, really an MS-DOS extension, rolled out the door. Then, as now, there were more secure options. Then it was Unix desktop operating systems. Today it's Linux desktops.Why hasn't Microsoft ever gotten its security act together? The fundamental problem is that Windows was never, ever meant to work on a network. It worked as a standalone PC operating system. And, even today, 37 years later, the same pre-internet problems keep showing up. Unix and Linux started with the premise that there's more than one user on the system, and you need to secure accounts and programs from other users, local or remote. This has served these operating systems well.  In addition, the developers from Redmond may say they rewrite Windows code from the bottom up to make it more secure. But, they don't. Take, for example, Microsoft recently patched zero-day remote code execution Windows Scripting Languages Remote Code Execution Vulnerability, CVE-2022-41128, With a  Common Vulnerability Scoring System (CVSS) rating of 8.8, it's a baddie. This is a Windows JavaScript scripting language security hole. Specifically, it's a hole in Internet Explorer (IE) 11's JScript9 JavaScript engine. Also: Hackers are still finding -- and using -- flaws in Internet ExplorerIt's a nasty one. It affects every version of currently supported Windows. That includes everything from Windows 8.1 to all the various Windows Servers and Windows 11. Since it showed up, North Korean hackers exploited it to infect South Korean users with malware.It works by presenting the victims with a malicious document. When an innocent opens the document, it then downloads a rich text file (RTF) remote template. The HTML inside would then be rendered by the IE engine. Then -- ta-da! -- you've got a case of some malware or the other. The Google Threat Analysis Group (TAG) that found it said, "This technique has been widely used to distribute IE exploits via Office files since 2017. Delivering IE exploits via this vector has the advantage of not requiring the target to use Internet Explorer as its default browser."Oh, guys, it is so, so much older than that. I described this kind of problem in the long-defunct magazine PC Sources in 1992 when I found it in Windows for WorkGroup 3.1. Then, as now, Windows and its native programs treated document data as programming instructions. That's why according to Atlas VPN, "Microsoft Office remains the most widely exploited software for malware delivery." How bad is it? Try 78.5% of all attacks. Office on your PC, Office 365, it doesn't matter. They're all open to attacks. Now, then, what's the elephant in the room I haven't mentioned yet? It's that IE retired back in June 2022. It's been replaced by Microsoft Edge. Also: The best Linux laptops So, why the heck are all versions of Windows vulnerable to an IE attack in late 2022? Isn't it history? I mean, IE was never in Windows 11, anyway. You'd like to think that, but no matter what version of Windows you're using, the IE engine is still in Windows and still ready to run JavaScript attacks.Windows's fundamental security flaws have never been fixed. They never will be. Backward compatibility is far more important to Microsoft than security. So, the company continues to play patch a hole. If, like me, you favor security over backward compatibility, you'll run Linux. Despite what you've heard, Linux is not that hard to use. But, if you'd rather not go to the effort, just buy a Chromebook. Anyone can use a Chromebook, and, since it's based on Linux, it's a lot more secure. Related Stories:Microsoft Patch Tuesday fixes six critical vulnerabilitiesMicrosoft's Internet Explorer browser is finally gone. But not everyone is happy about it
Operating Systems
Server Security / Network Security Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected systems. The high-severity flaws, tracked as CVE-2022-38023, CVE-2022-37966, CVE-2022-37967, and CVE-2022-45141, have been patched in versions 4.17.4, 4.16.8 and 4.15.13 released on December 15, 2022. Samba is an open source Windows interoperability suite for Linux, Unix, and macOS operating systems that offers file server, printing, and Active Directory services. A brief description of each of the weaknesses is below - CVE-2022-38023 (CVSS score: 8.1) - Use of weak RC4-HMAC Kerberos encryption type in the NetLogon Secure Channel CVE-2022-37966 (CVSS score: 8.1) - An elevation of privilege vulnerability in Windows Kerberos RC4-HMAC CVE-2022-37967 (CVSS score: 7.2) - An elevation of privilege vulnerability in Windows Kerberos CVE-2022-45141 (CVSS score: 8.1) - Use of RC4-HMAC encryption when issuing Kerberos tickets in Samba Active Directory domain controller (AD DC) using Heimdal It's worth noting that both CVE-2022-37966 and CVE-2022-37967, which enable an adversary to gain administrator privileges, were first disclosed by Microsoft as part of its November 2022 Patch Tuesday updates. "An unauthenticated attacker could conduct an attack that could leverage cryptographic protocol vulnerabilities in RFC 4757 (Kerberos encryption type RC4-HMAC-MD5) and MS-PAC (Privilege Attribute Certificate Data Structure specification) to bypass security features in a Windows AD environment," the company said of CVE-2022-37966. The patches also come as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week published 41 Industrial Control Systems (ICS) advisories pertaining to various flaws impacting Siemens and Prosys OPC products. Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
Operating Systems
Microsoft is ending its upgrade offer from Windows 7 or 8 to Windows 10 or 11, the company recently announced. While Microsoft officially sunsetted the offer in July 2016, users were still able to upgrade their operating systems to 11 using old Windows 7/8 keys. Now, this loophole is no more; users can't upgrade to Windows 11 using Windows 7/8 keys anymore, reported our friends at PCMag. Those with Windows 10 can still upgrade to 11 for free, Microsoft said in its announcement. Microsoft unveiled more news at its recent Microsoft Surface event, including passwordless logins for Windows 11 and updated features for Copilot, Microsoft's AI tool. Last month, the tech giant also announced that it's ending text-editing app WordPad after 30 years.
Operating Systems
When it announced iOS 16, iPadOS 16, and macOS Ventura at its Worldwide Developers Conference last summer, one of the features Apple introduced was something called "Rapid Security Response." The feature is meant to enable quicker and more frequent security patches for Apple's newest operating systems, especially for WebKit-related flaws that affect Safari and other apps that use Apple's built-in browser engine. Nearly a year after that WWDC and more than seven months after releasing iOS 16 in September, Apple has finally issued a Rapid Security Response update. Available for iOS and iPadOS devices running version 16.4.1 or Macs running version 13.3.1, the update adds an (a) to your OS version to denote that it's been installed. At this point, it's unclear whether Apple intends to release more information about the specific bugs patched by this Security Response update; the support page linked to in the update is just a general description of Rapid Security Response updates and how they work, and the Apple's Security Updates page hasn't been updated with more information as of this writing. Apple has released several Rapid Security Response updates to iOS and macOS beta users before now, including during iOS 16.4's beta phase, but it has never released one to the public until today. It's possible that the updates released to beta users were simply testing the update mechanism rather than applying meaningful security patches. As detailed in our macOS Ventura review, the Rapid Security Response feature required significant under-the-hood changes to how the encrypted, sealed system volumes in iOS and macOS normally work. In previous OS versions, all system files were on a signed system volume (SSV), and any change to the files required the entire system volume to be loaded as a snapshot, patched, resealed, and then loaded the next time the device reboots. This setup protects system files from tampering, but the downsides are increased update download sizes, longer update times, and mandatory reboots, something users will often put off to avoid interrupting what they're trying to use their computers for. The iOS 16 and macOS Ventura updates move some system files outside of the SSV into still-encrypted but smaller and more compartmentalized extensions of the SSV. These "cryptexes" can be updated without modifying the main SSV. Rapid Security Response updates won't always come without reboots—today's update required a reboot of my M1 MacBook Air and iPhone 13 Pro—but these did have much smaller file sizes and installation times than the 16.4.1 and 13.3.1 updates that Apple released earlier this month. The iOS 16.4.1 (a) update was only 85.7MB on my phone, while the 16.4.1 update was several hundred MB (this will vary from device to device). Rapid Security Response updates can be disabled in Settings without modifying your settings for downloading and installing other kinds of iOS and macOS updates. The updates can also be removed post-installation. Today's update initially threw an error message for people who attempted to install it, but as of this story's publication, it seems like Apple fixed the problem.
Operating Systems