Recent Posts

Pages: [1] 2 3 ... 10
1
Android O.S | Apps / An awesome Android audio upgrade
« Last post by javajolt on Today at 07:26:42 PM »
Whether you're dealing with mumblings from meetings, noises from notifications, or music from commute-time streaming, you've never experienced sound on your phone like this.


CREDIT: JR RAPHAEL/GOOGLE/BRONEARTULM

Every now and then, I come across an Android customization concept so clever, so cool, so splendidly useful that I just can’t wait to share it with you.

Today, my fellow Android-appreciating animal, is one of those days.

The concept in question is a hefty and exceptionally practical upgrade for your Android audio experience. It brings a boost to the way you interact with sound on whatever Android device you’re using, no matter who made it or how old it may be. And it’ll take you less than a minute to get going (though, if you enjoy geeking out over details as much as I do, you may find yourself fine-tuning its setup and exploring advanced options within it for a while beyond that).

I’m tellin’ ya: It’s one heck of an improvement. And unlike most of the stuff we’re bound to hear about at Google’s grand I/O gala next Tuesday, it’s something you can start using this very second — and something with an impact that’ll be immediately obvious and genuinely advantageous all throughout your day, both for professional work-related purposes and for any after-hours audio adventuring.

Ready for a whole new level of Android aural pleasure?

Meet your Android audio enhancement

The upgrade of which we speak may seem simple on the surface, but don’t be fooled: This nifty little lift will affect all aspects of your Android-using experience and make your life easier — even saving you time and increasing your efficiency — countless times a day.

It’s a completely new take on the Android volume panel — y’know, the little slider that shows up whenever you tap your phone’s physical volume keys. Unless you’re a complete and total nerd (hello!), that’s probably a part of the Android interface you haven’t spent much time thinking about. But believe you me, once you see how much of a meaningful difference this improvement introduces, you’ll wonder how you went so long without it.

Our upgrade comes by way of a thoughtfully crafted app called Precise Volume 2.0. The app essentially replaces your standard volume panel interface with a totally different, much more customizable, and delightfully feature-rich alternative. (And, yes, you’d better believe this is another one of those wonderful control-claiming superpowers that’d be possible only on Android.)

But enough with the broad blathering. Precise Volume has six especially noteworthy benefits that I’d encourage you to consider:

1. It empowers you to create all sorts of custom presets — specific sets of volume levels for media, ring and notification noises, call and alarm chimes, and even general system sounds — and then activate those with a single swift tap right from your regular volume panel pop-up.

2. It includes easy options for automation, too, so you can instantly have your phone change its volume settings in any specific way anytime a particular app is opened, anytime a specific Bluetooth or wired device is connected, or even anytime a certain day and time arrives.

3. It expands the standard system volume sliders to make ’em much more precise, with a visible zero to 100 scale that lets you get super-nuanced about the exact volume level you want for any given moment or purpose. You can even increase that scale, if you want extra control beyond that, and make your volume sliders operate on a zero to 1,000 step increment setup (or any other measure you like).

4. It includes simple equalizer settings, which can make any audio you’re hearing sound noticeably better and can also be included in those presets and automations we just went over. These settings can even make your phone’s maximum volume higher, if you find things are occasionally too quiet.

5. It adds in a not-yet-broadly-available Android-15-style volume panel expansion that makes all your audio controls even easier to manage from anywhere.

6. And it brings that simple, standard Android design into the volume panel on any device — delivering quite an improvement over the murky mess present on phones by Samsung and other heavy-handed companies by default.


THE PRECISE VOLUME PANEL IN ITS INITIAL FORM, AT LEFT, AND FULLY EXPANDED, AT RIGHT.
Credit: JR RAPHAEL, IDG


Not bad, right? Now, there is one catch: For the full set of features, including the volume panel replacement, you’ll have to pony up six bucks as an in-app purchase for Precise Volume’s Pro version. But you can play around with some of the features even in the app’s free version. And if you like what you find, you’ll likely find that one-time purchase to be very worth its weight.

So let’s get started, shall we?

60 seconds to smarter Android audio

First things first, on the simplest possible level:

Download Precise Volume 2.0 from the Play Store.

• Open it up and accept the couple of permissions it requests. (They’re completely innocuous and required for parts of the app’s operation.)

• Explore the app’s tabs and the options within ’em to play around with the presets and other features.

For the full-fledged volume replacement panel at the heart of this conversation, meanwhile:

• Tap the Settings tab at the bottom of the Precise Volume interface.

• Tap “Volume Button Override.”

• Flip the toggle next to “Enabled,” then follow the prompts to upgrade to the app’s Pro version.

• Once that’s done, tap that toggle again, then follow the prompt to allow Precise Volume the ability to display itself over other apps. That’s needed for reasons that should be obvious, and there’s no harm in allowing it.

• Once that’s done, tap that toggle one more time — and this time, follow the prompt to enable the app as an Android accessibility service. That may sound scary, but it’s genuinely required for an app to be able to process your physical button presses in this way and effectively replace a part of the system interface. And Precise Volume is extremely up front about the exact reasons for all of its permission requirements and the fact that it doesn’t collect, store, or share any form of personal data.

   • After you select the app’s name, be sure to flip the topmost toggle to turn its accessibility service on — not the lower toggle
      to activate it as an accessibility shortcut.

   • And note that on a Samsung phone, this part of the process is unnecessarily convoluted. After selecting the option to
      enable the accessibility service, you’ll have to tap “Installed apps” and then find Precise Volume 2.0 in the list before you’ll
      see the relevant option.

And that’s it! Just head back to your home screen and then press your phone’s physical volume-up or volume-down key, and you should see the new Precise Volume panel appear in place of the standard volume pop-up. You can then get to the expanded bottom-of-screen interface by tapping the three dot icon within the regular side-of-screen panel.


THE PRECISE VOLUME PANEL IN ACTION — FROM ZERO TO 100. Credit: JR RAPHAEL, IDG

Beyond that, you’ll absolutely want to spend a bit of time in the “Manage Volume Presets” area of Precise Volume’s Settings tab. That’s where you can create those one-tap presets we talked about a minute ago.


PRECISE VOLUME’S PRESETS MAKE IT POSSIBLE TO CREATE COMPLETE AUDIO SETTINGS FOR ANY
SPECIFIC SCENARIO.
JR RAPHAEL, IDG


The “Automation” area of that same tab is where you can configure simple automations for what happens when specific apps are opened, specific devices are connected, or specific days and times occur — if, say, you want your media volume to bump up and your notification volume to go all the way down whenever you open Google Meet or maybe your notification and ring volume to bump up during the workday but then drop back down in the evenings.


PRECISE VOLUME’S AUTOMATIONS OPEN THE DOOR TO ALL SORTS OF STEP-SAVING SMARTNESS.
Credit: JR RAPHAEL, IDG


The “Behavior” section within that same tab is where you can control the precise nuance level of your volume slider, if you want to make the control even finer than the default zero to 100 scale.


MAKE YOUR VOLUME CONTROL AS NUANCED AS YOU WANT WITH PRECISE VOLUME’S “STEPS” SETTING.
Credit: JR RAPHAEL, IDG


And the Equalizer tab at the bottom of the Precise Volume app is the place where — well, y’know. All that equalizer stuff, including the volume booster, resides.


IT MAY SOUND TECHNICAL, BUT PRECISE VOLUME’S EQUALIZER AREA IS FULL OF SIMPLE,
EFFECTIVE ENHANCEMENTS. Credit: JR RAPHAEL, IDG


And there ya have it: an awesome Android audio upgrade. The power is now at your fingertips, and a smarter, more efficient, and more powerful way of interacting with audio on your phone will always be present and waiting to be called into action.

source
2
And steal your data — how to stay safe

New malware also uses compromised WordPress sites to hide its messages with hackers


(Image credit: Shutterstock)

With so much sensitive personal and financial information on our phones these days, the last thing you’d want is for hackers to find a way to add a backdoor to your Android device. Well, a new Android malware strain does just that, and it lets hackers syphon off all sorts of valuable data.

As reported by BleepingComptuer, a new Android backdoor malware named “Wpeeper” is currently making the rounds online. So far, it has been discovered on two unofficial app stores where it disguises itself as the Uptodown App Store which as you may have guessed, is another third-party app store for the best Android phones.

According to a blog post from security researchers at Tencent’s XLab, the Wpeeper malware has already managed to infect thousands of devices. At this time though, little is known about the actual scale of the operation as well as what exactly the hackers behind this malware are using all of the data it collects for.

Due to its extensive set of advanced features, Wpeeper is certainly a new Android malware to keep an eye on. Here’s everything you need to know about this new mobile threat along with some tips and tricks on how you can stay safe from malicious apps containing malware.

A backdoor to your digital life

It’s very rare that one comes across a brand new malware strain but Wpeeper appears to be just that after XLab’s researchers analyzed inside a malicious app’s APK file only to discover that it had zero detections on VirusTotal.

Another thing that sets this malware apart from other strains is that it uses compromised WordPress sites to further hide communication between infected devices and the command and control (C2) server operated by the hackers who created it. This may sound overly complicated, but it makes it harder for law enforcement to shut down the operation. Plus, disrupting the way in which data is exchanged between a single infected Android phone and the C2 server is also more difficult.

Once the Wpeeper malware makes its way onto an Android phone — most likely through a sideloaded malicious app – it can then retrieve information about the infected device, gather a list of all apps installed on it, download arbitrary files, retrieve info about specific files and directories on the device, download files and execute them, update the malware and even delete it outright to leave no trace it was ever there.

We’ll likely find more about the malware itself and what the hackers behind it are trying to achieve once more security researchers start looking into things. Until then though, there are still some steps you can take to avoid a Wpeeper infection.

How to stay safe from Android malware


(Image credit: Google)

In order to avoid coming down with a nasty malware infection on your Android phone, the first and simplest thing you can do is to avoid sideloading apps altogether. Sure, it may be convenient and some apps actually need to be sideloaded to work at all, but the majority of people will be able to find exactly what they’re looking for on first-party app stores like the Google Play Store, Samsung Galaxy Store or the Amazon Appstore.

The reason you don’t want to sideload apps is that they don’t go through the same rigorous security checks that apps hosted on official stores do. As a result, malware embedded in these apps could easily slip through the cracks.

From here, you’re going to want to make sure that you have Google Play Protect enabled on your Android smartphone. It comes pre-installed on most phones with the Play Store and it’s really useful for fighting off malware thanks to its ability to scan all of your existing apps and any new ones you download for viruses. Likewise, you can also install one of the best Android antivirus apps for additional protection and extra features to help keep you safer online.

As long as people keep sideloading apps and using third-party app stores, hackers will likely continue using both app installation methods as a means to spread dangerous malware. This is why it’s up to you to carefully scrutinize and check every app you install on your smartphone. It may be tedious to do so but this sure beats coming down with a nasty malware infection or letting hackers install a backdoor on your phone.

source
3
What you need to know about this new threat targeting Apple computers running macOS

Apple’s macOS is making headlines once again for a new type of malware attack stealing files from its target's computer.

These files can hold sensitive information, which can then be used to commit further crimes once the perpetrator gets access to them.

If you own an Apple device running macOS on an Intel or ARM silicon chip, here's what you need to know.


MacBook Pro

What we know about the 'Cuckoo' malware

The 'Cuckoo' malware, as it's been named by the security provider Kandji, is a new type of malware that meticulously searches for files linked to specific applications on your Mac or MacBook to extract as much data as possible. It is designed to gather a wide array of information, including hardware details, active processes, applications, and more installed on your system.

Additionally, Cuckoo can capture screenshots and access data from various sources, such as sensitive iCloud Keychains, Apple Notes, web browsers and popular communication apps like Discord, Telegram, Steam, and cryptocurrency wallets.


A hacker using a Mac. (Kurt "CyberGuy" Knutsson)

How does it work?

Cuckoo is distributed via malicious websites that promote a supposed tool for ripping music from streaming services and converting these into .MP3 files. This tool is offered in free and paid versions, tempting users to download and install it. Once installed, the malware relies on annoying and persistent pop-ups using LaunchAgent, a method used in other malware campaigns like XLoader.

Who is behind Cuckoo?

No one threat actor has taken responsibility for the malware campaign. Still, it's worth noting that Cuckoo refuses to operate if the device is located in certain countries — like Kazakhstan, Russia, Belarus, Ukraine and Armenia — which could mean it's coming from a group in one of these countries or operating out of this region as a whole.

However, The Hacker News reported that "each malicious application contains another application bundle within the resource directory," the researchers said. Translation: A bunch of bad stuff is found wrapped inside another wad of bad stuff.


A person using a Mac. (Kurt "CyberGuy" Knutsson)

How to keep yourself safe from malware attacks

So, how do you keep yourself safe from this malware attack and other threats targeting our technology running macOS? After all, they can be sophisticated and sneaky, making it hard to recognize even when it's right in front of you. Not to worry, that’s why I’m here. They don’t call me the CyberGuy for nothing. I’ve got you covered. Here are 9 steps to enhance your cybersecurity and safeguard your digital life:

1. Use good antivirus software: Install and maintain reliable antivirus protection tailored for macOS. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Ensure it is set to update automatically and run regular scans. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

2. Don’t get software from strangers: Always download software from reputable and official sources. Avoid downloading applications from third-party websites or links found in unsolicited emails and messages.

3. Check the software maker’s credentials: Before installing any software, check the developer's credentials and read reviews to ensure their legitimacy. This is particularly important for software that handles sensitive information.

4. Stay fresh. Perform regular updates: Keep your macOS and all installed applications up to date. Software updates often include patches for security vulnerabilities that malware could exploit.

5. Enable firewall: Use macOS’ built-in firewall or a third-party firewall to monitor incoming and outgoing connections. Turning it on can make you safer by helping detect and block malicious activity.

6. Be wary of strange requests: Be cautious about unsolicited requests to access your computer or install software, especially those from pop-ups or unfamiliar emails. The rule I live by is that if you did not ask for it, then never engage or reply. This makes it harder for a criminal hacker to gain access to your life.

7. Use strong passwords and 2FA: Enable two-factor authentication to enhance overall security.

8. Backup your data: Regularly back up important data to an external drive and/or a cloud-based service. This helps ensure that you can recover your data in case of a malware attack. It may also be a good idea to keep any sensitive files on your hard drive as well, to make it harder for the hacker to get their hands on your precious data. I routinely plug in a portable USB drive to my computer, back it important files, photos and records, unplug it and stash in a safe spot at home.

9. Create strong passwords: Use unique passwords for different accounts and consider using a password manager to keep track of them. Who can remember a litany of complicated passwords?  That’s why password managers are so effective at helping you store and retrieve passwords.

source
4
Huawei again hides chip specs from prying eyes

Quad-core mystery chip with an in-built AI accelerator emerges.


(Image credit: OrangePi)

Huawei and OrangePi have announced a joint venture in the OrangePi Kunpeng Pro development board. The Raspberry Pi alternative runs not only a quad-core 64-bit Arm processor but also an AI processor that's integrated into the same package, but Huawei and OrangePi aren't releasing the specifics of the processor. In fact, the name of the chip has been hidden in the official renders, a practice that we've seen from Huawei in the past as it seeks to avoid prying Western eyes. However, we dug into the documentation to confirm that the chip is based on a custom Huawei Kunpeng CPU design. It features new tech that we haven't seen from Kunpeng processors before, showing that Huawei's Kunpeng line of chips is advancing into the AI realm.

The single-board computer includes tools and capabilities suitable for consumers, developers, and students. It comes with the [color-blue]openEuler OS[/color] preinstalled, along with the openGauss database and a suite of internet, productivity, and software development packages.


The OrangePi Kunpeng Pro development board (Image credit: OrangePi)

The Kunpeng Pro development board uses a custom Huawei Kunpeng CPU that's paired with an AI FPGA processor. Huawei has been under severe sanctions from the U.S. government, limiting its access to certain chips and chip-making technologies. Therefore, OrangePi and Huawei aren't revealing the specific model number of the Kunpeng CPU, but we do know that it is a quad-core ARM model.

Both the CPU and FPGA are placed in the same chip package, but it isn't clear if the CPU and FPGA are separate chiplets under the same heatspreader or if they are integrated onto the same die. Regardless of whether the FPGA and CPU reside on chiplets or the same die, this represents a new capability for Huawei's custom Kunpeng chip designs.

The AI processor provides 8 TOPS of AI computing power. For the sake of comparison, the Qualcomm Snapdragon X Elite and Apple M4 neural engines are rated for 45 TOPS and 38 TOPS, respectively. OrangePi and Huawei have equipped the Kunpeng Pro development board with two HDMI ports supporting 4K displays, a Type-C power interface, Wi-Fi 5, and Gigabit Ethernet.

The full specifications are:




OrangePi Kunpeng Pro is available only through Chinese retailers at this time. Pricing starts at 1,076 yuan (approximately $148.92 USD.) IT Home lists four available packages of the OrangePi Kunpeng Pro.



source
5
Linux is often the default choice for many IoT devices, but with a recent backdoor threat, we look at why an RTOS can better deliver security and minimalism.

Linux – the biggest name in open-source operating systems – is in crisis after a “trusted” contributor was discovered to have inserted a backdoor in a software package that could have resulted in a massive software supply chain attack.

This is particularly concerning for the Internet of Things (IoT) considering that Linux accounts for about 70% of all device operating systems. For developers, this infiltration suggests that Linux and its subsystems are getting so big that malicious code can be easily injected without notice. One safeguard is to return to operating system (OS) basics and other, simpler alternatives.

Let’s look at why, in this moment of cybersecurity, real-time operating systems (RTOS) are the safer bet amidst Linux’s expanding threat surface.

What just happened in Linux?

This incident marks one of the biggest ecosystem breaches in recent memory for Linux. In late March, a developer uncovered a remote code execution vulnerability in a software package part of XZ Utils, a library for compressing and decompressing files. Alerted by failing SSH logins and high CPU utilization, developers soon realized that the flaw enabled remote attackers to bypass authentication and gain complete system access.

Even more concerning? The backdoor was initiated by a “trusted” collaborator who had been working on the open-source project for several years.


It’s worth taking a step back and considering why this matters in IoT. Of course, when developing a device or system, one of the earliest and most crucial decisions developers make is deciding the type of OS. Linux is often the default choice for many devices and projects, from Android smartphones to smart TVs, thanks to its advanced memory and processing power.

However, these are two features that devices don’t always need.

The case for RTOS

The truth is that many devices don’t need to run on Linux. It’s often the industry preference, sure, but this doesn’t mean it’s the right choice. For example, running simple devices like connected doorbells on a full-fledged Linux OS would have seemed crazy a couple of decades ago due to resource constraints. Now, it’s part and parcel of modern IoT.

This hack should serve as a wake-up call that not every device warrants Linux. Basic devices like sensors or monitors – and, yes, even doorbells – usually serve one function at a time. They can therefore benefit from the resource efficiency and focused functionality of RTOS.

In Linux and other general-purpose operating systems, programs are loaded dynamically after boot, often with the ability to run in separate memory and file spaces under different user accounts. This isolation is beneficial when running multiple applications concurrently on a shared server, as one user’s programs cannot interfere with another’s, and hardware access is shared equally through the operating system.

In contrast, RTOS operates by compiling applications and tasks directly into the system with minimal separation between memory spaces and hardware. Since the primary goal of an IoT device is typically to serve a single application, possibly divided into multiple tasks, this lack of separation is not an issue. Additionally, because the application is compiled into the RTOS, it is ready to run after a very short boot and initialization process.


The ‘how-to’ process using FreeRTOS for a connected device. (Image: Amazon AWS)
This is relevant in IoT because device developers usually know two key pieces of information:

   • How many tasks will be running?

   • How much memory do these applications/processes need?

Therefore, armed with this insight, developers can determine if RTOS is a good fit. Usually, regardless of whether we’re talking about Zephyr, Azure RTOS, or Free RTOS, the ability to guarantee predictable and low-latency task execution makes these systems an attractive choice.

Additionally, Linux adds many more layers of complexity. For example, I’ve seen camera devices where developers didn’t have enough expertise to properly configure and minimize the Linux installation/distribution, leading to potential security risks. Again, selecting the right OS from the start can save unnecessary development hurdles in the long run.

A trade-off worth making

The discovery of this critical vulnerability in a core Linux package, introduced by a trusted contributor no less, demonstrates the escalating security risks facing IoT ecosystems. For developers, this incident underscores the importance of approaching OS selection with security as the top priority. While Linux offers unparalleled functionality, that power often comes at the cost of increased complexity that requires significant expertise to properly configure and harden the installation.


Every IoT device has a unique URL for automatic location over the Internet, and RTOS with an IoT
platform allows secure, authenticated, and extremely low bandwidth peer-to-peer connections to be
established even when the device is deployed behind a NAT firewall. (Image: Nabto)
On the other hand, RTOS is designed from the ground up with security and minimalism in mind. By focusing solely on executing discrete tasks with low latency, rather than multi-process and multi-user multitasking, RTOS offers a reduced attack surface with clear visibility into the limited codepaths. Moreover, since the application is compiled directly into the RTOS, and due to the nature of many microcontrollers, it is extremely difficult – if not impossible – to inject random code for execution through techniques like stack overflows. This is because the only code that can run is located in the system’s flash memory. Consequently, the compile-time integration of components further minimizes potential vulnerabilities.

Of course, RTOS by nature trades some functionality for security. But for the vast majority of IoT use cases that require simple, dedicated operation rather than multi-purpose computing, this kind of system can provide real-time performance and security essentials.

The expanding threat landscape for Linux shows that, particularly for IoT, this separation of security and functionality may be a trade-off worth making.

source
6


Huawei Aito M9, is a large luxury crossover with a luxury interior, sports car-like acceleration,
home theater, outdoor theater, auto-doors, some of the largest screens in the industry,
headlight projection, three rows of full seats, and more.

source
7
As more PC owners avoid Windows 11 than ever before

Quote
Despite the serious disadvantages, people are still flocking to Windows 10

   ► The number of people using Windows 10 increased in April 2024

   ► Some 14,000,000 PC users turned to the 9-year-old operating system

   ► The increase came at the expense of its successor, Windows 11

   ► PC users flocked to Windows 10 despite the incoming end of support

   ► It will cost as much as $427 (£337.29) to continue using Windows 10

Microsoft cannot kill Windows 10.

The US company has already confirmed that it will end support for Windows 10 in October 2025 — cutting off millions of PCs from essential security updates and bug fixes. Without these critical software patches, Windows 10 users will be vulnerable to attacks from hackers and other data breaches.

Due to the popularity of Windows 10, Microsoft has confirmed plans to extend its Extended Security Updates (ESU) subscription to everyday users for the first time. Previously reserved for enterprise customers, the annual plan could cost as much as £330 to unlock an extra three years of important security updates.

Many assumed the fast-approaching deadline — not to mention, the threat of having to spend hundreds on software updates — would spur millions of PC users still relying on Windows 10 to finally make the switch to its successor, Windows 11.

But the number of people using Windows 10 every day is increasing, according to the latest figures from Statcounter. The popular website, which monitors and analyses global web traffic to calculate the popularity of devices, web browsers, and operating system, has recorded a rise in the number of people using Windows 10.

PCs powered by this almost decade-old operating system topped 70% for the first time since late 2023.

The increase recorded in April 2024 was roughly 1%, Statcounter shows. During the same time frame, Windows 11's market share dipped slightly to 25.69%, suggesting the increase in people using Windows 10 came at the expense of its successor. That's a serious blow for Microsoft.

Microsoft has previously confirmed there are roughly 1.4 billion Windows PCs worldwide. At that scale, a 1% increase in people flocking to Windows 10 equates to an astonishing 14,000,000 PC users.

With the launch of a new operating system, we'd typically expect to see the number of devices powered by its predecessor declining over time. This happens as users voluntarily switch to the latest software to get their hands on exciting new features or a stylish new appearance and as more devices with the latest operating system preinstalled are sold.

It's rare to see an older operating system regain traction in its twilight years — especially with the threat of the end of support and a new fee looming less than 18 months away.

Those who want to keep using Windows 10 until 2028 will need to spend as much as $427, roughly £337.29 converted, to continue to receive critical patches for security flaws and compatibility issues in Windows 10, Microsoft has confirmed.

If you missed the memo, Microsoft will end support for Windows 10, which was released worldwide in July 2015 and was widely marketed at the time as the “final” iteration of Windows, on October 14, 2025.

Known as Extended Security Updates (ESU), this subscription unlocks up to three years of additional support for ageing operating systems, extending the lifecycle of Windows 10 until the end of 2028. ESU was previously reserved for businesses to offer 36 months of additional time to update their entire fleet of PCs and ready proprietary software to work with the latest operating system from Microsoft.

Windows 10 marks the first time Microsoft will offer Extended Security Updates to anyone.

Microsoft has published the cost of Windows 10 ESU for enterprise users, with the first year setting you back $61 (£48.19). To incentivise Windows 10 users to upgrade to the next iteration of the desktop operating system, Microsoft will double the cost every year. The full breakdown of costs is as follows:

   • Windows 10 ESU — $61 (£48.19) for first year

   • Windows 10 ESU — $122 (£96.39) for second year

   • Windows 10 ESU — $244 (£192.78) for third and final year

This is not the cost for consumers, with Microsoft promising that pricing for the average Windows 10 user “will be shared at a later date.” However, we're likely to see the same pricing structure, with costs doubling each year to try to push people to finally switch away from Windows 11.


Windows 11 reworks the design of the operating system and brings the iconic Start Menu to the center
of the screen for the first time MICROSOFT PRESS OFFICE
Microsoft describes the optional Extended Security Updates subscription as “a last resort option for customers who need to run certain legacy Microsoft products past the end of support.” It offers a maximum of 36 months of additional security updates and emergency bug fixes.

“Extended Security Updates are not intended to be a long-term solution but rather a temporary bridge,” the Redmond-based company explains in a blog post. “You can purchase ESU licenses for Windows 10 devices that you don’t plan to upgrade to Windows 11 starting in October 2024, one year before the end of support date.”

Businesses who are subscribed to a cloud-based solution like Intune or Windows Autopatch will enjoy a 25% discount on Extended Security Updates. Microsoft is offering an even more generous discount to schools, with the first year of ESU dropping to just $1 (79p), this doubles to $2 for year two and $4 for the final year.

Prices have risen sharply for Windows users looking to put off the upgrade to the next major operating system release from Microsoft. When it introduced the ESU plan was introduced for Windows 7, Microsoft charged £9.57 for the first year, rising to £19.15 in the second year.

That cost was per device, so things can become pretty pricey if you have a few devices, like a laptop, desktop PC, or tablet.

Some industry watchers had speculated that Microsoft would be forced to offer extended support for Windows 10 at no extra cost due to the vast number of PCs still powered by the operating system.

However, despite the widespread usage, Microsoft is seemingly set on charging for the privilege.

This has allowed rival Google to take advantage of the situation to bolster its own market share of desktop PCs by offering a free upgrade for all Windows 10 users to its ChromeOS system, which is based on the world's most popular web browser and boasts years of security updates and support.

There’s no guarantee that your current PC will be able to upgrade to Windows 11. With this rebooted operating system, Microsoft introduced several strict system requirements.

Windows 11 only officially supportsIntel’s 8th Generation (known as Coffee Lake) or Zen 2 CPUs and newer, leaving millions of devices sold with Windows 10 preinstalled unable to upgrade.

Following a public backlash, Microsoft did add a number of exceptions to its list of supported chipsets, including the 7th Generation Intel Core i7-7820HQ – a processor that was used in the Surface Studio 2, an all-in-one desktop machine that cost £3,549 at launch back in 2018.

Nevertheless, this marks the first time that Microsoft has enforced such specific processor requirements with its operating system upgrade.

In comparison, Windows 8 and Windows 10 only stipulated a 1GHz processor, at least 1GB of RAM, and 16GB of available storage. Windows 11 requires an Intel processor first launched in October 2017 as well as 4GB of RAM and 64GB of storage.

According to Microsoft, the stricter silicon requirements enable a better experience for those running Windows 11, with a 60% reduction in malware thanks to the requirements that “enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI) and Secure Boot.” It also claims a “99.8% crash-free experience” on machines with components from its list of supported hardware.

source
8
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine -- in depth -- every component of DevSecOps.

In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology and how it impacts every part of our cybersecurity systems.

You'll explore the shared responsibility model at the core of DevSecOps, as well as the people, processes, and technology at the heart of the framework. You'll also find:

   • An insightful overview of DevOps and DevSecOps principles and practices

   • Strategies for shifting security considerations to the front end of the development cycle

   • Ways that the standard security model has evolved over the years and how it has impacted our approach to cybersecurity

A need-to-read resource for security leaders, security engineers, and privacy practitioners across all industries, The DevSecOps Playbook will also benefit governance, risk, and compliance specialists who seek to better understand how a transformed approach to cybersecurity can impact their business for the better.

Follow this link to get your copy of 'The DevSecOps Playbook: Deliver Continuous Security at Speed' for this free guide. This link will redirect you to my One Drive account and click Download. [system administrator]

source
9


Microsoft has been saying for a while now that it has been working on a mobile game store to compete with the Google Play Store and Apple's iOS App Store. Today, we got a time frame for when that store will actually become available.

Bloomberg reports that Microsoft Xbox President Sarah Bond revealed that its mobile game store will launch sometime in July. Bond made that announcement as part of an interview during the Bloomberg Technology Summit. A video of her remarks was also posted on the Bloomberg Live X (formerly Twitter) account.





Bond said that the store will be released on the web first, rather than as an actual mobile app store. Bond stated the web-based store would be able to reach a bigger audience and more devices.

At first, the mobile game store will offer games that are currently owned like Microsoft. That would include games like the popular Candy Crush titles from King, which Microsoft acquired when it bought Activision Blizzard in October 2023. It would also likely include games like Minecraft and Call of Duty Mobile.

Bon said there is a plan to release third-party mobile games via the new store at some point but details of how that will work have yet to be revealed. Bond also suggested that Microsoft would like to sometime in the future extend the store beyond the web, which may mean it could launch an actual third-party gaming app store for Android and iOS.

Bond didn't offer an actual name for the web-based store, She also didn't state if there will be any testing of the store for Xbox Insiders before it officially goes live.

source
10
Huawei / US further restricts chip sales to Huawei by revoking export licenses
« Last post by javajolt on May 08, 2024, 05:53:57 PM »


The US government has revoked some licenses that allowed American chip companies to export semiconductors to Huawei. This reflects an ongoing effort by the Biden administration to limit the Chinese tech company's access to key technologies.

The Commerce Department (via CNBC) said that it is continually assessing how export controls can protect national security and how the geopolitical landscape and the technology industry are evolving. As part of that review, the US has revoked certain licenses for the sale of chips and related technologies to Huawei.

While the Commerce Department did not specify which licenses or companies were affected, this is the latest move by the Biden administration to crack down on Huawei.

Quote
As part of this process, as we have done in the past, we sometimes revoke export licenses. But we can confirm that we have revoked certain licenses for exports to Huawei

It also comes after former President Trump placed Huawei on a trade blacklist in 2019, citing security concerns. That blacklist prohibited US companies from selling technology, such as 5G network equipment, to Huawei without proper authorization.

In 2020, the US tightened those restrictions by requiring foreign firms using American manufacturing equipment to obtain a license before exporting semiconductors to Huawei. Now, by revoking some previous licenses, the administration is signaling that it does not want Huawei to have access to even limited supplies of US-made or US-connected chips. This will put further pressure on the Chinese technology company, which has developed its own chips in response to sanctions but still relies on foreign suppliers for some components.

The license revocation will also affect chipmakers that supply Huawei. Companies like Intel and Qualcomm, which still sell some chips to Huawei under license, have warned that their revenues could take a bigger hit as Huawei ramps up internal production and captures more of the domestic Chinese market with self-sufficient devices.

On the other hand, Apple is witnessing a substantial decrease in iPhone shipments in China, with a 33% reduction in February from the previous year. The company's struggle began with Huawei's resurgence in the premium smartphones like Mate 60 Pro.

source
Pages: [1] 2 3 ... 10