Second Android 15 preview bolsters security to safeguard your files


What you need to know

  • Further digging into Google’s second Android 15 preview shows increased security efforts to protect devices connected via USB.
  • When attempting to switch USB modes, users will have to verify that it is them through various lock screen security methods.
  • Google detailed its second Android 15 preview yesterday (Mar. 21), offering insight into its satellite connectivity and more.

Google’s latest Android 15 preview gives users better insight into how it will protect your files when connected via USB.

According to Mishaal Rahman (Android Police), Android 15 Developer Preview 2 shows the software will require more “authentication” during USB-connected moments. To change which USB mode you’re in, Rahm discovered users must verify it’s truly them via lock screen measures such as their PIN, fingerprint, pattern, or password.

Source…

Samsung Galaxy Tab Active 5 Enterprise Edition to Get Eight Years of Android OS Updates, Security Patches


Launched in January this year alongside the Galaxy XCover 7, the Samsung Galaxy Tab Active 5G is IP68 certified and has military-grade durability (MIL-STD-810H). A few months after launch, a Samsung manager introduced the Enterprise version. The Galaxy Tab Active 5 5G gets eight years of Android and security updates. The standard version of the rugged tablet received four major operating system updates and five years of security patches.

The enterprise version of the Samsung Galaxy Tab Active 5 will receive the Android operating system and security updates for eight years, a Samsung manager in the Netherlands announced on LinkedIn (via SomeMobile ). This means that the tablet will receive updates and new features to Android 22 until 2032. Meanwhile, the standard version of the rugged tablet gets four major OS updates and five years of security patches.

The Galaxy Tab Active 5 will be the first tablet from the South Korean brand that is sure to receive software updates for a longer period of time. Samsung has promised seven years of Android updates and security patches for the latest Galaxy S24 series. Google also offers seven years of software support for the Pixel 8 and Pixel 8 Pro.

The Samsung Galaxy Tab Active 5 Enterprise Edition comes in green and runs Android 14. It features an 8-inch WUXGA TFT display with a refresh rate of up to 120Hz, Gorilla Glass protection and an octa-core 5nm processor. . SoC.

The Galaxy Tab Active 5 has a 13-megapixel rear camera and a 5-megapixel front-facing camera. It has a 5050 mAh battery. The tablet also comes with MIL-STD-810H certification and IP68 protection, which protects the device from vibration, accidental shocks, drops, rain and dust. It has S Pen integration and supports face unlock.

Source…

Sinister AI ‘eavesdropping’ trick lets ‘anybody read private chats’ on your Android or iPhone, security experts reveal


CYBERCRIMINALS can spy on users’ conversations with artificial intelligence-powered chatbots, experts have warned.

Ever since ChatGPT came out in November 2022, cybersecurity experts have been concerned with the technology.

Criminals can spy on users’ conversations with AI chatbotsCredit: Getty

ChatGPT is an advanced chatbot that can seamlessly complete tasks like writing essays and generating code in seconds.

Today, several chatbots function like ChatGPT, including Google’s Gemini and Microsoft’s Copilot within Bing.

The chatbots are easy to use, and many users quickly get captivated into conversations with the natural-language companions.

However, experts have expressed concerns over users sharing personal information with AI chatbots.

ChatGPT can collect highly sensitive details users share via prompts and responses.

It can then associate this information with a user’s email address and phone number, and store it.

That’s because to use the platform, users need to provide both an email address and mobile phone number.

Users cannot bypass this by using disposable or masked email addresses and phone numbers.

Most read in Phones & Gadgets

As a result, ChatGPT is firmly tied to your online identity as it records everything you input.

What’s more, this private data can also be obtained by cybercriminals if they are keen enough.

ChatGPT creator reveals more creepy videos after announcing major change & fans are shocked by ‘cyborg’ German Shepherd

“Currently, anybody can read private chats sent from ChatGPT and other services,” Yisroel Mirsky, the head of the Offensive AI Research Lab at Israel’s Ben-Gurion University, told Ars Technica in an email.

“This includes malicious actors on the same Wi-Fi or LAN as a client (e.g., same coffee shop), or even a malicious actor on the internet — anyone who can observe the traffic.”

This is known as a “side-channel attack,” and it can be very dangerous for victims.

“The attack is passive and can happen without OpenAI or their client’s knowledge,” Mirsky revealed.

“OpenAI encrypts their traffic to prevent these kinds of eavesdropping attacks, but our research shows that the way OpenAI is using encryption is flawed, and thus the content of the…

Source…

Malware Alert! Hackers Attacking Indian Android users


A new malware campaign has been identified targeting Android users in India.

This sophisticated attack distributes malicious APK packages to compromise personal and financial information. The malware, available as a Malware-as-a-Service (MaaS) offering, underscores the evolving threat landscape in the digital age.

Symantec, a global leader in cybersecurity, has stepped up to protect users from this emerging threat.

The Rise of Malicious APKs

The campaign has been meticulously designed to spread malware through APK packages disguised as legitimate applications.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

These applications, which appear to offer services such as customer support, online bookings, billing, or courier services, are vehicles for a range of malicious activities.

Once installed, the malware targets the theft of banking information, SMS messages, and other confidential data from victims’ devices.

This strategy of disguising malicious software as harmless applications is not new but remains highly influential.

The attackers exploit the trust users place in app downloads, particularly those offering valuable services.

Broadcom has recently released a report on a Malware-as-a-Service (MaaS) campaign specifically targeting Android users in India.

The attack represents a threat to the security of Android devices in the region and can potentially cause significant damage to individuals and organizations.

Symantec has identified the malware through its robust security systems, classifying it under two main categories:

Mobile-based Threats:

  • Android.Reputation.2
  • AppRisk: Generisk

Web-based Threats:

The campaign’s infrastructure, including observed domains and IPs, falls under security categories protected by…

Source…