Tag Archive for: February

Google Pixel 4 & 4 XL get final update w/ February security patch


Google has updated the Pixel 4 and Pixel 4 XL for what will likely be the final time, bringing the two phones up to the February 2023 security patch.

First released in 2019, the Google Pixel 4 series received three years of monthly Android security updates and Pixel-specific improvements, including the full update to Android 13 last August. Traditionally, for flagship Pixel phones, Google releases one final update after the monthly updates expire, and the Pixel 4 is no different.

Today, side by side with the broader February 2023 update for current Pixel phones, Google rolled an update to owners of the Pixel 4, the first such update since October 2022. The update brings the security improvements of the February 2023 Android Security Bulletin, and likely not much else. Judging from the build number — which starts with “TP1A” instead of “TQ1A” — the new Pixel 4 update does not bring the improvements of Android 13 QPR1, released in December.

This likely final Pixel 4 update should be rolling out now through carriers and can also be downloaded and installed manually.

  • Pixel 4: Android 13, TP1A.221005.002.B2, Feb 2023
  • Pixel 4 XL: Android 13, TP1A.221005.002.B2, Feb 2023

Down the line, if the need arises, it’s possible Google may launch an additional patch for the Pixel 4 and Pixel 4 XL, as the company has done in the past. Regardless, it’s time to bid a fond farewell to a phone that dared to do things differently — with its Soli motion sensors — and the first Pixel phone to introduce face unlock support.

More on Pixel:

FTC: We use income earning auto affiliate links. More.


Check out 9to5Google on YouTube for more news:

Source…

Hacker Space Rogue to Release Book on Hacking Group L0pht Heavy Industries in February


PHILADELPHIA, PA, January 11, 2023 — The memoir of world-renowned hacker Cris Thomas “Space Rogue: How the Hackers Known as L0pht Changed the World” is available for pre-order now. The new book, to be released on February 16, 2023, will cover the influential hacking group L0pht Heavy Industries, the hacker underground of the 1990s, the L0pht’s rise to prominence, their testimony in front of the US Senate, their claim of being able to “take down the Internet”, and how their legacy continues to shape the security of the online world today.

“Cyber security has become a critical part of today’s world. The L0pht was there at the start. We helped shape the cyber industry, and form the online world we all live in today.” –Space Rogue

In May 1998, the US Congress invited the seven members of the L0pht to testify on the state of government computer security. Two years later, that same group rode the dot-com bubble to create the preeminent security consultancy the industry has ever known, @stake. Along the way, they stood up against tech giants like Microsoft, Oracle, Novell and others to expose weaknesses in those companies’ premiere products. Despite the L0pht’s technical prowess, the group could not keep what they had built together as money and internal politics turned friend against friend. Look inside L0pht Heavy Industries, or simply The L0pht, one of the most influential hacker groups in history. From formation, to congressional testimony, to going legit and the aftermath that followed. 

Follow the hacker ‘Space Rogue’ as he takes you on a journey through the magical hacker scene of the 1990s. The L0pht hacker collective no longer exists, but its legacy lives on. L0pht set the standard for how the cyber security industry now releases vulnerability information. Famous hackers that were once L0pht members, Mudge, Weld Pond, Kingpin, Dildog, Space Rogue, and others have done even more impressive things in the following years. The hackers and consultants hired by @stake and indoctrinated into the L0pht way of thinking have now become giants in the industry. All the hackers who read security information off the L0pht’s website, downloaded software from the…

Source…

ESFA Update academies: 16 February 2022


1. Action: coronavirus (COVID-19) vaccine support allocations now available for ages 12 to 15

As part of the coronavirus (COVID-19) vaccine support programme, all children aged 12 to 15 are being offered 2 doses of vaccine.

The vaccination programme is expected to be delivered primarily through schools and funding has been made available to support this.

We have published the school level allocations for funding to support the rollout of the second phase of vaccination for 12- to 15-year-olds. Payments will be made at the end of April 2022.

You can read more about the 12 to 15 vaccination programme.

2. Action: alternative provision year 11 transition fund claim form now live

The alternative provision year 11 transition fund claim form is now live.

The deadline to submit your claim is Tuesday, 15 March 2022 at 11:59pm.

We have published guidance to help you complete the form.

3. Reminder: coronavirus (COVID-19) mass testing exceptional premises costs claim form to close soon

Schools and academies with secondary age pupils, along with colleges and other eligible establishments, have a short time remaining to submit claims for exceptional premises costs incurred during the mass testing of pupils and students on their return in January 2022.

The claim submission guidance is available on GOV.UK and the window to claim closes on Sunday, 20 February 2022. Claims submitted after this date will not be accepted and no extensions can be granted.

4. Reminder: Get help with technology: internet access and device claim form is open

The Get Help with Technology: internet access and device claim form is live.

The deadline to submit your claim is Sunday, 27 February 2022 at 11.59pm.

We have published guidance to help you complete the form.

You can read more on GOV.UK.

This is a reminder that the school resource management self-assessment tool checklist is now open for academy trusts to complete and return by Tuesday 15 March 2022.

All academy trusts with an open academy on 31 December 2021 must submit a checklist.

6. Information: important changes to the Education and Skills Agency (ESFA) and the Department for Education (DfE) from 1 April 2022

The final summary report…

Source…

Report on Patient Privacy Volume 22, Number 2. Privacy Briefs: February 2022 | Health Care Compliance Association (HCCA)


◆ Tensions between the U.S. and Russia could lead to a heightened risk of Russian state-sponsored cyberattacks on U.S. interests, including health care organizations, federal agencies warned. Russia would consider conducting a cyberattack on the U.S. homeland if Moscow perceived that a U.S. or NATO response to a potential Russian invasion of Ukraine threatened Russia’s long-term national security, according to a Department of Homeland Security intelligence bulletin obtained by CNN.[1] 1 The Cybersecurity & Infrastructure Security Agency (CISA), FBI and the National Security Agency have urged organizations to be prepared with cyber incident response, resilience, and continuity of operations plans so that critical functions and operations can be kept running if technology systems are disrupted or need to be taken offline. The three agencies also urged organizations to enhance their cyber posture by following best practices, and to increase organizational vigilance by staying current on threat reporting.[2] John Riggi, national advisor for cybersecurity and risk at the American Hospital Association, warned that hospitals and health systems could be targeted directly, or could become “incidental victims or collateral damage of Russian-deployed malware or destructive ransomware that inadvertently penetrates U.S. health care.” Riggi noted that “a cyberattack could disrupt a mission-critical service provider to hospitals,” and added that “this is a good reminder for all to have robust downtime procedures, redundancy and business continuity plans to sustain a loss of on-premises or cloud-based mission-critical services or technology for up to four to six weeks.”[3]

◆ CISA also advised U.S. critical infrastructure organizations to review a Microsoft blog on malware identified in Ukraine and take action to strengthen their networks against potential cyberattacks.[4] The Microsoft Threat Intelligence Center reported evidence of destructive malware in systems belonging to several Ukrainian government agencies and organizations that work closely with the Ukrainian government.[5] The malware is disguised as ransomware, but if activated by the attacker, it would render the…

Source…