Tag Archive for: screen

Pixel 6 Pro setup screen accidentally reveals face unlock option for one user


What you need to know

  • New evidence of face unlock support for the Pixel 6 Pro has surfaced.
  • The unreleased biometric feature inadvertently appeared as a backup security option when a user was setting up their new Pixel 6 Pro.
  • However, it remains inoperable on Google’s latest flagship phone.

Face unlock support for the Pixel 6 Pro has been rumored since late last year, but Google has yet to enable the security method despite having released two Feature Drops. Now, a new piece of evidence suggests the search giant is preparing to launch it in a future update.

According to a Reddit user who recently purchased a new Pixel 6 Pro, the face unlock option showed up during the phone’s initial setup as one of the backup screen lock methods. It specifically appeared alongside the PIN, pattern, password, and fingerprint options on the “Choose a screen lock” page.

Face unlock option appears in the Pixel 6 Pro’s initial setup screen (Image credit: Special_Command7893 / Reddit)

Unfortunately, the feature is not functional because the user found no option to turn it on during the phone’s configuration. Face unlock was nowhere to be found in the settings menu either. It’s anybody’s guess why it appeared on the setup page right now.

Source…

Amazon Big Screen Smart Speaker | Mobile Robot


The Show 15 can also function as a 1080p TV for the kitchen with support for Hulu, Netflix, Prime Video, and later this year, Sling TV. And when it’s not in use, the laptop-sized screen can blend into the background as a smart picture frame, displaying family photos or other pre-selected art. The device will be available later this fall, the company says.

Alexa, the company’s voice-controlled digital assistant, is getting a variety of new skills that seem designed to dovetail with the Show 15.

For example, the digital assistant can now use a smart speaker’s camera to identify members of a household and allow them to see their individual calendars, messages, or even recently played music.

And, you can now set up alerts linked to sounds in your home; for example, a notification that lets you know the smart speaker has heard the beep your fridge makes when it’s left open.

The company also announced a potentially important privacy change for its higher-end devices.

Instead of sending all voice recordings to Amazon’s cloud servers for processing, the company’s more expensive smart speaker models will process some verbal commands—such as “turn on the lights”—locally on the device.

The option will be available on the Echo Show 10, Echo Show 15, and the fourth generation Echo, but not on less expensive devices, like the entry-level Echo Dot, which have more limited processing capabilities.

Source…

Scary new malware that live streams your screen


Ever feel like somebody is watching you? Years of horror movies have given us a real sense of fear of being watched by unsuspecting people. When it comes to tech, malware could be the suspect. Millions of PCs are infected with malware. Tap or click here to check your Windows computer now.

Unfortunately, a new type of malware, called BIOPASS RAT, brings that fear of being watched into a terrifying new reality. If you want to avoid being spied on, you’ll need to be on the lookout for this newest threat.

This newest malware can be spotted if you know what to look for. Keep your eyes peeled and learn how to protect yourself before BIOPASS RAT comes looking to make your computer its next victim.

Here’s the backstory

Using Adobe Flash Player and Microsoft Silverlight, the malware hides inside the Python script to make its way onto your computer. Once it sneaks past your defenses, it’s able to record and broadcast your computer screen.

This allows thieves to sit unnoticed in the background for as long as it takes to capture footage of you entering secure details into your computer. This could include banking information, Social Security numbers and other personally identifying information, making identity theft a breeze.

Worried about being hacked? Here are 5 essential steps to protect yourself from ransomware

Protect yourself

The malware was initially spotted in faulty plugin downloads for online gambling sites. The best way to protect yourself is to be mindful of downloading plugins unless they come directly from a manufacturer’s website. Unfortunately, malware can still find its way even to manufacturer sites, so often, mindfulness is not enough to protect yourself.

Keep your software update

Malware and other cybersecurity threats are often successful because they find weak spots in a person’s computer to enter. These points of entry typically come from software not being up to date.

A great way to protect yourself is to keep all your systems and software updated. Keep…

Source…

Chinese threat actor targets Nepal, the Philippines, and Taiwan. New malware delivery technique. New Trojan can livestream victim’s screen.


At a glance.

  • Chinese threat actor targets Nepal, the Philippines, and Taiwan.
  • SideCopy goes after Indian entities.
  • New malware delivery technique.
  • New Trojan can livestream victim’s screen.

Chinese threat actor targets Nepal, the Philippines, and Taiwan.

Recorded Future’s Insikt Group is tracking a suspected Chinese government threat actor that’s “targeting telecommunications, academia, research and development, and government organizations in Nepal, the Philippines, Taiwan, and more historically, Hong Kong.” Specifically, the campaign targeted the Industrial Technology Research Institute (ITRI) in Taiwan, Nepal Telecom, and the Department of Information and Communications Technology in the Philippines. The researchers emphasize the significance of targeting the ITRI:

“In particular, the targeting of the ITRI is notable due to its role as a technology research and development institution that has set up and incubated multiple Taiwanese technology firms. According to the ITRI’s website, the organization is particularly focused on research and development projects related to smart living, quality health, sustainable environment, and technology, many of which map to development priorities under China’s 14th 5-year plan, previously highlighted by Insikt Group as likely areas of future Chinese economic espionage efforts. In recent years, Chinese groups have targeted multiple organizations across Taiwan’s semiconductor industry to obtain source code, software development kits, and chip designs.”

SideCopy goes after Indian entities.

Cisco Talos is watching a campaign by the SideCopy APT targeting Indian government personnel. The threat actor, whose activity resembles that of Transparent Tribe (APT36), has incorporated new custom and commodity malware into its operations:

“Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware “CetaRAT.” SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT. “Recent activity from the group, however, signals a boost in…

Source…