Tag Archive for: security

Tecno Camon 30 Series to 2 Major Android Update, 3 Years of Security Upgrades


Tecno Camon 30 series was globally unveiled at the Mobile World Congress (MWC) 2024 in February this year. The lineup later launched in select markets across the world. It is also set to be introduced in India soon. The series includes four variants – the Tecno Camon 30 4G, the Tecno Camon 30 5G, the Tecno Camon 30 Pro 5G, and the Tecno Camon 30 Premier 5G. The company has now detailed the software support these handsets will receive.

Tecno announced via social media posts that the Tecno Camon 30 series smartphones will get 2 major Android upgrades up to Android 16 and 36 months (or three years) of security patches. Notably, the Tecno Camon 30 handsets run Android 14-based HiOS 14 out-of-the-box. 

Meanwhile, the Tecno Camon 30 5G series is confirmed to come to India soon. An Amazon microsite went live recently teasing details about the upcoming handsets. The company will introduce two variants in the country – the Tecno Camon 30 5G and the Tecno Camon 30 Premier 5G.

The exact launch date of the Tecno Camon 30 5G series in India is yet to be confirmed. The smartphones are confirmed to be equipped with Sony Lytia cameras. They have also been teased in a black vegan leather option and a white colourway.

Indian variants of the Tecno Camon 30 5G and the Camon 30 Premier 5G are expected to be similar to their global variants. They are likely to come with the MediaTek Dimensity 7020 SoC and MediaTek Dimensity 8200 chipset, respectively. They could carry 5,000mAh batteries with support for up to 70W wired fast charging.

For optics, the Tecno Camon 30 5G may come with a 50-megapixel primary sensor alongside a 2-megapixel depth sensor at the back. The Premier variant is likely to feature a 50-megapixel primary rear sensor with optical image stabilisation (OIS), another 50-megapixel sensor with up to 3x optical zoom, and a third 50-megapixel sensor paired with an ultra-wide-angle lens. Both models are expected to get 50-megapixel selfie cameras.


Samsung launched the Galaxy Z Fold 5 and Galaxy Z Flip 5 alongside the Galaxy Tab S9 series and Galaxy Watch 6 series at its first Galaxy Unpacked event in South Korea. We discuss the company’s new devices and more on the latest episode of Orbital,…

Source…

A Paid Open-Source Android App for Cloud Storage Security


If it is not encrypted, it is not safe. I have been swearing by this rule recently, and it is not easy. Sometimes encrypting stuff adds inconvenience, and sometimes it doesn’t.

I apply the same rule for storing important files on the cloud ☁️

Cloud storage service providers promise/claim to protect our files. And, I am sure, most of the cloud storage services do a good job at it. However, not all of them offer end-to-end encryption (or client-side encryption) which makes sure that your data stays safe/private to you even if there is unauthorized access to your data.

You can fix that using a powerful open-source tool called Cryptomator.

Cryptomator: Encrypt Easily and Send it to the Cloud

cryptomator screenshot

Cryptomator is an open-source tool that lets you encrypt files locally before you upload them to the cloud. It is a decently popular option among desktop users, available for free to Linux/Windows/macOS users.

All you need to do is — create a vault, set a master password, and start adding files to it that you want encrypted.

The good news is: Cryptomator is also available for Android (and iOS). So, you can do the heavy lifting work on-the-go, encrypt your files, and upload them to the cloud.

It sounds impressive, doesn’t it?

The only catch is: you need to purchase a license key to use Cryptomator on Android. It is a one-time fee ($16).

📋

The developers mention that they charge users for technical differences in mobile platforms, and the constraints put by Google Play Store/App Store policies.

No matter what, I feel like — any user who is serious about encrypting files on-the-go before uploading them to the cloud, should not hesitate to pay the one-time fee. After all, purchasing a license would help the product, right? 😼

And, that is the same reason I chose to purchase a license to use Cryptomator on Android.

To get started with the app, you need to click on the “+” icon to add a vault, and then pick the location of the vault. It can be a cloud storage service, a WebDAV/S3 storage, or your Android phone’s local storage.

Once you choose/sign in to a cloud storage, you need to:

  • Create a folder and choose a path to store it at
  • Set a password
  • Start adding files

💡

Create a strong master password with a…

Source…

Ascension healthcare network disrupted by “cyber security event,” interrupting clinical operations


CHICAGO (CBS) — The Ascension Healthcare Network announced Wednesday that its clinical operations have been disrupted by what it called a cyber security event.

In a news release, Ascension said it responded immediately after it discovered “unusual activity on select technology network systems” on Wednesday, and access to some systems has been interrupted with remediation efforts in progress.

“Our care teams are trained for these kinds of disruptions and have initiated procedures to ensure patient care delivery continues to be safe and as minimally impacted as possible,” Ascension said in a news release. “There has been a disruption to clinical operations, and we continue to assess the impact and duration of the disruption.”

On Thursday, there remained many unanswered questions about the hospital cyberattack. Ascension has 140 hospitals around the country – including 14 in the Chicago area.

The hospitals see millions of visitors each year. It is not clear how many patients were impacted by the breach.

“Hospitals are some of the most connected places in the world,” said Paul Keener, a cybersecurity strategist at GuidePoint Security.

Ascension said it has brought in the cybersecurity firm Mandiant Solutions to help investigate and has notified authorities.

“Together, we are working to fully investigate what information, if any, may have been affected by the situation,” Ascension said. “Should we determine that any sensitive information was affected, we will notify and support those individuals in accordance with all relevant regulatory and legal guidelines.”

Ascension did advise that business partners temporarily suspend their connection to the Ascension system.

Source…

Security in Virtual Payment Processing: Safeguarding Your Transactions


In the era of digital commerce, the security of virtual payment processing stands as a cornerstone of trust and reliability. Recent data breaches, where millions of sensitive records were compromised, starkly underscore the critical need for robust security measures. Such incidents not only jeopardize individual finances but also threaten the integrity of entire businesses. This article delves into the advanced best practices and cutting-edge technologies designed to fortify the security of virtual payment processing, ensuring that transactions are not just seamless but also secure from evolving threats.

Navigating Convenience and Caution of Online Payments

Online payments have streamlined our lives, but they’ve also created a playground for cybercriminals. Fraud, hacking, and phishing schemes threaten individuals and businesses alike, causing financial losses and shattering trust. As payment methods continue to evolve, so must our awareness of the risks to ensure the security of our transactions.

Understanding the Impact of Cyber Threats

In today’s digital era, the convenience of online payments is undeniable. They streamline everything from monthly bill payments to spontaneous shopping sprees. Yet, this digital convenience has also opened a Pandora’s box of opportunities for cybercriminals. The process of making payments online, especially process ACH payments, is not immune to the darker sides of technological advancements. This has led to an increase in sophisticated fraud schemes that target both unsuspecting individuals and large businesses.

Hacking, once a term associated primarily with shadowy figures in basements, has evolved into a significant industry problem. Cybercriminals are now capable of orchestrating breaches that infiltrate secure payment systems, diverting enormous sums of money within minutes. Phishing, another prevalent threat, tricks users into handing over critical financial…

Source…