Tag Archive for: Watch

Watch now: Cybersecurity admin says ransomware constant threat for ISU – The Pantagraph



Watch now: Cybersecurity admin says ransomware constant threat for ISU  The Pantagraph

Source…

Google’s Pixel Watch to Compete With Apple Watch This Fall


The first smartwatch featuring Google-built hardware and software is coming. At its I/O developer conference on Wednesday, Google officially announced the Pixel Watch, slated to arrive alongside the Pixel 7 (and presumably a new Apple Watch) this fall. 

On the design front, the new wearable will feature a domed circular face, a tactile crown, a recycled stainless steel case, and customizable bands. On the inside, it will run Wear OS, featuring an “improved” user interface “with more fluid navigations and smart notifications,” Google SVP Rick Osterloh said at the event. 

In terms of apps, the Pixel Watch will naturally feature several Google standbys, including Assistant, Home, Maps, and Wallet, along with “deep” Fitbit integration, according to Osterloh. 

Pixel Watch


Google Home on the Pixel Watch
(Image: Google)

The watch is voice-enabled, so you can ask Google Assistant for the weather forecast and more. With Google Maps, you can follow directions, even when cycling, right on the watch without having to bring your phone. Google Wallet on Wear OS will launch starting with support for payment cards, letting you check out in stores with a tap of your wrist. A new Google Home app for Wear OS will let you control and monitor compatible smart home devices including lights bulbs, security cameras, and thermostats from your watch. 

On the health and fitness end, the Pixel Watch will support continuous heart rate monitoring and automatic sleep tracking. It will also be the first Wear OS device to support Fitbit’s Active Zone Minutes metric. 

Pixel Watch


Google Maps on the Pixel Watch
(Image: Google)

That’s all Google has officially said about the Pixel Watch at this time. Osterloh promised more details in the coming months. 

Meanwhile, Google also tipped additional Wear OS devices from Fossil, Mobvoi, Montblanc, and Samsung launching later this year, but didn’t offer details.

Recommended by Our Editors

On the software side, Deezer and SoundCloud apps are slated to arrive on Wear OS in the near future, joining several other notable additions that have recently launched on the platform, including Adidas Running, KakaoTalk, Line, and Spotify. Google also plans to bring Emergency SOS to Wear OS later…

Source…

This WeeΚ In Security: Hackerman, Twitter’s Best, And Signs To Watch Out For


[Editor’s note: There is a second, fake iteration of this column out today. This is obviously the real column.]

First off, there’s an amazing video tutorial from [Hackerman], embedded below the break. It’s a beginners guide to temporal displacement through GPU accelerated, cellular-connected partition board. The central flaw that makes this possible is a segmentation violation, accessible through a mode 6 cursor address reset. Watch out, though, because many mainframes actually have a core terminal capable of shutting such an attempt out of the grid altogether.

It’s a great guide, and definitely worth a watch if temporal security tickles your fancy. Watch out, though, because everyday objects can apparently act as bridges, infecting even users with temporal effects.

Twitter’s Tips (#5 Will Shock You)

Twitter’s best and brightest have come together to give us some of their best tips. The stellar advice ranges from classic goodies, like “change your passwords often”, to more modern truisms, like “[it’s] only critical if it’s covered by the media. Refrain from publishing any details to keep severity low.” My personal favorite is the truism that vulnerability mitigation is a wasted expense, and that money is better spent on a Web Application Firewall, which is sure to keep you out of trouble.

Other hot takes include the advice to use Stackoverflow for all your security remediation problems. Another user suggested keeping business hours on your website, so it can only be attacked while you’re at work. Perhaps the best was the advice that you name your dog something minimum 16 characters, using a mix of characters, since you’ll inevitably use the pet’s name as your password. Check out the #cisotips tag for more of these awesome tips!

How to Know When to Report Your Family for Computer Crimes

This is an old-but-good one. A quick guide to how to know when your kids have crossed the line, and you should call the police to curb their computer hacking ways. Some of the red flags to watch for are use of Tor, VM technology, or the dreaded Kali Linux. Also worrying are dedicated hacker hardware,…

Source…

Android Smartphone Users, Watch Out for This New Security Risk Called ‘Dirty Pipe’


Android smartphones are seemingly exposed to a new type of vulnerability that may give attackers full control of your device. Spotted by a researcher named Max Kellermann, the new exploit has the potential to compromise Android 12-powered smartphones like Samsung Galaxy S22 series, Google Pixel 6 series and more. Identified as ‘CVE-2022-0847’ and dubbed ‘Dirty Pipe’, Kellermann’s blog post notes that the vulnerability in the Linux kernel 5.8 allows “overwriting data in arbitrary read-only files”. Since Android is built on the Linux kernel (kernel is the core of the operating system), the vulnerability poses threats to any Android-powered devices like smartphones, smart speakers, TV, and more. However, Ars Technica’s Ron Amadeo points out that the damage potential of ‘Dirty Pipe’ is far more limited as “Linux 5.8 and above has only been an Android option for five months”.

ALSO READ: China Behind Hacking of US Govt Agencies in 6 States: Cybersecurity Firm Mandiant

How Does Dirty Pipe Exploit Work?

The Dirty Pipe is named after the Dirty Cow vulnerability that was discovered in 2016. Kellermann suggests the two are similar, but the latter is “easier to exploit”. The post explains the new exploit is a ‘privilege-escalation’ vulnerability that lets hackers obtain unauthorised access despite a security perimeter. A simple overview would be that Dirty Pipe affects ‘pipes’ within Linux that help in the transfer of data. If this “unidirectional inter-process communication” channel is compromised, hackers can change the contents of a file or gain access to the full device, as noted by 9to5Google.

The post notes that the Linux vulnerability was alerted to the Linux Kernel security team in early February, and the issue is fixed with multiple releases (5.16.11, 5.15.25, 5.10.102). Google is yet to release a patch for the ‘Dirty Pipe CVE-2022-0847’ exploit.

Dirty Pipe Protection

Since it is a fairly new vulnerability that was disclosed to the public earlier this month, many details remain unclear. For instance, it seems that the ‘Dirty Pipe CVE-2022-0847’ is still an active exploit in the wild and the scale of affected users remains unclear. Developer…

Source…