Connect with us

Technology

Four Cameras? – Samsung Galaxy A9

Published

on

Introducing, Samsung Galaxy A9! The world’s first quad camera smartphone! Well not literally but it’s the first ever four rear-mounted camera setup, quite frankly I’m not that surprised, in a day where more is better time would only tell till we get this kind of a product. And no other than Samsung the world’s biggest smartphone manufacturer to do it. Beforehand they came out with the A7 (2018) with triple cameras, so it’s just like connecting the dots.

The Samsung Galaxy A9 specifications are:

Snapdragon 660, Kyro 260 & Adreno 512 GPU – Although not top-of-the-line still hard-hitting specs paired with 6 or 8 GB of RAM, 128 GB of storage and a dedicated microSD slot for expansion. It has a 6.3” Super AMOLED display, FullHD+ 2,220 x 1,080px resolution Infinity display with an 18.5:9 aspect ratio translating to 392ppi pixel density, so display won’t be an issue on this phone boasting very lovely specs here. Battery life as well won’t be troublesome with 3,800 mAh Li-Po battery and Samsung Adaptive Fast charging on board. It as well has all of the 2018 capabilities of a smartphone in terms of connectivity, Dual SIM, LTE Cat.9, USB Type-C, GPS, NFC, Bluetooth 5.0 and a lot more.

Going into the main feature of this phone, it’s four back facing cameras. The primary lens has 24MP with f/1.7 aperture, phase detection autofocus. The secondary lens has 8MP with f/2.4 aperture used for ultrawide shots with fixed focus. The third has 10MP with f/2.4 aperture used for telephoto with 2x optical zoom. Fourth has 5MP, f/2.2 aperture used for depth sensing. The photos taken on the primary lens does look great with a lot of detail, sharp and vibrant. Wide angle, telephoto, and depth are really just plain wrong, given that its still early software still it seems a bit rushed if that’s their argument, I hope Samsung would fix this in the future.

But is it all necessary or beneficial when Google’s Pixel 3 is rocking only One lens with all of the software doing most of the heavy lifting and is one of the best in the market today, but I guess it’s not directly competing with Google’s flagship. Samsung is calling it ‘more affordable,’ well in Samsung’s point of view. Never the less it’s a fresh look with Metal & Glass finishing and those Quad Cameras on the back, I have high hopes for this since it only costs 549-pound sterling available mid-November in the UK, still have to wait for how much will it cost in the US.

Hi, I'm Tiffany, a mom, and a news contributor. I enjoy writing stories about the current status quo of today's society. From science, technology, and even fictional characters; I take great passion with everything I do.

Technology

Sprint Resets Account Passwords Of Users After Data Breach

Hackers used the Samsung website to gain access to Sprint’s accounts.

Published

on

Photo: Sprint Website

Sprint, an American mobile telecom provider, has proactively reset their customers’ account PIN following a data breach that has affected an “unknown” number of accounts.

In a letter sent by Sprint to its customers, Sprint said that the data breach could have affected any account, so they are resetting everyone’s PIN as part of a safety mechanism to mitigate the effects of the data breach.

“Your account PIN may have been compromised, so we reset your PIN just in case in order to protect your account,” reads the notification letter sent by the telecom provider to its users.

According to the company, their team was informed, on June 22nd, of a data breach that allowed a threat actor to gain unauthorized access to their user’s accounts by exploiting an unpatched vulnerability in Samsung’s website “add a line” feature. The “add a line” feature in Samsung.com allows Samsung users to connect their mobile line (including that availed from Sprint) to their Samsung devices.

Sprint, a Kansas-based telecom network founded in 1899 in Abilene, Kansas, claims that they have a total of 54.5 million as of March this year. According to the letter sent by the company to its users, it is still unclear how many of the millions of their users are affected by the breach.

The leak, as stipulated by their notification to customers, includes users’ personal information such as phone number, device type, device ID, monthly recurring charges, subscriber ID, account number, account creation date, upgrade eligibility, first and last name, billing address, and add-on services. Nonetheless, Sprint clarified that no sensitive information that could cause serious identity theft, and fraud was accessed by the hacker/s.

“We take this matter, and all matters involving Sprint customer’s privacy, very seriously,” assures the company to its users.

As of June 25th, the company has said to have “re-secured” their users account and they have taken appropriate measures to protect their users from any untoward fraud and malicious attacks against their identities.

“Sprint has taken appropriate action to secure your account from unauthorized access and has not identified any fraudulent activity associated with your account at this time. Sprint re-secured your account on June 25, 2019, with the following notification to your Sprint phone device: Your account PIN may have been compromised, so we reset your PIN just in case in order to protect your account,” they wrote in the letter.

Furthermore, the same letter includes different mitigation procedures that users can do in order to protect themselves from malicious attacks. The company also urges its users to follow the protocols set by the Federal Trade Commission to help secure their identities.

“As a precautionary measure, we recommend that you take the preventative measures that are recommended by the Federal Trade Commission (FTC) to help protect you from fraud and identity theft. These preventative measures are included at the end of this letter. You may review this information on the FTC’s website at www.ftc.gov/idtheft and www.IdentityTheft.gov or contact the FTC directly by phone at 1-877-438-4338 or by mail at 600 Pennsylvania Avenue, NW, Washington, DC 20580,” they added.

What to do to protect yourself after the data breach?

Place a fraud alert on your credit reports, and review your credit reports.

As part of Sprint’s effort to help their customers protect themselves, they are encouraging their users to contact at least one of the three toll-free fraud alert company below. A user only needs to contact one company as whoever they chose to contact is legally required to submit the fraud alert report to the other two.

TransUnion:
1-800-680-7289
TransUnion Fraud Victim Assistance P.O. Box 2000 Chester, PA 19016
www.transunion.com

Equifax:
1-800-465-7166 Equifax Information Services LLC P.O. Box 105069 Atlanta, GA 30348-5069
www.equifax.com

Experian:
1-888-EXPERIAN (397-3742)
Experian PO Box 9701, Allen, TX 75013
www.experian.com

“Once you place the fraud alert in your file, you’re entitled to order one free copy of your credit report from each of the three consumer reporting companies. If you find fraudulent or inaccurate information, get it removed,” the company advised.

Other steps to protect yourself include:

  • Close the accounts that you believe have been tampered with or opened fraudulently.
  • File a report with your local police or the police in the community where the identity theft took place.
  • Visit the Federal Trade Commission’s Identity Theft website, IdentityTheft.gov, or for more information on reporting and recovering from identity theft.
  • Contact your state’s Attorney General or Consumer Protection Agency for more information on reporting and recovering from identity theft.

Continue Reading

Technology

Amidst Zoom Zero-Day Fixes, Vulnerability Continues To Doom Partners Like RingCentral

Apple quietly released an update to remedy the situation.

Published

on

Photo: RingCentral Website

A recent zero-day vulnerability seen in Zoom’s software continues to plague its partners like RingCentral Meeting.

Last week, software engineer Jonathan Leitschuh uncovered a significant security flaw in the Mac client for Zoom. It turns out that this implementation isn’t secure since an attacker could create a link that would automatically join users to a call and turn your video camera on without you noticing. Users will only be made aware that their camera is on after seeing the LED indicator light (which has no option to be turned off as a functionality) lit.

Related: Zoom Zero-Day Allows Hackers To Turn Mac Cameras On Remotely

The bigger problem comes from the fact that once an attack is made, the problem will continue to annoy even after uninstalling the software from your Mac computers. This is possible since the designers of the software deliberately included a hidden web server on your Mac that would reinstall Zoom’s client automatically after clicking the link.

Following the discovery of the exploited vulnerability in Zoom’s video calling, the company promised to implement stricter security mechanisms to improve their system.

“To be clear, Zoom honors the user’s video settings,” they said in a press release regarding the vulnerability. “Video is central to the Zoom experience. Our video-first platform is a key benefit to our users around the world, and our customers have told us that they choose Zoom for our frictionless video communications experience,” they added.

And about what they did once they discovered the zero-day, they said: “Once the issue was brought to our Security team’s attention, we responded within ten minutes, gathering additional details, and proceeded to perform a risk assessment. Our determination was that both the DOS issue and meeting join with a camera on concern were both low risk because, in the case of DOS, no user information was at risk, and in the case of meeting join, users can choose their camera settings.”

While Apple has already patched the problem and Zoom has already made sure that their software can be totally uninstalled and deleted from a device, Karan Lyons published evidence of yet more video conferencing apps that could be maliciously opened with their cameras turned on due to a security flaw.

This means that even if Zoom was able to fix the problem with its own system, the patch did not work for other software that they power – and that includes RingCentral.

According to the security researcher, if you are a user of RingCentral, you should update your app as soon as possible as the newest update included the fix. If you are a former user, then you are going to need to do a little more work to check your computer.

Because just like Zoom, RingCentral secretly installed code to your computer that listens for remote calls and this feature cannot be removed by a simple app uninstall process. Similar to how Apple had to intervene with the Zoom situation, Apple also secretly released an update in order to remedy the problem caused by RingCentral.

Apple’s intervention was definitely necessary in this case because; without it, users wouldn’t be able to receive the update that would ultimately remove Zoom’s and RingCentral’s breadcrumbs from an affected device.

Furthermore, Lyon said that with the discovery of the unpatched vulnerability in RingCentral and Zhumu, it is more likely that other white-labeled services from Zoom experience similar problems.

When asked for comment, a RingCentral spokesperson said that the company has “taken immediate steps to mitigate these vulnerabilities for any customers who could be affected,” but that to the company’s knowledge the security flaw hasn’t been exploited in the wild.

Nonetheless, tech experts still believe that the mere fact that such vulnerability exists makes them “irresponsible.”

“Zoom’s efforts to circumvent Safari’s native security are completely irresponsible. The Web server ‘feature’ merely adds a small amount of convenience at a massive security cost. This is flagrant and deliberate security and privacy violation that raises serious concerns over Zoom’s internal security prioritization and threat modeling,” TidBITS Security Editor Rich Mogull said.

Continue Reading

Technology

Google Hits Back: ‘We Do Not Work With The Chinese Military’

Google denies all allegation made by Peter Thiel.

Published

on

Photo: Travis Wise | Flickr | CC BY 2.0

When White House Adviser and Facebook Board Member Peter Thiel suggested that Google should be investigated for its “treasonous” behavior, and for working with the Chinese military, President Donald Trump agreed.

But now, Google hits back to the allegations that the San Francisco-based tech superpower is working with China and its army. “As we have said before, we do not work with the Chinese military,” Google said in a statement shared with The Independent.

Earlier today, President Trump affirmatively responded to Thiel’s suggestion that the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) should investigate Google for its refusal to work with the US Department of Defense, and over the accusation that the company has a relationship with its Asian counterpart.

In a Twitter storm, President Trump praised Peter Thiel, saying that he is a “great and brilliant guy who knows this subject better than anyone.” The American chief-of-staff also echoed the sentiments of Thiel and pronounced that the “Trump Administration will investigate.”

The allegations made by Thiel stems from a previous deal that Google backed out from. In 2018, Google decided to withdraw from a contract between the tech superpower and the U.S. Department of Defense for the development of artificial intelligence (AI) technology citing that the projects have specific ethical issues that they cannot be involved in.

Thiel questions “how many foreign intelligence agencies have infiltrated your Manhattan Project for AI.” Furthermore, he also asked whether or not Google’s senior executives consider the possibility that the company has been infiltrated by foreign intelligence.

The “billionaire and tech businessman,” Thiel further questions if Google chose to work with the Chinese military instead of the US Department of Defense since “they are making the sort of bad, short-term rationalistic [decision] that if the technology doesn’t go out the front door, it gets stolen out the backdoor anyway?”

According to Axios’ report, there are no public documents that stipulate any infiltration by foreign intelligence of Google. However, they said that Thiel owns a company called Palantir, which works with the Trump Administration, and has access to millions worth of government data, including American private information. Nonetheless, it is still unclear if Thiel’s assertions are motivated by any personal and classified knowledge he drew from his relationship with the White House.

Trump vs. Google

Google and the White House having a beef against each other is not new. In fact, only recently, an exposé by the independent investigative journalist group, Project Veritas, alleges that several Google executives and senior employees have a political bias against President Trump and his administration.

A video released by Project Veritas, which has since been removed from the platform by Youtube, shows a senior employee at the company appearing to admit that the company plans to interfere in the next presidential election to stop Donald Trump.

The video is still available in the Project Veritas website and featured undercover footage of a top Google employee, Jen Gennai, who preaches that the company, Google, should not be broken up since they still need to stop the re-election of the President and only them can prevent the “next Trump situation.”

“Elizabeth Warren is saying we should break up Google. And like, I love her but she’s very misguided, like that will not make it better it will make it worse, because all these smaller companies who don’t have the same resources that we do will be charged with preventing the next Trump situation, it’s like a small company cannot do that,” the video revealed appearing to be said by Gennai.

In the same video, Gennai also appears to declare that Trump’s victory in the 2016 elections “screwed us (Google).”

“We all got screwed over in 2016; again it wasn’t just us, it was, the people got screwed over, the news media got screwed over, like, everybody got screwed over, so we’re rapidly like, happened there and how do we prevent it from happening again,” she added.

“We’re also training our algorithms, like, if 2016 happened again, would we have, would the outcome be different?”

Continue Reading

Trending