Connect with us

Technology

iPad OS: Can It Replace Your Laptop?

[bctt tweet=”Apple introduces new iPad OS including new efficient performance features for a more desktop-class experience” username=”Z6Mag”]

iPad Dark Mode| Photo From: Apple

Published

on

ad1

Apple introduced something big with the iPad during its WWDC event in San Jose, California. The iPad is swerving away from the current iOS that’s running the device and is getting introduced with an independent operating system of its own. iPad OS, which Apple calls, is a step towards the company’s vision of making the tablet device turn into laptop hardware.

The latest introduction to the iPad could answer engineering gaps when Apple shipped the current iPad Pro right after releasing iOS 12. The current iPad Pro included a USB socket that had no software to support it. That changes today — along with a handful of new features coming to iPads with the upcoming iPad OS.

iPad OS Home Screen
Photo From: Apple

The first thing users would notice on the new iPad with iPad OS would be the visually striking changes, and it’s not just the system-wide Dark Mode feature — in the new iPad, applications are placed in tighter grids allowing the user to maximize screen space and take less gray areas for more work efficiency.

In the past, the widget menu was accessed through making an expressive swipe down gesture from the top screen. Today, Apple is making it more relaxed with a simple left-swipe on the home screen to reveal preferred widgets.

Slide Over
Photo From: Apple

Apple is taking notes from the success of the Slide Over functionality introduced in the iPhone X and later — iPads will soon have its Slide Over gestures.

The problem before with the iPad Pro pretending to be a desktop was the lack of multi-tasking capabilities. Typically, any other desktop would not have the same problem. In the new iPad, it’s taking the first steps on filling in the gap through Slide Over.

iPad users in the near future can add an additional iPhone-width screen by simply swiping right from the right edge corner (as seen on the image above) with the Messages app hovering.

Pop-up Screen Fan Out
Photo From: Engadget

Furthermore, users now have the choice to have other applications pop up from the right edge of their iPad screen by dragging them from the dock. Simple sliding gestures on the pop-up screen will change the application. Meanwhile, dragging from the bottom would fan out all pending applications in the pop-screen. However, Apple did not specify if the feature would also work with other third-party applications.

In addition to Slide Over, new typing gestures are said to make work experience with full touchscreen functionalities a breeze. During WWDC, Apple demonstrated that a simple drag across text would highlight; three-finger pinch to copy, and three-finger spread to paste.

Even more on Apple’s solutions to the multitasking problem is the Split View feature — users can have a virtually endless choice of pairing applications to split a screen together.

Notes Split View
Photo From: Apple

Split View functions as an in-app feature — where a user can drag other pieces of content on the screen and enlarge it. For example, a user can have the freedom of opening two Notes pages in a single screen by dragging another note and put them side-by-side one another, as seen in the photo above.

Moreover, Split View pairs across all applications. A user can split the screen between a Notes app and a Pages app — the feature also works across third-party applications, too.

App Exposé
Photo From: Apple

Lastly, to form a sense of order and system with the multiple Split View screens, Apple introduced App Exposé — which simply mean holding the application on the dock would expose all background Split View screens, as shown on the second photo above.

Notably, Split View will significantly improve efficiency when working on an iPad. However, we say that this feature is merely a step rather than the solution. Users are still limited to conveniently having only two screens at ready (three if we count the pop-up screen) as compared to a MacBook that would easily let you access 16 applications with a few gestures.

The updates coming to the Files folder is set to turn things around for the iPad and make it even closer to desktop functionality.

Primarily, the Files folder now works with a column view display that would make accessing files and folders easier to accomplish. There are excellent preview and rich metadata.

But what makes the Files folder even better is the introduction of the USB port. Users can now access and transfer files by inserting a thumbstick into the iPad and optimize them through Folders.

Safari is also getting an update — a Download Manager will be included in Safari to finally allow an Apple device download files directly from Safari. Files are stored in the Folders app afterward.

On the other hand, Safari will soon support web browser for websites who previously displayed mobile versions on the iPad. Apple announced that Google Docs will work great on the iPad.

Overall, the iPad hardware is a great device on its own. The new features coming with the iPad OS will improve it for a more desktop-class experience. However, it’s still worthy to note whether or not the new OS is robust enough to replace a laptop once and for all.

But when a 12.9-inch iPad Pro starts at $999 before you even add a keyboard, conventional laptops may still be an open idea for more rigid performance tasks.

A communications graduate writing about the latest trends and news!

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cybersecurity

Kaspersky Antivirus zero-day could ironically allow hackers to track users

Kaspersky has already issued a patch to resolve the vulnerability.

Published

on

Photo: David Orban | Flickr | CC BY 2.0
ad1

A German journalist discovered a flaw in the system of Kaspersky Lab’s antivirus that led to a significant security risk which allowed cybercriminals to track Kaspersky customer without their knowledge.

This all started when Ronald Eikenberg began testing antivirus programs for his own publication. A few months later he discovered that on a website, Kaspersky’s antivirus has been injecting some code. Eikenberg said that it seems that Kaspersky is trying to find ways in interacting with the site even though there is no browser extension on the system.

“One of the purposes of the script is to evaluate Google search results displayed in the user’s browser. If a link is safe, the Kaspersky software will display a green shield behind it,” he added.

In this era, most of the companies and websites would require tracking users across the internet to identify them and learn their interest to provide the target advertisements to be shown to them. Usually, this would require 3rd-party cookies, and this would allow even Facebook or Google to track your movement throughout multiple websites.

The problem however when using Kaspersky Antivirus is that it exposes a user by tagging them with a unique identifier that will record and keep track of what you visited in the past four years, which would allow some sites and third-party services to track them even though users have already blocked them. This will be putting the users at risk since everything that the user does is being monitored or kept track of.

“That’s a bad idea because other scripts that run in the context of the website domain can access the HTML code at any time—and thus the injected Kaspersky ID. This means in plain language that any website can simply read the Kaspersky ID of the user and misuse it for tracking,” the researcher says.

Instead of using unique identifiers, they were given a specific ID assigned to a particular computer; thus, it does not change after several days.

This attack could lead to scamming people by either asking their personal information or bank account information through the form of a payment system. One good example would be that a pop-up will show up and say ‘your license has expired, please enter your credit card information to renew your subscription.’

This process would affect multiple users that are using Kaspersky Antivirus. 

There was a patch that was issued last month to update all Kaspersky antivirus program for all the user of a specific version. However, there is still a version of the security tool that still allows a malicious hacker to know that antivirus software is installed on the machine.

Another way to somehow mitigate the problem is to manually uncheck in the software settings depending on the situation that you feel you are being spied on.

Kaspersky has already removed the unique identifiers for the GET request to enhance somehow the process of checking web pages when it comes to malicious activity. The change was provoked by Eikenberg after he notified Kaspersky about the possible risk of personal information disclosure when using unique identifiers for the GET request.

A statement released by Kaspersky revealed that based on their research, there is a minimal chance that this could be carried out in practice, but it is theoretically possible to happen. The complexity of the program would help fend off the leak of private information and also its low profitability would somehow be a discouragement for the hacker. 

Nevertheless, the company would still need to improve their system in order to prevent further mishaps, the private information that should be protected by the company is a due responsibility that should not be taken short for. Thus it is a severe issue if Kaspersky does not resolve the problem at hand right away. 

On a brighter note, if users want to disable tracking altogether, they can manually disable the URL advisor feature from the settings – additional – network- uncheck traffic processing box. This procedure will allow the user to be safe and not be monitored for the meantime while using the said application.

Users of specific tools that sole purpose is to protect our information and protect the user, having this kind of issue will bring distraught to the public in trusting some of the protection programs to install on their devices.

Continue Reading

Gadgets

Huawei warns Trump of disrupting the dominance of Apple, Google

Huawei CEO said that if the U.S. government continues to deny them of using Android, they will be forced to use HongMeng OS on their new smartphones, disrupting the dominance of Google and Android.

Published

on

Photo by Kamil Kot on Unsplash
ad1

Huawei is poised to take over and disrupt the dominance of two long-standing tech giants in the smartphone industry, Google and Apple, and when pushed by the U.S. government to their last recourse if Washington continues denying the Chinese company access to the Android operating systems for their future smartphone products, it will have no choice but to fight against Google and Apple, which is bad for the U.S., Huawei CEO Ren Zhengfei warned.

Ren stated in an interview that if Google strips them from the Android operating system, then the world will know a third operating system. Ren also claimed that releasing a third operating system will not be the best choice for the two major companies since there will be more competition.

The blacklisting was announced last May, and since then, Huawei has been claiming to launch a new smartphone with a new operating system. The operating system, named HongMeng or Harmony OS, will be better than both the current operating system available, the tech giant said.

People have been wanting a better version of the smartphones that we are using now, instead what we got instead are clever phones that have low-latency, better smart-TVs and even watches that are able to connect to the internet.

Huawei claimed that they don’t have a “plan-B” if ever the banning of Google would happen, according to Ren. If ever Google is not used, they plan to shift HarmonyOS to be viable to smartphones, but it would take some time since the shift would require them to create a whole new system that would be on par when it comes to its performance.

The problem all started when there were claims that due to the coziness of Huawei with the Chinese government, it is feared that the devices would be used as a tool to spy on other countries. This was all the reason that caused the U.S. to ban companies from using equipment from Huawei way back in 2012.

An executive order from President Donald Trump placed Huawei on the list of the U.S. Department of Commerce’s Bureau of Industry and Security on May 15. However, Trump agreed to be more lenient on the restriction as a part of a deal to resume business trade talks with China in June.

If the U.S. really does deny access to Google’s operating system, then Huawei has no choice but to create an alternative, and it will be backed up by China for Huawei to create this alternative.

Ren warned Google, “you cannot rule out the chance that the third operating system might outrun them someday.”

The U.K. can’t practically decide on what to do right now as other major telcos still work hand in hand with Huawei by continuing to sign agreements with them. While the U.S. still is still tangled in trade talks with agriculture, so the cycle of their industry is still the same, fast-moving and no change. 

Supplying ‘authoritarian regimes’

In an interview, Ren also admitted that Huawei supplies “authoritarian regimes.”

“I actually do not make any prejudgement of a government first before we sell to our customers. Because every country has a sovereign system, it’s not in our position to interfere with the sovereignty of other states. If we did, then we would be playing the game of politics, right? And that’s a matter for sovereign states.”

The situation where Huawei is on right now might be a little difficult since it will require a gamble if ever they were denied access with Google’s operating system. Right now, Huawei still does not have any ‘plan-b’ course of action, but they will have to make an alternative when the time comes. They also plan to compete with the two biggest Operating system provider (Google and Apple). 

The U.S. is still pondering on whether to continue the relationships with Huawei or to completely ban them and make them a permanent blacklist on U.S. Department of Commerce’s Bureau of Industry and Security, halting any form of trade with Huawei and demolishing the support that they are still currently having with Google.

The long term plan is still hazy, but if ever the U.S. does force China into a full-scale Android alternative, others will jump on board. And, despite the rhetoric, the U.S. really does not want that.

Continue Reading

Cybersecurity

‘Vanda The God’ hacking group claims responsibility over massive healthcare website attacks

The attack affected websites from the U.S., U.K., New Zealand, and South Africa.

Published

on

Photo by Clint Patterson on Unsplash
ad1

Tu Ora Compass Health server fell after being targeted by hackers causing medical facilities to stop their operations; the worse part is that they are not alone because they are a victim of a massive attack that has affected different websites and companies from around the world.

The crisis that the hacking made was not only small scale but was also able to affect quite a lot of countries, including the U.S., the U.K., and South America-based websites. Four medical facilities in New Zealand was compromised that has caused them to halt all operations; thus, risking thousands of private information under their possession.

From a report, Tu Ora Compass Health’s website was not working correctly and is showing some errors; with this, it resulted in a chain of bugging websites. Kuripuni, Greytown, Featherston, and Carterton medical centers could not even be accessed at the same time as Tu Ora Compass Health’s website went down.

Tu Ora Compass Health, however, reported that there were no unnecessary leakage of patient’s data or any compromised information.

“Shortly after we became aware of the incident on August 5, we contained it by taking the compromised server offline. This stopped all access to any applications and data on that server and elsewhere within our network.” Chief executive of Tu Ora Compass Health, Justin Thorpe said.

“Vanda the God” was the name of the attack group that made themselves known by openly claiming that they have already hacked and posted the information that they got from it on their Twitter account.

Most of the affected sites on their list were government sites. Here is a list of those sites that are already posted on their Twitter: 

Vanda The God is an international hacker group that hacked a couple of government sites, but it is still unclear if they have a motive over the attacks. Nonetheless, they have been hacking sites and replacing their home page with vulgar anti-government statements, which points out to the direction of a hacking as a political statement.

With their series of hacking and manipulating websites, does this even raise awareness or encourage people to be politically active? DataBreaches.net tried to reach out to them via Twitter to ask if what they are doing is making any difference, or what is making a change. They replied by tweeting, “I believe the people who see the message open their eyes and see that the governments are corrupt Me (sic) people that society screams for their rights.”

Currently now Tu Ora Compass Health is working on their technology providers to investigate the intrusion that recently occurred. They have to restrict the website temporarily; thus, all those 20 affiliated GP practices around the country could not also be accessed. 

According to Tu Ora Compass Health, since patients trust them with information that is very private, they will treat this as serious as they can, making sure to implement all necessary actions to ensure that the server is much more secure and capable of fending off any future hackers. However, Thorpe would like to apologize for any inconvenience that this has caused by taking a few servers offline.

“We are currently working through the process of restoring access to this server and ensuring all our systems are as secure as possible.” as per Thorpe.

Cyber attacks are common in this era according to statistics made by Cybersecurity Reports, which says that cyberattacks have increased by 59% for 2018. And by December 2018 there have been much more attacks that peaked at 80 per day. This rate is highly alarming since there are a lot of vulnerable websites that can easily be penetrated, and personal information could be leaked.

The most common types of vulnerabilities in 2018 based on an analysis made by Sitelock were; Cross-site scripting or XSS, SQL injection (SQLi), and cross-site request forgery (CSRF). 

There are many forms of cyber attacks that are possible to be used. And it is better to be equipped with a much higher form of security system is your website is managing a ton of information that might be at risk. Hackers will want to get there hands on that information, and thus if there is a flaw in your security, it is just giving them easier access to their pot of gold. Being secured is better than being at risk of any loss. 

Continue Reading

Trending