Agregátor RSS

Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

The Hacker News - 8 Květen, 2024 - 12:58
A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. "These enhancements aim to increase the malware's stealthiness, thereby remaining undetected for longer periods of time," Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report. "Hijack Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Google US antitrust trial: A timeline

Computerworld.com [Hacking News] - 8 Květen, 2024 - 12:49

Google’s dominance in the search arena has given rise to two major antitrust lawsuits from the U.S. government, which allege that the company has manipulated the market to maintain that dominance, to the exclusion of its competitors and the detriment of the public at large.

The first lawsuit, targeting Google’s search business, kicked off in mid-September 2023, and is now drawing to a close with the delivery of closing arguments, while a second trial against the tech giant, focusing on advertising, is scheduled for later this year.

The cases heavily echo the turn-of-the-century Microsoft antitrust case in several respects, not least of which is the fact that Google faces the possibility of being broken up by regulators if it is unsuccessful in its legal battles.

Here’s our condensed timeline of the two lawsuits, and their progress through the court system.

May 3, 2024: Over two days of closing arguments, the Department of Justice revisited its case for Google having a monopoly on search advertising, and Judge Mehta quizzed both parties about whether other platforms could be viewed as substitutes for Google’s search advertising business. He hasn’t said how long he expects to take to reach a decision, but if he rules against Google, a second hearing will take place to decide on any remedies.

November 16, 2023: The evidentiary phase of the trial finishes, as Judge Mehta issues instructions for post-trial submissions. Despite considerable amounts of redaction and closed-door testimony, the case revealed some unprecedented details about the relationships between the largest tech companies in the world, including the fact that Apple apparently keeps 36% of the search revenue from Google searches in Safari, and Apple once considered buying Microsoft’s Bing search engine as leverage against Google. Judge Mehta has scheduled closing arguments in the case for May 1, 2024.

October 31, 2023: Google CEO Sundai Pichai takes the stand, for long-awaited testimony about the relationship between his company and Apple. He gave some details about Google’s negotiations with Apple over a contract that made Google the default search engine on Apple’s iPhones, iPads, and Macs. Google has paid billions for the privilege of being the default search on Apple products, and the relationship is a key part of the case – which was underlined by the Justice Department’s cross-examination of Pichai, during which he admitted that default search status is a major driver of market share.

October 18, 2023: Google begins its defense, calling Paul Nayak, a vice president of search, to the stand as its first witness. Nayak downplays the importance of scale in his testimony, stressing that machine intelligence, compute infrastructure, and a team of 16,000 staff that checks on search results are crucial to maintaining quality of service. DOJ witnesses including DuckDuckGo CEO Gabriel Weinberg and Microsoft CEO Satya Nadella had testified that Google keeps an edge over competitors via an ever-increasing trove of data — the result of its default search engine status, maintained through exclusive contracts and billions of dollars in payments to Apple, Samsung and other companies. This data gives Google an advantage in refining search engine results, they said. 

October 3, 2023: As a witness for the prosecution in the Google antitrust trial, Microsoft CEO Satya Nadella warns that Google’s monopoly profits could lock in publishers as AI-enabled search arrives. Nadella argued that it’s almost impossible to compete with Google, given the search leader’s massive competitive edge in collecting and analyzing user data. He also warned that Google, with its vast profits and lock on the search market, stands poised to extend its monopoly power in a new era where artificial intelligence technologies will turbocharge the search business.

September 26, 2023: Apple’s Eddy Cue testifies behind closed doors in the Google search case, as critics slam presiding Judge Amit Mehta’s decision to hold much of the trial’s testimony from witnesses secret, allow documents to be heavily redacted, and block some documents from public view — mainly at the insistence of Google, but also at the request of other companies, including Apple. By the end of Cue’s testimony — and after a wek of wrangling by all parties — Judge Mehta rules that documents used during the trial can be published online at the end of each day, but still allows time Google and third parties to object to exhibits being shown publicly before the DOJ presents them in court. 

September 21, 2023: Judge Mehta rules that public access to court exhibits, which have been mostly internal Google documents thus far, should be removed, after Google challenged the Justice Department’s regular publication of them. The company said that it was concerned for its employees’ privacy.

September 12, 2023: The default search trial begins with opening statements, and the government begins its case.

August 2023: Judge Mehta grants partial summary judgment for Google in the search case, saying that the government had failed to raise a genuine dispute of material fact on antitrust charges relating to contracts around the use of the Android operating system, as well as Google Assistant and IoT devices. The claims relating to Google’s exclusive “default search” contracts, however, are allowed to proceed to trial.

July/August 2023: Google and the plaintiffs in the search case argue various motions in limine, designed to control what evidence should be included or excluded in the actual trial. Discovery and motion practice over evidence continues in the advertising case.

June 2023: Judge Mehta schedules a trial date of September 12, 2023 for the search case.

April 2023: Judge Leonie M. Brinkema denies Google’s motion to dismiss in the advertising case.

March 2023: Google’s motion to transfer the advertising case to New York is denied by Judge Brinkema, who orders the parties to propose discovery schedules within two weeks of the order. Two weeks later, Google moves to dismiss the case for failure to state a claim, arguing that the plaintiffs have simply produced legal conclusions, and not specific facts, that could support their claims. Judge Brinkema schedules pre-trial conferences for January 2024.

February 2023: The plaintiffs in the default search case case move for sanctions against Google, accusing it of spoliation, which refers to the destruction, alteration or failure to preserve relevant evidence in a case. Elsewhere, in the advertising case, Google moves to transfer the case from the Eastern District of Virginia to the Southern District of New York, which is seen as an attempt to consolidate the case with related digital advertising antitrust litigation.

January 2023: A second antitrust action, this one filed by eight states and the DoJ, is filed in federal district court in eastern Virginia. The plaintiffs, who call for Google’s advertising business to be split up, accuse Google of manipulating its dominant position in the online advertising world to squeeze out rivals and control both the supply and demand side of the advertising market. Google, according to the complaint, thwarted fair competition by manipulating fees, punished advertisers for using alternative platforms and ad exchanges, and engaged in a host of further anti-competitive behavior in the interest of monopolizing the marketplace.

December 2022: Google moves for summary judgment against the separate Colorado case and the larger, DoJ-led case. A summary judgement motion is essentially a request by one of the parties in a lawsuit that the judge rule in their favor and end the case, arguing that, based on the undisputed facts, they are entitled to win the case as a matter of law.

May 2022: A deadline of June 17 is set for the production of all discovery materials. Further documents – for example, those whose is existence is first disclosed in late in the discovery window – can be produced until June 30.

May 2022: Judge Mehta denies a government motion to sanction Google for inaccurately classifying documents as attorney-client privileged. The plaintiffs had argued that emails on which Google’s lawyers were listed as recipients or CCed, but that the lawyers never responded to, constituted a misuse of the attorney-client privilege rules.

December 2021: Judge Mehta conditionally splits Colorado’s claims from the case at large, ordering that separate trials on that state’s issues of liability and remedies will be “more convenient for the Court and the Parties, and will expedite and economize this litigation.”

August-October 2021: Discovery-related motions and orders continue, as Yelp and Samsung join the fray. (Those companies, like Microsoft and Apple, are relevant to the case even if they aren’t parties themselves, as their internal records are potentially relevant to Google’s liability.)

June/July 2021: The discovery process continues, and the U.S. and Google both file several documents with the court under seal. (Microsoft files two sealed documents, as well, in response to Google’s subpoenas for company records, and Apple becomes involved after the government requests access to some of its internal information.)

March 2021: Meetings between Google and the various governmental plaintiffs continue, with periodic status reports on the discovery process.

January 2021: Google files a response to the complaint, admitting to many of the facts alleged by the Justice Department and associated attorneys general, but categorically denying the substance of the government’s claims of illegality. Further responses to separate but related claims, generally to specific state attorneys general, follow in the subsequent weeks and months.

December 2020: Judge Amit Mehta approves the joinder of Michigan, Wisconsin and California to the suit.

October 2020: The Department of Justice, along with the attorneys general of 11 states, sues Google in DC federal district court for unlawfully maintaining a monopoly, in violation of Section 2 of the Sherman Act. The case centers on Google’s use of exclusive contracts that mandate its use as the default search engine in a host of different hardware and software applications, with the government alleging that this represents an artificial constraint on any possible competition for the search giant.

Google, Internet, Legal, Technology Industry
Kategorie: Hacking & Security

Temná turistika. Třináct děsivých míst, která připomínají, co dokáže člověk nebo příroda

Živě.cz - 8 Květen, 2024 - 12:45
Temná turistika vyhledává místa spojená se smrtí či utrpením • Vybrali jsme třínáct děsivých míst přírodních a technických katastrof • Připomínají události, které změnily náš svět
Kategorie: IT News

State of ransomware in 2024

Kaspersky Securelist - 8 Květen, 2024 - 12:00

Ransomware attacks continue to be one of the biggest contemporary cybersecurity threats, affecting organizations and individuals alike on a global scale. From high-profile breaches in healthcare and industrial sectors – compromising huge volumes of sensitive data or halting production entirely – to attacks on small businesses that have become relatively easy targets, ransomware actors are expanding their sphere of influence. As we approach International Anti-Ransomware Day, we have analyzed the major ransomware events and trends. In this report, we share our observations, research, and statistics to shed light on the evolving ransomware threat landscape and its implications for cybersecurity.

Ransomware landscape: rise in targeted groups and attacks

Kaspersky collected data on targeted ransomware groups and their attacks from multiple relevant public sources, for the years 2022 and 2023, filtered and validated it. The research reveals a 30% global increase in the number of targeted ransomware groups compared to 2022, with the number of known victims of their attacks rising by a staggering 71%.

Unlike random attacks, these targeted groups focus on governments, high-profile organizations, or specific individuals within an organization. Moreover, most of them distribute their malware under the Ransomware-as-a-Service (RaaS) model, which involves a number of smaller groups (called affiliates) getting access to the ransomware for a subscription fee or a portion of the ransom. In the graph below, you can see the ransomware families that were most active in 2023.

Most active ransomware families by number of victims, 2023

The ransomware most frequently encountered in organizations’ systems in 2023 was Lockbit 3.0. The reason for its remarkable activity may be its builder leak in 2022. That led to various independent groups using the builder to create custom ransomware variants, which they then used to target organizations all over the world. The group itself also has a large affiliate network. Second was BlackCat/ALPHV, which first appeared in December 2021. In December 2023, the FBI, together with other law enforcement agencies, disrupted BlackCat’s operations and seized several websites of the group. However, immediately after the operation, BlackCat stated that it had “unseized” at least some of the sites. The US Department of State offers a 10 million bounty for the group’s associates. The third most active ransomware in 2023 was Cl0p. This group managed to breach managed the file transfer system MoveIt to get to its customers’ data. According to New Zealand security firm Emsisoft, as of December 2023, this breach had affected over 2500 organizations.

Other notable ransomware variants

In our threat research practice, among the threats we analyze are various ransomware samples. This section shares brief descriptions of several noteworthy families that, although not being the most active in 2023, are interesting in some way or another.

  • BlackHunt: Detected in late 2022 and updated in 2023, BlackHunt targets global victims using a C++ executable, which is based on Conti ransomware source code. It utilizes customizable attack vectors, including deceptive tactics like a fake Windows Update screen displayed to mask the file encryption process, and employs security measures for testing purposes, such as checking for “Vaccine.txt” before executing. If the malware author wants to test the executable without encrypting their own files, they create a Vaccine.txt file. If the malware finds this file in the system, it doesn’t proceed with encryption.
  • Rhysida: Emerging in May 2023, Rhysida is a new RaaS operation initially targeting Windows but later expanding to Linux. Both versions use AES and RSA algorithms for file encryption, and the ChaCha stream cipher in the key generation process. The ransomware also implements token-based access to its hidden service for enhanced secrecy.
  • Akira: A compact C++ ransomware compatible with both Windows and Linux, Akira has impacted over 60 organizations across various sectors. It employs a single key for encryption, and featured an encryption flaw in early versions, which made file decryption possible without the ransomware operators’ knowledge. However, this flaw was fixed in recent variants, which are not decryptable at the time of writing this report. For victim communication, Akira utilizes a minimalistic JQuery Terminal-based hidden service.
  • Mallox: Also known as Fargo and TargetCompany, Mallox has been wreaking havoc since its appearance in May 2021. With an increase in attacks in 2023 and nearly 500 identified samples, it continues to evolve with frequent updates and an active affiliate program as of 2024. Operating through both clearnet and TOR servers, Mallox targets internet-facing MS SQL and PostgreSQL servers and spreads through malicious attachments. The most affected countries include Brazil, Vietnam, China, Saudi Arabia, and India.
  • 3AM: A new RaaS variant, 3AM features a sophisticated command-line interface, and an “access key” feature for protection against automatic sandbox execution: to be executed, the ransomware requires an access key. As is the case with most human-operated ransomware, 3AM affiliates get an initial foothold in the target infrastructure using Cobalt Strike. In Cobalt Strike, they use the watermark option, which allows the attackers to uniquely identify beacon traffic associated with a specific Cobalt Strike team server. This may suggest that 3AM affiliates share access to the target with other ransomware groups, and use the watermark to separate their traffic from the others. The ransomware employs efficient file-processing techniques, such as reverse traversal (processing strings from the end to quickly identify file paths and extensions) and integration with Windows API, and terminates various processes before encryption to complicate recovery efforts. Communication with victims is through a TOR-based hidden service, though with operational security misconfigurations such as real IP exposure.
Trends observed in our incident response practice

This section contains trends and statistics based on the incidents our incident response service dealt with in 2023. The figures in this section may differ from those obtained from public sources, because they don’t cover all ransomware-related incidents that occurred last year.

According to our incident response team, in 2023, every third incident (33.3%) was related to ransomware, which remained the primary threat to all organizations, whatever sector of economy or industry they belonged to.

Another important trend observed in 2023: attacks via contractors and service providers, including IT services, became one of the top three attack vectors for the first time. This approach facilitates large-scale attacks with less effort, often going undetected until data leaks or encrypted data are discovered. If speaking about ransomware, trusted relationship attacks were among four of the main initial infection vectors. Another three were: compromise of internet-facing applications, which accounted for 50% of all ransomware attacks; compromised credentials (40%), of which 15% were obtained as a result of brute force attacks; and phishing.

Among the ransomware families most frequently encountered in our incident response practice in 2023 were Lockbit (27.78%), BlackCat (12.96%), Phobos (9.26%), and Zeppelin (9.26%). Most of the data encryption attacks ended within a day (43.48%) or days (32.61%). The rest lasted for weeks (13.04%), while only 10.87% lasted for more than a month. Practically all the long ransomware attacks (those lasting weeks and months), in addition to data encryption, also featured data leakage.

Ransomware groups’ tactics and techniques

Ransomware groups have continued to employ previously identified strategies for intrusion, utilizing similar tools and techniques. Adversaries have targeted internet-facing applications vulnerable to remote command execution (RCE), such as those supported by vulnerable versions of log4j. Exploiting vulnerabilities in these applications, adversaries have gained unauthorized access and compromised infrastructures.

Once exploitation is confirmed, adversaries typically proceed by manipulating local privileged accounts responsible for application execution. They execute commands to modify user passwords and upload a set of tools, such as Meterpreter and Mimikatz, to the compromised system. By executing Meterpreter and creating or modifying system processes, adversaries gain additional access and establish persistence on the compromised system.

In some instances, adversaries exploit vulnerabilities in public-facing applications within the organization’s infrastructure and utilize tools like BloodHound and Impacket for lateral movement within networks and gaining knowledge of the target infrastructure. However, to evade endpoint controls, they also have adopted different techniques, such as using the Windows Command Shell to collect event logs and extract valid usernames.

Additionally, adversaries leverage native Windows SSH commands for command and control (C2) communications and data exfiltration. After identifying paths to reach remote systems with internet access, they configure SSH backdoors and establish reverse tunneling for data exchange.

Overall, ransomware groups demonstrate a sophisticated understanding of network vulnerabilities and utilize a variety of tools and techniques to achieve their objectives. The use of well-known security tools, exploitation of vulnerabilities in public-facing applications, and the use of native Windows commands highlight the need for robust cybersecurity measures to defend against ransomware attacks and domain takeovers.

Ransomware: becoming a matter of national and international security

Over the past few years, the impact of ransomware attacks on public and private organizations has escalated to the point of threatening national security. This growing threat has led to ransomware being highlighted in national cybersecurity strategies, annual reports from cybersecurity regulators, and intergovernmental discussions at forums like the UN Open-ended Working Group (OEWG) on cybersecurity. The frequency and disruptive character of ransomware attacks has become unsustainable for governments, prompting them to pool resources and develop both national and multi-country initiatives to combat ransomware groups.

One notable initiative is the formation in 2021 of the international Counter Ransomware Initiative (CRI), which brings together 49 countries and INTERPOL. Through the CRI, there has been a concerted effort to share cybersecurity information, disrupt attackers’ operations, and tackle the financial mechanisms that fuel ransomware attacks. CRI members have also endorsed a statement advocating against ransom payments by institutions under national government authority, signaling the need for a new global norm and standard around ransomware payments. Countries like Singapore and the United Kingdom have played pivotal roles within the CRI, focusing on understanding the ransomware payment ecosystem and advocating for policies that counter ransomware financing.

Legislative measures and policy actions are central to the fight against ransomware. In the United States, legislation like the Cyber Incident Reporting for Critical Infrastructure Act of 2022 aims to enhance incident reporting and resilience against attacks. In early 2023, France implemented a law that conditioned insurance coverage on the prompt reporting of cybersecurity incidents.

State agencies reporting on ransomware indicates that fighting against this threat is a priority for authorities. In its latest IT Security Report 2023, the BSI (Germany) identifies ransomware as the biggest cybersecurity threat to Germany, noting the shift from “big game hunting” to targeting smaller companies and municipal administrations.

Last but not least, law enforcement agencies around the globe are joining forces in operations aimed at dismantling ransomware networks. In 2023, international operations seized infrastructures of such ransomware groups as Hive, BlackCat, and Ragnar. Early 2024 saw Operation Cronos disrupt Lockbit and get access to their decryption keys, and in May 2024, the group’s leader was unmasked and sanctioned. Although cybercriminals usually rebuild their infrastructure afterwards, these efforts at the very least make ransomware maintenance much more expensive and shorten their income by decrypting their victims for free. These and other efforts underscore a comprehensive approach to fighting ransomware. By combining international cooperation, legislative action, and financial oversight, countries aim to mitigate the global threat and impact of ransomware attacks effectively.

Ransomware – what to expect in 2024

As we look ahead to 2024, we observe a significant shift in the ransomware ecosystem. While many prominent ransomware gangs have disappeared, smaller and more elusive groups are emerging. This rise can be attributed to leaked source code and tools from disbanded or deceased larger groups.

As officials discuss counter-ransomware measures and law authorities around the globe link up to combat cybercrime, ransomware operations are becoming increasingly fragmented. Larger, more coordinated groups are breaking down into smaller fractions, making it more challenging for law enforcement to target them. Moreover, each of these smaller groups has less impact and is of less interest for law enforcement, thus having a reduced likelihood of being tracked and prosecuted, giving independent ransomware actors a higher chance of escaping arrest.

In conclusion, ransomware attacks remain a significant and evolving threat in the realm of cybersecurity. From high-profile breaches affecting critical sectors to attacks on small businesses, the impact of ransomware continues to expand. As we reflect on the state of ransomware, several key observations and trends emerge.

To mitigate the risk of ransomware attacks, individuals and organizations should prioritize cybersecurity measures.

  • Use robust, properly-configured security solutions like Kaspersky NEXT.
  • Implement Managed Detection and Response (MDR) to proactively seek out threats.
  • Disable unused services and ports to minimize the attack surface.
  • Keep all systems and software up to date with regular updates and patches.
  • Conduct regular penetration tests and vulnerability scanning to identify and address vulnerabilities promptly.
  • Provide comprehensive cybersecurity training to employees to raise awareness of cyberthreats and best practices for mitigation.
  • Establish and maintain regular backups of critical data, and test backup and recovery procedures regularly.
  • Use Threat Intelligence to keep track of the latest TTPs used by groups and adjust your detection mechanisms to catch these.
  • Pay special attention to any “new” software being run and installed on systems within your network (including legitimate software).

Why Google’s Pixel 8a may be the most important phone of 2024

Computerworld.com [Hacking News] - 8 Květen, 2024 - 12:00

Brrrrrrrrrrrrrreaking news, gang: Google’s just announced a new midrange Pixel product that pretty much everyone was expecting!

Titillating, I know, right? But hold the phone for a sec: Before you nod off and start thinking about noodles, there’s more to this story than what’s on the surface — and what most media outlets are reporting right now.

The device, in case you haven’t yet heard, is the 2024 Google Pixel 8a. It looks like a phone. It acts like a phone. It does all the things a phone does. And it’s incredibly similar, generally speaking, to the current Pixel 8 flagship that splashed into the world last fall.

I mean, just look at the two side by side:

Google’s Pixel 8a, at left, alongside the Pixel 8 — anyone else getting a hankering for some Doublemint gum?

Google, modified by IDG Comm

So, yeah: That’s the expected part of this saga. After all, Google has traditionally released a midrange “a”-model Pixel every spring, somewhere around this time. It’s generally been a slightly less fancy, more affordable sibling to the higher-end phone with the same model number from a handful of months earlier. And, well, it’s always had all the same exceptional stuff you’d expect from a Pixel product, even at its lower price point.

“So wait, then,” you might be thinking. “Why is this crazy son-of-a-gizmo saying the Pixel 8a might be the most important phone of 2024? Has he finally lost his marbles? Did he eat a few too many cantaloupes and turn into a fleshy, round-torsoed melon-man? Has he finally followed through on his threat to hire a highly trained chinchilla to write all his columns for him?”

The answer to all of those questions is a resounding yes. (Do me a solid and don’t mention the chinchilla bit to my bosses, though, all right?) But even so, the assertion at the top of this article is absolutely accurate. And the reason why comes down to two extremely important numbers.

[Psst: Got a Pixel? Any Pixel? Check out my free Pixel Academy e-course to uncover all sorts of advanced intelligence lurking in your current phone!]

Google’s Pixel 8a positioning

First, real quick, let’s get the basic stuff out of the way — for anyone who hasn’t already read up on everything there is to know about the Pixel 8a phone.

Take a deep breath (or, if you have already ingested these basics, feel free to eat a cantaloupe or two while we make our way through it). We’ll do this fast:

  • The Pixel 8a is going on sale next Tuesday, May 14 (though it’s actually available for preordering now).
  • The phone features the same Google Tensor G3 chip that’s present in the Pixel 8 and Pixel 8 Pro, which means it’ll be ready to handle all the same sorts of resource-intensive AI processing — including an on-device version of the latest and greatest Gemini Nano setup (eventually; Google says that’ll come with a future feature update and be accessible via a special but available-to-anyone developer option).
  • It has a 430-pixel-per-inch 6.1″ screen with a 120Hz refresh rate (fancy-speak for “a really frickin’ good display”).
  • By all counts, it should have the same exceptional camera quality we’ve come to expect from Pixels across the board, with all the advanced photo-improving magic other Pixels enjoy — Magic Eraser, Magic Editor, Night Sight, Face Unblur, and other such delicacies.

Capisce? Capisce. Now, about those two numbers I mentioned:

Contrary to what early rumors suggested, the Pixel 8a will sell for $499 — the same exact price as last year’s Pixel 7a model. And, the real icing on the digital cake here: Just like the Pixel 8 and Pixel 8 Pro, it’ll come with seven full years of operating system updates, security patches, and even quarterly feature drop updates.

Take a second to let that sink in and to chew over just how shape-shifting of a move it really is: We’re talkin’ a phone that’s very much in line with the current top-of-the-line, arguably best-phone-available-anywhere Pixel 8 series — outside of some small and relatively insignificant surface-level niceties — now being offered at the same exact price as last year’s midrange model, only with seven years of complete post-sales software support as opposed to the previous phone’s three-year support promise.

Google has more than doubled the maximum advisable lifespan of its value-minded Pixel product, in other words, while continuing to sell it for the same cost.

Not only that, but like with any Pixel, the updates associated with the Pixel 8a are guaranteed to arrive within days of their release — something no other Android device-maker even comes close to matching in any context, as my Android Upgrade Report Cards remind us year after year.

And lest you think I’m overemphasizing the significance of this shift, let’s break down exactly why this could be so consequential — because Goog almighty, is it ever a monumental move. And that’s very much the case whether you ever set your sticky fingers on a Pixel 8a or not.

Pixel 8a perspective

For perspective, this concept connects directly to something I wrote last October about how Google’s Pixel 8 changes everything for Android. That article revolved around Google’s then-new announcement that the regular Pixel 8 series would receive seven full years of full software updates — an unprecedented post-sales software support promise for any phone at the time.

As I wrote last October:

Google’s always been ahead of the game when it comes to software support timeliness. But it’s been stuck on this three-year window for longevity for far too long — a liability that creates a perception of Android phones not holding up to iPhones when it comes to support life. Heck, even Samsung started providing four years of OS upgrades to many of its Galaxy models [in 2022], and while it’s far less speedy and reliable with those deliveries (and switches to a quarterly model for its security patches starting in a phone’s third year, on top of that), that contrast isn’t exactly a good look for Google as the platform’s primary keeper.

The Apple comparison is pretty misleading, too, truth be told — as what constitutes an OS update on Android is wildly different than what you find on iOS. Long story short, Apple bundles in all sorts of stuff into its twice-annual updates while Google breaks numerous system-level pieces out into standalone apps and updates ’em numerous times a month in a way that reaches all devices more or less instantly and indefinitely. So it’s not exactly an apples-to-apples juxtaposition, to say the least.

But even so, the reality remains that after three years, a Google-made Pixel phone has traditionally stopped receiving operating system updates. And despite all the emphasis around security patches and Play-Store-provided rollouts, Android operating system updates absolutely do matter — as all interface enhancing and feature finessing aside, OS updates often include significant under-the-hood improvements along with important security and privacy advancements. They also introduce both expansions and restrictions to APIs, which are what permit third-party apps to interact with your phone and personal data and perform a variety of advanced functions.

Those updates are so important, in fact, that I would never suggest anyone keep using a phone that isn’t actively receiving ’em in a reasonably timely manner.

And now, that exact same seven-year boost is coming into the midrange realm — at the price of $499.

To break that down even further: At $499 and with seven years of ongoing updates, you’re essentially paying a mere $71 bucks a year (rounded to the nearest full dollar amount) for an all-around smartphone experience that’s completely unmatched at that price level. Hell, one could argue that the all-around experience provided by the Pixel 8a will likely be better than what you’d get on most non-Google-made Android flagships, even.

But it’s relative picture that really matters. At $71 a year for that full period of advisable ownership, the Pixel 8a costs less per year than its higher-end Pixel 8 cousin — which, with its $699 starting price tag and the same seven years of support, comes out to roughly a hundred bucks a year if you buy the phone early in its release cycle and hang onto it for its full period of advisable ownership. So the 8a is $29 less per year than the regular Pixel 8, in other words. That seems about right for a high-end to midrange difference, wouldn’t ya say?

What’s even more striking, though, is when you start comparing the Pixel 8a’s value to other, non-Google-made options.

The Pixel 8a vs. everyone else

All right — ready?

Let’s look at Samsung’s closest comparable current midranger to start — the awkwardly named Galaxy A54 5G (gesundheit!). That phone is listed at $449, and it comes with a promise of four major operating system updates.

Setting aside the fact that with its midrange models in particular, Samsung tends to be extremely hit and miss and unreliable with how long it takes to deliver updates — and the overall experience on those devices tends to be about as pleasant as an overpriced root canal — the math there tells you all you need to know: The Galaxy A54 5G’s $449 cost divided by four years of ownership is $112 per year. And that’s nearly 60% more per year than what you’d pay for the objectively superior Pixel 8a product.

Motorola’s midrange Edge device isn’t any better. That phone is listed at $600 and comes with only two years of promised OS updates. That’s $300 a year per year of advisable ownership. Particularly when you factor in Motorola’s painfully apparent lack of interest in providing reasonable post-sales software support these days, it’s hard to see why anyone should buy a device like this.

What about on the Apple side of the spectrum? Well, Apple hasn’t put out a dedicated midrange phone since 2022’s iPhone SE model, and rumors suggest it might not be planning to do so again anytime soon. The company does, however, still sell that 2022 SE model for $429, along with selling the nearly three-year-old iPhone 13 model for $599 as a more affordable option.

Apple notably doesn’t make any explicit guarantees about its software support, but it tends to provides OS updates for six years, according to recent analyses. So with our handy math, that means a now-two-year-old iPhone SE would cost you about $107 a year for each of its remaining supported years at this point, while the three-year-old iPhone 13 would run you roughly 200 bucks a year for the three years left on its clock.

Plain and simple, the Pixel 8a is in a league of its own. You can’t find anything that provides the same level of quality at that cost anywhere else. Even the bottom-of-the-barrel budget junkers, like Motorola’s latest Moto G model, aren’t anywhere near the deals they seem to be on the surface. That Moto G costs $200 and includes only a single promised OS update. It actually costs you way more than any midranger over time, and it gives you a much worse experience in every possible way.

And here’s the thing, too: The Pixel 8a’s impact will likely stretch beyond even its immediate value to those of us who decide to buy it. Even if you never touch the thing, its arrival is bound to be important for you.

First and foremost, the Pixel 8a’s presence — if Google is able to effectively communicate its value to potential customers — could help Google claim a bigger piece of the US mobile market. And this isn’t about some sort of twisted corporate bragging rights, either: In an arena dominated largely by Apple and Samsung, having more meaningful competition can only be a good thing.

The biggest practical effect is that such competition can ultimately force other players to follow suit and fight to keep up. If Google’s promising seven years of updates even on the midrange front and offering such a compelling experience for so little cash, guess what Samsung’s almost certain to do before long? We’ve already seen the proof of that on the flagship side of things, exactly as a certain someone predicted, with Samsung extending its software support guarantee out to seven years for its higher-end Galaxy S24 models. And that’s a major win for all of us, as people who live with and rely on these devices.

So there ya have it. The Pixel 8a may not seem like the most exciting phone launch of 2024 — and on the surface, it almost certainly isn’t. But when it comes to overall impact and big-picture thinking, my goodness: It’s hard to imagine any other device this year having the same level of significance this seemingly simple midranger possesses.

Don’t let yourself miss an ounce of Pixel magic. Sign up for my free Pixel Academy e-course and discover tons of hidden features and time-saving tricks for your favorite Pixel phone.

Android, Google, Operating Systems, Smartphones
Kategorie: Hacking & Security

FTC ban on non-competes would put employees in the driver’s seat

Computerworld.com [Hacking News] - 8 Květen, 2024 - 12:00

A variety of emerging work trends could combine to help employees gain an edge in the corporate world. The latest puzzle piece is a recent decision by the Federal Trade Commission (FTC) to ban non-compete agreements.

Disagreements among workers and employers over return-to-office mandates, remote and hybrid work, higher pay, resignations, and layoffs are likely to become supercharged again. That is, if the FTC’s April 23 move to strike down most existing and future non-compete agreements takes effect in August or early September.

Once freed from their post-employment non-compete shackles, millions of workers could launch their own businesses or interview with competing companies – negotiating higher salaries and winning new perks and freedoms along the way. Non-competes effectively prevent salaries at fair-market value because an employee’s ability to opt for another job is hampered. 

The FTC estimates that about 30 million US workers (20% of the workforce) are subject to non-compete clauses.

In addition to raising salaries, the new rule is expected to support development of newly launched companies, boost business innovation, and increase patent filings.

Requiring employees to sign non-competition clauses is especially prevalent in the tech industry. It’s worth noting, however, that California is among the few states that has never supported non-compete agreements. Recently the state strengthened its non-compete stance with new, broad-ranging legislation.

There are other legal instruments in the US — such as non-disclosure agreements — that can protect companies from the theft of intellectual property without limiting employee careers and artificially depressing salaries. So, it’s not as if companies are without recourse.

Opposing the ban

At least three lawsuits have been filed against the proposed  ban. The most significant was brought by the US Chamber of Commerce, the Business Roundtable, and other business interests. They filed a lawsuit seeking a court order to vacate the FTC action. (The lawsuit was filed one day after the FTC issued the new rule.) The FTC faces challenges about whether it has the power to unilaterally invoke the decision to ban non-compete clauses. Here’s more detail on the opposing viewpoint.

Many of the largest US corporations are represented in the lawsuit by the Business Roundtable, which is an association of more than 200 CEOs of leading US companies from every sector of the economy. Business Roundtable members include many tech companies, such as Alphabet (Google), Amazon, AMD, Apple, Cisco, Dell, Hewlett-Packard Enterprise, HP, IBM, Intel, Microsoft, Palo Alto Networks, Qualcomm, Salesforce, and SAP.

The judge in the lawsuit brought by the US Chamber of Commerce could grant a temporary injunction to delay the FTC ban pending the trial’s outcome. Plus, the case could be hung up in appeals for years to come, with the possibility that it would play out in the Supreme Court. So, over the short haul, nothing may change. But companies and employees should be thinking about how the ban might affect them.

In 2023, research firm Gartner polled HR leaders about the then-proposed ban: 72% said their organization would likely benefit from the ban, increasing the availability of talent by giving them access to a larger pool of skilled workers. Gartner recently polled attendees of a Benchmark with Gartner live webinar about the new FTC rule; 60% strongly or somewhat agreed that their organizations would benefit from better access to talent. But the ban creates a double-edged sword for employers: 51% also either strongly or somewhat agreed that their organizations would be at risk of losing top talent.

Companies that use non-competes should get their lawyers working on alternatives right away, regardless of the legal fight over the FTC rule. For one thing, there can be no doubt that the generally positive reception to banning non-compete agreements will have an effect on prospective employees. (The Philadelphia Inquirer offers useful advice for companies on actions they should take now.)

It’s all upside for employees that companies want to hire or retain. They could be in line for pay increases, promotions, and perks like more days of remote work or even a four-day work week. The rise of generative AI has run up the competition for talent already and getting rid of non-competes would only broaden and intensify the talent wars. Instead of AI driving talent searches, competition would increase across the board for a variety of job skills. It would be a profound change, and one that would support many of the trends and advances in modern work that were ushered in by the pandemic. 

It’s long since time that the US ended the abusive practice of using non-compete agreements to hobble the job mobility of American workers. 

Careers, IT Jobs, IT Skills, Technology Industry
Kategorie: Hacking & Security

Umělá inteligence Microsoftu slibuje spolehlivější předpovědi počasí až na 30 dní dopředu

Živě.cz - 8 Květen, 2024 - 10:45
Microsoft se tak trochu stranou pozornosti začíná pomalu ale jistě prosazovat v segmentu předpovídání počasí. V březnu tohoto roku byl společností ForecastWatch označen za „nejpřesnějšího poskytovatele globálních předpovědí na světě“. V návaznosti na tento úspěch nyní představil metodu vylepšování ...
Kategorie: IT News

Ten years since the first corp ransomware, Mikko Hyppönen sees no end in sight

The Register - Anti-Virus - 8 Květen, 2024 - 09:31
On the plus side, infosec's a good bet for a long, stable career

Interview  This year is an unfortunate anniversary for information security: We're told it's a decade since ransomware started infecting corporations.…

Kategorie: Viry a Červi

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

The Hacker News - 8 Květen, 2024 - 09:03
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with the names wpsupp‑user 
Kategorie: Hacking & Security

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

The Hacker News - 8 Květen, 2024 - 09:03
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with the names wpsupp‑user Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Zorientujte se v OLED monitorech. Značka je důležitá, ale dejte pozor i na výrobce panelu

Živě.cz - 8 Květen, 2024 - 08:45
Letos na jaře na trh přichází hned několik nových OLED panelů od dvou výrobců, mají mít běžné úhlopříčky i rozlišení a přijatelnou cenu. Monitory se lépe vypořádávají s problémy OLEDů a přibližují tuto technologii běžnému uživateli.
Kategorie: IT News

NASA je spokojená, že SpaceX řídí Gwynne Shotwell a ne Elon Musk

Živě.cz - 8 Květen, 2024 - 07:45
NASA se nebojí spolupracovat se SpaceX na velkých projektech především proto, že jí řídí Gwynne Shotwell a ne Elon Musk. V nedávném rozhovoru pro NPR to naznačil její ředitel Bill Nelson. Když víkendový moderátor All Things Accounted Scott Detrow připomněl, že Musk v posledních letech ve svých ...
Kategorie: IT News

From infosec to skunks, RSA Conference SVP spills the tea

The Register - Anti-Virus - 8 Květen, 2024 - 06:03
Keynotes, physical security, playlists … the buck stops with Linda Gray Martin

Interview  The 33rd RSA Conference is underway this week, and no one feels that more acutely than the cybersecurity event's SVP Linda Gray Martin.…

Kategorie: Viry a Červi

UnitedHealth's 'egregious negligence' led to Change Healthcare ransomware infection

The Register - Anti-Virus - 8 Květen, 2024 - 04:58
'I'm blown away by the fact that they weren't using MFA'

Interview  The cybersecurity practices that led up to the stunning Change Healthcare ransomware infection indicate "egregious negligence" on the part of parent company UnitedHealth, according to Tom Kellermann, SVP of cyber strategy at Contrast Security.…

Kategorie: Viry a Červi

[webapps] iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)

The Exploit Database - 8 Květen, 2024 - 02:00
iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)

[webapps] Clinic Queuing System 1.0 - RCE

The Exploit Database - 8 Květen, 2024 - 02:00
Clinic Queuing System 1.0 - RCE

America's War on Drugs and Crime will be AI powered, says Homeland Security boss

The Register - Anti-Virus - 8 Květen, 2024 - 01:47
Or at least it might well be if these trial programs work out, with some civil lib oversight etc etc etc

RSAC  AI is a double-edged sword in that the government can see ways in which the tech can protect and also be used to attack Americans, says US Homeland Security Secretary Alejandro Mayorkas.…

Kategorie: Viry a Červi

Softwarová sklizeň (8. 5. 2024): skenování QR kódů a převod textu na řeč

ROOT.cz - 8 Květen, 2024 - 00:00
Dnes si naskenujeme QR kódy na zařízení s Linuxem, necháme počítač přečíst nahlas napsaný text, napíšeme a uspořádáme si poznámky a zahrajeme si hry na emulátoru konzole Nintendo 3DS. Nebude chybět ani blbinka.
Kategorie: GNU/Linux & BSD
Syndikovat obsah