Month: February 2023
OnePlus is launching a foldable later this year
The Oppo Find N2 Flip pictured here might give us some clues as to what subbrand OnePlus’ foldable will look like. | Image: Jon Porter / The Verge
This year’s Mobile World Congress is shaping up to be a real fiesta for unconventional form factors, and OnePlus is the latest company to join the celebration. At a panel discussion today, the company announced its intentions to launch a foldable phone in the second half of 2023. That’s about the extent of the details we have for now, though it seems like a safe assumption that the device will look a lot like one of the existing foldables on the market from Oppo — OnePlus’ parent company.
With companies like Apple and Google yet to enter the foldable market, Oppo is now on its second round of folding phones — though they’ve mostly been limited to China. The Find N was a tablet-style foldable released in 2021 with a surprisingly refined design for a first-gen product. Oppo followed it up in late 2022 with the Find N2 and Find N2 Flip. The latter is a clamshell-style device in the vein of Samsung’s Z Flip series, and it’ll be Oppo’s first foldable available in Europe when it goes on sale in just a couple of days.
None of the above has made it to the US, naturally, but with OnePlus’ established distribution channels in North America, there’s at least some hope that its upcoming foldable will be sold here. While China and Europe have their fair share of foldables from Motorola, Honor, and Oppo, in the US, it’s basically all Samsung. Other options include Motorola’s 2020-vintage Razr 5G and the Microsoft Surface Duo 2. Pretty slim pickings.
It’s hard to say which way OnePlus will go with its forthcoming device: flipping or folding. Company president Kinder Liu offered only a vague description: that it would be a “flagship phone that doesn’t settle because of its folding form, in terms of industrial design, mechanical technology, and other aspects.” However it folds, if OnePlus’ device comes to the US, it might put some sorely needed pressure on Samsung.
The Oppo Find N2 Flip pictured here might give us some clues as to what subbrand OnePlus’ foldable will look like. | Image: Jon Porter / The Verge
This year’s Mobile World Congress is shaping up to be a real fiesta for unconventional form factors, and OnePlus is the latest company to join the celebration. At a panel discussion today, the company announced its intentions to launch a foldable phone in the second half of 2023. That’s about the extent of the details we have for now, though it seems like a safe assumption that the device will look a lot like one of the existing foldables on the market from Oppo — OnePlus’ parent company.
With companies like Apple and Google yet to enter the foldable market, Oppo is now on its second round of folding phones — though they’ve mostly been limited to China. The Find N was a tablet-style foldable released in 2021 with a surprisingly refined design for a first-gen product. Oppo followed it up in late 2022 with the Find N2 and Find N2 Flip. The latter is a clamshell-style device in the vein of Samsung’s Z Flip series, and it’ll be Oppo’s first foldable available in Europe when it goes on sale in just a couple of days.
None of the above has made it to the US, naturally, but with OnePlus’ established distribution channels in North America, there’s at least some hope that its upcoming foldable will be sold here. While China and Europe have their fair share of foldables from Motorola, Honor, and Oppo, in the US, it’s basically all Samsung. Other options include Motorola’s 2020-vintage Razr 5G and the Microsoft Surface Duo 2. Pretty slim pickings.
It’s hard to say which way OnePlus will go with its forthcoming device: flipping or folding. Company president Kinder Liu offered only a vague description: that it would be a “flagship phone that doesn’t settle because of its folding form, in terms of industrial design, mechanical technology, and other aspects.” However it folds, if OnePlus’ device comes to the US, it might put some sorely needed pressure on Samsung.
Snapdragon 8 Gen 2 phones are the first to support built-in ‘iSIMs’
Never mind eSIMs — your next phone might have a more advanced way of connecting to your carrier. Qualcomm and Thales have confirmed the certification of the first user-ready Integrated SIM, or “iSIM.” It promises the same card-free digital sign-ups and security as eSIMs, but is built directly into a phone’s main processor. Your phone doesn’t need a dedicated chip, saving space and (hopefully) money.
The companies don’t say which phones will be the first to use iSIMs. The technology supports the same remote provisioning standard as eSIMs, however. Your provider won’t necessarily need to update its systems to support iSIM-based devices.
There’s no guarantee phone makers will pass any savings along to you. The reduced footprint could make room for slightly larger batteries and other components, though. More importantly, this might encourage more manufacturers to use digital SIMs by making the tech easier to implement. With that said, the Snapdragon 8 Gen 2 is a high-end platform. You may not see wider adoption until more affordable chips (and thus lower-priced phones) offer iSIM support.
The timing is convenient, at least. Many phones now include eSIM support, while American iPhone 14 and 14 Pro models don’t have physical SIM trays. The conventional SIM card is on the decline, and iSIM could hasten that transition by making its virtual counterpart more commonplace.This article originally appeared on Engadget at https://www.engadget.com/snapdragon-8-gen-2-isim-support-150031144.html?src=rss
Never mind eSIMs — your next phone might have a more advanced way of connecting to your carrier. Qualcomm and Thales have confirmed the certification of the first user-ready Integrated SIM, or “iSIM.” It promises the same card-free digital sign-ups and security as eSIMs, but is built directly into a phone’s main processor. Your phone doesn’t need a dedicated chip, saving space and (hopefully) money.
The companies don’t say which phones will be the first to use iSIMs. The technology supports the same remote provisioning standard as eSIMs, however. Your provider won’t necessarily need to update its systems to support iSIM-based devices.
There’s no guarantee phone makers will pass any savings along to you. The reduced footprint could make room for slightly larger batteries and other components, though. More importantly, this might encourage more manufacturers to use digital SIMs by making the tech easier to implement. With that said, the Snapdragon 8 Gen 2 is a high-end platform. You may not see wider adoption until more affordable chips (and thus lower-priced phones) offer iSIM support.
The timing is convenient, at least. Many phones now include eSIM support, while American iPhone 14 and 14 Pro models don’t have physical SIM trays. The conventional SIM card is on the decline, and iSIM could hasten that transition by making its virtual counterpart more commonplace.
This article originally appeared on Engadget at https://www.engadget.com/snapdragon-8-gen-2-isim-support-150031144.html?src=rss
Deals: AirPods 3 With Lightning Case Drop to $149.99 on Amazon ($19 Off)
Amazon today has a rare deal on Apple’s third-generation AirPods, on sale for $149.99, down from $169.00. This is the model that comes with a Lightning Charging Case, and right now we’re only tracking this discount at Amazon.
Note: MacRumors is an affiliate partner with Amazon. When you click a link and make a purchase, we may receive a small payment, which helps us keep the site running.
Sales on the AirPods 3 have been very scarce over the last few months, with the last notable discount popping up around Black Friday. Amazon’s deal today is about $10 higher than the all-time low price on this model, making it a solid second-best price.
$19 OFFAirPods 3 for $149.99
If you’re okay with purchasing an older generation model, Amazon also has the AirPods 2 for $99.00, down from $129.00. We track sales for every model of the AirPods in our Best AirPods Deals guide, so be sure to bookmark that page while you shop around for the wireless headphones.Related Roundup: Apple Deals
This article, “Deals: AirPods 3 With Lightning Case Drop to $149.99 on Amazon ($19 Off)” first appeared on MacRumors.comDiscuss this article in our forums
Amazon today has a rare deal on Apple’s third-generation AirPods, on sale for $149.99, down from $169.00. This is the model that comes with a Lightning Charging Case, and right now we’re only tracking this discount at Amazon.
Note: MacRumors is an affiliate partner with Amazon. When you click a link and make a purchase, we may receive a small payment, which helps us keep the site running.
Sales on the AirPods 3 have been very scarce over the last few months, with the last notable discount popping up around Black Friday. Amazon’s deal today is about $10 higher than the all-time low price on this model, making it a solid second-best price.
If you’re okay with purchasing an older generation model, Amazon also has the AirPods 2 for $99.00, down from $129.00. We track sales for every model of the AirPods in our Best AirPods Deals guide, so be sure to bookmark that page while you shop around for the wireless headphones.
This article, “Deals: AirPods 3 With Lightning Case Drop to $149.99 on Amazon ($19 Off)” first appeared on MacRumors.com
Discuss this article in our forums
Snag Some Extra Storage for Less With Deals on Samsung SSDs, SD Cards and More – CNET
Save up to 62% on everything you need to backup your data, upgrade your computer’s storage and more.
Save up to 62% on everything you need to backup your data, upgrade your computer’s storage and more.
LastPass reveals attackers stole password vault data by hacking an employee’s home computer
The attacker stole credentials from a senior DevOps engineer to gain access to shared cloud storage containing the encryption keys for customer vault backups. | Illustration: Beatrice Sala
LastPass says that a threat actor was able to steal corporate and customer data by hacking an employee’s personal computer and installing keylogger malware, which let them gain access to the company’s cloud storage. The update provides more information about how the series of hacks happened last year that resulted in the popular password manager’s source code and customer vault data being stolen by an unauthorized third party.
Last August, LastPass notified its users of a “security incident” in which an unauthorized third party used a compromised developer account to access the password manager’s source code and “some proprietary LastPass technical information.” The company later disclosed a second security breach in November, announcing that hackers had accessed a third-party cloud storage service used by the password manager and were able to “gain access to certain elements” of “customers’ information.”
New details on the 2nd LastPass incident are fun: – got into Sr DevOp’s home via vuln media software- installed keylogger- got master pass to corp vault (seemingly because it was being accessed from home computer) Cool to see that LastPass is sharing https://t.co/YFoISimpYR… https://t.co/LYixQvKN9a— MG (@_MG_) February 27, 2023
On December 22nd, LastPass revealed that the hackers had used information from the first breach in August to access its systems during the second incident in November and that the attacker was able to copy a backup of partially encrypted customer vault data containing website URLs, usernames, and passwords. LastPass then advised its users to change all of their stored passwords as “an extra safety measure,” despite maintaining that the passwords were still secured by the account’s master password.
Now, LastPass has revealed the threat actor responsible for both security breaches was “actively engaged in a new series of reconnaissance, enumeration, and exfiltration activities” between August 12th and October 26th. During this time, the attacker stole valid credentials from a senior DevOps engineer to gain access to shared cloud storage containing the encryption keys for customer vault backups stored in Amazon S3 buckets. Using these stolen credentials made it difficult to distinguish between legitimate and suspicious activity.
It’s suspected the hacker accessed the private computer via Plex media software installed on the machine
Just four DevOps engineers had access to the decryption keys needed to access the cloud storage service. One of the engineers was targeted by exploiting an (undisclosed) vulnerable third-party media software package on their home computer and installing keylogger malware. Ars Technica reports that the computer was likely hacked through the Plex media platform, which similarly reported a data breach shortly after LastPass disclosed its first incident in August. Neither company has confirmed this to be the case. We have reached out to LastPass and Plex for clarification and will update this story should we hear back.
After installing the keylogger, LastPass says the threat actor “was able to capture the employee’s master password as it was entered, after the employee authenticated with [multifactor authentication], and gain access to the DevOps engineer’s LastPass corporate vault.” The company has since taken additional steps to secure its platform, including revoking certificates and rotating credentials known to the threat actor and implementing additional logging and alerting across its cloud storage.
Alongside the announcement, LastPass has published a complete list of the data that was compromised across both security breaches on a dedicated support page. BleepingComputer reports that LastPass has made efforts to conceal this information, however, noting that HTML tags had been added to the document to prevent the updates from being indexed by search engines. LastPass has additionally published a PDF containing further details regarding the incidents last year alongside two additional security bulletins — one for LastPass Free, Premium, and Families customers and another for business administrators — with recommended actions to secure your accounts.
The attacker stole credentials from a senior DevOps engineer to gain access to shared cloud storage containing the encryption keys for customer vault backups. | Illustration: Beatrice Sala
LastPass says that a threat actor was able to steal corporate and customer data by hacking an employee’s personal computer and installing keylogger malware, which let them gain access to the company’s cloud storage. The update provides more information about how the series of hacks happened last year that resulted in the popular password manager’s source code and customer vault data being stolen by an unauthorized third party.
Last August, LastPass notified its users of a “security incident” in which an unauthorized third party used a compromised developer account to access the password manager’s source code and “some proprietary LastPass technical information.” The company later disclosed a second security breach in November, announcing that hackers had accessed a third-party cloud storage service used by the password manager and were able to “gain access to certain elements” of “customers’ information.”
New details on the 2nd LastPass incident are fun:
– got into Sr DevOp’s home via vuln media software
– installed keylogger
– got master pass to corp vault (seemingly because it was being accessed from home computer)
Cool to see that LastPass is sharing https://t.co/YFoISimpYR… https://t.co/LYixQvKN9a
— MG (@_MG_) February 27, 2023
On December 22nd, LastPass revealed that the hackers had used information from the first breach in August to access its systems during the second incident in November and that the attacker was able to copy a backup of partially encrypted customer vault data containing website URLs, usernames, and passwords. LastPass then advised its users to change all of their stored passwords as “an extra safety measure,” despite maintaining that the passwords were still secured by the account’s master password.
Now, LastPass has revealed the threat actor responsible for both security breaches was “actively engaged in a new series of reconnaissance, enumeration, and exfiltration activities” between August 12th and October 26th. During this time, the attacker stole valid credentials from a senior DevOps engineer to gain access to shared cloud storage containing the encryption keys for customer vault backups stored in Amazon S3 buckets. Using these stolen credentials made it difficult to distinguish between legitimate and suspicious activity.
Just four DevOps engineers had access to the decryption keys needed to access the cloud storage service. One of the engineers was targeted by exploiting an (undisclosed) vulnerable third-party media software package on their home computer and installing keylogger malware. Ars Technica reports that the computer was likely hacked through the Plex media platform, which similarly reported a data breach shortly after LastPass disclosed its first incident in August. Neither company has confirmed this to be the case. We have reached out to LastPass and Plex for clarification and will update this story should we hear back.
After installing the keylogger, LastPass says the threat actor “was able to capture the employee’s master password as it was entered, after the employee authenticated with [multifactor authentication], and gain access to the DevOps engineer’s LastPass corporate vault.” The company has since taken additional steps to secure its platform, including revoking certificates and rotating credentials known to the threat actor and implementing additional logging and alerting across its cloud storage.
Alongside the announcement, LastPass has published a complete list of the data that was compromised across both security breaches on a dedicated support page. BleepingComputer reports that LastPass has made efforts to conceal this information, however, noting that HTML tags had been added to the document to prevent the updates from being indexed by search engines. LastPass has additionally published a PDF containing further details regarding the incidents last year alongside two additional security bulletins — one for LastPass Free, Premium, and Families customers and another for business administrators — with recommended actions to secure your accounts.
Scientists Target ‘Biocomputing’ Breakthrough With Use of Human Brain Cells
Scientists propose to develop a biological computer powered by millions of human brain cells that they say could outperform silicon-based machines while consuming far less energy. From a report: The international team, led by Johns Hopkins University in Baltimore, published in the journal Frontiers in Science on Tuesday a detailed road map to what they call “organoid intelligence.” The hardware will include arrays of brain organoids — tiny three-dimensional neural structures grown from human stem cells — connected to sensors and output devices and trained by machine learning, big data and other techniques.
The aim is to develop an ultra-efficient system that can solve problems beyond the reach of conventional digital computers, while aiding development in neuroscience and other areas of medical research. The project’s ambition mirrors work on the more advanced quantum computing but raises ethical questions around the “consciousness” of brain organoid assemblies. “I expect an intelligent dynamic system based on synthetic biology, but not constrained by the many functions the brain has to serve in an organism,” said Professor Thomas Hartung of Johns Hopkins, who has gathered a community of 40 scientists to develop the technology. They have signed a “Baltimore declaration” calling for more research “to explore the potential of organoid cell cultures to advance our understanding of the brain and unleash new forms of biocomputing while recognising and addressing the associated ethical implications.”
Read more of this story at Slashdot.
Scientists propose to develop a biological computer powered by millions of human brain cells that they say could outperform silicon-based machines while consuming far less energy. From a report: The international team, led by Johns Hopkins University in Baltimore, published in the journal Frontiers in Science on Tuesday a detailed road map to what they call “organoid intelligence.” The hardware will include arrays of brain organoids — tiny three-dimensional neural structures grown from human stem cells — connected to sensors and output devices and trained by machine learning, big data and other techniques.
The aim is to develop an ultra-efficient system that can solve problems beyond the reach of conventional digital computers, while aiding development in neuroscience and other areas of medical research. The project’s ambition mirrors work on the more advanced quantum computing but raises ethical questions around the “consciousness” of brain organoid assemblies. “I expect an intelligent dynamic system based on synthetic biology, but not constrained by the many functions the brain has to serve in an organism,” said Professor Thomas Hartung of Johns Hopkins, who has gathered a community of 40 scientists to develop the technology. They have signed a “Baltimore declaration” calling for more research “to explore the potential of organoid cell cultures to advance our understanding of the brain and unleash new forms of biocomputing while recognising and addressing the associated ethical implications.”
Read more of this story at Slashdot.