Saturday, May 18, 2024

Kimsuky APT deploys Linux backdoor Gomir in South Korean cyber attacks

ReportMay 17, 2024Editorial DepartmentLinux/Malware

Linux backdoor

The Kimsuky (aka Springtail) advanced persistent threat (APT) group with ties to North Korea’s Reconnaissance General Bureau (RGB) has been observed deploying a Linux version of the GoBear backdoor as part of a campaign targeting South Korean groups.

back door, code name Gomir“Structurally almost identical to GoBear, code is widely shared between malware variants,” Broadcom’s Symantec Threat Hunters team said in a new report. “Any functionality in GoBear that relies on the operating system is either missing in Gomir or has been re-implemented.”

Internet security

GoBear was first documented by South Korean security firm S2W in early February 2024 in connection with a campaign to spread malware called Troll Stealer (aka TrollAgent), which overlapped with known Kimsuky malware families such as AppleSeed and AlphaSeed. .

Subsequent analysis by the AhnLab Security Intelligence Center (ASEC) revealed that the malware was distributed via a Trojan security program downloaded from the website of the Korean Construction Related Association.

These include nProtect Online Security, NX_PRNMAN, TrustPKI, UbiReport, and WIZVERA VeraPort, the last of which was previously subject to a software supply chain attack by Lazarus Group in 2020.

Symantec said it has also observed the Troll Stealer malware being spread through a malicious installer from Wizvera VeraPort, but it is not yet clear the exact distribution mechanism used to spread the installer.

“GoBear also contains similar function names to the older Springtail backdoor BetaSeed, which was written in C++, suggesting a common origin for both threats,” the company noted.

The malware supports the execution of commands received from a remote server and is also said to be spread via a fake installer implant disguised as a Korea Transportation Organization application.

Internet security

Its Linux counterpart, Gomir, supports up to 17 commands, allowing its operators to perform file operations, launch reverse proxies, suspend command and control (C2) communications for a specified period of time, run shell commands, and terminate their own command programs.

“The latest Springtail campaign provides further evidence that software installation packages and updates are now among the most favored infection vectors for North Korean espionage actors,” Symantec said.

“The targeting software appears to have been carefully selected to maximize the chance of infecting South Korean targets.”

Did you find this article interesting?follow us Twitter and LinkedIn to read more exclusive content from us.



Source link

The post Kimsuky APT deploys Linux backdoor Gomir in South Korean cyber attacks appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/kimsuky-apt-deploys-linux-backdoor-gomir-in-south-korean-cyber-attacks/
via https://techempiresolutions.com/

Slack has been scanning your messages to train its artificial intelligence model

Slack trains machine learning models on user messages, documents, and other content without explicit permission. Training is opt-out, which means your private information will be stolen by default. Worse, you have to ask your organization’s Slack administrator (HR, IT, etc.) to send an email to the company asking it to stop. (You can’t do it yourself.) Welcome to the dark side of the new gold rush for artificial intelligence training materials.

Corey Quinn, a senior director at DuckBill Group, discovered the policy in an introduction to Slack’s Privacy Principles and posted it on X (via PCMag). The section reads as follows (emphasis ours): ” Develop artificial intelligence/machine learning models,our system Analyze customer data (For example Messages, content and files) submitted to Slack and Other information (including usage information) as defined in our Privacy Policy and your Customer Agreement.

The opt-out process requires that you complete all work to protect your data. According to the Privacy Statement, “To opt out, please have your organization or workspace owner or primary owner contact our Customer Experience team at feedback@slack.com and provide your workspace/organization URL and topic Run ‘Slack Global Model Opt-Out Request’.’ Once the opt-out is complete, we will process your request and respond.

The company responded to Quinn’s message on Generating) machine learning models.

It’s unclear how long ago the Salesforce-owned company included this tidbit in its terms. Saying customers can opt out, when “customers” does not include employees working within the organization, is misleading at best. They have to ask the people who handle Slack access in their businesses to do this – I hope they will oblige.

Inconsistencies in Slack’s privacy policy add to the confusion. One section states, “Slack does not have access to the underlying content when developing AI/ML models or otherwise analyzing customer data. We have various technical measures in place to prevent this from happening. However, the machine learning model training policy appears to be inconsistent with This statement is contradictory and leaves a great deal of room for confusion.

Furthermore, Slack’s web page marketing its premium generative AI tool reads: “Work without worries. Your data is your data. We don’t use it to train Slack AI. Everything is built on Slack’s secure foundation Run on a facility that meets the same compliance standards as Slack itself.

In this case, the company is talking about its premium generative artificial intelligence tools, separate from the machine learning models it trains without explicit permission.However, as PCMag points out that implying that all of your data is unaffected by AI training is, at best, a highly misleading statement, since companies can obviously choose which AI models are covered by that statement.

Engadget tried contacting Slack through multiple channels, but had not received a response as of press time. We will update this story if we hear back.



Source link

The post Slack has been scanning your messages to train its artificial intelligence model appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/slack-has-been-scanning-your-messages-to-train-its-artificial-intelligence-model/
via https://techempiresolutions.com/

Friday, May 17, 2024

Motorola’s 2024 Razr series may feature larger screen covers for budget models

We might be getting a closer look at Motorola’s next foldable phone.Connect the leak point to 91 mobile phone (via 9 to 5 google) and longtime device leaker Evan Blass have shown off the entry-level Moto Razr 50 and high-end Razr 50 Ultra (likely to be called the 2024 Razr and Razr+ in the US) in various colors from various angles.

Leaked information points to the high-end Razr+ (2024) (also known as the Razr 50 Ultra), which runs on a Snapdragon 8s Gen 3 chip and has 12GB of RAM and 256GB of storage. It is expected to be equipped with a 6.9-inch OLED display with a resolution of 2,640 x 1,080 on the inside and a 3.6-inch cover display on the outside. A 50MP wide-angle camera paired with a 50MP telephoto lens, a 32MP front-facing sensor, and a 4,000mAh battery round out the (alleged) specs.

Leaked images of the flagship model reveal it will be available in dark blue, dark green, peach and pink colours.

Meanwhile, the entry-level Razr (2024) – likely to be called the Razr 50 outside the US – will reportedly run a MediaTek Dimensity 7300 processor, which is different from the Snapdragon 7 Gen 1 found in its 2023 counterpart. Another noticeable change compared to its predecessor is its purported 3.63-inch display, which is a big improvement over last year’s budget model’s 1.5-inch outward-facing screen.

The leaks show no sign of a sleek wood option in Motorola’s Edge 50 phone range, which was launched last month. Old-school smartphone enthusiasts will remember that this is a throwback to 2013’s Moto X, when the company was owned by Google. (It has been under Lenovo since 2014.)

You can check out the leaked image gallery below, courtesy of Blass and 91 mobile phone.

Source link

The post Motorola’s 2024 Razr series may feature larger screen covers for budget models appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/motorolas-2024-razr-series-may-feature-larger-screen-covers-for-budget-models/
via https://techempiresolutions.com/

Kinsing hacker group exploits more flaws to expand botnet used for cryptojacking

ReportMay 17, 2024Editorial DepartmentCryptojacking/Malware

Cryptojacking

The cryptojacking group is called Jinxin It has demonstrated its ability to evolve and adapt, proving to be a persistent threat by rapidly incorporating newly revealed vulnerabilities to exploit its arsenal and expand its botnet.

The findings come from cloud security company Aqua, which describes the threat actors as actively orchestrating illegal cryptocurrency mining operations since 2019.

Kinsing (aka H2Miner) is the name of the malware and the adversary behind it, which continues to expand its toolkit with new vulnerabilities to register infected systems into cryptocurrency mining botnets. TrustedSec first documented it in January 2020.

In recent years, campaigns involving Golang-based malware have exploited various flaws in Apache ActiveMQ, Apache Log4j, Apache NiFi, Atlassian Confluence, Citrix, Liferay Portal, Linux, Openfire, Oracle WebLogic Server, and SaltStack to compromise vulnerable system.

Internet security

Other methods involve leveraging misconfigured Docker, PostgreSQL, and Redis instances to gain initial access and then marshalling the endpoints into a botnet for cryptomining, but not before deactivating security services and removing installed files on the host. Rival miners.

Subsequent analysis by CyberArk in 2021 found commonalities between Kinsing and another malware called NSPPS, concluding that the two viruses “represent the same family.”

Kinsing’s attack infrastructure is divided into three main categories: initial servers used to scan and exploit vulnerabilities, download servers responsible for staging payloads and scripts, and command and control (C2) servers that maintain contact with infected servers. device.

The IP address used for the C2 server resolved to Russia, while the IP addresses used to download scripts and binaries spanned countries such as Luxembourg, Russia, the Netherlands, and Ukraine.

“Kinsing uses different tools for different operating systems,” Aqua said. “For example, Kinsing often uses shell and Bash scripts to exploit Linux servers.”

“We also found Kinsing using PowerShell scripts to target Openfire on Windows servers. When running on Unix, it typically downloads binaries that run on x86 or ARM.”

Another noteworthy aspect of the threat actor’s activity is that 91% of targeted applications were open source, with the group primarily targeting runtime applications (67%), databases (9%), and cloud infrastructure (8).

Cryptojacking
Image source: Forescout

Extensive analysis of the artifacts further revealed three distinct categories of procedures –

  • Type I and Type II scriptsDeployed after initial access, it is used to download the next stage of attack components to eliminate competition and circumvent defenses by turning off firewalls, terminating security tools such as SELinux, AppArmor, and Alibaba Cloud Aegis, and deploying rootkits to hide malicious processes.
  • helper scriptIt aims to achieve initial access by exploiting vulnerabilities, disable specific security components related to Alibaba Cloud and Tencent Cloud services from the Linux system, open a reverse shell of the server under the attacker’s control, and facilitate the retrieval of miner load
  • binary fileas a second-stage payload, including the core Kinsing malware and a cryptominer that mines Monero

For its part, the malware is designed to keep an eye on the mining process and share its process identifier (PID) with the C2 server, perform connection checks and send execution results, etc.

Internet security

“Kinsing targets Linux and Windows systems, often by exploiting vulnerabilities in web applications or misconfigurations such as the Docker API and Kubernetes to run cryptocurrency mining programs,” Aqua said. “To prevent potential threats like Kinsing , proactive measures such as strengthening pre-deployment workloads are critical.”

The disclosure comes as botnet malware families are increasingly looking for ways to expand their reach and recruit machines into networks to carry out malicious activities.

The best example is P2PInfect, a Rust malware that was found to exploit less secure Redis servers to deliver variants compiled for the MIPS and ARM architectures.

Nozomi Networks, which discovered the sample targeting ARM earlier this year, said: “The main payload is capable of performing various operations, including propagating and delivering other modules with self-explanatory file names such as miner and winminer.”

“As the name suggests, the malware is capable of performing peer-to-peer (P2P) communications without relying on a single command and control server (C&C) to deliver the attacker’s commands.”

Did you find this article interesting?follow us Twitter and LinkedIn to read more exclusive content from us.



Source link

The post Kinsing hacker group exploits more flaws to expand botnet used for cryptojacking appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/kinsing-hacker-group-exploits-more-flaws-to-expand-botnet-used-for-cryptojacking/
via https://techempiresolutions.com/

Thursday, May 16, 2024

Google’s accessibility app Lookout uses your phone’s camera to find and identify objects

Google has updated some accessibility apps and added features to make them easier to use for people who need them. It has launched a new version of its Lookout app that can read text and even lengthy documents aloud for people with low vision or blindness. The app can also read food labels, identify currency, and tell users what they see through the camera and images. Its latest version comes with a new “Find” mode that allows users to choose from seven item categories, including seats, tables, vehicles, tableware and bathrooms.

When the user selects a category, the app will be able to identify the objects associated with it as the user moves the camera around the room. It then tells them the direction or distance to the object, making it easier for users to interact with their surroundings. Google is also launching an in-app photo button so they can take a photo and quickly get an AI-generated description.

Screenshot showing categories of objects in Google Lookout, such as Seats and Tables, Doors and Windows, Cups, etc.Screenshot showing categories of objects in Google Lookout, such as Seats and Tables, Doors and Windows, Cups, etc.
Google

The company has also updated its Look to Speak app. Look to Speak enables users to communicate with others by selecting from a list of phrases they want the app to speak aloud using eye gestures. Now, Google has added a text-less mode that lets them trigger speech by selecting from an album containing a variety of emojis, symbols, and photos. Even better, they can personalize what each symbol or image means to them.

Google has also expanded the screen reader functionality of Lens in Maps so that it can tell users the names and categories of places they see, such as ATMs and restaurants. It can also tell them how far away a particular location is. Additionally, it is rolling out improvements to detailed voice guidance, which provides audio prompts telling users where they should go.

Finally, four years after the launch of Maps for Android and iOS, Google is finally making wheelchair information available on the desktop. The Accessibility feature allows users to see if the place they are visiting can meet their needs – for example, businesses and public spaces with accessible entrances will display a wheelchair icon. They can also use the feature to see if a location has accessible restrooms, seating, and parking. Maps currently has accessible information for more than 50 million places, the company said. Those who like to find wheelchair information on Android and iOS can now also easily filter reviews that focus on wheelchair access.

Google made all of these announcements at this year’s I/O developer conference, where it also revealed that it’s open sourcing more code for its Gameface hands-free “mouse” project, allowing Android developers to use it in their apps . The tool allows users to control cursors through head movements and facial expressions so they can use computers and mobile phones more easily.

Stay up to date with all the news from Google I/O 2024 here!

This article contains affiliate links; if you click on such links and make a purchase, we may earn a commission.

Source link

The post Google’s accessibility app Lookout uses your phone’s camera to find and identify objects appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/googles-accessibility-app-lookout-uses-your-phones-camera-to-find-and-identify-objects/
via https://techempiresolutions.com/

The psychology of artificial intelligence trustworthiness

Enrique Leon, Artificial Intelligence and Cloud Enterprise Architect at American Sugar Refining

Enrique Leon, Artificial Intelligence and Cloud Enterprise Architect at American Sugar Refining

Artificial intelligence (AI) is increasingly used to generate content, such as text, images, music, and videos, that can influence human beliefs, attitudes, and behaviors. However, not all AI-generated content is accurate, reliable or ethical. Some AI systems may intentionally or unintentionally produce misleading, biased, or harmful content, which may have negative consequences for individuals and society. Therefore, it is important to understand how people assess the trustworthiness of AI-generated content and how it compares to human-generated content.

This article explores the psychological factors that influence people’s trust in AI-generated content and why they are more likely to accept the authenticity of AI-generated content than human-generated content. We review the existing literature on this topic and propose a conceptual framework to explain the main cognitive and affective processes involved. We also discuss the implications of our findings for the design and regulation of AI systems and the education and empowerment of users.

literature review

A growing body of research explores how people perceive and respond to AI-generated content, particularly in the field of text and image generation. Some of the main themes that emerge from this literature are:

• People generally tend to trust content generated by AI, especially if they are unaware of its source or have a positive attitude toward AI.

• People are influenced by the quality, coherence and consistency of AI-generated content and the cues and context that come with it.

• People are more likely to accept AI-generated content when it confirms their prior beliefs, preferences, or expectations, or when it appeals to their emotions or motivations.

• People are less likely to question or verify AI-generated content than human-generated content because they have a lower perception of responsibility, responsibility, or intentionality from the AI ​​source.

• People are more susceptible to AI-generated content when they have low levels of media literacy, critical thinking or digital skills, or when they are in situations of high uncertainty, complexity or information overload.

conceptual framework

Based on a literature review, we propose a conceptual framework that illustrates the main psychological factors that influence trust in AI-generated content and how they compare to human-generated content. This framework consists of four components: source, message, recipient, and context. Each component has several subcomponents that represent specific variables that influence people’s trust. The framework ends with interactions and feedback loops between components and subcomponents.

“Users should be empowered and involved in the co-creation and governance of artificial intelligence systems and have the opportunity to express their opinions and concerns about the system and its outputs”

Conceptual Framework in the Psychology of Artificial Intelligence Credibility Perceived Objectivity – Artificial intelligence is simply perceived to be objective.

Consistency and reliability—trust based on consistent and high-quality content

Authoritative Attribution – Artificial Intelligence uses advanced technology, and most people don’t realize that Artificial Intelligence goes back decades

Lack of emotional bias – Artificial intelligence lacks emotions, thereby reducing the concerns associated with these emotions.Transparency—Trust is achieved through transparent explanations of user perceptions

Accuracy and precision – users trust that artificial intelligence is accurate and precise

Social Proof – Widespread adoption of AI and positive user experience

Mitigating Confirmation Bias – Content can mitigate confirmation bias by presenting information objectively

discuss

The conceptual framework I propose can help us understand the psychological mechanisms behind people’s trust in AI-generated content and why they are more accepting of its authenticity than human-generated content. The framework can also inform the design and regulation of AI systems and the education and empowerment of users. Some possible impacts are:

• AI systems should be transparent and accountable about their sources, methods, and goals, and provide clear and accurate information about the quality, reliability, and limitations of their outputs.

• AI systems should be ethical and responsible in producing content that respects human values, rights and dignity and avoid misleading, biased or harmful content.

• AI systems should be able to adapt and respond to user feedback and preferences, allowing users to control and customize their interactions with the system.

• Users should understand and understand the existence and potential impact of AI-generated content and develop the skills and abilities to critically evaluate and validate the content they encounter.

• Users should be empowered and involved in the co-creation and governance of AI systems and have the opportunity to express their opinions and concerns about the system and its outputs.

In this article, we explore the psychology of AI trustworthiness and why people trust AI-generated content more than human-generated content. We review the existing literature on this topic and propose a conceptual framework to explain the main cognitive and affective processes involved. We also discuss the implications of our findings for the design and regulation of AI systems and for user education and empowerment. I hope that this article will contribute to the advancement of research and practice in this important emerging area.



Source link

The post The psychology of artificial intelligence trustworthiness appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/the-psychology-of-artificial-intelligence-trustworthiness/
via https://techempiresolutions.com/

A guide to innovation and efficiency strategies

Johan Zamora, Director of Big Data Engineering and Analytics at Western Union

Johan Zamora, Director of Big Data Engineering and Analytics at Western Union

In a rapidly evolving global business landscape, artificial intelligence (AI) has become critical to success, reshaping the way companies operate, innovate and interact with customers. For C-suite leaders who want to use technology to enhance their brands, streamline operations and enhance customer engagement, artificial intelligence provides a set of tools to turn challenges into opportunities. This article delves into the multi-faceted use of AI in creating branded content, interpreting complex documents, automating processes, and managing customer inquiries, ultimately illustrating how AI can drive business growth and efficiency.

Artificial Intelligence Creates Branded Content

In the digital age, content is king, but not just any content—branded content that resonates with your target audience and amplifies your company’s voice is crucial. Artificial intelligence technologies, including natural language generation (NLG) and machine learning algorithms, are revolutionizing content creation. These tools analyze consumer behavior, preferences and engagement to produce personalized content that directly addresses the needs and interests of your audience. From blog posts and social media updates to video scripts and marketing copy, the AI-driven platform enables businesses to produce high-quality, consistent and relevant content at scale, ensuring a consistent and impactful brand image across all channels .

Artificial intelligence for complex document interpretation

Interpreting complex documents such as legal contracts, technical manuals and regulatory documents can be time-consuming and error-prone. Artificial intelligence has the ability to process and analyze large amounts of data. It can effectively browse these documents, extract relevant information, identify key patterns, and even provide summaries and insights. This feature not only speeds up the review process but also improves accuracy and compliance, mitigating risks associated with human error and oversight.

Artificial Intelligence in Process Automation

Process automation powered by artificial intelligence is a game changer for businesses looking to increase efficiency and reduce operating costs. Robotic process automation (RPA) combines with artificial intelligence technology to handle repetitive, rules-based tasks, from data entry and invoice processing to inventory management and customer onboarding. By automating these processes, companies can allocate human resources to more strategic tasks, thereby increasing productivity and promoting innovation.

Artificial intelligence handles customer inquiries

Customer service is a key touchpoint for businesses, and artificial intelligence is transforming this area through advanced chatbots and virtual assistants. Equipped with natural language processing (NLP) and machine learning, these artificial intelligence tools can instantly understand and respond to customer inquiries, providing personalized and accurate support. In addition to handling routine issues, AI systems can analyze customer data, provide tailored recommendations and upsell services, and even predict and resolve potential issues, thereby enhancing the overall customer experience. Strategic integration of artificial intelligence:

Unleash potential and focus on core competencies

Integrating artificial intelligence into business operations is more than just adopting new technology; it is about strategically augmenting human ingenuity and creativity. When used effectively, AI can manage daily tasks and handle increased workloads, allowing teams to focus on strategy, creation, engineering, and transformation. Rather than diminishing the importance of the human element, this shift in strategy amplifies it, allowing companies to take on more work with the same workforce and pursue new opportunities. By combining artificial intelligence with human creativity and strategic insight, businesses can achieve unparalleled efficiency, innovation and competitive advantage.

In summary, the process of integrating AI into business requires a thoughtful approach that focuses on areas where AI can add the most value while complementing human skills. As leaders move down this path, the potential for AI to serve as a “boost rocket” for business expansion and transformation is enormous. With the right combination of technology, strategy and talent, the possibilities are endless.



Source link

The post A guide to innovation and efficiency strategies appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/a-guide-to-innovation-and-efficiency-strategies/
via https://techempiresolutions.com/

How to view the canonical name of an AD object

Learn how to view and edit the canonical names of Active Directory objects using the options described in this guide.

Option 1: View the canonical name from ADUC

1. Open Active Directory Users and Computers and click view and select Advanced functions.

Open-Active-Directory-Users and Computers-click-View-and select-Advanced FeaturesOpen-Active-Directory-Users and Computers-click-View-and select-Advanced Features
  1. After that, navigate to the AD container where the object is located, right-click on the object and select characteristic.
  1. Then click the Objects tab – the specification name appears on this tab.

Option 2: Use PowerShell to view the spec name

  1. Open PowerShell on the computer that has access to the domain controller.
  2. Then, get the DistinguishedName of the object by executing the following command. This directive saves the result in the $distinguishedName variable.
$distinguishedName = (Get-ADObject -Filter Name -eq 'Anthony Raj').DistinguishedName

In the above command, “Anthony Raj” is the AD display name of the object whose CN I want to get. This is the result of the command. To confirm that it works, I executed the variable.

Then, get the DistinguishedName of the object by executing the following command. This directive saves the result in the $distinguishedName variable.Then, get the DistinguishedName of the object by executing the following command. This directive saves the result in the $distinguishedName variable.
  1. Finally, display the object specification name by executing the following command:
Get-ADObject -filter distinguishedname -eq $distinguishedName -properties canonicalName

This directive displays additional properties. To display only the CN, modify the directive as shown below.

(Get-ADObject -filter distinguishedname -eq $distinguishedName -properties canonicalName).CanonicalName

in conclusion

The AD object’s canonicalName displays the object in canonical format. This shows the full path to the object in AD, separated by a forward slash (/).

If you need to view this attribute in Active Directory, you can use ADUC or PowerShell, as I show in this quick guide.

If this guide meets your expectations, please let me know by replying Yes Go to “Was this page helpful?” below. Before you get started, browse our Windows Server How-to Guide for more guidance.

Source link

The post How to view the canonical name of an AD object appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/how-to-view-the-canonical-name-of-an-ad-object/
via https://techempiresolutions.com/

Sunday, May 12, 2024

4 clever ways to put a smile on her face this Mother’s Day! – Noise

time flies! It’s been two weeks since May and Mother’s Day is just around the corner. You know what this means. Which route will you choose this year – flowers, chocolates, or that nice old-fashioned greeting card? Of course, there’s another option, and we’ve got all the scoop.

Life is busy, but sometimes even a brief chat with your mom can make everything better. What better way to celebrate mom’s day than letting her know you’re always in touch?She may blame technology every time you complain about a headache, but after being introduced to you These Barely noticed down there, she smiles every time she roars.

1. A smart watch customized just for her: Whenever she walks into your room and finds things mysteriously missing, or turns off all the fans and lights, dare we ask what her daily step count should look like? Now it’s time for her to document all these steps. Help your mom glow while motivating her to quickly achieve all her fitness goals with a smartwatch that’s both stylish and functional.

NoiseFit Diva smart watch

Noise selection – this NoiseFit Diva smart watch The elegant diamond-cut dial design is stunning and fits the wrist perfectly. Equipped with a range of smart features, such as an artificial intelligence voice assistant to help her quickly master technology, and easy BT calling for constant connectivity.

Plus the Noise Wellness Kit™ for all your mom’s health and wellness needs, this gift will make her day easy.

2. Smart ring for monitoring health status: Time to put a ring on it! What better gift could there be for your mom than her own wellness companion wrapped around her finger? Her health is in her hands, quite literally, with a wisdom ring as a timeless symbol of your love and gratitude.

Luna Ring

Noise selection – this Luna Ring It is a leap in the integration of cutting-edge technology and innovative design. Light enough to roll with a punch, yet strong enough to withstand wear and tear in a variety of different colors. Luna Ring features over 70 health tracking metrics to determine various health scores, providing personalized insights and nudges so your mom can unleash her peak potential every day.

3. Wireless audio earbuds: The world is evolving, and so are our mothers. They now enjoy binge-watching online content on their phones just as much as we do, but with the volume turned up to full volume (sigh). But don’t worry, we have the perfect solution to enhance her viewing and listening experience. Buy Mom her own set of BT-enabled wireless headphones. With a suave and stylish look, watch her follow her own beat with her own style.

halo buds

Noise selection – this Noise Aura Buds truly wireless earbuds Makes the perfect Mother’s Day gift. With an effortlessly stylish look, these earbuds are designed to be comfortable for her to wear, giving her a truly relaxing, immersive listening experience.

4. A trip down memory lane: Imagine you and your whole family jamming to some of your mom’s favorite songs in the comfort of your living room. A gift like a wireless speaker is the perfect excuse for her to brush up on her karaoke skills while spending quality time with her loved ones.

sound master

Noise selection – will soon be your mother’s choice too!this sound master It’s a BT speaker your mom won’t mind. Quality finishes and beautiful design will refresh your living room and surprise you with the power of the surrounding sounds. From hosting parties at home to listening to classic songs to turning every day into a special occasion, this is a gift that not only mom will love, but your whole family will.

This Mother’s Day, switch gears and add a little wisdom with gifts that she will not only cherish but also add convenience to her daily life.

Source link

The post 4 clever ways to put a smile on her face this Mother’s Day! – Noise appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/4-clever-ways-to-put-a-smile-on-her-face-this-mothers-day-noise/
via https://techempiresolutions.com/

Wednesday, May 8, 2024

The Apple Pencil range is confusing, so here’s your guide to which one you should buy

Apple unveiled a slew of new iPads on Tuesday, with updates that sharpen the company’s tablet selection. Yes, there are still six different models in total, but the lines between these tablets are much clearer: you have a good choice (the base iPad), a better choice (iPad Air), and a best choice (iPad Pro). Both the Air and Pro are available in 11-inch or 13-inch frames, but these SKUs are more or less the same outside of size. At the same time, the iPad mini still caters to a relatively small market that prefers compact tablets.

Amid these announcements, however, the Apple Pencil has become even more confusing. Apple has launched a new high-end stylus, the Pencil Pro, but hasn’t discontinued any older models. As a result, potential shoppers now have four (4!) different styli to choose from. Each product has different features, both are priced the same, and only the lowest-end model is available for all iPads in Apple’s current lineup. The highest-end version before yesterday is no longer compatible with the latest iPad Air or iPad Pro.

This is so bad!How did Apple get to this point? possible It comes from what the company calls a “new magnetic interface.” This is how the Pencil Pro is used to connect and charge with compatible iPads, which in this case only includes the new iPad Air and iPad Pro. The tablets have been redesigned to place the front-facing camera on the long edge, which is a welcome change in the vacuum, but may result in the devices no longer supporting the charging system used by the second-generation Pencil. However, Apple has not officially confirmed this. The company didn’t provide more information when reached for comment, noting only that the new Pencil charging and pairing port was created to work with the latest tablet’s design and accommodate its landscape front-facing camera.

We’re likely in the middle of an awkward transition period, with the first- and second-generation Pencil becoming obsolete every time the entry-level iPad and iPad mini are updated. However, just like today, digital artists and note-takers would have a hard time viewing the Pencil Collection as chaotic. There isn’t a “product line” at all, and there’s no one-size-fits-all iPad, which is a condemnation in itself. But if you’re in the market for a new pencil but aren’t sure which one to get, we’ve broken down the current offerings below.

apple

Who should get it?: Those who plan to buy an iPad Air (M2) or iPad Pro (M4) in the near future (most likely).

advantage
  • The latest and most advanced pencil with squeeze gestures, gyroscope and Find My Support
shortcoming
  • Only works on the latest iPad Air and iPad Pro

Amazon $129

Apple Pencil Pro is the latest, most technologically advanced pencil available. It’s priced at $129 and is available for pre-order now, with general availability starting on May 15th. and the 11-inch and 11-inch iPad Air (M2).

To keep things simple, if you’re buying one of these iPads, this is almost certainly the stylus you should buy. We still need to review it, but it’s essentially an upgraded version of the second-generation Pencil, which we previously recommended in our guide to the best iPad accessories . It has nearly the same comfortable shape and matte finish, but it’s technically 0.05 ounces lighter. It still supports pressure sensitivity, so if you press harder, your marks will be darker, and it supports tilt detection, so you can hold it at an angle for light shadows and similar effects. It still pairs and charges magnetically, and you can still take advantage of the “double-click” feature that lets you quickly switch between tools in certain apps. For some iPads, the Hover feature lets you interact with on-screen elements by holding the stylus over the display.

In addition, Pencil Pro has some exclusive benefits. You can squeeze it to open a contextual menu for changing colors, line width, and similar tools. A built-in gyroscope can detect when you roll the stylus, which should make it easier to change the direction of the shape pen and brush tools. The haptic engine provides more tangible feedback when you use the pen. And, perhaps most conveniently, it works with Apple’s Find My network, so if you can’t find it, it should be easier to find.

apple

Who should get it?: Those who have an older iPad Pro or iPad Air or the current iPad mini and won’t be upgrading to a new iPad anytime soon.

advantage
  • Accurate, comfortable and functional
shortcoming
  • Not supported on the latest iPad, iPad Air or iPad Pro

Amazon $79

The second-generation Pencil was released in 2018 and until this week was still Apple’s best stylus. It also sells for $129, but recent sales have dropped it to $79. It works with the following iPads: 12.9-inch iPad Pro (3rd, 4th, 5th, and 6th generations), 11-inch iPad Pro (1st, 2nd, 3rd, and 4th generation), iPad Air (4th and 5th generation), and iPad mini (sixth generation).

To reiterate, Apple says no Compatible with any iPad Air or iPad Pro released on Tuesday.Yes, pay $129 for a stylus Having to replace it after a generation or two is annoying.

The second-generation Pencil lacks the Pencil Pro’s squeeze and “bucket” gestures, enhanced haptic feedback, and “find me” support. Otherwise, it contains all the same core features. If you own one of the compatible iPads listed above and don’t plan on upgrading anytime soon, you can buy the Pencil, as it’s still a significant upgrade compared to Apple’s lower-cost models. But if you’re planning on buying a new iPad Air or iPad Pro in the near future and don’t desperately need a stylus now, it’s worth holding off and buying the Pencil Pro along with your new tablet, as bad as it is.

apple

Who should get it?: Those who must have an Apple stylus but can’t afford Pencil Pro/2nd generation Pencil and only care about casual writing. Also, iPad (10th generation) users don’t care about pressure sensitivity. However, some third-party options may be a better value, depending on the sale price.

advantage
  • Cheaper than Pencil Pro and second generation Pencil
shortcoming
  • Lacks pressure sensitivity and wireless charging

Amazon $69

The USB-C Apple Pencil was released late last year and is essentially Apple’s “cheap” stylus. It’s listed at $79, but it’s still not cheap, although we’ve seen recent discounts that take $10 off the price.

This is the only Pencil that’s compatible with all iPads in Apple’s current lineup: iPad Air (M2), iPad Pro (M4), iPad (10th generation), and iPad mini (6th generation). In addition, it is also suitable for older 12.9-inch iPad Pro (3rd to 6th generation), 11-inch iPad Pro (1st to 4th generation) and iPad Air (4th and 5th generation) ).

However, it’s also a significant downgrade from the Pencil Pro and second-generation Pencil, as it lacks pressure sensitivity and magnetic charging support. The former means the illustration is less precise, while the latter means you’ll need a handy USB-C cable when charging your device. You can still attach the USB-C Pencil to the side of the iPad with a magnetic holder, which is convenient, but it won’t be powered. It also doesn’t support Apple’s double-click feature, although it does support basic features like hover and tilt sensitivity. It’s also slightly shorter than higher-end models.

For most people who are keen on drawing or taking notes and are buying an Apple Pencil, I would recommend just buying the Pencil Pro or the second generation Pencil, depending on your iPad. But for those who really want to save money and might just want a stylus for casual writing or a general navigation device, the USB-C Pencil might make sense. This is especially true for the iPad (10th generation), which doesn’t work with any of Apple’s premium models.

apple

Who should get it?: Hardly anyone, unless you plan on using an iPad (10th generation) or an older Lightning-based iPad for the foreseeable future and need pressure sensitivity for drawing.

advantage
  • The most affordable pressure-sensitive pencil
shortcoming
  • Archaic and incompatible with most new iPads

Amazon $79

The original Apple Pencil was launched back in 2015. Most people can safely ignore it: the only modern iPad it works with is the entry-level iPad (10th generation), but even that requires a Lighting to USB-C adapter to charge, which seems ridiculous and Giving you more potential uses to lose. It doesn’t attach magnetically and has a smoother, more rounded design that makes it easier to roll around on a flat table. It also lacks most of the more advanced features found in newer pencils.

However, one feature of the first-generation Pencil over the USB-C model is pressure sensitivity. Yes, even though it’s eight years older, it’s technically better in at least one meaningful way. So if you own an iPad (10th generation) and are willing to deal with the dongle-haunted charging situation in exchange for a more precise drawing experience, the first-generation Pencil is still reasonable. But most people in this situation should choose iPad Air and Pencil Pro.

For reference only, the following is a list of iPads that support the first generation Pencil: 12.9-inch iPad Pro (first and second generation), 10.5-inch iPad Pro, 9.7-inch iPad Pro, iPad Air (3rd generation), iPad mini ( 5th generation) and iPad (6th-10th generation).

Source link

The post The Apple Pencil range is confusing, so here’s your guide to which one you should buy appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/the-apple-pencil-range-is-confusing-so-heres-your-guide-to-which-one-you-should-buy/
via https://techempiresolutions.com/

Tuesday, May 7, 2024

Apple’s 2023 iMac price drops to record low

It’s a busy day for Apple news, but the company has plenty of other M-series devices, including the iMac. Apple is putting M3 chips into its desktop computers, and now the base version of the 2023 iMac is cheaper than ever. With this Amazon coupon (be sure to clip it!), you can snag an iMac with an M3 chip, 8GB of RAM, and 256GB of SSD storage. The offer is available on silver, pink, green and blue versions of the system.

apple

The price of Apple’s 2023 iMac powered by M3 chips has dropped to its lowest price yet.

Amazon $1,149

A word of warning: While this is a good deal on paper, we do feel that the 2023 iMac’s base specs aren’t quite up to par. In this day and age, with applications becoming more and more demanding, it’s hard to seriously recommend a computer with just 8GB of RAM. That’s why the iMac doesn’t score higher than 86.

On the plus side, the M3 chipset is very fast, and the iMac’s display is still great. Although this is a desktop system, it’s light, so moving it from room to room or propping it up on something isn’t too difficult – the inability to adjust the screen vertically is a bit disappointing.

There are some things to keep in mind here, but if you’re looking for a nice, nice new computer to perform relatively basic tasks (you won’t be doing much gaming or video editing on a system with these specs) and don’t worry if you If you don’t mind spending a little money, then this iMac might suit your needs.

follow @EngadgetDeals on twitter and Subscribe to the Engadget Deals Newsletter Get the latest technology deals and buying advice.



Source link

The post Apple’s 2023 iMac price drops to record low appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/apples-2023-imac-price-drops-to-record-low/
via https://techempiresolutions.com/

OpenAI partners with People publisher Dotdash Meredith

OpenAI is working with another publisher to move toward a licensing approach to training materials. Dotdash Meredith, owner of people and better homes and gardenswill license its content to OpenAI to train ChatGPT, and publishers will use the AI ​​company’s models to enhance their internal ad targeting tools.

As part of the arrangement, ChatGPT will display content and links to Dotdash Meredith publications. It also provides OpenAI with fully licensed training materials from trusted publications.

This is a welcome change after the company got into trouble for allegedly using content for training purposes without permission. New York Times and Alden Capital Group (which owns chicago tribunee. new york daily news and orlando sentinel) has sued the makers of ChatGPT, accusing it of using its content without permission. So did comedian Sarah Silverman and a conspiracy-mongering car salesman (the latter for different reasons).

“We are not shy about admitting that AI platforms should pay publishers for content and that content must be properly attributed,” Dotdash Meredith CEO Neil Vogel wrote in a press release. “This deal demonstrates OpenAI’s commitment to working with creators and Publishers are doing a great job working together and ensuring a healthy internet for the future.”

Prior to the Dotdash Meredith deal, OpenAI and financial times. “It is certainly right that AI platforms pay publishers for the use of their material,” John Ridding, the newspaper’s chief executive, said in a statement last month.

Dotdash Meredith, also owns Investment Encyclopedia, Food and victorye. very cool and very good, will use OpenAI’s models to enhance its D/Cipher ad targeting tool. The publisher said its ad system “connects advertisers directly with consumers based on the context of consuming content without the use of personal identifiers like cookies.” It’s an industry-wide shift coming as Google moves toward a A future without cookies – albeit later than initially advertised.

Source link

The post OpenAI partners with People publisher Dotdash Meredith appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/openai-partners-with-people-publisher-dotdash-meredith/
via https://techempiresolutions.com/

Sunday, May 5, 2024

Nintendo launches blitz on GitHub, removing over 8,000 emulator-related DMCAs

Nintendo has sent Digital Millennium Copyright Act (DMCA) notices to more than 8,000 GitHub repositories hosting Yuzu Switch emulator code, which the “Legend of Zelda” maker has previously described as “massive piracy.” Two months ago, Yuzu’s creator quickly settled with Nintendo and its notoriously combative legal team for $2.4 million.

Game Industry Network First notified of the DMCA notice, affecting 8,535 GitHub repositories. The redacted entity representing Nintendo claims that the Yuzu source code included in the repurchase agreement “illegally circumvents Nintendo’s technical protection measures and runs illegal copies of Switch games.”

GitHub wrote in the notice that developers will have time to change their content before being disabled. In keeping with its developer-friendly approach and branding, the Microsoft-owned platform also provides legal resources and guidance for filing DMCA counter-notices.

It’s perhaps no coincidence that Nintendo’s legal blitz coincides with a renaissance in gaming emulators. Last month, Apple loosened restrictions on retro gamers in the App Store (possibly in response to regulatory threats), resulting in the Delta emulator becoming the de facto choice and topping the App Store charts. Nintendo may have realized that emulator limelight was threatening its bottom line and started suppressing the games that most directly jeopardized its revenue stream.

Sadly, Nintendo’s largely undefended legal attack on emulators ignores an important use of emulators that has nothing to do with piracy. Game historians view this software as key to the game’s preservation. Without emulators, Nintendo and other rights holders could render parts of history obsolete for generations to come because their corresponding hardware will ultimately be harder to obtain.

Source link

The post Nintendo launches blitz on GitHub, removing over 8,000 emulator-related DMCAs appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/nintendo-launches-blitz-on-github-removing-over-8000-emulator-related-dmcas/
via https://techempiresolutions.com/

Saturday, May 4, 2024

Google bans ads for sites and apps that create deepfake porn

Google has updated its inappropriate content policy to include language that explicitly prohibits advertisers from promoting sites and services that produce deepfake pornography. While the company already has strict restrictions on ads that contain certain types of sexual content, the update leaves no doubt that promoting “modified or generated synthetic content that is sexually explicit or contains nudity” is a violation of its rules.

Any advertiser that promotes websites or apps that generate deepfake porn, show instructions on how to create deepfake porn, or endorse or compare various deepfake porn services will be suspended without notice. They will also no longer be able to advertise on Google. The company will begin enforcing the rule on May 30 and offer advertisers the opportunity to remove any ads that violate the new policy.as 404 media pointed out that the rise of deepfake technology has led to an increasing number of advertising tools specifically targeting users who want to create sexually explicit material. Some of these tools reportedly even pretended to be healthy services in order to be listed on the Apple App Store and Google Play Store, but they masked them on social media, where they promoted their ability to generate manipulated pornographic content. ability.

However, Google has begun banning services that create sexually explicit deepfakes in Shopping ads. Similar to its upcoming broader policy, the company has banned Shopping ads for services that “generate, distribute or store synthetic sexually explicit content or synthetic content containing nudity.” Advertising page.

Source link

The post Google bans ads for sites and apps that create deepfake porn appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/google-bans-ads-for-sites-and-apps-that-create-deepfake-porn/
via https://techempiresolutions.com/

Pay just $120 and get 500GB of cloud storage for life

TL;DR: Make expensive cloud service fees a thing of the past with 500GB of Amaryllo cloud storage for a one-time payment of $119.99 (originally $249) at the best Internet price.

Cloud storage is almost a necessity these days, and the more cloud storage the better. But if your business has a large media archive or other large amounts of data, these recurring fees can be a killer. Luckily, you can now ditch those pricey monthly cloud fees and get 500GB of Amaryllo cloud storage for just $119.99, which is the best price on the web and 51% off the regular $249 retail price Discount.

About Amaryllo Cloud Storage

Unveiled at CES, Amaryllo lets you securely store and back up large amounts of files while also easily accessing and sharing them. And you can share your cloud space with up to nine people to collaborate with others at no extra cost; you don’t even need to sign up.

To search for a document, just start typing what you want to see and the platform’s built-in artificial intelligence will find it for you. This is especially useful for photos. Just let artificial intelligence categorize all your media so you can find what you want based on where and what’s in it.

Best of all, Amaryllo cloud storage is easy to expand. When you need more storage, you can add more storage to your existing storage with another one-time payment. Currently, plans from 100GB to 300GB are available.

You can upload multiple files at the same time using a browser or mobile app. You can also back up files using computers, tablets, and smartphones. All data is encrypted using advanced technology so that only you and other authorized users can access it. Even the service knows little about the data stored on its servers.

For a one-time payment of $119.99 (originally $249), you can get 500GB of Amaryllo cloud storage—the best price on the web.

Prices and availability subject to change.

Source link

The post Pay just $120 and get 500GB of cloud storage for life appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/pay-just-120-and-get-500gb-of-cloud-storage-for-life/
via https://techempiresolutions.com/

Captive parrots seem to enjoy video chatting with friends via Messenger

Parrots are naturally social animals. In captivity, they often don’t have a group to interact with, which can cause them some real challenges keeping them happy and healthy. But recent research suggests technology may be able to help them meet more of their social needs. A study led by researchers from the University of Glasgow and Northeastern University compared the responses of parrots when they were able to video chat with other birds via Meta Messenger and watch pre-recorded videos. They seem to prefer instant conversations.

The research builds on a series of smaller studies over the past few years, including one where a research team trained pet parrots to video call each other (with help from humans) and another where they taught them to play tablet games. Recently, nine parrot owners were given tablets for their pets and then observed them for six months. During that time, the parrots – who were initially introduced to each other via video chat – were able to talk for up to three hours on a total of 12 calls. Half of the meetings feature pre-recorded video, while the other half are live Messenger video chats.

Caregivers who documented these sessions reported that the birds seemed more engaged during live interactions. In these cases, they initiated more calls and spent more time on average interacting with the bird on the other end.

Parrots can make up to two calls per session, and the researchers found that people chatting via Messenger reached this limit 46 percent of the time, compared with almost half the time when watching pre-recorded videos. Overall, they spent a total of 561 minutes video chatting on Messenger and only 142 minutes watching pre-recorded videos.

“The presence of ‘activity’ does seem to have an impact on the parrot’s interaction with the screen,” said Dr. Ilyena Hirskyj-Douglas, though she noted that further research is needed before firm conclusions can be drawn. “Their behavior when interacting with another live bird often mirrors the behavior they would engage in with other parrots in real life, which was not the case in pre-recorded sessions.” Still, caregivers mostly reported that live and pre-recorded calls all appear to have a positive impact on the birds.

“The Internet has huge potential to allow animals to interact with each other in new ways, but the systems we build to help them do this need to be designed around their specific needs and physical and mental abilities,” said Dr. Douglas. “Research like this could help lay the foundation for a truly animal-centered internet.”

Source link

The post Captive parrots seem to enjoy video chatting with friends via Messenger appeared first on Tech Empire Solutions.



from Tech Empire Solutions https://techempiresolutions.com/captive-parrots-seem-to-enjoy-video-chatting-with-friends-via-messenger/
via https://techempiresolutions.com/

Pokémon Trading Card Website Making 100k!

This Website Gets Over 150,000 Organic Views A Month!   Are you a Pokémon fan? There has been this new Pokémon game on ...