Posts By :

wp-admin

Apple released third iOS 13 patch within a week

Apple released third iOS 13 patch within a week 750 445 wp-admin

Apple surprised its customers by releasing new build within a week after launching iOS 13. This new build iOS 13.1.2 which will hopefully bring down the number of bugs down to minimum level. The iOS 13.1.2 update provides bug fixes for several issues including problem with camera, iCloud backup, and battery drainage issues.

                The iOS 13.1.2 update notes states fixes major bugs including flashlight, Bluetooth connectivity problem, and camera not working. This build also addresses the issue with shortcuts and stalled iCloud progress bar and also addresses the issues of on iPadOS. The Camera not working on iPhone 11 just after its release would cause a great problem for Apple that’s why apple rushed into the new release to address these bugs as soon as possible.  

Previously iOS 13.1.1 update fixed a security issue which allowed third party keyboards to operate as they are given user permission when they had not given. That is not a just small issues because it allowed external actors to steal data and it was the basic reason the update was hurried out. Also a main issues is patched with this update where iPhone battery drained more quickly. These patches have served iOS user with great ease from worries of Apps not working and consecutive encounters of flaws in device performance.

iPhone ‘unfixable’ flaw effecting Millions of iOS devices

iPhone ‘unfixable’ flaw effecting Millions of iOS devices 799 449 wp-admin

It has been found by the Security Researcher a new “Unfixable” iPhone exploit which makes iOS devices unbearable. This exploit is capable of giving deep access to hackers to millions of iOS devices and the major terror is that it’s virtually impossible to fix this flaw.

                Namely “Checkm8” exploit has the capability which allows anyone or hackers to jailbreak every single iOS device released between 2011 and 2017. iPad, Apple Watch, iPod Touch and Apple TV are also affected by this. This exploit permanently jailbreak devices meaning the ability to remove software restrictions imposed by Apple on iOS.

Checkm8 takes advantage of a security vulnerability in the initial code that first runs when an iOS device is powered on. This vulnerability was found in device’s Read Only Memory (ROM) but not in the software which cannot be fixed with an update.

                AxiOmX security Researcher said he discovered the exploit by reverse engineering a patch apple released in 2018 for iOS 12 beta. He also claimed that “ exploit for older devices makes iOS better for everyone”.

                Apple is yet to comment on the Flaw.   

DataHawk provides analytics for e-commerce just like App Annie for apps

DataHawk provides analytics for e-commerce just like App Annie for apps 1390 926 wp-admin

DataHawk, a French startup company that eager to build an App Annie for amazon listing. The company enables you to track products and search results so you can learn about competition around you and your space.

                This type of products are becoming increasingly relevant as more and more products sold on amazon are listed directly on Amazon by third party companies on Amazon market place. The performance of selling products on amazon truly depend upon search results for Product sellers on amazon. So you want to be on high rank as possible on amazon listing by important keywords because most customers choose from top results come on their search.

                So here comes the DataHawk, where you can track any keywords and see that how results dimensions changed over time. So with this you know how and why your sales dropped or increased. So this platform help a lot to increase product listing in ranking.

                DataHawk is based scrapping procedure which enables you to track your product as well as track products from your competitors so you can spot changes and review descriptions and prices.  Datahawk’s interface allows you to visualize data as well as provide option to export everything to excel Spread Sheet. Email integration is available for alerts DataHawk has manged to raise $1.3 million from Axeleo Capital and business angels. Also company has so far gained 140 clients, 80% from US including L’Oréal, Pfizer and PharamaPacks. Company has managed to track 2.6 million products every day.

Cheetay Logistics raises $7.8 million investment for US investors

Cheetay Logistics raises $7.8 million investment for US investors 266 190 wp-admin

Cheetay Logistics (Pvt.) Ltd. Is a fast growing tech based mile logistic company which issued a Statement that: “Cheetay Logistics has raised $7.8 million in a Series A round from US-based investors, which brings the inception-to-date funding for the company to over $11.5 million”.

                This is the largest amount raised by any local startup company in Pakistan in its early days. Former CEO of Daraz.pk and founder of Cheetay Ahmed Khan made a statement that, “This magnitude of capital is a testament to the quality of technology that we have developed locally in Pakistan and a recognition by the international investing community of Cheetay’s success to date and the enormous opportunity ahead of us. With the fundraising behind us, we are now searching for driven, talented and creative leaders who can help take us to the next level”.

This is the largest amount raised by any local startup company in Pakistan in its early days. Former CEO of Daraz.pk and founder of Cheetay Ahmed Khan made a statement that, “This magnitude of capital is a testament to the quality of technology that we have developed locally in Pakistan and a recognition by the international investing community of Cheetay’s success to date and the enormous opportunity ahead of us. With the fundraising behind us, we are now searching for driven, talented and creative leaders who can help take us to the next level”.

                Cheetay right now operating in four Pakistani cities but CEO Majid Khan said he is focused to develop company operation into every big city in the country and expecting rapid geography coverage this year. The company is focusing to invest these raised funds to enables its geographic growth and expand the team and continuous investment in development in its industry standard logistic technology and algorithm.

                Majid Khan summed up by saying, “I want to thank all the members of the Cheetay team for their energy, enthusiasm, and dedication in creating a business so compelling that it is attractive on a global scale. We are going to deploy our capital aggressively in our bid to become Pakistan’s pre-eminent technology company”.

                Pakistan’s fastest growing tech based logistic services company is expanding and right now it provides its services in Lahore, Karachi, Islamabad and Rawalpindi.

Google developed an application for car crash detection

Google developed an application for car crash detection 783 391 wp-admin

Google’s Pixel phones will soon be able to detect car accidents. The company is currently developing a new app called “Personal Safety”, which will be capable of figuring out when a user is involved in a crash and automatically alert first respondents as well as emergency contacts on their behalf.

                As per “XDA Developers”, which originally spotted the Play Store listing that Google published prematurely, Personal Safety will rely on a number of factors to work. Additionally to the speed changes of a vehicle abruptly coming to a halt and location data, the app will listen to “ambient audio” from the microphone to supposedly stay on the lookout for harsh noises such as collisions.

Personal Safety establishes that a car crash has occurred, it sounds a loud alarm and waits for a response from you for a few seconds. If you fail to dismiss the alert and select the “I’m OK” option, the app will call 1125 and share your location info. Personal Safety can inform your close contacts and place your emergency details such as medical data on the lock screen for first responders.

Personal Safety has a plenty of other handy features. One of them allows you to ring 1122 and silently send them your location and emergency type by pressing an automated button. The option can prove useful in critical events such as robberies and uncomfortable taxi rides

                Personal Safety app is expected to debut on October 15 during Google’s annual hardware event. The Play Store listing suggests it will be limited to the United States and Google’s own line of phones, at least initially.

Bitcoin wallets aren’t addresses — a secret guide for embarrassed crypto noobs

Bitcoin wallets aren’t addresses — a secret guide for embarrassed crypto noobs 1920 1150 wp-admin

Welcome to Hard Fork Basics, a collection of tips, tricks, guides, and advice to keep you up to date in the cryptocurrency and blockchain world.

If you own any cryptocurrency, the chances are you’ve had to use an address, or a wallet, or both. It’s confusing, right? Well, it doesn’t have to be.

The fact of the matter is that a wallet and an address are not the same thing, but the differences are relatively easy to understand. 

With this in mind, we’ll define what they each are and explain the differences without the unnecessary technical detail. 

An address

When it comes to cryptocurrencies such as Bitcoin, an address is made up of random letters and numbers. 

A Bitcoin address, for example, is usually made up of 26-35 alphanumeric characters and typically begin with the number 1, 3, or bc1. 

All addresses represent a destination on the Bitcoin network. What you really need to know is that, unlike addresses in the real-world, Bitcoin addresses are only meant to be used once. 

Basically, the idea is that for each Bitcoin transaction, users will generate a unique, single-use address to provide to senders.

Hard Fork has previously explained what they are and how they work in a bit more detail here.

A wallet

A wallet comes with an address by default, which is why things can get confusing at times. 

But, although a wallet comes with an address, it’s important to remember that it’s not the same as an address.

A cryptocurrency wallet can consist of a string of different addresses. The fact that it’s called a wallet can be a little misleading because it doesn’t actually hold all your credit cards in the say way that Apple Pay does, for example. 

Instead, a cryptocurrency wallet is more similar to a key ring because it holds a copy of each private key and its corresponding address. If it’s a good wallet, it should also automatically generate fresh Bitcoin addresses with every transaction.

So regardless of whether you own just Bitcoin, or Ethereum, or a host of several different cryptocurrencies, all you need to do is open your wallet to gain access to all the different addresses contained within it.  

As you might expect, there are different ways you can access your cryptocurrency wallet: on a desktop, on a browser, or by using a physical wallet.  Otherwise known as “cold storage,” physical wallets are more secure because they’re offline and less susceptible to hacks.

For more information about choosing your first crypto wallet, check out our handy guide here.

Hackers are turning our AI security systems against us — but they can be stopped

Hackers are turning our AI security systems against us — but they can be stopped wp-admin

Hackers are “making friends” with our systems, it’s time to break them up

With the use of AI growing in almost all areas of business and industry, we have a new problem to worry about – the “hijacking” of artificial intelligence. Hackers use the same techniques and systems that help us, to compromise our data, our security, and our lifestyle. We’ve already seen hackers try to pull this off, and while security teams have been able to successfully defend against these attacks, it’s just a matter of time before the hackers succeed.

Catching them is proving to be a challenge – because the smart techniques we’re using to make ourselves more efficient and productive are being co-opted by hackers, who are using them to stymie our advancements. It seems that anything we can do, they can do – and sometimes they do it better. 

Battling this problem and ensuring that advanced AI techniques and algorithms remain on the side of the good guys is going to be one of the biggest challenges for cybersecurity experts in the coming years. 

To do that, organizations are going to have to become more proactive in protecting themselves. Many organizations install advanced security systems to protect themselves against APTs and other emerging threats – with many of these systems themselves utilizing AI and machine-learning techniques. By doing that, organizations often believe that the problem has been taken care of; once an advanced response has been installed, they can sit back and relax, confident that they are protected. 

However, that is the kind of attitude that almost guarantees they will be hacked. As advanced a system as they install, hackers are nearly always one step ahead. Conscientiousness, I have found, is one of the most important weapons in the quiver of cyber-protection weapons. 

Complacency, it’s been said many times, is the enemy, and in this case, it’s an enemy that can lead to cyber-tragedy. Steps organizations can take include paying more attention to basic security, shoring up their AI-based security systems to better detect the tactics hackers use, and educating personnel on the dangers of phishing tactics and other methods used by hackers to compromise system.

Hackers have learned to compromise AI

How are hackers co-opting our AI? In my work at Tel Aviv University, my colleagues and I have developed systems that use AI to improve the security of networks, while avoiding the violation of individuals’ identities. 

Our systems are able to sense when an invader tries to get access to a server or a network. Recognizing the patterns of attack, our AI systems, based on machine learning and advanced analytics, are able to alert administrators that they are being attacked, enabling them to take action to shut down the culprits before they go too far. 

Here’s an example of a tactic hackers could use. Machine learning – the heart of what we call artificial intelligence today – gets “smart” by observing patterns in data, and making assumptions about what it means, whether on an individual computer or a large neural network. 

So, if a specific action in computer processors takes place when specific processes are running, and the action is repeated on the neural network and/or the specific computer, the system learns that the action means that a cyber-attack has occurred, and that appropriate action needs to be taken. 

But here is where it gets tricky. AI-savvy malware could inject false data that the security system would read – the objective being to disrupt the patterns the machine learning algorithms use to make their decisions. Thus, phony data could be inserted into a database to make it seem as if a process that is copying personal information is just part of the regular routine of the IT system, and can safely be ignored. 

Instead of trying to outfox intelligent machine-learning security systems, hackers simply “make friends” with them – using their own capabilities against them, and helping themselves to whatever they want on a server. 

There are all sorts of other ways hackers could fool AI-based security systems. It’s already been shown for example, that an AI-based image recognition system could be fooled by changing just a few pixels in an image. In one famous experiment at Kyushu University in Japan, scientists were able to fool AI-based image recognition systems nearly three quartersof the time, “convincing” them that they were looking not at a cat, but a dog or even a stealth fighter. 

Another tactic involves what I call “bobbing and weaving,” where hackers insert signals and processes that have no effect on the IT system at all – except to train the AI system to see these as normal. Once it does, hackers can use those routines to carry out an attack that the security system will miss – because it’s been trained to “believe” that the behavior is irrelevant, or even normal. 

Yet another way hackers could compromise an AI-based cybersecurity system is by changing or replacing log files – or even just changing their timestamps or other metadata, to further confuse the machine-learning algorithms.

Ways organizations can protect themselves

Thus, the great strength of AI has the potential to be its downfall. Is the answer, then, to shelve AI? That’s definitely not going to happen, and there’s no reason for it, either. With proper effort, we can get past this AI glitch, and stop the efforts of hackers. Here are some specific ideas:

Conscientiousness: The first thing organizations need to do is to increase their levels of engagement with the security process. Companies that install advanced AI security systems tend to become complacent about cybersecurity, believing that the system will protect them, and that by installing it they’ve assured their safety. 

As we’ve seen, though, that’s not the case. Keeping a human eye on the AI that is ostensibly protecting organizations is the first step in ensuring that they are getting their money’s worth out of their cybersecurity systems.

Hardening the AI: One tactic hackers use to attack is inundating an AI system with low-quality data in order to confuse it. To protect against this, security systems need to account for the possibility of encountering low-quality data. 

Stricter controls on how data is evaluated – for example, examining the timestamps on log files more closely to determine if they have been tampered with – could take from hackers a weapon that they are currently successfully using.

More attention to basic security: Hackers most often infiltrate organizations using their tried and true tactics – APT or run of the mill malware. By shoring up their defenses against basic tactics, organizations will be able to prevent attacks of any kind – including those using advanced AI – by keeping malware and exploits off their networks altogether.

Educating employees on the dangers of responding to phishing pitches – including rewarding those who avoid them and/or penalizing those who don’t – along with stronger basic defenses like sandboxes and anti-malware systems, and more intelligent AI defense systems can go a long way to protect organizations. AI has the potential to keep our digital future safer; with a little help from us, it will be able to avoid manipulation by hackers, and do its job properly.