Forwarded from Mishaal's Android News Feed
🖥️ Google preps new features for Android desktop windowing, including a minimize button
More improvements are coming to Android's desktop windowing mode.
More improvements are coming to Android's desktop windowing mode.
Android Authority
Google preps new features for Android desktop windowing, including a minimize button
Google is preparing some new features for Android’s desktop windowing mode, including a button to minimize apps.
Forwarded from AndroidSage.com
New GCAM GO 3.8 mod brings Pixel Camera magic to more devices. Download & unlock Night Mode, HDR+ & more!
https://www.androidsage.com/2024/11/27/download-latest-gcam-go-apk-features-from-pixel-camera/
https://www.androidsage.com/2024/11/27/download-latest-gcam-go-apk-features-from-pixel-camera/
Android Sage
Latest GCAM GO 3.8 Dropped With Features From Pixel Camera (APK Download)
Download Latest GCAM GO 3.8 APK and enhance your Low-End Smartphone photos. New GCAM GO 3.8 mod brings Pixel Camera magic to more devices. Download & unlock Night Mode, HDR+ & more!
Forwarded from The Hacker News
🚨 New threat alert: Matrix, a lone-wolf hacker, is using IoT devices as a botnet to launch widespread DDoS attack.
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
Forwarded from The Hacker News
🔒 INTERPOL’s massive operation across 19 African nations has resulted in over 1,000 arrests and the takedown of 134,000+ malicious networks.
Learn more about how this operation — https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
Learn more about how this operation — https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
Forwarded from The Hacker News
Zero Trust isn’t just a buzzword—it’s a necessity. Zero Trust Network Access (ZTNA) can replace VPNs, reduce lateral movement, and harden existing devices, making them nearly impossible to exploit.
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
Forwarded from The Hacker News
APT-C-60 strikes again – this time with a targeted attack exploiting the WPS Office vulnerability (CVE-2024-7262) to deploy the SpyGlace backdoor.
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
Forwarded from The Hacker News
A new UEFI bootkit called Bootkitty has been discovered, designed specifically for Linux systems—marking a significant shift in the cyber threat landscape.
Read the full analysis — https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
Read the full analysis — https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
Forwarded from The Hacker News
Multi-stage cyberattacks are getting harder to detect and more dangerous than ever. Learn how they trick you into letting your guard down.
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.
Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
Forwarded from The Hacker News
A critical #vulnerability (CVE-2024-11680) in the ProjectSend file-sharing app is being actively exploited.
It allows attackers to execute malicious code on vulnerable servers.
Don’t wait for an attack—patch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
It allows attackers to execute malicious code on vulnerable servers.
Don’t wait for an attack—patch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
Forwarded from It's FOSS
elementary OS 8 is finally here with nifty changes! 🔥
https://news.itsfoss.com/elementary-os-8-release/
https://news.itsfoss.com/elementary-os-8-release/
It's FOSS News
elementary OS 8 is Finally Here for its Hardcore Fans
elementary OS 8 is a modest upgrade with nifty features. Would you like it? Take a look at what it offers.
Forwarded from It's FOSS
Turn your Vim editor into Super Vim with the use of plugins
https://linuxhandbook.com/install-vim-plugins/
https://linuxhandbook.com/install-vim-plugins/
Linux Handbook
How to Install and Use Vim Plugins
Vim's functionality can be extended with plugins. Here is how you can install and use plugins in Vim. Also learn about updating and removing the plugins.
Forwarded from ATT • Tech News (Agam)
Microsoft may train its AI on everything you type in Word and Excel
Microsoft Office has a Connected Experiences feature which reportedly allows the company to use user-created content in Word and Excel to train AI models, which means that Office may analyze articles, artwork and documents by default, without asking for user consent.
Along with that, according to Microsoft's Services Agreement, by using their products, you grant Microsoft a global, royalty-free license to use your content for providing services, ensuring security, and improving their products, including storing, sharing, and displaying it.
However, Microsoft denied the accusations:
🔗 Winaero
👨💻 @agamtechtricks
Microsoft Office has a Connected Experiences feature which reportedly allows the company to use user-created content in Word and Excel to train AI models, which means that Office may analyze articles, artwork and documents by default, without asking for user consent.
Along with that, according to Microsoft's Services Agreement, by using their products, you grant Microsoft a global, royalty-free license to use your content for providing services, ensuring security, and improving their products, including storing, sharing, and displaying it.
However, Microsoft denied the accusations:
In the M365 apps, we do not use customer data to train LLMs. This setting only enables features requiring internet access like co-authoring a document.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Treble GSI's | Privacy + Secure
Wattesigma?🗿
A skibidi browser made for sigmas. Built on the goofy ahh Godot game engine, and powered by the max level of gyatt of CEF (Chromium Embedded Framework). It has also lots of brain-rot features.
🔗 Links:
- Download (only for Windows)
- Preview (Also check his yt Video for more details)
- Discord Server
- Compiling Guide
- Source Code
Developer / Youtuber : FaceDev (YT Channel / Github)
🏷 Tags: #Windows #Browser
A skibidi browser made for sigmas. Built on the goofy ahh Godot game engine, and powered by the max level of gyatt of CEF (Chromium Embedded Framework). It has also lots of brain-rot features.
🔗 Links:
- Download (only for Windows)
- Preview (Also check his yt Video for more details)
- Discord Server
- Compiling Guide
- Source Code
Developer / Youtuber : FaceDev (YT Channel / Github)
🏷 Tags: #Windows #Browser
Forwarded from Treble GSI's | Privacy + Secure
From kaii the EverestOS maintainer comes this new gallery App 😉