To build a MacBook Pro for the future, the company has gone back to what worked in the past.
Category: Tech news
hacking,system security,protection against hackers,tech-news,gadgets,gaming
Everything Apple Announced Today—Including a New MacBook Pro
Say hello to machines with plenty of ports, MagSafe charging, and a refreshed pair of AirPods.
Down With Dongles! Apple Brings Back the MacBook Ports
With the return of MagSafe charging, HDMI, and an SD card slot, you should finally be able to connect things to the latest MacBooks.
A New Credit Card Arrives—With a Silicon Valley Twist
The X1 is designed for spenders who are young, high-earning, and live on their phones.
21 Great Wireless Chargers to Refuel Your Phone (or Watch)
Stop fumbling for cables in the dark. These WIRED-tested stands and pads will take the hassle out of recharging your iPhone or Android phone.
The Facebook Whistleblower Won’t Change Anything
Whistleblowing has turned into a secular form of confession that keeps the limelight on one person instead of the movements already doing the work.
The Dell XPS 15’s OLED Screen Lets You Make Movie Magic
The upgraded OLED screen and faster processors turn Dell’s latest 15-inch laptop into a portable, video-editing powerhouse.
Just Switched to iPhone? Here Are 8 Tips to Get You Started
Welcome to the Dark Side. We have Memoji.
People Should Drink Way More Recycled Wastewater
Filtration technology produces water so pure, it would actually harm you if they didn’t put minerals back into it.
Virtual Museums Challenge the Art World’s Status Quo
Lack of access to physical galleries opened people’s eyes to digital possibilities. Will they revolutionize how we interact with art—or just be a placebo?
How to Switch From Google Authenticator to Another 2FA App
Yes, you can choose another two-factor authentication app without getting locked out of your accounts.
Watch Apple’s ‘Unleashed’ event live right here
Apple is set to announce new hardware today. The company is holding a (virtual) keynote at 10 AM PT (1 PM in New York, 6 PM in London, 7 PM in Paris). And you’ll be able to watch the event right here as the company is streaming it live.
Rumor has it that the company is set to announce some new Macs. Over the past year, Apple has updated its entry-level computers with new custom-designed M1 chips. And now, the company could bring its own chips to higher-end computers, such as a 14-inch and 16-inch MacBook Pro, a new Mac Mini and a 27-inch iMac.
Apple could use this opportunity to redesign its laptops from the ground up with new display technologies, a new array of ports and a new form factor in general. But that’s not all. Apple has also been working on an updated version of its entry-level AirPods.
You can watch the livestream directly on this page, as Apple is streaming its conference on YouTube.
If you have an Apple TV, you can open the TV app and look for the ‘Apple Special Event’ section. It lets you stream today’s event and rewatch old ones.
And if you don’t have an Apple TV and don’t want to use YouTube, the company also lets you livestream the event from the Apple Events section on its website. This video feed now works in all major browsers — Safari, Mozilla Firefox, Microsoft Edge and Google Chrome.
Source: Tech crunch
China Could Be Exploiting Internet Security Process to Steal Data, Cyber Experts Warn
To access the data of unsuspecting users, the Chinese Communist Party (CCP) could take advantage of a universal authentication process that is believed to be secure but may not actually be, cybersecurity experts warned, although encryption is still the preferred method of protecting digital data and Protection of computers – in some cases, the same digital certificates used for internet authentication allow the Chinese regime to infiltrate and wreak havoc on various computer networks, they said.
Digital certificates that verify the identity of a digital entity on the Internet. A digital certificate can be compared to a passport or driver’s license, according to Andrew Jenkinson, CEO of cybersecurity company Cybersec Innovation Partners (CIP) and author of the book Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber ??Warfare.
“Without it, the person or device you are using may not meet industry standards, and the encryption of critical data could be bypassed so that what should be encrypted remains in plain text,” Jenkinson told The Epoch Times Used to Encrypt internal and external communications that prevent a hacker, for example, from intercepting and stealing data. But “fake certificates” or invalid certificates can tamper with any data.
Sense of security, “said Jenkinson. Cybersecurity firm Global Cyber ??Risk LLC said digital certificates are generally issued by trusted CAs and then the same level of trust is passed on to intermediaries However, there are opportunities for a communist entity, malicious actor, or other untrustworthy entity to issue certificates to other “hideous people” who appear trustworthy but are not, he said.
“If you issue a certificate from a trusted authority, you will trust it,” said Duren. “But what the issuer could actually do is pass that trust on to someone who shouldn’t be trusted. Duren said he would never trust.” a Chinese certification authority for this reason, stating that it is aware of a number of companies that have banned Chinese certificates because they were issued to untrustworthy agencies.
Jenkinson said that Chinese certification bodies make up a small portion of the overall industry and the certificates they issue are generally limited to Chinese companies and products.
Prince, a member of the hacking group Red Hacker Alliance who declined to give his real name, uses his computer at their office in Dongguan, Guangdong Province, China, on Aug. 4, 2020. (Nicolas Asfouri/AFP via Getty Images).
In 2015, certificates from China Internet Network Information Center (CNNIC), the state agency overseeing domain name registration in China, were challenged. Mozilla revoked CNNIC certificates because it knew of unauthorized digital certificates associated with multiple domains. Both Internet companies opposed CNNIC delegating its authority to issue certificates to an Egyptian company that issued the unauthorized certificates. According to Jenkinson, CNNIC certificates were banned because they had “back doors”.
A back door means that [the Chinese certification body] could literally take administrative access and send data back to the mothership, ”he said. Since 2016, Mozilla, Google, Apple and Microsoft have also blocked the Chinese certification authorities WoSign and their subsidiary StartCom due to unacceptable security practices.Vulnerability Despite these bans on Chinese digital certificates in recent years, the CCP has not been deterred and has long-term gambling, Jenkinson said, referring to an alarming discovery by his cybersecurity firm two years ago that it was a multinational consulting firm.
Digital certificates are typically valid for a few years depending on the certification authority, and a renewal is required to keep them valid and keep the data they are supposed to protect secure, he said. “But in 2019, CIP Chinese discovered certificates that had been valid for 999 years,” Jenkinson said. His company made this discovery by researching the laptops of a leading global consulting firm.
Jenkinson made the company aware of the vulnerability and offered, “They are either incredibly accommodating or complicit,” he said, noting that the company’s customers include government agencies.This multi-billion dollar company’s failure to fix this problem means hundreds of thousands of people could be exposed to Chinese infiltration through the company’s lax safeguards, Jenkinson said. The company engages its customers every time someone uses one of its laptops, he said.
Companies or customers who use the company’s services could be held for ransom, they have their intellectual advantages
Pokémon Unite: Best Pikachu Build (Tips, Items, & Moves)
Using a combination of moves and items, players can maximize Pikachu’s build in Pokémon Unite. Players will need to fight both wild Pokémon and those on the opposing team to score points and win. As an Attacker Pokémon, a well-built Pikachu can work great for an offensive, ranged strategy.
With 5-on-5 matches between trainers, and wild Pokémon in each stage, a well-rounded, carefully built team will be vital for success. Players just getting started in Pokémon Unite may need to test different skills in order to find the best build. Having a strong offensive Pokémon will help players knock out their opponents and collect their Aeos energy to score points. As Pikachu gains experience, more moves will become available, and it can become a powerful fighter.
Each Pokémon in the game, such as Pikachu or Gengar, has an ideal build. Pikachu is a Ranged Attacker class in Pokémon Unite, so it can deal high damage but has low endurance. Focusing on moves and items that maximize damage and utilize Pikachu’s stun abilities will create the best build for this character. Players can also equip items that compliment or increase Pikachu’s strengths and damage output.
There are two ways for players to obtain Pikachu in Pokémon Unite: they can either choose it as their first Pokémon upon completing the tutorial or purchase it from the Unite Battle Committee. Pikachu costs 6000 Aeos coins or 345 Aeos gems. Once obtained and leveled up, players can focus on using the right moves and items to capitalize on Pikachu’s offensive potential. Pokémon can have two moves active and three items equipped at a time. The best options for Pikachu appear below.
Pikachu’s Best Moveset
- Thunderbolt: Charge and shoot a bolt of lightning that stuns and damages opponents in the area. Upgrade Thunderbolt to increase the damage dealt.
- Electro Ball: Throw an electric orb that damages and stuns enemies in the area of effect. Missing HP will increase damage to opponents. Electro Ball can be upgraded to increase damage.
Best Held Items for Pikachu
- Wise Glasses: Increase Special Attack
- Choice Specs: Increase the damage of moves
- Buddy Barrier: When using the Unite move, Pikachu and the nearby ally with the lowest HP will gain a shield
- Alternative – Float Stone: Increase movement speed when Pikachu isn’t in combat
Best Battle Items for Pikachu
- X-Attack: Boost the damage of attacks and special attacks
- Alternative – Potion: Restore a Pokémon’s health.
Using a strong combination of moves and items will help players gather Aeos energy and score points. While using Pikachu, players should focus on dealing as much damage as possible while being aware of their health loss. Since Pikachu is also a Ranged Pokémon, it’s recommended that players keep their distance when possible to avoid being knocked out. Pikachu can stay near a Defender Pokémon for extra protection and stun enemies that come within range.
A Sinister Six Movie Should Copy Spider-Man: No Way Home & Bring In Miles
Sony’s upcoming Sinister Six movie should take some inspiration from Spider-Man: No Way Home and introduce a new version of Miles Morales. Sony has had plans for a Sinister Six film since The Amazing Spider-Man film franchise was in progress. The second film, The Amazing Spider-Man 2, ended with a clear setup for the villain team, with the Green Goblin (Harry Osborn) and The Gentleman (Gustav Fiers) equipping allies (and possibly members) of Oscorp with advanced weapons and devices. The plans, unfortunately, never came to fruition, but Sony’s new villain-focused Spider-Man universe, which began with 2018’s Venom, has led to new plans for the iconic team.
Miles Morales – whose comic debut was in 2011’s alternate universe Ultimate Comics: Spider-Man – is his reality’s second web-slinger, taking Peter Parker’s place after his apparent death in a final confrontation with the Green Goblin. Miles and his stories were well-received, quickly growing in popularity among readers, and he made his cinematic debut in 2018’s animated film, Spider-Man: Into the Spider-Verse. As the star of numerous comics, an animated film, and a recent video game, it won’t be long before Miles has his long-awaited live-action debut.
With Sinister Six reportedly being the endgame of Sony’s Spider-Man films, it’s reasonable to assume that the movie will be a crowd-pleasing epic with more than one payoff. Sony will reportedly work alongside Marvel Studios to tie their film in with the MCU, meaning that Tom Holland’s classic Peter Parker Spider-Man may face off against the six villains. Although Spider-Man was often on his own against the six in the comics, the film can easily justify introducing a second Spider-Man to even the odds and give viewers a live-action Miles Morales simultaneously.
Not only is Sony and Marvel Studious working together on the Sinister Six film, but the multiverse will be unleashed in the upcoming No Way Home. While the Miles Morales who appears in the Sony film could be their iteration, he might alternatively be from the MCU, creating a new kind of character dynamic for Tom Holland’s Spider-Man, who’s typically mentored by characters like Iron Man or Doctor Strange.
The Sinister Six’s villain roster can be comprised of characters from multiple realities as well. In addition to introducing the first live-action iteration of Miles Morales, the film can bring back actors like Alfred Molina, Jamie Foxx, and Willem Dafoe for yet another performance. With No Way Home bringing the iconic villains back, Sony could take advantage of their fan-favorite status, adding to the already crowd-pleasing introduction of Miles.
Spider-Man: No Way Home will be the first live-action Spider-Man movie to use the multiverse for crossovers. In addition to bringing back characters from bygone film eras, they’ve also allowed for interaction with Sony’s Spider-Man universe. If Sony intends to make the Sinister Six film their franchise’s endgame, they’d make it an even more effective grand finale by bringing in Miles Morales.