Blog

Twitter’s new reply layout for iOS makes conversations easier to follow

[ad_1]

A line will connect your parent tweet with theirs, so you know they’re responding to you in particular, and their tweets will also be slightly indented. Twitter started testing the visual tweak in its “Twttr” beta program last year, but now it’s apparently ready for the big time.

As Twitter said in its announcements, the “new layout makes it easier to see who’s replying to who.” While the feature is only making its way to iOS devices right now, it won’t be exclusively available to iPhone users. When asked why the feature was only launching for Apple’s mobile platform, the company replied that the new layout “will come to Android soon.”



[ad_2]

Source link

Roku and Fox cut a deal in time for Super Bowl LIV streaming

[ad_1]

A few days ago, Roku sent out an email to customers informing them that Fox standalone apps would go away after January 31st due to an expiring distribution agreement. That might make it a little harder and more complicated to watch the Super Bowl via streaming this weekend, and certainly more difficult to watch the 4K stream Fox will distribute via its apps.

But tonight Roku informed Engadget that they have reached an agreement. So that means as long as you’re able to load up the apps and login with cable or other TV credentials, the Fox Now and Fox Sports apps will work just as well as the NFL and other streaming options on Roku.

[ad_2]

Source link

Hulu CEO steps down as it integrates with Disney’s streaming plans

[ad_1]

Now that Hulu is part of Disney’s streaming triumvirate with ESPN+ and Disney+, there’s a reorganization at the top and Randy Freer will step down from his role as CEO. He took over in late 2017, but now it will join the others under direct oversight from Disney Direct-to-Consumer & International chairman Kevin Mayer. We’ll see what changes come in the future for Hulu, as it previously stood alone as a rival to Netflix, but now is a part of a larger strategy.

Disney CEO Bob Iger already announced plans for “FX on Hulu” programming that’s overseen by FX boss John Landgraf, which came after Disney pulled the plug on a standalone FX streaming service. The Hollywood Reporter point out that Hulu’s scripted original shows are overseen by Disney TV Studios chairman Dana Walden, while Deadline reports it’s expected to hire a business leader to oversee the division.

[ad_2]

Source link

FCC: Wireless carriers violated federal law by selling location data

[ad_1]

Back in 2018, it came to light that carriers sell their customers’ real-time location data to aggregators, which then resold it to other companies or even gave it away. Last year, a Motherboard report also revealed that bail bond companies and bounty hunters have been buying people’s location data for years, allowing them to use that information to track their targets.

All four major US carriers promised to stop selling customer location data to aggregators after the information first came out. The companies made good on their word, though it took them a year to do so: They informed FCC Commissioner Jessica Rosenworcel that they had already halted sales to aggregators after she requested for an update in 2019.

Pallone said in a statement:

“Following our longstanding calls to take action, the FCC finally informed the Committee today that one or more wireless carriers apparently violated federal privacy protections by turning a blind eye to the widespread disclosure of consumers’ real-time location data. This is certainly a step in the right direction, but I’ll be watching to make sure the FCC doesn’t just let these lawbreakers off the hook with a slap on the wrist.”

Rosenworcel, who repeatedly brought the issue up over the past years, also said that it was a “shame that it took so long for the FCC to reach a conclusion that was so obvious.” Especially when “shady middlemen could sell your location within a few hundred meters based on your wireless phone data.”

We’ve reached out to AT&T, Verizon, T-Mobile, Sprint and CTIA, the trade group representing the wireless communications industry in the US, for a statement.

[ad_2]

Source link

This is the production version of Tesla’s Model Y

[ad_1]

We first met the prototype Model Y crossover last year, and this week during the company’s earnings call, Elon Musk said deliveries of the vehicle will start in March. In the documents released (PDF), Tesla also showed off this picture of the car’s production version, along with a few shots of the production line.

There aren’t any drastic changes — no redesign to add the Model X’s Falcon Wing doors — but the nose looks slightly different. As Electrek notes, it also confirms that the “chrome delete” look some owners have opted for, stripping flashy parts from the trim will be standard on the Model Y. We also don’t expect it to lose the acceleration displayed during our one brief ride in the Model Y, and as we heard on the call, the expected range of an AWD vehicle has increased from 280 miles to 315.

[ad_2]

Source link

RED’s Hydrogen One phone makes a cameo in the ‘F9’ trailer

[ad_1]

F9

It’s not shocking that people in the movie business would have an affinity for the high-priced but ultimately disappointing project, since they’re likely to work with the company’s cameras. Still, this isn’t the only recent appearance of the Hydrogen One, more than a year after it debuted and months after RED announced it would abandon the phone business.

Marvel’s Runaways wrapped up its run at the end of 2019, and while that show has also come to an end — now that the Fox/Disney/MCU merger has completed — it also featured the Hydrogen One. In that show they called it the Corvus Phone by Wizard that would help people “find their flock” (shocker: it’s evil), but as PC Mag points out, there’s no mistaking which device it is. I guess in a fantasy universe the Hydrogen One works as a strange-but-recognizable device that most people don’t know exists, and there are probably more than a few unused handsets laying around.

F9



[ad_2]

Source link

Wizards of the Coast teams with ex-BioWare devs on a sci-fi RPG

[ad_1]

The good news is that leading the developer are two former BioWare employees: James Ohlen and Chad Robertson. Ohlen worked as the creative director and lead designer on some of Bioware’s most beloved titles, including Baldur’s Gate, Dragon Age, Neverwinter Nights and Star Wars: Knights of the Old Republic. Wizards of the Coast first announced Ohlen’s hiring last April. He will serve as the head of the studio.

Robertson, meanwhile, comes from BioWare Austin, the studio EA established to create Star Wars: The Old Republic. According to Polygon, his most recent role involved heading up live services for Anthem, BioWare’s poorly-received loot shooter. Robertson will manage the studio and act as its vice-president.

While we don’t know Archetype’s current headcount, based on the fact the studio is hiring for positions like art director, lead character artist and lead gameplay engineer, its first game is likely years away. In the meantime, Wizards of the Coast has Larian Studios, another developer with a strong pedigree, working on Baldur’s Gate 3. The sequel will probably launch before Archetype’s first game.

[ad_2]

Source link

Vine successor Byte will share all its ad revenue to lure early creators

[ad_1]

The money for the pool will come from ads, but Byte stressed that you won’t see pre-rolls, mid-feed ads or retargeting. The pilot phase of the program will funnel all of the ad revenue to Partner Program members, although that’s clearly going to change once the effort launches in earnest.

Don’t expect to start making a living as a Byte influencer for a while. The pilot is due to start in the US in 60 to 90 days, and it’ll be invitation-only at first. The company is promising “multiple ways” to help creators get paid, though, so you may have other ways to rake in cash if and when you hit the big time. The challenge, of course, is building up Byte in the first place. It’s still soon to know if Byte will recreate Vine’s heyday and lure people away from the likes of Instagram or TikTok, or meet the untimely fate of many other social media apps.

[ad_2]

Source link

Lyft expands free voter rides to all US primaries

[ad_1]

The company is promising more details on plans to improve voter access and “other forms of civic engagement” later in the year.

This is partly a promotional vehicle, of course Along with other LyftUp projects like Disaster Response and Grocery Access, it’s as much about polishing Lyft’s image as it is caring for people in need. At the same time, there’s little doubt that this and rival programs like Uber’s could play important roles in turning out the vote. Lyft pointed to data suggesting that 15 million potential voters in 2016 didn’t go “in large part” because they couldn’t get to polling locations. If ridesharing companies and their partners can draw enough attention to these programs (and that’s a big “if”), they might increase participation — particularly for low-income and carless people who might have a harder time casting their votes.

[ad_2]

Source link

Phishing scams leveled up, and we didn’t

[ad_1]

In case you missed it, on January 22nd The Guardian reported, “Amazon billionaire Jeff Bezos had his mobile phone ‘hacked’ in 2018 after receiving a WhatsApp message that had apparently been sent from the personal account of the crown prince of Saudi Arabia.”

According to the now-contested report by FTI Consulting cited by The Guardian, that was in April. I was curious enough to notice that the “hey boi r u up” texts between Crown Prince Mohammed bin Salman and Jeff Bezos were exchanged before Jamal Khashoggi was murdered in October of that same year.

Questions, we have them. But Khashoggi’s name is hard to find in the wider reporting about Bezos’ iPhone — which has been a mess from the start. Instead, a former Facebook security pundit and at least one actual researcher snatched the spotlight to say FTI’s report was lacking in facts.

Amazon Smartphone

The self-appointed infosec “adults in the room” weren’t wrong. But it was a pedantic and selfish distraction from anything that mattered about the whole affair.

Normal people read about the maybe hacking of Bezos’ phone and shrugged. He can afford the best security on the planet. Saudi Arabia’s Prince Claus von Bonesaw is a monster. Everyone’s getting hacked, especially us peasants. These are all things we know.

What we also know is that the supposed phone hack came via an attachment. And if the hack happened, an attachment was clicked. It’s the same way the City of Baltimore’s computers and emergency systems at Hollywood Presbyterian Hospital were infected and locked with ransomware. And it’s how consumers are losing identities and accounts from malware, learning how to send Bitcoin to grubby teenage boys in latitudes and longitudes unknown because of ransomware. Click a link. Look at an attachment. Download a file. That’s it. An attacker went phishing, and now you’re on the hook.

All that is from phishing, though what we hear about most are the breaches: attackers grabbing usernames and passwords from breach dumps, then using tools with cutesy names like SNIPR or STORM to automatically try it out on all of your accounts to see what works. Which they do, because Equifax used default passwords on sensitive information, Facebook was so busy lying to everyone it left the barn doors open and the City of New Orleans refused to believe cybersecurity is critical infrastructure.

So much for “the adults in the room.”

I attended a recent hacking conference in San Francisco called Disclosure expecting a lot of the same fresh hells — the “I’m smarter than you” guys competing for attention while alarmed researchers in the background are trying to tell us something’s on fire.

I was not disappointed.

Apropos to what was happening (or not) to Jeff Bezos at that moment, I saw the talk “Initial Public Ownage: Trends in Phishing Techniques Across Sophisticated Threat Actors.” Sounds boring, right? Nope.

According to jaw-dropping data presented by Proofpoint’s Ryan Kalember, phishing is now the No. 1 attack of choice for cybercriminals. “Phishing is attractive for different reasons for the attackers that do have technical skills, because it scales really well,” Kalember told Engadget via email. “The bigger groups, like the threat actor behind Emotet, have built the automation to do social engineering at the scale of millions of messages a day, and are very good are getting their relatively simple attacks (often documents with macros sent via already phished cloud email accounts) through security controls.”

So what, you say? All the adults (who were in the room a minute ago) know not to click strange links to win a free iPad or log in at notgoogle.com or download the attachment from Lisa@FreePills. Who does that? Florida grandmas falling for Nigerian princes, surely.

This thinking is fine and good only under the conceit that getting pwned is for people who aren’t as smart as you or that the cliques running security for your email clients have perfected their specious and occult magics of marking suspicious emails with big, fat, red DANGER warnings. The adults have it under control, you think. Gosh, there must be a lot of dumb people, you muse.

Turns out, you’re pretty wrong on both counts.

If you got an email from a law firm saying “divorce papers” and it was a real law firm and the email contained a link to a document on that website, you’d probably have a very emotional reaction and click it. Kalember saw numerous examples and brought receipts.

Bad Password

“In general,” Kalember explained to Engadget, “the sneakiest phishes are highly socially engineered and customized for a specific intended recipient. The best example is a complaint about a specific person, sent to that person, which threatens to email (or even directly cc’s) their manager. That said, we’ve seen threat actors use everything from fake food poisoning complaints, Greta Thunberg pledges, and Christmas party invites in just the last couple of months, so there’s no shortage of innovation.”

Right now around 1.3 million phishing operations reside illicitly on around 300,000 URLs. Ultimately it means many of us will be hacked/attacked because someone else’s website security sucks.

So are all those WordPress hacks and vulns adding up or what? Kalember told us, “Compromising WordPress and other sites is unfortunately quite common, and it can be challenging for even the most experienced administrators to thoroughly clean as attackers often create layers of access.” Explaining further, he added, “A tremendous amount of malicious content is also hosted on cloud file storage that most networks (and users) have to trust: SharePoint and OneDrive are the biggest offenders at the moment.”

Every website that can be compromised — hacked into — is being used to send legitimate-looking phishing emails, using mail addresses from websites ranging from alpaca farms to law firms to universities.

Yes, actual alpaca farms. “While it’s possible that the North Korean threat actor in question has a sense of humor,” Kalember said, “it was a WordPress site that was vulnerable to an old exploit, so it was probably just opportunistic. From a network perspective, no one is likely to block their users going to alpaca farm websites, so it suits their purposes for command and control of their malware.”

Criminal organizations are compromising legit sites and using those to send legit (and despicably personal) phishing attacks to install malware or ransomware. Often they want to compromise your employer or steal your accounts, because those are extremely valuable for doing more crimes. More to the point, thinking that you’re not a target for any reason (“I’m not that interesting” or “I don’t have followers/money” or “my job is boring”) is going to make you the perfect target.

And looking at infosec trends (which tend toward sensationalism and know-it-alls), there’s a serious lack of adults in the room to watch our backs. Kalember told Engadget, “Simply stated, attackers focus on people, and most defenders don’t. Boosting awareness and email security controls are two practical ways to significantly reduce risk.”

A wise and prophetic TV show called The X-Files once said, “Trust no one.” This has never been truer than now. Rather than panic about every scary email or text message, treat all of your inboxes like your front door: If you’re not expecting a delivery, don’t open the door.

Images: AP Photo/Ted S. Warren (Jeff Bezos); Proofpoint (Malware email)



[ad_2]

Source link