Samsung showed off the newest models of its fancy foldable phone lineups on Wednesday, in a continuation of its efforts to take bendable phones to the mainstream. The Unpacked event, were revealed alongside the Galaxy Watch 5 and . The Galaxy Fold 4 and Z Flip 4 will launch on Aug. 26, when they will start at $1,800 (£1,649, AU$2,499) and $1,000 (£999, AU$1,499), respectively — the same price as each of their predecessors.and , announced at the company’s annual
While both phones have a foldable design, the specific look and feel is different for each. The Z Flip 4 is a clamshell-style flip phone popularized by Motorola’s Razr. It’s compact, nostalgically cool and it targets online content creators, among other demographics. The Z Fold 4, on the other hand, is Samsung’s heftier book-style foldable. It’s nearly double the height of the Z Flip 4 when both are folded “closed.” When unfurled, Z Fold 4 expands into a tablet-sized interior screen that Samsung says is a powerful tool for multitasking, which is given a boost by 12GB of RAM.
With the Z Fold 4’s larger size (and higher price), comes a corresponding set of features. There are three rear cameras including a telephoto lens, compared with just two on the Z Flip 2. The Z Fold 4 also manages to cram in a larger battery. Their front displays are different, too. The Z Flip 4 has a petite display on the lower portion of the cover, which Samsung has made more useful with this iteration. The Z Fold 4’s display is nearly the size of a regular phone screen.
Despite their physical differences, perhaps Samsung’s biggest flex was software, and the changes affected both new models. Like the Z Fold 4, the Flip 4 gets the bottom-screen trackpad feature in its Flex Mode — that’s the feature that splits apps between top and bottom portions of the screen when it’s folded halfway. With the updates, you’ll be able to use the bottom half of the screen as a trackpad for navigating the top portion of the screen, supposedly making it easier to manipulate apps in Flex Mode.
Each model also receives nighttime photography improvements that were launched with the Galaxy S22, including night portrait-mode photos. These changes seem to underscore Samsung’s efforts to convince shoppers to switch to a foldable phone — or at the very least generate some interest in one.
For more information on how the Z Flip 4 stacks up against the Z Fold 4, take a look at CNET’s specs chart below for a side-by-side comparison.
Z Fold 4 vs. Z Flip 4
|Galaxy Z Fold 4 5G||Galaxy Z Flip 4|
|Display size, resolution, aspect ratio||Internal: 7.6-inch AMOLED (2176 x 1812 pixels) External: 6.2-inch HD Plus (2,316 x 904)||Main Screen: 6.7-inch FHD+ (2,640 x 1080 pixels; 22:9) Cover Screen: 1.9-inch (260×512 pixels)|
|Dimensions (Millimeters)||Folded: 67.1×155.1×15.8mm (Hinge) ~14.2mm (Sagging). Unfolded: 130.1×155.1×6.3mm||Folded: 71.9×84.9×17.1mm (Hinge) ~15.9mm (Sagging). Unfolded: 71.9×165.2×6.9mm|
|Weight (Ounces, Grams)||9.27 oz; 263g||187g; 6.59 oz|
|Mobile software||Android 12L||Android 12|
|Camera||50-megapixel (main), 12-megapixel (ultra-wide), 10-megapixel (telephoto)||12-megapixel (main), 12-megapixel (ultra-wide)|
|Front-facing camera||4-megapixel (under display), 10-megapixel (front cover)||10-megapixel|
|Processor||Snapdragon 8 Gen Plus 1||Snap 8 Plus Gen 1|
|RAM/Storage||12GB + 256GB/512GB/1TB||8GB+ 128GB/256GB/512GB|
|Battery/Charger||4,400 mAh||3,700 mAh|
|Special features||Foldable phone, 30x optical, 30x space zoom, IPX8, 25-watt fast-charging (no in-box charger)||IPX67, 5G enabled, foldable display, wireless charging, 25W fast charging|
|Price (USD)||$1,800 (256 GB); Pricing for other models TBC||$999|
|Price (GBP)||£1,649 (256GB)||£999|
|Price (AUD)||AU$2,499 (256GB)||AU$1,499|
New Microsoft Security Alert: State-Sponsored 0Day Exchange Server Attacks Confirmed – Forbes
Microsoft confirmed on September 30 that it is investigating two zero-day vulnerabilities that impact Exchange Server 2013, 2016 and 2019. Between them, there are more than 200,000 installations in businesses worldwide. Microsoft goes on to warn that a single, likely state-sponsored, threat group has been confirmed as exploiting both vulnerabilities by chaining them together. Microsoft adds that the CVE-2022-41040 and CVE-2022-41082 chain attacks have facilitated “hands-on-keyboard access, which the attackers used to perform Active Directory reconnaissance and data exfiltration.” While Microsoft says, it has observed these attacks against ten organizations so far, given the Exchange Server user base and the fact that the vulnerabilities are now known, the potential for further attacks is great.
The risk is significant
As such, Mike Walters, the vice-president of vulnerability and threat research at Action1, has warned that “the risk from these zero-days is significant” to many SME and enterprise companies with “vast amounts of critical data.” Security Researchers at GTSC initially disclosed that attacks were underway.
CVE-2022-41040 is a Server-Side Request Forgery (SSRF) vulnerability, while CVE-2022-41082 enables remote code execution (RCE) via PowerShell. The former is being used to trigger the latter in a chain exploit if the attacker is authenticated at the user level in Exchange Server.
CISA advises Exchange Server users and admins to act now
Indeed, the Cybersecurity & Infrastructure Security Agency (CISA) has issued a statement urging both users and administrators to apply mitigations while awaiting an official patch from Microsoft. Microsoft is working on releasing this as soon as possible, although a timescale has not yet been given. Microsoft has further confirmed that this impacts on-premise Exchange Server installations, and Exchange Online users are unaffected by the vulnerabilities.
Microsoft has released a script for on-premise users that will mitigate the exploited SSRF vector and has released an automatic URL rewrite mitigation for users of the Exchange Server Emergency Mitigation Service.
Google Stadia Will Shut Down in 2023, All Purchases to Be Refunded – CNET
Cloud gaming service Google Stadia will shut down on Jan. 18, the search giant said in blog post Thursday. Google will refund all Stadia hardware purchased through its Google Store, along with all games and add-on content purchased from the Stadia store.
The tech giant aims to have all the refunds completed by mid-January.
People using Stadia will still to be able to access to their game libraries, including Pro games if you had an active Pro subscription as of Thursday. In an email sent to players, Google warned that publisher support for games may vary, and it’s possible that your gameplay experience may be affected during the shut-down period (suggesting that some games could vanish or lose features early).
It appears that Google didn’t tell many developers about the shut-down prior to the public blog post. coming up with “a plan of action” in the wake of the announcement. developer Ubisoft intends to allow players who’ve bought its games on Stadia to bring them to PC through its Ubisoft Connect digital distribution service, it said Friday.tweeted on Thursday about
Explaining the move, Stadia vice president and general manager Phil Harrison noted Google’s investments in gaming through its Google Play digital distribution service, its cloud tech and YouTube streaming.
“A few years ago, we also launched a consumer gaming service, Stadia,” he said in the blog post. “And while Stadia’s approach to streaming games for consumers was built on a strong technology foundation, it hasn’t gained the traction with users that we expected so we’ve made the difficult decision to begin winding down our Stadia streaming service.”
Many employees on the Stadia team will be reassigned to other roles within Google, the blog post noted.
The cloud gaming service launched in November 2019, to a mixed reception.
“Stadia isn’t delivering new games [at the moment], it’s just trying to deliver a new way to play through streaming. One that you can already get from other providers,” CNET’s Scott Stein wrote at the time. “Until Google finds a way to loop in YouTube and develop truly unique competitive large-scale games, Stadia isn’t worth your time yet.”
Despite having some, Stadia failed to evolve. Google in 2021, hinting that its gaming ambitions were shifting away from Stadia.
Stadia also had plenty of Nvidia and all offering alternatives., with , ,
It hasn’t been a total bust for the company, with Harrison saying the tech can be applied to YouTube, Google Play and its augmented reality projects.
That tech will also be made available to Google’s industry partners. Sony gave its own streaming service a headstart in 2015 by— an — shortly before the once-promising startup shut down.
High-severity Microsoft Exchange 0-day under attack threatens 220,000 servers – Ars Technica
Microsoft late Thursday confirmed the existence of two critical vulnerabilities in its Exchange application that have already compromised multiple servers and pose a serious risk to an estimated 220,000 more around the world.
The currently unpatched security flaws have been under active exploit since early August, when Vietnam-based security firm GTSC discovered customer networks had been infected with malicious webshells and that the initial entry point was some sort of Exchange vulnerability. The mystery exploit looked almost identical to an Exchange zero-day from 2021 called ProxyShell, but the customers’ servers had all been patched against the vulnerability, which is tracked as CVE-2021-34473. Eventually, the researchers discovered the unknown hackers were exploiting a new Exchange vulnerability.
Webshells, backdoors, and fake sites
“After successfully mastering the exploit, we recorded attacks to collect information and create a foothold in the victim’s system,” the researchers wrote in a post published on Wednesday. “The attack team also used various techniques to create backdoors on the affected system and perform lateral movements to other servers in the system.”
On Thursday evening, Microsoft confirmed that the vulnerabilities were new and said it was scrambling to develop and release a patch. The new vulnerabilities are: CVE-2022-41040, a server-side request forgery vulnerability, and CVE-2022-41082, which allows remote code execution when PowerShell is accessible to the attacker.
“At this time, Microsoft is aware of limited targeted attacks using the two vulnerabilities to get into users’ systems,” members of the Microsoft Security Response Center team wrote. “In these attacks, CVE-2022-41040 can enable an authenticated attacker to remotely trigger CVE-2022-41082.” Team members stressed that successful attacks require valid credentials for at least one email user on the server.
The vulnerability affects on-premises Exchange servers and, strictly speaking, not Microsoft’s hosted Exchange service. The huge caveat is that many organizations using Microsoft’s cloud offering choose an option that uses a mix of on-premises and cloud hardware. These hybrid environments are as vulnerable as standalone on-premises ones.
Searches on Shodan indicate there are currently more than 200,000 on-premises Exchange servers exposed to the Internet and more than 1,000 hybrid configurations.
Wednesday’s GTSC post said the attackers are exploiting the zero-day to infect servers with webshells, a text interface that allows them to issue commands. These webshells contain simplified Chinese characters, leading the researchers to speculate the hackers are fluent in Chinese. Commands issued also bear the signature of the China Chopper, a webshell commonly used by Chinese-speaking threat actors, including several advanced persistent threat groups known to be backed by the People’s Republic of China.
GTSC went on to say that the malware the threat actors eventually install emulates Microsoft’s Exchange Web Service. It also makes a connection to the IP address 137[.]184[.]67[.]33, which is hardcoded in the binary. Independent researcher Kevin Beaumont said the address hosts a fake website with only a single user with one minute of login time and has been active only since August.
The malware then sends and receives data that’s encrypted with an RC4 encryption key that’s generated at runtime. Beaumont went on to say that the backdoor malware appears to be novel, meaning this is the first time it has been used in the wild.
People running on-premises Exchange servers should take immediate action. Specifically, they should apply a blocking rule that prevents servers from accepting known attack patterns. The rule can be applied by going to “IIS Manager -> Default Web Site -> URL Rewrite -> Actions.” For the time being, Microsoft also recommends people block HTTP port 5985 and HTTPS port 5986, which attackers need to exploit CVE-2022-41082.
Microsoft’s advisory contains a host of other suggestions for detecting infections and preventing exploits until a patch is available.
Jaded, cynical, disillusioned: report says federal whistleblowers fear reprisal
Former MPs find new paths and purpose after politics – CBC News
At 18, I only recently realized the importance of community engagement and politics – CBC.ca
Silver investment demand jumped 12% in 2019
Europe kicks off vaccination programs | All media content | DW | 27.12.2020 – Deutsche Welle
Global Media Markets, 2015-2020, 2020-2025F, 2030F – TV and Radio Broadcasting, Film and Music, Information Services, Web Content, Search Portals And Social Media, Print Media, & Cable – GlobeNewswire
Media22 hours ago
Brock Media Clips for Friday, Sept. 30 – The Brock News – Brock University
Health21 hours ago
Human Brain Project researchers identify new marker of ALS outcome – Medical Xpress
Business19 hours ago
Lululemon settles lawsuit with Peloton over allegations of ‘copycat’ clothing
Science19 hours ago
See NASA's DART Asteroid Crash Through the Lens of Webb, Hubble Telescopes – CNET
Tech19 hours ago
Apple iPhone 14 Pro achieves top DxOMark scores for selfie camera and video performance
Business18 hours ago
Ontario Securities Commission files allegations of fraud in multimillion-dollar crypto offering – CP24
Media21 hours ago
LETTER: Hughes has shown 'disregard' for residents, media – OrilliaMatters
News21 hours ago
Liberals to launch Indo-Pacific strategy this year, shaped by looming China assembly