Technology News from Around the World, Instantly on Oracnoos!

This rumored OnePlus Pad 3 upgrade may just put the Samsung Galaxy Tab S10 Ultra to shame - Related to co-developed, security, friday,, review, fujifilm’s

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday April 26, 2024. From Toronto, I’m Howard Solomon.

In a few minutes David Shipley, head of Beauceron Security, will be here to discuss some of the biggest news of the past week. They include the latest developments in the ransomware attack on Change Healthcare, a vulnerability found in an abandoned open source project, the next step in Canadian cybersecurity legislation for overseeing critical infrastructure and the passing in the [website] of a law demanding China’s TikTok become Americanzied.

But before we get to the discussion here’s a review of other headlines from the past seven days:

The Top 10 countries hosting the greatest cybercriminal threats are led by the usual suspects: Russia, Ukraine and China. That’s . Others nations in descending order are the [website], Nigeria, Romania, North Korea, the United Kingdom, Brazil and India. The countries in the Cybercrime Index were ranked on the professionalism and technical skill of resident threat actors. Russia was easily ahead of number two Ukraine by more than 20 points.

A threat actor has been interfering with the software improvement mechanism of the eScan antivirus product. , the goal is to install backdoors and coinminers on corporate IT networks by substituting a maliicous improvement for a real one. Based in India, eScan is also sold in the [website], Latin America, Germany and Malaysia. The vulnerability was supposed to have been fixed last July. Avast says it is still seeing new infections, perhaps because some eScan software on corporate computers hasn’t been updated properly.

Among the continuing problems suffered by the city of Leicester, England from a ransomware attack seven weeks ago is the inability to shut some city street lights. A local news site reports the problem is a residue of having to shut municipal IT systems. The attackers stole and .

Some brands of booze in Sweden may be hard to get hold of this weekend because of a ransomware attack on a liquor distributor, the business has warned.

Pressure from police to block end-to-end encryption on common apps continues. Last week European police chiefs issued a statement urging governments and industry to stop allowing end-to-end encryption of apps and social media platforms. They say it will stop law enforcement from obtaining evidence for criminal charges. Others say end-to-end encryption protects privacy.

A veterinary clinic in Marysville, Kansas is notifying almost 26,000 consumers their data was stolen when the enterprise’s online payments page was compromised. Credit card data was among the information copied earlier this year.

The public school board of Buffalo, New York is notifying just over 19,000 people some of their personal information was seen by a hacker. The incident took place in February when two email accounts were accessed. Names, contact information and Social Security numbers could have been seen.

And the Catholic Diocese of Cleveland is notifying almost 10,000 people that personal data was copied when a hacker compromised an employee’s email account early this year or late last year. Information included names and Social Security numbers. You may recall last Friday I reported that the Catholic Diocese of Phoenix was notifying people of a data breach.

(The following is an edited transcript of the first of four topics in the discussion. For the full discussion play the podcast).

Howard: Joining me now from Fredericton, New Brunswick is David Shipley, CEO of Beauceron Security.

Let’s start with the latest from the February ransomware attack on Change Healthcare, a technology and payments provider to hospitals and clinics across the United States. On Monday parent enterprise UnitedHealth Group acknowledged that data stolen “could cover a substantial proportion of people in America.” That’s short for “this was a huge data breach.” Data stolen included protected health information or personally identifiable information, but not doctors’ charts or full medical histories. In addition, UnitedHealth told TechCrunch that a ransom was paid to the hackers “to do all it could to protect patient data from disclosure.” This lines up with states by an affiliate of the BlackCat/AlphV ransomware gang that Change Healthcare paid US$22 million to the gang — but the gang leaders took all of the money and didn’t pay the affiliate their cut. Meanwhile, a second ransomware gang, RansomHub, is posting data it says is from Change Healthcare. It isn’t clear if that was part of the original data theft or a new hack.

David Shipley: Keep in mind that the previous high water mark for a substantial proportion of the population was the Anthem Blue Cross breach in 2015 in which 80 million people’s records were stolen and resulted in a $117 million dollar class action settlement in which Anthem did not admit any wrongdoing. The attack was allegedly tied to nation-state level espionage and was quite sophisticated. But it was the pre-ransomware cowboy era , not the that we’re in now. So my thoughts are, this one is going to be massive.

Howard: What did you think about the UnitedHealth announcement and this whole ransomware attack — in particular where the AlphV/BlackCat gang seems to have taken all the money and then unveiled they were disbanding?

David: It’s not the first time bad actors have taken the money and run exit scams. I think what we’ve just discovered is number 1, when you cripple the healthcare system to the level that they just did, when you mess with the pharmacy for the [website] military, you start thinking, ‘Maybe it’s time to get out of Dodge.’ Yes, they are probably getting a whole lot of heat. So it made sense. Essentially these are little cockroaches, though. They just scurry they hide and then they reform and they come back again a rebranded group. But there’s still the awfulness.

What I’m dying to know is did UnitedHealth get the [data] unlock keys, because if they [AlphV/BlackCat] stiffed the affiliate and they ran with the money did they at least throw them [United Health] a bone so they can lock their data? Or did they just completely run? Even though healthcare data is the one area where I’ve given a hall pass on [allowing] paying ransoms, I kind of hope they didn’t give them the key because this might finally the nail in the coffin of people thinking, ‘Paying the ransom is the sanest option for our business.’.

Howard: I want to go back to the huge numbers [of potential victims]. This is 2024. Maybe organizations can’t stop every cyber intrusion but shouldn’t IT leaders know enough that that systems have to be segmented so that no more than a small chunk of data can be stolen?

David: I don’t necessarily disagree. But I think what you’re saying presumes that people can accurately simulate or test chains of consequences in the digital environment. That each on their own is not catastrophic. But when combined in very unique ways, boom! What do I mean by that? Let’s just take a story: A server that was in the testing environment that never got switched off on its own, probably not that big of a deal [if it’s compromised]. Take that server and now it’s actually in production, problematic if it’s not getting patched, if it’s being over-provisioned with way too much access. See Microsoft’s recent pain. Think if people knew things like that, where big glaring red alerts are, would they do something about it? They absolutely would act on it. I am completely convinced that we cannot accurately deal with this [cybersecurity] because of cyber chaos theory … We presume with great arrogance that we have control over increasingly complex opaque systems or systems-in-systems and that we can somehow get a handle on all the possible permutations and combinations that can lead to cyber attacks. See Microsoft’s two very painful breaches this year [as evidence] that even the biggest of us can’t do it.

Howard: Also on Monday the Wall Street Journal noted that whoever broke into Change Healthcare used a stolen username and password. That’s still a highly usable weapon [for threat actors].

David: Usernames and passwords have been in play in computing for 50-plus years. Mark my words they will be around for at least another 50 years. Change is hard in technology. Change is even harder in humans. We are not even through the beginning of the end chapter when it comes to passwords. This is why people, process and culture are the root of cyber events, not just technology.

Howard: Next Tuesday, UnitedHealth CEO Andrew Witty is scheduled to testify before a committee of the [website] House of Representatives. They won’t be in a good mood.

David: Grab your popcorn. But also in a certain sense UnitedHealth is paying the price that all of us have incurred by not demanding improved when it comes to cyber hygiene for critical infrastructure, by demanding increasingly digital systems and never anticipating the negative consequences that come from the use of technologies. As a species we have a damn near fatal blind spot when it comes to the risk side of technology. We are so overly hyper-focused on all the benefits all the rewards, all the gains, or all the coolness, of something bright and shiny that we never stop to think, ‘Just because we can do something doesn’t mean we should do something.’.

Howard: And this attack has been hugely expensive for the corporation. Last week UnitedHealth estimated that costs so far for remediating this mess is US$872 million. On top of that, it’s provided billions of dollars in advance funding and no-interest loans to healthcare institutions, their consumers, that were caught short when Change Healthcare systems had to be temporarily closed ….

David: Maybe the best thing that comes from that is that people will invest [in cybersecurity] because you know that $800 million remediation cost? We have a term for that: We call it ‘technical debt’ ….

Howard: What if they had spent, say, $10 million [more] on increased cyber security [before the attack]?

David: The lack of independent, academic peer-reviewed studies into root cause analysis [of incidents], like a CSRB [Cybersecurity Safety Review Board] analysis could point at that. That is the most crucial thing we’re missing. In this industry we love to haul around and scare the pants off people. “Six billion dollars is going to be lost to cybercrime!” But we don’t tell them how easy it could have been to avoid, or the massive amount of ROI [return on investment] that just comes from doing it [cybersecurity] proactively.

Nothing heeft de Nothing Phone (1) een nieuwe modification gegeven. Vorige maand werd Android 15 al verspreid naar de telefoon, nu komt er een extra modification.......

Since its original launch in 2022, the Kindle Scribe has always been the odd man out in the Kindle line-up. It’s w......

Samsung has shared new attributes coming to the Galaxy Buds 3 series with One UI 7. However, the organization has not answered questions about the One UI 7 u......

This rumored OnePlus Pad 3 upgrade may just put the Samsung Galaxy Tab S10 Ultra to shame

This rumored OnePlus Pad 3 upgrade may just put the Samsung Galaxy Tab S10 Ultra to shame

One of the key areas of focus for this tablet seems to be charging speed. Reports suggest a possible upgrade to 100W SuperVOOC charging, a notable leap from the Pad 2's 67W. This faster charging could be paired with a slightly larger battery, potentially exceeding 10,000mAh. While the battery increase may not be as dramatic as some smartphone upgrades, it's a noteworthy change for a tablet.

Furthermore, the processing power of the potential Pad 3 is also a point of interest. The Snapdragon 8 Elite processor is rumored as a possible upgrade from the 8 Gen 3 found in the Pad 2. This potential shift in processing could lead to enhanced performance and efficiency. In addition to the Snapdragon model, there's talk of a variant using the MediaTek Dimensity 9400 or 9400+ chipsets. This hints at OnePlus might offer multiple versions of the Pad 3, catering to different user needs and preferences.

Display technology is another area of potential change. Reports indicate that the Pad 3 may come with different display types, possibly OLED or LCD. The specific display type for each variant remains unclear. Other capabilities being discussed include side-mounted fingerprint readers and depth sensors for improved facial recognition. These additions point towards a focus on enhancing user experience and security.

OnePlus Open 2 , we deserve this win. This potential rebranding and upgrade cycle is exciting to hear, particularly when we know the OnePlus Pad 2 was so impressive . The focus on faster charging and improved processing could translate to a serious productivity tablet. The possibility of different display types also gives buyers more choice in finding a device that suits their needs. Hopefully these rumors pan out, and we do get this highly sought after tablet. After not getting the, we deserve this win.

It appears that upcoming tablet releases in 2025 will come with a potential boost in charging speeds and processing power, with a possible rebranding strategy in play. For example, OPPO's planned Pad 4 Pro, slated for a Chinese release, could possibly find its way to global markets under the OnePlus brand, potentially as the OnePlus Pad 3.

Apple's latest entry-level phone, the iPhone 16e carries a significant hardware upgrade hidden beneath a familiar exterior. While visually reminiscent......

I’ve been wearing a OnePlus Watch 3 for a little over a week. So far, it’s been great. The [website] AMOLED display loo......

Oppo unveiled the Reno13 Pro last November in China and began its international rollout in January. We shared our first impressions of the Oppo Reno13......

Vivo X200 Ultra Will Come With Fujifilm’s Co-developed Camera

Vivo X200 Ultra Will Come With Fujifilm’s Co-developed Camera

It’s no secret that one of the Vivo X-series focuses on impressing consumers with powerful camera aspects. In the past year, Vivo has worked with ZEISS to develop impressive cameras with outstanding software aspects that make devices under this lineup impressive for consumers and camera professionals. The Vivo X200 series launched a few months ago is no exception to this tradition. , the upcoming Vivo X200 Ultra, which will complete the flagship lineup, will be even more impressive featuring an unprecedented partnership with Japan’s Fujifilm.

Vivo X200 Ultra Coming With Impressive Camera Specifications Powered by Fujifilm.

, Vivo’s cooperation with Fujifilm for the Vivo X200 Ultra will result in clients getting a more professional image experience through improvements in image quality and color reproduction. The leak further reveals that the X200 Ultra will have an A1 chip under the hood. It will come with “improved intelligent processing power” for a more effective photography experience. Furthermore, the Vivo X200 Ultra will also support 4K@120fps HDR video recording and come with a new Live Photo feature and 5-axis stabilization.

The X200 Ultra will also come with a new camera mode. It is being developed with photography enthusiasts in mind and will include some extra controls and attributes for those who understand the matter.

As per the rumors, the Vivo X200 Ultra will launch in April. So there is still a full month ahead of the release of the new camera flagship. Unfortunately, this does not mean much for global consumers. After all, the smartphone is a China-.

The Vivo X200 Ultra is tipped to come with the unreleased MediaTek Dimensity 9400+ SoC. The phone will likely support up to 24 GB LPDDR5X RAM and impressive 2 TB UFS [website] storage. Earlier leaks claimed that the handset would get a Snapdragon 8 Elite. However, it seems that the next flagship will debut MediaTek’s mid-year flagship SoC.

Disclaimer: We may be compensated by some of the companies whose products we talk about, but our articles and reviews are always our honest opinions.

Een printer kiezen voor je bedrijf lijkt eenvoudig. Tot je ontdekt hoeveel opties er zijn. Inkjet of laser? Draadloos of bekabeld? Welke printer past ......

PhoneArena readers know that a change to [website] export rules made in 2020 prevents chip foundries that use American technology to produce chips from shi......

The Oppo Find X8 Ultra is expected to launch in April, and a new Oppo Pad 4 Pro will also be unveiled at the same event. ......

Market Impact Analysis

Market Growth Trend

2018201920202021202220232024
7.3%8.8%9.3%10.3%10.8%11.2%11.3%
7.3%8.8%9.3%10.3%10.8%11.2%11.3% 2018201920202021202220232024

Quarterly Growth Rate

Q1 2024 Q2 2024 Q3 2024 Q4 2024
10.6% 10.8% 11.1% 11.3%
10.6% Q1 10.8% Q2 11.1% Q3 11.3% Q4

Market Segments and Growth Drivers

Segment Market Share Growth Rate
Smartphones42%8.7%
Mobile Applications26%14.5%
Mobile Infrastructure17%12.8%
Wearables11%18.9%
Other Mobile Tech4%9.4%
Smartphones42.0%Mobile Applications26.0%Mobile Infrastructure17.0%Wearables11.0%Other Mobile Tech4.0%

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity:

Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity AI/ML Blockchain VR/AR Cloud Mobile

Competitive Landscape Analysis

Company Market Share
Apple24.3%
Samsung22.7%
Huawei14.2%
Xiaomi11.8%
Google Pixel5.4%

Future Outlook and Predictions

The Week Ultra Cyber landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:

Year-by-Year Technology Evolution

Based on current trajectory and expert analyses, we can project the following development timeline:

2024Early adopters begin implementing specialized solutions with measurable results
2025Industry standards emerging to facilitate broader adoption and integration
2026Mainstream adoption begins as technical barriers are addressed
2027Integration with adjacent technologies creates new capabilities
2028Business models transform as capabilities mature
2029Technology becomes embedded in core infrastructure and processes
2030New paradigms emerge as the technology reaches full maturity

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:

Time / Development Stage Adoption / Maturity Innovation Early Adoption Growth Maturity Decline/Legacy Emerging Tech Current Focus Established Tech Mature Solutions (Interactive diagram available in full report)

Innovation Trigger

  • Generative AI for specialized domains
  • Blockchain for supply chain verification

Peak of Inflated Expectations

  • Digital twins for business processes
  • Quantum-resistant cryptography

Trough of Disillusionment

  • Consumer AR/VR applications
  • General-purpose blockchain

Slope of Enlightenment

  • AI-driven analytics
  • Edge computing

Plateau of Productivity

  • Cloud infrastructure
  • Mobile applications

Technology Evolution Timeline

1-2 Years
  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream
3-5 Years
  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging
5+ Years
  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

Expert Perspectives

Leading experts in the mobile tech sector provide diverse perspectives on how the landscape will evolve over the coming years:

"Technology transformation will continue to accelerate, creating both challenges and opportunities."

— Industry Expert

"Organizations must balance innovation with practical implementation to achieve meaningful results."

— Technology Analyst

"The most successful adopters will focus on business outcomes rather than technology for its own sake."

— Research Director

Areas of Expert Consensus

  • Acceleration of Innovation: The pace of technological evolution will continue to increase
  • Practical Integration: Focus will shift from proof-of-concept to operational deployment
  • Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
  • Regulatory Influence: Regulatory frameworks will increasingly shape technology development

Short-Term Outlook (1-2 Years)

In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing mobile tech challenges:

  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream

These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.

Mid-Term Outlook (3-5 Years)

As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:

  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging

This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.

Long-Term Outlook (5+ Years)

Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:

  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.

Key Risk Factors and Uncertainties

Several critical factors could significantly impact the trajectory of mobile tech evolution:

Battery technology limitations
Privacy concerns
Device interoperability issues

Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.

Alternative Future Scenarios

The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:

Optimistic Scenario

Rapid adoption of advanced technologies with significant business impact

Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.

Probability: 25-30%

Base Case Scenario

Measured implementation with incremental improvements

Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.

Probability: 50-60%

Conservative Scenario

Technical and organizational barriers limiting effective adoption

Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.

Probability: 15-20%

Scenario Comparison Matrix

FactorOptimisticBase CaseConservative
Implementation TimelineAcceleratedSteadyDelayed
Market AdoptionWidespreadSelectiveLimited
Technology EvolutionRapidProgressiveIncremental
Regulatory EnvironmentSupportiveBalancedRestrictive
Business ImpactTransformativeSignificantModest

Transformational Impact

Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.

The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.

Implementation Challenges

Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.

Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.

Key Innovations to Watch

Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.

Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.

Technical Glossary

Key technical terms and definitions to help understand the technologies discussed in this article.

Understanding the following technical concepts is essential for grasping the full implications of the security threats and defensive measures discussed in this article. These definitions provide context for both technical and non-technical readers.

Filter by difficulty:

encryption intermediate

algorithm Modern encryption uses complex mathematical algorithms to convert readable data into encoded formats that can only be accessed with the correct decryption keys, forming the foundation of data security.
Encryption process diagramBasic encryption process showing plaintext conversion to ciphertext via encryption key

platform intermediate

interface Platforms provide standardized environments that reduce development complexity and enable ecosystem growth through shared functionality and integration capabilities.