More stories

  • in

    How to turn on Private DNS Mode on Android – and why it matters for privacy

    Kerry Wan/ZDNETNearly everything you do on your desktop, laptop, phone, and tablet begins with a Domain Name System (DNS) query. Essentially, DNS turns domain names (such as ZDNET.com) into an IP address so web browsers and apps know where to get the information you want. Also: I tried a new anti-stress browser to see if it could really help me relax – and it actually worksWithout DNS, you’d have to type 34.149.132.124 every time you wanted to go to ZDNET.com. Even by simply running a Google search, DNS is at work. The problem is that standard DNS isn’t encrypted, meaning all your queries are sent over the network as plain text.Why is non-encrypted DNS a problem?Let’s say you’re on a public network  — like a coffee shop — and you start searching for things on your Android device. Or maybe you have to access a CMS or another work tool, and you don’t want the public to know the address you’re typing. If someone else is on the same network and has the skills, they could intercept your non-encrypted search queries (or the URLs you visit) and know exactly what you’re looking for.That’s where Private DNS Mode comes into play. Once you enable this feature, all of your DNS queries are encrypted, so any bad actors won’t be able to view them (even if they capture those packets). In other words, Private DNS Mode should be an absolute must for anyone who values their privacy and security.Also: How to easily use Cloudflare’s secure DNS on your Mac and why it even mattersBut how do you enable Private DNS Mode on Android? It’s actually pretty simple. Let me show you how.How to enable Private DNS mode on AndroidWhat you’ll need: The only thing you need to enable Private DNS Mode is an Android device running at least Version 9 of the operating system (which released in 2018). I’m using a Pixel 9 Pro but have used the feature going way back in the Android release cycle. Pretty much every modern Android phone is capable of enabling Private DNS. More

  • in

    Pixel 9a details leak – how its specs compare to my Pixel 9 Pro

    Kerry Wan/ZDNETGoogle is set to release the Pixel 9a, and WinFuture has released a fairly detailed look at this new device. The Pixel 9a will measure 6.09 x 2.89 x .35 inches, sport a 6.3-inch display with a resolution of 2424 x 1080 and a 120 Hz refresh rate and a 5100 mAh battery, and weigh 188g (which is less than the Pixel 8a), according to the leak. Also: The iPhone SE 4 this week isn’t what you’re expecting – and we can thank Apple Intelligence for thatThe handset runs on a Google Tensor G4 CPU, has 8GB of RAM, and either 128GB or 256GB of storage. The Pixel 9a also includes wireless charging capability, NFC, Wi-Fi 6, Bluetooth 6, satellite support, and biometrics (finger and face). As for cameras, you’ll get a 48MP main with a 13MP ultrawide capable of 120-degree field of view, and a 13MP front-facing camera.Let’s compare that to my Pixel 9 Pro:Specifications More

  • in

    I’ve tested dozens of ThinkPads – this model checks all the right boxes for me

    <!–> ZDNET’s key takeaways Lenovo’s sixth-generation ThinkPad T14s is available now, starting at $1,598. It’s is a powerful workhorse thanks to the new AMD Ryzen AI chipset and support for the speedy Wi-Fi 7 standard. Its display, on the other hand, isn’t all that impressive considering its price tag. more buying choices Whenever Lenovo isn’t […] More

  • in

    Why rebooting your phone daily is your best defense against zero-click attacks

    ZDNETIn the last decade, spyware tools have been repeatedly found on the phones of journalists, activists, and politicians, including US officials, raising concerns over the unprecedented proliferation of spyware technologies and, subsequently, the lack of protections within the tech space amid growing threats.Also: Google releases responsible AI report while removing its anti-weapons pledgeLast Friday, Meta’s WhatsApp revealed that it had discovered a hacking campaign targeting about 90 users, mostly journalists and civil society members across two dozen countries. According to a WhatsApp spokesperson, the Israeli spyware company Paragon Solutions — now acquired by Florida-based private equity firm AE Industrial Partners — was behind the attack.What is a zero-click capability? Graphite, Paragon’s spyware, was found to have infiltrated WhatsApp groups by simply sending users a malicious PDF attachment. Without users’ knowledge, it can access and read messages on encrypted applications like WhatsApp and Signal.This is also known as a zero-click attack, which means that targets do not have to take any actions for their devices to become compromised. In contrast, phishing or one-click attacks require user interaction with a malicious link or attachment. Once a phone is infected with a zero-click capability, the operator of the attack can secretly gain total access to the phone by exploiting a security vulnerability.Also: How to turn on Private DNS Mode on Android – and why it’s a must for securityIn an interview with ZDNET, Rocky Cole, co-founder of mobile threat protection company iVerify, said that “in the case of graphite, via WhatsApp, some kind of payload, like a PDF or an image, [was sent to the victims’ devices] and the underlying processes that receive and handle those packages have vulnerabilities that the attackers exploit [to] infect the phone.”While public reporting does not specify “whether graphite can engage in privilege escalation [vulnerability] and operate outside WhatsApp or even move into the iOS kernel itself, we do know from our own detections and other work with customers, that privilege escalation via WhatsApp in order to gain kernel access is indeed possible,” Cole said.iVerify has uncovered instances where “a number of WhatsApp crashes on [mobile] devices [they’re] monitoring with iVerify” have appeared to be malicious in nature, leading the iVerify team to believe that the malicious attacks are “potentially more widespread” than just the 90 people reported to have been infected by graphite.While the WhatsApp attack was predominantly launched against members of civil society, mobile spyware is an emerging threat against everyone because mobile exploitation is more widespread than one might think, Cole said. Moreover, “the result is an emerging ecosystem around mobile spyware development and an increasing number of VC-backed mobile spyware companies are ‘under pressure to become profitable enterprises,'” he said.This ultimately “creates marketing competition” for spyware merchants and “lowers barriers” that would deter these mobile exploitation attacks.Also: The top 10 brands exploited in phishing attacks – and how to protect yourselfJust a month ago, WhatsApp won a lawsuit against NSO after a federal judge in California found that NSO was exploiting a security vulnerability within the messaging app to deliver Pegasus. The infamous NSO Group — known for infecting the phones of journalists, activists, and Palestinian rights organizations — has used similar zero-click capabilities through their Israeli-made Pegasus spyware, a commercial spyware and phone hacking tool.Historically, the NSO Group has avoided selling to US-based clients and has also been banned by the US Commerce Department under the Biden administration for allegedly supplying spyware to authoritarian governments. However, “shifting political dynamics [under the Trump administration] raises the possibility that spyware may become more prevalent in the United States” — exacerbating mobile exploitation.”And the world is totally unprepared to deal with that,” Cole said. More

  • in

    These nations are banning DeepSeek AI – here’s why

    wildpixel/Getty Images Regulators across the world are increasingly taking action against DeepSeek AI, the controversial Chinese startup behind two open-source models that have shaken up the industry.  Also: What is DeepSeek? Here’s what you should know On Tuesday, South Korea’s Personal Information Protection Commission (PICP) announced it was removing DeepSeek’s chatbot app from Google Play and […] More

  • in

    I tried a new anti-stress browser to see if it could really help me relax – and it actually works

    ZDNETStress is rampant across the world these days. It’s practically unavoidable. From politics, finances, work, school, and relationships, everything seems to be getting wrapped up in a cocoon of chaos that threatens our peace.That’s why, any time I can, I will reach for something capable of easing me back into a state of calm.The developers of the Opera browser understand this, so they developed a new web browser built specifically to level us out, bring us peace, and help us get through those stressful days.This browser, dubbed your “Mindful Browser,” is designed to soothe the nerves raging against the machine in your head, and it does so with:Break remindersBinaural beatsMeditation and relaxation toolsA minimal Scandinavian design with a “frosted glass” look A floating sidebarOpera Air is currently still in the early access phase (released Feb. 4, 2025) and is available to download and install on MacOS and Windows (hopefully, a Linux version will come soon).Also: How Opera’s new Air browser helped me to keep calm and surf onI was doubtful about the effectiveness of Opera Air at first, but then I saw the binaural beats feature and was immediately intrigued. I’ve used binaural beats quite a bit, especially in situations that could lead to tension or even when working on a writing project that requires intense concentration. I’ve installed apps and created Spotify playlists for binaural beats, and having that built into a browser convinced me that Opera Air was something I definitely needed to try.And try I did. More