More stories

  • in

    This Dell PC redfines what a premium Windows 11 laptop can and should be

    Dell 16 Premium <!–> ZDNET’s key takeaways The Dell 16 Premium starts at $1,800. This is a premium laptop capable of handling heavy workloads, especially graphic design, thanks to its top-notch hardware. However, it does share some of the same issues as its predecessor, like its tendency to run warm and power-hungry battery. –> Follow […] More

  • in

    Try Google’s Nano Banana image generator in Search and NotebookLM – here’s how

    Andriy Onufriyenko/Moment via Getty Images Follow ZDNET: Add us as a preferred source<!–> on Google. ZDNET’s key takeaways  Google unveils Nano Banana in Google Search and Notebook LM.  It will release the AI image editor in Photos soon. The tool offers new styles for illustrations and Briefs.  Nano Banana, Google’s image-generating AI model also known as Gemini […] More

  • in

    This new Android exploit can steal everything on your screen – even 2FA codes

    Elyse Betters Picaro / ZDNETFollow ZDNET: Add us as a preferred source on Google. ZDNET’s key takeaways Pixnapping could be used to steal private data, including 2FA codes.Side-channel attack abuses Google Android APIs to steal data on display.Flaw is partially patched, although a more complete fix is due in December.A new attack method demonstrated by researchers could lead to the theft of two-factor authentication (2FA) codes and more on Android devices.Also: This fundamental Android feature is ‘absolutely not’ going away, says Google – but it is changingThe attack technique, detailed in a paper titled Pixnapping: Bringing Pixel Stealing out of the Stone Age (PDF), has been developed by researchers from the University of California, Berkeley, San Diego, Washington, and Carnegie Mellon. Dubbed “Pixnapping,” this attack vector begins when a victim unknowingly installs a malicious mobile application on their Android smartphone. Notably, the app doesn’t need to abuse permissions to perform this attack, which exploits existing Android APIs, pixel rendering, and a hardware side channel. The stepsThere are three steps to Pixnapping, so-called due to its abuse of pixels rendered by a target app, such as Google Authenticator. The first stage requires the malicious app to invoke a target app and make a system call to prompt the submission of sensitive data to the Android rendering pipeline. Also: Your Android phone’s most powerful security feature is off by default and hidden – turn it on nowIn the second stage, this app will then induce graphical operations (blurring) by launching a “semi-transparent” layer on individual sensitive pixels rendered by the target app — such as the part of a screen when an authentication app renders 2FA characters. Masking is then used to isolate, enlarge, and determine the graphical nature of the pixels. The third and final stage requires the abuse of a side channel, GPU.Zip, to steal the pixels on display, one by one. In other words, the malicious app is taking pixels to capture a form of “screenshot” of content it should not have access to. More

  • in

    Apple TV+ quietly announces a rebrand – here’s what to call it now

    SOPA Images/Contributor/LightRocket via Getty Images Follow ZDNET: Add us as a preferred source<!–> on Google. ZDNET’s key takeaways Apple TV+ is rebranding by losing its plus sign. The announcement was made at the bottom of an unrelated release. Apple TV is now the name of three services or products. There’s no longer a plus appended […] More

  • in

    Facebook’s local job listings are back – how to use the social network to find a gig

    Matthias Balk/picture alliance via Getty Images Follow ZDNET: Add us as a preferred source<!–> on Google. ZDNET’s key takeaways Local job listings are returning to Facebook. You’ll find openings through a dedicated tab in Marketplace. Job seekers can filter and sort listings to narrow their search. If you’re looking for a job, you probably find yourself getting […] More