iPad Pro 2021 looks even more likely to feature 5G and other big upgrades

The Apple iPad Pro 2020 models weren’t exactly a huge upgrade on the 2018 tablets, but it’s starting to look like Apple has been saving all its big upgrades for the 2021 iPad Pro models. A new leak has backed up some of the biggest points we’d already heard about the devices.

This leak comes from @L0vetodream, a new leaker on the scene who doesn’t have much of a track record uet, but has been making some big claims about future Apple products like the iPhone 12 and future iPhones. 

We’d say to take the leak with a pinch of salt, but since this new statement is backing up what we’ve already heard, there’s reason to believe it’s accurate.

The leak states that new iPad Pro 2021 models will have 5G connectivity as well as Mini-LED screens, and also the same chipset we’re expecting to see in the iPhone 12 models (although this latter point is backing up another’s tweet). 

That’s a big upgrade in three major areas, which would make the device a big step up over the previous few generations. We’d heard the first two points before, and the third was something we could presume thanks to precedent, but it’s good to hear them reiterated.

If we were to be cynical we’d suggest @L0vetodream, as a new leaker, was simply repeating popular and likely rumors to help them seem more reliable as a leaker, but since we also heard the iPad Pro 2020 would have some of these features (before it was announced), these features aren’t necessarily confirmed for the device just yet.

The iPad Pro 2020 will be forgotten 

If the iPad Pro 2021 is set to bring all the upgrades from the iPad Pro 2018 series that we really wanted, it would seem that the 2020 devices were just iterative upgrades.

The iPad Pro 2020 has the same screen and connectivity options as the 2018 models, and its chipset, while slightly different, returned very similar benchmark scores when tested.

There are still reasons to buy the iPad Pro 2020, such as its LiDAR scanner for improved AR, but if you don’t need an iPad Pro right away, it might be worth waiting for 2021 for the real improvements to come about.

Go to Source

How to design a secure home office

Remote working has gone mainstream with large parts of the world, including the UK, now telecommuting. The data bears this out – for example, Microsoft saw users on their collaboration platform Teams generate 2.7 billion minutes of online meetings worldwide in a single day in early April, a new record and just under five times the amount generated just four weeks earlier.

While it is incredibly important to stay connected and keep physically distant, there are serious privacy risks that need to be addressed. Working from home can increase the risk of unauthorized data transfers and sharing. The privacy of users can also suffer if suddenly many new unfamiliar tools have to be used to get the job done. This is compounded by the fact that home networks are rarely as well secured as corporate headquarters. 

As an organisation, Mozilla has been focusing on the aspects of security and privacy in the home office for quite some time. Even before the crisis, half of all Mozilla employees (and 69% in the UK) were working permanently from home. Employers need to help their employees establish a secure home office environment to mitigate risks for both the individuals as well as the company. 

When it comes to security, there are three core areas that should all be given equal attention in designing a home office – IT security, data security and connection security.

IT Security

Large and small companies alike often prohibit the use of private hardware for work, be it a computer or just a USB stick. In the home office, however, people can quickly stop adhering to these strict rules. Private computers and devices are also more at risk as they are unlikely to have the same level of security measures in place as work devices. The latter tend to be supervised by an IT professional who has the right expertise to identify good antivirus software and firewall systems and ensure regular updates.

Therefore, it’s best to only use the devices provided by employers that have been secured in advance by the company’s IT department with common protection software. Business devices need to be protected in the home office – this means not using private USB sticks coupled with other private devices (via Bluetooth, for example) or private surfing on dubious websites during lunch breaks.

It’s wise to be especially careful when checking private emails at this time as well. Criminals are increasingly phishing and trying to spread malware in inboxes, both work and personal. This also highlights the importance of making sure your working device is up to date to protect against vulnerabilities – the browser and any other pre-installed software should always be kept up to date to do so.

Making sure you are password savvy is also important. Weak passwords can be more easily guessed or cracked through brute force attacks on networks, and if work passwords are the same or similar to the ones used privately, that could prove catastrophic for your place of work.

As such, when setting up work accounts, it is highly recommended to use strong, work-context only passwords that are different from those used for private browsing and personal online life. Some of our specific tips on this can be found here.

Data security

Given many of us will be accessing company resources from home at this time, one of the primary considerations for data security is the location of where data is stored. Especially as it’s expected that companies have access to their employees’ data at all times.

A strict separation of work and private computing devices, from laptops to smartphones and beyond, is therefore highly recommended. If it’s not possible, then data should be stored separately at the very least. Many companies already rely on secure cloud storage solutions such as Dropbox, Box, Onedrive or iCloud. For those, users must consistently observe the company’s internal regulations, especially if they use a private device. Businesses should be encouraging users to take care when storing documents, and in particular not to store them on their private devices.

This also applies when transferring data to third parties, for example clients or service providers. Failure to use secure platforms such as professional email accounts, WeTransfer or Firefox Send can risk your data leaking into the wild and jeopardizing business continuity.

Connection security

Since working remotely means that people often have to exchange even more data with their colleagues than before, the way that data gets transferred is extremely important. Many companies use a business VPN, a virtual network, for access to the internal company network, which stores all documents and programs. This is particularly well-protected against the interception of data – which is critical when working from home.

At home, people usually access the internet via their private home Wi-Fi. In most cases, this is not very well protected against attacks. While free networks (in cafés, train stations, etc.) are known for being very vulnerable to attacks if not secured by a VPN, the home Wi-Fi is also a weak point. Most people use their routers after purchase by plug & play, with the standard provided password and a weak Wi-Fi key. This isn’t ideal for private usage, but definitely insufficient for professional work.

A secure connection strategy for a home office is multi-pronged. In terms of your home network, it’s recommended to use at least WPA2 encryption for your WI-FI router, or WPA3 if you have access to it on your device. Making sure all related software and firmwares are up to date is also useful here. As is making sure you only access company data via a VPN and avoiding the use of public Wi-Fi networks unless a VPN is used.

Designing a secure home office, above all, is about consciously de-risking as many potential privacy and security factors as possible. Whilst not an exhaustive list, focusing on the above three areas will help employees and employers alike to have greater peace of mind and focus on the things that are business critical during this challenging time.

Go to Source

Samsung wants to reduce core counts in storage servers with new SSDs

At this week’s OCP Global Summit, Samsung disclosed more information about a new type of solid state drive (SSD) it’s working on – one that only makes sense in a data center context, for now.

When it comes to flash memory, the most common configuration in data centers worldwide is JBOF (or just a bunch of flash), which uses NVMe SSD storage attached to PCIe switches, processors and NICs (network interface cards). There are two rather significant issues with this system, to do with the lack of scalability of the storage controller and limited bandwidth; a classic case of too many middlemen. 

EBOF – or Ethernet SSD Bunch of Flash, as Samsung puts it – aims to solve this issue by putting the Ethernet ports (two of them for redundancy) on the SSDs themselves.

These are not your usual Ethernet ports, however, as each supports a staggering 25Gbps – about 25x what most Gigabit interfaces can achieve. Unsurprisingly, that’s only available in a standard SSD (i.e. 2.5-inch), rather than the smaller M2 form factors.

Samsung claims the E-SSD drive will achieve PCIe Gen4x4 performance, or about 1500K IOPS at 4K random read. What’s even more spectacular, though, is that the performance of the drive scales in an almost linear fashion.

Based on the chart provided by the company, 24 NVMe drives will be about 7.5x faster than a single NVMe drive, whereas the same number of NVMe-oF SSDs will be about 23x faster than a single drive. 

Samsung reached out to point out that the graph is not linear and not to scale. A spokesperson for the company added, “we have no specific data to publicly share at this time, but will say as we noted originally that the numbers you stated are not the numbers that we have”.

Removing the CPU, networking and other bottlenecks means lower latency, higher bandwidth, lower cost, better performance and potentially big TCO savings. Samsung added that “EBOF will be helpful to many in hardware procurement including networking vendors and OEMs”.

Go to Source

What is the role of SecDevOps in PSD2 compliance?

When it comes to online payments and credit card processing, retailers in the EU have been granted a reprieve. The European Union’s Revised Payment Services Directive, known in short as PSD2, extended its deadline for compliance to March 2021, leaving it up to retailers and banks to remain secure while legislation is left in limbo. And yet, a deadline extension does not mean companies can rest on their laurels. Consumers, governments, and developers expect banks and other services to be compliance-ready, ideally before the March 2021 deadline.

More importantly, hackers are aware of this gap in vulnerability. The PSD2 regulations are meant to increase competition and offer more consumer choice, however they also provide added security for vital banking details. Leaving this information undersecured provides a risky inroad for criminals. Let’s take a look at where we are today with these standards, and how companies involved with ecommerce can implement SecDevOps best practices into their PSD2 compliance.

1: The state of the APIs

A full 41% of EU banks are still not compliant with upcoming PSD2 standards, as of March 2019. While this is less than half, and the exact percentages vary by country, the main reason banks have dragged their feet remains the same: API testing. 

First and foremost on the PSD2 compliance checklist is the need for banks to create APIs meant for transactional payment data. These APIs need to provide real-time access, fraud monitoring, multi-factor user authentication, and user behavioral analytics, among others. With all of these features, it’s not hard to see why some institutions have been slow to comply.

Yet these APIs will become the bedrock of digital financial transactions throughout the 2020s and beyond. Businesses and financial service providers will use the banks’ APIs to provide their own payment systems, perhaps creating their own APIs to fully utilize payment and behavior data.

In fact, banks themselves could also become Third Party Providers (TPPs), both creating and utilizing the APIs of other parties. The intended effect of this increased competition is to provide more consumer choice and thereby lower prices – a noble goal for any governing body looking out for its citizens.

On the surface, the PDS2 standards can, in fact, improve trust and security in digital financial transactions. Where the issue arises is in how banks create their APIs – and who ends up using them. And how.

2. Security against fraud – what consumers & institutions need to know

At the center of PDS2 are the APIs banks will create to provide services to TPPs. Security is paramount when banks create APIs – they have immense access to our most vital financial data. Any details that end up in the hands of untrustworthy characters are then subject to disaster. 

As we noted, much of the discussion so far has centered around these bank APIs. Less focus has been placed on what TPPs and other institutions may end up doing with their own APIs. That is – what security regulations are in place for TPPs? 

The truth is – very little. TPPs have both a strong advantage and a key flaw in regards to PDS2 that is one in the same.

For one thing, TPPs are not subject to the same strict regulations that banks have. This is one of the main drivers behind PDS2 – letting these TPPs provide payment options means more flexibility for consumers. They are also not subject to the same legacy IT infrastructures that many banks have. 

Yet with this heightened mobility comes cost. If a TPP does not require as much rigidity to begin handling transactions, would that mean their security is less stringent as well? How can consumers know whether their new payment provider is handling their data security?

3: Defining best practices in PDS2

First, TPPs must be aware of the risks they’re facing. Fraud attacks, where malicious users create rings of fake accounts to exploit various benefits, rose 26% last year, even as more and more banks implement 2FA and other solutions to combat these crimes. 

To an extent, TPPs can strengthen customer data security. They can share information among themselves, or with the banks whose APIs they use. TPPs with stronger security protocols have a better selling point for new customers – the exact sort of competition PDS2 is meant to stir.

At the same time, new challenges must be addressed before a breach occurs. For one thing, keeping track of which APIs are in use is paramount.

The API each bank releases will be checked constantly, as many TPPs will rely on it to provide services to their customers. Less rigorously-tested will be the APIs these third-party providers create themselves. As such, SecDevOps becomes the guardian between financial safety and hacker abuse.

There are a number of steps each party can take right now to ensure PSD2 safety later on. First, taking stock of which APIs are already in use is essential. Shadow APIs – that is, APIs which developers have allowed access and then forgotten about – make for easy hacking entry points. Removing these prior to PSD2 implementation makes for an easier path to better overall security.

For now, retailers, banks, and future TPPs have over a year to attain PSD2 compliance. Reaching that goal doesn’t just mean following the law. Any institution looking to provide the best quality service in a new digital environment must make security a paramount concern. Lucky for them, this just makes good business sense. Consumers naturally gravitate to whichever company has their best interest in mind. When it comes to keeping financial data safe, the best will always rise to the top.

Go to Source

Why is TikTok’s parent company floating second entity in India?

Amidst backlash over contents on TiKTok and also controversy over Chinese apps comes the development that ByteDance — TikTok’s parent company — is reportedly setting up a second corporate entity in India. 

According to a news report in the Economic Times, the new entity will provide IT and IT-enabled services to support ByteDance’s platforms present across the globe. This include, among others, TikTok, Helo, and Vigo Video.

The company is all set to file an application with the Department for Promotion of Industry and Internal Trade (DPIIT) in the next few weeks.

“There will be data and technology transfer into India with ByteDance looking to ramp up its workforce in India, a market where the company will look to create a centre of excellence over the near-term,” the report said.

Intriguing developments

ByteDance’s latest gambit is interesting as well as intriguing as it comes in the backdrop of what has been a tmultuous period for Chinese apps, espcially TikTok, in India.

There has been a growing campaign against TikTok and Chinese apps for various reasons including political.

In the event, ByteDance setting another entity in India will verily set the cat among the pigeons.

But ByteDance seems to be acting under a different global compulsion. In response to an emerging new world reality, the company is apparently trying to shed its Chinese image. ByteDance has been making moves to shift its teams from China as part of a new strategy.

It is also reportedly speding a huge amounts of money in public relations and ads for shoring up the image of the controversy-ridden TikTok. Aside, it is splurging in the Indian market — around 10 million per month according to this tweet.

India is certainly an important and pivotal play area for ByteDance to move away from its Chinese image and also be acceptable to the Western world.

Away from China, towards India

Recently, Disney’s Kevin Mayer became the CEO of TikTok, and this was interpreted by analysts as one of the steps by ByteDance to move the decision-making authorities and research team from China.

ByteDance, according to news reports, has expanded TikTok’s engineering, and research & development operations in Mountain View, California. As per reports, the company had hired over 150 engineers for its California team.

And now ByteDance is also set to increase its footprint in India with a new entity.

It may be recalled, in October 2016, ByteDance invested in India’s largest vernacular content aggregation platform Dailyhunt. It claims to aggregate 250,000 news and content articles every day in 14 languages, gathered from over 1,300 publication partners. 

ByteDance has also done a test release of its music streaming app Resso in December of 2019 in India.

To be sure, ByteDance has India in its focus for long. But how this pans out in the new climate of animosity between India and China is something to be seen.

Go to Source

Why is TikTok’s parent co floating second entity in India?

Amidst backlash over contents on TiKTok and also controversy over Chinese apps comes the development that ByteDance — TikTok’s parent company — is reportedly setting up a second corporate entity in India. 

According to a news report in the Economic Times, the new entity will provide IT and IT-enabled services to support ByteDance’s platforms present across the globe. This include, among others, TikTok, Helo, and Vigo Video.

The company is all set to file an application with the Department for Promotion of Industry and Internal Trade (DPIIT) in the next few weeks.

“There will be data and technology transfer into India with ByteDance looking to ramp up its workforce in India, a market where the company will look to create a centre of excellence over the near-term,” the report said.

Intriguing developments

ByteDance’s latest gambit is interesting as well as intriguing as it comes in the backdrop of what has been a tmultuous period for Chinese apps, espcially TikTok, in India.

There has been a growing campaign against TikTok and Chinese apps for various reasons including political.

In the event, ByteDance setting another entity in India will verily set the cat among the pigeons.

But ByteDance seems to be acting under a different global compulsion. In response to an emerging new world reality, the company is apparently trying to shed its Chinese image. ByteDance has been making moves to shift its teams from China as part of a new strategy.

It is also reportedly speding a huge amounts of money in public relations and ads for shoring up the image of the controversy-ridden TikTok. Aside, it is splurging in the Indian market — around 10 million per month according to this tweet.

India is certainly an important and pivotal play area for ByteDance to move away from its Chinese image and also be acceptable to the Western world.

Away from China, towards India

Recently, Disney’s Kevin Mayer became the CEO of TikTok, and this was interpreted by analysts as one of the steps by ByteDance to move the decision-making authorities and research team from China.

ByteDance, according to news reports, has expanded TikTok’s engineering, and research & development operations in Mountain View, California. As per reports, the company had hired over 150 engineers for its California team.

And now ByteDance is also set to increase its footprint in India with a new entity.

It may be recalled, in October 2016, ByteDance invested in India’s largest vernacular content aggregation platform Dailyhunt. It claims to aggregate 250,000 news and content articles every day in 14 languages, gathered from over 1,300 publication partners. 

ByteDance has also done a test release of its music streaming app Resso in December of 2019 in India.

To be sure, ByteDance has India in its focus for long. But how this pans out in the new climate of animosity between India and China is something to be seen.

Go to Source

Could this be our first look at Call of Duty 2020? Black Ops Cold War ‘footage’ leaked

The first gameplay footage of Call of Duty 2020, rumored to be called Call of Duty: Black Ops Cold War, may have just been revealed. 

In typical Call of Duty fashion, the player can be seen sprinting, vaulting, aiming down sights and inevitably camping (just kidding), as they explore what could be Call of Duty: Black Ops Cold War’s first exclusive map. The footage below could also be nothing more than an elaborate hoax, but it does look rather convincing.

It should be noted that the off screen footage has reportedly been taken from 45 minutes of pre-alpha code, and focuses on a new map called Tank. As with any pre-alpha footage, the game will look dramatically different to what we’re seeing here when it releases, so bear that in mind. For example, it appears that textures and other graphical elements are missing entirely, and the UI and HUD elements aren’t in place.

Duty calls

Due to the coronavirus pandemic and unrest across the world, Activision would normally have announced a new Call of Duty by now, as the annualized franchise gears up for its usual October release. 

However, with the world in a tumultuous place, Activision has delayed Season 4 and Season 7 for Call of Duty: Modern Warfare and Call of Duty: Mobile respectively, so it’s unclear when Call of Duty 2020 will be officially unveiled. 

It’s a safe bet that Call of Duty 2020 will release on Xbox One, PS4 and PC, and might support PS5 and Xbox Series X as a cross-gen title, just like Call of Duty: Ghosts did when it was released. 

We also know that Activision plans to support Call of Duty: Warzone for the foreseeable future, so it’s unlikely that Call of Duty: Black Ops Cold War will feature its own dedicated battle royale mode this time around. 

Go to Source