The best phone deals of May 2023

Samsung Galaxy S23 Ultra vs Google Pixel 7 Pro in hand

Credit: Robert Triggs / Android Authority

Buying a new phone is an important purchase for many people. You probably use it every day and more than any other device, so you’ll want to pick one that’s just right. It’s easy to spend hours scouring the web for the best offers, but we’ve done the legwork for you. We’ve gathered some of the best phone deals available to save you time and money.

We’re mainly sticking with unlocked deals for now, but we’ve thrown in some of the best carrier offers too. We’ve noted where devices are international versions that may not be suitable on your carrier, but make sure to check carefully before you buy.

Android phones can be unlocked in minutes using $15 equipment and new attack

Google Pixel 6 Pro fingerprint sensor with light bleed

Credit: Rita El Khoury / Android Authority
  • A new type of attack can easily guess the fingerprint authentication on some Android phones in as little as 45 minutes.
  • Researchers tested it on phones from Xiaomi, Samsung, OnePlus, HUAWEI, OPPO, vivo, and Apple.
  • iPhones seem immune to the attack.

Security researchers have developed a new attack that uses $15 worth of equipment to hijack fingerprints stored on Android devices (Via ArsTechnica). Called BrutePrint, the attack can be executed in as little as 45 minutes to unlock the screen of an Android device. And it looks like iPhones are immune to the exploit.

PlayStation confirms it’s working on a handheld, but not the one you hoped for

PlayStation Q next to a PS5

Credit: PlayStation
  • PlayStation confirmed during that it’s working on a handheld device codenamed Project Q.
  • Project Q will allow users to stream the games on their PS5 via PS Remote Play.
  • The device is scheduled to launch later this year.

PlayStation has had some history with handheld devices over the years. There was the PlayStation Portable (PSP), PSP Go, and finally the PlayStation Vita. However, it has been a decade since its last attempt. But PlayStation is dipping its toe into the water again with Project Q.

A month ago, it was rumored that PlayStation was working on a new handheld device codenamed Project Q. Right before the end of PlayStation’s hour long showcase on Wednesday, President and CEO of Sony Interactive Entertainment Jim Ryan officially confirmed the existence of Project Q.

How to Track Ransomware Attacks: A Comprehensive Guide

Ransomware attacks have become a growing concern in recent years, with cybercriminals targeting individuals, businesses, and even government organizations. The ability to track these attacks is crucial for mitigating their impact and ensuring appropriate response measures are taken. In this article, we will explore various strategies and techniques to effectively track ransomware attacks, enabling organizations to enhance their cybersecurity defenses and minimize the potential damage caused by such malicious activities.

Establish a Robust Monitoring System: Implementing a robust monitoring system is fundamental to detecting and tracking ransomware attacks. By utilizing advanced security tools and technologies, organizations can continuously monitor their networks, endpoints, and servers for any suspicious activities or indicators of compromise. Intrusion detection and prevention systems, network traffic analysis tools, and security information and event management (SIEM) solutions are among the key components to consider.

Stay Informed with Threat Intelligence: Leveraging threat intelligence sources is vital for tracking ransomware attacks. Organizations should subscribe to reputable threat intelligence feeds and information-sharing platforms, such as industry-specific forums and government agencies’ cybersecurity bulletins. These sources provide up-to-date insights on emerging ransomware variants, attack techniques, and indicators of compromise, allowing organizations to stay one step ahead of potential threats.

Analyze Malware Samples: When a ransomware attack occurs, analyzing the malware samples involved can provide valuable information for tracking and responding to the incident. Security teams should utilize specialized malware analysis tools and sandboxes to dissect the ransomware, identify its unique characteristics, and determine its behavior patterns. This analysis can assist in understanding the attack vector, identifying possible origins, and developing countermeasures.

Monitor Dark Web and Underground Forums:The dark web and underground forums are known hotspots where cybercriminals trade ransomware, discuss attack strategies, and negotiate ransom payments. Tracking these platforms can yield vital information regarding ongoing ransomware campaigns and potentially lead to identifying the attackers. However, engaging with these forums should only be done by trained professionals, as it involves significant risks and potential legal implications.

Collaborate with Law Enforcement Agencies: Reporting ransomware attacks to law enforcement agencies is crucial for tracking and investigating cybercriminals. Organizations should establish relationships with local and international law enforcement entities, such as national cybercrime units or specialized agencies. Sharing relevant information and indicators of compromise with these authorities can aid in identifying the attackers, disrupting their operations, and potentially retrieving encrypted data.

Engage with Cybersecurity Communities: Active participation in cybersecurity communities and information-sharing platforms is an effective way to track ransomware attacks. By collaborating with other security professionals and researchers, organizations can benefit from collective knowledge and expertise. These communities often share insights, threat intelligence, and best practices, allowing for a better understanding of the evolving ransomware landscape and potential tracking techniques.

Implement Robust Incident Response Procedures: Having well-defined incident response procedures in place is essential for efficiently tracking and mitigating ransomware attacks. Organizations should establish an incident response team, including individuals from various departments, such as IT, legal, and communications. The team should be well-versed in handling ransomware incidents, conducting forensic investigations, and coordinating remediation efforts to minimize the impact and prevent further spread.

Conclusion:

Tracking ransomware attacks requires a multi-faceted approach that combines proactive monitoring, collaboration with law enforcement agencies, leveraging threat intelligence, and engaging with cybersecurity communities. By implementing these strategies and techniques, organizations can enhance their ability to detect, track, and respond effectively to ransomware incidents. Staying informed, investing in robust security systems, and fostering strong partnerships within the cybersecurity ecosystem are key to mitigating the risks posed by ransomware attacks and protecting critical data and systems.

The post How to Track Ransomware Attacks: A Comprehensive Guide appeared first on Cybersecurity Insiders.

Ransomware news trending on Google

A Russian government affiliated ransomware spreading group has targeted the Indian Insurance Information Bureau (IIB) and encrypted the entire database and their demand is that they victim needs to pay $250,000 in bitcoins in exchange of a decryption key.

The IIB of India issued a statement that around 30 servers were compromised in the incident and the extend of damage is yet to be calculated.

Although, the gang’s name that spread the malware has been kept under wraps for reasons, un-confirmed sources state that the attack was launched by Killnet and the authorities are taking measures to neutralize the effect of the attack on the infrastructure to the core.

Second is the news about a UK man who deliberately attempted to infiltrate the servers of his own employer and tried to gain the ransom payment that was in-turn intended to be sent to the hackers who encrypted the database.

As per the press release issued by the South East Regional Organized Crime Unit (SEROCU) the man named Ashley Liles was working as an IT security analyst in an oxford-based firm. The man who has now been convicted was assigned the duty to investigate a ransomware attack on the company servers.

Instead, Liles took the opportunity to work in his favor as he launched another attack on the servers to manipulate the encrypted servers and alter the wallet address to which the ransom payment needs to be sent.

As the owner of the company wasn’t interested in investigating the incident, he ordered for an inquiry by a third party and it was in that probe that the activity of Liles and his home IP ad-dress were found as evidence to frame him on the act.

The decision to imprison him was postponed to the month of July as the court needed substan-tial evidence to punish him with up to 7 years of imprisonment and a penalty.

Third is the news conformation issued by television giant Dish and the statement affirms that the hackers stole information of more than 300,000 employees in a ransomware attack that took place in February this year.

The satellite TV service provider added in its statement that no customer info was stolen in the incident and the only concern is that the hackers stole info related to employees and their fami-lies.

LockBit ransomware is suspected to be behind the incident.

Last is the news seems to be very important to those who are in a hunt for news headlines relat-ed to Russian malware. A coordinated program launched by FBI and CSI has led to the eradica-tion of a Russian spying tool named Medusa that could prove as a sign to the downfall of snake malware developed by Russian intelligence FSB.

According to the analysis of a senior FBI official the malware, a part of Turla hacking group was being used to conduct espionage and lock down databases with encryption; so far having a history of targeting NATO databases, top government agencies and tech companies in North America.

The post Ransomware news trending on Google appeared first on Cybersecurity Insiders.

How to transfer photos from Android to iPhone

Are you trying to transfer photos from Android to iPhone? The simplest solution is to use Google Photos, which saves your images in the cloud, so you can access them straight from the iOS app. That said, there are benefits to migrating images to the Apple ecosystem, especially if you are thinking of leaving the Google ecosystem indefinitely. We’ll show you other methods you can use to fully migrate your images.

QUICK ANSWER

While we wait for iPhone 15, here’s the first iPhone 16 Ultra leak

iPhone 16 Ultra CAD render leak

Credit: 9to5Mac
  • Alleged CAD renders of the top iPhone 16 model have leaked showing a taller and wider display.
  • The latest information suggests Apple could adopt the “Ultra” branding next year.

Apple’s yet to announce the iPhone 15 series, but the top model in the iPhone 16 series, due to launch next year, has just leaked. It seems Apple is planning on tweaking the branding of its iPhone models in 2024. The iPhone 15 Pro Max is set to become this year’s most premium variant, but come next year, the “iPhone 16 Ultra” might take over as the top-of-the-line iPhone.

These are the cheapest countries in which to buy an iPhone 14

Where is the cheapest place to buy the iPhone 14?

Credit: Robert Triggs / Android Authority

Despite our name, we don’t discriminate against iOS here at Android Authority. We take every device on its merits, and in the iPhone 14, we’re happy to admit that Apple has produced a fantastic handset that goes toe-to-toe with the best Android phones on the market. But it isn’t cheap at $799 before tax, and it’s super rare to see Apple ever offer any type of discount, save for the carriers that offer it cheap or free when you commit to a lengthy service plan. So we wondered, outside the US, where is the cheapest place to buy an iPhone 14? We’ve looked into it.

There are a couple of things to clarify before we give you the lowdown. Firstly, we’re comparing the price of buying an unlocked iPhone 14 from the Apple Store or an official reseller in each country mentioned below. No doubt there are many types of vendors offering the iPhone 14 for sale across the globe — some more reputable than others — but we’ll focus on official pricing here.

A new software update is waiting for you on your Galaxy S22 series phone

Welcome to the Samsung Galaxy S22 update hub. Here you’ll find the latest information on updates to the Samsung Galaxy S22, Galaxy S22 Plus, and Galaxy S22 Ultra. We’ll detail the current software versions for each device and alert you if there’s a new update rolling out. Samsung usually pushes out updates to the entire series, but this may vary per variant and carrier.

All three Galaxy S22 series phones launched with Android 12 and Samsung’s One UI 4.1 skin on top. Samsung will offer four major Android OS updates to the Galaxy S22, S22 Plus, and S22 Ultra. The company also guarantees five years of security updates for all devices.

China hits back, bans chips from US company

HUAWEI P50 Pro home screen in hand 2

Credit: Kris Carlon / Android Authority
  • China has banned US memory chip company Micron from selling chips in the country.
  • Micron produces a wide variety of chips such as RAM, DRAM, and storage.

The Chinese tech sector has been subjected to US trade sanctions in recent years, with the US barring the sale of various tech to Chinese chipmakers, smartphone brands, and more.

Now, the Chinese government has banned major US memory chipmaker Micron from selling chips to domestic companies (h/t: Reuters), citing a failed security review.

The Pixel 7 Pro’s panorama mode is still so far behind the iPhone

apple iphone 12 pro max vs google pixel 7 pro camera

Credit: Rita El Khoury / Android Authority

I travel a lot and I love taking panorama shots in scenic locations. They’re a great way to capture the immensity of the Alps, the peacefulness of the Slovenian seashore, or the Toronto skyline from the islands. But each time I take a panorama shot with my Pixel 7 Pro, I find the result disappointing. This is supposed to be one of the best camera phones on the market, but it can’t stitch a couple of images together to make a decent panorama — how come?

I had ignored this aspect of the Pixel’s photography experience until I went on a trip with a friend who carries an Apple iPhone 14. That’s when I (begrudgingly) noticed that their phone was taking much, much better panorama shots than my Pixel. So what gives? I picked up my old iPhone 12 Pro Max to investigate this often-forgotten aspect of mobile photography.

It’s high time Xiaomi stopped copying Apple iOS

MIUI vs iOS control center

Credit: Hadlee Simons / Android Authority

Opinion post by
Hadlee Simons

Xiaomi was one of many Chinese brands copying Apple iOS in the early 2010s, and this was an understandable trend at the time. It created a familiar experience for former iPhone users while also giving people a similar experience without paying a premium. Even today, iPhone 14 Pro users would feel right at home switching over to Xiaomi.

In fact, I distinctly remember this iOS-like aesthetic upon first using the Xiaomi Mi 4 and Mi Pad in the mid-2010s. I definitely excused it at the time due to the fact that these were cheap devices. “Who cares? I’m getting a great Android tablet with a Tegra chipset for under $250,” I thought upon buying the Mi Pad in China in 2015.

How to back up your text messages

While much of the world relies on WhatsApp these days, SMS text messaging is still a primary communication tool in the US. That means you’re likely to have plenty of important text messages that you wouldn’t want to lose in the event of your phone going missing. Fortunately, there’s more than one way to back up your messages. We’ll run you through how to save your text messages, whether you’re an iPhone or Android user.

QUICK ANSWER

Is the Oura Ring waterproof?

An Oura Ring 3 users washes her hands with the device on.

Credit: Kaitlyn Cimino / Android Authority

Despite its tiny stature, the Oura Ring boasts a variety of impressive features and specs. Intended to stay on your finger. it’s also comfortable, attractive, and lasts multiple days between charges. But what about while you shower or count laps in the pool? Find out if the Oura Ring is waterproof.

QUICK ANSWER

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 11th, 2025

Credit: Edgar Cervantes / Android Authority TL;DR Spotify is getting a new “Prompted Playlist” feature to help users create more […]

admin December 11th, 2025

TL;DR Four of the best Good Lock modules aren’t working properly on the One UI 8.5 beta. Home Up and […]

admin December 10th, 2025

This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in […]