Verizon just had an outage, did it affect you?

Verizon logo on smartphone, next to other devices (2)

Credit: Edgar Cervantes / Android Authority
  • Verizon experienced an outage in several parts of the US today, though services seem to have been restored for many users now.
  • A common thread between user reports indicates that affected users were using eSIMs, thus affecting iPhone 14 and iPhone 15 users more because of their eSIM-only configurations. Android users with eSIMs are also affected.
  • Verizon support has confirmed the outage in response to user complaints.

We’re hearing reports on social media that Verizon had a noticeable outage in many parts of the US. Many users have been spotted complaining on X (formerly known as Twitter) and Reddit that their Verizon phones did not have service, while some who did had fallen down to LTE with no 5G.

From what I can see on DownDetector, there was a large spike in Verizon outage reports a few hours ago, though that spike has now died down. Verizon’s support handle has confirmed the outage in replies to customers, but has not put out a standalone post informing the public at large about the outage.

The Legend of Zelda: Majora’s Mask can now natively run on Android thanks to an unofficial port

  • A developer has ported The Legend of Zelda: Majora’s Mask to Android.
  • This port runs natively on Android devices rather than in a Nintendo 64 emulator.
  • There’s also a port for The Legend of Zelda: Ocarina of Time as well as The Legend of Zelda: A Link to the Past.

The Legend of Zelda: Ocarina of Time and its direct sequel, The Legend of Zelda: Majora’s Mask, are two of the most iconic video games in history. Nintendo re-released both games on all of its home consoles released after the Nintendo 64, leaving many fans and newcomers alike wondering: What is the best way to play them today? Many would argue that the unofficial ports released by team Harbour Masters are the best way to play both games, but they don’t offer an Android release. Fortunately, one developer took it upon themselves to port the games to Android, letting you play The Legend of Zelda: Ocarina of Time and Majora’s Mask natively on your Android device.

How was The Legend of Zelda: Ocarina of Time and Majora’s Mask ported to Android?

If you’re wondering how this is even possible, let me try to explain. Back in 2020, a group of developers banded together to form the Zelda Reverse Engineering Team (ZeldaRET). Their stated goal was to “recreate a source code base” for select The Legend of Zelda titles (plus the original Animal Crossing) from scratch, “using information inside the game along with static and/or dynamic analysis.”

Google’s precious Search recipe exposed in huge leak (Update: Google’s statement)

Samsung Galaxy S24 Circle to Search lying on chair

Credit: Robert Triggs / Android Authority
  • Many of the ranking factors involved in Google Search’s super-secret algorithm have purportedly leaked.
  • This leak sheds light on how Google Search seemingly operates and which attributes it uses to rank content on the Search Engine Results Page.
  • However, the findings from the leaked document do not align with Google’s statements on these topics over the years.

Update: May 30, 2024 (12:22 AM ET): In a statement shared with The Verge, Google has confirmed in a roundabout way that the leaked documents are real, albeit they could be outdated or incomplete.

We would caution against making inaccurate assumptions about Search based on out-of-context, outdated, or incomplete information. We’ve shared extensive information about how Search works and the types of factors that our systems weigh, while also working to protect the integrity of our results from manipulation.

Samsung Messages app crashing over and over? Blame Google Meet. Here’s how to fix! (Updated)

samsung galaxy s22 messages app

Credit: Ryan Haines / Android Authority
  • In the past 12 hours, Samsung users have found the native Messages app is constantly crashing.
  • The problem appears to stem from a recent update to Google Meet, which somehow affects Samsung Messages.
  • Disabling or uninstalling Meet temporarily fixes the problem. Google has issued a Meet app update which fixes it permanently, so update your app.

Update: May 30, 2024 (12:13 AM ET): Samsung has informed its users through the official forums that Google has issued an update for the Google Meet app. This updated Google Meet app will stop your Samsung Messages app from crashing continuously. You can look for the update for Google Meet in the Google Play Store. Let us know if this fixes the crashing issues for you!


Original article: May 29, 2024 (10:08 AM ET): Samsung’s Galaxy smartphones come with a pre-installed messaging app called Messages. This is different from the Google Messages app that also comes installed on most Galaxy phones (confusing, we know). Although it’s likely the majority of Galaxy phone owners use Google’s app, there are still a lot of folks who prefer Samsung’s. Unfortunately, those folks have been facing a serious problem over the past 12 hours or so.

Understanding Material Cybersecurity Breaches and Material Cyber Attacks

In an increasingly digitized world, the threat of cyber attacks looms large over businesses, governments, and individuals alike. Among the myriad of cybersecurity concerns, the notion of a “material” cyber breach or attack holds significant weight, signifying incidents that carry substantial consequences and ramifications.

Let’s delve deeper into what constitutes a material cybersecurity breach or attack and its implications.

Defining Material Cybersecurity Breaches and Attacks

A material cybersecurity breach or attack refers to an incident that has significant consequences, either in terms of its scope, impact, or severity. Unlike minor breaches that may result in minimal disruption or loss, material breaches can lead to substantial financial, reputational, or operational damage to the affected entity.

Characteristics of Material Breaches and Attacks:

1. Magnitude of Impact: Material breaches often affect a large number of individuals, businesses, or critical infrastructure systems. They may result in widespread data com-promise, financial losses, or disruption of essential services.

2. Severity of Consequences: The consequences of a material breach are severe and far-reaching. They may include substantial financial liabilities, regulatory fines, loss of customer trust, and damage to brand reputation.

3. Nature of Target: Material breaches typically target sensitive or valuable information, such as personal data, intellectual property, financial records, or classified government data. Attackers may exploit vulnerabilities in systems or networks to gain unauthorized access to this information.

4. Duration and Persistence: Material breaches may persist over an extended period, allowing attackers to maintain access to compromised systems or data for prolonged periods. This prolonged exposure increases the potential for further exploitation and dam-age.

Examples of Material Cybersecurity Breaches and Attacks

1. Data Breaches: Incidents involving the unauthorized access, theft, or exposure of sensitive data, such as personal information, credit card details, or proprietary business data, constitute material breaches. Notable examples include the Equifax data breach and the Yahoo data breaches.

2. Ransomware Attacks: Ransomware attacks that encrypt critical data or systems, rendering them inaccessible until a ransom is paid, can have significant material consequences. The 2021 Colonial Pipeline ransomware attack exemplifies the disruptive impact of such incidents on critical infrastructure.

3.Supply Chain Attacks: Attacks targeting supply chain partners or vendors can have material implications for multiple organizations within the supply chain. The SolarWinds supply chain attack, discovered in 2020, underscored the risks posed by compromised software supply chains.

4. Critical Infrastructure Attacks: Cyber attacks targeting critical infrastructure, such as power grids, transportation systems, or healthcare facilities, can have devastating con-sequences on public safety, economic stability, and national security. The Stuxnet worm, discovered in 2010, demonstrated the potential for cyber attacks to disrupt industrial control systems.

Implications and Responses

Material cybersecurity breaches and attacks necessitate swift and decisive responses from affected organizations, regulatory authorities, and governments.

Key considerations include:

  Risk Mitigation: Organizations must prioritize cybersecurity measures to prevent, detect, and respond to potential breaches. This includes implementing robust security protocols, conducting regular vulnerability assessments, and enhancing incident response capabilities.

•  Regulatory Compliance: Regulatory authorities may impose stringent compliance requirements and penalties for organizations that fail to adequately safeguard sensitive in-formation or critical infrastructure. Compliance with regulations such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA) is essential to mitigate legal and financial risks.

• Public Trust and Reputation: Rebuilding public trust and preserving brand reputation is paramount following a material breach. Transparent communication, timely disclosure of incidents, and proactive efforts to address vulnerabilities can help mitigate reputational damage and restore confidence among stakeholders.

• Collaboration and Information Sharing: Collaboration among industry stakeholders, government agencies, and cybersecurity experts is essential to enhance threat intelligence sharing, identify emerging threats, and develop proactive cybersecurity strategies.

In conclusion, material cybersecurity breaches and attacks pose significant risks to organizations and society at large. By understanding the characteristics, examples, and implications of such incidents, stakeholders can better prepare, respond, and mitigate the impact of cyber threats in an increasingly interconnected world.

The post Understanding Material Cybersecurity Breaches and Material Cyber Attacks appeared first on Cybersecurity Insiders.

Data Entry Job Offers in Southeast Asia Could Be Cyber Crime Traps

In recent revelations by Indian police authorities collaborating with counterparts in Sri Lanka and Singapore, a disturbing trend has emerged: hacking syndicates are preying on unsuspecting graduates by enticing them with lucrative data entry positions in countries like Cambodia, Singapore, Bangkok, Malaysia, or Vietnam, only to coerce them into cybercrime activities.

The modus operandi is unsettlingly simple- These criminal groups promise high-paying data entry roles to hopeful job seekers, providing them with basic necessities upon arrival in countries like Cambodia. However, once settled, these individuals are coerced into engaging in fraudulent schemes such as digital scams and cyber campaigns.

Many of these recruits initially sought legitimate employment opportunities after receiving training in data entry, only to find themselves ensnared in criminal activities like creating fake social media profiles to deceive innocent victims or manipulating individuals into cryptocurrency schemes, ultimately defrauding them of their finances.

Resistance is met with severe consequences. Those expressing reluctance are subjected to physical violence or starvation until they capitulate and sign documents further entangling them in criminal activities. These signed agreements, later used to implicate the coerced individuals in drug or human trafficking, carry hefty penalties and lengthy prison sentences, compelling compliance or leading to tragic outcomes like suicide due to the emotional turmoil endured.

Those who succumb to the pressures of cybercrime are promised a monthly salary of $400, payable after 45 days, with the intention of transferring funds to family members back home. Exploiting lax enforcement of laws in underdeveloped countries, except for Malaysia and Singapore, these criminal enterprises mostly operated by Chinese individuals reap substantial profits.

The question arises: how are these recent graduates enticed into such criminal enterprises? Through social media or SMS, promising job opportunities like data entry or virtual assistant positions are advertised, only to ensnare unsuspecting individuals upon arrival.

Compounding the issue, evidence of the crimes is digitally fabricated, leaving victims vulnerable to legal prosecution without implicating their employers or influencers.

In light of these alarming trends, caution is advised when encountering job offers via platforms like WhatsApp or social media. What may appear as a promising opportunity could well be a trap leading to dire consequences.

The post Data Entry Job Offers in Southeast Asia Could Be Cyber Crime Traps appeared first on Cybersecurity Insiders.

Looks like the Galaxy Watch Ultra name is basically confirmed

Galaxy Watch 6 Classic vs 4 Classic

Credit: Kaitlyn Cimino / Android Authority
  • A regulatory body appears to confirm that a Samsung Galaxy Watch Ultra is on the way.
  • Multiple regulatory bodies also appear to show a model number of SM-L705F and 10W charging.
  • The Galaxy Watch 7 series, including the Galaxy Watch Ultra, could launch on July 10.

We’re expecting a whole slew of Galaxy Watches to come soon. Alongside the expected Galaxy Watch 7 series — which includes the standard and Classic variants — we’re also expecting a Galaxy Watch FE and a Galaxy Watch Ultra. While the former is still shrouded in a bit of mystery, more and more evidence supports the latter is on the way.

Today, via MySmartPrice, we have an apparent confirmation of the “Ultra” moniker. The United Arab Emirates regulatory body Telecommunications and Digital Government Regulatory Authority (TDRA) has a public listing for a “Samsung Galaxy Watch Ultra” with model number SM-L705F. This model number matches a similar United States filing via the Federal Communications Commission (FCC), although it does not use the “Ultra” name. Either way, it seems like we’re getting a Galaxy Watch Ultra at some point soon.

Apple Watch: Leaked photos reveal smartwatch band Apple never released

A user force restarts their Apple Watch Series 8.

Credit: Kaitlyn Cimino / Android Authority
  • Images of an Apple Watch band that never made it to production have emerged online.
  • The sports version was reportedly available in red and white. There was also a leather version in brown, red, and ultraviolet.
  • The band may have been canceled due to production difficulties and other problems

It’s not unusual for a company to create a design, cancel it for whatever reason, and then move on to something else. What is uncommon, however, is actually getting to see the product the company discarded. But a new leak appears to give us a look at an abandoned Apple Watch band design that never made it to production.

A tipster who goes by @StellaFudge on X (formerly Twitter) has shared multiple images of what they say is the “Apple Deployment Band.” The tipster claims that there are different types of this band, and less than 15 are known to exist.

Phone Link for Windows will let you copy text from your Android phone’s photos

Windows Phone Link icon

Credit: Robert Triggs / Android Authority
  • You’ll soon be able to use Phone Link to copy text from your Android phone’s photos, allowing you to use it in Windows 11.
  • This should be faster than using the Snipping Tool’s text functionality.
  • The feature is only available in Windows 11 preview builds right now, but it should be available in stable Windows 11 soon.

Windows recently gained optical character recognition (OCR) tech via the Snipping Tool, allowing you to grab text from images and paste it into the app of your choosing. What if you want to grab text from your phone photos and use it on your computer, though? Well, you could copy those photos to your PC first, or you could use this new Phone Link feature.

Windows Central spotted OCR functionality in the Phone Link app (h/t: The Verge) on Windows 11. The feature shows up as a “text” icon when viewing your phone’s snaps in the Photos section of Phone Link. Tapping the icon will initiate character recognition, and you can then select specific text, highlight all text, or copy all text.

Kenyan tech workers call out US Big Tech for ‘modern-day slavery’

OpenAI on website on smartphone stock photo (3)

Credit: Edgar Cervantes / Android Authority
  • Nearly 100 Kenyan tech workers have sent an open letter to President Biden, demanding an end to exploitation by US companies like Meta and OpenAI.
  • The workers describe harsh conditions, low pay, and mental health issues, accusing the companies of labor practices amounting to “modern-day slavery.”
  • They urge President Biden to ensure trade agreements include strong labor protections and accountability measures for US firms operating abroad.

In a significant move, 97 African tech workers involved in AI training and content moderation for major US corporations like Meta and OpenAI have addressed an open letter to President Biden. The letter, published on 22 May, accuses these companies of “systemic abuse and exploitation” of African workers and calls for urgent intervention.

The letter, first reported by Wired, was also cc’d to US Trade Representative Ambassador Katherine Tai. It coincides with Kenyan President William Ruto’s visit to the US to mark the 60th anniversary of US-Kenyan diplomatic relations and discuss trade, investment, and technological innovation.

Report: Apple signs deal with OpenAI for iOS, still wants Google as an ‘option’

ChatGPT stock photo 71

Credit: Calvin Wankhede / Android Authority
  • Apple has signed a deal with OpenAI to provide chatbot functionality in iOS 18, according to a trusted journalist.
  • The iPhone maker is still working on a deal with Apple to have Google’s Gemini as an “option.”

We previously heard Apple was talking to Google and OpenAI about providing AI functionality on iOS 18. Now, it sounds like Apple has signed a deal with the ChatGPT maker.

Bloomberg journalist Mark Gurman reported in his Power On newsletter that Apple and OpenAI have reached a deal for OpenAI to provide chatbot functionality in iOS 18. He added that this deal will be a “component” of Apple’s WWDC developer event in June.

Apple’s big AI push could include custom emoji

apple iphone 15 app drawer on table

Credit: Ryan Haines / Android Authority
  • Bloomberg journalist Mark Gurman has shed plenty more details on Apple’s AI features for iOS 18.
  • Apple will use generative AI in iOS 18 to create custom emojis based on what you type.
  • The iPhone 15 series will likely get most of these new on-device AI features.

We’ve seen plenty of recent leaks pertaining to Apple’s AI plans for iOS 18. Now, a trusted source has revealed loads more apparent Apple AI details.

Bloomberg journalist Mark Gurman used his Power On newsletter to outline plenty of AI features coming to iOS 18. One previously unreported feature is that Apple will apparently use generative AI to create custom emojis based on what you type.

I planned 30 trips in 3 years, and this is the app that kept me sane

https://www.youtube.com/watch?v=bZPZ3tL0ShU

Around three years ago, my husband and I moved from Lebanon to Paris. Going from a country where we had to plan every trip months in advance to a country where we could hop on a train and go anywhere in Europe was life-changing. No Visa applications, no SIM card change, and no new travel insurance to buy — how could we resist? So off we went. One trip turned into another, then another, and another… And here we are today, with over 30 trips under our belt and one app to help us manage the madness: Wanderlog.

Now, before you think I’m made of money, I’ll be clear: Not all of these were week-long vacations. Many were short single-day trips to nearby towns or weekend trips. But I digress. We’re here to talk about Wanderlog.

Rings of Power season 2: Release date, cast, and other rumors

The Lord of the Rings The Rings of Power Season 2 banner

Credit: Amazon

Fans of the Lord of the Rings franchise can’t get enough of Middle Earth. Even Amazon Prime Video got in on the action with the Rings of Power series. It has been a couple of years since the 2022 release, and fans have been itching to learn more about season 2 of The Rings of Power. We know more about it now, so let’s dig into the details!

When is season 2 of The Lord of the Rings: The Rings of Power coming out?

We now know more about the second season of The Lord of the Rings: The Rings of Power. Luckily, you won’t have to continue waiting much longer. Season 2 is scheduled to premiere on August 29, 2024. Since Amazon knows you guys need a bit more than a single episode, it will launch the first three episodes at once. After that, a new episode will come out every Thursday, concluding on October 3, 2024. There will be eight episodes in total. The titles for each episode are still unknown.

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 11th, 2025

Credit: Edgar Cervantes / Android Authority TL;DR Spotify is getting a new “Prompted Playlist” feature to help users create more […]

admin December 11th, 2025

TL;DR Four of the best Good Lock modules aren’t working properly on the One UI 8.5 beta. Home Up and […]

admin December 10th, 2025

This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in […]