The Pixel Watch’s battery full notification has mysteriously disappeared

Google Pixel Watch 2 charging

Credit: Kaitlyn Cimino / Android Authority
  • The Pixel Watch and Pixel Watch 2 send a notification to your phone once it is done charging.
  • Users are reporting that they are no longer seeing this fully charged notification.
  • Some are even saying that they never had the feature in the first place.

Back in November 2023, Google quietly rolled out a feature to the Pixel Watch and Pixel Watch 2. The feature would tell an owner that their smartwatch was done charging via phone notification. It was a highly requested feature, which is why its seemingly sudden disappearance is so unfortunate.

Some Pixel Watch and Pixel Watch 2 owners have started to notice they are no longer receiving the battery full notification. One of our own writers also reports that they have not seen the notification in the last few weeks. If that wasn’t enough, there’s even an entire thread on Google’s community page full of owners who claim the same or report never seeing the notification in the first place.

New update incoming for Samsung Galaxy S24 series!

Samsung Galaxy S24 Family 7

Credit: Lanh Nguyen / Android Authority
  • The Samsung Galaxy S24 series is now getting the May security update.
  • It fixes 45 security vulnerabilities in Galaxy devices.
  • The update is now rolling out in the US and Europe.

Folks using a Samsung Galaxy S24 series phone — there’s a new update heading your way. The company has started pushing out the May update for the Galaxy S24, S24 Plus, and S24 Ultra in the US and Europe.

Motorola’s next Galaxy Z Flip rival might bring a welcome upgrade at the same price

motorola razr plus cover screen laying down

Credit: Ryan Haines / Android Authority
  • The price and colorways of the Motorola Razr Plus (2024), aka the Motorola Razr 50 Ultra, have leaked.
  • The phone could cost the same as last year with a welcome storage and RAM upgrade for the base model.
  • Motorola is expected to announce the new Razr in June.

Motorola’s next foldable phone — the Razr Plus (2024), also expected to be called the Razr 50 Ultra in some markets — might come in at the same price as last year. A new leak with screenshots of the phone’s price from a European retailer shows that it could cost €1,200 (~$1,289) in the region. That’s the same price as the Motorola Razr 40 Ultra, aka the Razr Plus (2023).

The new App Mall promises to simplify app discovery on Chromebooks

ASUS Chromebook Vibe CX34 Flip review 9

Credit: Edgar Cervantes / Android Authority
  • A new “App Mall” is in the works for Chromebooks, promising a streamlined way to discover and install apps.
  • The App Mall draws inspiration from the existing Explore app and makes installing web apps incredibly easy.
  • Currently, the App Mall features only Android and web apps, not Linux apps.

Chromebooks offer impressive versatility, with the ability to run PWAs (Progressive Web Apps), Android apps, and even Linux apps. Until now, there was no single source to browse through and install all these various kinds of apps for Chromebooks, but that’s about to change. Currently in the preview stage, the new App Mall promises a centralized location featuring the best apps and games for Chromebooks.

The folks at Chrome Unboxed discovered that the App Mall is currently available for preview, even if you’re not on a Chromebook. Chromebook users wishing to access the App Mall will need to enable the chrome://flags/#cros-mall flag within the Canary channel of ChromeOS 126. This should add the App Mall icon to their shelf and app launcher.

Safeguarding Your Family: Strategies for Achieving Data Security

In an age where digital information is omnipresent, ensuring the security of your family’s data has become paramount. From personal finances to sensitive documents and cherished memories, the digital landscape is filled with valuable assets that require protection.

Here, we explore actionable strategies to fortify your family’s data security and mitigate the risks associated with cyber threats.

1. Educate Every Family Member: The first step towards achieving family data security is education. Ensure that every member of your family understands the importance of cybersecurity practices. Teach them about the risks associated with sharing personal information online, phishing scams, and the significance of strong passwords.

2. Implement Robust Password Management: Encourage the use of strong, unique passwords for each online account. Consider utilizing a reputable password manager to generate and store complex passwords securely. Additionally, enable multi-factor authentication wherever possible to add an extra layer of protection.

3. Secure Your Devices: Keep all devices, including computers, smartphones, and tablets, up to date with the latest security patches and antivirus software. Enable device encryption to safeguard data in case of theft or loss. Encourage the use of biometric authentication methods, such as fingerprint or face recognition, for added security.

4. Practice Safe Internet Usage: Teach your family members to exercise caution while browsing the internet. Avoid clicking on suspicious links or downloading attachments from unknown sources. Install ad blockers and privacy-focused browser extensions to minimize exposure to malicious content.

5. Protect Your Home Network: Secure your home Wi-Fi network with a strong, unique password and encryption protocol (WPA2 or WPA3). Consider setting up a separate guest network for visitors to prevent unauthorized access to your main network. Regularly update your router’s firmware to patch security vulnerabilities.

6. Back Up Data Regularly: Implement a comprehensive data backup strategy to safe-guard against data loss due to hardware failure, theft, or cyberattacks. Utilize both local and cloud-based backup solutions to ensure redundancy. Test your backups periodically to verify their integrity and reliability.

7. Limit Sharing of Personal Information: Encourage family members to be mindful of the information they share online, especially on social media platforms. Avoid over-sharing personal details such as birthdates, addresses, and financial information, as this information can be exploited by cybercriminals.

8. Monitor Online Activity: Keep a vigilant eye on your family’s online activity, especially for younger members. Install parental control software to restrict access to inappropriate content and monitor their internet usage patterns. Educate children about online safety and the potential risks of interacting with strangers online.

9. Stay Informed About Emerging Threats: Stay updated on the latest cybersecurity threats and trends. Subscribe to reputable cybersecurity blogs, newsletters, and news outlets to receive timely updates and security advisories. Encourage open communication within your family about any security concerns or incidents.

10. Create a Response Plan: Develop a comprehensive incident response plan outlining the steps to take in the event of a security breach or data compromise. Assign roles and responsibilities to family members and practice drills to ensure everyone knows what to do in an emergency.

By implementing these proactive measures, you can significantly enhance your family’s data security posture and minimize the risks of falling victim to cyber threats. Remember, data security is a continuous process that requires diligence and vigilance from every member of the family. Protecting your digital assets today will safeguard your family’s future tomorrow.

The post Safeguarding Your Family: Strategies for Achieving Data Security appeared first on Cybersecurity Insiders.

Ransomware hackers calling parents from their Children mobile phone numbers

A concerning trend has emerged, revealing the extent to which criminals perpetrating ransomware attacks are willing to go to extract money from their victims. Charles Carmakal, CEO of Mandiant, now under Google’s ownership, highlighted one such alarming scenario during the Google Security Threat Intelligence Panel at the RSA Conference in San Francisco.

According to Carmakal, the situation has escalated as cybercriminals resort to SIM swapping, a technique involving the unauthorized transfer of a victim’s phone number to a new SIM card, to target children’s phones. Subsequently, they use these compromised devices to contact the children’s parents and issue threats to coerce them into paying ransom.

This tactic is a form of psychological manipulation aimed at pressuring victims into compliance. One particularly sinister approach involves calling corporate executives from their children’s phone numbers and threatening dire consequences unless a ransom is paid promptly.

Termed Caller ID Spoofing, this method involves cloning a victim’s SIM card to impersonate them and make fraudulent calls. Cybercriminals fabricate convincing narratives to intimidate victims, leveraging emotional connections to increase the likelihood of ransom payment, often in cryptocurrency.

Imagine the distress of receiving a call seemingly from your child while engrossed in a meeting. The psychological impact of such a scenario can tilt the odds in favor of the hacker, compelling the victim to pay to safeguard their child’s privacy.

In typical ransomware attacks on mobile devices, attackers steal contacts and threaten to expose sensitive information such as photos, messages, and contacts unless a ransom is paid. However, in attacks targeting corporate environments, C-level executives become prime targets for Caller ID spoofing tactics.

In addition to the threat posed by encrypted databases, the risk of stolen data being leaked online looms large in such attacks. Seeking assistance from law enforcement and adhering to cybersecurity experts’ recommendations to mitigate these risks remains the most viable solution.

The post Ransomware hackers calling parents from their Children mobile phone numbers appeared first on Cybersecurity Insiders.

Leaked Pixel 9 cases offer design clues, hint at a four-phone lineup

  • A case maker has listed out protective cases for the Pixel 9 series, confirming rumored design changes.
  • The listings support rumors of three Pixel 9 models, including a new, smaller Pixel 9 Pro.
  • The Pixel Fold 2 case listing suggests it may launch alongside the Pixel 9 series this fall.

With the Google Pixel 9 launch still several months away, eager accessory makers are already spilling the beans on the upcoming Pixel flagships. Multiple case manufacturers, including Thinborne, have begun listing alleged Pixel 9 series cases, potentially validating some earlier rumors while challenging others. (h/t: Android Central)

Pixel 9 series case renders

Samsung’s first 3nm Exynos chip nears mass production phase

Samsung logo stock photo from CES 2024 (3)

Credit: Edgar Cervantes / Android Authority
  • Samsung has announced it is preparing to begin mass production of its 3nm chips.
  • The company is currently in the final process of designing.

Samsung initially began production of its 3nm process chips back in 2022, beating out rival TSMC to the milestone. Now almost two years later, the Android smartphone manufacturer is almost ready to go into mass production.

Announced through a joint press release with partner Synopsys, the two companies revealed they are preparing to enter the mass production phase for Samsung’s 3nm chip. Currently, the two companies are in the final design stage, which is known as “taping out.” In this process, the design is sent to the foundry so that they can create masks used for mass production. It is expected that mass production could start in the next few months.

The May update is here for the Pixel Watch but not for Pixel phones

google pixel watch wear os watch face pixel watch 2 face i 2

Credit: Rita El Khoury / Android Authority
  • The Google Pixel Watch and Pixel Watch 2 are now getting the May 2024 update.
  • The software includes the month’s security patches.
  • The rollout has started and should continue over the next week, depending on your carrier and device.

Google has started pushing out the May 2024 security update for the Pixel Watch and Pixel Watch 2. All supported Pixel Watches running Wear OS 4 will start receiving the update now, and the rollout will continue over the next week, depending on your carrier and device.

Google gives you more control with updated 2FA setup process

Google Logo Stock Photo 2023

Credit: C. Scott Brown / Android Authority
  • Google’s updated 2FA setup no longer requires a phone number by default.
  • Users can set up 2FA directly with an authenticator app or hardware key, skipping SMS verification.

Google has streamlined its two-factor authentication (2FA), also known as the two-step verification (2SV) process, making it easier and more secure for users to protect their accounts.

The new, improved process gives users the option to start their 2FA setup by directly choosing more secure methods like authenticator apps or physical security keys. In the past, setting up 2FA required first providing a phone number before being able to add an authenticator app.

Apple’s May 7 event could be the start of iPad’s transformation into a true laptop replacement

Apple iPad Pro M2 2022 in Magic Keyboard

Credit: Oliver Cragg / Android Authority
  • Apple is expected to unveil new iPad Air and iPad Pro models at its “Let Loose” event.
  • The iPad Air may adopt a dual-screen-size strategy similar to the MacBook Air.
  • The iPad Pro might receive OLED displays, a redesigned Magic Keyboard, and a larger trackpad.

Apple’s highly anticipated “Let Loose” event on Tuesday promises to usher in a transformative era for the iPad. While we expect updates to the iPad Pros and iPad Airs, industry insider Mark Gurman has provided key insights into the post-event iPad lineup configuration and its ambitious convergence with the MacBook experience.

Gurman proposes that the 35-minute presentation will streamline the current iPad lineup and solidify the iPad Pro’s position as a powerful alternative to traditional laptops. Initially, the new iPad Pros were expected to get upgraded to the M3 chip. However, Gurman seems convinced that they would instead launch with the yet-announced M4 chip.

A new patent about a folding iPhone has surfaced, but is it a good idea?

Apple iPhone 15 Plus and iPhone 15 Pro Max

Credit: Aamir Siddiqui / Android Authority
  • A recently surfaced Apple patent reveals the company is exploring a foldable device with an innovative hinge mechanism.
  • Details in the patent suggest a flip-style clamshell foldable with a hinge that could potentially fold both inwards and outwards.
  • While an Apple foldable would generate massive interest, the company’s reputation for seamless user experiences raises the stakes and makes a flawless debut crucial.

While rivals like Samsung, Motorola, and others have embraced foldable phones, Apple remains a notable holdout. Despite waves of rumors and leaks suggesting a foldable iPhone is in development, nothing concrete has materialized. However, a recently published patent application discovered by Patently Apple gives us fresh insights into Apple’s explorations of folding devices. (h/t: PhoneArena)

Apple’s patent, filed with the U.S. Patent and Trademark Office (USPTO) last October, describes a novel hinge design for folding display devices. The images used align with a flip-style clamshell foldable. However, Apple’s patent implies a greater range of motion. The hinge could potentially allow the device to fold both inwards and outwards, which could be a first for a mass-market product.

Microsoft uncovers a security flaw impacting Android apps with billions of combined downloads

Android logo on smartphone stock photo (8)

Credit: Edgar Cervantes / Android Authority
  • Microsoft has uncovered a security vulnerability affecting Android apps named “Dirty Stream.”
  • This could allow attackers to execute malicious code within popular apps, potentially leading to data theft.
  • The flaw is widespread, with Microsoft identifying vulnerable apps that have billions of combined installations.

Microsoft has brought to light a critical security loophole, potentially affecting countless Android applications. Dubbed “Dirty Stream,” this vulnerability presents a serious threat that could grant someone the ability to take control of apps and steal valuable user information. (h/t: Bleeping Computer)

The heart of the “Dirty Stream” vulnerability lies in the potential for malicious Android apps to manipulate and abuse Android’s content provider system. This system is typically designed to facilitate secure data exchange between different applications on a device. It includes safeguards such as strict isolation of data, the use of permissions attached to specific URIs (Uniform Resource Identifiers), and thorough validation of file paths to ward off unauthorized access.

The biggest Pixel 8a leak yet reveals all the juicy details

Google Pixel 8 back standing upright

Credit: Robert Triggs / Android Authority
  • A major leak, including a spec sheet and promo image, has revealed extensive details about the Google Pixel 8a.
  • The document all but confirms key specs, including a 120Hz display, Tensor G3 chip, and wireless charging.
  • The promo image indicates a European price of €549, hinting at a possible price increase from the Pixel 7a.

As Google I/O 2024 approaches on May 14, the excitement surrounding the potential unveiling of the Google Pixel 8a is reaching a fever pitch. A significant new leak has emerged, offering what could be our most detailed look yet at the specifications of Google’s eagerly awaited mid-range phone.

This leak originates from X/Twitter user @MysteryLupin, who has shared what appears to be a translated document outlining a comprehensive list of the Pixel 8a’s technical specifications. Additionally, the leaker has released a promotional image that suggests European pricing for the device, as well as a potential discount for those who pre-order the phone.

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 11th, 2025

Credit: Edgar Cervantes / Android Authority TL;DR Spotify is getting a new “Prompted Playlist” feature to help users create more […]

admin December 11th, 2025

TL;DR Four of the best Good Lock modules aren’t working properly on the One UI 8.5 beta. Home Up and […]

admin December 10th, 2025

This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in […]