Are Eufy’s Find My Device trackers dead? (Updated: Still alive)

Eufy Find My Device Network Trackers

Credit: Eufy
  • Eufy previously announced that it would launch Bluetooth trackers for Android’s Find My Device network in June 2024.
  • The company later updated its announcement blog post to reveal that the target release date had been changed to late 2024.
  • Eufy has now taken down the post entirely, which seemed to suggest it could be abandoning those plans. However, the company has reached out to clarify that the trackers are still in the works.

Update: January 30, 2025 (11:29 PM ET): Eufy has contacted Android Authority to clarify the status of its delayed Find My Device Bluetooth trackers. According to the company, the trackers have not been canceled and are under testing right now. You can read the Eufy’s full statement below.

The Google/FMD versions of eufy SmartTrack devices have not been canceled. External user testing is currently going on and we should have an update on commercial/retail availability of these devices by mid-February.

The Razer Kraken Kitty V2 headsets are super cute and on sale

Razer Kraken Kitty V2 BT featured image

Credit: Razer

Headphones are great for listening, but they also sit on top of your dead while you use them. This means aesthetics can be an important factor. The Razer Kraken Kitty V2 series is your perfect match if you want something unique, cool, and super cute. These have cat ears! Two of the most popular models are on sale right now, so it’s the right time to get one of these awesome headsets.

Get the Razer Kraken Kitty V2 BT for $79.99 ($20 off)

Pixel 4a battery mystery solved: Investigation reveals ‘real hack job’ behind update of death

Google Pixel 4a using in hand screen 1

Credit: David Imel / Android Authority
  • A security hacker and developer has investigated what went wrong with the Pixel 4a’s battery capacity.
  • It looks like Google’s latest update specifically lowers the battery voltage on the Pixel 4a.
  • The investigation also suggests that the “update of death” for the Pixel 4a specifically impacts phones with batteries from a particular manufacturer.

There’s been a lot of talk lately about Pixel 4a’s battery downgrade after what’s being deemed an “update of death.” If you’re a Pixel 4a user, you’ve probably heard about the issue or, worse, suffered its consequences. You may be asking if this is a bug or if this was an intentional move made by Google to cripple the Pixel 4a’s battery performance. Well, a new investigation claims changes made in the update might actually be responsible for your Pixel 4a suddenly running out of juice. It also suggests that the problem might not be impacting all Pixel 4a units, but those handsets that house a battery made by a particular manufacturer.

Amazon quietly mapped your life through your phone and sold the data, lawsuit alleges

Amazon logo on phone next to boxes stock photo 15

Credit: Edgar Cervantes / Android Authority
  • Amazon is facing a lawsuit accusing it of secretly tracking users through their smartphones and collecting personal data without consent.
  • The lawsuit claims Amazon used its Ads SDK in third-party apps to gain backdoor access to phones, gathering location data that could reveal sensitive details like religious beliefs and health conditions.
  • The lawsuit, filed in a San Francisco court, seeks $5 billion in damages for millions of Californians allegedly affected.

A new lawsuit claims Amazon might know everything your smartphone knows about you — down to your coffee runs, gym visits, and even your place of worship — thanks to hidden code embedded in popular apps.

According to the lawsuit, first reported by Reuters, Amazon’s data collection practices allegedly allowed it to track users’ movements in great detail, revealing where they live, work, and shop. The complaint further claims that this data could expose even more personal aspects of consumers’ lives, such as religious beliefs, sexual orientation, and health conditions.

Data Engineers Should Be Aware of These Cloud Security Challenges

As organizations continue to migrate to the cloud to enhance scalability, flexibility, and cost efficiency, the role of data engineers has never been more critical. However, with the benefits of cloud computing come a unique set of security challenges that data engineers must be aware of. Data engineers are responsible for managing, processing, and storing large volumes of data—often sensitive in nature—making them key players in ensuring data security within cloud environments. As cloud adoption grows, here are the top security challenges that data engineers should be aware of.

1. Data Breaches and Unauthorized Access

One of the most significant threats to cloud security is unauthorized access to sensitive data. A data breach in the cloud can result in the exposure of personally identifiable information (PII), intellectual property, and business-critical data. Data engineers must ensure that data is properly encrypted both at rest and in transit to mitigate the risk of unauthorized access.

Cloud environments are often configured with complex access controls, and it’s essential for data engineers to understand how to set up role-based access control (RBAC) and least-privilege access. These protocols ensure that only authorized individuals can access specific datasets, limiting the scope of potential breaches.

2. Misconfigured Cloud Services

Cloud service providers offer a wide array of features that can be customized to meet the unique needs of an organization. However, if these services are not configured correctly, they can expose critical data to attackers. Misconfigurations such as improperly set permissions, overly broad access policies, or neglected default settings are common causes of security incidents.

Data engineers must be diligent in configuring cloud services to avoid common pitfalls. This includes regularly auditing security settings, using automated configuration management tools, and adhering to security best practices recommended by the cloud provider. Regular testing and monitoring can help catch misconfigurations before they become vulnerabilities.

3. Insider Threats

While external cyberattacks often grab the spotlight, insider threats are an equally significant risk to cloud security. Data engineers, system administrators, or even third-party vendors with access to cloud environments may inadvertently or maliciously compromise data.

To mitigate the risk of insider threats, data engineers should implement strict access controls and logging mechanisms to track who accesses data and when. Regular audits of user activity can help identify potential risks before they escalate. Additionally, organizations should provide ongoing training to employees on data security best practices, including recognizing phishing attempts and following proper data handling procedures.

4. Data Loss and Inadequate Backup Procedures

Cloud providers typically have high availability and redundancy measures in place to prevent data loss. However, human error, misconfigurations, or even provider outages can lead to data loss. For example, if data is not properly backed up or synchronized across multiple cloud regions, it could be lost in the event of a system failure.

Data engineers should implement a comprehensive backup strategy that includes automated backups, geographically distributed storage, and frequent restoration tests. It’s essential to have a clear disaster recovery plan that outlines how data will be recovered in the event of an outage or breach.

5. Compliance and Regulatory Challenges

As data privacy laws become more stringent, organizations must ensure that their cloud environments comply with regulations like GDPR, HIPAA, and CCPA. Data engineers are often tasked with managing sensitive data, and they must ensure that it is stored, processed, and transferred in compliance with relevant laws.

Data engineers should be well-versed in the compliance requirements that apply to their industry and region. They should also work closely with legal and compliance teams to ensure that the cloud services they use align with these regulations. Additionally, leveraging cloud-native tools that provide data encryption, auditing, and reporting can make it easier to meet compliance requirements.

6. Third-Party Service Providers

Most cloud services rely on third-party vendors, from data storage providers to AI services. While these third-party vendors offer significant value, they can also introduce risks to cloud security. Data engineers should assess the security posture of third-party providers before integrating them into their cloud architecture.

Using security frameworks like Service Organization Control (SOC) reports can help data engineers evaluate the security practices of third-party vendors. Furthermore, they should ensure that third-party integrations are secure and follow industry best practices, especially in regard to data handling and access control.

7. Complexity of Multi-Cloud and Hybrid Environments

Many organizations adopt a multi-cloud or hybrid cloud strategy, using a combination of public and private clouds or services from multiple cloud providers. While this approach offers flexibility, it also introduces challenges in securing data across different environments.

Data engineers must manage the complexity of multi-cloud and hybrid environments by ensuring consistency in security protocols, data encryption, and access control across all platforms. Using centralized management tools that allow for visibility and control over data across clouds can help streamline security monitoring.

8. Advanced Persistent Threats (APTs)

Advanced Persistent Threats are long-term, sophisticated attacks often targeting valuable data or intellectual property. These attacks can go undetected for long periods, making them particularly dangerous for cloud environments where attackers may remain in the system for weeks or months, undisturbed.

Data engineers should work with security teams to implement advanced threat detection tools, such as anomaly detection and behavioral analytics, to detect unusual activity early. Additionally, having strong network segmentation and endpoint protection can help prevent APTs from gaining deep access to sensitive data.

Conclusion

Cloud security is a shared responsibility between cloud providers and their customers, with data engineers playing a critical role in safeguarding an organization’s data. As cyber threats evolve, data engineers must stay up to date with emerging risks and continuously refine their cloud security strategies. By understanding these challenges and proactively addressing them, data engineers can help ensure that data remains secure and that cloud environments are resilient against potential attacks.

Ultimately, the security of cloud data is not just about technology—it’s about people, processes, and ongoing vigilance. Through collaboration with security teams, the right cloud configurations, and a commitment to best practices, data engineers can significantly reduce the risks associated with cloud environments and help their organizations safely navigate the digital age.

The post Data Engineers Should Be Aware of These Cloud Security Challenges appeared first on Cybersecurity Insiders.

Whitehall vulnerable to Cyber Attacks and malware threats

Whitehall, a term that refers both to the British government administration and a specific geographic location in central London, has recently garnered attention for its vulnerability to cyberattacks. This issue stems primarily from the reliance on outdated IT infrastructure, a problem that has left critical government departments exposed to potential breaches. The findings were outlined in a report by the National Audit Office (NAO), which highlighted the serious risks posed by outdated systems and a lack of skilled personnel within Whitehall departments.

According to the NAO, every department within Whitehall is susceptible to cyber threats due to a combination of obsolete IT systems and the inability to attract or retain qualified professionals. This is not a unique issue to the UK; governments around the world face similar challenges, often tied to limited budgets and competing priorities. However, the British situation is particularly alarming given the central role these departments play in national security and governance.

The question arises: Is the UK truly vulnerable to the growing cyber threats that are increasingly dominating the global landscape? The NAO report stresses that the government is indeed at risk, primarily because many key technical roles remain vacant. Without the necessary in-house talent, these departments are ill-equipped to defend against sophisticated cyberattacks, leaving critical infrastructure exposed.

Recent incidents have only underscored these concerns. For example, in 2023, both the National Health Service (NHS) and the British Library suffered data breaches that were directly linked to outdated systems and a lack of cybersecurity expertise. In the case of the NHS, the use of Windows 8—an operating system that is no longer supported—made it vulnerable to threats such as the WannaCry ransomware attack. Similarly, the British Library experienced information leaks, highlighting the consequences of failing to modernize IT infrastructure and secure sensitive data.

While some Whitehall departments have started to take action by overhauling their IT resources and bolstering cybersecurity measures, these efforts are struggling to keep up with the increasing sophistication of cybercriminals. Experts argue that despite these improvements, the pace at which hackers are evolving their tactics means that the government’s current defenses are often inadequate.

Ironically, a report from the NAO published in April 2024 served as a stark warning to the government, yet it arrived during a period of political instability. At the time, Prime Minister Rishi Sunak’s government was facing significant political challenges, and public disillusionment was growing. In this context, adequate funding for cybersecurity and IT infrastructure improvements failed to be prioritized. As a result, the UK government has struggled to secure the financial resources necessary to build robust cybersecurity resilience across Whitehall.

This situation underscores the need for a more proactive and long-term approach to cybersecurity, particularly in an era where cyber threats are becoming more complex and widespread. For the UK to safeguard its national interests, it will need to address the underlying issues of outdated technology, staffing shortages, and underinvestment in its cybersecurity infrastructure. Only then can it hope to mitigate the risks posed by the rapidly evolving cyber threat landscape.

The post Whitehall vulnerable to Cyber Attacks and malware threats appeared first on Cybersecurity Insiders.

This is your last chance to grab Mint Mobile’s unbeatable $15 three-month plan!

Mint Mobile logo on smartphone with colored background stock photo

Credit: Edgar Cervantes / Android Authority
  • Mint Mobile’s $15/month promotion for its unlimited plan is ending soon.
  • The offer applies to new customers, giving them access to Mint’s premium wireless service for a fraction of what major carriers like Verizon and AT&T charge for similar plans.
  • Users who subscribe to the offer will need to switch to a regular Mint Mobile plan after three months.

Mint Mobile’s unbeatable $15/month promotion for its 3-month unlimited wireless plan is ending soon. The offer provides users access to Mint’s premium wireless service for just $15 per month, a fraction of what major carriers like Verizon and AT&T charge for similar plans.

This slick Atari Asteroids watch already sold out, but should really just be a Wear OS watch face

  • Atari celebrates its arcade classic Asteroids with a limited edition wristwatch.
  • The watch features a cute time-telling mechanic, with your ship and a couple UFOs indicating the time.
  • Atari already makes official Asteroids watch faces for Wear OS, and we would love to see this design join them.

Modern horologists have dreamt up some utterly fascinating watch designs, and even fully mechanical offerings are reaching complexity that’s nothing short of mind-boggling. And for as much as we love the flexibility of a good smartwatch, it’s very easy to get caught up in the allure of a particularly compelling traditional wristwatch. Today we’re checking out one that’s going straight for the nostalgia jugular, as Atari shares its limited edition Asteroids watch.

Asteroids hit arcades all the way back in 1979, with sharp vector-based graphics and fast-paced space combat action. The classic inspired countless other space shooters over the years, and has absolutely earned its spot in the annals of gaming. In order to celebrate that legacy, Atari teamed up with watchmaker Nubeo to put together this custom watch with an interesting time-telling mechanic.

Viral ChatGPT rival DeepSeek hit by massive cyberattack

Ollama DeepSeek on Android

Credit: Robert Triggs / Android Authority
  • DeepSeek says it has been hit by a large-scale malicious attack.
  • The service is temporarily limiting user registrations because of the disruption.
  • DeepSeek has sky-rocketed to fame in recent weeks, surpassing established rivals like ChatGPT on app stores.

DeepSeek has announced that its service has been hit by a large-scale malicious attack. Owing to the disruption, the ChatGPT rival is temporarily limiting user registrations. However, as of writing this article, new registrations are still going through on the platform.

Google Maps will rename some iconic locations because the US government said so

Google Maps stock photo 3

Google Maps on phone
Credit: Edgar Cervantes / Android Authority
  • “Gulf of Mexico” is now called ‘Gulf of America’ on US-based Google Maps per government directives.
  • “Denali” mountain has been renamed “Mount McKinley,” prompting debate over historical naming.
  • Google says the decision to rename these locations stems from its long-standing policy to adhere to official name changes.

Google has announced that it’s renaming some iconic locations on Google Maps following directives from the Trump-led US government.

YouTube’s explicit ads problem just ruined a Fortnite stream for a child

YouTube on smartphone stock photo 6

Credit: Edgar Cervantes / Android Authority
  • Reports of sexually explicit ads appearing on YouTube have gone up significantly, with users getting increasingly concerned about the platform’s content moderation efforts.
  • A new incident shared on Reddit involves a child mistaking an adult film actor in a pornographic ad for a popular game streamer while watching Fortnite videos on the YouTube.
  • Although the platform has previously claimed that it diligently monitors and blocks inappropriate ads, growing evidence suggests more robust safeguards are needed urgently.

YouTube’s bad ads problem seems to be getting even more pervasive, with a clear failure in content moderation highlighted by a growing number of reports on platforms like Reddit. In the latest incident, a Redditor describes how their young nephew was exposed to an explicit ad while watching a Fortnite stream by the well-known YouTuber Loserfruit.

Now Samsung says there is a separate Bluetooth S Pen for S25 Ultra (wait, what?)

Samsung Galaxy S25 Ultra S Pen in slot

Credit: Hadlee Simons / Android Authority
  • A Samsung blog has claimed that Galaxy S25 Ultra owners can get a Bluetooth-enabled S Pen as a standalone purchase.
  • This comes after Samsung ditched Bluetooth from the S25 Ultra’s included S Pen.
  • However, Samsung’s websites don’t seem to list a Bluetooth-enabled S Pen for the new Ultra handset.

The Samsung Galaxy S25 Ultra isn’t a complete upgrade across the board, as the Korean brand has downgraded the S Pen. The company has removed Bluetooth functionality from the included S Pen, claiming that the associated features like air gestures weren’t that popular with users.

Now, Samsung has claimed on its Business Insights blog (h/t: NotebookCheck) that Galaxy S25 Ultra owners can buy a Bluetooth-enabled S Pen as a separate purchase. Check out the screenshot below.

I finally found the perfect phone tripod, and it’s under $30

ulanzi ma26 three positions

Credit: Rita El Khoury / Android Authority

I’ve had the Ulanzi MA26 on my Amazon wishlist for over a year and almost forgot about it until Black Friday 2024 rolled around. As I was scrolling through my wishlist for significant price drops, I saw that the tripod’s price had fallen from a silly overpriced €45.99 in France to an all-time low of €25.99 (it had also dropped from $35.95 to $28.76 on Amazon US). It didn’t take a lot of thinking before I made my purchase, and I have zero regrets.

This is the best phone tripod I’ve ever seen or owned. It’s the most versatile, the most portable, and the most solidly built.

AI is just a bad excuse for Samsung and Apple’s lazy phone hardware

When Galaxy AI burst onto the scene with last year’s Galaxy S24 series, it felt novel and interesting enough to almost offset the fact that the phones hadn’t otherwise changed all that much from the previous year or the year before that. Teething issues aside, it felt like there could be an interesting future buried somewhere in all the buzzwords. Boy, how that goodwill soured quickly; the déjà-vu has never been stronger than with our Galaxy S25 hands-on.

Yes, there are changes, of course, but they’re pretty minor even on the Ultra, and good luck remembering what’s new on the hardware front with the Galaxy S25 and S25 Plus. Instead, it’s all about what’s new with Galaxy AI. But AI is fast becoming a crutch for a number of brands to leave hardware in the back seat. Honestly, it’s got to stop.

OnePlus 13 picks up new AI language tools and gets a camera boost in latest update

  • The OnePlus 13 is getting yet another update, with OxygenOS 15.0.0.405 arriving.
  • AI translation gets a live mode with new headphone support.
  • The phone’s camera receives improved color accuracy and zoom performance.

It’s been over a decade now since OnePlus first burst onto the smartphone scene with a plan to do things a little bit differently. We’ve come a long way from those early days where you’d need an invite code to even buy a OnePlus phone, and the company’s new OnePlus 13 flagship is easily its best-executed handset to date. Even though it only just debuted, the phone’s already been receiving some major updates, like the support we just saw it get for Google’s on-board Gemini Nano model. Not content to rest on its laurels, the company is already pushing out another update, packed with improvements of its own.

This week, OnePlus has started seeding its OxygenOS 15.0.0.405 update to the OnePlus 13 in markets around the globe. And while that includes a few little stability and performance tweaks, the more impactful changes here concern camera performance and AI features.

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 11th, 2025

Credit: Edgar Cervantes / Android Authority TL;DR Spotify is getting a new “Prompted Playlist” feature to help users create more […]

admin December 11th, 2025

TL;DR Four of the best Good Lock modules aren’t working properly on the One UI 8.5 beta. Home Up and […]

admin December 10th, 2025

This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in […]