link1s.site

How to evaluate the product impact of the iPhone 16

At the Apple Developer Conference held earlier, the iPhone 16 series will be equipped with iOS 18 has been revealed.

At the event, Apple showed off a series of convenient interactive experiences brought by Apple Intelligence, including a more powerful Siri voice assistant, Mail app that can generate complex responses, and Safari that aggregates web information. These upgrades will no doubt make the iPhone 16 line even more attractive. In order to use Apple Intelligence, a new feature of iOS 18, the iPhone 16 and 16 Pro series are equipped with A18 chips.

An external blogger found in Apple's back end that the iPhone 16 series will use the same A-series chip, and the back end code mentions A new model unrelated to the existing iPhone.

It includes four iPhone 16 series models, and the four identifiers all start with the same number, indicating that Apple is attributing them to the same platform. The new iPhone will have a stainless steel battery case, which will make it easier to remove the battery to meet EU market standards, while also allowing Apple to increase the density of the battery cell in line with safety regulations.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.
Google Pixel 9 series phones will use Qualcomm ultrasonic fingerprint recognition technology
Google's new generation of flagship smartphone Pixel 9 series is expected to be officially released in mid-August, and the new machine is likely to be equipped with ultrasonic fingerprint recognition technology for the first time to replace the original optical fingerprint recognition. According to core intelligence, Google Pixel 9 series will use the same Qualcomm 3D Sonic Gen 2 ultrasonic fingerprint recognition sensor as the Samsung Galaxy S24 Ultra. This ultrasonic technology under the screen fingerprint sensor is Qualcomm released at the CES2021 conference, compared with the previous generation of solutions, the module thickness is further reduced to 0.2mm, while the scanning area is expanded to 8mm×8mm, that is, the recognition area is increased by 77%. This will also allow users to realize fingerprint recognition without having to point their fingertips 100% accurately at the identification area indicated on the screen.
Zuckerberg surfed and drank beer on vacation, Musk: I prefer to work
After Meta CEO Mark Zuckerberg posted a video on his Facebook and Instagram accounts of his free time during the Independence Day holiday on the X platform, Musk said, "I prefer to work." Zuckerberg posted a video of himself surfing on a hydrofoil in a tuxedo, waving an American flag and drinking a beer, and wrote: "Happy birthday America." The video quickly went viral, and after greg shared it on the X platform, Musk replied: "I hope he continues to have fun on the yacht." I prefer to work." Musk, a workaholic, attended the 29th annual Barron Investment Conference in November 2022, where he said: "My workload went from 78 hours a week to 120 hours a week..." In 2018, he slept on the floor of the Gigafactory in Fremont in an effort to ramp up production of the Tesla Model 3.
Argentina's government reform bill officially takes effect: granting the president special powers in areas such as administration
On the 8th, the Argentine government promulgated the "Foundations and Starting Points for Argentine Freedom" comprehensive bill and a package of fiscal measures, marking the official entry into force of the government reform bill. According to the official gazette of the Argentine government, Argentine President Milley, Chief Cabinet Minister Guillermo Francos and Economy Minister Luis Caputo jointly signed Decrees No. 592 and No. 593 to promulgate these two new reform measures. The comprehensive bill declared Argentina to enter a one-year public emergency in the administrative, economic, financial and energy fields, and granted the president special powers in these fields. It also includes the relaxation of economic regulations, labor reforms and the implementation of a large-scale investment incentive system. The package of fiscal measures involves anti-money laundering, tax deferral, tariffs, re-imposition of high-salary income tax and reduction of personal property taxes. On June 28, after six months of negotiations, the two reform bills were finally passed by the Argentine Congress.
Diphtheria outbreak in Vietnam kills one person
On the afternoon of July 8, local time, the Vietnamese Ministry of Health issued a notice stating that an 18-year-old girl in the country died of diphtheria. The Ministry of Health asked Nghe An Province and Bac Giang Province to take urgent action to control the epidemic. Diphtheria is an acute respiratory infectious disease caused by Corynebacterium diphtheriae, which is mainly transmitted through droplets and can also be indirectly transmitted by contact with objects containing Corynebacterium diphtheriae. Severe cases may show symptoms of poisoning throughout the body, complicated by myocarditis and peripheral nerve paralysis.