Connect with us

Tech

The Samsung Galaxy Watch Is Discounted on Amazon

Published

on

The Samsung Galaxy Watch Is Discounted on Amazon


While iOS users have an easy smartwatch choice in the Apple Watch, Android owners have a few more options, as well as face shapes, to choose from. The semi-squircular Samsung Galaxy Watch8 and Watch 8 Classic have both a unique look and set of health features, and are currently marked down to as low as $280 at Amazon for the 30mm Bluetooth version, or as low as $433 for the Watch8 Classic.

  • Photograph: Julian Chokkattu

  • Photograph: Julian Chokkattu

Samsung

Galaxy Watch8 and Watch8 Classic

As the first watches to sport Google’s Wear OS 6, these made waves when they released with bigger, bolder watch faces, and an improved interface that shows more information. It has a 1.5-inch AMOLED screen that’s generously sized even on the 40mm version we tested, and has more than enough brightness to check on a sunny day.

Both watches feature the kind of physical activity and health tracking data you’d expect from a modern smartwatch, including steps, heart rate, and both sleep quality and bedtime guidance, which recommends when you should go to bed, if you couldn’t sort that out on your own. You can also use the optical sensor to measure your Antioxidant Index to help track what you’re eating without manually logging meals.

Battery life is a key factor for any smartwatch, and the smaller 40mm didn’t quite impress us, running for just right around 20 hours, about half of Samsung’s claimed runtime. The more expensive Watch8 Classic lasted closer to two full days, even some tracked physical activities tossed in. If more than full day of battery is a key selling point, I’d consider making the upgrade.

While only the graphite and silver models are in stock as I write this, there are discounts for both the 40mm and 44mm sizes across both the Bluetooth only and LTE connected options. You can also scoop a healthy markdown on the more deluxe Watch8 Classic, which I spotted for $433 in black or $450 in white. If you’re curious to learn more, make sure to check out our full review of both the Watch8 and Watch8 Classic for all the details, or peruse our other favorite smartwatches to find your new daily driver.



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

OpenClaw Users Are Allegedly Bypassing Anti-Bot Systems

Published

on

OpenClaw Users Are Allegedly Bypassing Anti-Bot Systems


In San Francisco, it feels like OpenClaw is everywhere. Even, potentially, some places it’s not designed to be. According to posts on social media, people appear to be using the viral AI tool to scrape websites and access information, even when those sites have taken explicit anti-bot measures.

One of the ways they are allegedly doing this is through an open source tool called Scrapling, which is designed to bypass anti-bot systems like Cloudflare Turnstile. While Scrapling, which was built with Python, works with multiple types of AI agents, OpenClaw users appear to be particularly fond of the software. On Monday, viral posts promoting Scrapling as a tool for OpenClaw users started to spread on X. Since its release, Scrapling has been downloaded over 200,000 times.

“No bot detection. No selector maintenance. No Cloudflare nightmares,” reads one viral post this week about the open source tool. “OpenClaw tells Scrapling what to extract. Scrapling handles the stealth.”

Cloudflare is not enthused. The company already blocked previous versions of Scrapling, since users of the open source software kept trying to get around anti-scraping protections. This week, the company was working on a patch for Scrapling’s most recent iteration. “We make changes, and then they make changes,” says Dane Knecht, chief technology officer at Cloudflare. He says the company’s trove of website data and its ability to track trends has given it the upper hand.

“We already had a signal that they’re starting to get a higher ability to get around us,” says Knecht. “The team of security operations engineers had already been working on a new set of mediations.”

Large language models were trained on the corpus of the internet—and the process involved a lot of scraping. In some sense, Scrapling users are following in the footsteps of the original model builders, but on a more individualized scale.

Over the past few years, website owners have attempted to put up additional anti-bot protections, either to block software like Scrapling or to find a way to make money off of the bots trying to access their sites. In turn, Cloudflare has been working overtime to keep blocking increasingly powerful bots attempting to get around these protections.

In July 2024, Cloudflare started to offer its customers additional tools that block AI crawlers, unless the bots pay for access. In less than the span of a year, the company claims to have blocked 416 billion unsolicited scraping attempts.

“I Didn’t Know What I was Getting Into”

As Scrapling gained traction in recent days, crypto enthusiasts capitalized on the attention by launching a $Scrapling memecoin. Karim Shoair, who claims to be the sole developer of Scrapling, posted about the memecoin on X (those posts have since been deleted). After the price skyrocketed for around five hours, $Scrapling quickly fell off a cliff as users sold off their stakes. “Bunch of fucking scammers,” reads one comment on the Pump.Fun site that hosts the coin.

“I didn’t know what I was getting into when people made that coin and I endorsed it,” says Shoair, in a direct message with WIRED. “But once I knew, I didn’t want any association with it and the money I withdrew before will go to charity, I won’t benefit from it in anyway. Or maybe just leave it to be wasted.”

In the fallout of this event, the unofficial GitHub Projects Community account, which has over 300,000 followers on X, deleted its posts from this week highlighting Scrapling’s open source software, and appeared to distance itself from the project. “We do not support, promote, or engage in crypto assets, token offerings, trading activity, or crypto-based fundraising,” it said in a post late Monday night.

Putting the crypto forays aside, most software leaders continue to see agents and autonomous AI tools as the future of the web. Even Knecht from Cloudflare, whose work includes blocking bots from nonconsensual scraping, wants to build toward a world where humans and agents benefit from online data and the wishes of website owners are respected. “I see a path forward for an internet that is both friendly to agents and humans,” he says.


This is an edition of Will Knight’s AI Lab newsletter. Read previous newsletters here.



Source link

Continue Reading

Tech

The AirPods Pro 3 Are $20 Off

Published

on

The AirPods Pro 3 Are  Off


Looking for a new pair of earbuds to pair with your favorite iPhone or iPad? Right now, you can grab the Apple AirPods Pro 3 for just $229 on Amazon or Best Buy, a $20 break from their usual price. They’re our favorite wireless headphones for iPhone owners, with great noise-canceling, easy connectivity, and unique features like heart rate and live translation.

  • Review: Apple AirPods Pro 3

  • Review: Apple AirPods Pro 3

The active noise-canceling on the third generation AirPods Pro has improved a great deal, with our reviewer Parker Hall comparing them to the Bose QuietComfort Ultra 2 Earbuds when it comes to filtering out all but the highest frequency, loudest noises. The improved ear tips, now lined with foam, are more comfortable and fit better in smaller ears, with four different sizes to choose from. They also have better sound isolation, which improves the noise canceling and transparency mode performance noticeably.

While Android owners have a variety of choices when it comes to earbuds and headphones, iOS users will appreciate the extra features specifically built for anyone in the Apple ecosystem. If you’re into running with minimal devices, the AirPods Pro 3 can actually take your heart rate through your ears, a neat trick that we found surprisingly consistent with other fitness trackers. Another unique feature, live translation, will bring up the Translate app on iOS and relay what someone else is saying directly into your ears in your own language. Once again, we were impressed by how fast and accurate the system was, and as more languages are added it will become even more useful.

We really only had two minor complaints about the AirPods Pro 3, one of which was that the default EQ is a bit V-shaped, with a slightly overdone bass that’s either really appealing or slightly grating. Thankfully you can tweak your EQ in Spotify or Apple Music to dial in that experience. The other issue is that these have limited compatibility with Android devices, so if you’re on a Samsung or Pixel, you’ll want to check out our other favorite earbuds. For iPhone and iPad owners looking for the latest and greatest for their listening experience, the discounted AirPods Pro 3 are an excellent choice.



Source link

Continue Reading

Tech

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

Published

on

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly


The UK’s National Cyber Security Centre (NCSC) and its partner agencies in the Anglophone Five Eyes intelligence-sharing group have warned users of Cisco Catalyst Software Defined Wide Area Networks (SD-WAN) to take immediate action after identifying a cluster of threat activity targeting the widely used products.

The activity appears indiscriminate in its targeting, but the modus operandi is largely the same – following compromise, the as-yet-unnamed threat actors add a malicious rogue peer before conducting follow-on actions to achieve root access and maintain persistent access to the victim’s network.

“Our new alert makes clear that organisations using Cisco Catalyst SD-WAN products should urgently investigate their exposure to network compromise and hunt for malicious activity, making use of the new threat hunting advice produced with our international partners to identify evidence of compromise,” said NCSC chief technology officer (CTO) Ollie Whitehouse.

“UK organisations are strongly advised to report compromises to the NCSC, and to apply vendor updates and hardening guidance as soon as practicable to reduce the risk of exploitation,” he added.

The NCSC said the activity itself appeared to date back to 2023, and a series of vulnerabilities in Catalyst SD-WAN Manager and Catalyst SD-WAN Controller have now been patched by Cisco.

Chief among these issues, and of most concern to Cisco, is CVE-2026-20127, an authentication bypass vulnerability in Catalyst SD-WAN.

In an advisory, Cisco said the vulnerability arose due to a failure of the peering authentication mechanism on an affected system.

“An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric,” the supplier said.

“Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.”

Organisations with management interfaces exposed to the public internet appear to be at greatest risk of compromise – exposing management interfaces to the internet is extremely ill-advised.

Besides performing threat hunting for evidence of compromise as detailed in a newly-published Hunt Guide – available here – security teams should immediately update to the appropriate fixed latest versions of Catalyst SD-WAN Manager and Controller, and apply the Cisco Catalyst SD-WAN Hardening Guide now available from Cisco.

UK-based organisations that discover they may have been compromised are advised to immediately collect artefacts from the relevant device and report it to the NCSC.

In the US, the Cybersecurity and Infrastructure Security Agency (Cisa) has issued a parallel emergency directive instructing government organisations to take action by 23:59 EST (04:59 GMT) on Thursday 26 February, and to have fully applied the patches by 17:00 EST on Friday.

Threat actor targets CNI operators

Meanwhile, Cisco’s threat intel unit Talos has been tracking active exploitation of CVE-2026-20127, and has assigned the cluster the designation UAT-8616.

Talos said it was confident that UAT-8616 is a “highly sophisticated cyber threat actor” given the historical extent of its activity dating back to 2023, and additional investigation, which found that its hackers likely escalated to root user by downgrading the software version then exploiting another flaw – CVE-2022-20775 – in the Catalyst software command line interface (CLI) before restoring back to the original.

Talos said UAT-8616 demonstrated an ongoing trend of targeting network edge devices in order to establish beachheads at high-value organisations, such as operators of critical national infrastructure (CNI).

While it stopped short of attributing the activity outright, the targeting of utilities and similar organisations could indicate UAT-8616 is backed by a nation-state.



Source link

Continue Reading

Trending