Security – The Tech Outlook https://www.thetechoutlook.com Daily Tech News, Interviews, Reviews and Updates Fri, 22 Sep 2023 07:20:53 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://www.thetechoutlook.com/wp-content/uploads/2019/09/cropped-favicon-1-150x150.png Security – The Tech Outlook https://www.thetechoutlook.com 32 32 Passkeys can now be used to sign-in to apps and websites on your iPhone and other Apple devices https://www.thetechoutlook.com/news/technology/security/passkeys-can-now-be-used-to-sign-in-to-apps-and-websites-on-your-iphone-and-other-apple-devices/ Fri, 22 Sep 2023 07:20:53 +0000 https://www.thetechoutlook.com/passkeys-can-now-be-used-to-sign-in-to-apps-and-websites-on-your-iphone-and-other-apple-devices Apple - Passkeys

Apple iPhone users can now on start using passkeys instead of passwords to sign in to supported apps and websites. Passkeys are said to be more secure and reliable than passwords. Read more about it below. Passkeys – More Secure and Reliable Apple devices are known for being secure and safe when compared to other […]

The post Passkeys can now be used to sign-in to apps and websites on your iPhone and other Apple devices appeared first on The Tech Outlook.

]]>
Apple - Passkeys

Apple iPhone users can now on start using passkeys instead of passwords to sign in to supported apps and websites. Passkeys are said to be more secure and reliable than passwords.

Read more about it below.

Passkeys – More Secure and Reliable

Apple devices are known for being secure and safe when compared to other devices and adding one more layer of security, iPhone users can now start creating passkeys and use them to sign in to apps and websites that support them.

In comparison to passwords, passkeys are more secure and reliable. It is generated uniquely on every account and has very little chance of being made vulnerable to phishing. It will also work on other Apple devices that have been signed in with the same Apple ID.

Similar to passwords, passkeys are also encrypted and are stored in users’ iCloud Keychain. No one will be able to know your passkey as they won’t be visible to anyone, and this includes Apple.

Users who are interested in trying out Apple’s passkey would need devices that run on iOS 16, iPadOS 16, macOS 13, and tvOS 16, or their later versions. It must also be ensured that iCloud Keychain and two-factor authentication are enabled.

Here’s how to set up passkey

Apple iPhone users in order to set up a passkey will have to first visit an application or website that supports passkeys and then go to the sign-in page.

If you already have an account, log in and then direct yourself to the account settings or management screen. If you want to create a new account, tap on the link given for setting up a new account and then follow the necessary steps.

Once you get to see the option to save passkeys, simply press continues and there, you have created the passkey which will be saved on the “Passwords” menu in “Settings”.

If by chance users want to change their passkey due to any reason, they just have to create a new passkey to replace the previous one.

Source.

The post Passkeys can now be used to sign-in to apps and websites on your iPhone and other Apple devices appeared first on The Tech Outlook.

]]>
Increasing Cybersecurity Threats: Italy VPN to the Rescue https://www.thetechoutlook.com/news/technology/security/increasing-cybersecurity-threats-italy-vpn-to-the-rescue/ Fri, 22 Sep 2023 06:54:43 +0000 https://www.thetechoutlook.com/increasing-cybersecurity-threats-italy-vpn-to-the-rescue

Whenever you talk about the virtual private network (VPN), many people think it’s just to enhance the availability of geo-restricted content that Italy or a region within the country will not allow. VPN does more than that; the critical problem you should consider is cybersecurity. The demand by hackers on Reddit for $4.5 million and […]

The post Increasing Cybersecurity Threats: Italy VPN to the Rescue appeared first on The Tech Outlook.

]]>

Whenever you talk about the virtual private network (VPN), many people think it’s just to enhance the availability of geo-restricted content that Italy or a region within the country will not allow. VPN does more than that; the critical problem you should consider is cybersecurity.

The demand by hackers on Reddit for $4.5 million and reversal of API increases in April and June 16, 2023, for deleting data in their possession points out that what Italy, in particular, and the world in general, contends with is not just circumventing geo-restricted content. Cybercrime is a potential danger to governments, organizations, and individuals; the world must rise and implement measures and innovations to stop the activities of cyber criminals who are becoming tech-savvy daily.

There is a report of cybercriminals using the Python-based NodeStealer malware to steal credentials and cookies from victims’ web browsers as of December 2022; the action may look isolated, but it points to the danger everyone has to look out for. Efforts we take to tackle and mitigate threat actors and their nefarious activities will go a long way to determine how secure our organizations can be globally.

Can Italy VPN come to the rescue?

Italy is not the only country facing the menace of cybercriminals; cybercrime is a global phenomenon. However, you must start the fight from wherever you find yourself. 

Italy VPN can immensely help people who reside in the country. Before cybercriminals access your network, they try to trace your online activities through your internet protocol (IP) address; usually, your internet service provider (ISP) assigns an IP address to your device anytime you log into the internet.

Anyone who has your IP address can access your network and track all you do online; apart from your ISP that automatically sees your browsing history, any third party with malicious intentions can leverage the opportunity of accessing your network to steal sensitive information. The problem becomes more worrisome if you reside in Italy and go by the record that the government, military, and law enforcement category was hit by 15 percent of the total number of cyber-attacks, with the ICT sector following with 14 percent in 2021.

Ordinarily, you must expect the government, military, law enforcement agencies, and the ICT sector to be more protected than corporate bodies and individuals because of the technical information they have. If these “secure bodies” can experience the highest cyberattacks in Italy, why would you not go for Italy VPN to protect yourself and your organization?

How does Italy VPN protect you?

The primary or fundamental task of Italy VPN is to mask/hide your IP address; when Italy VPN hides your IP address, no one can trace any of your browsing activities to your IP address. Italy VPN will assign you another IP address from any of the servers they have across the globe; anyone who tries to track your online activities will end up at the server of Italy VPN.

The second vital task the Italy VPN performs is to encrypt your log; when Italy VPN encrypts your browsing history, only your computer and the VPN have the key to decipher the encryption. If a hacker or another third party accidentally accesses your information, it will be gibberish, meaningless, worthless, and useless to them.

How do you quit preselected programs when you encounter downtime to avoid compromise? Hackers can leverage your preselected programs to access your network; Italy VPN ensures that you readily adjust to critical situations like downtime and quit some preselected programs that can lead to compromises hackers won’t leverage to access your network.

A strong password is good; one of the world’s best practices in mitigating cybersecurity threats is strong passwords. However, a hacker can use a brute-force attack (trial-and-error) to discover your password by working through all possible combinations to guess correctly. 

Brute force attacks may seem old, but hackers can also leverage technological advancements to reduce the time they need to use excessive forceful attempts to try and ‘force’ their way into an organization’s or individual’s account(s). If hackers guess your password correctly, some benefits they can accrue include profiting from ads or collecting activity data, stealing personal data, financial details, and other valuables, hijacking your network for malicious activity, ruining your website’s reputation, and spreading malware to disrupt your organization’s processes.

Italy VPN enables multifactor authentication; you won’t need only your password that hackers can crack with brute force attacks to log into your PC or any other device. Italy VPN will request various means of identification, such as an eye scan, fingerprint, or facial recognition in addition to the password, from anyone who tries to log into your account.

Incidentally, biometric data is peculiar to an individual, and you can’t fake it.

Conclusion

Italy VPN can help mitigate cybersecurity issues through measures such as kill switch, multifactor authentication, encryption of web history, strong privacy and anonymity, and masking of IP addresses. If a hacker or your ISP does not know your IP address, you have reduced the chances of tracking your online activities.

Hackers have become tech-savvier and deploy technology to crack strong passwords faster; Italy VPN’s multifactor authentication ensures a third party will have difficulties accessing your network. 

The post Increasing Cybersecurity Threats: Italy VPN to the Rescue appeared first on The Tech Outlook.

]]>
Don’t Open Any Files Received from Unknown Sources: NodeStealer Malware Attacks Continues https://www.thetechoutlook.com/news/technology/security/dont-open-any-files-received-from-unknown-sources-nodestealer-malware-attacks-continues/ Sat, 16 Sep 2023 13:36:49 +0000 https://www.thetechoutlook.com/dont-open-any-files-received-from-unknown-sources-nodestealer-malware-attacks-continues Malware

It has been reported that Facebook business accounts are being subjected to attacks from a variant of the Python-based NodeStealer malware. By sending messages to accounts, the credentials of the users are being stolen and the accounts are then supposedly going to be used for other malicious activities. Read more about it below. NodeStealer Malware […]

The post Don’t Open Any Files Received from Unknown Sources: NodeStealer Malware Attacks Continues appeared first on The Tech Outlook.

]]>
Malware

It has been reported that Facebook business accounts are being subjected to attacks from a variant of the Python-based NodeStealer malware. By sending messages to accounts, the credentials of the users are being stolen and the accounts are then supposedly going to be used for other malicious activities.

Read more about it below.

NodeStealer Malware – Beware

NodeStealer had first originated as a JavaScript malware and was used to steal credentials and cookies from the victim’s web browser and as of December 2022, another attack revealed the Python version being used for the same purpose. Some of its other Python versions were also reported to have been used to conduct cryptocurrency thefts as well.

The victims of the current attack wave are mostly from Southern Europe and Northern America, and are basically accounts of people from manufacturing services or technology sectors. An image of a defective product is being shared along with the malware and once the users click on it, they’ll be directed to a website on their web browser. While the user is misled into the website and is distracted, the malware does its job in the background.

When the new variant of the NodeStealer malware is compared to its previous versions, unlike before, the new variant has batch files that are being used to download and run the Python scripts, and thereby, the credentials and cookies for multiple websites from different browsers are stolen.

It has also been reported that more targeted attacks might take place later and with all the already stolen credentials, the wrong-doers have everything with them to take over accounts and continue their misdeeds.

It is advised that if by chance such a doubtful file has been sent to you from known or unknown sources, always contact them and ensure that it is safe before you access it.

Via.

The post Don’t Open Any Files Received from Unknown Sources: NodeStealer Malware Attacks Continues appeared first on The Tech Outlook.

]]>
China claims to notice “security incidents” with Apple iPhones, denies ban on iPhone https://www.thetechoutlook.com/news/technology/security/china-claims-to-notice-security-incidents-with-apple-iphones-denies-ban-on-iphone/ Wed, 13 Sep 2023 09:23:33 +0000 https://www.thetechoutlook.com/china-claims-to-notice-security-incidents-with-apple-iphones-denies-ban-on-iphone

Yesterday Apple Inc. officially unveiled the much-awaited and highly anticipated iPhone 15 series that includes four smartphones- iPhone 15, iPhone 15 Plus, iPhone 15 Pro, and iPhone 15 Pro Max. The pre-orders of the devices will start from the coming 15th September. Ahead of the official launch of this latest series Bloomberg reported that the […]

The post China claims to notice “security incidents” with Apple iPhones, denies ban on iPhone appeared first on The Tech Outlook.

]]>

Yesterday Apple Inc. officially unveiled the much-awaited and highly anticipated iPhone 15 series that includes four smartphones- iPhone 15, iPhone 15 Plus, iPhone 15 Pro, and iPhone 15 Pro Max. The pre-orders of the devices will start from the coming 15th September. Ahead of the official launch of this latest series Bloomberg reported that the company will be selling “Made-in India” iPhones in South Asian countries and a few other regions.

Well, this was indeed great news for India as this step by Apple will be highlighting the growing production powers of India. Also many assumed that the company might be planning to shift from China-made devices. Recently it was revealed that China has banned iPhone use for its government officials at work sparking many rumors and speculations.

In a recent report by Bloomberg, it was revealed that China has identified security problems with Appe Inc.’s iPhones. As per Chinese foreign ministry spokeswoman Mao Ning, “China has not issued laws and regulations to ban the purchase of Apple or foreign brands’ phones. But recently we did notice that there have been some security incidents concerning Apple phones..”

Seems like Apple is going to face some serious trouble as China is now emphasizing using locally-made tech products and the company heavily relies on China for revenue growth and manufacturing.

The post China claims to notice “security incidents” with Apple iPhones, denies ban on iPhone appeared first on The Tech Outlook.

]]>
Fake Signal App made its way to Google Play Store https://www.thetechoutlook.com/news/technology/security/fake-signal-app-made-its-way-to-google-play-store/ Thu, 07 Sep 2023 16:48:55 +0000 https://www.thetechoutlook.com/fake-signal-app-made-its-way-to-google-play-store Signal App android

In the latest developments, it was reported that threat actors brought in a fake Signal App on Google Play. These hackers are reportedly China-linked. Cybersecurity researchers at ESET dubbed these threat actors as GREF, and reportedly released a version of this fake Signal App, even on the Samsung Galaxy Store. The name of this app […]

The post Fake Signal App made its way to Google Play Store appeared first on The Tech Outlook.

]]>
Signal App android

In the latest developments, it was reported that threat actors brought in a fake Signal App on Google Play. These hackers are reportedly China-linked. Cybersecurity researchers at ESET dubbed these threat actors as GREF, and reportedly released a version of this fake Signal App, even on the Samsung Galaxy Store. The name of this app is Signal Plus Messenger.

ESET researcher Lukas Stefanko expressed that the purpose of these fake apps is to spy on the communications of the real app. Real Signal app allows users to link their mobile app to their desktop or Apple iPad. The fake Signal apps devised a way to automatically connect the compromised device to the attacker’s signal. In this way, they had access to whatever communication happening on the app.

In context to this incident, reports by Proton Privacy stated that Google and Apple charge app developers up to 30 % of their earnings, just to vet for security risks.

Proton Privacy took to social media platform X and expressed dissatisfaction regarding the same. It expressed concerns that despite Google and Apple charging such a considerable amount to cross-check security risks, a fake Signal app found its way to the Google Play Store.

Proton Privacy further expressed that big tech monopolies only stifle innovation and kill competition, instead of enabling better security.

The post Fake Signal App made its way to Google Play Store appeared first on The Tech Outlook.

]]>
Xiaomi Smartphones Reportedly to be Affected by a Browser Hacking Malware https://www.thetechoutlook.com/news/technology/security/xiaomi-smartphones-reportedly-to-be-affected-by-a-browser-hacking-malware/ Tue, 05 Sep 2023 06:46:50 +0000 https://www.thetechoutlook.com/xiaomi-smartphones-reportedly-to-be-affected-by-a-browser-hacking-malware Xiaomi Company

It has been quite some time since Xiaomi smartphone users noticed a change in the Chrome home page on their smartphone devices and this has now started to worry them Here’s what we know about it. Has Xiaomi Smartphones been Hacked? It was a Reddit user who had first reported that all of his Xiaomi […]

The post Xiaomi Smartphones Reportedly to be Affected by a Browser Hacking Malware appeared first on The Tech Outlook.

]]>
Xiaomi Company

It has been quite some time since Xiaomi smartphone users noticed a change in the Chrome home page on their smartphone devices and this has now started to worry them

Here’s what we know about it.

Has Xiaomi Smartphones been Hacked?

It was a Reddit user who had first reported that all of his Xiaomi smartphones had had its Google home page changed to another web page named “Mintnav” without his consent, and he had shared his worry that he thinks it to be a scam as he hadn’t found any documentation about the site. Following his Reddit post, other Xiaomi users have also shared on social media platforms how they have also faced similar issues, revealing that this is a common issue on Xiaomi smartphones.

While the concerns raised by Xiaomi smartphone users are true and valid, there is no proper explanation available regarding how the Chrome home page would have changed from the default home page to Mintnav’s site. An update might be what brought the malware site to the smartphone devices. Mintnav’s website also asks users for their feedback or suggestions, if there are any, and has added a link([email protected]) along with it.

Speaking about the website – Mintnav,  HowToRemove.Guide has listed the site as a browser hijacker and has pointed out that, even if the website won’t cause any harm or significant damage, it might surely mar your Google Chrome experience, likely by bombarding unwanted ads while you browse.

Xiaomi smartphone users can change their Chrome home page back to the default home page by changing their home page settings. To do so, open Google Chrome on your smartphone device and select “Settings” from the drop-down menu which appears after tapping on the three dots at the top-right corner of your screen. Go to “Homepage” and then make the change there.

Via 1|2

The post Xiaomi Smartphones Reportedly to be Affected by a Browser Hacking Malware appeared first on The Tech Outlook.

]]>
The Digital Personal Data Protection Bill 2023 by Ministry of Electronics and Information Technology was passed in the Lok Sabha on 7 August 2023 https://www.thetechoutlook.com/news/technology/security/the-digital-personal-data-protection-bill-2023-by-ministry-of-electronics-and-information-technology-was-passed-in-the-lok-sabha-on-7-august-2023/ Wed, 09 Aug 2023 17:13:43 +0000 https://www.thetechoutlook.com/the-digital-personal-data-protection-bill-2023-by-ministry-of-electronics-and-information-technology-was-passed-in-the-lok-sabha-on-7-august-2023 Government of India has blocked 63 porn websites

The Ministry of Electronics and Information Technology introduced the Digital Personal Data Protection Bill, 2023 on 3 August in the Lok Sabha. In recent developments, the same was passed in the Lok Sabha on 7 August 2023. The Bill is applicable in the domain of digital personal data processing within India, where such data is […]

The post The Digital Personal Data Protection Bill 2023 by Ministry of Electronics and Information Technology was passed in the Lok Sabha on 7 August 2023 appeared first on The Tech Outlook.

]]>
Government of India has blocked 63 porn websites

The Ministry of Electronics and Information Technology introduced the Digital Personal Data Protection Bill, 2023 on 3 August in the Lok Sabha. In recent developments, the same was passed in the Lok Sabha on 7 August 2023.

The Bill is applicable in the domain of digital personal data processing within India, where such data is collected online, or collected offline and is digitized. Along with it, the Bill is also applicable to processing outside India if it is meant to offer goods or services in India.

In this regard, it is to be noted that one can process personal data only for a lawful purpose. Moreover, an individual’s consent would be required to process the data. Secondly, in the case of voluntary sharing of data by an individual or processing by the State of permits, licenses, benefits, and services, consent might not be necessary.

With the application of this Bill, it would be necessary for Data fiduciaries to maintain the accuracy of data, keep data secure, and delete data once the purpose has been fulfilled.

With the use of this new Bill, you will be able to access rights such as the right to obtain information, seek correction and erasure, and grievance redressal.

However, it is in the hands of the government to exempt government agencies from the application of provisions of the Bill with respect to certain grounds. In the case of the security of the state, public order, and prevention of offenses, the government might choose to do so,

A Data Protection Board of India to be established by the central government will adjudicate on non-compliance with the provisions of the Bill. You can check more details about the Bill here.

The post The Digital Personal Data Protection Bill 2023 by Ministry of Electronics and Information Technology was passed in the Lok Sabha on 7 August 2023 appeared first on The Tech Outlook.

]]>
Step up your network and device security with ASUS Network Security features and AiProtection https://www.thetechoutlook.com/news/technology/security/step-up-your-network-and-device-security-with-asus-network-security-features-and-aiprotection/ Wed, 09 Aug 2023 17:03:41 +0000 https://www.thetechoutlook.com/step-up-your-network-and-device-security-with-asus-network-security-features-and-aiprotection ASUS Network Security

In the domain of Network Security of digital devices, ASUS Network Security features new parameters to step up their safeguarding capabilities. ASUS Network Security features AiProtection with the support of Trend Micro, which ensures the safety of your devices without any subscription fee. ASUS AiProtection ensures 24/7 updated risk assessments and threat intelligence. This offers […]

The post Step up your network and device security with ASUS Network Security features and AiProtection appeared first on The Tech Outlook.

]]>
ASUS Network Security

In the domain of Network Security of digital devices, ASUS Network Security features new parameters to step up their safeguarding capabilities. ASUS Network Security features AiProtection with the support of Trend Micro, which ensures the safety of your devices without any subscription fee.

ASUS AiProtection ensures 24/7 updated risk assessments and threat intelligence. This offers intrusion prevention signatures, security patches, and protection against malicious URLs, all of it with the support of Trend Micro’s database.

The cloud database of Trend Micro is regularly updated. This helps ASUS AiProtection to identify and block malicious sites and URLs accordingly.

The two-way intrusion prevention system (IPS) executes in-depth scans of transmitted and exchanged data from the internet. In this process, it blocks common cyber-attacks like Distributed Denial of Service (DDoS) and ransomware.

Moreover, AiProtection is also capable of detecting and blocking an infected device when it gets connected to a malicious C&C (command and control) server, through your ASUS router. This prevents your personal data from getting compromised.

With the help of the ASUS Router Mobile app, you can control your home network with all of the above-mentioned features very easily. It is supported by the ASUSWRT interface, which functions on any device that has access to a web browser.

Instant Notifications, One-Tap Safe Browsing, Easy Security Scan, and an Instant Guard App are some other features under ASUS Network Security. You can check more in-detailed features and specifications of ASUS Network Security here.

The post Step up your network and device security with ASUS Network Security features and AiProtection appeared first on The Tech Outlook.

]]>
World’s Most Famous Hacker, Kevin Mitnick Dies From Pancreatic Cancer https://www.thetechoutlook.com/news/technology/security/worlds-most-famous-hacker-kevin-mitnick-dies-from-pancreatic-cancer/ Fri, 21 Jul 2023 06:56:43 +0000 https://www.thetechoutlook.com/worlds-most-famous-hacker-kevin-mitnick-dies-from-pancreatic-cancer Kevin Mitnick Dies

Kevin Mitnick was diagnosed with pancreatic cancer more than a year ago. Due to complications, he died on July 16 as mentioned by KnowBe4, the cybersecurity training company he co-owned. Kevin David Mitnick was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years […]

The post World’s Most Famous Hacker, Kevin Mitnick Dies From Pancreatic Cancer appeared first on The Tech Outlook.

]]>
Kevin Mitnick Dies

Kevin Mitnick was diagnosed with pancreatic cancer more than a year ago. Due to complications, he died on July 16 as mentioned by KnowBe4, the cybersecurity training company he co-owned.

Kevin David Mitnick was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

Mitnick’s pursuit, arrest, trial, and sentence, along with the associated journalism, books, and films were all controversial. After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.

Kevin Mitnick was born on August 6, 1963, in Van Nuys, California. He grew up in Los Angeles, California. At age 12, Mitnick convinced a bus driver to tell him where he could buy his own ticket punch for “a school project”.

He was then able to ride any bus in the greater Los Angeles area using unused transfer slips he found in a dumpster next to the bus company’s garage.

Mitnick attended James Monroe High School in North Hills. At this time, he became an amateur radio operator with the nickname “Condor”. The name was inspired by the movie ‘Three Days of the Condor’. He was later enrolled at Los Angeles Pierce College and USC.

Mitnick gained unauthorized access to a computer network in 1979 at 16 years of age when a friend gave him the telephone number for the Ark, the computer system that Digital Equipment Corporation (DEC) used for developing its RSTS/E operating system software.

He broke into the DEC computer network and copied the company’s software. He was charged and convicted in 1988 for this crime and was sentenced to 12 months in prison followed by 3 years of supervised release.

After a well-publicized pursuit, the FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina. He was charged with federal offenses related to a two-and-a-half-year period of computer hacking which included computer and wire fraud.

During his arrest, cloned cellular phones, more than 100 cloned cellular phone codes, and multiple pieces of false identification were found with him.

The post World’s Most Famous Hacker, Kevin Mitnick Dies From Pancreatic Cancer appeared first on The Tech Outlook.

]]>
ColorOSHack 2023: OPPO Invites Global Developers to Participate and Win a Prize Pool of $35,000 https://www.thetechoutlook.com/news/technology/security/coloroshack-2023-oppo-invites-global-developers-to-participate-and-win-a-prize-pool-of-35000/ Tue, 11 Jul 2023 19:19:22 +0000 https://www.thetechoutlook.com/coloroshack-2023-oppo-invites-global-developers-to-participate-and-win-a-prize-pool-of-35000 OPPO ColorOSHack 2023

OPPO is conducting its ColorOSHack 2023 event from July, this month till the month of November and the company is inviting all the global developers to learn about their Pantanal platform and participate in the associated contest. Registration for the event has already begun. Here’s more about the event. OPPO ColorOSHack 2023 With an aim […]

The post ColorOSHack 2023: OPPO Invites Global Developers to Participate and Win a Prize Pool of $35,000 appeared first on The Tech Outlook.

]]>
OPPO ColorOSHack 2023

OPPO is conducting its ColorOSHack 2023 event from July, this month till the month of November and the company is inviting all the global developers to learn about their Pantanal platform and participate in the associated contest. Registration for the event has already begun.

Here’s more about the event.

OPPO ColorOSHack 2023

With an aim to develop smart service solutions that are user-centric, the Chinese consumer electronics manufacturer, OPPO is inviting developers and projects from all over the world as part of the ColorOSHack 2023 event. Participants are asked to learn about OPPO’s Pantanal platform and the brand will be offering the developers the needed technical capabilities and the Pantanal DevStudio. Integrating the developed services, participants and OPPO can also bring out the service to all its users together.

The registration date starts today and interested participants/developers can apply for it now. You can participate individually or as a group with not more than five participants. By the 15th of September, participants will have to submit their projects. It can be from topics related to entertainment(music, video, gaming, etc.), transportation(flights, bus, trains, etc.), and daily life(food and beverage, health recommendations, logistics and delivery, etc.).

The online event briefing will take place a month before the final date of submission of the project, on the 15th of August, and the online technology salon and the announcement of shortlisted participants will take place two months after the briefing, on the 15th of October. The final pitch and the announcement of winners will be on November 24th, 2023.

A total prize of $35,000 has been announced by OPPO. The first prize winner receives the Platinum prize of $20,000 and the second prize winner will receive the Gold prize of $10,000. The third prize winner will be receiving the Silver prize of $5,000. In addition to these cash prizes, contestants might also receive the chance to win two other rewards as well. Outstanding contestants will receive instructions from OPPO’s research and development team and also from other industry experts and, final winners will be receiving a few incentives from the OPPO Store.

Check out more about the event and register via the link below.

The post ColorOSHack 2023: OPPO Invites Global Developers to Participate and Win a Prize Pool of $35,000 appeared first on The Tech Outlook.

]]>