Blog Posts

Blog Posts

Flash Bee: DIY Handheld Lightning Detector with ESP32-C3

ESP32-C6 Flash Bee lightning detector

Flash Bee is an easy-to-make DIY handheld lightning detector based on off-the-shelf parts such as the XIAO ESP32C3 board and the Round Display for XIAO, as well as a 3D-printed enclosure. The design relies on the AMS AS3935 Franklin lightning sensor that’s been around for years, and found in kits like Sparkfun’s Arduino IoT weather station, which is capable of detecting lightning up to 40 km away with 1km accuracy. While it’s not quite new technology, I found the Flash Bee design to be rather cute and convenient, and it looks really easy to reproduce. Flash Bee key components: Seeed Studio XIAO ESP32-C3 with Wi-Fi 4 & Bluetooth LE 5.0 connectivity ($4.90) Round Display for XIAO – 1.28-inch touchscreen display with 240×240 resolution, 65K colors, 100 Hz refresh rate ($18) Grove Lightning Sensor AS3935 ($26.90, alternative link if out of stock) 3.7V 400mAh LiPo battery Slide switch 2x M2 5mm […]

The post Flash Bee – An ESP32-C3-based DIY handheld lightning detector appeared first on CNX Software – Embedded Systems News.

Signs That Your External Hard Drive Requires Replacement

Solid-state drives (SSDs) typically offer superior reliability and are not as vulnerable to the same types of physical deterioration as HDDs. Therefore, if you are seeking a more dependable alternative, consider making the switch, particularly when you start to observe signs that your external HDD is nearing its end.

Unusual sounds

Apple Claims Unhackable Nature of Certain iOS Function

prevent a burglar from reaching crucial iPhone information, along with tracking functionalities that can pinpoint misplaced or stolen devices on the map. Additionally, stolen iPhones remain inoperative as long as they’re linked to the user’s Apple Account. Moreover, the iPhone incorporates inherent iOS safeguards against hacks and malware, featuring a somewhat unnoticed iOS security option known as Lockdown Mode, which can stop hackers from monitoring iPhone users.

Lockdown Mode holds significant value in a landscape where advanced attackers can circumvent the built-in iOS security despite Apple’s diligent efforts. However, Lockdown Mode seems to function as designed, successfully hindering hackers from effectively implanting malware on iPhones. Apple informed TechCrunch that iPhones secured by Lockdown Mode have not endured hacks in the nearly four years since the feature’s introduction. This functionality was created in the aftermath of NSO Group’s Pegasus spyware intrusions on iOS, indicating that Apple likely recognizes various sophisticated intrusions aimed at iPhones, including devices lacking Lockdown Mode safeguards.

There may exist highly advanced assaults that could penetrate Lockdown Mode without Apple’s awareness, yet Apple’s assertion appears to be validated by external sources. TechCrunch cites Amnesty International, Citizen Lab, and Google among the entities capable of confirming Lockdown Mode’s effectiveness in repelling attacks. Google’s research reveals a situation where spyware would terminate attacks upon detecting Lockdown Mode protection.

How Lockdown Mode operates

<div class="slide-key image-holder gallery-image-holder credit-image-wrap" data-post-url="https://www.bgr.com/2138530/apple-claims-ios-lockdown-feature-never-been-hacked/" data-post-title="Apple Claims No One Using This iOS Feature Has Ever

Dyson Unveils Portable Version of Its Iconic Fans

Nearly 17 years after Dyson first announced its Air Multiplier fans – one of its first big consumer products after vacuums – the company has miniaturized their design to create a handheld personal cooler called the HushJet Mini Cool. Like Dyson’s larger Air Multipliers, humidifiers, air purifiers, and heaters, the HushJet Mini Cool doesn’t have […]

Gemini Introduces Notebooks for Project Organization

Google’s Gemini is getting a feature called “notebooks” to help you organize things about certain topics in a single place while using the AI chatbot, the company announced on Wednesday. You can pull in things like files, past conversations, and custom instructions into notebooks that Gemini can then use as context while you’re talking with […]

Default Activation of Stolen Device Safeguard for Corporate Devices in iOS 26.4.1

Apple has verified that Stolen Device Protection will be activated by default for enterprise devices upgrading from iOS 26.4 to iOS 26.4.1, and from iPadOS 26.4 to iPadOS 26.4.1. This functionality is part of Apple’s ongoing initiative to bolster security across its devices.

### iOS 26.4 Had Previously Activated the Feature by Default on Non-Enterprise Devices

With the recent launch of iOS 26.4.1 and iPadOS 26.4.1, Apple has issued updates that encompass bug fixes and enhancements. Significantly, the release notes mentioned that the update addressed a CloudKit bug impacting iCloud data synchronization. Apple has also revised its support page to validate that Stolen Device Protection will be automatically activated for enterprise devices during this update.

### Apple Continues to Strengthen Security on Its Devices

This action follows Apple’s earlier choice to enable Stolen Device Protection by default for non-enterprise devices in iOS 26.4. Initially introduced in 2024, this feature provides extra security layers for sensitive operations when an iPhone is outside recognized locations, necessitating biometric authentication for accessing saved passwords or altering account settings. It also imposes a delay for high-risk actions to thwart unauthorized access.

#### How Stolen Device Protection Operates

Stolen Device Protection incorporates various security protocols:

– **Biometric Authentication**: Activities such as accessing stored passwords and payment methods require Face ID or Touch ID, with no alternative fallback, ensuring that solely the authorized user can utilize these features.

– **Security Delay**: Specific actions, such as altering an Apple Account password, require waiting an hour and executing additional biometric authentication.

The update follows Apple’s proactive measures to rectify security vulnerabilities, including those unveiled by the Coruna and DarkSword exploits. Recent updates have been rolled out to fix these vulnerabilities across both legacy and current versions of iOS and iPadOS.

Moreover, the timing of this update aligns with Anthropic’s declaration of its new AI model, Mythos, which is intended to detect security weaknesses in operating systems and browsers. While the choice to enable Stolen Device Protection by default for enterprise devices may not be directly associated with recent exploits or the influence of Mythos, it highlights Apple’s dedication to enhancing user security.

For additional details on Stolen Device Protection, users can check Apple’s support page.