Home Blog Page 3886

Accessibility in SpeakerClock 1.3.1 | Cocoanetics


Now you can totally function SpeakerClock with no or low imaginative and prescient. We gave SpeakerClock the complete Accessibility therapy. On this article I describe a few of the issues I realized including accessibility options to SpeakerClock, now that it’s totally written in SwiftUI.

SpeakerClock’s UI is split into 3 sections, the presets on the high, the LED timer as huge as attainable within the heart and the section “site visitors gentle” on the backside.

The principle interplay gesture is to horizontally swipe over the LED digits to vary the timer. This sort of gesture will not be attainable when VoiceOver is lively as a result of there you possibly can pan over the display to rapidly get to the recent spots of interactive parts.

I solved this by having individually adjustable sub-elements for the minutes and seconds whereas the timer will not be working. This manner you possibly can swipe vertically to regulate the minutes and seconds individually.

There are three varieties of normal gestures for Voice-Over which I made full use of:

  1. double-tap with single finger to pick a component
  2. double-tap with two fingers to carry out a “magic faucet”
  3. draw a Z with two fingers to “escape”

I used #1 for the single-tap operate of the preset and talking section buttons. #2 substitutes for the lengthy press. The rationale is that it’s a must to consciously faucet with two fingers as an alternative of 1 to change the presets, as to forestall you from by chance altering them.

Within the common circulation of issues, VoiceOver mainly feedback on the centered factor and after a brief pause additionally reads out the accessibility trace that tells the person what interactions are attainable. I additionally used VoiceOver’s announcement notifications to offer audio suggestions on some interactions.

The cherry on high is that sure timer values get pink out aloud. Within the yellow and inexperienced phases you get a voice immediate each minute. The section transitions get introduced as nicely. Within the pink section there may be an announcement very 15 seconds, with the ultimate 10 seconds being accompanied by beeps.

That felt like an inexpensive quantity of voice suggestions for starters. I would add some configuration choices at a later level.

On this video I’m demonstrating all that we mentioned.

Conclusion

I’d say my implementation is 95% good. There are some edge instances nonetheless – which I can not do a lot about – the place VoiceOver will insist of talking one thing that it wouldn’t must. Sadly there isn’t any method to inform Accessibility to “shut it” for sure instances when there’s something extra essential happening.

It value me quite a lot of experimenting and the higher a part of a day to get to this stage. I’m anxious to listen to from precise customers of SpeakerClock, particularly those that are visually impaired and might need use for a timer. And a few common customers additionally requested about acoustic suggestions. What kind of configuration choices associated to sounds may make sense?



Additionally printed on Medium.


Tagged as:

Classes: Updates

Google Fixes Excessive-Severity Chrome Flaw Actively Exploited within the Wild

0


Aug 22, 2024Ravie LakshmananBrowser Safety / Vulnerability

Google Fixes Excessive-Severity Chrome Flaw Actively Exploited within the Wild

Google has rolled out safety fixes to deal with a high-severity safety flaw in its Chrome browser that it mentioned has come beneath lively exploitation within the wild.

Tracked as CVE-2024-7971, the vulnerability has been described as a sort confusion bug within the V8 JavaScript and WebAssembly engine.

“Sort confusion in V8 in Google Chrome previous to 128.0.6613.84 allowed a distant attacker to take advantage of heap corruption by way of a crafted HTML web page,” in response to a description of the bug within the NIST Nationwide Vulnerability Database (NVD).

Cybersecurity

The Microsoft Menace Intelligence Heart (MSTIC) and Microsoft Safety Response Heart (MSRC) have been credited with discovering and reporting the flaw on August 19, 2024.

No further particulars in regards to the nature of the assaults exploiting the flaw or the identification of the risk actors which may be weaponizing it have been launched, primarily to make sure that a majority of the customers are up to date with a repair.

The tech large, nevertheless, acknowledged in a terse assertion that it is “conscious that an exploit for CVE-2024-7971 exists within the wild.” It is value mentioning that CVE-2024-7971 is the third sort confusion bug that it has patched in V8 this yr after CVE-2024-4947 and CVE-2024-5274.

Google has to this point addressed 9 zero-days in Chrome because the begin of 2024, together with three that have been demonstrated at Pwn2Own 2024 –

Cybersecurity

Customers are advisable to improve to Chrome model 128.0.6613.84/.85 for Home windows and macOS, and model 128.0.6613.84 for Linux to mitigate potential threats.

Customers of Chromium-based browsers equivalent to Microsoft Edge, Courageous, Opera, and Vivaldi are additionally suggested to use the fixes as and after they turn out to be accessible.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



The Pixel Watch 3 ‘no-repair coverage’ should not shock you

0


Google has confirmed that the Pixel Watch 3 is unable to be repaired. When you’ve got a {hardware} drawback, you will have to get it changed. No person must be stunned as a result of that is the third model of the Pixel Watch and the third one which “cannot” be repaired.

Whereas I am positive somebody with sufficient dedication and a gentle hand may take a Pixel Watch 3 aside to interchange damaged or defective elements, realistically, Google is telling the reality when it says it could possibly’t be repaired. All wearables are packed stuffed with small components bonded collectively in a approach that requires equipment to assemble, so cracking them open is not straightforward. It might be far cheaper to supply a substitute. Whereas Samsung and Apple might provide some varieties of service for his or her wearables, it isn’t low-cost. It may possibly’t be low-cost.



New report crowns unsung hero as Apple’s hottest service

0



Apple has been rising its providers enterprise like loopy over the previous few years. The corporate created so many providers that it now affords a subscription bundle service to provide prospects some semblance of sense in subscribing to all of them.

If you wish to purchase a service from Apple, you now have plenty of selection. You may select Apple Music for music, Apple TV+ for motion pictures and TV exhibits, Apple Arcade for video video games, Apple Information+ for magazines and newspapers, Apple Health+ for guided exercises, and iCloud for….storage?



‘EastWind’ Cyber Spy Marketing campaign Combines Varied Chinese language APT Instruments


A probable China-nexus risk actor is utilizing well-liked cloud companies corresponding to Dropbox, GitHub, Quora, and Yandex as command-and-control (C2) servers in a brand new cyber espionage marketing campaign concentrating on authorities organizations in Russia.

Researchers at Kaspersky are monitoring the marketing campaign as “EastWind,” after uncovering it whereas investigating units that had been contaminated by way of phishing emails with malicious shortcuts attachments.

Dropbox-Hosted C2 Servers

Kaspersky’s evaluation confirmed the malware was speaking with and receiving instructions from a C2 server on Dropbox. The researchers additionally discovered the attackers utilizing the preliminary payload to obtain further malware related to two completely different China-sponsored teams — APT31 and APT27 — on contaminated methods. As well as, the risk actor used the C2 servers to obtain a newly modified model of ‘CloudSorcerer,‘ a complicated cyber espionage software that Kaspersky noticed a brand new, eponymously named group utilizing in assaults earlier this yr that additionally focused Russian authorities entities.

Kaspersky has perceived the usage of instruments from completely different risk actors within the EastWind marketing campaign as an indication of how APT teams typically collaborate and share malware instruments and data with one another.

“In assaults on authorities organizations, risk actors typically use toolkits that implement all kinds of methods and ways,” Kaspersky researchers stated in a weblog put up this week. “In creating these instruments, they go to the best lengths attainable to cover malicious exercise in community site visitors.”

APT31 is a sophisticated persistent risk group that US officers have recognized as engaged on behalf of China’s Ministry of State Safety in Wuhan. Earlier this yr, the US Division of Justice indicted seven members of the group for his or her position in cyber-spy campaigns that victimized hundreds of entities globally, over a interval spanning 14 years. Mandiant, one in every of a number of safety distributors monitoring APT31 has described the risk actor’s mission as gathering info from rival nations that could possibly be of financial, army, and political profit to China. The group’s most frequent targets have included authorities and monetary organizations, aerospace firms and entities within the protection, telecommunication, and excessive tech sectors.

APT27, or Emissary Panda, is one other China-linked purpose engaged within the theft of mental property from organizations in sectors that China perceives as being of important strategic curiosity. Like APT31, the group has relied closely on malware delivered by way of phishing emails for preliminary entry.

Kaspersky didn’t tie both group particularly to the brand new EastWind marketing campaign that it noticed concentrating on Russian authorities entities, however identified that it had noticed the usage of each teams’ malware within the assaults.

Instruments From Totally different China-Nexus Actors

Kaspersky has dubbed the APT31 malware that the risk actor behind EastWind is utilizing in its marketing campaign as “GrewApacha,” a Trojan that APT31 has been utilizing since no less than 2021. The safety vendor noticed the risk actor behind the EastWind marketing campaign utilizing GrewApacha to gather details about contaminated methods and to put in further malicious payloads on them. The adversary in the meantime has been utilizing the aforementioned CloudSorcerer — a backdoor that the attacker executes manually — to obtain PlugY, an implant with code that overlaps with APT27.

Kaspersky discovered the implant speaking with the the Dropbox hosted C2 servers by way of the TCP and UDP protocols and by way of named pipes — a Home windows methodology for inter course of communications. “The set of instructions this implant can deal with is kind of intensive, and carried out instructions vary from manipulating information and executing shell instructions to logging keystrokes and monitoring the display or the clipboard,” Kaspersky stated.