Setup News Ticker
Searching for 'users'. (Return)

Yahoo Tech - Apple MacMay 24, 2019
OnePlus 7 Pro users report ‘ghost touches' that occur without any input
It should be an exceptional week for OnePlus, considering the stellar response the OnePlus 7 Pro got after launch and the fact that the young smartphone vendor just launched its first ever 5G phone. However, OnePlus is already being forced to put out fires.OnePlus addressed criticism that it's misleading users with its 3x zoom claims earlier this week, but now, some users have discovered a more serious issue that might actually impact their overall experience, as this one concerns the sophisticated OnePlus 7 Pro display.The OnePlus 7 Pro features a brand new design, complete with an all-screen display that features no notches or holes. The screen is also curved on the sides, which will remind some people of Samsung's phones. But, more importantly, the Pro features a 90Hz display that doesn't have many rivals. What that means for users is that they should get an even better, smoother Android experience than on competing flagships.But it turns out that some OnePlus 7 Pro displays register ghost touches, which is as annoying as it sounds. As you can see in the following video, the display registers touches that don't actually happen, and reacts accordingly, producing the results you'd expect to see on the screen had you pressed the same buttons:'s a thread on the matter over on the OnePlus forums, and Android Central confirms it's been able to replicate the issue on one of its test units: It's only happened a couple of times in my four days with the handset

Network World SecurityMay 08, 2019
Cisco releases a critical security patch for a virtualized automation tool
Cisco has released a  patch for a critical vulnerability in software used to control large virtual environments.

The weakness gets a 10 out of 10 severity score and is found in Cisco's Elastic Services Controller (ESC), which the company describes as offering a single point of control to manage all aspects of Virtual Network Functions and offers capabilities such as VM and service monitoring, auto-recovery and dynamic scaling. With ESC users control the lifecycle all virtualized resources, whether using Cisco or third-party VNFs, Cisco stated.

RELATED: What IT admins love/hate about 8 top network monitoring tools The vulnerability in this case lies in the REST API of ESC and could let  an unauthenticated remote attacker to bypass authentication on the REST API and execute arbitrary actions through with administrative privileges on an affected system. The vulnerability is due to improper validation of API requests, Cisco wrote in its advisory.

To read this article in full, please click here

  • CEOExpress
  • 1 Boston Place | Suite 2600
    Boston MA 02108
  • 617 482 1200
    617 299 8649 (fax)
  • Contact
  • As an Amazon Associate
    CEOExpress earns from
    qualifying purchases.

©1999-2019 CEOExpress Company LLC