Microsoft’s Photos app in Windows 11 is getting a “Visual Search with Bing” feature, which will enable you to search for images similar to whatever pictures you’re viewing.
The updated version of the Photos app also brings improved navigation for your photo gallery, quick access to image editing capabilities, and some tweaks to make Photos a better user experience overall.
Photos is the default app for viewing and organizing pictures in Windows and this update brings some long-awaited features to it. While you’re looking at a picture and feel a tinge of curiosity about something in it, you can use Visual Search with Bing to perform an instant reverse image search, which will prompt Bing to scour the internet for similar images and any information that might be relevant to the image you’re looking up (similar to Google’s reverse image search).
A similar feature already exists in the Snipping Tool app, which enables you to do this after you take a screenshot.
(Image credit: Shutterstock/insta_photos) What else is in the pipeline for the Photos app?As well as the new reverse image search capabilities, smoother gallery navigation will make flicking through pictures easier and you’ll be able to jump straight into image-editing tools from your desktop or File Explorer.
The enhanced Photos app is currently available via the Windows Insider Program, a special group of Windows users who get early access to Windows features. Regular users hopefully won’t have to wait long, as the majority of features that make it to this preview state are usually rolled out widely later on in future cumulative Windows 11 updates.
Users of the Photos app in Windows 10 can also now sync their iCloud photos, Apple’s cloud storage for images, a feature that’s been in Windows 11 for some time. This means if you have a Windows PC and an iPhone or iPad, you can easily access your iCloud photos after syncing them in the Photos app on your Windows 10 device.
I don’t know how many people will find this useful as Google search still currently dominates the search market and offers its own image-searching capabilities, but it’s good to give users more tools and possibilities to interact with their own media. Bing reverse image search has more convincing to do, as most people who have even heard of reverse image search would usually think of Google or TinEye - if at all.
YOU MIGHT ALSO LIKE...Fellow athletes say that the tragic death of Rebecca Cheptegei, who was reportedly set on fire, highlights an unsettling trend of violence against female runners in particular and women overall.
(Image credit: FERENC ISZA/AFP via Getty Images)
Cybersecurity researchers from McAfee have uncovered hundreds of malicious Android apps designed to steal access to people’s cryptocurrency wallets.
The researchers dubbed the campaign SpyAgent, which was made up of 280 apps in total, so far, mimicking legitimate banking apps, government services tools, TV streaming, utilities apps, and more. The criminals would host then these on malicious sites and third-party app stores (never on Google Play Store), and look to trick victims into installing them via phishing, social messaging apps, and similar.
When the victim installed the app, the malware would scour through images saved on the device and use optical character recognition (OCR) to scan the contents of the files. If it finds anything useful (for example, words), it would exfiltrate the contents to a cloud-hosted database, where the attackers would grab it.
Mnemonic keys and seed phrasesMost cryptocurrency wallets have two layers of protection. One is a password, a PIN code, or biometrics, which is stored on the device and allows the user to access and operate the wallet. The other is the so-called “mnemonic key”, or “seed phrase” - a set of 12 or 24 random words, which allow the user to load the contents of the wallet into a new device. The mnemonic key is a backup option of sorts. If a user loses access to their phone, or hardware wallet, they can get a new one, load the seed phrase, and regain access to their wallets and all the currency found inside.
However, if a malicious actor gets their hands on the mnemonic key they, too, can load the wallet and easily empty it. Since many people use “hot wallets” (mobile apps, basically), they also store their mnemonic keys as screenshots on their phones.
The best way to protect against these apps is to only download them from vetted sources, such as the Google Play Store. For more details on malicious apps, check out McAfee’s report here.
More from TechRadar ProThe Federal Aviation Administration says it will investigate the incident, in which no injuries were reported. Atlanta-based Delta Air Lines says it is working to re-accommodate passengers on both flights.
(Image credit: Charlie Riedel)
The Israeli military said it was targeting a Hamas command and control center in al-Muwasi, west of Khan Younis, and killed three Hamas commanders in the strike. Hamas did not confirm the deaths.
(Image credit: Ahmad Salem)
Residents are being urged to finish any storm preparations. Francine is expected to bring storm surge, strong winds, heavy rainfall and flash flooding to Louisiana and parts of Mississippi and Texas.
(Image credit: Gerald Herbert)
Cybersecurity researchers from Ben-Gurion University of the Negev, Israel, came up with a very James Bond-esque way to steal sensitive files from air-gapped systems.
The method is dubbed RAMBO (short for Radiation of Air-gapped Memory Bus for Offense) because it abuses the target computer’s RAM memory to steal data, taking advantage of the electromagnetic radiation the memory generates while operating.
An air-gapped system is disconnected from the wider network, and the internet. This is a (relatively) extreme measure reserved only for the most critical of systems, holding the most important data. So, even if a user inadvertently introduces a piece of malware (for example, via a compromised USB device), the malware would still have no way of transmitting the data to the outside world (other than copying the files directly onto the said USB, which is an entirely different beast).
Defending air-gapped systemsHowever, in this scenario, the malware would tamper with RAM components to allow for a recipient, which needs to be standing relatively close, to exfiltrate sensitive data.
The large caveat is still the fact that a person would need to stand relatively close. Another caveat is that the file transfer done this way is relatively slow. Don’t expect to be stealing any large files or databases, since it takes more than two hours to download 1 megabyte of information (for the fossils among you - author included - that’s slower than dial-up).
The method could still be used to steal keystrokes, passwords, or other data that doesn’t take up too much space.
The best way to defend against these things is simply not to let people near valuable endpoints, the experts conclude.
Via BleepingComputer
More from TechRadar ProThe constitutional reform is controversial because it would completely remake Mexico's judiciary. One side says it would end corruption, the other that it would end judicial independence.
(Image credit: Felix Marquez)