
If WhatsApp displays a blank screen on an iPhone 7 Plus, it's likely due to app-side bugs or corrupted cache. To troubleshoot, try turning Background App Refresh off and on, clearing the App Switcher, and reinstalling WhatsApp. If these steps don't work, skip iCloud sync during setup or wait for an app or iOS update. As a last resort, factory reset your iPhone, but back up your data first. If none of these solutions work, contact Apple Support or the WhatsApp Help Center, but note that WhatsApp still supports the iPhone 7 lineup.
Read full article
June 8, 2025 • By The Associated Press
Cybersecurity investigators have discovered a sophisticated cyberattack that may have allowed hackers to infiltrate smartphones without user interaction. The attack, which began late last year, targeted individuals in government, politics, tech, and journalism, particularly those with ties to fields of interest to China's government. Experts warn that mobile devices and apps are a weak link in US cyberdefenses, and foreign hackers, including those linked to China's military and intelligence services, have increasingly targeted smartphones and telecommunication networks. The Chinese government has denied allegations of cyberespionage, but US authorities have warned of a sprawling Chinese hacking campaign designed to gain access to texts and phone conversations. The US has banned Chinese telecom companies from its networks, and other countries are phasing out Chinese involvement due to security concerns. Experts emphasize the vulnerability of mobile devices and apps, citing the lack of robust security and regular software updates. They also stress the importance of basic security precautions, particularly for devices containing classified or sensitive information. The US government has launched a program to create a "cyber trust mark" for connected devices that meet federal security standards, but officials warn that consumers and officials should remain vigilant.

June 8, 2025 • By Kevin Lynch
The UEFA Nations League finale is set to take place on Sunday, June 8, with Portugal, led by Cristiano Ronaldo, facing off against defending champions Spain, led by 17-year-old Lamine Yamal. The match will be available to stream on various platforms, including Fox Network, Sling TV, Fubo Sports Network, and ViX in the US. In the UK, the match will be broadcast on ITV1 and can be streamed online for free via ITVX. For those traveling abroad, a VPN can be used to access the match, with ExpressVPN being a recommended option. The match will also be available to stream on Optus Sport in Australia and DAZN Canada in Canada. Kickoff is set for 9 p.m. CET, 8 p.m. BST, 3 p.m. ET, and 12 p.m. PT. This will be the first time Cristiano Ronaldo and Lamine Yamal have faced each other in a match.

June 8, 2025 • By Dean Daley
The article discusses the TCL 60 XE NxtPaper smartphone, which features a unique NxtPaper display technology. While the author appreciates the display's nice feel and readability, especially at night, they find it unnatural to use as a primary handset due to its difference from typical LCD and OLED panels. The phone's bland user interface, poor haptics, and bulky design are also drawbacks. However, the device's battery life is excellent, and the author enjoys using it for reading before bed. The NxtPaper display is gentle on the eyes and can be switched to e-ink mode for a more comfortable reading experience. The author suggests that NxtPaper technology might be better suited for a foldable device, where it could be used as an inner display for reading and note-taking, while a standard OLED display could be used on the outside. This design would provide a paper-like experience for reading and could be marketed as a foldable e-reader or an affordable folding smartphone. Overall, the TCL 60 XE NxtPaper is a good option for those looking for an affordable device with a solid battery and a unique display technology, particularly for reading enthusiasts. The phone is priced at $325 in Canada, making it a great value for its features.

June 8, 2025 • By Abdullah Asim
There is no news article provided. Please share the article, and I'll be happy to provide a concise summary for you.

June 8, 2025 • By Jon Gilbert
The article discusses how the author customized their Android home screen to improve productivity by organizing it into focus and productivity zones. They removed all apps and widgets and started from scratch, categorizing them into four zones: focus zone (top third), primary productivity zone (bottom left), secondary productivity zone (bottom right), and a zone for less frequently used apps. The author placed their most used apps, such as WhatsApp and Spotify, in the primary productivity zone, making it easier to access them. They also moved social media apps and games to a second screen to reduce distractions. The result was a significant improvement in finding apps and information quickly, despite sacrificing aesthetic balance. The author's approach can be applied to other Android users to fine-tune their productivity and reduce distractions.

June 8, 2025 • By Pierluigi Paganini
Here is a concise summary of the news article, within the 8173 token limit: **Cybersecurity News Roundup** Multiple cybersecurity threats have been reported, including: 1. **OpenAI bans ChatGPT accounts** linked to Russian and Chinese cyber operations. 2. **New Mirai botnet** targets TBK DVRs by exploiting CVE-2024-3721. 3. **BadBox 2.0 botnet** infects millions of IoT devices worldwide. 4. **Gluestack packages** vulnerable to supply chain attack, with over 950K weekly downloads at risk. 5. **Experts found 4 billion user records** online, the largest known leak of Chinese personal data. 6. **Russia-linked threat actors** target Ukraine with PathWiper wiper. 7. **U.S. offers $10M bounty** for info on RedLine malware creator and state hackers. 8. **Play ransomware group** hit 900 organizations since 2022. 9. **U.S. CISA adds Google Chromium V8 flaw** to its Known Exploited Vulnerabilities catalog. 10. **Cisco ISE critical flaw** impacts cloud deployments on AWS, Microsoft Azure, and Oracle Cloud Infrastructure. Other notable threats include: * **Cryptojacking campaign** relies on DevOps tools. * **Qualcomm fixed three zero-days** exploited in limited, targeted attacks. * **Police took down several popular counter-antivirus (CAV) services**. * **Cyberattack hit hospitals** operated by Covenant Health. * **Experts published a detailed analysis** of Cisco IOS XE WLC flaw CVE-2025-20188. **International Edition** * **Meta stopped covert operations** from Iran, China, and Romania spreading propaganda. * **US Treasury sanctioned** the firm Funnull Technology as a major cyber scam facilitator. * **China-linked APT41** used Google Calendar as C2 to control its TOUGHPROGRESS malware. * **Czech Republic accuses China's APT31** of a cyberattack on its Foreign Ministry. * **Nova Scotia Power confirms** it was hit by ransomware attack but hasn't paid the ransom. **Security Affairs Newsletter** * **Round 48**: Experts found rogue devices in Chinese-made power inverters. * **Round 47**: US Government officials targeted with texts and AI-generated deepfake voice messages. * **Round 46**: Operation ENDGAME disrupted global ransomware infrastructure. * **Round 45**: Experts found one-click RCE in ASUS’s pre-installed software DriverHub. * **Round 44**: Rhysida Ransomware gang claims the hack of the Government of Peru. * **Round 43**: African multinational telco giant MTN Group disclosed a data breach. * **Round 42**: Attackers exploited SonicWall SMA appliances since January 2025. * **Round 41**: China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure. * **Round 40**: Expert used ChatGPT-4 to create a replica of his passport in just 5 minutes. * **Round 39**: Sam’s Club Investigates Alleged Cl0p Ransomware Breach. * **Round 38**: UAT-5918 ATP group targets critical Taiwan. * **Round 37**: A ransomware attack hit the Micronesian state of Yap. * **Round 36**: Akira ransomware developer Rostislav Panev was extradited from Israel to the U.S. These are just a few of the many cybersecurity threats and incidents reported in the news article.

June 8, 2025 • By Jean-Luc Aufranc (CNXSoft)
The ZimaBoard 2 is a micro server that comes with an Intel N150 processor, 2.5GbE ports, and SATA drives. It has a web dashboard for easy management and can run ZimaOS or other operating systems like Ubuntu. The device has some limitations, including a read-only root file system, lack of package manager, and limited cooling, which causes throttling during multi-core workloads. Despite these flaws, the ZimaBoard 2 is a promising device for its price range, offering features like file sharing, software installation, and low-level performance. However, users may experience issues like video output instability, high temperatures, and bugs in the ZimaOS system. The device is available for pre-order on the company's store for $199 and up.

June 8, 2025 • By DAVID KLEPPER Associated Press
Cybersecurity investigators have discovered a sophisticated cyberattack that may have allowed hackers to infiltrate smartphones without user interaction. The attack, which began late last year and continued into 2025, targeted individuals working in government, politics, tech, and journalism, particularly those of interest to China's government. Experts warn that mobile devices and apps are a weak link in US cyberdefenses, with groups linked to China's military and intelligence service targeting prominent Americans and burrowing into telecommunication networks. The Chinese government has denied allegations of cyberespionage, accusing the US of mounting its own cyberoperations. The US has banned Chinese telecom companies from its networks, and other countries, including Germany, are phasing out Chinese involvement due to security concerns. However, Chinese tech firms remain a significant part of many nations' systems, giving them a global footprint that could be exploited for cyberattacks. The vulnerability of mobile devices and apps is a major concern, with many devices lacking robust security and regular software updates. This makes them a potential foothold for hackers to penetrate networks, retrieve information, or infect systems with malware. Experts emphasize the need for users to follow basic security precautions, especially when dealing with classified or sensitive information.

June 8, 2025 • By Sam Comrie
As an Amazon Associate, we earn from qualifying purchases and other affiliate schemes. Learn more. In comparison to other consoles, the Nintendo Switch 2doesn't have many options when it comes to en…

June 8, 2025 • By AP
Here's a concise summary of the news article: Recent news updates include US Representative Mike Johnson criticizing Elon Musk and Donald Trump over the LA riots, Israel discovering a Hamas command tunnel under a Gaza hospital, and Canada's Melanie Joly calling US steel tariffs "completely unacceptable". Additionally, the US trade team is extending its stay in India, and Israel intercepted a Gaza-bound boat carrying climate activist Greta Thunberg. Protests and riots have erupted in Los Angeles over ICE raids, prompting the deployment of the National Guard.

June 8, 2025 • By Owen Boss
A sophisticated cyberattack has been discovered, targeting smartphones of individuals in government, politics, tech, and journalism, particularly those with ties to fields of interest to China's government. The attack, which began late last year and continued into 2025, allowed hackers to infiltrate phones without user interaction. Investigators found that victims had been previously targeted by Chinese hackers. The incident highlights the vulnerability of mobile devices and apps to cyberattacks, with experts warning of a "mobile security crisis." Chinese hackers have been increasingly targeting smartphones, including those of prominent Americans, to gain access to sensitive information. The US has warned of a sprawling Chinese hacking campaign, and lawmakers have expressed concerns about Chinese telecom companies' involvement in US networks. Experts emphasize the need for improved mobile security, citing the risks of sensitive information exposure and cyberattacks. The US has launched a program to create a "cyber trust mark" for connected devices that meet federal security standards. However, consumers and officials must remain vigilant, as even secure devices can be compromised if users do not follow basic security precautions.

June 8, 2025 • By Justin Dawes
The travel technology sector is experiencing a surge in mergers and acquisitions, with over 40 deals in the past three months. Companies with recent funding are consolidating and expanding in a shifting market. Established startups are attracting investment, while newer ones face tighter funding, leading to more acquisition opportunities. Major transactions include Boeing's $10.55 billion aviation software sale, Sabre's hotel tech unit sale, and strategic buys by Amadeus, JetBlue, and Lyft. This wave of activity signals a rapidly evolving travel tech industry.

June 8, 2025 • By Tyler Lacoma
Geofencing is a smart home technology feature that uses location-based data to automate various tasks when a user leaves or arrives at their home. It allows users to set rules for connected devices, such as turning off lights or locking doors, based on their location. Geofencing is generally considered safe and can be a convenient way to save time and energy. However, it does require enabling location-based tracking data, which may raise privacy concerns. To get started with geofencing, users can start small by using a smart plug or adjusting settings in their smart home app. Many smart home devices and platforms, such as Alexa and Google Home, support geofencing. Overall, geofencing can be a useful feature for smart home users, but it's essential to be aware of the potential privacy implications.
.jpg)
June 8, 2025 • By David Nield
The popular read-it-later app Pocket is shutting down, and users need to find alternative services. Here are some of the best options: 1. **Instapaper**: A comprehensive read-it-later app with a clean interface, available for web, Android, and iOS. It offers features like organization with folders and tags, and a paid tier with additional features. 2. **Feedly**: A service that helps users keep up with their favorite sites and curate a read-it-later list. It offers features like filters, keyword searches, and integrations with other apps. 3. **Matter**: An app that supports multiple content types, including web articles, PDFs, and social media threads. It offers a free tier and a premium plan with features like text-to-speech and annotations. 4. **Raindrop.io**: A bookmarks manager that can also be used as a read-it-later service. It offers a clean interface, integrations with other apps, and a Pro account with additional features. 5. **Readwise Reader**: A service that packs in many features, including support for videos, social media posts, and PDFs. It offers a 30-day free trial and a paid subscription with comprehensive search and sorting tools. These alternatives can help users transition from Pocket and find a new way to catch up on their reading.

June 8, 2025 • By MarketBeat News
Here's a concise summary of the article: Seven streaming stocks to watch are NVIDIA, AppLovin, Spotify Technology, Trade Desk, Walt Disney, Roku, and Comcast. These companies generate revenue through subscription fees, advertising, or a hybrid model, and offer exposure to the growing on-demand entertainment market. NVIDIA provides graphics and compute solutions, and its stock traded up $2.17 to $142.16 on Friday. AppLovin's stock traded up $5.76 to $419.90, while Spotify Technology's stock traded down $0.26 to $712.56. The Trade Desk's stock traded up $0.32 to $71.43, and Walt Disney's stock traded up $1.36 to $113.89. Roku's stock traded up $3.30 to $77.90, and Comcast's stock traded up $0.43 to $34.65. These companies have varying market capitalizations, price-to-earnings ratios, and debt-to-equity ratios. They operate in different segments, including software platforms, audio streaming, advertising, entertainment, and media. The article provides a snapshot of each company's stock performance and financials, making it a useful resource for investors interested in the streaming industry.

June 8, 2025 • By Associated Press
Cybersecurity investigators have discovered a sophisticated cyberattack that may have allowed hackers to infiltrate phones without user interaction. The attack, which began late last year, targeted individuals in government, politics, tech, and journalism, particularly those with ties to fields of interest to China's government. Investigators found that the victims had been previously targeted by Chinese hackers. The attack highlights the vulnerability of mobile devices and apps to cyber threats. Experts warn that foreign hackers, including those linked to China's military and intelligence services, are increasingly targeting smartphones and telecommunication networks to gain access to sensitive information. US authorities have warned of a Chinese hacking campaign aimed at accessing phone calls and texts, with Rep. Raja Krishnamoorthi stating that hackers could "listen in on phone calls in real time and read text messages." Chinese hackers have also sought access to phones used by prominent Americans, including Donald Trump and his running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, accusing the US of mounting its own cyberoperations. However, US intelligence officials say China poses a significant threat to US economic and political interests, using digital conflict tools such as online propaganda, disinformation, and cyber surveillance. The vulnerability of mobile devices and apps is a top concern, with many countries banning Chinese telecom companies from their networks due to security concerns. Experts warn that Chinese tech firms remain a significant part of many nations' systems, giving them a potential foothold for cyberattacks. To address these concerns, federal officials have launched a program to create a "cyber trust mark" for connected devices that meet federal security standards. However, experts emphasize that consumers and officials must remain vigilant, as even secure devices can be compromised if users do not follow basic security precautions.

June 8, 2025 • By Pierluigi Paganini
Here's a concise summary of the news article: **Multiple Cyber Attacks and Vulnerabilities Discovered** Several cyber attacks and vulnerabilities have been reported, including: * OpenAI banning ChatGPT accounts linked to Russian and Chinese cyber operations * New Mirai botnet targeting TBK DVRs by exploiting CVE-2024-3721 * BadBox 2.0 botnet infecting millions of IoT devices worldwide * FBI warning of Play ransomware group targeting 900 organizations since 2022 * U.S. CISA adding multiple flaws to its Known Exploited Vulnerabilities catalog, including Google Chromium V8, Cisco ISE, and Fortinet flaws * Russia-linked threat actors targeting Ukraine with PathWiper wiper * U.S. offering $10M bounty for info on RedLine malware creator and state hackers **Data Breaches and Leaks** * Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source * Cartier disclosed a data breach following a cyber attack * Coinbase data breach impacted 69,461 individuals * Marks & Spencer confirmed a data breach after an April cyber attack * Nova Scotia Power disclosed a data breach after a March security incident **New Malware and Threats** * New AyySSHush botnet compromised over 9,000 ASUS routers * PumaBot targets Linux IoT surveillance devices * Interlock ransomware gang started leaking data allegedly stolen from leading kidney dialysis firm DaVita * Earth Kurma APT is actively targeting government and telecommunications organizations in Southeast Asia * Crocodilus mobile banking Trojan rapidly evolves and goes global **Cybersecurity Efforts** * U.S. CISA adds multiple flaws to its Known Exploited Vulnerabilities catalog * Google fixed actively exploited Android flaw CVE-2025-27363 * Mozilla fixed critical Firefox vulnerability CVE-2025-2857 * Apple released security updates to fix multiple flaws in iOS and macOS * U.S. authorities indicted Black Kingdom ransomware admin These are just a few of the many cyber attacks, vulnerabilities, and data breaches reported in the article. The cybersecurity landscape continues to evolve, with new threats and challenges emerging daily.