Update to iOS 12.4 Right Now to Block New Vulnerabilities

Most of you are running iOS 12. And that’s a good thing, because you’re getting a speedier experience with as many patched bugs and vulnerabilities as possible. It’s especially important, too, given that Google researchers recently disclosed six serious iOS vulnerabilities that Apple fixed up in the iOS 12.4 release earlier this month.

The problem? It’s twofold. First, there are still plenty of people who aren’t using iOS 12 for whatever reason—and likely not even iOS 12.4. Though Apple’s own statistics don’t break down specific iOS versions, the company shows that roughly 13 percent of all the iPhones and iPads purchased within the last five years are not running iOS 12. Given how many devices Apple sells (well over a billion iPhones alonebetween 2016 and 2018), 13 percent is a lot more devices than that number might imply at first glance.

Second, one of these “interactionless” bugs, as identified by the Google researchers, was not even fully fixed in iOS 12.4. They’re described as such, as all they require an attacker to do is send you a message—and that can be a text message, multimedia message, iMessage, email, or a Visual Voicemail, as Google security engineer Natalie Silvanovich notes.

Look at the message, and it’ll execute whatever unpleasant code the attacker has concocted—in four of the six published vulnerabilities. In the other two, it simply reads files off of your iPhone or iPad. Here’s hoping you don’t have anything incriminating or super-secret on your device.

Stop using older versions of iOS

Thankfully, you’re protected from five of these six vulnerabilities by updating to iOS 12.4. But you shouldn’t have to wait for us to convince you to check for iOS updates. Make a recurring calendar event every three months that says “UPDATE MY IPHONE” in large, annoying text. Or do what I do and pull up Settings > General > Software Update constantly, because you love living on the bleeding edge.

Heck, starting in iOS 12, you can even enable Automatic Updates—though, as Apple notes, you still might have to manually update your device from time to time. (Even though I have this setting enabled, I still check my iPhone for updates probably more than I should.)

If you’re holding out because you love the look and feel of your older version of iOS, you have to weigh that against the possibility that an attacker might come after your unpatched device. Are the odds low? Sure. Would I want to risk it and have a slower iPhone? No.

New ‘Sex Simulator’ Ransomware Pops Up on Android

Many people keep their most important files on a mobile device without ever thinking about backing them up to a computer. That makes their phones a prime target for ransomware, and there’s a new attack spreading to Android phones right now. The new Android Filecoder.C malware uses weird “sex simulator” landing pages to trick people into downloading it, but you’ll pay for that click with more than your self-respect.

The Filecoder.C malware first appeared on Reddit and XDA Forums as spammy messages directing people to the aforementioned sex simulator. Yes, people clicked on the links, and at least some of them downloaded the app. Eset says the infection has spread mainly via text messages, but thankfully, the scale is still small.

Android has more robust system controls than Windows, which prevents apps from installing in the background when you visit a malicious website. Thus, the only way to become infected with Filecoder.C is to download the APK, bypass the download warning, launch the installer, turn on the system’s “unknown sources” feature, and tap through one more warning about app permissions.

After installation, Filecoder.C searches a device for documents, photos, videos, and various other files. It encrypts them and generates a private-public key pair. The private key gets uploaded to a command and control server, and the public one stays on the device. Unlike some other Android ransomware, Filecoder.C doesn’t lock down the entire device, and it doesn’t touch APK files. That suggests it was adapted from desktop malware like WannaCry.

As usual with ransomware, the program presents a payment screen that explains data has been encrypted. The only way to unlock the files is to pay some Bitcoin — in this case, the amount is randomly generated and falls between $94 and $188 at current prices. The malware promises to send the private key to the device for decryption after the victim pays.

While all this happens, Filecoder.C also sends SMS messages to all the victim’s contacts with some variation on the sex simulator message. It has 42 languages hardcoded and chooses the one that matches the device language setting.

Consider this just one more reason why you shouldn’t download suspicious apps on the internet. Security firm Eset says that is the first line of defense for users. Keeping backups of your files is a good idea as well. The malware makers don’t have leverage over you if you stand to lose nothing.

Google unveils advanced G Suite protection for high-risk employees

Google is levelling up its security for businesses. The company unveiled a host of new protections for its G Suite, Google Cloud Platform (GCP) and Cloud Identity customers at the Next Tokyo summit. G Suite Enterprise admins can choose to enroll high-risk employees in an advanced protection program, automatically receive anomalous activity alerts and enable one-click access to additional apps.

A version of the Advanced Protection Program it launched two years ago is now available to G Suite business clients who are high-risk for a targeted online attack, such as IT administrators, CEOs and those who work in security-sensitive roles in finance and government. To protect against phishing or account takeovers, the program would enforce the use of compatible two-factor authentication hardware keys like Google’s own Titan. Admins are even able to automatically block access to third-party apps that the company doesn’t trust.

Google has also made improvements to its G Suite security and alert center for admins, which it launched in beta back in April. The new alert center is now equipped with machine learning models that detect security risks such as unusual external file sharing or download behavior. Admins can now receive alerts of such “anomalous activity” in the G Suite alert center. It will also roll out support for password vaulted apps through Cloud Identity over the next few days.

Titan Security Keys, which only have been available in the US since last fall, are available starting today in Japan, Canada, France and the UK. The wireless Bluetooth-enabled key in the package has drawn criticism from the security community over safety concerns. Google recalled some of its Titan Security Keys earlier this year due to a minor security flaw.

Security concerns are a major reason why Google’s productivity platform isn’t quite taking off with bigger businesses, who tend to stick with Microsoft Office for that very reason. Earlier this year, the company launched several new security tools for G Suite clients, including a beta launch of advanced protection. By making this latest set of tools widely available, Google hopes to prove it takes the security of such high-profile clients seriously.

Here is the teeniest gaming laptop you ever did see

Few designs can be called timeless and iconic enough to translate well into miniature versions of themselves. Horses is obviously the main one, but the ThinkTiny, a miniature version the Lenovo ThinkPad comes pretty close. Created by Paul Klinger, the ThinkTiny uses the laptop’s iconic red TrackPoint nub as a joystick for classic arcade games like Snake, Tetris, and Lunar Lander.

The tiny laptop runs on an ATtiny1614 microcontroller and features a 128 x 64 OLED screen. It’s all housed in a 3D-printed case that’s complete with a glowing “Think” logo. Sadly, the ThinkTiny cannot runDoom or Crysis, but there is a neat little Mandelbrot fractal explorer.

Gizmodo says Klinger doesn’t plan to sell the ThinkTiny, which is understandable considering the toy’s production time, not to mention the fact that it could incur some tiny lawsuits from Lenovo. But if you want to try to make it yourself, Klinger has generously posted the entire code and design files on his GitHub page. The code can also be used to build a TinyPC, a gaming PC that runs most of the same games as the ThinkTiny, plus one extra Breakout game. This one lights up and changes colors as the games get harder.

7 times Google was behind the curve with its Pixel phones

The Google Pixel phones represented a major shift for Google back in 2016, as the Mountain View company sought to take a bigger role in the design of its phones. The results have been pretty neat to say the least, as the phone series delivers top-notch camera quality and lean, clean software.

However, Google’s Pixel phones haven’t always been ahead of the curve, as the company has often been seriously late to the party with several ubiquitous features. Let’s take a look at a few times Google Pixel phones had questionable missing features.

1. Water resistance

The original Google Pixel series was a landmark duo of phones for the firm. Gone was the beloved Nexus branding in favor of an all-new start. Google’s first Pixel had a great foundation, blowing competitors away with its camera chops and speedy updates, however, it wasn’t without a few missteps.

One of Google’s biggest omissions for the first Pixels was water resistance. This wasn’t necessarily a dealbreaker (the phones had splash resistance), but the feature was quickly becoming a must-have in the eyes of consumers. After all, Samsung’s all-conquering Galaxy S7 series and Sony’s Xperia flagships at the time both offered robust ratings. Google would go on to implement IP67 water/dust resistance on the Pixel 2 series and IP68 on the Pixel 3.

2. Optical image stabilization

Another missed feature for the OG Pixel series was optical image stabilization, as the original phones only offered electronic image stabilization. The software-based approach to stabilization isn’t necessarily a bad thing (as Google’s solution was pretty solid), but OIS is generally superior and was offered by many flagships in 2016.

Google would later add the feature to the Pixel 2 series, combining it with electronic stabilization to deliver better video stability and reduce blur in low light.

3. Wireless charging

Wireless charging is available on plenty of flagship phones today, and we’ve even seen fast wireless charging emerge as an option. But this is another area where Google lagged behind, missing the feature on the original Pixel and the Pixel 2.

The Mountain View company would finally bring wireless charging to the Pixel 3 series, topping out at a solid 10W via the Pixel Stand. One of the big downsides however is that you’ll need to use the Pixel Stand for 10W charging, as there are few (if any) third-party charging pads that are compatible with Google’s faster speeds. Otherwise, you’re stuck charging at a rather slow 5W if you’re using a third-party pad.

Google has also lagged behind when it comes to fast wired charging, as the Pixel 3 hits a maximum speed of 18W. This isn’t bad, but we’re seeing speeds of 27W and higher from Huawei, Oppo, and Xiaomi.

4. 6GB of RAM

One of the more notable recent complaints about the Pixel series has been Google’s stubbornness about sticking with only 4GB of RAM. This isn’t simply a case of wanting more RAM for the sake of it, as the Pixel 3 series suffered from aggressive RAM management. This meant you could only keep a few apps open at any time, as the phone killed off any more apps deemed unnecessary.

More RAM would definitely be welcome in the future. After all, there loads of manufacturers offering more RAM on phones with much cheaper price tags. Thankfully, the latest Pixel 4 rumors suggest that 6GB of RAM is going to be an option.

5. Dual cameras

Google uses its Pixel phones as a computational photography showcase, delivering features like Night Sight, HDR+, software-based portrait mode, and Super Res Zoom. But there’s no denying that the search giant is ridiculously late to the multi-camera party.

Or rather, Google is late to the multiple rear camera party, as the Pixel 3 series offers two front cameras (standard and wide-angle). But the search giant has stuck with a lone 12MP rear camera since the first Pixel phone, even though dual camera phones like the LG G5, Huawei P9, and iPhone 7 Plus were already available in 2016. Heck, triple camera smartphones are now a major factor in today’s smartphone landscape.

Fortunately, the Pixel 4 looks like it will feature two rear cameras at the very least, suggesting that Google is finally ready to move beyond the solitary rear shooter.

6. A budget option

There was a brief time when Google’s Nexus phones came in at a budget price, with the Nexus 4 starting at $299 and the much-loved Nexus 5 starting at $349. The company went fully premium with its Pixel series though — a key factor behind low Pixel 3 sales, which have been disappointing by Google’s own admission.

Fortunately, Google finally got its act together and launched a budget-focused Pixel this year, dubbed the Pixel 3a series. Starting at just $399, the phones predictably make a few compromises, but we still have key Pixel features here, including that sublime Pixel software experience, brisk updates, excellent photo quality, and Active Edge for speedy access to Google Assistant. The Pixel 3a and Pixel 3a XLeven have headphone jacks!

7. Face unlock

Google has announced that the Pixel 4 will offer 3D face unlock, which marks the first time the company has offered face unlock of any kind on its Pixel series. Up until now that’s been a disappointment, as the feature has been available on rival devices for a couple of years now as a quick and convenient authentication method.

It must be said that face unlock via selfie camera is one of the least secure authentication methods around, as you can circumvent the technology with a photo. We’re glad to see Google adopting the more advanced 3D option now that it’s finally jumped on this bandwagon.

AMD CEO Confirms 7nm High-End Navi Radeon RX GPUs and 7nm Mobility Ryzen CPUs – Aimed at High-Performance Gaming PCs and Notebooks

AMD announced their Q2 2019 earnings yesterday and revealed a bunch of information on their upcoming 7nm products during the earnings call. The products that were highlighted include the Ryzen processor series and the Radeon RX graphics series for mainstream and high-end desktop PCs.

AMD CEO Confirms 7nm Navi High-End Radeon RX Graphics Cards For Enthusiast Desktop PCs and 4th Gen Ryzen CPUs For High-End Notebooks

During the Q/A session, the question was raised about the high-end 7nm Navi graphics cards and 7nm mobility processors to which AMD’s CEO, Dr.Lisa Su, replied that they are indeed coming.

Hans Mosesmann

“Great, And can you give us a sense if you can on 7-nanometer high-end Navi and mobile 7-nanometer CPUs, if you can? Thanks.”

Lisa Su

“Hans, you asked the good product questions, I would say they are coming. You should expect that our execution on those are on track and we have a rich 7-nanometer portfolio beyond the products that we have currently announced in the upcoming quarters.”

via Seeking Alpha

AMD has recently launched their 7nm Navi 10 GPU based Radeon RX 5700 series. Built as a next-gen replacement for their Radeon RX 500 series, the Radeon RX 5700 series offer good competition versus NVIDIA’s RTX 2060 and RTX 2070 series of graphics cards. However, NVIDIA’s top-end stack of graphics cards which include the GeForce RTX 2080, RTX 2080 Ti remain uncontested and AMD currently has no graphics card that competes with them. You could say that the Radeon VII exists but recent reports suggest that the card has gone EOL and the card has a relatively shorter supply compared to the RTX 2080 and RTX 2080 SUPER which have several custom designs available in the market.

With AMD confirming that the high-end 7nm Navi is definitely coming, we can finally see AMD back in action in the high-end graphics market too. It will be interesting if the high-end Navi GPUs will be placed against the $700 US RTX 2080 or the $1200 US RTX 2080 Ti. Regardless, it’s always nice to have more options in the $500 US+ market.

Currently, there are rumors floating around that AMD’s next Navi SKU would be Navi 12. In fact, two variants are in the works, Navi 12 which is supposedly the high-end design and Navi 14 that will serve the lower-end market. It is also said that Navi 12 could feature up to 4096 SPs that would suggest a 64 CU design compared to 40 CUs on the Navi 10 GPU.

We can’t say for sure how much of this would end up being true but what we do know is that AMD Navi and RDNA architecture is here to stay. We will be getting an advanced version of RDNA known as RDNA 2 based on 7nm+ architecture sometime in 2020. There were reports prior to the Navi launch that AMD’s high-end Navi graphics cards would launch in 2020 and would support ray tracing.

That is what AMD pretty much confirmed in their own slides. The first-gen RDNA based high-end cards may launch in the second half of 2019 but we have to wait for more information to arrive. Lisa also confirmed that AMD’s fourth-generation Ryzen family for notebooks will be coming soon.

Known as Renoir, the latest family will replace the current 3rd Gen Ryzen ‘Picasso’ CPU family and will feature 7nm Zen 2 cores and 7nm GPU architecture, all on a single chip package. Both, the high-end Navi graphics cards and the mobility Ryzen CPUs are great news for their respective platforms and we should know more about them in the coming quarters. Let us know in the poll where you think high-end Navi’s performance is going to land.

Google Play Pass spotted in testing, provides ‘access to hundreds of premium apps’

Google’s work on a “Play Pass” subscription first came to light last June. The company has now confirmed that it’s in active testing, with the first screenshots detailing a monthly service that provides “access to hundreds of premium apps.”

Thanks to images acquired by Android Police, we now know that “Google Play Pass” lets subscribers “Try new apps and master all your favorites, without interruptions.” According to these details, Google Play Pass features a “curated catalog” in the hundreds.

The service includes both applications and games, with Google’s copy touting “fitness trackers” and “premium music apps” as examples of the former. With Play Pass, non-entertainment software will also be free of ads and in-app purchases. This is in contrast to the upcoming Apple Arcade on iPhones, iPads, Apple TVs, and Macs later this year. Currently unknown about Google’s service is whether it will be available on other form factors, namely Android TV.

That being said, games are clearly the focus and include “action hits to puzzles.” Stardew Valley — usually $7.99 — would be available for free to a Play Pass subscriber. All in-app purchases would also be unlocked to provide an annoyance free experience.

Accessible from the Play Store, an “Explore Google Play Pass” section shows “apps and games we think you’ll love.” Here, included apps and games are marked by a fast forward icon in the four Google Play colors. Store listings will also promote when a game is a part of Play Pass with a purple banner underneath the buy button.

Google confirmed to Android Police the existence and testing of the subscription, but provided no other Google Play Pass details, like availability. The current price is $4.99 per month, with a 10 day free trail offered.

AN IPHONE APP THAT PROTECTS YOUR PRIVACY—FOR REAL THIS TIME

THE DATA ECONOMY has too often betrayed its customers, whether it’s Facebook sharing data you didn’t even realize it had, or invisible trackers that follow you around the webwithout your knowledge. But a new app launching in the iOS App Store today wants to help you take back some control—without making your life harder.

The Guardian Firewall app runs in the background of an iOS device, and stymies data and location trackers while compiling a list of all the times your apps attempt to deploy them. It does so without breaking functionality in your apps or making them unusable. Plus, the blow by blow list gives you much deeper insight than you would normally have into what your phone is doing behind the scenes. Guardian Firewall also takes pains to avoid becoming another cog in the data machine itself. You don’t need to make an account to run the firewall, and the app is architected to box its developers out of user data completely.

“We don’t log IPs, because that’s toxic,” says Will Strafach, a long-time iOS jailbreaker and founder of Sudo Security Group, which develops Guardian Firewall. “To us, data is a liability, not an asset. But to think that way you’ve got to think outside the box, because it means you can’t just choose the simplest solutions to engineering problems a lot of times. But if you are willing to spend the time and resources, you can find solutions where there isn’t a privacy downside.”

Block Party

The Guardian Firewall development team, which also includes noted jailbreaker Joshua Hill, currently comprises four engineers and two security researchers, and the app translates their collective knowledge about App Store services into automatic blocking for modules within apps that are known to be potentially invasive. The service costs $10 per month, or $100 per year. You pay through an in-app purchase using your AppleID, which means Guardian Firewall doesn’t manage the transaction or the data associated with it. The team doesn’t have immediate plans to expand to Android, because their expertise lies so specifically in iOS.

To start using Guardian Firewall, all you do is tap a big button on the main screen. It turns green and says “Protection is on.” From the user’s perspective, that’s it. Under the hood, the app establishes a virtual private network connection, and creates a random connection identity for it to keep track of people’s data without knowing who they are. If you turn Guardian Firewall protection off and then on again, the app establishes a new connection and new connection identity, meaning that there’s no way to connect the dots between your sessions.

The app uses its VPN connection to filter your data in the cloud, but the stream is fully encrypted. Guardian Firewall has automated machine learning mechanisms that evaluate how an app behaves and, particularly, whether it sends out data to third parties, like marketing analytics firms. The idea is to flag whenever an app tries to communicate beyond its own infrastructure. Guardian Firewall is also able to detect and block other types of potentially invasive behavior, like page hijackers that push mobile pop-ups.

Apple itself has already been working on baking similar protections directly into iOS, particularly when it comes to blocking web trackers in Safari that would otherwise fingerprint users across multiple sites. But Guardian Firewall aims to go a few steps further, and to apply across all apps.

Test Drive

I’ve been testing Guardian Firewall on and off for months, and have found it easy to leave it running in the background. The connection doesn’t seem to slow things down on my phone or eat my battery, and the list of trackers the app has blocked is constantly growing—310 location trackers, seven page hijackers, and 3,200 data trackers so far. It felt a little uncomfortable at first to have something constantly running in the background, but it was fascinating to see all the shenanigans happening on my iPhone all the time. Some beta testers have noted that they wish Guardian Firewall offered a customizable blacklisting feature, instead of only automated blocking. But I didn’t personally feel a desire to put time into customizing the app. To me the whole value is in “set it and forget it.”

Guardian Firewall has already engineered its way around at least one privacy conundrum during its limited prerelease. Someone essentially launched a denial of service attack against the service by rapidly initiating a deluge of connection requests all at once. Guardian Firewall couldn’t check what IP address or addresses the requests came from, though, because it doesn’t record IP addresses. The team could have solved the issue by altering its policy to access IP addresses during the small window when devices are establishing their connection and then delete the data. But “we determined that that would go against our values,” Strafach says.

Instead, the developers devised a workaround that uses a device check offered by Apple, but encrypts the check so Guardian Firewall itself can’t see the data that’s sent to Apple. The only thing Guardian Firewall finds out at the end of the process is whether the device is a legitimate iOS device or not.

As with any VPN, the ultimate test of Guardian Firewall’s privacy protections and approach to minimal data retention would be a subpoena that is later made public through a trial in which the service has nothing to hand over. And Strafach says that while the company will cooperate with investigators if necessary as required by law, the company has taken precautions both internally and in contracts with its infrastructure providers to ensure that it can be transparent with users about any law enforcement requests.

“Looking over their privacy policy it looks really good,” says William Budington, a senior staff technologist at the Electronic Frontier Foundation. “You’re not logging in, and there’s radical data minimization in general. If they don’t have data stored on a server then a breach or buy-out won’t actually have that much of a negative impact. But keeping an eye on the privacy policy and news about the company is a good practice in general with VPNs, because things can slowly change.”

Not Just Another VPN

Of course, many of the same questions about trust apply to Guardian Firewall as they do to other VPNs. You’re still sending all of your data to their server. But at least Guardian Firewall uses the built-in iOS VPN application programming interface instead of trying to reinvent the wheel, and the encryption scheme protecting your data similarly draws on vetted industry standards, rather than anything proprietary. Strafach also says Guardian Firewall’s goal is to be as open and transparent about its actions as possible—and agrees that people should think carefully about whether it suits their specific needs, as they should for any app.

“People should know exactly what Guardian is doing and if it’s just a concept they don’t like, or they think we’re not the right data custodians for them then so be it, that’s cool,” he says. “‘How can we trust you?’ is just such a valid question for users to be asking all app makers.”

One thing Guardian Firewall can’t currently do is identify what specific apps trigger its tracking alerts, a feature that I found myself wishing it had. If anything, though, the absence helps solidify its privacy cred. Strafach and his team hadn’t figured out how to achieve that granularity without inadvertently creating a potentially identifiable data set of all the apps on your phone. An upcoming solution still won’t directly connect warnings to specific apps, but will instead show the apps that were running at that timestamp that could have cased the alert.

“All you’ll be able to see is ‘at this time we saw this tracker and these are the apps which could be causing it,'” Strafach says. “So maybe that’s one app or maybe three, but it’s a compromise that gives more of the answer users want while it respects their privacy.”

“Clearly the biggest risk to the everyday iOS user is apps surreptitiously tracking them, which unfortunately the majority of apps do—rather massively,” says Patrick Wardle, a Mac security specialist. “Guardian generically thwarts such trackers. I love that Will and Josh, who are former jailbreakers, tackled this. I bet it wasn’t easy, but with their unique skills they are probably one of the few teams that could figure it out and make it all seamlessly work in the constrictive iOS environment.”

It’s complicated and resource-intensive to make all of these wild workarounds happen, but if Guardian Firewall can do it and be financially viable, Strafach hopes that the project will become a sort of case study that privacy pays. With so many companies in the marketplace seemingly convinced that that’s not the case, there’s a lot riding on its success.

Nvidia Shield TV finally gets Android 9 Pie and much more in latest update

Today, Nvidia announced the Shield Experience Upgrade 8.0 update for the Shield TV. The update finally brings Android 9 Pie to the Shield TV, the first Android TV device to get Google’s latest version of Android.

Pie streamlines the interface to make it easier to access your apps and settings. Along with an updated interface are updated colors, improved organization, and a streamlined set-up process. There’s also a heavier emphasis on Google Assistant, with an enlarged microphone icon and search area at the top of the main menu.

The update also highlights the updated Hulu with Live TV app. The interface is similar to what you’ll see on the smartphone and tablet versions of the app, with a horizontal list of categories and vertical lists of shows and movies. The updated Hulu with Live TV app will complete its rollout in the coming weeks.

Other goodies include 20 new GeForce Now games, three new Shield TV games, and more. Here’s the full changelog:

Updates “Display and Sounds” advanced setting into two easier to navigate menus.

Adds option to match content color space (Settings > Display & Sound > Advanced).

Improved volume dynamic range for USB and Bluetooth connected headsets.

Shield TV remote app adds Bluetooth assist for pairing and improves connection.

Enables 720p refresh rate switching on supported apps.

Adds “Disconnect Bluetooth accessories” option to quick settings.

Adds IR power control options to customize on/off functionality.

Adds option to turn off USB power when Shield sleeps.

Adds option to connect to 2.4GHz or 5GHz Wi-Fi network with shared SSID.

Latest accessory firmware versions: Shield controller (2017): v1.30

Shield controller (2015): v1.96/99/3.71/0.32

Shield remote (2017): v1.43

Shield remote (2015): v1.36

The Galaxy Tab S6 shows Samsung isn’t giving up the tablet fight

It’s no secret that Android tablets are in an awkward position. While Apple’s iPad remains an important part of its product line-up, even Google has given up on making an equivalent. But Samsung hasn’t given up on Android tablets just yet. Today it announced the Galaxy Tab S6. It’s clear the tablet has taken some inspiration from the new iPad Pro, but it has a few tricks of its own too.

First, the specs:

10.5″ Super AMOLED Display

6GB + 128 GB or 8GB + 128GB RAM and storage configurations

Snapdragon 855 or Exynos 9610

7,040 mAh battery (15 hours battery life claimed)

8MP front camera

13MP + 5MP rear cameras

Four AKG speakers with Dolby Atmos technology

Optical fingerprint sensor

New Bluetooth S-Pen

It’s the usual spec bump here – smartphone specs stuffed into a larger frame. That’s one advantage Apple has: it’s iPad Pros are always significantly more powerful than its iPhones, allowing you to manage significantly greater workloads on its tablet.

That’s not to say the Tab S6 is a slouch – are smartphones specs are plenty powerful as it is, and a tablet’s true power comes from the larger frame. Samsung is known for stuffing its devices with features, and the Tab S6 is no different.

Key among the improvements over the Tab S4 (there was no Tab S5, only a midrange Tab S5e) is the new remote control S-Pen Samsung first introduced with the Galaxy Note 9. This allows you to do things use the S-Pen as a remote shutter or skip songs. The S-Pen does need to be charged now, but it does so when attached to the body magnetically, and a 10-minute charge will get you through a full day of use.

Speaking of the body, the Tab S6 has an all-new design that takes a page out of the new iPad Pro’s book with sharper edges and a boxier look. but the more meaningful improvement is in the keyboard cover, which now has a – gasp – touchpad. When you use the Tab S6 in DeX mode – basically a desktop UI for Android – you’ll definitely see the benefits of having a proper mouse. The cover also now includes a kickstand, giving you Surface-like positioning flexibility.

More puzzling is the new S-Pen placement. It attached magnetically to the back of the tablet, which seems like awkward ergonomics and an easy way to lose the pen, so I hope Samsung has some strong magnets. The keyboard cover does include a flap that covers the pen more securely though.

It’s hard to say whether the Tab S6 is worth your hard-earned money until we spend some quality time with it, but I’ve got to give Samsung some kudos for keeping the Android tablet alive. The Tab S6 will be available to pre-order on August 23 and will be released on September 6. Prices are $650 for the 6GB/128GB version and $730 for the 8GB/256GB model. The S-Pen is thrown in the box, but you’ll have to pay $180 for the keyboard cover.