Month: December 2022

China will introduce rules governing the use of deep synthesis technology in January 2023. Deepfakes, where artificial intelligence is used to manipulate images and videos, are a concern for Beijing as it ramps up control over online content. Fotografielink | Istock | Getty Images In January, China will introduce first-of-its-kind regulation on “deepfakes,” ramping up
0 Comments
Dec 26, 2022Ravie LakshmananReverse Engineering Cybersecurity researchers have exposed a wide variety of techniques adopted by an advanced malware downloader called GuLoader to evade security software. “New shellcode anti-analysis technique attempts to thwart researchers and hostile environments by scanning entire process memory for any virtual machine (VM)-related strings,” CrowdStrike researchers Sarang Sonawane and Donato Onofri
0 Comments
Twitter has rolled out a couple of new features for its paid subscribers. The micro-blogging site will prioritise its paid subscribers while ranking during searches, mentions, and replies. This means that their comments and interactions will reportedly be more visible to other users as compared to the non-paid members. In addition to this, Twitter has
0 Comments
Google’s anti-competitive activities are harming Indian consumers and the economy by stifling “swadeshi” (indigenous) competitors, a top official of home-grown navigation firm MapMyIndia said. The Competition Commission of India (CCI) in October slapped a steep penalty of Rs. 1,337.76 crore on internet giant Google for abusing its dominant position in multiple markets in relation to
0 Comments
Flipkart and PhonePe have completed their separation and both entities will continue to operate under US-based retail giant Walmart, a joint statement said on Friday. PhonePe was acquired by Flipkart Group in 2016. “As part of this transaction, existing Flipkart Singapore and PhonePe Singapore shareholders, led by Walmart, have purchased shares directly in PhonePe India.
0 Comments
Dec 22, 2022Ravie LakshmananPassword Management Multiple high-severity vulnerabilities have been disclosed in Passwordstate password management solution that could be exploited by an unauthenticated remote adversary to obtain a user’s plaintext passwords. “Successful exploitation allows an unauthenticated attacker to exfiltrate passwords from an instance, overwrite all stored passwords within the database, or elevate their privileges within
0 Comments