Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and SmartScreen that could enable threat actors to gain initial access to target environments without raising any warnings. Smart App Control (SAC) is a cloud-powered security feature introduced by Microsoft in Windows 11 to block malicious,
Month: August 2024
Boat Airdopes ProGear were launched in India on Monday as the company’s first open-ear wearable stereo (OWS) earphones. Instead of the in-ear design that most true wireless stereo (TWS) earphones sport, the Airdopes ProGear come with an open-ear design. They use air conduction technology, which is the normal way that sound travels in nature, to
Asus ROG Ally X was launched in India on Monday. The handheld gaming device was introduced globally at Computex 2024 in June, boasting specifications such as a 7-inch 120Hz display and an AMD Ryzen Z1 Extreme CPU. It is the successor to the Asus ROG Ally (review), which debuted in April last year, and is
In this photo illustration, the logo of ‘OpenAI’ is displayed on a mobile phone screen in front of a computer screen displaying the photographs of Elon Musk and Sam Altman in Ankara, Turkiye on March 14, 2024. Muhammed Selim Korkutata | Anadolu | Getty Images Elon Musk has revived a lawsuit against Sam Altman in
Apple devices, including the iPhone, iPad, Apple Watch, Mac and more running on older software could be vulnerable to multiple security flaws, said the Indian Computer Emergency Response Team (CERT-In). The cybersecurity agency has called the vulnerabilities ‘high severity’ and urged users to install the latest security updates by the company to avoid any potential
Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to potential litigation over the interpretation of ambiguous laws previously decided by federal agencies. This article explores key questions for cybersecurity professionals and leaders as we enter
Apple Watch SE 2024 is rumoured to be part of the company’s Watch Series 10 lineup later this year. A new report now claims that this watch might be aimed at children and the Cupertino-based tech giant could make several changes to make it more appealing to the demographic. One of them is said to
Gemini AI ad that was recently aired in the US for the Paris Olympics 2024 has reportedly been taken down after receiving backlash online. Google is said to have issued a statement highlighting that it took public feedback to remove the ad from airing during the Olympics event, but also proceeded to defend the idea
Google Pixel 9 Pro Fold is confirmed to launch on August 13 at the annual Made by Google event. The tech giant has already put out teaser videos for the Pixel Fold successor. As we get closer to the launch date, the Pixel 9 Pro Fold has surfaced online in an alleged promotional video. The
Aug 02, 2024Ravie LakshmananMalware / Network Security Cybersecurity companies are warning about an uptick in the abuse of Clouflare’s TryCloudflare free service for malware delivery. The activity, documented by both eSentire and Proofpoint, entails the use of TryCloudflare to create a one-time tunnel that acts as a conduit to relay traffic from an attacker-controlled server
In this article AMZN Follow your favorite stocksCREATE FREE ACCOUNT Andy Jassy, chief executive officer of Amazon.Com Inc., during the GeekWire Summit in Seattle, Washington, U.S., on Tuesday, Oct. 5, 2021. David Ryder | Bloomberg | Getty Images Amazon shares plunged as much as 12% on Friday, a day after the company reported mixed second-quarter
The Moto G85 5G was recently unveiled as the latest mid-range smartphone from the Lenovo-owned technology firm, equipped with a Snapdragon 6s Gen 3 chipset paired with up to 12GB of RAM, a 50-megapixel rear camera, and a 5,000mAh battery with support for 33W fast charging. This handset competes with several other affordable smartphones in
Aug 02, 2024Ravie LakshmananCyber Crime / Hacking News In a historic prisoner exchange between Belarus, Germany, Norway, Russia, Slovenia, and the U.S., two Russian nationals serving time for cybercrime activities have been freed and repatriated to their country. This includes Roman Valerevich Seleznev and Vladislav Klyushin, who are part of a group of eight people
LONDON, UK – JUNE 12: The 9th edition of the Artificial Intelligence Summit kicks off with the participation of international technology companies, in London, United Kingdom on June 12, 2024. (Photo by Rasid Necati Aslim/Anadolu via Getty Images) Anadolu | Anadolu | Getty Images The U.K. government has canceled £1.3 billion ($1.7 billion) worth of
iPhone SE 4 rumours have been swirling around for several months now, even though there’s no word from Apple on plans to introduce a new affordable smartphone. The purported handset is expected to be a successor to the iPhone SE (2022) and could come with major upgrades in terms of design, processor, and battery life.
Aug 02, 2024Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS) as a command-and-control (C2) mechanism. The newly identified malware strain has been codenamed BITSLOTH by Elastic Security Labs, which made the discovery on June 25, 2024, in
Oppo A3X 5G was launched in India on Thursday. The smartphone features a 6.67-inch HD+ LCD screen with 1,000 nits of peak brightness level, twice-reinforced Panda glass protection, and Splash Touch technology. It comes with a MIL-STD-810H shock resistance certification as well. The phone is powered by an octa-core MediaTek Dimensity chipset and packs a 5,000mAh battery with
Aug 02, 2024The Hacker News In today’s digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer resources. Managed service providers (MSPs) are struggling to keep up with the demand for protection. If your current cybersecurity strategy feels like a house of cards – a complex, costly