Technology

Oppo has recently unveiled three new smartphones under Oppo Reno 7 series with Qualcomm Snapdragon 778G, MediaTek Dimensity 1200-Max, and MediaTek Dimensity 900 processors. Now, the Chinese smartphone maker is reportedly planning to introduce a handset powered by the MediaTek Dimensity 920 chipset. The name of the phone is not known yet, but a few
0 Comments
Every Product Manager and Software Developer should know that pushing feature updates to production via traditional channels is as archaic as painting on cave walls. The smart are always quick to adapt to new, innovative technologies, and this mindset is exactly what makes normal companies great. The landscape is changing fast, especially in IT. Change
0 Comments
Threat actors have been found using a previously undocumented JavaScript malware strain that functions as a loader to distribute an array of remote access Trojans (RATs) and information stealers. HP Threat Research dubbed the new, evasive loader “RATDispenser,” with the malware responsible for deploying at least eight different malware families in 2021. Around 155 samples
0 Comments
Multiple security weaknesses have been disclosed in MediaTek system-on-chips (SoCs) that could have enabled a threat actor to elevate privileges and execute arbitrary code in the firmware of the audio processor, effectively allowing the attackers to carry out a “massive eavesdrop campaign” without the users’ knowledge. The discovery of the flaws is the result of
0 Comments
More than half of all smartphones running on Google’s Android operating system are now running on Android 11 and Android 10, according to the latest statistics made available by the company. Google no longer provides regular updates on the adoption of Android updates on its developer website, instead revealing platform numbers on a semi-regular basis
0 Comments
Banking apps from Brazil are being targeted by a more elusive and stealthier version of an Android remote access trojan (RAT) that’s capable of carrying out financial fraud attacks by stealing two-factor authentication (2FA) codes and initiating rogue transactions from infected devices to transfer money from victims’ accounts to an account operated by the threat
0 Comments
OnePlus 10 Pro case renders have been spotted online, appearing to corroborate previous leaks and alleged handset renders of the upcoming flagship model in the OnePlus 10 series. The case renders which were spotted on an e-commerce website suggest that the rear camera module of the upcoming handset could feature a large square-shaped design. The
0 Comments
Weaknesses in e-commerce portals are being exploited to deploy a Linux backdoor as well as a credit card skimmer that’s capable of stealing payment information from compromised websites. “The attacker started with automated e-commerce attack probes, testing for dozens of weaknesses in common online store platforms,” researchers from Sansec Threat Research said in an analysis.
0 Comments
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign that leverages stolen email chains to bypass security software and deploy malware on vulnerable systems. The findings come from Trend Micro following an investigation into a number of intrusions in the Middle East that culminated
0 Comments
A threat actor with ties to North Korea has been linked to a prolific wave of credential theft campaigns targeting research, education, government, media and other organizations, with two of the attacks also attempting to distribute malware that could be used for intelligence gathering. Enterprise security firm Proofpoint attributed the infiltrations to a group it
0 Comments