Samsung Galaxy Watch 4 and Galaxy Watch 4 Classic’s specifications have been detailed in a new leak. The rumoured smartwatches from the South Korean tech giant are said to come in two sizes each – 40/ 44mm and 42/ 46mm. The smartwatches will also reportedly be constructed from different materials like aluminium and stainless steel.
Technology
Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as “PwnedPiper” that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete takeover. The security weaknesses, disclosed by American cybersecurity firm Armis, impact the Translogic PTS system by Swisslog Healthcare, which is installed in about 80% of
Tecno Pova 2 has been launched in India and the smartphone comes with a massive 7,000mAh battery and 18W Flash Charge fast charging support. It is powered by a MediaTek Helio G85 SoC paired with a Mali G52 GPU. Tecno Pova 2 is offered in two storage configurations and three colour options. The smartphone features
A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. Dubbed “Vultur” due to its use of Virtual Network Computing (VNC)’s remote screen-sharing technology to gain full visibility on targeted users, the
Google added email scheduling to Gmail in April 2019. It allows you to draft an email and send it at your chosen date and time in the future. Email scheduling on Gmail is available on both the mobile app and via a desktop browser. It gives you the option to choose a pre-set date and
Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers penetrate organizations utilizing BEC techniques, spoofing and account take-over attacks. In a recent study, 71% of organizations acknowledged they had seen a business email compromise
An ongoing malicious campaign that employs phony call centers has been found to trick victims into downloading malware capable of data exfiltration as well as deploying ransomware on infected systems. The attacks — dubbed “BazaCall” — eschew traditional social engineering techniques that rely on rogue URLs and malware-laced documents in favor of a vishing-like method
Google will no longer support sign-ins on Android phones running on version 2.3.7 or lower. This change will come into effect starting September 27, an email sent by Google to users reveals. The email recommends users to update to at least Android 3.0 Honeycomb to continue using Google apps even after September. This will impact
A cyber attack that derailed websites of Iran’s transport ministry and its national railway system earlier this month, causing widespread disruptions in train services, was the result of a never-before-seen reusable wiper malware called “Meteor.” The campaign — dubbed “MeteorExpress” — has not been linked to any previously identified threat group or to additional attacks,
Mi 12, Xiaomi’s next-gen flagship model, is reported to pack the new LPDDR5X memory. LPDDR5X configuration was announced just a day ago by JEDEC and one of the first smartphones to integrate this technology is now rumoured to be the upcoming Mi 12. The phone is expected to launch sometime at the end of the
As many as eight Python packages that were downloaded more than 30,000 times have been removed from the PyPI portal for containing malicious code, once again highlighting how software package repositories are evolving into a popular target for supply chain attacks. “Lack of moderation and automated security controls in public software repositories allow even inexperienced
OnePlus Nord 2 5G debuted last week as the successor to the original OnePlus Nord. The new smartphone has a number of upgrades: a bigger primary camera, larger battery, and faster charging over the last year model. It is also the first phone from OnePlus to have a MediaTek SoC over a Qualcomm one. In
Cybersecurity researchers on Friday unmasked new command-and-control (C2) infrastructure belonging to the Russian threat actor tracked as APT29, aka Cozy Bear, that has been spotted actively serving WellMess malware as part of an ongoing attack campaign. More than 30 C2 servers operated by the Russian foreign intelligence have been uncovered, Microsoft-owned cybersecurity subsidiary RiskIQ said
Micromax In 2b has been launched in the Indian market. The phone is a successor to the Micromax In 1b that was launched last year. It comes with features such as a 6.52-inch HD+ waterdrop-style notch display and is powered by the Unisoc T610 SoC. The phone comes with a rear-mounted fingerprint sensor and packs
An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an “unusual” campaign. The backdoor is distributed via a decoy document named “Manifest.docx”
Google has shared more details about the upcoming safety section on its Google Play store. A new post from the company shows previews of what the Android app marketplace will look like once the new safety and privacy policies are implemented. Google, back in May, announced the new safety section for the Google Play store,
Two new ransomware-as-service (RaaS) programs have appeared on the threat radar this month, with one group professing to be a successor to DarkSide and REvil, the two infamous ransomware syndicates that went off the grid following major attacks on Colonial Pipeline and Kaseya over the past few months. “The project has incorporated in itself the
If you’re looking for a smartphone with exceptional battery life, then you’ve come to the right place. We currently have some very good options in the market, and the best part is you don’t have to spend a fortune to get some of them. Samsung has been churning out some excellent marathon battery smartphones for
An Android malware that was observed abusing accessibility services in the device to hijack user credentials from European banking applications has morphed into an entirely new botnet as part of a renewed campaign that began in May 2021. Italy’s CERT-AGID, in late January, disclosed details about Oscorp, a mobile malware developed to attack multiple financial
Over two-third of customers in major markets planning to purchase a new smartphone in the next six months prefer getting a 5G model, according to a report released by consulting firm Kantar. China led the markets where as much as 91 percent of customers showed interest in purchasing a 5G phone. However, the trend of