Technology

Apple Music Lossless Audio streaming, Spatial Audio along with Dolby Atmos will finally be available to its iOS, Android as well as desktop subscribers in India soon. The high-quality audio formats for Apple Music were announced globally last week. But these new features are yet to arrive on the Apple Music app in India. Apple has
0 Comments
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday issued an advisory regarding a critical software supply-chain flaw impacting ThroughTek’s software development kit (SDK) that could be abused by an adversary to gain improper access to audio and video streams. “Successful exploitation of this vulnerability could permit unauthorized access to sensitive information, such as
0 Comments
Cybersecurity researchers on Tuesday disclosed “distinctive” tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. “In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues
0 Comments
Google Pixel Stand for wireless charging is reportedly getting reiterated for the upcoming Google Pixel 6 and Pixel 6 Pro devices. Pixel Stand doubles up as a 10W wireless charger besides being a phone stand, a Google Photos digital frame, and a pseudo-smart display with Google Assistant. The next-gen Pixel Stand was discovered in the
0 Comments
Apple on Monday shipped out-of-band security patches to address two zero-day vulnerabilities in iOS 12.5.3 that it says are being actively exploited in the wild. The latest update, iOS 12.5.4, comes with three security fixes, including a memory corruption issue in the ASN.1 decoder (CVE-2021-30737) and two flaws concerning the WebKit browser engine that could
0 Comments
Smartphone market globally will grow 12 percent in 2021, with shipments reaching 1.4 billion units, according to a report. The growth forecast depicts a strong recovery in smartphone shipments from 2020, when the market saw a dip due to the COVID-19 pandemic. Manufacturers are expected to bring their new 5G phones this year that will
0 Comments
Google on Monday announced that it’s rolling out client-side encryption to Google Workspace (formerly G Suite), thereby giving its enterprise customers direct control of encryption keys and the identity service they choose to access those keys. “With client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google’s native
0 Comments
Cybersecurity researchers on Thursday took the wraps off a new cyberespionage group that has been behind a series of targeted attacks against diplomatic entities and telecommunication companies in Africa and the Middle East since at least 2017. Dubbed “BackdoorDiplomacy,” the campaign involves targeting weak points in internet-exposed devices such as web servers to perform a
0 Comments
A seven-year-old privilege escalation vulnerability discovered in the polkit system service could be exploited by a malicious unprivileged local attacker to bypass authorization and escalate permissions to the root user. Tracked as CVE-2021-3560 (CVSS score: 7.8), the flaw affects polkit versions between 0.113 and 0.118 and was discovered by GitHub security researcher Kevin Backhouse, who
0 Comments
WhatsApp, Facebook Messenger, and Apple’s iMessage — all three apps have the read receipt function that notifies the sender when the receiver has read their message. Read receipts are an important part of communication through messaging apps. It allows users to understand whether their message has been seen by the recipient or not. WhatsApp, Facebook
0 Comments
Organizations’ cybersecurity capabilities have improved over the past decade, mostly out of necessity. As their defenses get better, so do the methods, tactics, and techniques malicious actors devise to penetrate their environments. Instead of the standard virus or trojan, attackers today will deploy a variety of tools and methods to infiltrate an organization’s environment and
0 Comments
Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users’ consent and take control of the devices. “The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps
0 Comments
Google’s upcoming plans to replace third-party cookies with a less invasive ad targeted mechanism have a number of issues that could defeat its privacy objectives and allow for significant linkability of user behavior, possibly even identifying individual users. “FLoC is premised on a compelling idea: enable ad targeting without exposing users to risk,” said Eric
0 Comments