Technology

Microsoft on Thursday warned of a “massive email campaign” that’s pushing a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection. “This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them,” the Microsoft Security Intelligence team
0 Comments
Itel and Tecno, brands both owned by Transsion Holdings, have announced a 60-day warranty extension in India owing to pandemic-imposed lockdowns in several districts. The companies separately announced that only those smartphones and feature phones will be eligible that have their warranties expiring between April 15 and June 15. Eligible smartphone owners would then have
0 Comments
Misconfigurations in multiple Android apps leaked sensitive data of more than 100 million users, potentially making them a lucrative target for malicious actors. “By not following best-practices when configuring and integrating third-party cloud-services into applications, millions of users’ private data was exposed,” Check Point researchers said in an analysis published today and shared with The
0 Comments
DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups. “In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47 distinct wallets,” blockchain analytics firm
0 Comments
Qualcomm Snapdragon 778G was launched at the chipmaker’s 5G Snapdragon Summit on Wednesday. Sitting between Snapdragon 750G and Snapdragon 780G, the new system-on-chip (SoC) is designed to deliver an enhanced multimedia experience using an all-new configuration. The Snapdragon 778G SoC also comes as a successor to the Snapdragon 768G that debuted in May last year.
0 Comments
Mozilla has begun rolling out a new security feature for its Firefox browser in nightly and beta channels that aims to protect users against a new class of side-channel attacks from malicious sites. Called “Site Isolation,” the implementation loads each website separately in its own operating system process and, as a result, prevents untrusted code
0 Comments
Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy] broadcasts to nearby Apple devices
0 Comments
In today’s digital world, password security is more important than ever. While biometrics, one-time passwords (OTP), and other emerging forms of authentication are often touted as replacements to the traditional password, today, this concept is more marketing hype than anything else. But just because passwords aren’t going anywhere anytime soon doesn’t mean that organizations don’t
0 Comments