Technology

Russian Dutch-domiciled search engine, ride-hailing and email service provider Yandex on Friday disclosed a data breach that compromised 4,887 email accounts of its users. The company blamed the incident on an unnamed employee who had been providing unauthorized access to the users’ mailboxes for personal gain. “The employee was one of three system administrators with
0 Comments
Samsung Galaxy F62 will come with a 64-megapixel primary sensor, its promo page on Flipkart has revealed ahead of the phone’s India launch on Monday, February 15. Samsung has been teasing the specifications of the phone in the run up to its launch. The company has also revealed that the phone will be priced somewhere
0 Comments
Ten people belonging to a criminal network have been arrested in connection with a series of SIM-swapping attacks that resulted in the theft of more than $100 million by hijacking the mobile phone accounts of high-profile individuals in the U.S. The Europol-coordinated year-long investigation was jointly conducted by law enforcement authorities from the U.K., U.S.,
0 Comments
Two new Android surveillanceware families have been found to target military, nuclear, and election entities in Pakistan and Kashmir as part of a pro-India, state-sponsored hacking campaign. Dubbed Hornbill and Sunbird, the malware impersonates legitimate or seemingly innocuous services to cover its tracks, only to stealthily collect SMS, encrypted messaging app content, and geolocation, among
0 Comments
Koo, an Indian alternative to Twitter, has become the talk of the town as it promotes Aatmanirbhar Bharat by offering a a Twitter-like experience, but in Indian languages. It is available as an app on both iOS and Android, and also has a webpage. Koo is the winner of the government’s Aatmanirbhar Bharat app challenge from
0 Comments
In what’s a novel supply chain attack, a security researcher managed to breach over 35 major companies’ internal systems, including that of Microsoft, Apple, PayPal, Shopify, Netflix, Yelp, Tesla, and Uber, and achieve remote code execution. The technique, called dependency confusion or a substitution attack, takes advantage of the fact that a piece of software
0 Comments
Micromax 5G phone is set to debut in India “very soon”, co-founder Rahul Sharma revealed in a video session with users. The executive also hinted at imminent launch of Micromax’s true wireless stereo (TWS) earbuds. Micromax made its comeback in the smartphone market last year with the launch of the Micromax In Note 1 and
0 Comments
Law enforcement officials in Ukraine, in coordination with authorities from the U.S. and Australia, last week shut down one of the world’s largest phishing services that were used to attack financial institutions in 11 countries, causing tens of millions of dollars in losses. The Ukrainian attorney general’s office said it worked with the National Police
0 Comments
While Gartner does not have a dedicated Magic Quadrant for Bug Bounties or Crowd Security Testing yet, Gartner Peer Insights already lists 24 vendors in the “Application Crowdtesting Services” category. We have compiled the top 5 most promising bug bounty platforms for those of you who are looking to enhance your existing software testing arsenal
0 Comments