Gemini artificial intelligence (AI) assistant on Android is getting a new upgrade and users will now be able to access it and get it to perform certain tasks even when the device is locked. While the AI-powered virtual assistant was able to respond on the lock screen earlier, completing any tasks required invoking Google Assistant.
Technology
Jul 17, 2024NewsroomCyber Espionage / Cryptocurrency Cybersecurity researchers have discovered an updated variant of a known stealer malware that attackers affiliated with the Democratic People’s Republic of Korea (DPRK) have delivered as part of prior cyber espionage campaigns targeting job seekers. The artifact in question is an Apple macOS disk image (DMG) file named “MiroTalk.dmg”
WhatsApp e-Challan scams are targeting users India using Maorrisbot, a new form of technical malware, according to a cybersecurity firm. This is a relatively new type of scam that is reportedly backed by a large, organised effort. So far, the malware is said to be affecting only Android devices, and no impact has been seen
Jul 17, 2024The Hacker NewsInsider Threats / Cybersecurity Attacks on your network are often meticulously planned operations launched by sophisticated threats. Sometimes your technical fortifications provide a formidable challenge, and the attack requires assistance from the inside to succeed. For example, in 2022, the FBI issued a warning1 that SIM swap attacks are growing: gain
Boat Smart Ring Active will be available in India soon. The company has now announced the launch date of its next smart wearable. It has also confirmed the availability details of its the smart ring and teased some of its key features. Boat also states that the Smart Ring Active will be available at an
Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them. According to the US Cybersecurity and Infrastructure Security Agency (CISA), 90% of all cyberattacks begin with phishing, an identity-based threat. Throw in attacks that use stolen credentials, over-provisioned accounts, and insider threats,
iPhone 16 Pro could come in a new ‘Rose’ colourway, which might replace a variant in Apple’s existing lineup of finishes, according to a recent claim on social media. The handset, part of the iPhone 16 series, is expected to launch later this year at an event likely to be held in September. Recent reports
Jul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a “massive ad fraud operation” that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software
OnePlus Nord 4 was launched in India on Tuesday (July 16) as the latest smartphone by the Chinese tech brand. The new Nord series handset, unveiled at OnePlus’ Summer Launch Event, comes as a successor to last year’s OnePlus Nord 3 and offers an AMOLED screen with 1.5K resolution and 100W SuperVOOC fast charging support.
Jul 15, 2024NewsroomSupply Chain Attack / Cyber Threat Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF) repositories. JFrog, which found the GitHub Personal Access Token, said the secret was
OpenAI has been at the forefront of the artificial intelligence (AI) boom with its ChatGPT chatbot and advanced Large Language Models (LLMs), but the company’s safety record has sparked concerns. A new report has claimed that the AI firm is speeding through and neglecting the safety and security protocols while developing new models. The report highlighted that
Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few
NoiseFit Javelin, the latest smartwatch by Indian smart wearable brand Noise, was launched in India on Monday. According to the company, its latest smartwatch is a limited edition and co-created with reigning Olympic champion Neeraj Chopra. It boasts features such as an AMOLED display, multiple sports modes, Bluetooth calling and up to seven days of
The U.S. Department of Justice (DoJ) said it seized two internet domains and searched nearly 1,000 social media accounts that Russian threat actors allegedly used to covertly spread pro-Kremlin disinformation in the country and abroad on a large scale. “The social media bot farm used elements of AI to create fictitious social media profiles —
An investigation by India’s antitrust body has found that Apple exploited its dominant position in the market for app stores on its iOS operating system, engaging “in abusive conduct and practices”, a confidential report seen by Reuters showed. The Competition Commission of India (CCI) has been investigating Apple Inc since 2021 for possibly abusing its
Jul 12, 2024NewsroomVulnerability / Software Security A critical security issue has been disclosed in the Exim mail transfer agent that could enable threat actors to deliver malicious attachments to target users’ inboxes. The vulnerability, tracked as CVE-2024-39929, has a CVSS score of 9.1 out of 10.0. It has been addressed in version 4.98. “Exim through
Honor MagicPad 2 was launched by the company on Friday alongside a more affordable tablet from the company, the Honor Pad 9 Pro. The newly unveiled MagicPad 2 is powered by a Snapdragon 8s Gen 3 chipset and features an OLED display, while the Honor Pad 9 Pro runs on a MediaTek Dimensity 8100 SoC
Jul 12, 2024The Hacker NewsDigital Security / Online Safety In today’s digital age, passwords serve as the keys to our most sensitive information, from social media accounts to banking and business systems. This immense power brings with it significant responsibility—and vulnerability. Most people don’t realize their credentials have been compromised until the damage is done.
ChatGPT maker OpenAI is working on a novel approach to its artificial intelligence models in a project code-named “Strawberry,” according to a person familiar with the matter and internal documentation reviewed by Reuters. The project, details of which have not been previously reported, comes as the Microsoft-backed startup races to show that the types of
American telecom service provider AT&T has confirmed that threat actors managed to access data belonging to “nearly all” of its wireless customers as well as customers of mobile virtual network operators (MVNOs) using AT&T’s wireless network. “Threat actors unlawfully accessed an AT&T workspace on a third-party cloud platform and, between April 14 and April 25,
- « Previous Page
- 1
- …
- 25
- 26
- 27
- 28
- 29
- …
- 257
- Next Page »