OnePlus Watch 2 was initially unveiled at the Mobile World Congress (MWC) 2024 in February this year and later launched in select global markets, including India. The smartwatch was first introduced in Black Steel and Radiant Steel shades and later launched in a third Europe-exclusive Nordic Blue colour option in April. The watch comes with a dual-engine architecture which allows
Technology
May 14, 2024The Hacker NewsCyber Threat / Machine Learning Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication
iOS 17.5 is now available for download along with handy new features that are aimed at improving privacy and security. The latest iOS update has arrived alongside iPadOS 17.5, a day before Apple’s new iPad Air (2024) and iPad Pro (2024) go on sale in India and global markets. With the latest update, Apple has
May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the
Samsung Galaxy S24 Ultra with a 200-megapixel quad rear camera setup was launched in January. Now, an early leak reveals that next year’s Galaxy S25 Ultra will get a major camera overhaul. Samsung is said to be testing the next year’s flagship with three rear cameras instead of four. The upcoming model could lack a
May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time
Airtel and Google Cloud have collaborated to build and deploy artificial intelligence (AI)-powered cloud services for enterprises in the Indian market. Through this partnership, Airtel aims to use Google’s cloud solution suite and build server-based services including various analytics tools, IoT products, and more. The telecom operator also plans to integrate the cloud-based AI capabilities
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research team said in a recent
Sennheiser Accentum True Wireless earphones were unveiled in the US and European markets on Tuesday, May 7. The newly launched earphones support hybrid active noise cancellation (ANC) and come with an ergonomic design that is claimed to provide all-day comfort. They are also equipped with Sennheiser’s TrueResponse transducer and are compatible with the company’s Smart Control
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why
WhatsApp has replaced the standard Message application to become a default texting application for most smartphone users across the globe. The app offers a seamless experience for sending or receiving text messages, videos, photos, or documents. However, there are times when you want to send a WhatsApp message to someone without going through the hassle
May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI tools are shaping the future
Samsung Galaxy S21 series is set to receive the One UI 6.1 update, along with the company’s Galaxy Z Fold 3 and Galaxy Z Flip 3 foldable phones. However, unlike more recent models from the South Korean smartphone maker, these three handsets will only gain support for two new Galaxy AI features. One the past
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall Street Journal, Workable, and
Microsoft must pay patent owner IPA Technologies $242 million, a federal jury in Delaware said on Friday after determining that Microsoft’s Cortana virtual-assistant software infringed an IPA patent. The jury agreed with IPA after a week-long trial that Microsoft’s voice-recognition technology violates IPA’s patent rights in computer-communications software. IPA is a subsidiary of patent-licensing company
May 10, 2024NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. “Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of
Huawei FreeBuds 6i were unveiled at a launch event in Dubai where the company also introduced the Huawei MatePad 11.5 S, the MateBook X Pro, and the Watch Fit 3. The true wireless earphones support dynamic active noise cancellation (ANC) and offer an IP54 rating. They are equipped with three microphones that are claimed to
May 10, 2024NewsroomBrowser Security / Vulnerability Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on
Apple introduced the iPad Pro (2024) model with its new in-house M4 chipset earlier this week. The tablet succeeds the iPad Pro (2022) model which is powered by the M2 chips. The newly launched iPad Pro from the Cupertino-based tech giant is available in two display sizes and four storage options. The iPad Pro with an
May 09, 2024NewsroomEncryption / Data Privacy Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim’s network traffic by just being on the same local network. The “decloaking” method has been assigned the CVE identifier CVE-2024-3661 (CVSS score: 7.6). It impacts all operating systems that
- « Previous Page
- 1
- …
- 38
- 39
- 40
- 41
- 42
- …
- 257
- Next Page »