Apple Vision Pro went on sale in February 2024. The mixed-reality headset is still available only in the US, but the company plans to make it available in the international markets. However, amid the expansion development of the Cupertino-based tech giant’s newest product, it seems its successor is nowhere in sight. A new report claims
Technology
Apr 29, 2024NewsroomMobile Security / Hacking Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year. The tech giant also said it blocked 333,000 bad accounts from
Vivo Y18e has been listed on Vivo’s official website in India, indicating that the phone could launch soon. The listing has revealed the design and complete specifications of the phone, but Vivo has not made any official announcement regarding its launch yet. The Vivo Y18e seems to be an entry-level phone with a MediaTek Helio
Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an “adversary with sufficient access to perform a sandbox escape and obtain root permissions on
Amazon Great Summer Sale dates are now official. The online sale will begin in India on May 2 with hundreds of deals across various product categories. Like previous Amazon discount sales, the sale will begin early for Prime members. Products such as mobile phones, accessories, beauty and fashion items, laptops, tablets, smartwatches, earbuds, and smart
Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale” of credential stuffing attacks aimed at online services. These unprecedented attacks, observed over the last month, are said to be facilitated by “the broad availability of residential proxy services, lists
Samsung’s Galaxy Unpacked event is likely to take place after a couple of months, according to a report. The latest leak related to the company’s next launch event is in line with previous reports that suggested the company would introduce new foldable handsets, the purported Samsung Galaxy Z Fold 6 and Galaxy Z Flip 6,
Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. “Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware,” Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be
Apple users are facing an issue that affects their Apple ID, locking them out of their own accounts, according to several reports from users on social media platforms. The issue appears to be affecting some users who say they were logged out from one or more devices and then prompted to change their Apple ID
Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file (“signal-2023-12-20-160512.ppsx”)
Oppo A60 has been launched in Vietnam as the company’s latest entry in its A series of smartphones. The latest affordable phone from Oppo sports a 6.67-inch LCD screen with a 90Hz refresh rate. It is powered by Qualcomm’s Snapdragon 680 chip, along with 8GB of RAM and up to 256GB of storage. The handset
Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick them into downloading a Python backdoor. Cybersecurity firm Securonix is tracking the activity under the name DEV#POPPER, linking it to North Korean threat actors. “During these fraudulent
Alphabet Inc. closed decisively above a $2 trillion market capitalization for the first time on Friday, as a powerhouse earnings report reassured investors that the Google parent would be a major player in artificial intelligence.The stock rose 10% to $171.95, its biggest one-day jump since July 2015, resulting in a valuation of $2.15 trillion. The
Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from
Samsung Galaxy Z Fold 6 Ultra might just be more than a red herring. After months of rumours hinting at the launch of a third foldable smartphone at the next Galaxy Unpacked event this year, a new report claims that the smartphone will likely be launched. But there’s a twist. Reportedly, the Ultra foldable will
On Wednesday, April 24th, the Senate passed a TikTok bill. And Joe Biden signed it into law. The new law says that ByteDance, the company that founded and owns TikTok, must sell TikTok to an American purchaser within nine months or TikTok will be banished from the Apple and Google app stores and will no
In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers’ favorite targets. According to the IDC, 70% of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT teams
Snapdragon X Elite — Qualcomm’s flagship computer chip that is expected to arrive on laptop from popular brands this year, has been spotted in a benchmark test. A listing for the purported Surface Laptop 6 on Geekbench suggests that Microsoft’s upcoming Surface laptop could beat Apple’s MacBook Pro models that are powered by its latest
Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, “aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from
Poco M6 4G has surfaced on certification websites recently, hinting that it may launch soon. Ahead of any official confirmation from Poco regarding the model, these listings have suggested some key features and specifications of the purported smartphone. The model is expected to be the 4G variant of the Poco M6 5G, which was unveiled
- « Previous Page
- 1
- …
- 41
- 42
- 43
- 44
- 45
- …
- 257
- Next Page »