Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over $2 billion in illegal transactions and for laundering more than $100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and
Technology
Apple iPhone 15 price in India has been temporarily cut and the latest iPhone model can now be purchased at a discounted price via Flipkart. Customers who are looking to purchase the base iPhone 15 model with 128GB of storage can take advantage of an ongoing cashback offer that lowers the price of the handset
Apr 24, 2024NewsroomCyber Attack / Cyber Espionage The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) from at least 2016 to April 2021. This includes the
Ray-Ban Meta smart glasses, the successor to the Ray-Ban Stories, which was launched in September 2023, is now finally available with multimodal artificial intelligence (AI) capabilities. The company started rolling out the update on Tuesday for users in the US and Canada. Meta also highlighted that the Meta AI on the smart glasses has multimodal
Apr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose
Apple Vision Pro production has been slashed by Apple, according to details shared by TF Securities International analyst Ming-Chi Kuo. The company’s first ‘spatial computer’ was launched in the US with a $3,499 (roughly Rs. 2.9 lakh) earlier this year and it is likely to arrive in other markets in the coming months. The analyst
Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the
Nokia is reportedly gearing up to refresh the Nokia 225 4G. Ahead of any official announcement, renders of the 2024 edition of the feature phone have leaked online alongside a few specifications. The renders suggest two colour options for the Nokia 225. It is said to come with a USB Type-C port and HMD’s in-house
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there’s a larger, more pressing question: What is the true financial impact of a cyberattack? According to research by Cybersecurity Ventures, the global cost of cybercrime is
Soccer’s global governing body FIFA is close to an agreement with Apple to give the tech company worldwide television rights for a new, month-long club tournament, the New York Times reported on Monday. The deal with Apple could be announced as soon as this month and valued at around $1 billion (roughly Rs. 8,333 crore),
Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an “industrial scale” from primarily governmental organizations,
Boat Storm Call 3 has been launched in India with Bluetooth calling and navigation support. The smartwatch comes with a 1.83-inch rectangular display and is said to offer up to seven days of battery life. It is also equipped with several fitness and health trackers like heart rate, blood oxygen level, and sleep cycle monitors.
In the fast-evolving world of financial technology, NYXEX is making significant strides with its latest offering tailored for VIP clients across Brazil, Argentina, and Peru. This new service leverages the power of blockchain technology to provide elite crypto loan options, signaling a strategic expansion of NYXEX’s services in the burgeoning South American market. Bridging Traditional
Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover
Apple is heavily rumoured to introduce its artificial intelligence (AI) strategy in June 2024 during its annual Worldwide Developers Conference (WWDC) event. A new report has highlighted that the company could integrate AI features into its iPhone and other devices in an innovative way, ditching the popular chatbot-styled features offered by Samsung’s Galaxy AI and
Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are) compromising organizations – without ever needing to touch the endpoint or conventional networked systems and services. Before getting into the details of the attack techniques being used, let’s discuss why these attacks are becoming more
Google Pixel 8a is likely to be launched by the company next month at its annual Google I/O 2024 event, and details of the smartphone have been leaked several times over the past few weeks. The purported Pixel 8a price has also been spotted online, and it looks like customers will have to pay a
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with
Meta introduced the next generation of its artificial intelligence (AI) models, Llama 3 8B and 70B, on Thursday. Shortened for Large Language Model Meta AI, Llama 3 comes with improved capabilities over its predecessor. The company also adopted new training methods to optimise the efficiency of the models. Interestingly, with Llama 2, the largest model
Apr 20, 2024NewsroomVulnerability / Endpoint Security Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that has come under targeted exploitation in the wild. “CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download
- « Previous Page
- 1
- …
- 42
- 43
- 44
- 45
- 46
- …
- 257
- Next Page »