Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious
Technology
Vivo T3x 5G and iQoo Z9x 5G could soon be launched in India, as both smartphones were recently spotted on the Bureau of Indian Standards (BIS) certification listing, as per a report. The smartphones are the sub-models of the Vivo T3 and iQoo Z9 series, respectively. The iQoo Z9x was also reportedly spotted on the
Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the
PlayStation 5 Slim — or PS 5 Slim — went on sale in India on Friday, and customers can now purchase the gaming console online or via retail stores. In order to boost sales of the device, the company has partnered with hyperlocal delivery platform Blinkit to deliver the slimmed down version of its flagship
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan,
Nothing Ear 3 are expected to be announced soon. While Nothing is yet to announce the product, recent teasers from the company have suggested that the third generation Nothing Ear’s are likely to launch next. So far, Nothing has shared cryptic teasers with animal emojis and mascots. Now, the UK-based OEM has revealed a date
Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows – CVE-2024-21894 (CVSS score: 8.2) – A heap overflow vulnerability in the IPSec component of Ivanti
Apple’s iPhone 16 series of smartphones — comprising the iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max — is expected to arrive later this year with a few noteworthy additions such as a capture button to quickly take photos and videos. The non-Pro models are also expected to feature the
Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows – CVE-2024-29745 – An information disclosure flaw in the bootloader component CVE-2024-29748 – A privilege escalation flaw in the firmware
Samsung Galaxy Watch 7 series is expected to launch later this year alongside the purported Samsung Galaxy Z Fold 6 and Galaxy Z Flip 6 foldables. The company has yet to confirm the launch of any of the products but there have been several rumours about them over the past few weeks. The Galaxy Watch
The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities spanning finance, services, motor vehicle manufacturing, law firms, and commercial facilities, according to Morphisec. “Despite the geographic expansion, Mexico remains the primary target,”
The United States and Britain on Monday announced a new partnership on the science of artificial intelligence safety, amid growing concerns about upcoming next-generation versions. Commerce Secretary Gina Raimondo and British Technology Secretary Michelle Donelan signed a memorandum of understanding in Washington to jointly develop advanced AI model testing, following commitments announced at an AI
Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating remote code execution, a new analysis has revealed. The audacious supply chain compromise, tracked as CVE-2024-3094 (CVSS score: 10.0), came to light last week when
Apple could launch AirPods Lite — a more affordable version of its truly wireless stereo (TWS) earphones — later this year, alongside the second generation over the ears AirPods Max headphones, according to an investor note from a market analyst. Previous reports have also suggested that Apple is working on cheaper AirPods models alongside refreshed
Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users’ browsing activities to settle a class action lawsuit that claimed the search giant tracked them without their knowledge or consent in its Chrome browser. The class action, filed in 2020, alleged the company misled users by tracking
Apple researchers have published a new paper on an artificial intelligence (AI) model that it claims is capable of understanding contextual language. The yet-to-be peer-reviewed research paper also mentions that the large language model (LLM) can operate entirely on-device without consuming a lot of computational power. The description of the AI model makes it seem
Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams. The Indian nationals “were lured with employment opportunities to that country but were forced to undertake illegal cyber work,” the Ministry of External Affairs (MEA)
The OnePlus Nord CE 4 aims to be a solid mid-range device which is expected to deliver the basics going by the brand’s ‘Core Experience’ philosophy. While the Nord CE series started off as a watered-down version of the numbered Nord series, OnePlus has been adding interesting updates that somehow seem to reduce the gap
Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN’s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang
The NDTV Gadgets360 Awards created a new history in the tech space. After a break of seven years, the most prestigious awards were back to decide the winners in 25 categories, including smartphones, tablets, laptops, Smart TVs, wearables, and more. The event was filled with excitement and nervousness, all eying to see who won India’s
- « Previous Page
- 1
- …
- 46
- 47
- 48
- 49
- 50
- …
- 257
- Next Page »