Technology

May 16, 2024NewsroomVulnerability / Network Security Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 Wi-Fi standard that tricks victims into connecting to a less secure wireless network and eavesdrop on their network traffic. The SSID Confusion attack, tracked as CVE-2023-52424, impacts all operating systems and Wi-Fi clients,
0 Comments
Apple is reportedly working on two artificial intelligence (AI)-powered features that could be added to multiple apps in iOS 18. The Cupertino-based tech giant is said to be readying a real-time audio transcription and summarisation feature that could power its Voice Memos and the Notes app. These features could also appear on iPadOS 18 and
0 Comments
May 14, 2024NewsroomBluetooth / Vulnerability Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive information, trigger a denial-of-service (DoS) condition, and execute code under certain circumstances. The four vulnerabilities impact Workstation versions 17.x and Fusion versions 13.x, with fixes available in version
0 Comments
OnePlus Watch 2 was initially unveiled at the Mobile World Congress (MWC) 2024 in February this year and later launched in select global markets, including India. The smartwatch was first introduced in Black Steel and Radiant Steel shades and later launched in a third Europe-exclusive Nordic Blue colour option in April. The watch comes with a dual-engine architecture which allows
0 Comments
May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the
0 Comments
May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time
0 Comments
Airtel and Google Cloud have collaborated to build and deploy artificial intelligence (AI)-powered cloud services for enterprises in the Indian market. Through this partnership, Airtel aims to use Google’s cloud solution suite and build server-based services including various analytics tools, IoT products, and more. The telecom operator also plans to integrate the cloud-based AI capabilities
0 Comments
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research team said in a recent
0 Comments
Sennheiser Accentum True Wireless earphones were unveiled in the US and European markets on Tuesday, May 7. The newly launched earphones support hybrid active noise cancellation (ANC) and come with an ergonomic design that is claimed to provide all-day comfort. They are also equipped with Sennheiser’s TrueResponse transducer and are compatible with the company’s Smart Control
0 Comments
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why
0 Comments