Xiaomi has announced that it is removing a popular feature which allowed users to run YouTube videos in the background. YouTube Premium users, who pay for ad-free streaming, can play YouTube videos over other applications in a picture-in-picture (PiP) mode or just the audio in the background without the video. However, this Xiaomi feature allowed
Technology
Mar 11, 2024The Hacker NewsCybersecurity / Browser Security As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year anniversary, it becomes clear that traditional on-premises approaches to data security are becoming obsolete. Rather than protecting the endpoint, DLP solutions need to refocus their efforts to where corporate data resides – in the browser.
Opera One, the company’s artificial intelligence (AI)-powered browser, is starting a new AI Features Drop programme, it announced on March 8. The programme will allow users who sign up to access the developer build of the browser and test out the new features before it becomes available for the general public. The AI features on
Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing PDF attachments. “This intricate attack involves the PDF downloading a ZIP file and subsequently utilizing DLL side-loading techniques to execute the final malware,” Fortinet FortiGuard Labs researcher Cara Lin said. The attack chain involves the
Humane AI Pin was recently showcased at the Mobile World Congress (MWC) 2024 in its first public viewing since it was launched in November 2023 exclusively in the US. The artificial intelligence (AI)-powered device, with a unique form factor and no display panel, quickly gained global attention. And while other markets wait for the device
Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows
iPhone 16 lineup is widely expected to come with additional buttons and a camera makeover. Apple is believed to pack a Capture button in the lineup for capturing videos. The CAD (computer-aided design) sketch of the iPhone 16 has recently surfaced online, highlighting the design elements of the vanilla model. The renders indicate a vertical
Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed “large company” to connect to their infrastructure. While a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to
Motorola Edge 50 Pro is expected to launch soon as a successor to the Motorola Edge 40 Pro, which was unveiled in April 2023. A report has now shared leaked renders of the upcoming handset. The renders suggest the design and colour options of the Edge 50 Pro. The report also hints at the launch timeline
Mar 08, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing
OpenAI faces further scrutiny from Italy’s data protection watchdog over concerns that the firm’s new artificial intelligence video creation system would process people’s personal data. It’s the second time OpenAI has come to the attention of the Italian regulator, which is already investigating possible data violations by the tech company’s ChatGPT tool. OpenAI is now
Mar 08, 2024The Hacker NewsSecrets Management / Access Control In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We’re all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable. However, let’s dispense with
Itel Icon 2 will launch in India soon. The company has been teasing the smartwatch over the past few days. The teasers have hinted at the design of the upcoming watch and confirmed that it will get a functional crown. Now, a report is suggesting some key features of the awaited smart wearable. It is
Mar 09, 2024NewsroomCyber Attack / Threat Intelligence Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems following a hack that came to light in January 2024. “In recent weeks, we have seen
Apple is said to be working on a host of foldable devices, with a clamshell foldable phone and a foldable tablet rumoured to be in the works. Earlier this week, a prominent Apple analyst claimed that a foldable MacBook would in fact be Apple’s first product in the category, going into mass production in 2027.
Mar 08, 2024NewsroomInteroperability / Encryption Meta has offered details on how it intends to implement interoperability in WhatsApp and Messenger with third-party messaging services as the Digital Markets Act (DMA) went into effect in the European Union. “This allows users of third-party providers who choose to enable interoperability (interop) to send and receive messages with
Adobe has released a new Adobe Express app for Android and iOS in beta testing. The new app brings Adobe’s premium features and the generative artificial intelligence (AI) features of Firefly AI together on a mobile platform for the first time. The company has announced that while the app is in beta, it will be
Mar 07, 2024NewsroomCyber Espionage / Software Security The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end of the attacks is to deliver malicious downloaders for Windows and macOS that deploy a known backdoor called MgBot and a previously
Google Drive is getting a couple of updates that will improve the usability of the cloud-based storage platform. The tech giant is adding a new transcode to improve the playback speed and rebuffering of videos played within Drive. It is also improving the search functionality on iOS and adding query filters to help users quickly
Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, “target WordPress websites from the browsers of completely innocent and unsuspecting site visitors,” security researcher Denis Sinegubko said. The activity
- « Previous Page
- 1
- …
- 51
- 52
- 53
- 54
- 55
- …
- 258
- Next Page »