OnePlus Watch 2 has been unveiled at the Mobile World Congress (MWC) 2024 on February 26. The smartwatch, succeeding the 2021 model of the OnePlus Watch, has arrived with several upgrades. It is claimed to offer a battery life of up to 100 hours in Smart Mode, which can be extended up to 12 days
Technology
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement exercise seized control of its servers. To that end, the notorious group has moved its data leak portal to a new .onion address on the TOR network, listing 12 new victims as
Apple is working on the development of a foldable device that could be larger than a smartphone, according to a report. The purported foldable device could arrive in the form of a notebook or a tablet, according to a DigiTimes report that cites Taiwan-based supply chain sources. The iPhone maker is said to have been
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, “has engaged with law enforcement,” authorities said. The development comes following the takedown of the prolific ransomware-as-a-service (RaaS) operation as part of a coordinated international operation codenamed Cronos. Over 14,000 rogue accounts on third-party services like
Xiaomi and Leica’s partnership has entered the third year of association. The all-new Xiaomi 14 is the only second phone in India to launch under this partnership after the Xiaomi 13 Pro. For those unaware, the partnership started in 2022 with the co-development and launch of Xiaomi 12S Ultra for the premium smartphone segment as
Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents. A customizable, vendor-agnostic tool featuring lists of automation opportunities, it’s been shared and recommended
The National Highways Authority of India (NHAI) recently introduced the ‘One Vehicle, One FASTag’ initiative to discourage users from using single FASTag for multiple cars or vice versa. The move is meant to reduce traffic congestion and streamline toll collection nationwide. So, how does this affect you? If you haven’t completed the Know Your Customer
Feb 24, 2024NewsroomActive Directory / Data Protection Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the license tier, more than six months after a China-linked cyber espionage campaign targeting two dozen organizations came to light. “Microsoft will automatically enable the logs in customer accounts and increase
Amazfit Active Edge was unveiled in India on February 23, Friday. Details about the smart wearable have been revealed by the company and it will be available for purchase in the country later this month. The smartwatch comes in three colour options, with a round dial, four buttons, and is claimed to sport a rugged design.
Feb 23, 2024NewsroomRed Teaming / Artificial Intelligence Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool) to proactively identify risks in generative artificial intelligence (AI) systems. The red teaming tool is designed to “enable every organization across the globe to innovate responsibly with the latest artificial intelligence advances,”
Apple is readying new iPad Pro and iPad Air models for launch this year after the tech giant skipped refreshing its tablet lineup in 2023. The new iPad Air will reportedly run on Apple’s in-house M2 chip, while the higher-end iPad Pro could get the M3 chip that powers the latest MacBook Pro models. Now,
Feb 23, 2024NewsroomSupply Chain Attack / Malware A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years to propagate an information stealer malware called Nova Sentinel. The package, named django-log-tracker, was first published to PyPI in April 2022, according to software supply chain security firm Phylum, which detected
Gboard — Google’s keyboard app for smartphones — is picking up a useful new feature that will make it easier for you to insert text, using your smartphone’s camera. The latest version of the keyboard app adds support for a new “Scan Text” mode that uses optical character recognition (OCR) technology to recognise text and
Feb 23, 2024NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5 million fine over charges that the firm sold users’ browsing data to advertisers after claiming its products would block online tracking. In addition, the company has been banned from selling or licensing any web browsing
Intel said on Wednesday that Microsoft plans to use its services to manufacture a custom computing chip and that the company expects to beat an internal deadline of 2025 to overtake its biggest rival, Taiwan Semiconductor Manufacturing Co, in advanced chip manufacturing. The American chipmaker also gave new details on how it plans to maintain
Feb 22, 2024NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated into iMessage to secure the messaging platform against future attacks arising from the threat of a practical quantum computer. “With compromise-resilient encryption and extensive defenses against even highly sophisticated quantum attacks, PQ3 is
Samsung Galaxy Fit 3 has officially been unveiled by the company on Thursday, February 22. Recently, the smartwatch was spotted on the company’s UAE website, but now it has been introduced and will be available to buy starting February 23 in select markets. It succeeds the Galaxy Fit 2, which was launched in September 2020,
Feb 21, 2024NewsroomNetwork Security / Vulnerability Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160
Apple is introducing a new cryptographic protocol for iMessage that is designed to protect users from sophisticated attacks using quantum computers. The new encryption protocol could safeguard users from scenarios where encrypted data has been stored, only to be decrypted using a quantum computer at a later date. iMessage is the second messaging platform known
Feb 21, 2024NewsroomMalware / Cyber Espionage The China-linked threat actor known as Mustang Panda has targeted various Asian countries using a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS. “The piece of customized PlugX malware is dissimilar to the general type of the PlugX malware that contains a completed backdoor command module, and that
- « Previous Page
- 1
- …
- 54
- 55
- 56
- 57
- 58
- …
- 258
- Next Page »