Instagram is one of the few social media platforms that are now engraved into our lifestyles. Whether sharing your vacation photos on Story, watching reels, or keeping a tab on your friends, Instagram is one platform to get all these. However, having so much screen time on the platform can be overwhelming for many. This
Technology
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top
Samsung Galaxy Watch FE will be launched soon, according to a report. The South Korean tech conglomerate could soon introduce a ‘Fan Edition’ (FE) version of its Galaxy Watch smartwatch, which runs on Google’s Wear OS operating system. It is expected to arrive at a lower price than the company’s recent smartwatch models, and its
Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The attack leverages CVE-2024-20720 (CVSS score: 9.1), which has been described by Adobe as a case of “improper neutralization of special elements” that could pave the way for arbitrary code
Apple urged a U.S. appeals court on Friday to overturn a U.S. trade tribunal’s decision to ban imports of some Apple Watches in a patent dispute with medical-monitoring technology company Masimo. Apple told the U.S. Court of Appeals for the Federal Circuit that the U.S. International Trade Commission’s decision was based on a “series of
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious
Vivo T3x 5G and iQoo Z9x 5G could soon be launched in India, as both smartphones were recently spotted on the Bureau of Indian Standards (BIS) certification listing, as per a report. The smartphones are the sub-models of the Vivo T3 and iQoo Z9 series, respectively. The iQoo Z9x was also reportedly spotted on the
Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the
PlayStation 5 Slim — or PS 5 Slim — went on sale in India on Friday, and customers can now purchase the gaming console online or via retail stores. In order to boost sales of the device, the company has partnered with hyperlocal delivery platform Blinkit to deliver the slimmed down version of its flagship
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan,
Nothing Ear 3 are expected to be announced soon. While Nothing is yet to announce the product, recent teasers from the company have suggested that the third generation Nothing Ear’s are likely to launch next. So far, Nothing has shared cryptic teasers with animal emojis and mascots. Now, the UK-based OEM has revealed a date
Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows – CVE-2024-21894 (CVSS score: 8.2) – A heap overflow vulnerability in the IPSec component of Ivanti
Apple’s iPhone 16 series of smartphones — comprising the iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max — is expected to arrive later this year with a few noteworthy additions such as a capture button to quickly take photos and videos. The non-Pro models are also expected to feature the
Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows – CVE-2024-29745 – An information disclosure flaw in the bootloader component CVE-2024-29748 – A privilege escalation flaw in the firmware
Samsung Galaxy Watch 7 series is expected to launch later this year alongside the purported Samsung Galaxy Z Fold 6 and Galaxy Z Flip 6 foldables. The company has yet to confirm the launch of any of the products but there have been several rumours about them over the past few weeks. The Galaxy Watch
The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities spanning finance, services, motor vehicle manufacturing, law firms, and commercial facilities, according to Morphisec. “Despite the geographic expansion, Mexico remains the primary target,”
The United States and Britain on Monday announced a new partnership on the science of artificial intelligence safety, amid growing concerns about upcoming next-generation versions. Commerce Secretary Gina Raimondo and British Technology Secretary Michelle Donelan signed a memorandum of understanding in Washington to jointly develop advanced AI model testing, following commitments announced at an AI
Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating remote code execution, a new analysis has revealed. The audacious supply chain compromise, tracked as CVE-2024-3094 (CVSS score: 10.0), came to light last week when
Apple could launch AirPods Lite — a more affordable version of its truly wireless stereo (TWS) earphones — later this year, alongside the second generation over the ears AirPods Max headphones, according to an investor note from a market analyst. Previous reports have also suggested that Apple is working on cheaper AirPods models alongside refreshed
Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users’ browsing activities to settle a class action lawsuit that claimed the search giant tracked them without their knowledge or consent in its Chrome browser. The class action, filed in 2020, alleged the company misled users by tracking
- « Previous Page
- 1
- …
- 57
- 58
- 59
- 60
- 61
- …
- 269
- Next Page »