Apple researchers have published a new paper on an artificial intelligence (AI) model that it claims is capable of understanding contextual language. The yet-to-be peer-reviewed research paper also mentions that the large language model (LLM) can operate entirely on-device without consuming a lot of computational power. The description of the AI model makes it seem
Technology
Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams. The Indian nationals “were lured with employment opportunities to that country but were forced to undertake illegal cyber work,” the Ministry of External Affairs (MEA)
The OnePlus Nord CE 4 aims to be a solid mid-range device which is expected to deliver the basics going by the brand’s ‘Core Experience’ philosophy. While the Nord CE series started off as a watered-down version of the numbered Nord series, OnePlus has been adding interesting updates that somehow seem to reduce the gap
Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN’s Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang
The NDTV Gadgets360 Awards created a new history in the tech space. After a break of seven years, the most prestigious awards were back to decide the winners in 25 categories, including smartphones, tablets, laptops, Smart TVs, wearables, and more. The event was filled with excitement and nervousness, all eying to see who won India’s
Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only when necessary, usually once a year for their compliance requirements. This manual approach often misses opportunities
If you’re looking for a budget smartwatch we’ve handpicked some of the best deals and offers that are available on Croma right now. These affordable smartwatches can help you track your daily activities while mirroring notifications from your smartphone, making life easier for you. Croma has something for everyone, at just about every budget. Noise
Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. “TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries
iPhone 16 and iPhone 16 Plus are likely to make their debut in the second half of 2024 with a few design tweaks, according to previous reports. A leaked image that shows two cases for the iPhone 16 models gives us a good idea of what to expect from the successors to the iPhone 15
Mar 30, 2024NewsroomLinux / Supply Chain Attack RedHat on Friday released an “urgent security alert” warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score
HyperOS — Xiaomi’s new skin for Android smartphones — has been rolled out to several eligible smartphone models since the update was released in the country at the end of February. The company has now announced the next phase of the HyperOS update to eligible Xiaomi and Redmi smartphones and tablets in the country. The Chinese
Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims’ Macs, but operate with the end goal of stealing sensitive data, Jamf
Google Maps is getting three new updates that are designed to assist users on their travels. In order to provide personalised suggestions to users, Google has added curated lists of recommendations from top sites and the Google Maps community on Maps. The second Google Maps update lets users compile a list of places they want
Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba’s Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana.
Apple could release a version of its stylus for tablets that works with its first-generation Apple Vision Pro mixed reality headset, according to a report. The company is said to be testing a version of the Apple Pencil that work with visionOS, Apple’s new operating system that was introduced along with the Vision Pro. Recent
Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign. PyPI said “new project creation and new user registration” was temporarily halted to mitigate what it said was a “malware
Apple released the Vision Pro last month and the Cupertino-based tech giant seems to have shifted its focus to developing foldable smartphones after its first mixed-reality headset went on sale in the US. A new supply-chain report from Korea claims that the launch of Apple’s first, long-rumoured foldable iPhone has been pushed to 2027. This corroborates recent leaks that
Mar 28, 2024NewsroomLinux / Network Security A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from Kaspersky reveal. DinodasRAT, also known as XDealer, is a C++-based malware that offers the ability to harvest a wide range of sensitive data from compromised
iQoo is expected to launch a range of new products later this year. The company is tipped to launch the iQoo Z9 Turbo alongside other models in the lineup. It is reportedly also working on an iQoo Pad 2 model that is expected to succeed and offer upgrades over the iQoo Pad, which was unveiled
Mar 28, 2024NewsroomTechnology / Data Privacy In June 2017, a study of more than 3,000 Massachusetts Institute of Technology (MIT) students published by the National Bureau for Economic Research (NBER) found that 98% of them were willing to give away their friends’ email addresses in exchange for free pizza. “Whereas people say they care about
- « Previous Page
- 1
- …
- 58
- 59
- 60
- 61
- 62
- …
- 269
- Next Page »