Month: February 2021

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems. “Threat actors aligned with the Chinese Communist Party’s state interests delivered a customized malicious Mozilla Firefox browser extension that facilitated access and control of users’ Gmail accounts,” Proofpoint said in an
0 Comments
New research has uncovered a significant increase in QuickBooks file data theft using social engineering tricks to deliver malware and exploit the accounting software. “A majority of the time, the attack involves basic malware that is often signed, making it hard to detect using antivirus or other threat detection software,” researchers from ThreatLocker said in
0 Comments
One of the European Union’s most powerful data regulators has warned companies may yet face massive disruption to translatlantic data flows as a result of an EU court ruling last year, despite efforts by policymakers to avoid that outcome. Europe’s highest court last July ruled an EU-US data transfer agreement was invalid, citing concerns the
0 Comments
Amazon today announced the general availability of Amazon Lookout for Vision, a cloud service that analyzes images using computer vision to spot product or process defects and anomalies in manufactured goods. Amazon says that Lookout for Vision, which is available in select Amazon Web Services (AWS) regions via the AWS console and supporting partners, is
0 Comments
President Joe Biden signed an executive order Wednesday meant to address a global chip shortage impacting industries ranging from medical supplies to electric vehicles. The order includes a 100-day review of key products including semiconductors and advanced batteries used in electric vehicles, followed by a broader, long-term review of six sectors of the economy. The
0 Comments
With browser makers steadily clamping down on third-party tracking, advertising technology companies are increasingly embracing a DNS technique to evade such defenses, thereby posing a threat to web security and privacy. Called CNAME Cloaking, the practice of blurring the distinction between first-party and third-party cookies not only results in leaking sensitive private information without users’
0 Comments
Telegram has a new auto-delete feature for messages, home screen widgets, expiring invite links, and more with the latest update. The auto-delete feature will allow users to set an auto-delete timer for messages they send in any chat (presently this feature is available on Telegram for its secret messages option). The home screen widget allows
0 Comments
India approved a Rs. 7,350-crore plan to boost local manufacturing and exports of IT products such as laptops, tablets, personal computers, and servers, the technology minister said. The production-linked incentive (PLI) plan will help India export IT goods worth Rs. 2,45,000 crore, minister Ravi Shankar Prasad told a news conference. It provides manufacturers cash-backs of
0 Comments
The cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down. Falling victim to a ransomware attack can cause significant data loss, data breach, operational downtime, costly recovery, legal consequences, and
0 Comments
WandaVision’s newest earworm track “Agatha All Along” is now available on all major music streaming platforms, including Spotify, Apple Music, Amazon Music, YouTube Music, and JioSaavn. Spoilers ahead for WandaVision episode 7. “Agatha All Along” has been composed by the Oscar- and Tony-winning duo of Kristen-Anderson Lopez and Robert Lopez (of Frozen fame), and has
0 Comments
Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the integrity protection of digitally signed PDF documents. Called “Shadow attacks” by academics from Ruhr-University Bochum, the technique uses the “enormous flexibility provided by the PDF specification so that shadow documents remain standard-compliant.” The
0 Comments
Facebook’s oversight board has received a “user statement” for the case it is deciding about whether the social media company was right to indefinitely suspend former President Donald Trump’s Facebook and Instagram accounts, a board spokeswoman confirmed on Tuesday. Facebook handed the case to its independent board in January after it blocked Trump’s access to
0 Comments