Techno Blender
Digitally Yours.
Browsing Tag

Vulnerabilities

CERT-In Warns Users of Multiple Security Vulnerabilities Affecting Recent Android Versions

The Indian Computer Emergency Response Team (CERT-In) has issued an advisory regarding several security flaws affecting smartphones running on recent versions of Android. The cybersecurity agency has warned users about vulnerabilities that were recently patched by Google and smartphone component makers like Qualcomm and MediaTek as part of the Android Security Bulletin for this month. Samsung has also issued patches for nine Samsung Vulnerabilities and Exposures (SVE) that were privately disclosed and have moderate…

SIM Swappers Are Exploiting eSIM Vulnerabilities for Financial Frauds: Report

SIM swapping crimes are on the rise globally, according to a new report. These crimes are primarily committed using eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards which are embedded into a device using a software. Hackers are now reportedly exploiting vulnerabilities within this technology to brute force into the victim's phone account to port the number to their own device. The findings also revealed that the bad actors are mainly interested in victim's online banking accounts and…

Popular video doorbells can be easily hijacked, researchers find

Several internet-connected doorbell cameras have a security flaw that allows hackers to take over the camera by just holding down a button, among other issues, according to research by Consumer Reports. On Thursday, the non-profit Consumer Reports published research that detailed four security and privacy flaws in cameras made by EKEN, a company based in Shenzhen, China, which makes cameras branded as EKEN, but also, apparently, Tuck and other brands. These relatively cheap doorbell cameras were available on online…

Google Cloud’s Nick Godfrey Talks Security, Budget and AI for CISOs

Image: Adobe/Sundry Photography As senior director and global head of the office of the chief information security officer (CISO) at Google Cloud, Nick Godfrey oversees educating employees on cybersecurity as well as handling threat detection and mitigation. We conducted an interview with Godfrey via video call about how CISOs and other tech-focused business leaders can allocate their finite resources, getting buy-in on security from other stakeholders, and the new challenges and opportunities introduced by…

Google report reveals government hackers exploiting 0-day vulnerabilities to target iPhone users – India TV

Image Source : FILE Google report reveals government hackers exploiting 0-day vulnerabilities to target iPhone users Google has recently stated that government hackers used three undiscovered flaws in Apple's iPhone operating system to target users with spyware created by a European startup, last year. Google's Threat Analysis Group (TAG), which investigates

Hacker alert! CERT-In issues critical warning for Apple iPhone and MacBook users – India TV

Image Source : FILE Hacker alert CERT-In, India's cybersecurity agency has reportedly issued a crucial alert regarding the potential vulnerabilities for Apple products, majorly for iPhones and MacBooks, which are widely used across the country. The agency's advisory, Vulnerability Note CIAD-2024-0007, highlighted multiple security flaws which if exploited might lead to…

Sequoia backs Coana to help companies prioritise vulnerabilities using ‘code aware’ software analysi

Silicon Valley venture capital (VC) juggernaut Sequoia is backing a fledgling Danish startup to build a next-gen software composition analysis (SCA) tool, one that promises to help companies filter through the noise and identify vulnerabilities that are a genuine threat. For context, most software contains at least some open source components, many of which are out-of-date and irregularly — if at all — maintained. This has led to all manner of security flaws, such as Log4Shell which impacted the…

LeftoverLocals GPU Flaw Exposes AI Data in Devices Equipped with Apple, AMD, and Qualcomm Hardware

A security flaw affecting GPUs from four hardware manufacturers that exposed artificial intelligence (AI) data was unearthed by security researchers. The issue impacts several devices equipped with GPUs from these firms, including some iPhone, iPad, and Mac computers. Hackers can exfiltrate personal information being used in AI operations on the local memory of affected devices — including large language models (LLMs) used by services like Google, Meta, ChatGPT maker OpenAI, and Microsoft using a few lines of code,…

Influencers’ vulnerabilities found to be a double-edged sword

Credit: Pixabay/CC0 Public Domain The old adage states, "If you can't stand the heat, get out of the kitchen." But what if work in a kitchen pays the bills? This seems an apt comparison for the struggles of social media influencers—a sub-sector of a swelling economy of "creators" who earn income by posting on platforms like Instagram, TikTok, YouTube,