admin

Security flaws in an audio codec have been uncovered by security researchers, putting millions of Android phones and other Android devices powered by chipsets from MediaTek and Qualcomm at risk of being compromised by hackers. Stemming from an codec created by Apple several years ago, the vulnerabilities were left unpatched since the company open-sourced the
0 Comments
Networking equipment maker Cisco has released security updates to address three high-severity vulnerabilities in its products that could be exploited to cause a denial-of-service (DoS) condition and take control of affected systems. The first of the three flaws, CVE-2022-20783 (CVSS score: 7.5), affects Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software, and stems
0 Comments
Five allied countries including the United States warned Wednesday that “evolving intelligence” indicated Russia was poised to launch powerful cyberattacks against rivals supporting Ukraine. The members of the “Five Eyes” intelligence sharing network — the US, Britain, Canada, Australia and New Zealand — said Moscow could also involve existing cybercrime groups in launching attacks on governments, institutions
0 Comments
PS5’s April restock is here. Today at 12pm noon, both variants of Sony’s elusive next-gen console — the Rs. 49,990 Blu-ray-equipped PS5, and its Rs. 39,990 disc-less counterpart PS5 Digital Edition — will be up for pre-orders in India. Alongside, some retailers will also offer a Rs. 54,490 bundle of the Blu-ray PS5 and Gran
0 Comments
Instagram is changing its algorithm to start highlighting original content made by creators first. Adam Mosseri, the company head, made the announcement via Twitter and said that the modifications are in place because creators are “incredibly important to Instagram’s future”. The other features include a wider rollout of Product tags and the modification of Enhanced
0 Comments
The “hotpatch” released by Amazon Web Services (AWS) in response to the Log4Shell vulnerabilities could be leveraged for container escape and privilege escalation, allowing an attacker to seize control of the underlying host. “Aside from containers, unprivileged processes can also exploit the patch to escalate privileges and gain root code execution,” Palo Alto Networks Unit
0 Comments