Jan 14, 2023Ravie LakshmananDevOps / Data Security DevOps platform CircleCI on Friday disclosed that unidentified threat actors compromised an employee’s laptop and leveraged malware to steal their two-factor authentication-backed credentials to breach the company’s systems and data last month. The CI/CD service CircleCI said the “sophisticated attack” took place on December 16, 2022, and that
0 Comments
TW Electronics, the company manufacturing most Android TV and Google TV device remotes, has announced a new battery design for its future remotes. The latest battery design allows the remote to be self-charged by utilising indoor light available in the TV remote’s environment. The remote control technology was developed in partnership with Swedish company Exeger,
0 Comments
Jan 14, 2023Ravie LakshmananPrivacy / Online Safety Popular short-form video hosting service TikTok has been fined €5 million (about $5.4 million) by the French data protection watchdog for breaking cookie consent rules, making it the latest platform to face similar penalties after Amazon, Google, Meta, and Microsoft since 2020. “Users of ‘tiktok[.]com’ could not refuse
0 Comments
The Indian government is allowing banks to verify individual transactions that exceed a certain annual limit using facial recognition and an iris scan in some cases, in a bid to reduce fraud and tax evasion, three sources told Reuters. A few large private and public banks have begun using the option, said one of the sources, a banker, who declined to name the banks. The advisory allowing the verification is not public and
0 Comments
The governors of Wisconsin and North Carolina on Thursday signed orders banning TikTok on government devices due to cyber security concerns, joining other US states and the federal government in prohibiting the use of the popular video app. In addition to banning Chinese-owned TikTok from state devices, Wisconsin Governor Tony Evers said he was banning
0 Comments
Jan 13, 2023Ravie LakshmananCyber Threat / Malware Detection Remote access trojans such as StrRAT and Ratty are being distributed as a combination of polyglot and malicious Java archive (JAR) files, once again highlighting how threat actors are continuously finding new ways to fly under the radar. “Attackers now use the polyglot technique to confuse security
0 Comments