Header-template

TECH NEWS

Coordinated Cyberattack Hits Australian Pension Funds, Compromising 20,000 Accounts

Over 20,000 member accounts of several Australian pension funds were compromised in a coordinated cyberattack. REST, Hostplus, Insignia Financial, Aus

Over 20,000 member accounts of several Australian pension funds were compromised in a coordinated cyberattack. REST, Hostplus, Insignia Financial, AustralianSuper, and Australian Retirement Trust are among the major funds impacted. Unauthorised withdrawals totalling AUD 500,000 were made by hackers using passwords they had obtained to gain access to accounts. The funds have acted immediately, including adopting cybersecurity protocols and closing portals. In order to prevent future intrusions, authorities are focusing on implementing reforms such as obligatory multifactor authentication and bolstering security measures. Vulnerabilities in Australias AUD 4.2 trillion superannuation sector are highlighted by this occurrence. Read More..

B2B Tech News | 3 months ago          

Concerns Raised Over ChatGPTs Capability to Generate Fake Aadhaar and PAN Cards

The weekly tech summary focuses on two significant advancements The creation of phoney Aadhaar and PAN cards made possible by OpenAIs ChatGPT has spar

The weekly tech summary focuses on two significant advancements The creation of phoney Aadhaar and PAN cards made possible by OpenAIs ChatGPT has sparked discussions about the abuse of AI and the necessity of regulation. In the meantime, Meta has released its sophisticated Llama 4 AI models, such as Scout and Maverick, which are intended for multimodal tasks like interpreting text, images, and videos. As a demonstration of Metas commitment to AI innovation, these models are designed to compete with Googles Gemini 2.0 and OpenAIs GPT4o. These tales highlight the revolutionary and challenging facets of AI developments. Read More..

B2B Tech News | 3 months ago          

Meta Unveils Llama 4 AI Model with Multimodal Capabilities and MoE Architecture

Meta has revealed three versions of its most recent AI model, Llama 4 Llama 4 Scout, Llama 4 Maverick, and the soontobereleased Llama 4 Behemoth. Thes

Meta has revealed three versions of its most recent AI model, Llama 4 Llama 4 Scout, Llama 4 Maverick, and the soontobereleased Llama 4 Behemoth. These models are constructed on a mixtureofexperts MoE architecture for increased efficiency, are multimodal, and can handle text, photos, and videos. While Behemoth is still in production, Llama 4 Scout and Maverick are currently accessible for download. According to Meta, these models demonstrate superior reasoning, coding, and language skills, outperforming rivals such as OpenAIs GPT4o and Googles Gemini 2.0 in several benchmarks. A significant milestone in Metas AI innovation efforts has been reached with this launch. Read More..

B2B Tech News | 3 months ago          

Weaponized PDFs Drive 22% of EmailBased Cyberattacks, Check Point Research Reveals

According to Check Point Research, there has been an increase in cyberattacks that use PDFs to spread harmful content. They found that weaponised PDF

According to Check Point Research, there has been an increase in cyberattacks that use PDFs to spread harmful content. They found that weaponised PDF attachments are currently used in 22% of emailbased intrusions. These attacks circumvent conventional security measures by taking advantage of the intricate structure of PDFs and inserting harmful links, QR codes, or encrypted material. To avoid detection, cybercriminals employ strategies like obfuscation and encoding, which make these attacks incredibly sneaky. To reduce dangers, Check Point advises being vigilant, utilising secure PDF viewers, avoiding unexpected links, and confirming senders. This demonstrates the increasing complexity of cyber threats that target commonly used, reliable file formats. Read More..

B2B Tech News | 3 months ago          

Google Expands Gemini Lives Astra Features to Android 10+ Devices

To enable realtime camera and screensharing capabilities, Google has started to roll out Gemini Lives Astra capabilities to Android smartphones. These

To enable realtime camera and screensharing capabilities, Google has started to roll out Gemini Lives Astra capabilities to Android smartphones. These capabilities, which were previously limited to Pixel and Galaxy S25 phones, are now accessible on Android 10+ handsets for Gemini Advanced customers. Astra enables users to engage with Gemini Live by sharing their screen or camera feed to enhance conversations with visual input. It is recommended that users upgrade their Google app to enjoy these capabilities, as the deployment is gradual. This is a big step towards incorporating AI into regular mobile interactions. Read More..

B2B Tech News | 3 months ago          

Microsofts Security Copilot Uncovers 20 Critical Bootloader Vulnerabilities

The AIpowered Security Copilot from Microsoft has found 20 hitherto undiscovered flaws in opensource bootloaders, such as GRUB2, UBoot, and Barebox.

The AIpowered Security Copilot from Microsoft has found 20 hitherto undiscovered flaws in opensource bootloaders, such as GRUB2, UBoot, and Barebox. These bootloaders are essential for Internet of Things applications, embedded devices, and Linuxbased computers. The holes could enable attackers to get around UEFI Secure Boot and install persistent malware. They include buffer overflows, integer overflows, and cryptographic errors. Exploiting these vulnerabilities might give attackers complete control over devices, including replacing the hard drive or reinstalling the operating system. Security upgrades have fixed these problems, and users are encouraged to install them immediately. This discovery shows the expanding relevance of AI in improving cybersecurity. Read More..

B2B Tech News | 3 months ago          

Oracle Discloses Second Security Breach in a Month, Client Credentials Stolen

Oracle revealed that client login credentials from a legacy system were taken in its second significant security compromise in as many months. Some cr

Oracle revealed that client login credentials from a legacy system were taken in its second significant security compromise in as many months. Some credentials from as recently as 2024 were included in the compromised system, which had not been used for eight years, which raised questions about possible dangers. The FBI and cybersecurity company CrowdStrike are investigating the hack, distinct from an earlier incident that affected healthcare clients. Oracle has minimised the importance of the stolen data, claiming that because it is obsolete, there is little risk involved. Experts caution that even outdated credentials may be used for bruteforce or phishing assaults. Read More..

B2B Tech News | 3 months ago          

Verizon Call Filter App Vulnerability Exposes Sensitive Call Logs

A serious security vulnerability in Verizons Call Filter software exposed users incoming call logs, providing hackers with private communication infor

A serious security vulnerability in Verizons Call Filter software exposed users incoming call logs, providing hackers with private communication information. The flaw was caused by an API setup error that did not compare the phone number in queries to the number of the authenticated user. This vulnerability enabled hackers to obtain call logs for any Verizon number, endangering the privacy of prominent targets, including public officials and journalists. Although Verizon has since fixed the problem, the event emphasises how crucial strong security procedures are to safeguarding customer data. Read More..

B2B Tech News | 3 months ago          



Get The News to use newsletter to
stay on top of shifting Technology News Updates!!

...

Get Latest News To Your Inbox, Subscribe To Our Newsletter.


By signing up, you agree to our Privacy Notice and European users agree to the data transfer policy.



Take a break, Play Suduko!



Refresh Your Facts


1.  Global online sales are predicted to reach 22% of all retail sales in 2023.
   8673   

2.  Global tablet shipments are expected to hit 142 million by 2025, reports Statista.
   7183   

3.  Artificial Intelligence is expected to contribute $15.7 trillion to the economy by the year 2030.
   7537   

4.  Since the launch of the popular mobile game, Candy Crush, in 2012, players have spent a total of 73 billion hours (equivalent to 8.3 million years) playing this game.
   7641   

5.  Approximately 8 billion gadgets connect on the internet every day.
   8810   



Sharpen your mind and memory!

Play Mind Game



Your Opinion Matters, Vote Now!!


Where do you go to learn more about whats happening in your industry? Check all that apply.