Header-template

TECH NEWS

DDoS Attack Disrupts Telegram and WhatsApp in Russia, Services Restored

The Russian official communications monitoring organisation reports that a Distributed DenialofService DDoS assault on Wednesday caused difficulties f

The Russian official communications monitoring organisation reports that a Distributed DenialofService DDoS assault on Wednesday caused difficulties for Telegram and WhatsApp users in Russia. According to the service, the attack was effectively resisted, sparing Russian telecom carriers and restoring regular operation to the messaging applications. The hack also affected websites like Wikipedia, Skype, and Discord. This event happens due to persistent problems with other encrypted messaging applications like Signal and recent complaints about YouTube by Russians. Numerous of these platforms are still available in Russia via VPNs, despite earlier attempts by Russian authorities to shut Telegram and impose limits on Meta services. Read More..

B2B Tech News | 3 months ago          

Leaked Feature Google Testing Music Search in Circle to Search AI Tool

A recent leak suggests that Googles AI visual lookup feature "Circle to Search" may soon include music search functionality. When the functionality wa

A recent leak suggests that Googles AI visual lookup feature "Circle to Search" may soon include music search functionality. When the functionality was being tested on a Samsung Galaxy S23 series handset, a new music search symbol was observed next to the floating action button for Google Search. By asking users to play, sing, or hum the song, this icon—denoted by a purple music note—allows users to recognise songs that are now playing on their screen. According to reports, the function accurately identified the song and performer throughout the test. There is considerable scepticism over its availability, though, given it hasnt been formally acknowledged by Google or verified on other devices. Read More..

B2B Tech News | 3 months ago          

Phishing Campaign in Czech Republic Targets Mobile Users with Fake Banking Apps

A recent phishing campaign in the Czech Republic uses Progressive Web Applications PWAs to steal banking credentials from mobile users. The Slovak cyb

A recent phishing campaign in the Czech Republic uses Progressive Web Applications PWAs to steal banking credentials from mobile users. The Slovak cybersecurity company ESET discovered the assaults targeting clients of Československá obchodní banka CSOB, OTP Bank in Hungary, and TBC Bank in Georgia. By tricking users of iOS and Android devices into installing PWAs that look and feel like genuine banking applications, phishing websites get beyond standard security alerts. These phoney applications are meant to obtain and transfer users banking credentials to servers under attackers control. Automated calls, SMS, and social media malvertising disseminate them. ESET discovered this approach in November 2023 later waves were seen in early 2024. Read More..

B2B Tech News | 3 months ago          

Airtel Payments Bank Launches "Face Match" to Enhance Account Security

"Face Match," a new security tool from Airtel Payments Bank, is intended to stop fraudulent activity in client accounts. Face Match, which uses sophis

"Face Match," a new security tool from Airtel Payments Bank, is intended to stop fraudulent activity in client accounts. Face Match, which uses sophisticated machine learning algorithms, triggers facial recognition verification in response to abnormal transaction patterns or alterations in user behaviour. When this happens, customers have to use the Airtel Thanks app to snap a picture, which gets compared to their onboarding photo to confirm who they are. If the match is successful, the transaction may be completed if not, consumers need to go to a banking location to undergo biometric verification. Anubrata Biswas, MD and CEO of Airtel Payments Bank says that this innovation demonstrates the banks dedication to safe digital banking by solving issues like money laundering and account fraud and guaranteeing a seamless customer experience. Read More..

B2B Tech News | 3 months ago          

KPMG India Partners with Zscaler to Offer Zero Trust Data Security Services

To provide Zero Trust principlealigned data security services in India, KPMG and Zscaler have formed a strategic relationship. By tackling the quickly

To provide Zero Trust principlealigned data security services in India, KPMG and Zscaler have formed a strategic relationship. By tackling the quickly changing cybersecurity landscape in the nation, our alliance seeks to provide complete clouddelivered protection for endpoints, cloud workloads, identity, and data. The partnership will make use of Zscalers Zero Trust ExchangeTM technology, which combines Zscaler Private AccessTM ZPATM, Zscaler Internet AccessTM ZIATM, and Zscaler Data Protection with KPMG in India to provide digital trust and advice services. By assisting companies in switching from antiquated security approaches to a cuttingedge Zero Trust strategy, the partnership hopes to provide a strong defence against new cyber threats. Read More..

B2B Tech News | 3 months ago          

Microchip Technology Hit by Cybersecurity Incident, Operations Disrupted

Microchip Technology announced on Tuesday that some business processes were affected by an "unauthorised party" interfering with the use of specific s

Microchip Technology announced on Tuesday that some business processes were affected by an "unauthorised party" interfering with the use of specific servers. After seeing "potentially suspicious activity" in its IT systems on Saturday, the corporation moved to investigate and resolve the problem. Microchips capacity to fulfil orders is impacted due to its production plants working below capacity. This interruption coincides with the companys already decreasing chip orders brought on by COVID19, causing surplus inventory. In addition to shutting down specific systems, Microchip has enlisted outside cybersecurity experts to help with its investigation. Were still evaluating the whole effect and extent of the incident. Read More..

B2B Tech News | 3 months ago          

Oracle NetSuite Misconfiguration Exposes Sensitive Data Across Thousands of Websites

According to security firm AppOmni, a major misconfiguration in Oracle NetSuites SuiteCommerce ERP technology has exposed sensitive consumer data acro

According to security firm AppOmni, a major misconfiguration in Oracle NetSuites SuiteCommerce ERP technology has exposed sensitive consumer data across hundreds of websites. Unauthorised access to personal data, including phone numbers and addresses, is made possible by incorrectly implemented access restrictions on custom record types. These setup errors allow unauthorised users to manipulate URLs to query sensitive data. This is especially true for stores that are visible to the outside world. Although many organisations are still ignorant of the issue, NetSuite has encouraged its clients to evaluate their security settings. This event serves as a reminder of the increasing security dangers present in SaaS systems, where classic defences must be modified to counter new threats, such as those brought on by improper access restrictions and misconfigurations. Read More..

B2B Tech News | 3 months ago          

Disinformation Campaign Exploits Cloud Subdomains and Google Search to Spread Malware

A brilliant misinformation effort has surfaced that uses Google search, Microsoft Azure and OVH cloud subdomains, and spam to spread malware. Android

A brilliant misinformation effort has surfaced that uses Google search, Microsoft Azure and OVH cloud subdomains, and spam to spread malware. Android users are misled by false alerts based on their past searches, which take them to fraudulent websites posing as trustworthy sources of entertainment. The campaign fabricates articles to divert attention to dangerous websites by claiming—falsely—that famous people, including Harry Connick Jr., have experienced health difficulties. These websites promote malware, phoney virus warnings, and questionable Chrome extensions. The operation manipulates Googles algorithms to make the alerts seem legitimate by building several bogus websites that propagate the same fake information. Users are urged to refrain from clicking on dubious links, particularly those that make dramatic claims without credible sources. Read More..

B2B Tech News | 3 months ago          



Get The News to use newsletter to
stay on top of shifting Technology News Updates!!

...

Get Latest News To Your Inbox, Subscribe To Our Newsletter.


By signing up, you agree to our Privacy Notice and European users agree to the data transfer policy.



Take a break, Play Suduko!



Refresh Your Facts


1.  Global online sales are predicted to reach 22% of all retail sales in 2023.
   3858   

2.  Global tablet shipments are expected to hit 142 million by 2025, reports Statista.
   2670   

3.  Artificial Intelligence is expected to contribute $15.7 trillion to the economy by the year 2030.
   2956   

4.  Since the launch of the popular mobile game, Candy Crush, in 2012, players have spent a total of 73 billion hours (equivalent to 8.3 million years) playing this game.
   3122   

5.  Approximately 8 billion gadgets connect on the internet every day.
   4128   



Sharpen your mind and memory!

Play Mind Game



Your Opinion Matters, Vote Now!!


Where do you go to learn more about whats happening in your industry? Check all that apply.