Tech Nuggets with Technology: This Blog provides you the content regarding the latest technology which includes gadjets,softwares,laptops,mobiles etc
Thursday, August 29, 2019
Motorola One Action Goes on Sale in India Today at 12pm Via Flipkart
India Said to Woo Firms Like Apple to Capitalise on US-China Trade War
Apple to Supply Parts to Independent Repair Shops for First Time
Google plans another step to make YouTube 'safer' for kids, here's how
Saaho Out Now in India in Hindi, Tamil, Telugu, and Malayalam
Highlights from Jack Ma and Elon Musk's discussion about AI in Shanghai, where Musk sounded the alarm and Ma argued humans would prevail (Bloomberg)
Bloomberg:
Highlights from Jack Ma and Elon Musk's discussion about AI in Shanghai, where Musk sounded the alarm and Ma argued humans would prevail — - Tesla's Elon Musk holds public debate with Alibaba's Jack Ma — Ma says AI isn't a threat, Musk responds “famous last words”
Malicious websites were used to secretly hack into iPhones for years, says Google
Security researchers at Google say they’ve found a number of malicious websites which, when visited, could quietly hack into a victim’s iPhone by exploiting a set of previously undisclosed software flaws.
Google’s Project Zero said in a deep-dive blog post published late on Thursday that the websites were visited thousands of times per week by unsuspecting victims, in what they described as an “indiscriminate” attack.
“Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,” said Ian Beer, a security researcher at Project Zero.
He said the websites had been hacking iPhones over a “period of at least two years.”
The researchers found five distinct exploit chains involving 12 separate security flaws, including seven involving Safari, the in-built web browser on iPhones. The five separate attack chains allowed an attacker to gain “root” access to the device — the highest level of access and privilege on an iPhone. In doing so, an attacker could gain access to the device’s full range of features normally off-limits to the user. That means an attacker could quietly install malicious apps to spy on an iPhone owner without their knowledge or consent.
Google said based off their analysis, the vulnerabilities were used to steal a user’s photos and messages as well as track their location in near-realtime. The “implant” could also access the user’s on-device bank of saved passwords.
The vulnerabilities affect iOS 10 through to the current iOS 12 software version.
Google privately disclosed the vulnerabilities in February, giving Apple only a week to fix the flaws and roll out updates to its users. That’s a fraction of the 90 days typically given to software developers, giving an indication of the severity of the vulnerabilities.
Apple issued a fix six days later with iOS 12.1.4 for iPhone 5s and iPad Air and later.
Beer said it’s possible other hacking campaigns are currently in action.
The iPhone and iPad maker in general has a good rap on security and privacy matters. Recently the company increased its maximum bug bounty payout to $1 million for security researchers who find flaws that can silently target an iPhone and gain root-level privileges without any user interaction. Under Apple’s new bounty rules — set to go into effect later this year — Google would’ve been eligible for several million dollars in bounties.
A spokesperson for Apple did not immediately comment.
Adult film producer Bang Bros says it has bought PornWikiLeaks.com, a forum devoted to doxxing and harassing porn performers, and is shutting it down (Samantha Cole/VICE)
Samantha Cole / VICE:
Adult film producer Bang Bros says it has bought PornWikiLeaks.com, a forum devoted to doxxing and harassing porn performers, and is shutting it down — PornWikiLeaks was a forum devoted to revealing the names and personal information of porn performers, including several in the Girls Do Porn trial.
Home-grown Fabindias, Urban Ladders to gain
Artificial Intelligence funding is at a record high
ETtech Top 5: Flipkart's festive strategy, Apple's Rs 1,000 cr India retail plan & more
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12 (Ian Beer/Project Zero)
Ian Beer / Project Zero:
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12 — Project Zero's mission is to make 0-day hard. We often work with other companies to find and report security vulnerabilities …
Apple to roll out a Rs 1,000 crore retail show
India’s insurance industry using new-age tech to simplify processes
Russia's finance minister says Russian companies have begun using bitcoin and other digital currencies in international payments to counter Western sanctions (Gleb Bryanski/Reuters)
Gleb Bryanski / Reuters : Russia's finance minister says Russian companies have begun using bitcoin and other digital currencies in i...
-
Jake Offenhartz / Gothamist : Since October, the NYPD has deployed a quadruped robot called Spot to a handful of crime scenes and hostage...
-
Answers to common questions about PCMag.com http://bit.ly/2SyrjWu https://ift.tt/eA8V8J