Skip to main content

Posts

Apple has unveiled the iOS 18.1 Beta

              Originally anticipated for the iOS 18 release on compatible devices, Bloomberg recently reported that it would not debut with the initial rollout. The iOS 18.1 Beta, now available to developers with active accounts, allows them to enroll and test Apple Intelligence ahead of its broader release. According to release notes from iOS 18.1 beta seen by BleepingComputer, "iOS 18.1 beta is an early preview of an update to iOS 18 scheduled for later this autumn. This beta introduces initial features powered by Apple Intelligence." "To participate in the Apple Intelligence beta, users can join the waitlist in Settings and will receive notifications when it becomes available for their devices. Both the device language and Siri language must be set to US English, and the device region must be configured to United States." "Apple Intelligence debuts on iPhone 15 Pro and iPhone 15 Pro Max, though it is not currently available in the EU or China," acco...

Cybersecurity Giant CrowdStrike Triggers Worldwide Computer to Blue Screen of Death

    Recently, a widespread issue has paralyzed computers globally, initially mistaken for a cyber attack. Speculations pointed fingers at Microsoft, as only Windows systems seemed affected. However, the real culprit was CrowdStrike, a major cybersecurity firm renowned for its endpoint protection services, akin to antivirus for corporate fleets of computers. The problem stemmed from an automatic update pushed by CrowdStrike, designed to enhance security through its endpoint sensors. Unfortunately, a critical bug slipped into the update, causing affected computers—running CrowdStrike's software—to crash irreparably. Since the sensors operate at a deep system level, the glitch caused entire systems to enter a continuous cycle of crashes, known ominously as the "blue screen of death." CrowdStrike quickly acknowledged the issue and provided a fix, albeit a cumbersome one. Affected PCs must be manually booted into safe mode to remove specific files, a process that needs to be r...
  A new malicious campaign tricks people by pretending to be Google Chrome, Word, or OneDrive errors. They use these fake alerts to convince users to run harmful PowerShell "fixes" that actually install malware. This campaign involves several cyber threat groups, including ClearFake and others like ClickFix and TA571. ClearFake has previously used tricks where websites ask users to update their browser, but the update actually installs malware. In the latest attacks, cybercriminals use JavaScript in email attachments or hacked websites. They show fake error messages that look like they're from Google Chrome, Word, or OneDrive. These messages tell users to click a button to copy a PowerShell "fix" onto their computer. They're then told to run this script in a special Windows tool called PowerShell. Even though these attacks need users to do several things to work, the trickery is clever enough to make people think there's a real problem that needs f...

Unlocking the mystery: Can EVMs resist the hack attack?

  Electronic Voting Machines (EVMs) typically don't have a Graphics Processing Unit (GPU) like a typical computer. However, the absence of a GPU doesn't mean they are immune to security threats. Here's why: 1. Software Vulnerabilities: EVMs run on specialized software, and like any software system, they can have vulnerabilities. These vulnerabilities could be exploited by attackers to manipulate the voting process or compromise the integrity of the election.   2. Hardware Manipulation: Even though EVMs lack a GPU, they contain various other components, such as microcontrollers, memory chips, input/output devices, and communication interfaces. Attackers could tamper with these components to alter the behavior of the EVM or extract sensitive information.   3. Network Connectivity: While some EVMs don't have network connectivity, others may have communication capabilities for transmitting voting data. Any device with network connectivity is potentially vulner...

Massive Data Breach Exposes Millions: boAt Lifestyle India

                                                BoAt Lifestyle India customers’ data on the Dark Web!  In a darkest corner of the internet known as a darknet forum, an entity identified as ShopifyGUY has purportedly disseminated sensitive information sourced from boAt Lifestyle India. This data breach encompasses the personal particulars of approximately 7,550,000 individuals, encompassing their names, email addresses, residential addresses, phone numbers, and potentially more. boAt, a notable entity in India renowned for its audio-centric electronic offerings including smart watches, headphones, and true wireless ear buds, appears to have become a victim of data exposure within the confines of the dark web. The compromised dataset reportedly amounts to 1.2 gigabytes in size. This revelation has elicited widespread apprehension regarding the prospective jeo...

Bianca Devins: A Tragic Tale of Online Deception and Violence

                      The digital world can be a double-edged sword, offering connections and friendships while hiding darker dangers beneath its surface. Seventeen-year-old Bianca Devins, a resident of New York, sought solace in online communities like 4chan and Discord, searching for companionship in a world where she felt like an outsider. However, her quest for friendship led her down a perilous path that ultimately ended in tragedy.   As one of the few women in these predominantly male spaces, Bianca quickly gained attention, earning a reputation as an 'e-girl,' a term referring to a specific electronic aesthetic. Yet, behind the allure of online popularity lurked a sinister reality. Bianca and her friend Claire shared experiences of encountering older abusive men on 4chan, highlighting the dangers that lurked within these seemingly innocuous online spaces.   One such individual was Brandon Andrew Clark, a 21-...

QR codes can be used by attackers for quishing. 

  QR codes can be tricky for unsuspecting users because they might not know what happens when they scan them. Attackers can hide harmful QR codes in public places. When someone scans these codes, they might end up on a dangerous website that can steal their information or harm their device. This is a common way for attackers to trick people, especially by pretending to be a legitimate company. How QR Codes Are Used for Qishing Qishing is like phishing, but it uses QR codes. Attackers like using QR codes because they can trick people into going to harmful websites or downloading bad software without raising suspicion. This makes it harder for security systems to stop them. Ways to Stay Safe from QR Code Threats To protect yourself from QR code threats, you should be careful before scanning any code. Check if it looks normal and hasn't been tampered with. Also, pay attention to where the code will take you, although sometimes you can't see the destination beforehand. Never ...