Tag Archive for: Receives

Nokia X30 5G appears with Android 14, Nokia XR21 5G receives December Security update 2023 (Markets)


Nokia X30 5G may be the very first Nokia smartphones to receive Android 14. HMD Global has yet to provide any official confirmation about Android 14 roll-out to Nokia smartphones. But Nokia X30 5G has now appeared at Geekbench running Android 14.

Check the screenshot below from the benchmarking database.

Nokia Mobile has now expanded the roll-out of December security update 2023 to Nokia XR21 5G. The security update brings only the Google Android patch for the month of December.

For all software update news related to other Nokia smartphones click here. If you want to track November update roll-out to Nokia smartphones you can do it here.

Check below for the November Security update size, list of markets and the update changelog for Nokia XR21 5G. On the basis of tips received from our readers, we will collate a list of markets for Nokia XR21 5G in which updates are now available. So, do let us know if you have received the update in the comments section. You can also try the VPN trick for getting the update and see if it works.

List of markets:

  • Nokia XR21 5G in Malaysia & France

Nokia XR21 5G December security update size:

The update size for Nokia XR21 5G is 98.99 MB. You will either be prompted to download this update, or you can check by going to Settings and searching system updates and then by checking for the update.

Nokia XR21 5G December update changelog:

Nokia XR21 5G is receiving only the 2023 December Android security patch with the update. Here is what the December security update addresses as mentioned by Google on its official Security bulletin page.

The most severe of these issues is a critical security vulnerability in the System component that could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are turned off for development purposes or if successfully bypassed.

Thanks, Dr Nokia & Hotlain for the tip. Cheers!!

Please follow us on our new Facebook Page “NPU” by clicking here.

Source…

Dallas City Council receives update on May ransomware attack


DALLAS — On Wednesday, details surrounding the ransomware attack that has plagued the City of Dallas since May started to come into focus.

According to an after-action report delivered at Dallas City Council, hackers used stolen online credentials to get into the city of Dallas’ system and steal files. Ultimately, the report said, a “small amount” of “sensitive data” was accessed. But, according to Dallas Chief Information Officer Brian Gardner, the majority of the data breached was “not sensitive.” 

Dallas information technology officials said hackers with a group called Royal began their attack on April 7. City officials said the hackers were able to connect to a city server and give themselves remote access to the system. Per the after-action report, Royal downloaded almost 1.2 terabytes of data through that server, and launched a ransomware attack in the early morning hours of May 3.

The after-action report said the attack was contained the very next day, on May 4.

Still, Royal’s attack shut down city servers and services for weeks. 

The after-action report itself comes four months after the attack after its presentation was delayed at previous council meetings.

The most sensitive information accessed included medical and health insurance information, the report said. Hackers were also able to acquire social security numbers, the report revealed.

In August, the city said, some 27,000 letters that were mailed to people impacted by the attack informed them of the leaked information, and offered them two years of free credit monitoring. 

“Our investigation to date has indicated that some of your sensitive personal information was impacted,” the letter read. “The information included your name, address, SSN, Date of Birth, Insurance Information, Clinical Information, Claims Information, Diagnosis.”

WFAA spoke to people impacted by the hack, including Dallas Police Association President Mike Mata. Mata said his biggest concern about the hack is the lack of transparency from the city surrounding it.

“The city should have taken proactive steps in the very beginning, rather than having to be pushed for it,” Mata said. “We advocated years ago to separate our databases from…

Source…

Samsung Galaxy S23 series receives July 2023 security update in India


Samsung released the July 2023 Android security update for the Galaxy S23 series in the US and Europe recently, which is now rolling out in India as well.

The update comes with firmware version S91xBXXS3AWF9 and weighs about 430MB. It fixes security vulnerabilities found in the previous version of the software and bumps up the Android security patch level on the Galaxy S23, Galaxy S23+, and Galaxy S23 Ultra to July 2023.

If you live in India and haven’t received the July 2023 security update on your Galaxy S23/S23+/S23 Ultra, you can check for it manually by heading to your phone’s Settings > Software update menu.

Via

Source…

Infamous British Hacker ‘PlugwalkJoe’ Receives Five-Year US Prison Sentence for Cryptocurrency Theft


Join Our Telegram channel to stay up to date on breaking news coverage

In a groundbreaking ruling, British hacker Joseph O’Connor, known as PlugwalkJoe in the online world, has been handed a five-year prison sentence in the United States.

Notorious British Hacker Sentenced to Five Years in US Prison for Cryptocurrency Theft

British hacker Joseph O’Connor, who is famously recognized as PlugwalkJoe in the digital realm, has received a significant five-year prison sentence in the United States. Following his arrest in Spain in July 2021, O’Connor was subsequently extradited to the US on April 26, 2023. His guilty plea in May encompassed various charges related to computer intrusions, wire fraud, and money laundering conspiracies.

The announcement of O’Connor’s sentencing was disclosed by the US Attorney’s Office for the Southern District of New York on June 23.

According to the statement, O’Connor has not been named, but it confirms that he gained unauthorized access to the accounts and computing systems of the exchange where the targeted executive worked by employing a SIM-swapping technique.

The court’s ruling includes not only the prison term but also a three-year period of supervised release. Additionally, O’Connor has been ordered to forfeit the exact amount he pilfered, which totals $794,012.64.

Furthermore, O’Connor’s criminal activities extend beyond the aforementioned SIM swap attack. He and his accomplices orchestrated the high-profile Twitter hack in July 2020, which netted them approximately $120,000 in stolen cryptocurrency.

The Twitter hack involved the deployment of social engineering techniques and SIM-swapping attacks, enabling O’Connor and his associates to seize control of around 130 prominent Twitter accounts.

Other Illegal Activities

In addition to their activities on Twitter, the group of cybercriminals also gained unauthorized access to two prominent accounts on TikTok and Snapchat. Exploiting their scheme, they deceived unsuspecting Twitter users and profited by selling access to compromised accounts.

One notable incident involved O’Connor attempting to blackmail a Snapchat victim by threatening to release private messages…

Source…