Posts

Samsung Galaxy S20 FE 5G Gets Another Update to Improve Touchscreen Stability: Report


Samsung Galaxy S20 FE 5G is receiving another update that improves the touchscreen stability of the phone, as per a report. The update is also said to bring with it the January 2021 Android security patch. The firmware update is reportedly rolling out to Samsung Galaxy S20 FE devices in countries across Europe. Some Samsung Galaxy S20 FE 5G users have been experiencing problems with using the touchscreen of the phone. This is reportedly Samsung’s fourth firmware update that incudes touchscreen stability improvements.

As per a report by SamMobile, the update for Samsung Galaxy S20 FE 5G carries the firmware version G81BXXU1BUA5. The update weighs around 263MB. The report states that the update for the Samsung smartphone has started rolling out to dozens of countries across Europe.

This is the fourth update from Samsung that is said to include touchscreen stability improvements for the Samsung Galaxy S20 FE 5G launched last year. But the report also speculates that the ‘stability of touch screen has been improved’ text could have been mistakenly added to the changelog of the new update from the previous one.

Some Samsung Galaxy S20 FE 5G users had taken to forums to complain about their touchscreens two months ago. Their handsets reportedly registered ghost touches and stuttered a lot while scrolling or zooming. Users had said that as the updates to improve the touchscreen don’t seem to resolve the issue completely, it is possible that this issue is a hardware one and not something that can be fixed via a software update.

If you have an eligible Samsung Galaxy S20 FE 5G device and haven’t received a notification regarding the update yet, you can check for it manually. Go to Settings > System updates > Check for system updates > Download now > Install update.


What will be the most exciting tech launch of 2021? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.

Source…

Over 22 billion records exposed in data breaches in 2020: Report – ETCIO.com



Over 22 billion records exposed in data breaches in 2020: Report  ETCIO.com

Source…

Hackers Taunt FireEye’s Kevin Mandia At Home With Postcard: Report


Hackers attempted to troll FireEye CEO Kevin Mandia with a postcard that called into question the company’s ability to attribute cyberattacks to the Russian government, Reuters reported.

The FBI is investigating a mysterious postcard sent to Mandia’s home days after FireEye found initial evidence of a suspected Russian hacking operation on U.S. government agencies and private businesses, according to Reuters. Federal officials said Jan. 5 that a Russian Advanced Persistent Threat (APT) group is likely behind colossal hacking campaign, but FireEye hasn’t publicly attributed the attack to Russia.

U.S. officials familiar with the postcard are investigating whether it was sent by people associated with a Russian intelligence service due its timing and content, according to Reuters. This suggests Russian intelligence officials had internal knowledge of the massive hack well before it was publicly disclosed in December, Reuters said. FireEye declined to comment to CRN on the Reuters report.

[Related: Kevin Mandia: 50 Firms ‘Genuinely Impacted’ By SolarWinds Attack]

The postcard did not on its own help FireEye find the breach, but rather arrived in the early stages of the threat intelligence vendor’s investigation, Reuters said. This led people familiar with the card to believe the sender was attempting to discourage further inquiry by intimidating a senior executive. Reuters said U.S. law enforcement and intelligence agencies are spearheading a probe into the postcard’s origin.

FireEye blew the lid off the hacking campaign Dec. 8 when the company disclosed that it was breached in an attack designed to gain information on some of the company’s government customers. Before entering the corporate world, Mandia spent six years in the U.S. Air Force, where he was a computer security officer at the Pentagon and a special agent in the Air Force Office of Special Investigations.

A person familiar with the postcard investigation told Reuters actions like these aren’t typically in the playbook of Russia’s foreign intelligence service, or APT29, but noted that “times are rapidly changing.” The U.S. Cyber Command sent private messages to Russian hackers ahead of…

Source…

A New Malware Working On Windows, Linux, and MacOS Targets Your Cryptocurrency: Report


A recent report informed of a new type of malicious operation that has been active for over a year and has targeted thousands of cryptocurrency users. Dubbed ElectroRAT, it’s written from scratch to work on various operating systems and promoted via dedicated forums and marketing campaigns.

A New Threat For Crypto Users

The cybersecurity company Intezer issued a report describing the latest threat for cryptocurrency users. It reads that the firm discovered the operation in December 2020, but it has been active for at least a year.

The paper described it as a composition of a “full-fledged marketing campaign, custom cryptocurrency-related applications, and a new Remote Access Tool (RAT) written from scratch.”

The company admitted that while it’s common for such information stealers to try to collect private keys to access victims’ wallets, ElectroRAT had a few fundamental differences. The latest malicious operation was reportedly built from scratch in a way to target multiple operating systems at once. Namely, those are Windows, Linux, and macOS.

The malicious operation was typically promoted as a very successful trading instrument or a tool for multiple exchange transactions on one interface.

How Does It Work And Number Of Victims

The report highlighted that the attackers behind the malicious threat used several well-known blockchain and cryptocurrency forums to promote their operation, including bitcointalk and SteemCoinPan.

The perpetrators had set up fake user accounts and published multiple false success stories, tempting readers to browse the applications’ web page. Victims were able to download the app from an external page without realizing that it’s malware.

Furthermore, the attackers created Twitter and Telegram accounts for a “DaoPoker” application and paid a cryptocurrency medial influencer for advertisement.

If the victim indeed falls for the malicious attack and installs the app on his device, the perpetrators receive access to his personal information, accounts, and private keys for crypto wallets. Once they have this data, they could execute transfers from hot wallets.

Ultimately, the cybersecurity company estimated that the number of victims that downloaded…

Source…