Tag Archive for: Today’s

Apple Rushes To Fix A Vision Pro Zero Day Exploit, Announces 600 Apps For Today’s Launch


The inclusion of 600 apps for Vision Pro is no surprise, as Apple has been building a massive ecosystem of apps and content for several years across its devices. On the entertainment front, apps such as Apple TV will provide unique and immersive content to users that won’t be replicated on standard devices. Having a large virtual screen in front of users is certainly appealing if executed well, along with surround sound and curated content. 

With gaming, there is a plethora of opportunity here for Apple to expand on the popularity of Apple Arcade, and gain some high-end marketshare on that front from other popular headsets. 

Productivity is a major area where Apple plans to focus its efforts, with the idea that spatial computing can replace the traditional desktop for some users. Apps such as Zoom, popular with work-from-home, can be a starting point for those dipping their feet into this immersive world that Apple is aiming for. 

If users will ultimately buy into the idea of Vision Pro as a replacement or supplemental device for work and play remains to be seen. While there is no killer app available yet, the Apple ecosystem is robust and the technology is sufficiently capable to provide an experience not available elsewhere yet. 

apple webkit

While new apps are always needed to prove a products seaworthiness upon its maiden voyage, security is just as important. Apple has quickly released a security update addressing “maliciously crafted web content which may lead to arbitrary code execution.” This update is part of visionOS 1.0.1 for developers, and visionOS1.0.2 for those with visionOS1.0. 

While Vision Pro won’t have the same number of users as Apple’s iPhone, there will be a sufficient user base that makes security updates like this vital. Apple products have a reputation for being less likely to have issues such as malware, so keeping that reputation on a halo product such as Vision Pro is certainly in Apple’s best interest. 

Source…

Why Antivirus Internet Security is Vital in Today’s Digital World


With our increasing reliance on technology and the internet, we are more vulnerable to various cyber threats such as viruses, malware, spyware, and phishing scams. These threats not only put our personal information at risk but also pose a significant threat to businesses and organizations. Antivirus internet security software is designed to protect our devices from these malicious attacks by detecting and removing any potential threats. It works by continuously scanning your device and monitoring all incoming data for any signs of viruses or other harmful programs. In addition to detecting and removing existing threats, antivirus software also provides real-time protection against new emerging ones.

The Importance of Antivirus Internet Security

1. Protection against Malware: Malware is short for “malicious software” and refers to any program or code that is intended to harm your computer or steal sensitive information without consent. This includes viruses, worms, Trojans, ransomware, spyware, adware, and more. Antivirus software acts as a shield against these types of malware by identifying them before they have a chance to infect your system.

2. Safeguards Online Transactions: The rise of e-commerce has made online shopping an essential part of our lives. With this comes the risk of falling victim to fake websites or getting scammed through fraudulent transactions.
Antivirus internet security software can protect you from these cyber threats by maintaining a secure connection and keeping your personal information, such as credit card details, safe from hackers.

3. Identity Theft Protection: With the rise of social media and online platforms, it has become easier for cybercriminals to gather personal information about individuals and use it for identity theft. Antivirus software can help prevent this by safeguarding your personal data and alerting you if any suspicious activity is detected.

4. Protects Against File Corruption: A virus or…

Source…

Car Thieves Can Hack into Today’s Computerized Vehicles


These days, cars are computer centers on wheels. Today’s vehicles can contain over 100 computers and millions of lines of software code. These computers are all networked together and can operate all aspects of your vehicle.

It’s not surprising, then, that car theft has also become high-tech.

The ones and zeros of getting from A to B

The computers in a vehicle can be divided into four categories. Many computers are dedicated to operating the vehicle’s drive train, including controlling the fuel, battery or both, monitoring emissions and operating cruise control.

The second category is dedicated to providing safety. These computers collect data from the vehicle and the outside environment and provide functions like lane correction, automatic braking and backup monitoring.

The third category is infotainment systems that provide music and video and can interface with your personal devices through Bluetooth wireless communications. Many vehicles can also connect to cellular services and provide Wi-Fi connectivity. The final category is the navigation system, including the car’s GPS system.

Computers in one category often need to communicate with computers in another category. For example, the safety system must be able to control the drive train and the infotainment systems.

One difference between the network in your car and a typical computer network is that all devices in the car trust each other. Therefore, if an attacker can access one computer, they can easily access other computers in the car.

As with any new technology, some aspects of today’s cars make it harder for thieves, and some make it easier. There are several methods of stealing a car that are enabled by today’s technology.

Hijacking wireless keys

One of the high-tech features is the use of keyless entry and remote start. Keyless entry has become common on many vehicles and is very convenient. The fob you have is paired to your car using a code that both your car and fob know, which prevents you from starting other cars. The difference between keyless entry and the remotes that unlock your car is that keyless entry fobs are always transmitting, so when you get near your car and touch the door,…

Source…

The untold history of today’s Russian-speaking hackers


Clop, a Russian-speaking hacking group specialising in ransomware, has its own website. Yes, this is a thing — criminals openly encouraging their victims to negotiate a ransom for the return of their data as though it were a legitimate commercial deal.

Using language that is both business-like and chilling, it urges users to open a dialogue, stating they have a three-day window to discuss price. It promises that the Clop team will provide some specimen files they have encrypted “as proof we are not lying”. Failure to comply means all the stolen data will be published.

As with other ransomware groups, Clop’s webpage is only accessible on the dark web via Tor (“The Onion Router”). If that sounds challenging, these days a seven-year-old would be able to access it for you in a couple of minutes. The homepage includes an indignant rant at the BBC for allegedly misreporting Clop’s activities. It finishes with an exhortation to the mainstream media: “Stop creating propaganda by crafting interesting stories. Only story is we want money for our work. If we have your business files you have to pay. Speak and be reasonable and we shake on agreement.” 

According to Mikko Hypponen, chief research officer at WithSecure in Helsinki and one of the most celebrated hunters of Russian cyber gangs, Clop “is a Russian-speaking crime group operating out of Russia and Ukraine”. Hypponen notes that since Russia’s invasion of Ukraine, the number of ransomware attacks against companies and institutions in Europe and the US that emanate from Ukraine has dropped, while those launched from inside Russia have increased.


It’s been a busy few months for Clop. In June, the group announced that it had found a vulnerability in a software product called MOVEit. This file-transfer software in turn allowed the hackers from Clop access to the digital payroll provider Zellis.

Although Boots, British Airways and the BBC were reported by the BBC itself to be among the hundreds of companies that fell victim to the massive ransomware attack that month, Clop denied harvesting data from them — hence the acrimonious exchanges with the broadcaster. Zellis issued a press release, admitting that…

Source…