Stanford University Discloses Data Breach

0
[ad_1]
Stanford University Discloses Data Breach

Stanford University has recently reported a security incident involving a data breach. The incident, which occurred between December 2022 and January 2023, involved the unauthorized download of files containing sensitive admission information for the Economics Ph.D. program from the university’s website.

Recently, 897 candidates were notified by the university about this recent data breach. As part of the graduate application to the Department of Economics in the university, these candidates submitted their personal and health data that were unauthorizedly accessed and downloaded in this breach.

Ph.D. Admission Data Leaked

Stanford University received notification on January 24, 2023, regarding a significant data security lapse that had occurred in the Department of Economics Ph.D. program. 

This incident occurred due to the misconfiguration of the folder settings, which led to the availability of the 2022-23 application files for admission to the program on the department’s website. 

As a result, unauthorized access to the confidential and sensitive information of the applicants was made possible, posing a potential risk to their privacy and academic future.

In response to this report, immediate restrictions were placed on access to the folder as soon as it was made known. Following the notification of the data security lapse, Stanford University initiated an immediate investigation to determine the extent and timeline of the incident.

Based on the investigation, it was determined that the application files were opened up to unrestricted access starting on December 5, 2022. During the time period of December 5, 2022, and January 24, 2023, two downloads of the confidential application materials were made.

However, outside of this, the cybersecurity experts at the university didn’t find any evidence that the information was exploited in any way. 

Data Involved

This incident involved the disclosure of applicants’ applications as well as the materials that accompanied them. The application contains the following personal data:-

  • First and last name
  • Date of birth
  • Home address
  • Mailing address
  • Phone number
  • Mail address
  • Race
  • Ethnicity
  • Citizenship
  • Gender
  • Transcripts
  • Personal statements
  • Resume
  • Letters of recommendation

Furthermore, there is no financial or social security data exposed in this data breach since this type of information was not contained in application files.

Prompt Response from Stanford University

Ensuring the confidentiality, privacy, and security of personal information is a top priority for Stanford University. 

To this end, the university has implemented robust security protocols and measures that are designed to protect sensitive data from unauthorized access, theft, and misuse. 

Following the unfortunate data breach incident, Stanford University has taken swift action to prevent such incidents from occurring in the future. The university is in the process of reviewing and updating its policies and procedures related to the storage and handling of electronic files. 

This review is aimed at strengthening the security of the data storage infrastructure and preventing any misconfiguration or errors that could lead to unauthorized access or data breaches. 

Furthermore, the university will be conducting mandatory retraining sessions for its faculty and staff to ensure that everyone is well-versed in the updated security policies and procedures. 

While they are also offering IDX, a company that specializes in breach recovery and data breach protection, as additional services for identity theft protection.

Recent Data Breaches:

PayPal Data Breach – Over 35,000 Users’ Accounts Compromised

Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum

Toyota Discloses Data Breach – Customers’ Personal Information Exposed

GoDaddy Hacked – Attacked Installed Malware on its Servers

Researcher Hacked Toyota’s Global Supplier Portal

Network Security Checklist – Download Free E-Book


[ad_2]
Source link

Fighting online censorship, or, encryption’s latest surprise use-case, with Mallory Knodel: Lock and Code S04E05

0
[ad_1]

This week on Lock and Code, we speak with Mallory Knodel about the stories that countries tell their people to fear encryption, and why the most recent threats to encryption are different.

Government threats to end-to-end encryption—the technology that secures your messages and shared photos and videos—have been around for decades, but the most recent threats to this technology are unique in how they intersect with a broader, sometimes-global effort to control information on the Internet.

Take two efforts in the European Union and the United Kingdom. New proposals there would require companies to scan any content that their users share with one another for Child Sexual Abuse Material, or CSAM. If a company offers end-to-end encryption to its users, effectively locking the company itself out of being able to access the content that its users share, then it’s tough luck for those companies. They will still be required to find a way to essentially do the impossible—build a system that keeps everyone else out, while letting themselves and the government in. 

While these government proposals may sound similar to previous global efforts to weaken end-to-end encryption in the past, like the United States’ prolonged attempt to tarnish end-to-end encryption by linking it to terrorist plots, they differ because of how easily they could become tools for censorship. 

Today, on the Lock and Code podcast with host David Ruiz, we speak with Mallory Knodel, chief technology officer for Center for Democracy and Technology, about new threats to encryption, old and bad repeated proposals, who encryption benefits (everyone), and how building a tool to detect one legitimate harm could, in turn, create a tool to detect all sorts of legal content that other governments simply do not like. 

“In many places of the world where there’s not such a strong feeling about individual and personal privacy, sometimes that is replaced by an inability to access mainstream media, news, accurate information, and so on, because there’s a heavy censorship regime in place,” Knodel said.  “And I think that drawing that line between ‘You’re going to censor child sexual abuse material, which is illegal and disgusting and we want it to go away,’ but it’s so very easy to slide that knob over into ‘Now you’re also gonna block disinformation,’ and you might at some point, take it a step further and block other kinds of content, too, and you just continue down that path.”

Knodel continued:

“Then you do have a pretty easy way of mass-censoring certain kinds of content from the Internet that probably shouldn’t be censored.”

Tune in today. 

You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)


Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.

GET STARTED


[ad_2]
Source link

Foldable prices won’t drop soon, says Oppo

0
[ad_1]

Foldable phones have come a long way since the dog days of the original Galaxy Z Fold and the Huawei Mate X. While foldable phones are a lot more ubiquitous nowadays, they still have a high average price. An executive at Oppo gave us the reason why the company thinks that foldable prices won’t drop soon.

While Samsung still owns a commanding lead in the foldable smartphone market, Oppo certainly isn’t making it easy on the company. Oppo has its fantastic Find N series of foldable phones, and they’ve been touted as some of the best competitors to the Galaxy Fold/Flip phones. This company, along with others like Vivo, Huawei, Motorola, and Xiaomi, has been populating the smartphone market with foldable phones, helping push them closer into the mainstream.

Oppo says that foldable prices won’t be dropping soon

The Mobile World Congress (MWC) is going on right now, and we’re seeing all sorts of devices from top brands. Oppo attended the event, and the company’s vice president for overseas sales, Billi Zhang gave his thoughts on why foldable phones are still so expensive (via Phone Arena).

Clamshell foldables are still struggling to dip below $1,000 and notebook foldables usually sit above $1700. They’ve been around for some time, but we’re still waiting for them to reach a more accessible price. Samsung holds the record for the cheapest foldable which was the Galaxy Z Flip 3 at $999.

So, what gives? Why are foldable phones so out of reach for use with tighter budgets? Well, Zhang said that it’s because the adoption rate of foldables is still pretty low. The foldable market flourished surprisingly well despite its trial by fire early on. More people are buying foldable phones, but they’re still not super widespread yet.

This means that companies aren’t making as much money on them yet. This helps keep the prices up in the sky, as companies need to price them higher to compensate. This is only exacerbated by the struggling global economy. This means that phone prices are higher and people’s bank accounts are lower by default.

Hopefully, sometime down the road, foldable phones will be able to dip to lower prices. As the technology becomes more accessible, we’ll see more companies make their own foldable, and we don’t know if one will shock the world with a more affordable foldable phone.


[ad_2]
Source link

LastPass says engineer’s home computer was hacked

0
[ad_1]

Just when we thought the LastPass hack was behind us, the company has come out with a new update on its investigation into the security breach. The update reveals that the threat actors responsible for the hack not only stole user data, including passwords but also gained access to the Amazon AWS cloud servers where LastPass stored their backups and encrypted vault data.

According to LastPass, the threat actors targeted the personal computer of a DevOps engineer and exploited a security vulnerability in a third-party media software package. This allowed the threat actors to execute remote code and install keylogger malware on the engineer’s computer. Using this access, they captured the engineer’s master password, which was entered after the engineer had authenticated with multifactor authentication (MFA).

With the master password, the threat actors gained access to the engineer’s LastPass corporate vault. They then exported the contents of the corporate vault, obtained encrypted secure notes, access and decryption keys needed to access various cloud-based storage resources, including AWS S3 LastPass production backups and some critical database backups.

LastPass’ Response to the Attack

In response to the attack, LastPass has taken several measures to prevent future breaches, including assisting the engineer in strengthening their network security, adding Microsoft’s conditional access PIN-matching multifactor authentication, rotating critical SAML certificates used for internal and external service, and revoking certificates obtained by the hackers. Additionally, the company has also advised its users to change their passwords stored on the platform along with their master password for the LastPass vault.

However, this incident serves as a reminder that even the most secure systems are not completely impervious to cyber attacks. It is essential to follow the best practices for online security, such as using strong and unique passwords, enabling two-factor authentication, and keeping the software and operating systems up to date. And, for those who have trouble remembering their passwords, a password manager like 1Password can come in handy.


[ad_2]
Source link

Top seven hacks and cyber security threats in APAC

0
[ad_1]

In 2022, 59 percent of business in the Asia-Pacific region reported being the victim of a cyber attack, 32 percent reported being the victim of multiple cyber attacks and the region suffered a shortage of 2.1 million cyber security professionals.

This has culminated in the Asia-Pacific region being victim to a number of high-profile cyber attacks within the last 12 months. In this article, Cyber Security Hub explores seven of these attacks.

Contents

  1. New Zealand government compromised in third-party attack
  2. Medibank suffers data leak that affects 9.7 million people
  3. Toyota admits to data breach after access key is posted on GitHub
  4. MyDeal data breach impacts 2.2 million people
  5. Vulnerabilities in GPS tracker could put 1.5 million vehicles in danger
  6. Data breach sees Telstra employees’ details posted online
  7. Details of 11 million customers accessed in Optus data breach

New Zealand government compromised in third-party cyber attack

In December 2022, an IT managed service provider that supports a range of organizations across New Zealand including several within its government suffered a cyber attack, compromising access to its data and systems.

Those affected by the cyber security incident includes some providers contracted to Te Whatu Ora (Health New Zealand), although health service delivery was not been affected. 

The Ministry of Justice was also affected by the third-party data breach and confirmed the cyber attack impacted access to some coronial data. This allegedly included thousands of autopsy reports.

New Zealand’s National Cyber Security Center (NCSC) said that it was coordinating governmental response to the cyber attack, both within the Government Communication Security Bureau and alongside the New Zealand Police, CERT NZ and the Privacy Commissioner.

Lisa Fong, deputy director-general of the NCSC, said that the organization is working with the compromised third party to “understand more fully the nature of the data that has been impacted” and how the cyber attack occurred. 

Medibank suffers data leak that affects 9.7 million people

On October 13, 2022, Australian health insurance provider Medibank suffered a data breach which affected 9.7 million people.

The malicious actor responsible for the breach attempted to extort the company by contacting them directly to negotiate the release of the data. Medibank refused, which led to the hacker releasing private medical information obtained in the breach on the dark web.

The hacker posted a file labelled “abortions” to a site backed by Russian ransomware group REvil on November 10, 2022, which apparently contained information on procedures that policyholders have claimed on, including miscarriages, terminations and ectopic pregnancies.

They also released files containing customer data called “good-list” and “naughty-list” on November 9, 2022. The so-called “naughty-list” reportedly includes details on those who had sought medical treatment for HIV, drug addiction or alcohol abuse or for mental health issues like eating disorders.

The hacker added to the November 10 data leak post, saying: “Society ask us about ransom, it’s a 10 millions (sic) usd. We can make discount 9.7m 1$=1 customer.”

During question time in Australian Parliament on November 10, minister of home affairs Clare O’Neil hit back at the hackers, saying: “I want the scumbags behind this attack to know that the smartest and toughest people in this country are coming [at] you.

“I want to say, particularly to the women whose private health information has been compromised overnight, as the minister for cyber-security but more importantly, as a woman, this should not have happened, and I know this is a really difficult time.”

David Koczkar, CEO of Medibank, called the release of the data “disgraceful” and a “weaponization of people’s private information”. He also called those involved in the cyber-attack and data leak “deplorable”.

In an attempt to protect those affected by the cyber security incident and the subsequent data leaks, Medibank urged members of the public and the media to not “unnecessarily download sensitive personal data from the dark web” and to “refrain from contacting customers directly”.

Toyota admits to data breach after access key is posted on GitHub

On October 7, 2022, Japanese car manufacturer Toyota issued a statement and an apology after it was discovered that third parties may have gained unauthorized access to customer details between December 2017 and September 2022. 

The breach occurred because a section of the source code for T-Connect, an app which allows customers to connect their phone to their car, had been posted on source code repository GitHub in December 2017. As the source code contained an access key for the server, this may have allowed unauthorized access to customer data for five years.

Any customers who registered for the app from December 2017 to September 2022 were at risk for their data being accessed, meaning the data for a potential 296,019 customers may have been leaked. The information available for access included email addresses and customer management numbers. Personal or sensitive information including payment card information, name and address were not accessed.

Following a security investigation, Toyota said that while it “cannot confirm access by a third party based on the access history of the data server where the customer’s email address and customer management number are stored, at the same time [it] cannot completely deny it”.

Toyota also said that it would individually notify all those who were affected by the breach.  

MyDeal data breach impacts 2.2 million people

Australian online retail marketplace MyDeal confirmed in October 2022 that it was the victim of a data breach that exposed the data of around 2.2 million customers.

The retailer, which is a subsidiary of supermarket chain Woolworths, said that it would be contacting all those affected by the breach via email, as well as alerting the “relevant regulatory authorities and government agencies”.

Woolworths said that the breach was caused by a malicious actor using “a compromised user credential” to gain unauthorized access to MyDeal’s Customer Relationship Management (CRM) system.

Customer information exposed during the cyber-attack included names, dates of birth, phone numbers and email addresses. For 1.2 million customers, the data exposed was limited to their email address. Confidential information like passport, payment card and drivers license details is not stored by MyDeal, and therefore was not exposed in the hack.  

Vulnerabilities in GPS tracker could put 1.5 million vehicles in danger 

A GPS tracker manufactured by Chinese company MiCODUS was been revealed to have numerous critical cyber security vulnerabilities that could allow bad actors to remotely hack a vehicle’s system in August 2022. 

At the time of the discovery, the MiCODUS MV720 GPS tracking device had been sold to customers across 169 countries and installed in more than 1.5 million devices. 

The critical cyber security issues were first discovered by cyber security startup BitSight. Following the discovery of the vulnerabilities, BitSight informed the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA).

The CISA confirmed that “successful exploitation of these vulnerabilities could allow an attacker control over any MV720 GPS tracker, granting access to location, routes, fuel cutoff commands and the disarming of various features (e.g. alarms)”. 

In a report on the vulnerabilities, BitSight said it had found MiCODUS devices were being used by a range of organizations including “a Fortune 50 energy company, a national military in South America, a national government and a national law enforcement organization in Western Europe, and a nuclear power plant operator”.

It was also revealed that MiCODUS has a global customer base of 420,000, with 1.5 million devices sold. However, BitSight did note that it was unable to determine the number of MiCODUS MV720 units currently in use globally, as well as the number of MiCODUS devices used for personal or businesses uses.

Data breach sees Telstra employees’ details posted online

Australian telecommunications company Telstra revealed on Tuesday that it had been hit by a data breach that had revealed the details of 30,000 current and former employees.

The details included employee’s first and last names and email addresses, and were posted on hacking forum BreachedForums.

In a tweet, Telstra confirmed that the data leak “wasn’t a breach of any Telstra system” and that it has notified its employees and authorities first, before notifying former employees, despite “minimal risk” to them.

A Telstra spokesperson said the company had been “made aware of a data breach affecting a third party that included limited Telstra employee information from 2017.”

Of the information shared, 12,800 of the employees named were current employees.

Details of 11 million customers accessed in Optus data breach

Australian telecommunication company Optus suffered a devastating data breach on September 22, 2022 that led to the details of 11 million customers being accessed.

The information accessed includes customers’ names, dates of birth, phone numbers, email addresses, home addresses, driver’s license and/or passport numbers and Medicare ID numbers. Payment detail and account passwords were not compromised in the breach.

Optus confirmed that it has now contacted all customers to notify them of the cyber-attack’s impact, beginning with those who had been affected by the breach and finishing with those who had not had their data accessed.

Someone claiming to be the hacker told Australian journalist Jeremy Kirk that they had “accessed an unauthenticated API endpoint” meaning that they did not have to log in to access the data and that it was “all open to internet for any one[sic] to use”.

A person claiming to be the hacker responsible for the data breach posted a small sample of the customer data stolen to the hacking forum BreachedForums on September 23. 

Using the alias optusdata, the hacker demanded that Optus pay them $1mn ransom, or they would leak the data of all 11 million customers affected by the breach. When Optus did not respond to the ransom demand, optusdata then posted a text file of 10,000 customer data records on September 26, allowing other malicious actors to use the data in their own phishing campaigns.

Victims of the breach reported on September 27 that they had been contacted with demands that they pay AU$2,000 (US$1,300) or their data will be sold to other hackers.

However, on the same day, the supposed hacker posted a new message on BreachedForums, rescinding their demand and apologizing to Optus.

The hacker said there were “too many eyes” so they will not be selling the data to anyone and claimed that they had deleted all the data from their personal drive, and that they had not made any copies. They offered an apology also to the 10,200 people who had their data exposed via their posts on BreachedForums, and to Optus itself, saying “hope all goes well with this”.

They finished by saying they “would have reported [the] exploit if [Optus] had [a] method to contact” and that while the ransom was not paid, they “dont[sic] care anymore” as it was a “mistake to scrape publish data in the first place”.


[ad_2]
Source link

Critical Flaws in WordPress Houzez Theme Exploited

0
[ad_1]
Flaws in WordPress Houzez Theme

Houzez is a high-quality WordPress theme that is available for purchase on ThemeForest, a popular marketplace for digital products. This premium theme has been widely recognized for its outstanding features and has garnered an impressive 35,000 sales to date with a price tag of $69.

The Houzez theme and plugin for WordPress, which are commonly utilized by real estate websites, are currently under attack from hackers who are exploiting two high-risk vulnerabilities. 

Vulnerability Details:

These security flaws are considered critical in severity and can potentially cause significant harm to websites and their users.

A threat researcher from Patchstack named Dave Jong has identified two vulnerabilities in the Houzez theme and plugin for WordPress. Upon discovery, the issues were reported to the theme’s vendor, ThemeForest, and were addressed in two separate updates. 

The first vulnerability was fixed in version 2.6.4, which was released in August 2022, and the second issue was resolved in version 2.7.2, which was released in November 2022.

Here below we have mentioned the vulnerabilities:-

  • CVE ID: CVE-2023-26540
  • Description: Houzez Theme Vulnerability
  • CVSS Score: 9.8
  • Severity: Critical
  • CVE ID: CVE-2023-26009
  • Description: Houzez Login Register Vulnerability
  • CVSS Score: 9.8
  • Severity: Critical

A recent report from Patchstack highlights that certain websites have yet to implement the security updates released for the Houzez theme and plugin, leaving them vulnerable to exploitation. This report serves as a warning that hackers are currently targeting these unpatched vulnerabilities in ongoing attacks.

The privilege escalation vulnerability has been found both in the theme itself as well as one of the plugins that are included in the theme. It is important to note that the Houzez Login Register plugin is also vulnerable to the same vulnerability.

Exploitation

At present, the security vulnerability present in the Houzez theme and plugin for WordPress is being actively exploited by cybercriminals. These attacks are being carried out from the IP address 103.167.93.138 and have been observed in significant numbers.

A backdoor was uploaded by the threat actors in the attacks observed by Patchstack that enabled them to perform the following illicit activities:-

  • Executing commands
  • Injecting ads on the website
  • Redirecting traffic to other malicious sites

Patchstack has committed to continuously monitoring any further attempts to exploit the vulnerabilities in the Houzez theme and plugin for WordPress. Apart from this, the website owners and administrators should prioritize the process of applying the available patches with the highest level of priority.

Network Security Checklist – Download Free E-Book


[ad_2]
Source link

PureCrypter Malware Targets Governments Through Discord

0
[ad_1]

PureCrypter delivers multiple types of malware and info-stealers, including Redline Stealer, Eternity, AgentTesla, Philadelphia Ransomware, and Blackmoon.

The cybersecurity researchers at Menlo Labs discovered an unknown threat actor exploiting an evasive malware campaign operated through Discord. In their campaign, the prime victims are government entities in North America and Asia-Pacific.

According to researchers, the attackers in this campaign are delivering the PureCrypter downloader, and their primary targets are government entities. The threat actor uses a compromised non-profit organization’s domain as their C2 center to deliver a second payload.

Researchers noticed that in this campaign, PureCrypter delivers multiple types of malware and info-stealers, including Redline Stealer, AgentTesla, Philadelphia Ransomware, and Blackmoon.

PureCrypter Malware Targets Governments Through Discord

How Was the Campaign Discovered?

Researchers wrote that they became suspicious after detecting that Menlo’s Cloud Security Platform had blocked archive files, which were password-protected, across numerous government customers across the North American and Asia-Pacific regions.

The attacks start with a phishing email that contains a malicious link to Discord. This URL launches a password-protected ZIP file containing the .NET malware downloader PureCrypter, which downloads a secondary payload from the attackers’ C2 infrastructure. 

The sample Menlo Labs analyzed downloaded AgentTesla, a widely used RAT and info stealer that can steal browser-based passwords, take screenshots, and log keystrokes after establishing a connection with an FTP server located in Pakistan.

On the other hand, victim data is stored on this server, which was observed in another campaign using OneNote to deliver malware.

“The FTP server appears to have been taken over and the leaked credentials for the domain were found online, thus suggesting that the threat actors used these credentials to gain access to the server.”

Menlo Labs

What is PureCrypter?

PureCrypter is a malware downloader capable of distributing a wide range of ransomware, malware, and information stealers. It was first detected in June 2022. Its creator, PureCoder, offers it for $59 per month or a one-time payment of $245 for life.

The developer recently expanded its features to include PureLogs logger and info stealer, which can steal data from crypto wallets, web browsers, and email clients, for just $99 a year or lifetime access for $99.

  1. Telegram and Discord Bots drop Malware
  2. Google Ads Malware Wipes Crypto Wallet
  3. Teen “Hackers” on Discord Selling Malware
  4. Hackers drop NjRAT in “Earth Bogle” attack
  5. Malware targets Discord users to steal data

[ad_2]
Source link

One UI 5.1 rolling out to OG Galaxy Z Flip & Galaxy A23

0
[ad_1]

Last week, Samsung released the One UI 5.1 update for the 5G model of the original Galaxy Z Flip. The company is now pushing the new One UI version to the LTE model as well. The update is also available for the Galaxy A23, a mid-range phone launched last year.

As of this writing, Samsung’s One UI 5.1 update for the Galaxy Z Flip LTE is currently rolling out to users in Australia. The new firmware build number for the first-ever clamshell foldable Galaxy smartphone in the region is F700FXXUAJWAD (via). The Korean behemoth should globally release the update over the next few days. The handset was sold in the US too, with both carrier-locked and unlocked options. One UI 5.1 should reach all of those phones soon.

That said, even the 5G model hasn’t received the new One UI version anywhere outside Switzerland so far. Samsung released the update in the European country last week but hasn’t expanded the release anywhere else. Hopefully, it will not take much longer. the new firmware version for the Galaxy Z Flip 5G in Europe is F707BXXU7JWAD. It may vary slightly in the US and other markets, but the content will mostly remain the same.

Speaking of content, this update brings plenty of goodies to Samsung’s first-gen Flip models. Firstly, you’re getting the February 2023 Android security patch that fixes more than 50 vulnerabilities across the Galaxy ecosystem. On top of that, there are tons of new features and improvements for your phone. New selfie effects, Shared Family Album, enhanced gestures for efficient multitasking, improved modes and routines, and dynamic widgets are a few major additions. You can check out Samsung’s official One UI 5.1 changelog for the Galaxy Z Flip 5G here.

Samsung’s Galaxy A23 is also getting One UI 5.1

Samsung has also released the One UI 5.1 update for the Galaxy A23. The device is picking up the update with firmware version A235FXXU2CWB4 in Ukraine. It is getting the February security patch and a host of goodies, though not as many as the Galaxy Z Flip or other flagship models. A wider One UI 5.1 rollout for the Galaxy A23 should be just around the corner. The handset wasn’t released in the US.

This is the humblest Galaxy phone to get the new One UI version so far. Part of the 2022 Galaxy A lineup, the device follows premium models Galaxy A33 5G, Galaxy A53 5G, and Galaxy A73 5G in the party. Samsung also released a Galaxy A23 5G last year, which arrived in the US too, but it has yet to get One UI 5.1. We will let you know when the rollout begins for the 5G model of this budget handset.


[ad_2]
Source link

Qualcomm CEO reveals Apple’s 5G modem launch date

0
[ad_1]

Qualcomm’s CEO, Cristiano Amon was speaking at MWC Barcelona today, and talked about Apple’s rumored 5G chipset. Amon believes that their own modem will be ready in 2024, but adds that “if they do need ours they know where to find us”. Basically, Amon saying “please still use our modem”.

Since the iPhone 12 lineup, when Apple added 5G support, they have been using Qualcomm’s 5G modems in conjunction with their own in-house chipset.

Apple’s 5G modem could be used in the iPhone 16 or the iPad first. It’s possible that Apple could use it in a lower-volume product at first, like an iPad Pro. While it is a popular iPad, it’s nowhere near as popular as the iPhone. Typically, Apple will sell around 10 million units just on the launch weekend of the new iPhone.

Qualcomm has been supplying 5G modems since 2020

Apple has been using Qualcomm’s 5G modems since 2020, when it added 5G to its iPhones. That was a big get for Qualcomm, since the iPhone does sell so many units. As mentioned above, Apple does typically sell around 10 million units in a single weekend after the device launches. That’s more than most Android phones will sell in their lifetime. So while Qualcomm was only selling modems and not the entire mobile platform, like a Snapdragon 8 Gen 2, it’s still a big customer for Qualcomm.

Amon does seem to be pretty bummed about Apple opting to use its own modem in the iPhone 16 next year. Again, that’s a big time customer for Qualcomm. Which will lose a lot of money with this move by Apple. But for Apple, this gives them more control over their iPhones, it also lowers the cost to build the iPhone. And it might also improve 5G connectivity on the iPhone. Which is definitely a good thing here.

Time will tell how good Apple’s first 5G modem will truly be. But in the past, their modems have been pretty good. Way better than the Pixel 6 modem that Google had.


[ad_2]
Source link

Apple iOS Vulnerability Could Expose Users’ Messages And Photos

0
[ad_1]

Apple silently patched a serious security vulnerability affecting iOS users that could expose data. Specifically, the flaw existed due to an improper patch for the previously known FORCEDENTRY vulnerability. An adversary could exploit the bug to access stored messages and photos in the target device.

Apple iOS Vulnerability Leaking Data

Researchers from Trellix have shared details about a new exploit affecting Apple iOS devices in a post. They demonstrated how a previously patched vulnerability could still let an adversary infiltrate iPhones.

Specifically, the researchers demonstrated bypassing the patch for the “FORCEDENTRY” bug discovered in 2021. As reported, FORCEDENTRY served as a major attack vector for the notorious Pegasus malware, targeting iOS 14.4 and 14.6 as a zero-day.

While Apple patched the vulnerability soon after receiving the bug report, it still posed a serious security risk. As Trellix explained, the second part of the vulnerability (as Google Project Zero demonstrated later) could allow sandbox escape. Exploiting this aspect could let an adversary bypass codesigning and execute arbitrary codes by abusing the “NSPredicate” class.

With this lead, Trellix researchers demonstrated how an attacker with code execution privileges could collect data from the target device via malicious NSPredicate. That includes accessing messages, calendar, location, address book, photos, and bypassing permissions.

The researchers demonstrated the exploit in the following video.

Apple Patched The Flaw

Upon discovering the vulnerability, the Trellix team contacted Apple to report the matter. They highlighted how this vulnerability affected both iOS and macOS systems alike.

Following their report, Apple developed a fix and released the patches with iOS 16.3 and macOS 13.2. The researchers further confirmed to have detected no active exploitation of the vulnerability before patching.

Hence, it means all users who updated their devices accordingly remained safe from risks. However, those who haven’t updated their systems should do so immediately to prevent any potential cyberattack.

Let us know your thoughts in the comments.


[ad_2]
Source link