1. Researchers at Cado Security have identified a new malware named 'Cthulhu Stealer' targeting macOS users, disguising as legitimate software like CleanMyMac and Grand Theft Auto IV. 2. The malware, similar to Atomic Stealer, attempts to steal passwords, credentials, cryptocurrency wallets, and game account data. 3. Users are advised to download software only from the Apple App Store or official vendor websites to avoid potential malware threats.
Recent #security news in the semiconductor industry
1. Ring introduces a new $99.99 Battery Doorbell with 'Head-to-Toe HD' video recording, offering a 66% taller view and color night vision. 2. The doorbell features a push-pin mount design for easier installation and claims to have up to 23% longer battery life. 3. The new model is available for preorder and will release on September 4, 2024.
➀ Introduces the CC2560A, the world's first RISC-V core super SIM chip, designed for multi-interface, high-security, and large-capacity smart card applications. ➁ Features a 32-bit RISC-V embedded security processor with a 120MHz clock speed, significantly enhancing transmission rates and computational power. ➂ Emphasizes advanced security measures including hardware-level encryption, EAL5+ certification, and support for international and national cryptographic algorithms.
➀ ZeroEyes introduces ZeroEyes One (ZEO), an AI-powered gun detection solution for small businesses and private residences. ➁ ZEO can be deployed on existing digital IP cameras and is designed to enhance security and protect against gun-related violence. ➂ The solution includes a 24/7/365 operations center staffed by military and law enforcement veterans to verify threats and alert local authorities.
1. A critical zero-click security flaw in all versions of Windows allows for wormable remote code execution; 2. Microsoft has assigned a severity score of 9.8/10 to CVE-2024-38063; 3. The vulnerability was discovered by Chinese researcher Xiao Wei and has been patched by Microsoft, along with other zero-day vulnerabilities.
1. An app called Showcase.apk, designed for Verizon in-store demos, has left multiple generations of Pixel smartphones vulnerable to various attacks since 2017. 2. The app, pre-installed in Pixel firmware, allows potential attackers to execute code or shell commands with system privileges, posing significant security risks. 3. Google is committed to removing the app from all affected devices, but a patch for the vulnerability is yet to be released.
➀ Microchip Technology has expanded its TrustFlex secure key provisioning service with three new ICs. ➁ These ICs are designed for secure storage and are used alongside microcontrollers or microprocessors to protect secret keys from hacking. ➂ The new devices are part of the TrustFlex platform, which includes pre-configured use cases and customizable cryptographic keys.
➀ AMD has announced that it will not patch all chips affected by the 'Sinkclose' vulnerability, including Ryzen 3000, 2000, and 1000 series. ➁ Most recent AMD processors have received mitigation options, but older models like Ryzen 3000 and older, and Threadripper 2000 and older, are not included. ➂ All Ryzen Embedded and EPYC Embedded systems will receive an update to patch the vulnerability.
1. Samsung is addressing a major security vulnerability affecting millions of Galaxy devices, originally thought to be limited to Google's Pixel devices. 2. The vulnerability, CVE-2024-32896, is an elevation of privilege flaw, and Samsung aims to release a fix by August. 3. The update rollout may vary depending on network providers and device models.
❶ The Los Angeles Police Department has issued a warning to residents about burglars using Wi-Fi jammers to disable security cameras and smart doorbells. ❷ The LAPD provided a security checklist, recommending hard-wiring alarm systems and using modern tech like Apple AirTags for enhanced security. ❸ Wi-Fi jammers, though illegal and easily obtainable, pose a significant threat to home security systems.
1. Amazon Prime Day offers up to 60% off on Blink Outdoor 4 security cameras and Ring Video Doorbell. 2. The Blink Outdoor 4 bundle includes five cameras with 1080p live view, infrared night vision, and two-way audio, powered by AA lithium batteries lasting up to two years. 3. The Ring Video Doorbell features 1080p HD video, improved motion detection, and can be controlled via Alexa-enabled devices.
1. The National Inspection Team is tasked with reviewing the safety of innovative services before they are released to the market from a national perspective; 2. The team is composed of experts from various fields, including consumer groups, ICT associations, and insurance professionals; 3. The focus of the third phase includes enhancing user safety, preventing and responding to accidents, protecting users, and minimizing security threats through platform vulnerability analysis.
1. Google has expanded its dark web monitoring tool to all Google account holders, previously only available to Google One subscribers. 2. Users can input personal information on the 'Results About You' page to check if their data appears on the dark web. 3. Google promises not to use the provided data for personalized ads or share it across its products.
1. Kakao Cloud hosts an AI developer bootcamp leveraging NVIDIA GPUs; 2. Kim Tae-jin of RaonSecure receives Prime Minister's commendation for digital development contributions; 3. Park Chan-eom of Stealien receives Presidential commendation for cybersecurity contributions.
1. Symantec has reported a smishing campaign targeting Apple users in the US, aiming to take over their Apple IDs. 2. The attack involves an SMS message from a fake Apple, prompting users to visit a link and complete an urgent iCloud request. 3. Users are advised to be cautious of SMS messages with links and to verify directly through official company channels.
1. Vymanik Aerospace specializes in custom drone manufacturing and offers personalized solutions for aerial surveillance, inspection, and mapping. 2. The company ensures reliability of drones in extreme environments through meticulous crafting and timely after-sales services. 3. Vymanik Aerospace's target audience includes government agencies, private enterprises, and various industries requiring aerial solutions.
1. Discuss the application of Raspberry Pi 4 in enhancing building security; 2. Explore the cost-effective solution for managing access points in multi-dwelling communities; 3. Highlight the reliability and efficiency of using Raspberry Pi 4 for security purposes.
PreviousPage 4 of 4 pages