New Zoom Vulnerability Lets Hackers Record Any Meeting Anonymously

The critical malware vulnerability discovered by IT security researchers at Morphisec enables hackers to voluntarily record Zoom sessions and capture chat text without any of the meeting participants’ knowledge or permission. What’s worse, the Zoom malware is even able to do this even though the host has disabled recording option for the participants. “The trigger (evading detection) is a malware that injects its code into a Zoom process without any interaction of the user and even if the host did not enable the participant to record....

December 10, 2022 · 2 min · 268 words · Lester Lang

Nexus 5X Can Run Windows 10 Mobile As Evidenced In This Video Techworm

Windows 10 Mobile is not without its problems, and there are a ton of fixes needed that will allow Windows Phones, particularly those with low-end hardware to run properly, but Nexus 5X is able to hold its own against the operating system, which is quite impressive to say the least. We have to say that the contributing factor for this accomplishment has to do with the hexa-core processor along with 2GB of LPDDR4 RAM....

December 10, 2022 · 1 min · 206 words · Denise Felmet

No Fixes Released Yet From Belkin For Zero Day Vulnerability In Its Router

0-days found in widely used Belkin router, fixes still unavailableNo fixes are made available till now for the zero day vulnerabilities of widely used Belkin N600 routers. The zero day were notified by Computer Emergency Response Team(CERT). “A LAN-based attacker can bypass authentication to take complete control of vulnerable devices.” The vulnerabilities affect Belkin N600 DB Wireless Dual Band N+ routers, model F9K1102 v2 with firmware version 2.10.17 and possibly earlier....

December 10, 2022 · 1 min · 177 words · Mary Cherry

No Pre Registration Required To Buy Micromax S Yu Yureka Smartphone On May 6 And 7Th

Micromax seems to have taken the decision to make the Yu Yureka smartphone freely available because of the competition it is facing in the sub Rs.10000.00 space from Xiaomi Redmi Note 4 and Motorola Moto G 2nd Gen smartphones. Micromax subsidiary, YU has announced the good news through its official Twitter account. They took to the blogging site to tweet about the open sale of YU Yureka on May 6th and May 7th that involves no registration and has no time constraints....

December 10, 2022 · 1 min · 212 words · Mercedes Tyson

Nokia N Series Smartphones To Make A Comeback At Mwc 2017 But With Android Techworm

This news will make some Nokia users nostalgic!!! If reports are to be believed, HMD Global Company is preparing to relaunch the once famous “N Series” at Nokia’s Mobile World Congress (MWC) event that kicks off on February 27. The new Nokia N series smartphones are rumored to consist of five new smartphones –N70, N80, N90, N91 and N92. The assumptions came to light after a trademark for “NSERIES” appeared at China’s SAIC (State Administration for Industry and Commerce) institution, filed by the Finnish company....

December 10, 2022 · 2 min · 369 words · Dorothy Sutton

North Korea Unveils Netflix Like Streaming Service Called Manbang Techworm

Dubbed ‘Manbang’ (“Mon-bahng”), which translates into ‘everywhere’ or ‘every direction’, the device will allow those with access to North Korea’s state-run internet service to “replay documentary films about the leadership and learn Russian and English languages,” using IPTV services, according to NK News. With the device, viewers can watch five different TV channels in real-time such as KCTV, Mansudae Television, Ryongnamsan TV, and find information related to the leader’s activities and Juche ideology....

December 10, 2022 · 2 min · 390 words · Robert Fiedler

Now Charge Your Smartphone With Energy From Plants Through E Kaia Portable Smartphone Charger

E-Kaia, a portable smartphone charger harnesses energy from plants for charging the smartphoneAn engineering trio has created a novel smartphone charger “E-Kaia” that takes energy from plants for charging the smartphone. It was in 2009, when these girls came up with an innovative idea of creating a smartphone charger that would work without electric power supply. At that time the girls were still in university at Duoc UC in Valparaíso and the Andres Bello National University, Chile....

December 10, 2022 · 3 min · 496 words · Roger Broege

Nvidia Announces The Geforce Rtx 2060 2070 2080 Super Graphics Cards

Just like the original RTX 20 series, these new graphics chips too are based on the Turing architecture as their predecessors and will include Ray-Tracing technology alongside Nvidia’s Deep Learning Super Sampling (DLSS). However, these now come with new GPU with additional CUDA cores, Tensor Cores, RT Cores, and faster clock speeds. “The ecosystem driving real-time ray tracing is immense — tens of millions of GPUs, industry standard APIs, leading game engines and an all-star roster of game franchises,” said Matt Wuebbling, head of GeForce Marketing for Nvidia....

December 10, 2022 · 2 min · 352 words · Nancy Iannotti

Official Twitter Account Of The Australian Electoral Commission Aec Got Hacked Techworm

December 10, 2022 · 0 min · 0 words · Annette Thomas

Old Version Of Microsoft S Windows Core Polaris Leaked Online

For those unaware, back in 2018, Microsoft was secretly working on a modular operating system for Windows codenamed “Windows Core OS” through which it initially created two flavors of Windows – Polaris for traditional laptops and Andromeda for foldable mobile devices. Windows Core OS was designed so that it could be run across different platforms and form-factors, such as phones, 2-in-1s, dual-screen PCs, and collaboration devices. However, Microsoft cancelled the launch of these versions of the OS in favor of a new SKU of Windows Core OS called “Windows 10X” (previously known as Windows Lite/Santorini)....

December 10, 2022 · 2 min · 394 words · Dominique Young

Oracle Announces Java Se 9 And Java Ee 8 Techworm

JDK 9 is a production-ready implementation of the Java SE 9 Platform Specification, which was recently approved along with Java EE 8 in the Java Community Process (JCP). On the other hand, with updates to eight major specifications, Java EE 8 looks to streamline and simplify the Java EE platform for the cloud and micro services. Java SE 9 The star feature of Java SE 9 is the Java Platform Module System, also known as Project Jigsaw, whose goal is to help developers reliably assemble and maintain sophisticated applications....

December 10, 2022 · 4 min · 722 words · Amber Bowen

Pentagon To Reward Hackers For Finding Security Problems In Defense Sites Techworm

Participants need to register to take part in the program and must be US citizens. The application page says, “If you have information related to security vulnerabilities in the online services listed in scope below, we want to hear from you.” U.S. officials have stressed that they are not going to include any kind of sensitive “mission-facing” computer systems throughout the program. Further, all hackers must undergo a background check and meet other qualifications....

December 10, 2022 · 3 min · 486 words · Jennifer Woods

Plex Adds Web Shows Online To Watch For Free

The name of this free service is Plex Web Shows. It is currently in beta version and contains high-quality episodes from a range of publishers like The New Yorker, Conde Nast, FailArmy, NerdWire etc. Talking about the website interface then it seems to be very neat and clean. People are loving it as it not only offers tv shows online for free but also has many handy features in it....

December 10, 2022 · 1 min · 200 words · Alexander Featherstone

Poodle Vulnerability Rises Again This Time In Tls

Poodle 2.0 vulnerability affects cryptography ciphers less than TLS 1.2What is PoodleWhat is new PoodleThreat Mitigation Qualys says that the Poodle vulnerability has resurfaced again, this time in the Transaction Layer Security (TLS). The new vulnerability which has been designated CVC-2014-8730, the threat vector exploits the same class of problem as old vulnerability. That is making an error in handling the padding and allowing the attacker to steal steal “secure” HTTP cookies, authorization tokens and other data from the victim....

December 10, 2022 · 3 min · 518 words · Irene Mitchell

Powerful Opera Crypto Browser Released For Ios

Opera Crypto Browser is now available on iOS After arriving on Android, Windows, and Mac; Opera Crypto Browser has now arrived across iOS as well. This will give iPad and iPhone users an unparalleled experience with an assortment of features built-in to the browser. The app is based on crypto and Web 3 technologies. The developers have joined hands with Nervous, Solana, Polygon, Handshake, Unstoppable Domains, Celo, and ENS to make the browser a truly collaborative reflection....

December 10, 2022 · 1 min · 205 words · David Yates

Redhack Hacks Into Turkey S Electric Distribution Company Website Delete Bills Worth 1 5 Trillion Turkish Lira

RedHack hack into Turkey’s Electric Distribution company website, delete bills worth 1.5 trillion Turkish Lira.Who are RedHackVideo https://twitter.com/RedHack_EN/status/533247883815178240 This is serious loss for the Turkish electricity distribution company if the claims made by the RedHack hackers are found to be true and the Turkish Electric Distribution company authorities do not have any backup to the website having the bill and liabilities details. Who are RedHack Redhack (K?z?l Hackerlar, K?z?l Hackerlar Birli?...

December 10, 2022 · 2 min · 240 words · Troy Carter

Remove Icloud Symbol Next To Apps On Iphone Ipad

Well, in this article we will share everything you need to know about the white iCloud symbol next to the apps on iPhones and iPads followed by an easy solution to get rid of or remove the cloud icon below the apps on iPhones. What Does The iCloud Symbol To Apps on iPhone Mean? The white iCloud symbol appears next to an app when it has been offloaded from your iPhone....

December 10, 2022 · 3 min · 598 words · Johnny Smith

Researcher Discovers Zero Day Flaws In Dolphin And Mercury Browsers For Android

One of the browsers is Dolphin for Android. This browser is mildly popular among Android users with around 5 million downloads. A self confessed Java nerd, @rotlogix has discovered a zero-day in Dolphin browser which can be exploited by hackers to remotely execute files. The flaw in Dolphin lies in the way it download and applies themes. An attacker with the ability to control the network traffic for users of the Dolphin Browser for Android, can modify the functionality of downloading and applying new themes for the browser....

December 10, 2022 · 2 min · 348 words · Whitney Sandage

Researcher Tears Apart A Android Password Manager App

Many services offer such password management Apps for Android. Bughardy targeted one of those however he has chosen not to name it till the App publisher releases a patch fixing the vulnerability he discovered. He says on his blog post, “Hello everyone, in this post I would like to analyze an Android application which purpose is to manage and generate passwords securely.” Bughardy says the App he chose claimes to offer DES encryption on its Google Play listing....

December 10, 2022 · 3 min · 432 words · James Mcbride

Researchers Hack A Computer Using Dna Techworm

Researchers at the University of Washington claims to have successfully injected a malware program into a DNA sample and use it to hack into a computer that analyzes the sequence of that DNA. In other words, so that when a gene sequencer analyzes it the resulting data becomes a program that corrupts gene-sequencing software and takes control of the underlying computer. The team also explained its work in a more readable essay on its website that provides suggestions to tighten computer security and privacy protections in DNA synthesis, sequencing, and processing....

December 10, 2022 · 3 min · 470 words · Charles Miller