FCC bans DJI drones starting today – here’s what it means for you
Don’t panic: You can continue to fly your drone – for now. Here’s everything we know so far.READ MORE HERE…
PLUS: China’s Great Firewall springs a leak; FBI issues rare ‘Flash Alert’ of Salesforce attacks; $10m bounty for alleged Russian hacker; and more Infosec In Brief 15 ransomware gangs, including Scattered Spider and Lapsus$, have announced that they are going dark, and say no more attacks will be carried out in their name.… READ MORE HERE…
Read MoreThe iPhone 16 Pro is barely a year old, but there’s a strong argument for upgrading. Here’s my line of reasoning.READ MORE HERE…
Read MoreI’ve been slowly moving away from my Apple Watch, and with the AirPods Pro 3’s promising health features, I might never put it back on.READ MORE HERE…
Read MoreThe iPhone 17 is a clear step up from the iPhone 16 – but is the Pro model truly worth it this year? Here’s how it compares.READ MORE HERE…
Read MoreApple focused on its cutting edge hardware for the iPhone 17 launch, but also unveiled a couple groundbreaking AI features. Both could make a big difference in daily use.READ MORE HERE…
Read MoreAlthough it hasn’t been seen in the wild yet A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked Windows systems, making it the fourth publicly known bootkit capable of punching through the feature and hijacking a PC before the operating system loads.… READ MORE HERE…
Read MoreYou can use free ChatGPT or ChatGPT Plus to look for copuon codes. But one trick gets the best results.READ MORE HERE…
Read MoreA similar vuln on Apple devices was used against ‘specific targeted users’ Samsung has fixed a critical flaw that affects its Android devices – but not before attackers found and exploited the bug, which could allow remote code execution on affected devices.… READ MORE HERE…
Read MoreGet ready for a fight over who steers the global standard for vulnerability identification The Cybersecurity and Infrastructure Security Agency (CISA) nearly let the Common Vulnerabilities and Exposures (CVE) program lapse earlier this year, but a new “vision” document it released this week signals that it now wants more control over the global standard for vulnerability identification.… READ MORE HERE…
Read MoreDorm management refuses to cover costs after payment system borked More than a thousand university students in the Netherlands must continue to travel to wash their clothes after their building management company failed to bring its borked smart laundry machines back online.… READ MORE HERE…
Read More