Secret Chat in Telegram Left Self-Destructing Media Files On Devices – Tempemail

Popular messaging app Telegram fixed a privacy-defeating bug in its macOS app that made it possible to access self-destructing audio and video messages long after they disappeared from secret chats. The vulnerability was discovered by security researcher Dhiraj Mishra in version 7.3 of the app, who disclosed his findings to Continue Reading

LodaRAT Windows Malware Now Also Targets Android Devices – Tempemail

A previously known Windows remote access Trojan (RAT) with credential-stealing capabilities has now expanded its scope to set its sights on users of Android devices to further the attacker’s espionage motives. “The developers of LodaRAT have added Android as a targeted platform,” Cisco Talos researchers said in a Tuesday analysis. Continue Reading

MediaTek Helio G95 to Power Gaming Devices in South Africa – Tempemail

Image sourced from 9to5Google MediaTek has launched its gaming chip, the Helio G95, in South Africa. Enhanced with MediaTek HyperEngine gaming technology, the G-series chip features multi-camera support, unrivalled connectivity, and AI Super-Resolution for video streams. The MediaTek Helio G95 is expected to offer gaming enthusiasts faster performance and high-end Continue Reading

OPPO Partners with MTN to Offer Affordable Range of Devices – Tempemail

OPPO has joined forces with MTN South Africa to introduce the A15 and A53s devices. This collaboration is said to make state-of-the-art technology available at more affordable rates. Here’s a closer look at the OPPO A15 and A53s devices:   OPPO A15 OPPO A53s  Screen Size and resolution 16.52” with Continue Reading

New Matryosh DDoS Botnet Targeting Android-Based Devices – Tempemail

A nascent malware campaign has been spotted co-opting Android devices into a botnet with the primary purpose of carrying out distributed denial-of-service (DDoS) attacks. Called “Matryosh” by Qihoo 360’s Netlab researchers, the latest threat has been found reusing the Mirai botnet framework and propagates through exposed Android Debug Bridge (ADB) Continue Reading

Critical Bugs Found in Popular Realtek Wi-Fi Module for Embedded Devices – Tempemail

Major vulnerabilities have been discovered in the Realtek RTL8195A Wi-Fi module that could have been exploited to gain root access and take complete control of a device’s wireless communications. The six flaws were reported by researchers from Israeli IoT security firm Vdoo. The Realtek RTL8195A module is a standalone, low-power-consumption Continue Reading

Hackers Exploiting Critical Zero-Day Bug in SonicWall SMA 100 Devices – Tempemail

SonicWall on Monday warned of active exploitation attempts against a zero-day vulnerability in its Secure Mobile Access (SMA) 100 series devices. The flaw, which affects both physical and virtual SMA 100 10.x devices (SMA 200, SMA 210, SMA 400, SMA 410, SMA 500v), came to light after the NCC Group Continue Reading

New Attack Could Let Remote Hackers Target Devices On Internal Networks – Tempemail

A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network, according to the latest research. Detailed by enterprise IoT security firm Armis, the new attack (CVE-2020-16043 and CVE-2021-23961) builds on the previously disclosed technique to bypass routers and Continue Reading

Apple says iPhone 12’s may Interfere with Medical Devices – Tempemail

Apple has revealed that the magnets in its iPhone 12 devices could interfere with medical devices. In a blog post, the tech giant says that “[iPhones] contain magnets as well as components and radios that emit electromagnetic fields. All MagSafe accessories (each sold separately) also contain magnets—and MagSafe Charger and Continue Reading

Attackers Abusing Citrix NetScaler Devices to Launch Amplified DDoS Attacks – Tempemail

Citrix has issued an emergency advisory warning its customers of a security issue affecting its NetScaler application delivery controller (ADC) devices that attackers are abusing to launch amplified distributed denial-of-service (DDoS) attacks against several targets. “An attacker or bots can overwhelm the Citrix ADC [Datagram Transport Layer Security] network throughput, Continue Reading