Skip to main content

Posts

Apple condemns Pegasus spyware attack, says it is working on added protection

  Apple condemns Pegasus spyware attack, says it is working on added protection..  Apple has also noted that such attacks do not affect an overwhelming number of users and has said that the company is now working on added protections. HIGHLIGHTS According to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software. Apple called such attacks “highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals.” The leaked database shows that iPhones running iOS 14.6 contain a zero-click iMessage exploit and this exploit could have been used to install Pegasus software Apple , the tech giant which emphasises user privacy, was a victim of Pegasus spyware attack that snooped on journalists, activists and some government officials. In fact, according to the forensic methodology report by Amnesty, Apple’s iPhone is the easiest to snoop on using the Pegasus software. The l

Twitter Gets ‘One Last Notice’ from Government to Comply With New IT Rules

 Twitter Gets Government says the last notice to Twitter is a gesture of goodwill and failure to adhere will lead to consequences. HIGHLIGHTS Twitter has been warned by the government over new IT rules The platform is yet to appoint grievances officers in the country IT ministry brought its new regulations into place on May 2 Citing non-compliance of New Intermediary Guideline Rules by Twitter, the Union Ministry of Electronics and Information Technology (MeitY) on Saturday sent a final communication to Twitter asking them to comply immediately with the requirements of the new guidelines failing which resultant consequences as enjoined in the law shall follow. A letter issued by the Ministry to the social media platform stated that the New Intermediary Guideline Rules have become effective from May 26. After expiry of three-month period given to social media intermediaries for compliance, Twitter is yet to appoint India based Chief Compliance Officer, Nodal Contact Person, and Grievanc

BITCOIN TRADES

Crypto exchange Binance under investigation for facilitating illegal Bitcoin trades HIGHLIGHTS Binance is reportedly under investigation in the US. The investigation intends to find out if Americans were able to make illegal trades through Binance. Officials who handle money laundering and tax offences are looking into the matter C ryptocurrency exchange Binance is reportedly undergoing an investigation for possibly facilitating illegal trades through its platform. The exchange might have helped in Bitcoin transactions worth around $756 million in 2019 that were associated with criminal activities. A recent report by Bloomberg highlights the ongoing investigation by the Internal Revenue Service and the Department of Justice, US. Binance is being investigated on the possible charges by officials who particularly handle money laundering and tax offences. The investigation aims to find out if Americans were able to make illegal trades through Binance by buying derivatives linked to digita

WE HAVE NO REASON TO BELIEVE 5G IS SAFE

We Have No Reason to Believe 5G Is Safe The technology is coming, but contrary to  what some people say  there could be health risks The telecommunications industry and their experts have accused many scientists who have researched the effects of cell phone radiation of "fear mongering" over the advent of wireless technology's 5G. Since much of our research is publicly-funded, we believe it is our ethical responsibility to inform the public about what the peer-reviewed scientific literature tells us about the health risks from wireless radiation. The chairman of the Federal Communications Commission (FCC) recently announced through a press release that the commission will soon reaffirm the radio frequency radiation (RFR) exposure limits that the FCC adopted in the late 1990s. These limits are based upon a behavioral change in rats exposed to microwave radiation and were designed to protect us from short-term heating risks due to RFR exposure.   Yet, since the FCC adopted

INTERNET OF THINGS (IOT)

  Internet of Things (IoT) Another promising new technology trend is IoT. Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. Hence, the Internet of Things, or IoT. The Internet of Things is the future, and has already enabled devices, home appliances, cars and much more to be connected to and exchange data over the Internet. As consumers, we’re already using and benefitting from IoT. We can lock our doors remotely if we forget to when we leave for work and preheat our ovens on our way home from work, all while tracking our fitness on our Fitbits. However, businesses also have much to gain now and in the near future. The IoT can enable better safety, efficiency and decision making for businesses as data is collected and analyzed. It can enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet. And we’re only in the beginning stages of this new te

BLOCKCHAIN

BLOCKCHAIN TO PLAY A LARGER ROLE Blockchain seems complicated, and it definitely can be, but its core concept is really quite simple. A blockchain is a type of database. To be able to understand blockchain, it helps to first understand what a database actually is.  A database is a collection of information that is stored electronically on a computer system. Information, or data, in databases is typically structured in table format to allow for easier searching and filtering for specific information. What is the difference between someone using a spreadsheet to store information rather than a database? Spreadsheets are designed for one person, or a small group of people, to store and access limited amounts of information. In contrast, a database is designed to house significantly larger amounts of information that can be accessed, filtered, and manipulated quickly and easily by any number of users at once. Large databases achieve this by housing data on servers that are made of powerful

EDGE COMPUTING

EDGE COMPUTING Timeline of Computing The timeline of computing looks something like this: At first, there was one big computer; after that came the UNIX era; then we were introduced to personal computers, which led to the cloud computing era. And now, we find ourselves in the next stage of computing, named the Edge computing era. Nowadays we use our personal computers to access centralized services such as Gmail, Google Drive, cloud storage, office 365… The personal assistants on our smartphones and smart speakers are powered by centralized cloud artificial intelligence. We can say with certainty that the new opportunities of cloud services are located at the “EDGE.” Even though we are still in the cloud computing era – we can say that our cloud infrastructure relies much on hosting companies and compute power of the very few who are providing it for us: Amazon, Microsoft, IBM, and Google. Why do we call it Edge? The word Edge is used in the context of geographic distribution. Edge com