Newsletter

Passkey: The Next Generation of Secure Authentication

(Photo = Igloo Corporation) [애플경제 이윤순 기자] It is emphasized that passwords are no longer secure as a security device. Since many security incidents involving hijacking and hacking occur, this is recognized as an insecure access method. As a result, big tech companies like Apple, Google and Amazon are introducing a new login method called […]

Indian APT Group Targets Pakistan with Spyware and Romance Scam Strategy

Another attack was discovered between India and Pakistan, who are close friends. This time Indian hackers targeted individuals and organizations in Pakistan. Indian hackers, who mainly approached the romance scam strategy, even fooled Google Play. [보안뉴스 문가용 기자] Patchwork, an Indian APT group, was recently discovered to be distributing six malicious apps through the official […]

Root Access Vulnerability Discovered in GNU C Library of Linux Ecosystem

Summary: According to the security blog Security Affairs, a root access vulnerability has been discovered in the GNU C library (glibc) of the Linux ecosystem. According to security firm Qualys, the vulnerability is called CVE-2023-6246 and was discovered in several Linux distributions. It is a type of heap buffer overflow vulnerability, and if exploited, it […]

The Impact of Artificial Intelligence on Consumer Electronics: Privacy and Security Concerns

Consumer electronics products are expected to hit the market this year with a number of innovations. In particular, it is clear that the combination with artificial intelligence is becoming a major trend and establishing itself in this field. In addition, they do not pay much attention to privacy and data security. [보안뉴스=네이트 넬슨 IT 칼럼니스트] […]

Security Vulnerability in Opera: MyFlaw and MyFlow Feature Detected and Patched

Summary: According to Hacker News, a foreign security news outlet, a security vulnerability has been discovered in Opera, a popular web browser. It has been analyzed that if the exploit is successful, the attacker will be able to execute any file on the victim’s operating system. This vulnerability was named MyFlaw. This is because the […]

The Rise of Cyber Attacks Disguised as ChatGPT and Marketing SW Development Kits

Cyber ​​attack screen disguised as ChetGPT. (Source = ESET, Tech Republic) [애플경제 이윤순 기자] As the end-of-year holiday season approaches, spyware masquerading as ChatGPT or marketing SW development kits and cryptocurrency-stealing malware appear to be on the rise. According to the results of a recent survey conducted by global cybersecurity companies ESET, Dr. Web and […]

Apple Introduces New Guidelines to Strengthen User Privacy Safeguards in API Usage

Apple Introduces Stronger User Privacy Measures for API Usage In a move to bolster user privacy safeguards, Apple has recently released new guidelines for developers. These guidelines emphasize the need for a clear and detailed explanation of the purpose of API usage in app development. Although the announcement was made at a developer conference last […]

Genbleed Vulnerability Puts Many Architectures at Risk: Urgent Microcode Update Required

Multiple Architectures at Risk from Genbleed Vulnerability, Urgent Microcode Update Required Multiple computer architectures are facing a potential security threat due to the recently discovered Genbleed vulnerability in AMD’s Zen2 series CPUs, as reported by renowned security expert Tarvis Ormandy. Exploiting this vulnerability could result in the compromise of sensitive data. The vulnerability, identified as […]

Genbleed Vulnerability: Threat to Multiple Architectures Requires Microcode Update

Multiple Architectures at Risk from Genbleed Vulnerability: Urgent Microcode Update Required Security experts have identified a new vulnerability in AMD’s Zen2 series CPUs, posing a significant threat to various architectures. If exploited, this flaw, known as CVE-2023-20593, could result in the unauthorized access and theft of sensitive data, warns prominent security analyst Tarvis Ormandy. Further […]