News

Tencent Shares Fall After Chinese Regulators Block Sales of “Monster Hunter”

Tencent Shares Fall After Chinese Regulators Block Sales of “Monster Hunter”

Tencent shares fell more than 3% last Tuesday after it was announced that the tech giant will not be able to sell a hugely popular game called “Monster Hunter: World” on its WeGame distribution platform. Chinese regulators reportedly banned the game for not meeting regulatory requirements. However, a source close to the matter said that the removal was due to bureaucratic infighting with the country’s new regulator. The tech giant’s gaming business has become a significant source of revenue, with titles like “Honor of Kings” boosting smartphone gaming revenues up by as much as 68%. Source: CNBC

Bitcoin Drops to $6000, Lowest Level of 2018

Bitcoin Drops to $6000, Lowest Level of 2018

Bitcoin fell to $5900 last Monday for the first time since June, taking the majority of other cryptocurrencies along with it. According to CoinDesk’s index data, the world’s biggest virtual currency by value went down by 4% before recovering to $6112. Meanwhile, Ethereum fell to its lowest level since September to $267.61, while Ripple retreated to 27 cents. CryptoCompare CEO Charles Hayter says that the downtrend was due to the postponement of a bitcoin exchange-traded fund (ETF) proposed by VanEck and Solid X.   Source: CNBC

Malaysia Places Fourth in AI Adoption in Southeast Asia

Malaysia Places Fourth in AI Adoption in Southeast Asia

According to a recent survey by IT market research and advisory firm IDC titled IDC Asia/Pacific Enterprise Cognitive/AI says that AI adoption in Southeast Asia is on the rise, with 34% of organisations in Malaysia revealing plans to adopt AI in the next two years. Malaysia also placed fourth with 8.1% of all companies being open to the adoption and integration of artificial intelligence into their operations. It is said that Malaysia’s increasing focus on AI is brought by its smart cities initiatives and applications in public safety and intelligent transportation. However, a these initiatives would need more time to […]

Indian Gov’t Asks Amazon to Set Up Local Servers for Protection of Customer Data

Indian Gov’t Asks Amazon to Set Up Local Servers for Protection of Customer Data

India’s Electronics and Information Technology Minister Ravi Shankar Prasad recently asked Amazon India head Amit Agarwal to set up servers within the country to prevent the unregulated migration of customers’ personal data. Prasad said that while big foreign companies are welcome in India, it is important that they keep the data of Indian customers in onshore servers and the consent of the subject is obtained. Amazon India has not yet made an official reply, but government officials said that the company is already making efforts towards the data protection of Indians. Source: Business Standard

Australian Encryption Bill Promises No Backdoors, but Still Full of Loopholes

Australian Encryption Bill Promises No Backdoors, but Still Full of Loopholes

It was recently reported that Australia’s Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, which was released on Tuesday, promises not to weaken encryption and will not compel providers to implement vulnerabilities into forms of electronic protections. However, it was pointed out that the Bill creates a framework for providing access to endpoint devices which means that messages can be intercepted before they are encrypted. It will also require providers to use software given by the government, which could include spyware. It was also pointed out that there was a possibility that providers may substitute a service they […]

Security Expert Reveals MacOS Malware Capable of Synthetic Mouse Clicks

Security Expert Reveals MacOS Malware Capable of Synthetic Mouse Clicks

Patrick Wardle of Digita Security revealed at the recently-held DefCon in Las Vegas a malware that can perform synthetic clicks on MacOS, which can allow attackers to bypass permission prompts and compromise the user’s system. Wardle said that such a malware, which synthetically interacts with the user interface, can be used to bypass layers of security so the attacker can access the user’s location, steal their contacts or even take over the computer’s kernel core system to fully control the computer. Wardle added that he came across the “synthetic clicks“ bypass technique by incorrectly pasting code.   Source: Wired

Firmware Vulnerabilities Found in Big Brand Android Models

Firmware Vulnerabilities Found in Big Brand Android Models

Security researchers revealed at DefCon last week around 47 vulnerabilities in the firmware and apps of 25 Android smartphone models, some even belonging to big brands including ZTE, Sony, Nokia, LG, Asus, and Alcatel. Some of the flaws can permit the attacker to access or send text messages from the user’s phone, take screenshots, record videos of the device’s screen, access the user’s contacts list, force installation of third-party arbitrary apps without the user’s knowledge or consent, and even wipe user data. Angelos Stavrou, CEO of Kryptowire, said that the sheer number of phone models and firmware makes it very […]

11-Year Old Gives Hacking Demonstration of US Voting System  

11-Year Old Gives Hacking Demonstration of US Voting System  

In a recent hacking competition sponsored by non-profit R00tz Asylum, 11 year old Bianca Lewis showed how easy it was for hackers to compromise the infrastructure of the US voting system. The contest was part of the recently held Def Con conference in Las Vegas which was attended by more than 300 young hackers. By attacking a replica website, Lewis showed that it was possible to change the number of votes or even delete candidates off the system. It was noted that Congress last month rejected an amendment that would have allotted $380m for boosting electoral security for 2019. Source: […]

Facebook Drops Content on 3D Printing of Guns

Facebook Drops Content on 3D Printing of Guns

Facebook said this week that it has removed content related to the 3D printing of firearms on its platform. The move comes as the debate on gun control intensifies in the US. A spokesperson said that instructions on how to manufacture guns using 3D printers go against the social network’s Community Standards, but it was not clarified if only posts would be removed and not pages.   The company however assured that it will be sharing an updated policy on the restricted product shortly. Source: Reuters

Platform for Selling of Exploits, Zero-Day Vulnerabilities Launched

Platform for Selling of Exploits, Zero-Day Vulnerabilities Launched

Dubai-based exploit buyer Crowdfense announced this week the launch of its platform where researchers can sell zero-day security flaws and exploit chains. Scheduled to be opened on September 3, the company’s Vulnerability Research Platform will serve as a venue for the submission, discussion, and sales of vulnerabilities. The platform will also offer step-by-step guides, technical evaluations, pricing and follow-up communication channels. The company’s bug bounty program, which was launched earlier this year, offers researchers rewards from $500,000 up to $3 million for zero-day bugs and partial exploit chains. Source: ZDNet