admin

Twitter, the Elon Musk-owned platform which is accelerating efforts to compete shoulder to shoulder with social media giants like Instagram and Facebook, is incorporating a new change. Starting Wednesday, June 7, Twitter Blue subscribers will have an hour to edit already posted tweets, a window that was restricted to only 30 minutes since the feature’s
0 Comments
Apple has acquired Mira, a Los Angeles-based AR startup that makes headsets for other companies and the US military, the Verge reported on Tuesday, citing a post from Mira CEO’s private Instagram account and a person familiar with the matter. This comes a day after Apple unveiled a costly augmented-reality headset called the Vision Pro,
0 Comments
The president of Microsoft said he was looking for solutions to try to get British approval for the software giant’s $69 billion (nearly Rs. 5,71,730 crore) acquisition of “Call of Duty” maker Activision Blizzard. British competition authorities blocked the biggest-ever deal in gaming in April, in a shock decision which Microsoft has since appealed. President
0 Comments
Jun 06, 2023Ravie Lakshmanan A Chinese-speaking phishing gang dubbed PostalFurious has been linked to a new SMS campaign that’s targeting users in the U.A.E. by masquerading as postal services and toll operators, per Group-IB. The fraudulent scheme entails sending users bogus text messages asking them to pay a vehicle trip fee to avoid additional fines.
0 Comments
Apple’s WWDC (Worldwide Developers Conference) 2023 kicks off tonight. The annual developer conference is expected to bring Apple’s highly rumoured mixed reality headset, several new Mac computers, iOS 17 and macOS updates, and other major software updates across Apple’s lineup of devices. The WWDC 2023 keynote begins at 10:30PM (IST), and we’re bringing you live
0 Comments
Jun 05, 2023Ravie LakshmananZero Day / Cyber Attack Microsoft has officially linked the ongoing active exploitation of a critical flaw in the Progress Software MOVEit Transfer application to a threat actor it tracks as Lace Tempest. “Exploitation is often followed by deployment of a web shell with data exfiltration capabilities,” the Microsoft Threat Intelligence team
0 Comments