Google agreed to pay $155 million (nearly Rs. 1,300 crore) to settle claims by California and private plaintiffs that the search engine company misled consumers about how it tracks their locations, and used their data without consent. Both settlements resolve claims that the Alphabet unit deceived people into believing they maintained control over how Google
0 Comments
Apple Watch Series 9 and Apple Watch Ultra 2 were launched by the company alongside the iPhone 15 series of smartphones at the company’s September launch event on Tuesday. While Apple’ did not introduce major improvements related to health measurement this year, the company teased support for a new Double Tap gesture that will allow
0 Comments
Sep 15, 2023THNPrivacy / Online Security Google has agreed to pay $93 million to settle a lawsuit filed by the U.S. state of California over allegations that the company’s location-privacy practices misled consumers and violated consumer protection laws. “Our investigation revealed that Google was telling its users one thing – that it would no longer
0 Comments
iPhone 15 series’ battery capacities and wattage details have reportedly been revealed thanks to a regulatory database. Apple does not publish details of the batteries in its smartphones, aside from battery backup — in hours. However, a new report reveals that the iPhone 15 Pro models are equipped with slightly larger batteries than last year’s
0 Comments
Alphabet’s Google has given a small group of companies access to an early version of Gemini, its conversational artificial intelligence software, The Information reported on Thursday, citing people familiar with the matter. Gemini is intended to compete with OpenAI’s GPT-4 model, according to the report. For Google, the stakes of Gemini’s launch are high. Google
0 Comments
Sep 14, 2023THNEndpoint Security / Vulnerability A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could be exploited by threat actors to run malicious code on vulnerable Linux and macOS systems. “Using environment variable poisoning, attackers could chain these vulnerabilities to elevate privileges and run
0 Comments