Hackerzhome

hackerzhome-logo-bg

Cybersecurity news all over the world

HACKERZHOME NEWS

May 22, 2023

Monday

The 'Edge for Gamers' feature is coming to Microsoft Edge.

With a new feature called “Edge for Gamers” mode, Microsoft is stepping up its attempts to attract the gaming community.

This mode claims to improve the user experience both within and outside of gaming sessions.
According to Microsoft’s earliest statements, the Edge for Gamers mode will make a number of improvements possible.


According to reports, it would feature new sidebar applications tailored exclusively for gamers and a homepage dedicated to gaming.


One of the standout features is an efficiency mode created just for PC gaming, which is likely designed to reduce the number of resources used by the browser while maximizing in-game performance.


Additionally available are dark mode and themes designed specifically for video games, providing customization choices that complement well-liked gaming aesthetics.


The creation of the Edge for Gamers mode is still in its early phases.


At this time, switching on the mode has little effect on how the browser works. However, after activation, Twitch and Discord applications are added to the sidebar and users are instantly taken to the Edge Add-ons Store’s themes area.


Although the Edge for Gamers mode is still in its infancy, Microsoft’s action indicates a growing interest in developing products and features specifically for the gaming community.

NEWS 1
The 'Edge for Gamers' feature is coming to Microsoft Edge.

Breaking news

LIVE

You are not up to date!

Subscribe to our newsletter and stay updated on cybersecurity news

Google will deactivate accounts that have not been used for longer than two years.

A maximum of two years of inactivity is now permitted for personal accounts across all of Google’s services, per the revised policy.

The accounts “may” be destroyed after that point, together with all of their contents, settings, preferences, and user-saved data. This applies to all information kept on platforms including Google Docs, Google Drive, Meet, Google Calendar, Google Photos, and YouTube.

However, Google accounts for institutions like schools or corporations will be exempt from this new regulation.

According to Google, the policy change seeks to improve online security since inactive accounts frequently become targets of account theft, generally as a result of using outdated and weak passwords with no extra security measures.

This does not imply that all customers whose Google accounts have not been used for more than two years would have their accounts removed by the end of the year, though.

According to Google, it will begin with accounts that were never used after they were created and go forward carefully and gradually.

NEWS 2

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news:

May 22, 2023 /

Monday

Hackerzhome News

2

Have you heard?
KeePass Attack Helps Recover The Master Password In Cleartext; A Patch Is On The Way Know more!

Android phones are susceptible to brute-force fingerprint attacks.

Android phones are susceptible to brute-force fingerprint attacks.

‘BrutePrint,’ a novel technique developed by researchers at Tencent Labs and Zhejiang University, brute-forces fingerprints on contemporary smartphones in order to defeat user authentication and seize control of the device.

In order to break a code, key, or password and obtain unauthorized access to accounts, systems, or networks, brute-force assaults use several trial-and-error efforts.

The creators of the technical article posted on Arxiv.org discovered that fingerprint photos may be stolen by a man-in-the-middle (MITM) attack because biometric data on the fingerprint sensors’ Serial Peripheral Interface (SPI) was not effectively safeguarded.

Ten prominent smartphone models were used in tests for the BrutePrint and SPI MITM attacks, which were successful with an infinite number of tries on iOS and HarmonyOS (Huawei), and Android smartphones, respectively.

With BrutePrint, you may submit an infinite number of fingerprint images to the target device until one of them matches the user-defined fingerprint.

To perform a BrutePrint attack, the attacker needs physical access to the target device, access to a fingerprint database that may be obtained via academic datasets or biometric data dumps, and the required equipment, which costs around $15.

Since fingerprint matches function differently from password matches in that they use a reference threshold rather than a set number, attackers may manipulate the False Acceptance Rate (FAR) to increase the acceptance threshold and increase the frequency of matches.

NEWS 3

PyPI halts new projects and users due to a large amount of malware.

PyPI halts new projects and users due to a large amount of malware.
NEWS 4

New user registration and project uploads have been temporarily halted on PyPI, the official third-party registry of open-source Python programs, until further notice.

The sudden action comes as rogue users and software are flooding the register, making maintenance difficult.

The development of new projects and user accounts has been temporarily halted as of today on the Python Package Index, often known as PyPI.

Although the registry administrators have not identified the precise offenders (malicious actors and project names) that prompted them to halt new registrations on the site, the precautionary measure is anticipated to stave off attackers until a more long-term fix is sought.

The ‘Color-Blind’ virus was distributed using the malicious PyPI package Colorful in March 2023, according to risk consultancy company Kroll.

In the same month, Sonatype-identified PyPI packages’microsoft-helper’ and reverse shell were discovered to be dropping information thieves that exploited Discord to leak information.

Cloned CapCut websites provide malware that steals information.

Various malware strains are being sent to unwary victims using a new campaign that impersonates the CapCut video editing program.

ByteDance’s official video editor and creator for TikTok is called CapCut, and it offers features including picture-in-picture, stabilization, slow-motion effects, animation, color filters, and music mixing.

On Google Play alone, it has had over 500 million downloads, and its website receives over 30 million visits per month.

Users have been forced to look for alternate methods of obtaining the program due to the popularity of the application and widespread prohibitions in Taiwan, India, and other countries.

Threat actors take advantage of this, though, by building websites that disseminate malware that poses as CapCut installers.

Cyble, which claims to have seen two campaigns delivering several malware strains, found the dangerous websites.

No specifics regarding how victims are routed to these sites were given, although threat actors often utilize social media, search marketing, and black hat SEO to promote the sites.

Cloned CapCut websites provide malware that steals information.
NEWS 5

For placing advertisements and promotions in this newspaper, or anywhere on our website, contact us through email at [email protected] or fill out this contact form.

Share this news: