FCC bars China Mobile’s bid to operate in the United States

The FCC will now shift its focus on existing Chinese carriers including China Unicom and China Telecom Corp. In a significant development, the Federal Communications Commission (FCC), voted unanimously to block China Mobile Ltd’s bid to provide communication services in the United States citing risks of espionage. China Mobile is owned by the Chinese government.…

Security researchers find more vulnerabilities in Intel’s, AMD’s and ARM Holdings’ chips

Known as Speculative Store Bypass or “Variant 4”, these new vulnerabilities have a low risk profile assigned to them partly due to the patches that were released earlier this month for the Spectre and Meltdown vulnerabilities. Security researchers from Alphabet’s Google and from Microsoft Corp have unearthed new security vulnerabilities that impact a broad range…

HSBC Holdings Pls completes world’s 1st finance transaction using blockchain technology

As per a study conducted by the United Nations, adopting blockchain technology could potentially boost the turnover of importers and exporters by 44% while slashing their cost by up to 31%. On Monday, in a significant development, HSBC Holdings Plc disclosed it has successfully completed the world’s first trade finance transaction using blockchain technology. The…

Microsoft issues security update for Intel buggy patch for Meltdown and Spectre

Affected users should manually download the security update from the Microsoft Update Catalog website. Software giant, Microsoft Corp has issued an emergency security update that plugs bugs in Intel Corp’s buggy Spectre firmware patch. Microsoft’s update comes nearly after a month following Intel’s confirmation that its chips had exploitable vulnerabilities, now known as Meltdown and…

U.S. lawmakers asks Intel, AMD and ARM Holdings to scope out the recently disclosed major flaws in their chips

These questions by the U.S. lawmakers underscores the fact that the U.S. Congress is sensitive to these critical vulnerabilities which can be exploited by state backed hackers to gain access to virtually any modern computing device. A Democratic U.S. lawmaker has requested a briefing on the recently disclosed critical vulnerabilities, Meltdown and Spectre, that hackers…

Cybellum’s researchers find a technique which can turn your AV against you

If you have data on your computer that is important, you need to watch the video mentioned below. It could stave off a ransomware attack. Security researchers from Cybellum have discovered a zero-day attack technique that hackers use to take control of your computer. The 0-day attacked is called DoubleAgent. Developers typically use Microsoft’s Application…