QUOTE OF THE DAY
Technology Is A Useful Servant But A Dangerous Master. – Christian Lous Lange
IPHONE X SUPPLY SHORTAGE ADDS MORE MISERY FOR FANS
Image Credits: appleinsider.com
With the launch of iPhone X, now everybody in the world is waiting to get their hands on the device, but rumors suggest there might be a delay.
IPHONE X: WILL SUPPLY MEET THE DEMAND?
With the 10th anniversary edition launch, the announcement of bezel-less iPhone X has piqued the interest of many brand loyalists as they wait to get the device in their own hands. However, it might be impossible to meet this excruciating demand, as unavailability of components might cause some serious delays in supply.
WHAT IS THE REASON FOR THIS BOTTLENECK?
Image Credits: firstpost.com
With everyone excited to get Face ID authentication and True Depth Camera features and try them on, this rumor might disappoint people. Adding more misery for enthusiastic buyers, the main reason for this delay is said to be the very features why people are dying to get iPhone X.
According to the report by The Wall Street Journal, the 3D-sensing components manufacturer is not able to produce the required modules to match the requirements, therefore it slows down the whole process. It is not clear which two of the three components, the Infrared camera, the Dot Projector or the Flood Illuminator that make True Depth camera work are short in supply.
The speculation might be true as it might be the underlying reason to not release iPhone X with iPhone 8 and 8 Plus.
So, one thing is clear, it is not the new OLED display that is standing in between you and your iPhone X.
RIPPER MALWARE TARGETS ATMS
Now hackers have a new toy, ATMs, a new medium to spread the wildfire of malware.
WHAT IS THE NEW THREAT?
Hackers in past might have gone to the ATMs and tried to inject them with malware to duped people out of money but with an increased risk of getting caught, hackers have turned to a new method of infecting ATMs.
As per the latest cyber threat reports, Trend Micro’s researchers bring the fact to light that there has been an influential increase of network-based attacks targeting ATMs. These attacks can be so immense that it can make ATMs splutter thousands of dollars without any physical interaction with the machine.
HOW DOES THE ATTACK WORK?
With this new technique to attack ATMs, the hacker doesn’t need to wait for night or doesn’t have to find an ATMs in an isolated place. All the ATMs are vulnerable to this attack and approachable as the attack appears as if someone is engaged in legitimate ATM activity.
In order to get into the depth of these clandestine techniques, Trend Micro teamed up with Europol’s European Cybercrime Center (EC3).
Image Credits: gizmodo.com
According to the notes, the hacking attack begins with sending phishing emails to bank employees to steal the credentials. Once gained the access, they move laterally through the bank’s network to get the control over the ATMs. To our dismay, some of the malware have the potential to delete the traces of the criminal activity on its own.
As access to the ATMs is gained, it forces the ATM to spit out the money and is collected by mules connected to hackers through an encrypted chat. Once the task is done, the money mule gathers the cash and moves to the next ATM that has been hacked and ready to spit out cash.
IS THIS THE FIRST TIME ATMS WERE TARGETED?
While ATM hacking incidents are common across the globe, those heists aren’t usually this high-tech. There was such an instance that took place in Thailand, robbing 21 ATMs with 12.29 million baht (about $346,000 USD) of cash. One of the most obtrusive attacks happened in July 2016, in which $2.4 million USD approx was stolen from 22 branches of First Commerce Bank, Taiwan and hackers were nowhere in the vicinity of the ATMs.