How to Control iOS App Permissions

Mobile apps are a universal gateway to all kinds of multi-purpose functionality. With iOS apps, permissions allow you to seamlessly tag photos and videos with your location, permit video apps to use your camera and microphone, allow map apps to determine your exact location to give you proper directions, and let weather apps give you…

Should you be Worried About Them?

When Google started pre-announcing broad core algorithm updates back in 2019, the SEO community rejoiced. However, Google makes changes every day in their algorithm and thousands every year. Broad core algorithm updates happen multiple times a year, but there are algorithm updates that happen more frequently.  Their effects are unfelt at times but often they…

5G lab backs IoT firms working in automotive, logistics, healthcare and robotics

5G Open Innovation Lab also supporting IoT lifecycle management, eSIM specialists The Seattle-based 5G Open Innovation Lab, which bills itself as an “applied innovation ecosystem,” this week announced its third round of participating companies. Among the 15 companies selected, there’s a strong focus on not just IoT applications for vertical industries but also for broader…

A New Android Zero-Day Vulnerability Is Under Active Attack

Google has disclosed that a now-patched vulnerability affecting Android devices that use Qualcomm chipsets is being weaponized by attackers to launch targeted attacks. Tracked as CVE-2020-11261 (CVSS score 8.4), the flaw concerns an “improper input validation” issue in Qualcomm’s Graphics component that could be exploited to trigger memory corruption when an attacker-engineered app requests access…

US plans ‘aggressive’ cyber offensive against Russia in retaliation for SolarWinds attack

The Biden administration is planning an “aggressive” cyber offensive against Russia in retaliation for the devastating SolarWinds attack that was traced back to the Kremlin. According to The Telegraph, the attack is expected within the next fortnight and will not target civilian structures or networks. Both US government agencies and private companies were infiltrated as…