Sweden, June 15 - In a decisive move to adapt to the new normal concept of everyday life caused by the COVID-19 pandemic, Wallex is taking its oversight role to the next level. Unprecedented new to protect your customers from their turmoil. and at the same time provide new opportunities for low-sponsored and sponsored communities. Impact of coronavirus. Simone Mazzuca, Director of Wallex, said in a recent interview, right now, the recent interview of COVID-19. The majority of them who used to live in cities close to different support systems can now see they move to rural areas with little or no access to hospitals, schools, and shops. , banks, financial institutions and other funding or lending agencies, More Mazzuca. Forbes reports that the US unemployment rate rose to 14.7% in April alone, with nearly 21 million jobs removed, while the United Kingdom continued its efforts to reduce the impact of the pandemic. and avoid falling into deeper recessions.
The Internal Revenue Service (IRS) won a lawsuit in which they asked a Maryland couple to liquidate their bitcoins to pay a $ 1.1 million tax debt. Alexander and Laura Strashny proposed to the IRS to pay their 2017 tax debt, created from non-cryptocurrency operations, in installments over a six-year period. But after seeing Strashny's $ 7 million worth of crypto assets, taxpayers rejected the proposal, emphasizing that the couple sold part of their bitcoin and immediately settled their debt. enough.
The Digital Advertising Alliance (DAA) is a consortium of the leading national advertising and marketing trade groups that together deliver effective, self-regulatory solutions to online consumer issues. About the Associations Participating in the DAA 4A's Logo Image - American Association of Advertising Agencies The 4A's is the American Association of Advertising Agencies, the national trade association of the ad agency business. It represents more than 1,100 member agency offices in the United States that employ over 65,000 people, offer a wide range of marketing communications services, and place 80 percent of all national advertising. The management-oriented association helps its members build their businesses, and acts as the industry's spokesman with government, media, and the public sector.
Wi-Fi 6 is 4 times faster than the previous generation, wider network coverage, supports simultaneous connection of thousands of devices as well as the MU-MIMO standard. The 802.11ax Wi-Fi connection protocol started to develop in 2018 to replace the 802.11ac standard which is gradually overloaded due to the growing number of devices that need to connect, especially mobile devices, home smart ... The new standard officially recognized by the Wi-Fi Alliance (Wi-Fi Alliance) as Wi-Fi 6 and provides certification to device manufacturers using this wireless connection. in September last year.
The bug in Apple's default Mail app has been on both iPhone 2Gs running iOS 3.1.3 since 2010. MailDemon is considered one of the longest unpatched vulnerabilities on Apple phones. At the end of April, ZecOps security experts said this vulnerability allows hackers to silently attack iPhones and iPads running iOS 6 (September 2012), from iPhone 5 onwards, to the latest iOS, through Mail application. Meaning, half a billion iPhones and iPads are at risk of being hacked via email.
Apple has just announced the award for those who can detect errors on its system, with the lowest 25,000 USD, the highest one million. In particular, errors such as restricting unauthorized control of iCloud account, unauthorized application access to sensitive data in small amounts, if detected, will be rewarded with 25,000 USD. Meanwhile, other less serious errors such as unauthorized access to "sensitive" data from the lock screen or enforcement of interference codes to the device's core will receive higher rates, from $ 50,000 to $ 200,000.
Microsoft is developing a feature to protect all Reply to emails for Office 365 and Exchange Online to prevent email storms. "Email storm" is a situation in which hundreds or even thousands of people respond to the same topic. This situation occurs when the sender forgot to leave the email address in the BCC (temporary copy) section, leading to the recipient repeatedly receiving irrelevant information, causing important emails to be missed. Microsoft launched email storm blocking Security feature Reply to all to prevent "mail storm" has been applied by Microsoft.
Like Apple, Microsoft's Windows security team has been dissatisfied with Google's behavior over the past year. Knowing that the two companies are rivals on many technological fronts, but last year Google revealed a serious Windows flaw before Microsoft could release a patch that left the giant Redmond extremely upset. And it seems that Microsoft 's frustration culminated when Windows Chief Executive Terry Myerson then "posted" a blog post criticizing Google for revealing security vulnerabilities. "irresponsible" way. But it seems that Microsoft 's anger to this day is still not over.
Network security | Apple said it fixed the security flaw only 10 days after it was discovered. Google: A series of malicious websites have silently attacked iPhones over the years Apple seems unhappy with the way Google has revealed a serious security hole in its iPhone models recently. Google security researchers said malicious websites took advantage of previously unpublished security holes on iOS to hack users' devices for at least two years. . Although Apple did not deny or object to the results of this research, Apple still accused Google of "causing unnecessary fear in the iPhone user community that their device was hacked" by The search giant did not provide enough information regarding the vulnerability.
Network security | Researchers at security firm AdaptiveMobile Security have just released a report of a new vulnerability called "Simjacker" that allows bad guys to use the SIM card on your phone to spy on you. According to PhoneArena, many mobile phone models of many manufacturers on the market can be taken advantage of by the Simjacker flaw; An estimated 1 billion more devices have been affected worldwide. AdaptiveMobile Security said it believes the flaw was developed by a private company working with governments to track the locations of individuals around the world. This vulnerability allows a bad guy to collect the unique IMEI number of each phone. Some SIM cards supported by GSM carriers contain something called the S @ T browser that is included in the SIM Application Toolkit. When S @ T is used to launch browsers (like the WAP browsers that were available on previous feature phones), Simjacker will send a binary SMS to the browser with instructions for it to collect location data. location and IMEI number, then send the obtained information to a "accomplice device" also using binary SMS.