banking

Winsage
April 26, 2025
In January 2024, Microsoft launched its Copilot assistant, utilizing advanced large language model technology, and introduced various offerings such as Copilot Pro subscription plans and specialized devices. Despite these efforts, Copilot has attracted only 20 million users weekly, which is significantly lower than ChatGPT's 400 million weekly users. This represents just over 1% of the 1.5 billion Windows users globally. Microsoft's Chief Financial Officer, Amy Hood, presented data showing stagnant user engagement for Copilot, raising concerns within the company about the return on its substantial investments in AI technology. Additionally, Microsoft has had to adjust its strategy regarding the Copilot key on keyboards, allowing for customization, and Intel has noted that its AI hardware is not gaining market traction.
AppWizard
April 25, 2025
Recent findings from cybersecurity experts at ESET revealed that several Android applications, disguised as harmless tools, have been secretly recording conversations and stealing sensitive data. These malicious apps infiltrated devices through the Google Play Store and third-party platforms, compromising the privacy of thousands of users. One tactic used by cybercriminals involved romantic deception, where victims were coaxed into downloading a seemingly harmless messaging app containing the VajraSpy Trojan, which activated upon installation to record conversations and harvest personal data. The identified malicious apps fall into three categories: 1. Standard Messaging Apps with Hidden Trojans: These apps, including Hello Chat, MeetMe, and Chit Chat, request access to personal data and operate silently in the background, stealing contacts, SMS messages, call logs, device location, and installed app lists. 2. Apps Exploiting Accessibility Features: Apps like Wave Chat exploit Android’s accessibility features to intercept communications from secure platforms, record phone calls, keystrokes, and ambient sounds. 3. Single Non-Messaging App: Nidus, a news app, requests a phone number for sign-in and collects contacts and files, increasing the risk of data theft. The 12 malicious Android apps identified include: Rafaqat, Privee Talk, MeetMe, Let’s Chat, Quick Chat, Chit Chat, YohooTalk, TikTalk, Hello Chat, Nidus, GlowChat, and Wave Chat. The first six apps were available on the Google Play Store and had over 1,400 downloads before removal. Users are advised to uninstall these apps immediately to protect their personal data.
Tech Optimizer
April 1, 2025
Bitdefender offers comprehensive protection against current and emerging online threats with a lightweight design that maintains device performance. It is currently providing a 50% discount on its multi-device bundles, including the Total Security bundle, which covers up to five devices across various platforms for an introductory price. The Internet Security and Antivirus Plus bundles are also available at discounted rates for Windows PCs. All bundles include features like File Shredder, Social Network Protection, and safe online banking through Safepay. Bitdefender utilizes advanced AI technology to predict and neutralize threats while optimizing device performance.
AppWizard
March 26, 2025
Cybercriminals are using Microsoft’s .NET MAUI framework to create advanced Android malware that bypasses security measures and compromises user data. A study by McAfee researchers highlights a rise in malicious apps developed with this tool since its introduction in May 2022. These apps often impersonate legitimate applications, particularly from financial institutions, and are distributed through third-party websites or alternative app stores. One example is a counterfeit app mimicking the official IndusInd Bank app, targeting users in India to extract sensitive information. Another variant targets Chinese-speaking users by disguising itself as a social networking service. The malicious apps are designed to be subtle, with harmful code concealed as blob files within the assemblies directory, making detection difficult for antivirus solutions. Hackers use multi-stage dynamic loading, where the Android executable file is loaded in three stages, each encrypted until execution. They also manipulate the AndroidManifest.xml file by adding excessive permissions, complicating analysis and detection. Additionally, attackers replace standard HTTP requests with encrypted TCP socket connections to evade security software. These evolving tactics indicate a potential increase in similar mobile malware threats in the future.
Search