computerworld.com(Editor's note: On March 8, 2024, two days after this post appeared, Apple reinstated Epic's developer account.)Citing the Digital Markets Act (DMA), the European Union (EU) has requested “further explanations” from Apple regarding its decision to close down the developer account of Fortnite publisher Epic Games. Apple says it does not trust Epic, citing the game  developer’s history of untrustworthy actions.To read this article in full, please click here...

computerworld.comThe first two third-party European app stores to be announced offer different takes on how these stores might work: the first is a white-label service for enterprise app distribution, the second is an all-you-can-eat subscription deal.The stores are on the cusp of being introduced now that Apple has been forced to open up to third party app stores and payment systems. It seems likely more such stores will soon open, and it's interesting these two seem willing to explore new app distribution business models.For the enterprise: Mobivention Initially available in Germany, the Mobivention App Marketplace wants to become a safe place from which to download apps for company employees, partners, and customers. To read this article in full, please click here...

Heise Top NewsiPhones können in der EU erstmals App-Marktplätze aus dem Web laden. Wir haben es ausprobiert, die Installation ist alles andere als komfortabel....

securitymagazine.comThis International Women’s Day, female security leaders share their career paths and offer advice to women looking to enter the industry. ...

securitymagazine.comEmerging technologies, new attack vectors and even geopolitical crises shape the day-to-day evolution of the chief information security officer’s job....

securitymagazine.comAttacks related to Domain Name System (DNS) infrastructure have been on the rise and most organizations aren’t prepared for the onslaught. ...

Heise Top NewsSeit Jahren sorgt ein US-Physiker mit wilden Theorien zu einem angeblichen Meteoriteneinschlag für Aufmerksamkeit. Nun gibt es angeblich eine banale Erklärung....

TheHackersNewsMeta has offered details on how it intends to implement interoperability in WhatsApp and Messenger with third-party messaging services as the Digital Markets Act (DMA) went into effect in the European Union. “This allows users of third-party providers who choose to enable interoperability (interop) to send and receive messages with opted-in users of either Messenger or WhatsApp – both designated...

computerworld.comYou hear that sound? That’s the sound of augmented reality (AR) fading away as a driving concept in technology.You could blame Apple, which handed down an edict to Apple Vision Pro developers: “Refer to your app as a spatial computing app. Don’t describe your app experience as augmented reality (AR), virtual reality (VR), extended reality (XR), or mixed reality (MR).”But blaming Apple would be wrong. Instead, blame artificial intelligence (AI) — specifically the generative AI (genAI) trend of the past year and a half; it’s completely upended and redirected the purpose and function of the glasses formerly known as AR glasses.How AR became a four-letter word Tech giants have been working on “smart glasses” for more than a decade. And these products are finally hitting the market. Their killer app? AI, of course. (I’m defining AI glasses here as glasses with the primary purpose of facilitating fast and easy access to AI.)To read this...

Heise Top NewsAm Freitag wird ein großes Stück Weltraummüll der ISS unkontrolliert in der Atmosphäre verglühen, Fragmente können die Oberfläche erreichen. Unklar bleibt, wo....

TheHackersNewsIn the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We're all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable. However, let's dispense with the pleasantries; this isn't a simple 'set it and forget it' scenario. It's...

TheHackersNewsCisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF...

TheHackersNewsThreat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed "large company" to connect to their infrastructure. While a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to their advantage, the development marks the first QEMU that has been...

Microsoft ServerWas hat sich in der vergangenen Woche rund um die Microsoft-Plattform getan? Gab es wichtige Ankündigungen oder neue Wissensressourcen? Unser TechWiese-Team hat interessante Links für dich zusammengestellt....

TheHackersNewsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows for a complete...

Heise Top NewsUS-Abgeordnete haben den nächsten Versuch gestartet, TikTok der chinesischen Kontrolle zu entziehen. Die Reaktion der App sorgt für ungewohnte Einmütigkeit....

Heise Top NewsSeit Monaten bekommt die NASA Voyager 1 nicht mehr dazu, sinnvolle Daten zu schicken. Die verbleibenden Optionen werden riskanter, ein Ende scheint möglich....

Heise Top NewsAm Freitag wird eine ausrangierte ISS-Palette über der Erde abstürzen und größtenteils verglühen. Teile können die Oberfläche erreichen – auch in Deutschland....

TheHackersNewsThreat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, “target WordPress websites from the browsers of completely innocent and unsuspecting site visitors,” security researcher Denis Sinegubko said. The activity is part of a&...

TheHackersNewsThe China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end goal of the attacks is to deliver malicious downloaders for Windows and macOS that deploy a known backdoor called MgBot and a previously undocumented Windows implant known as Nightdoor. The findings come from ESET,...

Weiter