Sunday, July 3, 2022

Only Those Worthy Can Win This Thor: Love And Thunder Xbox Series X

Microsoft, the company that brought us furry Sonic controllers and a Far Cry 6 console that resembled a bomb, has unveiled its latest kooky Xbox Series X sweepstakes, and it may be the coolest/dumbest one yet. Hot on the heels of the premier of Thor: Love and Thunder on July 8, the company is giving away a custom Series X modeled after Thor’s trusty hammer, Mjölnir. That means the console looks like a big, cracked slab of dwarven-crafted uru that still channels electricity and may or may not be liftable depending on if you’re worthy. It's hard to tell if that handle is real or simply edited into the photo for full effect, but you should probably assume the worst (best?) when considering making space for this thing.  The contest begins today and concludes on July 21. To enter, you just need to follow the Xbox Twitter account and retweet #ThorLoveandThunderXboxSweepstakes. You can read the full contest rules here.

    Latest Posts

    Iranian hackers' Android malware spies on dissidents by stealing 2FA codes

    A guy uses his smartphone to check out election news in Tehran, Iran might 17, 2017. REUTERS/TIMA ATTENTION EDITORS - THIS IMAGE WAS SUPPLIED BY AN AUTHORIZED. FOR EDITORIAL ONLY USE.

    It’s no secret that some national countries have spied on the citizens through innocuous-looking apps, but one effort is more extensive than usual. Check Point Research has discovered (via ZDNet) that Rampant Kitten, an Iranian hacker group which has targeted the country’s political opponents for a long time, is rolling out Android malware centered on stealing two-factor authentication codes. It isn’t just centered on anybody service, either – it targets Google, Telegram, along with other major internet or social services.

    The attackers work with a phishing trojan to get login details first, and try people that have the true site then. If the victim has two-factor authentication fired up, the newly-reported malware intercepts the incoming SMS messages and sends copies to the intruders quietly.

    The code has tools to seize contacts also, text logs and microphone audio even, but it’s unusually centered around two-factor data. It has up to now been within an app pretending to greatly help Persian speakers in Sweden get driver’s licenses, nonetheless it may be obtainable in other apps.

    This can be an important discovery. Although it’s no secret that likely state-backed groups will get around two-factor requests, it’s difficult to observe how those systems work. It stresses the significance of using two-authentication systems that avoid SMS also, such as for example hardware security keys. SMS is preferable to nothing, but it’s no more a deterrent for probably the most determined intruders – whether they’re pro-government spies or everyday criminals.

    Latest Posts

    Don't Miss

    Get notified on updates    OK No thanks