API monitoring: taking visibility to the next level
Ian Waters at ThousandEyes discusses the importance of API monitoring for modern application owners.
Read MoreAmazon has just dropped the price of its M1 MacBook deals down to a brand new record low, with both the 256GB and 512GB models available for their cheapest costs yet. At £869.97, the 256GB version is now £30 cheaper than its previous record with a total saving of £129. However, you can save a massive £200 on the 512GB model, now available for just £1,049.97 (was £1,249).
These Macbook deals have only just appeared, so they're likely to prove particularly popular this week. We wouldn't wait too long to take advantage, then, especially considering the 512GB version is seeing such a dramatic price drop.
The M1 MacBook Air has been seeing price drops for a few months now, but these offers top the lot. You're getting a great price for a 13.3-inch ultrabook here, and the performance coming out of the new M1 chip is a force to be reckoned with as well.
Not in the UK? Scroll down for more cheap MacBook deals in your region.
M1 MacBook Air (256GB): £999 £869.97 at Amazon
The M1 MacBook Air has just dropped to a brand new record price low at Amazon. That beats the previous discount by an extra £30, offering up a powerful M1 ultrabook with 8GB RAM and a 256GB SSD for a fantastic price this week.
MacBook Air M1 (512GB): £1,249 £1,049.97 at Amazon
With a £200 discount, this 512GB M1 MacBook Air is now at a brand new record price low. Previously we'd only seen this price drop as far as £1,099, which means you're getting a fantastic discount with this new offer.
We're rounding up all the latest MacBook Air deals and MacBook Pro prices, but if you aren't looking for the luxury Apple experience you'll also find plenty of cheap laptop deals available as well. Plus, we're looking forward to even more offers in the upcoming Amazon Prime Day deals as well.
Ian Waters at ThousandEyes discusses the importance of API monitoring for modern application owners.
Read MoreAlmost all Android smartphones could be vulnerable to remote code execution as a result of vulnerabilities discovered in the audio decoders of Qualcomm and MediaTek chips. The discovery of these vulnerabilities was made by Check Point Research (CPR) and if left unpatched, an attacker could exploit them to remotely gain access to a device’s camera and microphone by using a malformed audio file. At the same time, an unprivileged Android app could leverage these vulnerabilities to escalate its privileges in order to spy on a user’s media data and listen in on their conversations. Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99. Since most Android devices are powered by either Qualcomm or MediaTek chips, the impact of these vulnerabilities is wide reaching but thankfully, CPR responsibly disclosed its findings to both chipmakers who have since issued fixes. Check Point security researcher Slava Makkaveev provided further insight on the firm’s findings regarding these high and critical severity vulnerabilities in a press release, saying: "We've discovered a set of vulnerabilities that could be used for remote execution and privilege escalation on two-thirds of the world's mobile devices. The vulnerabilities were easily exploitable. A threat actor could have sent a song (media file) and when played by a potential victim, it could have injected code in the privileged media service. The threat actor could have seen what the mobile phone user sees on their phone. In our proof of concept, we were able to steal the phone's camera stream. What is the most sensitive information on your phone? I think it's your media: audio and videos. An attacker could have stolen that through these vulnerabilities.” The vulnerabilities themselves were found in Apple Lossless Audio Codec (ALAC) which is also known as Apple Lossless. First introduced back in 2004 for lossless data compression of digital music, at the end of 2011 Apple made ALAC open source and the format is now embedded in many non-Apple audio playback devices and programs including Android smartphones as well as Linux and Windows media players and converters. While Apple has updated the proprietary version of its decoder by fixing and patching security issues several times, the shared code in the open source version of ALAC has not been patched since 2011. CPR discovered that Qualcomm and MediaTek ported the vulnerable ALAC code into their own audio decoders which is why so many Android smartphones are now at risk. CPR responsibly disclosed its findings to both chipmakers last year and they in turn released patches to fix all of their vulnerable audio decoders back in December. To avoid falling victim to any potential attacks though, you should make sure that your Android device has been updated with all of the latest patches.Vulnerable audio decoders
Microsoft readies its next generation of browsers, with Flash set to depart.
Read MoreGoogle Chrome's internal security team discovered the exploit and swiftly issued a security patch.
Read MoreWant to hire best people for your project? Look no further you came to the right place!