Users report crashes after installation.
The long-awaited major update of Windows 11 (version 24H2) has brought users not only new features and security improvements, but also a number of serious problems. Many computer owners report that their internet connection is disrupted after installing...
The government is stepping up digital crackdowns during the election period.
Venezuelan President Nicolas Maduro continues to tighten his rule, using technology to stifle dissent and restrict access to information. More than 100 civil society organizations and human rights defenders signed an...
Hacktivists reported data theft and network failures.
Israeli hacktivists have claimed responsibility for the current Internet outages in Iran. The group, known as WeRedEvils, has been in existence since October 2023 and probably emerged in response to the Hamas attack on Israel that led to the...
The country is one of the three leaders in online fraud in Europe.
The Romanian Ministry of Digitalization is in talks with representatives of Meta, TikTok and Google to expand the mechanism for quickly identifying and deleting deepfake content outside the pre-election period. Minister of...
Invisible threads of influence: how we are being pushed to make decisions online.
Psychologist Patrick Fagan warns that many Internet resources use hidden methods of influencing users, which he designated with the acronym FORCES. Methods are designed to subtly push people to take certain...
Deputies approved amendments to combat fraud and strengthen control.
The State Duma of the Russian Federation has adopted amendments to the legislation on communications and the Internet. The new rules significantly tighten the requirements for telecom operators, instant messengers, and popular...
An international pact on the free flow of information was signed.
As a result of five years of negotiations, 91 countries agreed to new rules for e-commerce, including the extension of the moratorium on taxation of Cross-Border Data Transfers. The moratorium is significant because it covers...
Leading tech giants have already recognized the vulnerability of their systems.
Researchers have discovered a new dangerous vulnerability in the domain name system (DNS), which can be used to conduct a special attack, called "TuDoor"by researchers. This attack can be used to poison the DNS...
Mozilla announces an important update for users.
Firefox CTO Bobby Holley has dismissed concerns that the privacy-focused browser will be used by advertisers to collect user data. The company's goal is to create a privacy-preserving mechanism that will satisfy both advertisers and users, while...
Large-scale failure of IT systems caused a wave of misinformation and conspiracy theories.
The recent major failure of IT systems has caused major disruptions to airlines, banks, TV channels and financial institutions, and has also led to the spread of many conspiracy theories. The cause of the...
Recent statements by Microsoft AI CEO Mustafa Suleiman have sparked a wave of discussions. In his opinion, everything that is published in the public domain on the Internet becomes "free software" and can be freely copied and used by anyone.
In an interview with CNBC's Andrew Ross Sorkin...
The Internet has become such a familiar part of our lives that we sometimes forget that not everyone we cross paths with online has our best interests at heart. Cybercriminals are ubiquitous and do everything they can to capitalize on ordinary internet users, so the threat of online fraud is...
5 scenarios of the most notorious cybercrimes in history.
The Internet is increasingly becoming a stage for detective stories with their greedy villains, brave Robinhoods, chases, puzzles and quite predictable endings. In this material, we have collected 5 interesting scenarios of cybercrimes...
Hi all! Even if you are an advanced Internet user, no one is immune from becoming a victim of financial fraud. You may not even be aware of the new schemes of scammers on the Internet. In this article, I decided to touch on this serious topic, since every user should be familiar with it. Let's...
In general, after this post I decided to write a second article. There were a lot of questions, many off topic. There were also many commentators who were “supposedly on topic.”
In this article I will try to tell a minimum about drops: who they are, how they become them and what the consequences...
The National Payment Card System (NPCS) plans to make it paid for banks to provide two-factor customer authentication when paying on the Internet - when it is necessary to confirm the payment with a code from SMS.
The commission for the issuer will be 20 kopecks per transaction in any case, and...
What is Internet payment?
Oddly enough, in the terminology of payment systems there is no such thing as an Internet transaction. From the point of view of Visa and MasterCard, a transaction on the Internet is no different from a transaction in a terminal, by phone, IVR, etc. Payment systems...
Dangerous malware called Erbium has appeared on the Internet. This is an identity theft tool that targets your passwords, bank card details, cookies, cryptocurrency wallets, and possibly more. Due to its rapid spread and widespread availability in the future, it could be adapted to infect...
The company insists on strict security measures to protect industrial systems.
Rockwell Automation strongly recommends that its customers disable all ICS management systems that are not designed to be connected to the Internet to prevent unauthorized or malicious cyber attacks. This measure is...
Warning!
In order to prevent various questions in advance, as well as to ensure ease of reading, here is a small disclaimer: everything that will be written next is based on personal and subjective experience, expresses the personal opinion of the author and in no case is a call to any illegal...