New Android features to protect user data.
Google has begun rolling out a new set of features aimed at strengthening the security of user data in the event of device theft. According to information published on Reddit by Mishaal Rahman, his Xiaomi 14T Pro has two new features: "Lock when theft...
How could the leading software vendors have made such a gross miscalculation?
SolarWinds has released updates to address two vulnerabilities in its Access Rights Manager (ARM) software, one of which is classified as critical. The vulnerability, identified CVE-2024-28991, has a CVSS score of 9.0...
More and more hackers want to take a bite of the cherished apple.
MacOS - based devices are increasingly being targeted by hackers. Intel 471, a cyber intelligence company, has identified more than 40 hacker groups that are interested in malware and exploits for the Apple platform.
Since last...
The management decided to change the corporate policy in order to protect "the whole world".
Tech giant Microsoft is making drastic changes to its corporate policy, making cybersecurity a top priority. Now every employee of the company, regardless of their position, must pay high priority to...
When working according to gray and black carding schemes, you must take into account many factors that can de-anonymize you. In this article, I grouped these factors and briefly tried to describe the methods of protection
I hope every newcomer and experienced will emphasize something for...
Almost 90% of VPN apps threaten users privacy.
According to a recent study by Top10VPN, almost all popular free VPN apps on the Google Play Store potentially threaten our privacy. Almost 90% of applications are susceptible to data leaks, more than two-thirds transmit users personal information...
Today, most people have a passcode on their mobile devices - this can be either a short PIN code or a password using letters and numbers. But it would simply be inconvenient to enter it several dozen times a day. Therefore, many companies have come up with ways to simplify the process of...
Many smartphone users are familiar with the concept of “linking to an account.” Various smartphone vendors have their own mechanisms to protect smartphones from theft: Apple has FMI, Xiaomi has Mi Cloud, and Google has FRP. However, Android has a long-standing vulnerability that allows it to...
In my previous article, I talked in general about the problem of ATM security and a little about my experience in developing a device to ensure this very security.
Today I’ll tell you about the concept of the lower concentration limit of flame propagation, an attempt to make a vibration sensor...
Python, Java, C++, Delphi, PHP - it was these different programming languages that were used this time to create a virtual ATM-crypto machine, which participants had to test for strength as part of the $NATCH competition held at Positive Hack Days 12 in order to win. All code from start to...
Already this year, the world will see an updated Windows 11 with a perfect protection system.
Microsoft has officially confirmed plans to roll out NT LAN Manager (NTLM) in Windows 11 in the second half of 2024, announcing a number of new security measures to strengthen the protection of the...
An independent fork of Firefox with a focus on privacy.
LibreWolf is an independent fork of Firefox, whose main goals are to protect the privacy, security and freedom of users. LibreWolf is the community-managed successor to LibreFox.
The browser is designed for enhanced protection against...
Critical infrastructure organizations need to change their network protection.
The National Cybersecurity Center of Norway (NCSC) strongly advises organizations to replace SSL VPN/WebVPN with more secure alternatives due to frequent cases of exploiting vulnerabilities in network devices. This...
Google has announced features that will make the system even more invulnerable.
Google has announced an impressive set of new security features for its Android mobile operating system. Among them is an innovative smartphone theft detection technology that can recognize the moment when the...
The update fixes three zero-day vulnerabilities and resolves the problem with interrupting VPN connections.
Microsoft introduced the May Patch Tuesday update, which includes fixes for 61 vulnerabilities, including 3 zero-day vulnerabilities that were actively exploited or publicly disclosed...
News. At the beginning of 2014, there were already attempts to introduce laws in Ukraine that would restrict the Internet space, introduce site blocking in a package with other innovations to restrict freedom of speech and civic activity, directly copied from similar regressive Russian...
Opinions about crypto markets are generally polar: some consider them an effective financial instrument, while others consider them an unstable asset with high activity. However, there is no denying that cryptocurrencies are firmly established in the world and Russian practice. Both as an...
Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient.
This article will analyze the main information security risks...
Researchers call the identified vulnerability one of the most dangerous in the smart home industry.
A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
Chinese cyber spies are once again causing panic in the White House.
WASHINGTON (Reuters) - U.S. authorities have expressed concern over the actions of Chinese hacker group Volt Typhoon, warning owners and operators of critical infrastructure to protect themselves from potentially devastating...