security

  1. Man

    From AI to Offline Protection: Google Unveils Triple Security for Android

    New Android features to protect user data. Google has begun rolling out a new set of features aimed at strengthening the security of user data in the event of device theft. According to information published on Reddit by Mishaal Rahman, his Xiaomi 14T Pro has two new features: "Lock when theft...
  2. Friend

    CVSS 9.9: SolarWinds ARM vulnerability hits companies' security

    How could the leading software vendors have made such a gross miscalculation? SolarWinds has released updates to address two vulnerabilities in its Access Rights Manager (ARM) software, one of which is classified as critical. The vulnerability, identified CVE-2024-28991, has a CVSS score of 9.0...
  3. Friend

    The rise of attacks on macOS: why Apple is no longer synonymous with security

    More and more hackers want to take a bite of the cherished apple. MacOS - based devices are increasingly being targeted by hackers. Intel 471, a cyber intelligence company, has identified more than 40 hacker groups that are interested in malware and exploits for the Apple platform. Since last...
  4. Friend

    Every Microsoft employee is now required to invest in security

    The management decided to change the corporate policy in order to protect "the whole world". Tech giant Microsoft is making drastic changes to its corporate policy, making cybersecurity a top priority. Now every employee of the company, regardless of their position, must pay high priority to...
  5. Tomcat

    Fundamentals of basic carder safety in carding

    When working according to gray and black carding schemes, you must take into account many factors that can de-anonymize you. In this article, I grouped these factors and briefly tried to describe the methods of protection I hope every newcomer and experienced will emphasize something for...
  6. Tomcat

    Free VPNs Laugh at Your Security: The Dark Side of Popular Services

    Almost 90% of VPN apps threaten users privacy. According to a recent study by Top10VPN, almost all popular free VPN apps on the Google Play Store potentially threaten our privacy. Almost 90% of applications are susceptible to data leaks, more than two-thirds transmit users personal information...
  7. Tomcat

    Apple biometric systems and their security

    Today, most people have a passcode on their mobile devices - this can be either a short PIN code or a password using letters and numbers. But it would simply be inconvenient to enter it several dozen times a day. Therefore, many companies have come up with ways to simplify the process of...
  8. Tomcat

    Big Android Security Hole: Why Are Green Robot Smartphones Prone to Theft?

    Many smartphone users are familiar with the concept of “linking to an account.” Various smartphone vendors have their own mechanisms to protect smartphones from theft: Apple has FMI, Xiaomi has Mi Cloud, and Google has FRP. However, Android has a long-standing vulnerability that allows it to...
  9. Tomcat

    About ATM security and the development of a security detector

    In my previous article, I talked in general about the problem of ATM security and a little about my experience in developing a device to ensure this very security. Today I’ll tell you about the concept of the lower concentration limit of flame propagation, an attempt to make a vibration sensor...
  10. Tomcat

    Analysis of the competition with PHDays 12: research into the security of ATMs 3.0

    Python, Java, C++, Delphi, PHP - it was these different programming languages that were used this time to create a virtual ATM-crypto machine, which participants had to test for strength as part of the $NATCH competition held at Positive Hack Days 12 in order to win. All code from start to...
  11. Father

    NTLM rejection and new security features: Microsoft improves the security of Windows 11

    Already this year, the world will see an updated Windows 11 with a perfect protection system. Microsoft has officially confirmed plans to roll out NT LAN Manager (NTLM) in Windows 11 in the second half of 2024, announcing a number of new security measures to strengthen the protection of the...
  12. Father

    LibreWolf: Freedom and Security in one browser

    An independent fork of Firefox with a focus on privacy. LibreWolf is an independent fork of Firefox, whose main goals are to protect the privacy, security and freedom of users. LibreWolf is the community-managed successor to LibreFox. The browser is designed for enhanced protection against...
  13. Father

    From SSLVPN to IPsec: Norway calls for abandoning the protocol in favor of security

    Critical infrastructure organizations need to change their network protection. The National Cybersecurity Center of Norway (NCSC) strongly advises organizations to replace SSL VPN/WebVPN with more secure alternatives due to frequent cases of exploiting vulnerabilities in network devices. This...
  14. Father

    A new era of Android security: now your smartphone knows how to protect itself

    Google has announced features that will make the system even more invulnerable. Google has announced an impressive set of new security features for its Android mobile operating system. Among them is an innovative smartphone theft detection technology that can recognize the moment when the...
  15. Father

    May Patch Tuesday Closes 61 security holes in Microsoft products

    The update fixes three zero-day vulnerabilities and resolves the problem with interrupting VPN connections. Microsoft introduced the May Patch Tuesday update, which includes fixes for 61 vulnerabilities, including 3 zero-day vulnerabilities that were actively exploited or publicly disclosed...
  16. Father

    Cyberpolice: security in virtual space?

    News. At the beginning of 2014, there were already attempts to introduce laws in Ukraine that would restrict the Internet space, introduce site blocking in a package with other innovations to restrict freedom of speech and civic activity, directly copied from similar regressive Russian...
  17. Father

    The field of cryptocurrencies from the point of view of information security

    Opinions about crypto markets are generally polar: some consider them an effective financial instrument, while others consider them an unstable asset with high activity. However, there is no denying that cryptocurrencies are firmly established in the world and Russian practice. Both as an...
  18. Father

    Android Smartphone Security — What you need to know

    Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient. This article will analyze the main information security risks...
  19. Father

    Smartphone instead of a lock pick: Chirp smart locks undermine the security of tens of thousands of households

    Researchers call the identified vulnerability one of the most dangerous in the smart home industry. A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
  20. Teacher

    Target - critical infrastructure: Volt Typhoon encroached on US national security

    Chinese cyber spies are once again causing panic in the White House. WASHINGTON (Reuters) - U.S. authorities have expressed concern over the actions of Chinese hacker group Volt Typhoon, warning owners and operators of critical infrastructure to protect themselves from potentially devastating...
Top