security

  1. Father

    The field of cryptocurrencies from the point of view of information security

    Opinions about crypto markets are generally polar: some consider them an effective financial instrument, while others consider them an unstable asset with high activity. However, there is no denying that cryptocurrencies are firmly established in the world and Russian practice. Both as an...
  2. Father

    Android Smartphone Security — What you need to know

    Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient. This article will analyze the main information security risks...
  3. Father

    Smartphone instead of a lock pick: Chirp smart locks undermine the security of tens of thousands of households

    Researchers call the identified vulnerability one of the most dangerous in the smart home industry. A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
  4. Teacher

    Target - critical infrastructure: Volt Typhoon encroached on US national security

    Chinese cyber spies are once again causing panic in the White House. WASHINGTON (Reuters) - U.S. authorities have expressed concern over the actions of Chinese hacker group Volt Typhoon, warning owners and operators of critical infrastructure to protect themselves from potentially devastating...
  5. Teacher

    Guarantor of security: FCC introduces new labeling for smart gadgets

    The US government is taking control of the growing technological chaos. The US Federal Communications Commission (FCC) has approved a new voluntary labeling program for Internet of Things (IoT) devices intended for consumers. The program introduces the "U.S. Cyber Trust Mark" certification...
  6. Teacher

    Android 15: Google introduces a new version of the OS with a focus on performance, security and privacy

    Your phone will never be the same again with Android 15. Google has announced the debut version of Android 15 for developers, laying the foundation for improving the experience of using and developing on the Android platform. The new version of the operating system focuses on optimizing...
  7. Teacher

    Facebook: "Security is our priority!" 200,000 hacked users disagree!

    Secrets of sellers and buyers of the Facebook Marketplace have become another trophy for the IntelBroker hacker. Someone under the pseudonym IntelBroker published in the public domain the personal data of 200,000 users of the Facebook Marketplace service. According to the attacker, the...
  8. Brother

    Cookie - era security: Does MFA make sense if it can be circumvented in two clicks?

    How can I secure my account and not worry about data security? Trevor Hilligoss, a former FBI digital crime expert and current vice president of SpyCloud Labs, highlighted the growing threat posed by the cookie vulnerability. According to him, a negligent attitude to cookies can lead to the...
  9. Brother

    Flame of 0day attacks engulfs Citrix: RCE and DoS threaten the security of NetScaler clients

    Update today or continue to risk your data – the choice is up to users. Citrix strongly recommends that users immediately install patches on Netscaler ADC and Netscaler Gateway devices connected to the Internet to prevent attacks related to two new actively exploited zero-day vulnerabilities...
  10. Brother

    Security of 150,000 WordPress sites under question due to vulnerabilities in a popular plugin

    Authorization bypassing and cross-site scripting compromise data privacy. Two serious vulnerabilities were discovered in the popular POST SMTP plugin for WordPress, which is used on more than 300,000 websites. These flaws can allow attackers to gain full control over the target site...
  11. Brother

    Insurance company Fidelity admitted that profit is more important than customer data security

    The company explained why it is not afraid for its finances after a cyberattack. Fidelity National Financial( FNF), one of the largest providers of real estate insurance and mortgage operations in the United States, was the victim of a cyber attack. In November last year, hackers penetrated the...
  12. Brother

    Menorah attacks the Middle East: how a common virus rewrites security rules for an entire region

    The complexity and uniqueness of the malware requires new approaches to data protection. Cybersecurity experts from SecurityScorecard have identified a new variation of a computer virus called Menorah that targets organizations in the Middle East. It was first discovered and analyzed by Trend...
  13. Brother

    Software security starts with the developer: GitHub introduces mandatory two-factor authentication

    Users run the risk of losing access to the code if they ignore the requirement. GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve. The company...
  14. Brother

    Windows 10 and 11 update forced users to choose between stable Wi-Fi and security

    What can be the reason for internet connection failures? Recently, users of the Windows 10 and 11 operating systems have been experiencing serious problems with Wi-Fi. The root of the problem appears to be a security update released by Microsoft on December 12 under the number KB5033375. This...
  15. BitBrowser

    🔥🔥🔥 Anti-detection browser! 10 free configurations, RPA, and group control systems are all available! 🔥🔥🔥

    Just like everyone has a unique fingerprint, our devices also have their own unique digital fingerprint. A digital fingerprint refers to a set of parameters that can be used to identify a unique user. The data used to create this fingerprint includes IP address, operating system...
  16. Brother

    Illusion of security: hackers learned how to simulate the lock mode in iOS

    Do you think your iPhone is protected? Don't blindly believe what you see. Experts from Jamf Threat Labs warned of a new threat to iPhone users associated with the use of "post-operational intervention techniques". This method allows attackers to visually deceive the user, making him believe...
  17. Brother

    Beautiful picture or security? With the LogoFAIL vulnerability, hackers will inject a bootkit into your UEFI without too much noise

    Global threat: hundreds of models of computers and laptops are at risk. Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
  18. Brother

    Just three vulnerabilities in ownCloud hurt user security

    The developers gave recommendations for mitigating the consequences, so you should not delay them. Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
  19. Lord777

    Total control for the sake of security: the new norm in UK politics?

    The new bill threatens end-to-end encryption and data security. The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand. These...
  20. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
Top