Opinions about crypto markets are generally polar: some consider them an effective financial instrument, while others consider them an unstable asset with high activity. However, there is no denying that cryptocurrencies are firmly established in the world and Russian practice. Both as an...
Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient.
This article will analyze the main information security risks...
Researchers call the identified vulnerability one of the most dangerous in the smart home industry.
A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
Chinese cyber spies are once again causing panic in the White House.
WASHINGTON (Reuters) - U.S. authorities have expressed concern over the actions of Chinese hacker group Volt Typhoon, warning owners and operators of critical infrastructure to protect themselves from potentially devastating...
The US government is taking control of the growing technological chaos.
The US Federal Communications Commission (FCC) has approved a new voluntary labeling program for Internet of Things (IoT) devices intended for consumers.
The program introduces the "U.S. Cyber Trust Mark" certification...
Your phone will never be the same again with Android 15.
Google has announced the debut version of Android 15 for developers, laying the foundation for improving the experience of using and developing on the Android platform. The new version of the operating system focuses on optimizing...
Secrets of sellers and buyers of the Facebook Marketplace have become another trophy for the IntelBroker hacker.
Someone under the pseudonym IntelBroker published in the public domain the personal data of 200,000 users of the Facebook Marketplace service.
According to the attacker, the...
How can I secure my account and not worry about data security?
Trevor Hilligoss, a former FBI digital crime expert and current vice president of SpyCloud Labs, highlighted the growing threat posed by the cookie vulnerability. According to him, a negligent attitude to cookies can lead to the...
Update today or continue to risk your data – the choice is up to users.
Citrix strongly recommends that users immediately install patches on Netscaler ADC and Netscaler Gateway devices connected to the Internet to prevent attacks related to two new actively exploited zero-day vulnerabilities...
Authorization bypassing and cross-site scripting compromise data privacy.
Two serious vulnerabilities were discovered in the popular POST SMTP plugin for WordPress, which is used on more than 300,000 websites. These flaws can allow attackers to gain full control over the target site...
The company explained why it is not afraid for its finances after a cyberattack.
Fidelity National Financial( FNF), one of the largest providers of real estate insurance and mortgage operations in the United States, was the victim of a cyber attack. In November last year, hackers penetrated the...
The complexity and uniqueness of the malware requires new approaches to data protection.
Cybersecurity experts from SecurityScorecard have identified a new variation of a computer virus called Menorah that targets organizations in the Middle East. It was first discovered and analyzed by Trend...
Users run the risk of losing access to the code if they ignore the requirement.
GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve.
The company...
What can be the reason for internet connection failures?
Recently, users of the Windows 10 and 11 operating systems have been experiencing serious problems with Wi-Fi. The root of the problem appears to be a security update released by Microsoft on December 12 under the number KB5033375. This...
Just like everyone has a unique fingerprint, our devices also have their own unique digital fingerprint. A digital fingerprint refers to a set of parameters that can be used to identify a unique user.
The data used to create this fingerprint includes IP address, operating system...
Do you think your iPhone is protected? Don't blindly believe what you see.
Experts from Jamf Threat Labs warned of a new threat to iPhone users associated with the use of "post-operational intervention techniques". This method allows attackers to visually deceive the user, making him believe...
Global threat: hundreds of models of computers and laptops are at risk.
Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
The developers gave recommendations for mitigating the consequences, so you should not delay them.
Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
The new bill threatens end-to-end encryption and data security.
The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand.
These...
Detailed analysis: what vulnerabilities were found in Tor?
The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...