security

  1. Teacher

    Guarantor of security: FCC introduces new labeling for smart gadgets

    The US government is taking control of the growing technological chaos. The US Federal Communications Commission (FCC) has approved a new voluntary labeling program for Internet of Things (IoT) devices intended for consumers. The program introduces the "U.S. Cyber Trust Mark" certification...
  2. Teacher

    Android 15: Google introduces a new version of the OS with a focus on performance, security and privacy

    Your phone will never be the same again with Android 15. Google has announced the debut version of Android 15 for developers, laying the foundation for improving the experience of using and developing on the Android platform. The new version of the operating system focuses on optimizing...
  3. Teacher

    Facebook: "Security is our priority!" 200,000 hacked users disagree!

    Secrets of sellers and buyers of the Facebook Marketplace have become another trophy for the IntelBroker hacker. Someone under the pseudonym IntelBroker published in the public domain the personal data of 200,000 users of the Facebook Marketplace service. According to the attacker, the...
  4. Brother

    Cookie - era security: Does MFA make sense if it can be circumvented in two clicks?

    How can I secure my account and not worry about data security? Trevor Hilligoss, a former FBI digital crime expert and current vice president of SpyCloud Labs, highlighted the growing threat posed by the cookie vulnerability. According to him, a negligent attitude to cookies can lead to the...
  5. Brother

    Flame of 0day attacks engulfs Citrix: RCE and DoS threaten the security of NetScaler clients

    Update today or continue to risk your data – the choice is up to users. Citrix strongly recommends that users immediately install patches on Netscaler ADC and Netscaler Gateway devices connected to the Internet to prevent attacks related to two new actively exploited zero-day vulnerabilities...
  6. Brother

    Security of 150,000 WordPress sites under question due to vulnerabilities in a popular plugin

    Authorization bypassing and cross-site scripting compromise data privacy. Two serious vulnerabilities were discovered in the popular POST SMTP plugin for WordPress, which is used on more than 300,000 websites. These flaws can allow attackers to gain full control over the target site...
  7. Brother

    Insurance company Fidelity admitted that profit is more important than customer data security

    The company explained why it is not afraid for its finances after a cyberattack. Fidelity National Financial( FNF), one of the largest providers of real estate insurance and mortgage operations in the United States, was the victim of a cyber attack. In November last year, hackers penetrated the...
  8. Brother

    Menorah attacks the Middle East: how a common virus rewrites security rules for an entire region

    The complexity and uniqueness of the malware requires new approaches to data protection. Cybersecurity experts from SecurityScorecard have identified a new variation of a computer virus called Menorah that targets organizations in the Middle East. It was first discovered and analyzed by Trend...
  9. Brother

    Software security starts with the developer: GitHub introduces mandatory two-factor authentication

    Users run the risk of losing access to the code if they ignore the requirement. GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve. The company...
  10. Brother

    Windows 10 and 11 update forced users to choose between stable Wi-Fi and security

    What can be the reason for internet connection failures? Recently, users of the Windows 10 and 11 operating systems have been experiencing serious problems with Wi-Fi. The root of the problem appears to be a security update released by Microsoft on December 12 under the number KB5033375. This...
  11. BitBrowser

    🔥🔥🔥 Anti-detection browser! 10 free configurations, RPA, and group control systems are all available! 🔥🔥🔥

    Just like everyone has a unique fingerprint, our devices also have their own unique digital fingerprint. A digital fingerprint refers to a set of parameters that can be used to identify a unique user. The data used to create this fingerprint includes IP address, operating system...
  12. Brother

    Illusion of security: hackers learned how to simulate the lock mode in iOS

    Do you think your iPhone is protected? Don't blindly believe what you see. Experts from Jamf Threat Labs warned of a new threat to iPhone users associated with the use of "post-operational intervention techniques". This method allows attackers to visually deceive the user, making him believe...
  13. Brother

    Beautiful picture or security? With the LogoFAIL vulnerability, hackers will inject a bootkit into your UEFI without too much noise

    Global threat: hundreds of models of computers and laptops are at risk. Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
  14. Brother

    Just three vulnerabilities in ownCloud hurt user security

    The developers gave recommendations for mitigating the consequences, so you should not delay them. Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
  15. Lord777

    Total control for the sake of security: the new norm in UK politics?

    The new bill threatens end-to-end encryption and data security. The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand. These...
  16. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  17. Carding 4 Carders

    StripedFly: how the malware deceived information security specialists and affected millions of victims

    A universal program in the cryptominer mask allows you to conduct cyber attacks of any type. Kaspersky Lab specialists have identified a complex malware campaign called StripedFly, previously unknown and extremely confusing. Since 2017, the operation has affected more than one million users...
  18. Carding 4 Carders

    Who will win the fight for your privacy: banks or security forces?

    The new bill raises many questions and debates. Russian banks have expressed their opposition to the bill proposing to provide law enforcement agencies with direct access to information systems and databases with customer information, the Association of Banks of Russia (ADB) reports in a letter...
  19. CarderPlanet

    iPhone security on the verge: a new 0day vulnerability caused massive attacks on users

    Apple urgently fixes a bug that allows you to take control of the device. Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
  20. Carding

    Why are we being deceived? The unsightly side of security guides.

    Find out the truth behind the security guidelines. The cybersecurity instructions you receive at work may cause confusion? You are not alone. According to a recent study, there are a number of problems in the wording of these guidelines. The authors suggest simple measures to improve the...
Top