Chinese cyber spies are once again causing panic in the White House.
WASHINGTON (Reuters) - U.S. authorities have expressed concern over the actions of Chinese hacker group Volt Typhoon, warning owners and operators of critical infrastructure to protect themselves from potentially devastating...
The US government is taking control of the growing technological chaos.
The US Federal Communications Commission (FCC) has approved a new voluntary labeling program for Internet of Things (IoT) devices intended for consumers.
The program introduces the "U.S. Cyber Trust Mark" certification...
Your phone will never be the same again with Android 15.
Google has announced the debut version of Android 15 for developers, laying the foundation for improving the experience of using and developing on the Android platform. The new version of the operating system focuses on optimizing...
Secrets of sellers and buyers of the Facebook Marketplace have become another trophy for the IntelBroker hacker.
Someone under the pseudonym IntelBroker published in the public domain the personal data of 200,000 users of the Facebook Marketplace service.
According to the attacker, the...
How can I secure my account and not worry about data security?
Trevor Hilligoss, a former FBI digital crime expert and current vice president of SpyCloud Labs, highlighted the growing threat posed by the cookie vulnerability. According to him, a negligent attitude to cookies can lead to the...
Update today or continue to risk your data – the choice is up to users.
Citrix strongly recommends that users immediately install patches on Netscaler ADC and Netscaler Gateway devices connected to the Internet to prevent attacks related to two new actively exploited zero-day vulnerabilities...
Authorization bypassing and cross-site scripting compromise data privacy.
Two serious vulnerabilities were discovered in the popular POST SMTP plugin for WordPress, which is used on more than 300,000 websites. These flaws can allow attackers to gain full control over the target site...
The company explained why it is not afraid for its finances after a cyberattack.
Fidelity National Financial( FNF), one of the largest providers of real estate insurance and mortgage operations in the United States, was the victim of a cyber attack. In November last year, hackers penetrated the...
The complexity and uniqueness of the malware requires new approaches to data protection.
Cybersecurity experts from SecurityScorecard have identified a new variation of a computer virus called Menorah that targets organizations in the Middle East. It was first discovered and analyzed by Trend...
Users run the risk of losing access to the code if they ignore the requirement.
GitHub announced that from January 19, 2024, users working with code on the site will be required to activate two-factor authentication (2FA). This is reported in emails sent to users on Christmas Eve.
The company...
What can be the reason for internet connection failures?
Recently, users of the Windows 10 and 11 operating systems have been experiencing serious problems with Wi-Fi. The root of the problem appears to be a security update released by Microsoft on December 12 under the number KB5033375. This...
🔥🔥🔥What can anti-detection browsers do - multiple accounts to prevent association and anti-tracking🔥🔥🔥
In this Internet world, security and anonymity are not easy to come by.
Once you turn off your phone, you are completely off the grid and all other actions you take, such as shopping or...
Do you think your iPhone is protected? Don't blindly believe what you see.
Experts from Jamf Threat Labs warned of a new threat to iPhone users associated with the use of "post-operational intervention techniques". This method allows attackers to visually deceive the user, making him believe...
Global threat: hundreds of models of computers and laptops are at risk.
Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
The developers gave recommendations for mitigating the consequences, so you should not delay them.
Developers of the ownCloud open source software used for syncing data and working together with files, warned on November 21 about three critical vulnerabilities that can be used to disclose...
The new bill threatens end-to-end encryption and data security.
The UK government has initiated a bill that will oblige technology companies to provide information about planned innovations in the field of security of their products and, if necessary, even disable them on demand.
These...
Detailed analysis: what vulnerabilities were found in Tor?
The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
A universal program in the cryptominer mask allows you to conduct cyber attacks of any type.
Kaspersky Lab specialists have identified a complex malware campaign called StripedFly, previously unknown and extremely confusing. Since 2017, the operation has affected more than one million users...
The new bill raises many questions and debates.
Russian banks have expressed their opposition to the bill proposing to provide law enforcement agencies with direct access to information systems and databases with customer information, the Association of Banks of Russia (ADB) reports in a letter...
Apple urgently fixes a bug that allows you to take control of the device.
Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...