Google has discovered software used to spy on Android and iOS smartphone users in Italy and Kazakhstan. As reported According to the report, the Italian company RCS Lab, which works with law enforcement agencies, is responsible for the distribution...
data security
Open source software is very popular among developers and technology companies, but unrestricted use of solutions based on it becomes a major security risk for users. About that reported in The State of Open-Source Security, co-authored by Snyk and...
Adobe wants to counteract the spread of visual misinformation on the web by adding metadata about the origin of images. This not only helps to separate real photos from fakes, but also confirms the authorship of the content. Image source: Jorge...
Electronics maker Foxconn has confirmed that one of its Mexican factories suffered a ransomware attack in late May. The company did not say which of the hacking groups took responsibility for the crime, but it is known that the well-known encryptor...
For the first time in the history of blockchain technologies, the former product manager of the OpenSea platform, the largest marketplace for trading in non-fungible NFT tokens, was awarded the so-called. Insider trading in digital assets. Image...
The US Department of Justice has released a document clarifying that actions covered by the Computer Fraud and Abuse Act (CFAA), which was passed back in 1984 and updated in 1986, should not result in criminal prosecution if they are committed for...
Samsung Electronics will present a solution that will block the installation of malicious applications for the so-called. Voice phishing (vishing) on smartphones. It is known that it will be used at least in models of the current and previous...
The University of Nijmegen, together with the University of Lausanne, conducted a study that found that many of the 100,000 most popular websites on the global network collect data from web forms before the user who fills them out clicks the submit...
Many users entered their name into the Google search bar and wanted to know what information was stored about them on the Internet. Now the tech giant has developed a tool that allows you to quickly and effectively remove personal information from...
The European Commission is ready to propose new rules according to which messenger applications like WhatsApp or Facebook* Messenger selectively scans user messages for content related to child sexual abuse (CSAM) and attempted adult molestation of...
The Indian state cyber security authority CERT-In has warned of critical security gaps in the desktop browser Google Chrome. Experts called the risk “high” and marked versions of the browser that are unsafe for users. Image source:...
Attackers are increasingly trying to get confidential information about the customers of IT giants like Google, Apple and others, disguising themselves as law enforcement officials from different countries. As a result, users of different age groups...
The future owner of Twitter, Elon Musk, has repeatedly criticized the social network’s existing policies and tools, and also often shared his views on the functionality of such sites in general. Although the billionaire has been warned that...
Microsoft Edge Canary Browser Test Build has been enhanced to allow users to increase their security by managing browser extensions with the click of a button. The feature allows you to instantly pause all installed extensions. This is especially...
Few people are surprised by the presence of malicious applications in Google Play Store, but usually hackers, ransomware gangs and other intruders are involved in malicious software distribution. Accordingly The Wall Street Journalthe US...
According to the latest data, Apple and Meta* leaked information about users of their platforms to attackers posing as American law enforcement officials. In mid-2021, companies provided criminals with user addresses, phone numbers, and IP addresses...
LAPSUS$ hackers hacked Vodafone’s servers – they had previously hacked NVIDIA, Samsung and Microsoft
Another victim of the LAPSUS$ hacker group was British mobile operator Vodafone, reports CNBC. The attackers claim to have stolen around 200 GB of data. The stolen information is basically the source code of Vodafone’s software developments...
The network supplier TP-Link has been working with Avira for several years to secure products such as WLAN routers. HomeCare and HomeShield features are designed to protect users from cyberattacks and other threats, but it appears the...
A leak at NVIDIA last month compromised the data of 71,335 of its employees. This is proven by the data from the warning service about hacking attempts “Have I been Pwned”. Image source: geralt/pixabay.com According to the resource, the...
The openness of the Android ecosystem attracts both users and software developers. However, not everyone is honest. Threat Fabric experts warn of the emergence of the Xenomorph banking Trojan, which has already infected many Android smartphones...