The Google Play Store has started labeling VPN apps for Android with a special “independent security review” badge. This badge indicates that you have passed an independent Mobile App Security Assessment (MASA) security audit. The aim of this...
data security
Valve reported that some time ago attackers hacked the accounts of several dozen developers on the Steam platform and added malware to their games. It is noted that the attack affected fewer than 100 Steam users. Valve immediately warned them of the...
Every user constantly leaves “digital traces” on the Internet, on the basis of which personalized advertising is displayed to them. Advertising networks themselves do not share personal information, but companies and governments can identify a user...
Nintendo, one of the leaders in the gaming console industry, has offered its users a new level of security. Now each user can register up to 10 different passkeys for their account, ensuring convenient and secure login. Image source: Nintendo...
Using deep-learning neural network methods, a group of researchers from UK universities has developed an algorithm capable of recognizing data with up to 95% accuracy by using the sound recorded via a microphone when keyboard keys are pressed...
Google introduced A tool that greatly simplifies finding and removing user contact information from search results. The search giant sends alerts to users whenever it finds information about their real address, phone number, or email address on the...
Google has started to introduce a radical way to protect against cyber attacks. According to CNBC, individual employees of the Internet giant participating in the company’s pilot program will work on PCs that are not connected to the Internet...
Just days after the social network Twitter required authentication to read tweets, the company quietly waived those restrictions. This means that links to messages on the social network can be opened directly in the browser, without registering with...
“Kaspersky Lab” discovered There are dozens of malicious software products in the Chrome browser extensions store, the most popular of which has already received 9 million downloads and the total number of downloads exceeds 87 million...
Proton AG, developer of the VPN service Proton VPN and the secure e-mail program ProtonMail, has expanded its product range by launching its own solution on the password manager market, which provides end-to-end encryption and additional data...
The US Navy Crime Investigation Agency (NCIS) is investigating multiple reports of military receipts of suspicious smartwatch packages from unknown senders. Such gadgets can easily be loaded with malware to steal sensitive data. Image source:...
Earlier this year, the FBI warned of the dangers of public smartphone charging stations, which are common in train stations, trains, planes, coffee shops and other establishments. According to the bureau, such chargers are often used to hack devices...
Recently, alarming information appeared on the web that the world’s most popular instant messenger, WhatsApp, is constantly monitoring users – or so the Android security system thought. However, Google has already refuted the...
According to a report by Group-IB, an international cybersecurity company, the data of more than 100,000 users of the chatbot ChatGPT leaked onto the internet and ended up on darknet trading platforms. Leaks were recorded from June 2022 to May of...
Quite popular Microsoft Edge browser has many tools and built-in features to improve user experience. However, some of them can cause serious concerns for users who want to keep their data confidential. Image source: Microsoft Probably many want to...
A group of cybersecurity researchers funded by the Defense Advanced Research Projects Agency (DARPA) and the US Air Force, published an article, which describes techniques for stealing data from Apple and Qualcomm Arm processors, NVIDIA and AMD...
Mobile applications may change their functionality even after being downloaded from the marketplace. Malicious software can develop from initially harmless software, which can cause considerable damage to the user. According to The Verge, iRecorder...
ByteDance, which owns video service TikTok, has transferred data storage from US users to Oracle in the US. The Chinese tech giant is working hard to stay in the US market amid allegations that the company may be leaking information about Americans...
As the battle for leadership in the semiconductor industry intensifies, Samsung Electronics is increasingly becoming a victim of information leaks. As reported by Business Korea, citing industry sources, an employee from the Device Solutions...