How to keep personal information safe while gambling with crypto
Regardless of whether crypto or a traditional online casino is being used, players will want to know that they are as safe as possible when using their hard-earned money toRead More →
Regardless of whether crypto or a traditional online casino is being used, players will want to know that they are as safe as possible when using their hard-earned money toRead More →
In its latest security alert, the Federal Bureau of Investigation (FBI) recommends users stay on top of a fraudulent scheme affecting cryptocurrency ATMs and payment QR codes. Cybercriminals seem toRead More →
Offensive Web Testing Framework (OWTF) is an Open Web Application Security Project (OWASP) development focused on the efficiency of penetration testing and the alignment of safety testing with marked standardsRead More →
A hacking group potentially linked to Iran government managed to compromise the systems of an Israel-based web hosting company, leading to the downfall of multiple websites, including those of theRead More →
A recent announcement by Chinese government has raised great concern among the cybersecurity community. Chinese authorities say it has become a world leader in upgrading its wired infrastructure for theRead More →
As part of its Advanced Protection Program (APP), Google will give away more than 10,000 security keys to journalists, activists and political dissidents, as well as offer its advice toRead More →
This week Facebook unveiled its open-source static analysis tool used by its cybersecurity teams to detect potential security flaws in Android and Java apps. Dubbed as Mariana Trench, this toolRead More →
A recent research indicates that it is possible to make solid-state drives (SSD) invulnerable to ransomware attacks by detecting infections and reversing encryption in microseconds and with consequences barely perceptibleRead More →
Electronic fraud can come in multiple forms, although the most popular variant is still credit and debit card fraud. In these malicious operations, cybercriminals manage to steal card information toRead More →
In May 2021, the American public got a wakeup call to the consequences of lax cybersecurity. DarkSide, a group of known cyberattackers, got into a virtual private network account formerlyRead More →
A few days ago a JPEG file validated by the non-fungible token (NFT) EtherRock was sold for almost a million dollars, which surprised few users familiar with the subject consideringRead More →
In a recent statement, Samsung revealed to its customers that it is possible to disable any smart TV from the company with the TV Block feature. This is a little-knownRead More →
Amnesty International, in collaboration with the non-profit project Forbbiden Stories, announced the publication of a report on the discovery of spyware developed by the Israeli firm NSO Group. Apparently, thisRead More →
Just a few days ago it was learned of the devastating cyberattack that impacted thousands of companies through the service provider Kaseya, a very severe incident that may not beRead More →
Voice assistants are a very controversial technological implementation, as some believe they are too intrusive with users’ privacy and do not provide significantly useful features compared to using a conventionalRead More →
The fight for Internet users’ privacy has become one of the priorities in this technological age of ours, with individuals and organizations trying to find the least invasive online spacesRead More →
A recent security report details the detection of MASQ, a tool that allows threat actors to copy smart devices fingerprints, allowing them to evade any security mechanism for malicious purposes.Read More →
Researchers at the University of Maryland developed a new attack variant that would force the slowdown of machine learning systems, resulting in critical server and application failures. This attack wasRead More →
In its most recent report on trends in the ransomware world, security firm KrebsOnSecurity noted that all ransomware variants feature an integrated security device to prevent detection; according to experts,Read More →
The U.S. Air and Space Forces, in collaboration with the cybersecurity community, announced the launch of the second edition of the hacking event Space Security Challenge: Hack-A-Sat. As the nameRead More →