How to protect your Mac from malware?
Malware is a malicious software designed to gain unauthorised access into your Mac and cause damage to it. This is done to benefit the hackers in some way – whetherRead More →
Malware is a malicious software designed to gain unauthorised access into your Mac and cause damage to it. This is done to benefit the hackers in some way – whetherRead More →
Rolling-PWN attack vulnerability CVE-2021-46145 affecting all Honda cars models that exist from the year 2012 up to the year 2022. This vulnerability allows anyone to permanently open the car doorRead More →
Microsoft has surprised key parts of the security community with its decision to quietly reverse course and allow untrusted macros to open by default in Word and other Office applications.Read More →
Those responsible for AstraLocker ransomware have decided to end its life cycle. Therefore, no more actions will be carried out with it and, in addition, they have published the necessaryRead More →
Fortinet, an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components. FortinetRead More →
OpenSSL is a famous cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It allows generating RSA private keysRead More →
Marriott hotel chain suffered a data breach , as it reported that hackers stole more than 20 gigabytes of confidential data, between clients and internal processes. The incident, first reportedRead More →
In many cases, security vulnerabilities appear that affect the programs that we use on a day-to-day basis. A clear example is the browser. It may have vulnerabilities and that canRead More →
The Django project, an open source web framework based on Python, has fixed a high severity vulnerability in its latest versions. Identified as CVE-2022-34265, the potential SQL injection vulnerability existsRead More →
A Netherland university that became the target of a massive ransomware attack has received back its ransom money that it paid to hackers. They got double the money back. UniversityRead More →