Why should you use a secure VPN connection?
Have you ever heard of Virtual Private Networks (VPNs)? Surely you have heard about this topic at some point, especially in matters related to the business field. A VPN connectionRead More →
Have you ever heard of Virtual Private Networks (VPNs)? Surely you have heard about this topic at some point, especially in matters related to the business field. A VPN connectionRead More →
Generally speaking, an IoT device is an object connected to the Internet. These things are ubiquitous nowadays. Wi-Fi routers, smart TVs, smart locks, and online-accessible fridges are all examples ofRead More →
A new guideline issued by the India’s Computer Emergency Response Team (CERT-In) became a polemic issue for multiple government IT agencies. The Indian agency has determined that technology organizations shouldRead More →
A couple of months ago Ubuntu and Debian officials published security advisories related to CVE-2022-0543, a vulnerability derived from a bug in the Redis package in operating systems that receivedRead More →
Several manufacturers of network-attached storage (NAS) solutions have alerted their customers to the detection of critical vulnerabilities in Netatalk. The exploitation of these flaws was demonstrated in one of theRead More →
Technology firm QNAP has asked its users to disable the AFP file service protocol in its network-attached storage (NAS) deployments on a temporary basis while fixing some critical vulnerabilities inRead More →
After multiple scandals of inappropriate handling of personal information, reinforcing users’ privacy has become one of the primary goals of large technology companies. Such is the case of Google, whichRead More →
Hundreds of electric vehicle drivers on the Isle of Wight, England, were taken by surprise when screens at a local charging station began displaying pornographic content as a result ofRead More →
A recent cybersecurity report revealed the patching of at least four vulnerabilities in SonicOS, the operating system with which multiple solutions developed by the technology firm SonicWall work. According toRead More →
A Microsoft security report details the finding of a set of vulnerabilities that would allow threat actors to escalate privileges on Linux systems in order to inject ransomware, backdoors, andRead More →