POPULAR NEWS VIDEO 2 AUG
Specialist detect a new virus that infects cell phones via text message | Hackers intercept Telegram messages due to a security vulnerability Below are the links of the cyber securityRead More →
Specialist detect a new virus that infects cell phones via text message | Hackers intercept Telegram messages due to a security vulnerability Below are the links of the cyber securityRead More →
An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed “Agent Smith”, this malware has already infected moreRead More →
According to web application security specialists, we are a couple of months away from the blockage on Huawei imposed by President Donald Trump’s administration being concreted, so the company willRead More →
Microsoft has just released an updated version of the Outlook app for Android that, according to information security specialists, fixes a significant severity security flaw. The email app has aboutRead More →
According IT security audit service specialists, Google recently recognized that a group of cybercriminals discovered a backdoor preinstalled on Android devices during the year 2017. The backdoor, known as Triada,Read More →
Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden. Below are the links ofRead More →
After months of testing, finally Tor Project announced the launch of the Tor Android browser, which will be available for download via the official Google Play Store platform, reported webRead More →
For some days the main issue among the cyber security community is the executive order of Donald Trump’s administration that prohibits U.S. companies from buying technology developed abroad, mainly China.Read More →
IT security audit specialists report that Google has decided to suspend its business with the Chinese company Huawei, including activities of transfer of hardware, software and technical services except forRead More →
Cyber forensics course specialists report the presence of adware in at least 50 Android applications available on the official Google Play Store platform. In some cases, adware is capable ofRead More →
Cyber forensics course specialists reported the finding of security vulnerability in several chips developed by the company Qualcomm; According to the specialists, these flaws could be the entry point forRead More →
Google has just announced a new security measure. Very soon any smartphone with Android 7 operating system or later versions can be used as a physical security key for theRead More →
BasBanke is a new variant of malware for Android mainly directed to users of this operating system in Brazil. According to the authors of ‘Learn ethical hacking‘, it is aRead More →
Ethical hacking training experts and specialists from the International Institute of Cyber Security (IICS) recommend users of UC Browser for Android to stop using this tool as soon as possible.Read More →
Vulnerabilities were patched months ago, although there are still exposed users Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of two criticalRead More →
A new machine learning algorithm is able to detect the use of apps like YouTube, Instagram, among others, in Tor browser A group of network security and ethical hacking specialistsRead More →
Google claims that this vulnerability has not yet been exploited in the wild Ethical hacking and network security specialists from the International Institute of Cyber Security recommend smartphone with AndroidRead More →
More than 300 million users have downloaded this app, so the incident is very serious ES File Explorer is one of the most popular Android operating system file management applications.Read More →
It seems that the last Skype update fixed this flaw Cybersecurity and ethical hacking specialists from the International Institute of Cyber Security reported the finding of a flaw in theRead More →
Google can follow you everywhere, even if you explicitly deny permission Every time you use a service like Google Maps the company requests your permission to access your location ifRead More →