Uninstall Lenovo Solution Center to keep your data away from hackers
If you are a user of a Lenovo laptop you may need to uninstall the Lenovo Solution Center tool, as a team of vulnerabiliy testing experts has revealed the existenceRead More →
If you are a user of a Lenovo laptop you may need to uninstall the Lenovo Solution Center tool, as a team of vulnerabiliy testing experts has revealed the existenceRead More →
An unprecedented event related to cybersecurity and space missions was revealed this weekend. According to web application security specialists, a National Space Agency (NASA) astronaut has been accused of unauthorizedRead More →
Due to the detection of an unauthorized access to the database that stores its customers’ information, and as a measure of preventing future cyberattacks, the web hosting company Hostinger forcedRead More →
Many activists, researchers, and even some malicious users see Telegram as an option to establish much more secure communication channels than other options available in the instant messaging market likeRead More →
Cyberwarfare could cease to be a terrain explored only by national states. According to system audit specialists, the Israeli government has decided to be more flexible about exporting large-capacity cyberRead More →
A group of vulnerability testing researchers has revealed a new method to break Bluetooth’s encryption key negotiation protocol; the attack, dubbed ‘Key Negotiation of Bluetooth’ (KNOB) is possible on anyRead More →
Network security specialists say that MasterCard, a major payment card operator, has suffered a data breach that exposes the personal information and card numbers of thousands of users, mainly residentsRead More →
This is a reminder for all Internet users: We must be careful with the sites where we enter our personal data for user registration purposes. Information security experts report thatRead More →
Multiple Linux-based exploits have caught the attention of vulnerability testing experts over the more recent years, such as the dangerous Stagefright, RAMpage and Dagger. Recently, smartphone manufacturers Xiaomi and OnePlusRead More →
The RubyGems package repository maintenance team recently announced the removal of at least 18 malicious versions of 11 Ruby libraries due to the presence of a backdoor. Web application securityRead More →
Authorities in the state of Delaware, US, have received multiple reports of fraudulent phone calls allegedly related to the State Police phone number. According to information security experts, the inhabitantsRead More →
Fortnite is one of the most used online games nowadays, surpassing 250 million players worldwide. These figures have begun to attract the attention of hackers looking to take advantage ofRead More →
Zero-day vulnerability in the Steam online gaming platform client has been revealed. According to the ethical hacking researcher who discovered the flaw, this is the second zero-day vulnerability found onRead More →
During the most recent months, multiple security flaws have been detected in the VLC Media Player, which have been reported in a timely manner to its developers. According to webRead More →
A new security incident has just been reported; according to data protection specialists, Collier County, in Florida, was the victim of a phishing campaign deployed in late 2018. Thanks toRead More →
Web application security specialists report the presence of a number of vulnerabilities in Google Nest Cam home security cameras that, if exploited, could allow a hacker to take control ofRead More →
The damage to users’ privacy that Facebook has caused may be irreparable; however, the company will implement some measures to try to launder its tons of sins. Information security expertsRead More →
Someone could lose their job due to a disastrous oversight. Vulnerability testing specialists found that Apple accidentally removed a security patch in iOS 12.4, the latest version of its operatingRead More →
Ethical hacking specialists affirm that a ransowmare infection has compromised the information of over 85k patients of the Grays Harbor Community Hospital, in the US. About a month ago, hospitalRead More →
Thanks to some reports of service failures of the popular streaming platform Netflix, a group of vulnerability testing specialists has detected multiple denial of service (DoS) vulnerabilities in various implementationsRead More →