The U.S. Drug Enforcement Administration (DEA) reports that it has begun an investigation into alleged cyberattacks that would have compromised up to 16 databases of federal agencies. According to KrebsOnSecurity
After multiple scandals of inappropriate handling of personal information, reinforcing users’ privacy has become one of the primary goals of large technology companies. Such is the case of Google, which
Some versions of Java are affected by a critical vulnerability in the Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation that would allow threat actors to digitally sign files and
The practice of data scraping has always been the subject of controversy, because although data on websites are considered public, thousands of users and specialists believe that there should be
The famous Cadbury confectionery issued a statement warning its customers about a WhatsApp scam in which threat actors offer consumers a basket of free Easter chocolates, which they can claim
Email marketing company Mailchimp confirmed this morning that a malicious hacking group managed to compromise its systems to access customer accounts and extract potentially sensitive information. Siobhan Smyth, director of
Cybersecurity specialists reported the detection of multiple vulnerabilities affecting Lenovo Networking Switches. According to the report, successful exploitation of these flaws would allow malicious actors to deploy dangerous hacking activities.
Users of the WhatsApp version for laptops and desktops will now be able to use a browser extension to check the integrity of the software running on their browser. This
Dozens of families in the Needham School District fell for what appears to be a bad joke after receiving an email notifying them that this week’s classes would be canceled.
Dozens of Mac device users report that the Zoom video conferencing app keeps their devices’ microphone on even when the app isn’t active. According to reports, the problem lies in