Viruses, trojans, software vulnerabilities, security issues

Auto Added by WPeMatico

D-Link offered to eliminate the vulnerability of routers by purchasing a new device

D-Link has announced that several of its routers have a remote code execution vulnerability. The company is not going to…

3 hours ago

AI helped Google identify 26 open source software vulnerabilities, including a twenty-year-old

Google has used artificial intelligence to identify 26 new vulnerabilities in open source projects, including a bug in OpenSSL that…

7 hours ago

GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18

Documents have leaked online revealing the capabilities of the hacking tool GrayKey, used by US law enforcement agencies, capable of…

20 hours ago

Apple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOS

Apple has released emergency security updates for macOS, iOS and iPadOS, eliminating two critical zero-day vulnerabilities that were actively exploited…

1 day ago

Windows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening again

After the devastating CrowdStrike outage in July this year, Microsoft promised to improve the situation, although it insisted that the…

2 days ago

Hackers attacked projects on GitHub in an attempt to frame a cybersecurity expert

Executives at artificial intelligence and machine learning startup Exo Labs reported that an unknown person tried to change the code…

2 days ago

Chinese hackers accused of large-scale attack on US telecommunications networks

T-Mobile's network was among the systems hacked as part of a large-scale Chinese cyber espionage operation. The operation affected many…

5 days ago

The most popular passwords in the world have been revealed – most take less than a second to crack

Does anyone else use "123456" to secure access to their account? Sadly, this string of numbers still tops NordPass's annual…

7 days ago

Android smartphones will learn to identify dangerous applications in real time using AI

The Google Play Protect service, which protects Android smartphones from potentially dangerous applications, has received a new Live Threat Discovery…

1 week ago

North Korean hackers have learned to bypass macOS security and seize remote access to Mac

Cybercriminals have used Google's Flutter platform to create malware disguised as cryptocurrency apps that ultimately allow remote access to the…

1 week ago