Viruses, trojans, software vulnerabilities, security issues

GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18

GrayKey tool learns to “partially” jailbreak iPhone 16 — but can’t handle beta versions of iOS 18

Documents have leaked online revealing the capabilities of the hacking tool GrayKey, used by US law enforcement agencies, capable of…

4 months ago
Apple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOSApple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOS

Apple urgently closed two zero-day vulnerabilities in macOS, iOS and iPadOS

Apple has released emergency security updates for macOS, iOS and iPadOS, eliminating two critical zero-day vulnerabilities that were actively exploited…

4 months ago
Windows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening againWindows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening again

Windows has a new recovery mode and other features that will prevent the CrowdStrike crash from happening again

After the devastating CrowdStrike outage in July this year, Microsoft promised to improve the situation, although it insisted that the…

4 months ago
Hackers attacked projects on GitHub in an attempt to frame a cybersecurity expertHackers attacked projects on GitHub in an attempt to frame a cybersecurity expert

Hackers attacked projects on GitHub in an attempt to frame a cybersecurity expert

Executives at artificial intelligence and machine learning startup Exo Labs reported that an unknown person tried to change the code…

4 months ago
Chinese hackers accused of large-scale attack on US telecommunications networksChinese hackers accused of large-scale attack on US telecommunications networks

Chinese hackers accused of large-scale attack on US telecommunications networks

T-Mobile's network was among the systems hacked as part of a large-scale Chinese cyber espionage operation. The operation affected many…

5 months ago
The most popular passwords in the world have been revealed – most take less than a second to crackThe most popular passwords in the world have been revealed – most take less than a second to crack

The most popular passwords in the world have been revealed – most take less than a second to crack

Does anyone else use "123456" to secure access to their account? Sadly, this string of numbers still tops NordPass's annual…

5 months ago
Android smartphones will learn to identify dangerous applications in real time using AIAndroid smartphones will learn to identify dangerous applications in real time using AI

Android smartphones will learn to identify dangerous applications in real time using AI

The Google Play Protect service, which protects Android smartphones from potentially dangerous applications, has received a new Live Threat Discovery…

5 months ago
North Korean hackers have learned to bypass macOS security and seize remote access to MacNorth Korean hackers have learned to bypass macOS security and seize remote access to Mac

North Korean hackers have learned to bypass macOS security and seize remote access to Mac

Cybercriminals have used Google's Flutter platform to create malware disguised as cryptocurrency apps that ultimately allow remote access to the…

5 months ago
Apple has made it more difficult for police to hack an iPhone – iOS 18.1 introduces “Inactivity Reboot”Apple has made it more difficult for police to hack an iPhone – iOS 18.1 introduces “Inactivity Reboot”

Apple has made it more difficult for police to hack an iPhone – iOS 18.1 introduces “Inactivity Reboot”

After the release of iOS 18.1, there were reports that smartphones with the updated operating system were rebooting spontaneously, after…

5 months ago
D-Link refused to fix the vulnerability in old NAS and recommended buying new storageD-Link refused to fix the vulnerability in old NAS and recommended buying new storage

D-Link refused to fix the vulnerability in old NAS and recommended buying new storage

D-Link has no plans to patch a critical vulnerability that was discovered in its legacy network-attached storage (NAS) systems that…

5 months ago