Viruses, trojans, software vulnerabilities, security issues

The DeepSeek application was convicted of the transmission of confidential data without encryption

The Deepseek mobile application for Apple iOS sends confidential data over the Internet, pursuing their threat to interception and manipulation.…

2 weeks ago

In the browser of Microsoft Edge, II-Provice from scammers appeared-the system monitors what is happening on the screen

This week, Microsoft added a new tool for protecting from scammers called Scareware Blocker to her company browser, which uses…

2 weeks ago

Most printers of HP have found critical vulnerabilities that allow computers to hack

In universal drivers for the HP (HP Universal Print Driver), PCL 6 and PostScript are found critical vulnerabilities that can…

2 weeks ago

Hacker income from robber programs fell by a third last year, although there were more attacks

In 2024, the number of hacker attacks using carrier programs increased, however, despite this, the attackers managed to get much…

2 weeks ago

In Sheremetyevo, they began to steal Telegram accounts through a fake Wi-Fi

Cybercriminals create fake Wi-Fi networks in public places-when trying to connect to them, users receive a request for authorization via…

2 weeks ago

Users of one of the Microsoft services have been subjected to phishing attack for six years

For six years, a phishing campaign remained unnoticed, the targets for which were users of the obsolete service of the…

2 weeks ago

ZYXEL recommended customers to buy new routers, because it will not eliminate vulnerabilities in the old

The Taiwanese manufacturer of network equipment ZYXEL said that it does not plan to produce software updates for its devices…

2 weeks ago

Google closed the vulnerability of the Android nucleus, which was operated by attackers

Google released the February update of Android and closed the dangerous vulnerability of the OS core in it, which was…

3 weeks ago

Meta promised to cancel the release of AI models that will consider too dangerous for humanity

Earlier, META✴ Mark Zuckerberg, CEO of Mark Zuckerberg, promised that he would make strong artificial intelligence (AGI), that is, not…

3 weeks ago

In AMD chips, vulnerability was found on Zen 4 architectures from Zen 4, which allows you to steal data and capture systems

According to this practice, developers and researchers in the field of information security inform suppliers of compromised products about their…

3 weeks ago