Viruses, trojans, software vulnerabilities, security issues

Hackers have hacked a number of Chrome extensions to steal user passwords and personal data.

Since mid-December, attackers have carried out a series of hacker attacks, as a result of which they managed to hack…

3 weeks ago

Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Having released the flagship Galaxy S24 line, Samsung has committed to providing them with seven years of support with security…

3 weeks ago

Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Having released the flagship Galaxy S24 line, Samsung has committed to providing them with seven years of support with security…

3 weeks ago

ChatGPT web search was vulnerable to manipulation and deception

The OpenAI ChatGPT search service has been found to be open to manipulation using hidden content, and can return malicious…

3 weeks ago

Fraudsters have figured out how to deceive dishonest YouTube users

«Kaspersky Lab spoke about a new online cryptocurrency fraud scheme based on the greed of users who want to “earn…

3 weeks ago

Gmail fought off a powerful wave of phishing attacks and urged its 2.5 billion users to prepare for the second

Google said it successfully fought off the first wave of phishing attacks on Gmail users during this year's holiday season,…

4 weeks ago

North Korean hackers accounted for 61% of all cryptocurrency stolen in 2024

The total value of cryptocurrency stolen in 2024 increased by 21% and reached $2.2 billion. More than half of this…

4 weeks ago

Microsoft Recall continues to save sensitive personal information even after the filter is turned on

In June, Microsoft disabled the Recall user activity logging feature in test builds of Windows due to discovered issues with…

1 month ago

A way has been found to hack Škoda cars via Bluetooth – this way you can monitor the driver and eavesdrop on what is being said inside the car

Researchers have discovered several vulnerabilities in infotainment systems used in some Škoda car models. By exploiting these vulnerabilities, attackers can…

1 month ago