Viruses, trojans, software vulnerabilities, security issues

Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Having released the flagship Galaxy S24 line, Samsung has committed to providing them with seven years of support with security…

2 months ago

ChatGPT web search was vulnerable to manipulation and deception

The OpenAI ChatGPT search service has been found to be open to manipulation using hidden content, and can return malicious…

2 months ago

Fraudsters have figured out how to deceive dishonest YouTube users

«Kaspersky Lab spoke about a new online cryptocurrency fraud scheme based on the greed of users who want to “earn…

2 months ago

Gmail fought off a powerful wave of phishing attacks and urged its 2.5 billion users to prepare for the second

Google said it successfully fought off the first wave of phishing attacks on Gmail users during this year's holiday season,…

2 months ago

North Korean hackers accounted for 61% of all cryptocurrency stolen in 2024

The total value of cryptocurrency stolen in 2024 increased by 21% and reached $2.2 billion. More than half of this…

2 months ago

Microsoft Recall continues to save sensitive personal information even after the filter is turned on

In June, Microsoft disabled the Recall user activity logging feature in test builds of Windows due to discovered issues with…

2 months ago

A way has been found to hack Škoda cars via Bluetooth – this way you can monitor the driver and eavesdrop on what is being said inside the car

Researchers have discovered several vulnerabilities in infotainment systems used in some Škoda car models. By exploiting these vulnerabilities, attackers can…

2 months ago

An AI that can control a PC without a user was tricked into downloading and running a virus

In October, Anthropic introduced an artificial intelligence model, Claude Computer Use, which allows the Claude neural network to independently control…

2 months ago

Don’t insert unfamiliar memory cards into your laptop: how SD Express resurrected DMA attacks

Positive Technologies experts reported that attackers can use SD Express memory cards to directly access system memory and hack the…

3 months ago