Viruses, trojans, software vulnerabilities, security issues

Chinese hackers hacked the US Treasury and stole unclassified documentsChinese hackers hacked the US Treasury and stole unclassified documents

Chinese hackers hacked the US Treasury and stole unclassified documents

The US Treasury Department notified the US Congress on Monday that its systems were hacked by hackers linked to China.…

3 months ago
Chinese hackers hacked nine US telecommunications companiesChinese hackers hacked nine US telecommunications companies

Chinese hackers hacked nine US telecommunications companies

The ninth telecommunications company in the United States has had its resources attacked as part of a series of cyberattacks…

3 months ago
The data of 800 thousand owners of Volkswagen electric vehicles is publicly availableThe data of 800 thousand owners of Volkswagen electric vehicles is publicly available

The data of 800 thousand owners of Volkswagen electric vehicles is publicly available

It's common for modern people to worry about hackers stealing their personal data, but sometimes the most serious incidents are…

3 months ago
Hackers have hacked a number of Chrome extensions to steal user passwords and personal data.Hackers have hacked a number of Chrome extensions to steal user passwords and personal data.

Hackers have hacked a number of Chrome extensions to steal user passwords and personal data.

Since mid-December, attackers have carried out a series of hacker attacks, as a result of which they managed to hack…

3 months ago
Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standardsSamsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Having released the flagship Galaxy S24 line, Samsung has committed to providing them with seven years of support with security…

3 months ago
Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standardsSamsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Samsung spoke about the Infinity project to protect Galaxy devices from threats – it is built according to military standards

Having released the flagship Galaxy S24 line, Samsung has committed to providing them with seven years of support with security…

3 months ago
ChatGPT web search was vulnerable to manipulation and deceptionChatGPT web search was vulnerable to manipulation and deception

ChatGPT web search was vulnerable to manipulation and deception

The OpenAI ChatGPT search service has been found to be open to manipulation using hidden content, and can return malicious…

3 months ago
Fraudsters have figured out how to deceive dishonest YouTube usersFraudsters have figured out how to deceive dishonest YouTube users

Fraudsters have figured out how to deceive dishonest YouTube users

«Kaspersky Lab spoke about a new online cryptocurrency fraud scheme based on the greed of users who want to “earn…

3 months ago
Gmail fought off a powerful wave of phishing attacks and urged its 2.5 billion users to prepare for the secondGmail fought off a powerful wave of phishing attacks and urged its 2.5 billion users to prepare for the second

Gmail fought off a powerful wave of phishing attacks and urged its 2.5 billion users to prepare for the second

Google said it successfully fought off the first wave of phishing attacks on Gmail users during this year's holiday season,…

3 months ago
North Korean hackers accounted for 61% of all cryptocurrency stolen in 2024North Korean hackers accounted for 61% of all cryptocurrency stolen in 2024

North Korean hackers accounted for 61% of all cryptocurrency stolen in 2024

The total value of cryptocurrency stolen in 2024 increased by 21% and reached $2.2 billion. More than half of this…

3 months ago