Viruses, trojans, software vulnerabilities, security issues

Microsoft Recall continues to save sensitive personal information even after the filter is turned onMicrosoft Recall continues to save sensitive personal information even after the filter is turned on

Microsoft Recall continues to save sensitive personal information even after the filter is turned on

In June, Microsoft disabled the Recall user activity logging feature in test builds of Windows due to discovered issues with…

4 months ago
A way has been found to hack Škoda cars via Bluetooth – this way you can monitor the driver and eavesdrop on what is being said inside the carA way has been found to hack Škoda cars via Bluetooth – this way you can monitor the driver and eavesdrop on what is being said inside the car

A way has been found to hack Škoda cars via Bluetooth – this way you can monitor the driver and eavesdrop on what is being said inside the car

Researchers have discovered several vulnerabilities in infotainment systems used in some Škoda car models. By exploiting these vulnerabilities, attackers can…

4 months ago
An AI that can control a PC without a user was tricked into downloading and running a virusAn AI that can control a PC without a user was tricked into downloading and running a virus

An AI that can control a PC without a user was tricked into downloading and running a virus

In October, Anthropic introduced an artificial intelligence model, Claude Computer Use, which allows the Claude neural network to independently control…

4 months ago
Don’t insert unfamiliar memory cards into your laptop: how SD Express resurrected DMA attacksDon’t insert unfamiliar memory cards into your laptop: how SD Express resurrected DMA attacks

Don’t insert unfamiliar memory cards into your laptop: how SD Express resurrected DMA attacks

Positive Technologies experts reported that attackers can use SD Express memory cards to directly access system memory and hack the…

4 months ago
Fraudsters began to hijack accounts using corrupted Microsoft Word filesFraudsters began to hijack accounts using corrupted Microsoft Word files

Fraudsters began to hijack accounts using corrupted Microsoft Word files

Cybercriminals have come up with a new way to carry out phishing attacks by bypassing the security systems of potential…

4 months ago
The State Duma adopted a law on millions of fines for personal data leaksThe State Duma adopted a law on millions of fines for personal data leaks

The State Duma adopted a law on millions of fines for personal data leaks

The State Duma immediately adopted in the second and third readings a law providing for fines for leakage of personal…

4 months ago
Hackers have found a way to disable Avast antivirus using its own driverHackers have found a way to disable Avast antivirus using its own driver

Hackers have found a way to disable Avast antivirus using its own driver

Cybersecurity researchers at Trellix have discovered that hackers have found a new way to disable antivirus programs on target systems…

4 months ago
D-Link offered to eliminate the vulnerability of routers by purchasing a new deviceD-Link offered to eliminate the vulnerability of routers by purchasing a new device

D-Link offered to eliminate the vulnerability of routers by purchasing a new device

D-Link has announced that several of its routers have a remote code execution vulnerability. The company is not going to…

4 months ago
AI helped Google identify 26 open source software vulnerabilities, including a twenty-year-oldAI helped Google identify 26 open source software vulnerabilities, including a twenty-year-old

AI helped Google identify 26 open source software vulnerabilities, including a twenty-year-old

Google has used artificial intelligence to identify 26 new vulnerabilities in open source projects, including a bug in OpenSSL that…

4 months ago