Posts

Who is watching us via the Internet?

Who is watching us via the Internet?

Isn’t it legal to collect data online? If user data is collected for marketing purposes, it may not be against the law. People themselves accept these terms when they sign a user agreement when installing a program or app, says…

Vulnerabilities in ATMs allowed illegal cash withdrawals

Vulnerabilities in ATMs allowed illegal cash withdrawals

ATM manufacturers Diebold Nixdorf and NCR have eliminated a number of vulnerabilities in their products, which provided the ability to execute arbitrary code with or without SYSTEM-level rights, as well as carry out illegal cash withdrawals using special commands. A…

Web skimmers behind site icons

Web skimmers behind site icons

This article is presented for informational purposes only and does not constitute a call to action. All information is aimed at protecting readers from illegal actions. A new Malwarebytes report reveals one such group that has taken web skimming to…

Zero day. What is a zero-day threat?

Zero day. What is a zero-day threat?

As the name implies, the zero-day vulnerability is not yet known to the developer, antivirus companies, or the general public – zero-day attacks are carried out by cybercriminals who were able to detect this vulnerability faster than anyone else and…

Who are the drops?

Who are the drops?

Drops can also be involved in money laundering schemes obtained by other criminal ways: drug trafficking, human trafficking, etc. Moved to a big city from a small one; Unemployed; Students and pupils; Regardless of what reasons became the reason for…

Google Chrome will warn users when sending data over HTTP

Google Chrome will warn users when sending data over HTTP

That is why the developers of Google Chrome set themselves the goal of redefining how the browser interacts with mixed forms. First, Chrome will completely eliminate autocomplete HTTP forms. – the representatives of the Chrome security team explain. ORIGINAL PAGE…

Enemy cyber hacker units.

Enemy cyber hacker units.

The 332-page document contains a wealth of valuable information about the Korean People’s Army (KPA), including its tactics, weapons, leadership structure, troop types, logistics, and electronic warfare capabilities. In addition, it provides some information about the secret hacker division of…

Why can you get jailed on the Internet?

Why can you get jailed on the Internet?

For example how in this case, quote: What is not allowed. It is forbidden to humiliate people on the basis of gender, race, nationality, language, origin, attitude to religion or belonging to any social group. In most cases, this article…

Photoshop will be able to detect photoshopped images

Photoshop will be able to detect photoshopped images

Photoshop will be able to detect photoshopped images Last year, Adobe began work on the Content Authenticity Initiative with The New York Times and Twitter. The essence of this initiative is to reduce the number of editable images that are…

10 expected smartphones of 2020.

10 expected smartphones of 2020.

10 expected smartphones of 2020. Smartphones have come a long way, from tiny screens and slow processors to modern large-screen devices that are fast and smooth. Several brands like Xiaomi, Samsung and Huawei have already offered foldable devices. This year…

Perspectives of digital data storage

Perspectives of digital data storage

Perspectives of digital data storage If we take for 100% all digital information stored today, then 90% of it was created in the last 2 years. Of course, ordinary users do not think about storage technologies, use cloud storage and…

Google Blocks Over 2,500 YouTube Channels For Spreading Misinformation

Google Blocks Over 2,500 YouTube Channels For Spreading Misinformation

Google Blocks Over 2,500 YouTube Channels For Spreading Misinformation Google Threat Analysis Group specialists reported (https://blog.google/threat-analysis-group/tag-bulletin-q2-2020/) on the work done in the second quarter of 2020. The researchers talked about how they stop government hacker attacks and disinformation campaigns, some…

Do NOT follow this link or you will be banned from the site!