ToTok messenger turned out to be a tool for total tracking
The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of…
Perfect encryption system presented by team of scientists from three countries
An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA)…
MyKingz botnet uses Taylor Swift photo to infect target machines
Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…
Password meter services put Internet users at risk
Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…
Check Point named the most dangerous malware of November 2019
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…
France are looking for LockerGoga ransomware developers in Ukraine
French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…
An attacker in a WhatsApp group chat could disable messengers of other participants
Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…
How To Use Public Wi-Fi Safely: Risks To Watch Out For
In a world where almost everything comes with a price it's sometimes nice to have at least free wifi. But starting with such a poetic intro here actually comes the…
Who stands behind cyberattacks? Top 5 types of attackers
When accessing the internet, we are often introduced to seemingly wonderful websites, which we think would assist us with our internet surfing, and we often fall into the trap of…
What is a Botnet: Signs Your Computer Is Part Of A Botnet
Botnets are a new reality that seems to have somehow imperceptibly swooped upon us. In fact, the first documented botnet - a network of bots - was created as early…
How to clean space on your Windows computer?
Nothing is more annoying than receiving a notification about your device’s storage being full. You delete some software, your favorite music, and some memorable pictures but, still, the storage seems…
How can you enhance the security of your browser?
Which is the most secure Web browser? Google Chrome? Mozilla Firefox? Microsoft’s Edge? It’s a simple question but the answer is quite complicated. Five years back a poll was carried…