Mobile Security

Encryption algorithms for 2G networks have been intentionally weakened

Encryption algorithms for 2G networks have been intentionally weakened

A group of scientists from several European universities published a report on encryption algorithms for 2G networks, which many information…

Google stopped trying to shorten URLs in the address bar

Google’s experiment with attempt to shorten URLs (hiding parts of the URL from the address bar) has finally failed and…

Quantum computers will be able to hack bitcoin wallets

Experts argue that quantum computers will be able to hack bitcoin wallets, but the most advanced cryptographers are in a…

Six 0-day vulnerabilities fixed in Windows, including a commercial exploit issue

As part of June Patch Tuesday, 50 vulnerabilities in Microsoft products were fixed, including six 0-day vulnerabilities in Windows. Vulnerabilities…

NASA has faced 6000 cyberattacks in the past four years

NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the…

New worm for Android spreads rapidly via WhatsApp

New worm for Android spreads rapidly via WhatsApp

ESET security researcher Lukas Stefanko reported a new malware: he said that a new worm for Android automatically spreads through WhatsApp messages. The main purpose of malware is to trick…

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the tech industry, followed by shipping and retail businesses. Information security…

Extortionists hack into Cellmate men’s chastity belts

Extortionists hack into Cellmate men’s chastity belts

Last fall, researchers from Pen Test Partners reported on the insecurity of extremely unusual gadgets – Cellmate men’s chastity belts, manufactured by the Chinese company Qiui. Then analysts wrote that…

Nissan source code leaked due to admin: admin credentials

Nissan source code leaked due to admin: admin credentials

The source code for mobile apps and internal tools for Nissan’s North American division has leaked. The leak was due to the fact that the specialists of the automaker incorrectly…

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress in Washington, in addition to political consequences, may pose a threat to cybersecurity, experts say. On Wednesday, January 6, supporters of Donald Trump stormed the…

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

Experts from Israel’s Ben-Gurion University have demonstrated the AIR-FI attack, which turns RAM into Wi-Fi. In fact, this is a new method of extracting data from machines that are physically…

SolarWinds was hacked because its credentials were publicly available on GitHub

SolarWinds was hacked because its credentials were publicly available on GitHub

Earlier this week was reported a massive attack on the supply chain that affected SolarWinds and its customers. SolarWinds may have been hacked because its credentials were publicly available on…

Heavy ad blocker started working in the Google Chrome

Heavy ad blocker started working in the Google Chrome

Earlier this year, Google Chrome developers announced about adding of a so-called heavy ad blocker. This is a mechanism that will detect and unload advertisements that consume too many system…

5G and it’s possible effect on our lives

5G and it’s possible effect on our lives

5G networks are declared as an amazing technology that can allow us to use different options of ultra high speed connection. The biggest 5G network in the world is located…