Mobile Security

Quantum computers will be able to hack bitcoin wallets

Quantum computers will be able to hack bitcoin wallets

Experts argue that quantum computers will be able to hack bitcoin wallets, but the most advanced cryptographers are in a…

Six 0-day vulnerabilities fixed in Windows, including a commercial exploit issue

As part of June Patch Tuesday, 50 vulnerabilities in Microsoft products were fixed, including six 0-day vulnerabilities in Windows. Vulnerabilities…

NASA has faced 6000 cyberattacks in the past four years

NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the…

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile…

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Signal creator, renowned cryptographer, hacker, researcher and anarchist Moxie Marlinspike studied the products of the famous Israeli cybercriminalistic company Cellebrite…

Extortionists hack into Cellmate men’s chastity belts

Extortionists hack into Cellmate men’s chastity belts

Last fall, researchers from Pen Test Partners reported on the insecurity of extremely unusual gadgets – Cellmate men’s chastity belts, manufactured by the Chinese company Qiui. Then analysts wrote that…

Nissan source code leaked due to admin: admin credentials

Nissan source code leaked due to admin: admin credentials

The source code for mobile apps and internal tools for Nissan’s North American division has leaked. The leak was due to the fact that the specialists of the automaker incorrectly…

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress in Washington, in addition to political consequences, may pose a threat to cybersecurity, experts say. On Wednesday, January 6, supporters of Donald Trump stormed the…

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

AIR-FI attack turns RAM into a makeshift Wi-Fi signal source

Experts from Israel’s Ben-Gurion University have demonstrated the AIR-FI attack, which turns RAM into Wi-Fi. In fact, this is a new method of extracting data from machines that are physically…

SolarWinds was hacked because its credentials were publicly available on GitHub

SolarWinds was hacked because its credentials were publicly available on GitHub

Earlier this week was reported a massive attack on the supply chain that affected SolarWinds and its customers. SolarWinds may have been hacked because its credentials were publicly available on…

Heavy ad blocker started working in the Google Chrome

Heavy ad blocker started working in the Google Chrome

Earlier this year, Google Chrome developers announced about adding of a so-called heavy ad blocker. This is a mechanism that will detect and unload advertisements that consume too many system…

5G and it’s possible effect on our lives

5G and it’s possible effect on our lives

5G networks are declared as an amazing technology that can allow us to use different options of ultra high speed connection. The biggest 5G network in the world is located…

Cybercriminals started using Google services more often in phishing campaigns

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google services in phishing campaigns, as a tool to bypass security and steal credentials, credit cards, and other personal information. The…

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft experts have once again raised the issue of the insecurity of multi-factor authentication through the phone, that is, through one-time codes in SMS messages or voice calls. Instead, the…