Mobile Security

operation against cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17…

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to…

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains were not protected against bitsquatting and intercepted windows.com traffic. The…

Netherlands police posted warnings on hacker forums

The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of…

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity experts and published statistics on bug bounty programs for 2020.…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

Xhelper malware continues to infect Android devices. Moreover, the Xhelper Trojan remains on the device even after deleting or completely resetting device to factory settings. According to Nathan Collier, Senior…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of a number of dangerous vulnerabilities (united under the common identifier CVE-2019-18426) found in the desktop version of the WhatsApp messenger.…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic war” with technology companies, demanding weakening of encryption, they already have technical tools for cracking any phone. For example, US…

Airports use vulnerable sites

97 of the 100 largest airports use vulnerable sites and web applications

Specialists from the Swiss company ImmuniWeb conducted an analysis of the cybersecurity level of the 100 world’s largest airports (in Asia, Europe, North America, Australia, Africa and South America). According…

Government hackers attacked often

Government hackers attacked companies more often in 2019

Organizations are more likely to become victims of state-sponsored cybercriminals. Government hackers in 2019 began to attack companies around the world more often. 25% of companies associate attacks on their…

Greta Thunberg in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…

Message disable WhatsApp chat

An attacker in a WhatsApp group chat could disable messengers of other participants

Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…

Cyberbullying

What is Cyberbullying: How to Prevent It

Cyberbullying (or cyberharassment) is bullying that happens online over digital devices like mobile phones, computers, etc. Usually being an extension of real-life bullying, cyberbullying includes teasing, intimidation, threat, demonstration of…

Why PC Security Software Can’t Be Free?

Why PC Security Software Can’t Be Free?

We live in the age of computers, a world on its own. Computers have dramatically taken the world over with their immense working range. From A to Z, almost everything…