Mobile Security
Tencent and Chinese police conducted a joint operation against game cheat developers
Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17…
Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks
AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to…
Expert intercepted windows.com traffic using bitsquatting
An independent expert known as Remy discovered that Microsoft domains were not protected against bitsquatting and intercepted windows.com traffic. The…
Netherlands police posted warnings on hacker forums
The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of…
In 2020, Google paid cybersecurity experts $6.7 million
During the year, Google paid out 6.7 million to cybersecurity experts and published statistics on bug bounty programs for 2020.…
Xhelper Trojan remains on the device even after resetting to factory settings
Xhelper malware continues to infect Android devices. Moreover, the Xhelper Trojan remains on the device even after deleting or completely resetting device to factory settings. According to Nathan Collier, Senior…
Dangerous vulnerabilities in WhatsApp allowed compromising millions of users
Security researcher Gal Weizman from PerimeterX disclosed technical details of a number of dangerous vulnerabilities (united under the common identifier CVE-2019-18426) found in the desktop version of the WhatsApp messenger.…
US authorities can hack iPhone, but may have difficulties with Android
Although the US authorities are persistent in waging a “cryptographic war” with technology companies, demanding weakening of encryption, they already have technical tools for cracking any phone. For example, US…
97 of the 100 largest airports use vulnerable sites and web applications
Specialists from the Swiss company ImmuniWeb conducted an analysis of the cybersecurity level of the 100 world’s largest airports (in Asia, Europe, North America, Australia, Africa and South America). According…
Government hackers attacked companies more often in 2019
Organizations are more likely to become victims of state-sponsored cybercriminals. Government hackers in 2019 began to attack companies around the world more often. 25% of companies associate attacks on their…
Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the most active threats, the Global Threat Index. Greta Thunberg and Christmas became the most popular topics in spamming and phishing…
Microsoft released farewell updates for Windows 7 and Windows Server 2008
On January 14, 2020, Microsoft stopped supporting Windows 7 for PCs of private users, and at the same time finally finished support of the mobile Windows 10 Mobile (1709), but…
Check Point named the most dangerous malware of November 2019
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…
France are looking for LockerGoga ransomware developers in Ukraine
French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…
An attacker in a WhatsApp group chat could disable messengers of other participants
Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…
What is Cyberbullying: How to Prevent It
Cyberbullying (or cyberharassment) is bullying that happens online over digital devices like mobile phones, computers, etc. Usually being an extension of real-life bullying, cyberbullying includes teasing, intimidation, threat, demonstration of…
Why PC Security Software Can’t Be Free?
We live in the age of computers, a world on its own. Computers have dramatically taken the world over with their immense working range. From A to Z, almost everything…