News, Tips, Security Lab
YouTube Video Causes Pixel Smartphones to Reboot
Users have found that Pixel smartphones powered by Google Tensor processors are rebooting when user is trying to watch a…
The Researcher Hacked His Own Bank Account by Imitating a Voice with AI
The journalist Vice Motherboard Joseph Cox hacked the bank account by imitating a voice with the help of AI, which…
Qakbot Malware Applies New Distribution Methods
Today there is an arms race between cybercriminals and antimalware manufacturers. While some release a fix for an existing threat,…
Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025
According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…
One Year of Russian-Ukrainian War in Cybersecurity
February 24, 2022, will be a turning point in history. It was the day of the full-scale Russian invasion of…
Microsoft will end support for Internet Explorer in 2022
Microsoft has announced quite categorically that it will finally stop supporting its Internet Explorer browser next year. Currently, many users have already abandoned Internet Explorer, which has lived more than…
Colonial Pipeline CEO Confirms that Company Paid Criminals $4.4M
The head of Colonial Pipeline confirmed that the company paid the criminals a ransom after the largest pipeline operator in the United States suffered from the DarkSide ransomware attack in…
Cyrillic on the keyboard may become a “vaccine” against Russian hackers
After the sensational cyberattack on the American fuel giant Colonial Pipeline, experts proposed a kind of “vaccine” against Russian hackers. The cybercriminal group DarkSide behind the attack on the Colonial…
Manufacturers release patches for Frag Attacks problems
Manufacturers of various Wi-Fi-enabled equipment and software developers for this equipment release patches for Frag Attacks problems. Let me remind you that last week the details of twelve vulnerabilities were…
Hacker XSS Forum Banned Ransomware Ads
The administration of the popular hacker forum XSS (formerly DaMaGeLab) has banned advertising and sale of any ransomware on its pages. Groups like REvil, LockBit, DarkSide, Netwalker, Nefilim, and so…
Scientist discovered a vulnerability in the universal Turing machine
Pontus Johnson, a professor at the Royal Institute of Technology in Stockholm, discovered a vulnerability in the universal Turing machine. A Turing machine is an abstract executor (abstract computing machine).…
Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues
The well-known information security expert Mathy Vanhoef reported the discovery of a whole set of vulnerabilities named Frag Attacks (Fragmentation and aggregation attacks), which affect all devices with Wi-Fi support,…
FBI investigates cyberattacks on two water supply systems in Pennsylvania
Last month, the local Water Action Response Network, which includes utility companies, sent emails to its members, informing that cyberattacks had affected two water supply systems. According to the letter,…
Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones
More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile Station Modem (MSM). This bug gives attackers access to call…
Chrome 90 gets new security feature to protect against attacks on Windows 10
Google has introduced a new Windows 10 security feature called Hardware-enforced Stack Protection in its Chrome 90 browser to protect the memory stack against cyberattacks. Microsoft introduced Hardware-enforced Stack Protection…
Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021
According to manufacturers’ elaborate plan, since beginning of 2021 support for Adobe Flash Player was finally discontinued. This means that Adobe has officially stopped distributing Flash Player and its updates,…
New Micro-op Cache Attack Bypasses Specter Protection
A team of researchers from the Universities of Virginia and California has developed a new attack on hardware that bypasses Specter protection. The attack allows stealing data when the processor…