News, Tips, Security Lab

Google membership rewards scam: explaining the details.

Google membership rewards scam: explaining the details.

Google membership rewards scam is a new popular type of online fraud. This page opens absolutely spontaneously, and says you…

Full-fledged exploits detected for Specter vulnerability

French cybersecurity specialist Julien Voisin reported that in early February 2021, someone uploaded exploits for the Specter vulnerability to VirusTotal.…

Hackers used Firefox extension to hack Gmail

Proofpoint discovered a campaign in which hackers used a Firefox extension to hack Gmail. The attacks were linked to the…

In LastPass for Android found seven built-in trackers

German cybersecurity expert Mike Kuketz noticed that the LastPass Android app has seven trackers that monitor users. The researcher builds…

For old school lovers: WACUP has fixed many bugs in Winamp

Bleeping Computer drew attention to an interesting project WACUP, which fixed bugs in the old school and nostalgic player Winamp.…

Microsoft Tech Support Scam Affiliate Program

Microsoft Tech Support Scam Affiliate Program

The new sector of cyber attacks has become popular nowadays. In the guise of Microsoft Technical Support (Microsoft Tech Support Scam). Scammers try to force Internet users into making a…

Once more about data breaches

Once more about data breaches

One of the biggest breaches of databases happened recently – personal information on nearly 50 thousand users was stolen and replaced by random files with instructions on how to get…

How can hackers crack your router?

How can hackers crack your router?

Do you think that you are protected from hackers? Of course, you are using a wireless access point with an encryption. You are wrong! pull your password from the air!…

Top-6 biggest tech failures of 2016

Top-6 biggest tech failures of 2016

Samsung Galaxy Note 7 The biggest failure of Samsung for all history is Galaxy Note 7. Smartphones started exploding, that caused a stoppage in production and users were forbidden from…

The Danger of Botnet Network: How to Detect Botnet on You PC

The Danger of Botnet Network: How to Detect Botnet on You PC

The word “botnet” is now ubiquitous, and almost all users know what it means. This is not surprising because this network can be virtually any device with Internet access. Such…

How to use Wi-Fi for free and keep your data private

How to use Wi-Fi for free and keep your data private

Where do you plan to spend the most of your time this winter holidays? Malls, restaurants, cinema, ice rink… all these places have something in common. Free Wi-Fi – we…

Online gift hunting: the tactic of secure shopping

Online gift hunting: the tactic of secure shopping

Winter holidays are coming! This beautiful and fairy season is made for pretty home decoration, tasty food and a lot of gifts for everyone. No one should be forgotten, so…