Researchers saw a new variant of the Mirai botnet, which now involves 11 new exploits. Among the goals of the malware, the most noteworthy presenters are WePresent WiPG-1000 and LG Supersign TVs. For the first time, the activity of this version of Mirai was recorded in January 2019. Up to …
Read More »Android Q beta release with security and privacy improvements.
Google has released the first beta version of the new version of the mobile operating system Android 10 or Android Q, in order to familiarize the user community with new features and improvements. In Android Q, developers have focused on improving security and privacy, and also added support for all …
Read More »Coinhive will shut down its cryptomining service in March 8, 2019
The famous service Coinhive for the legitimate mining of cryptocurrencies, which many intruders so fond of, will soon cease to exist. Owners of the service reported that he had left to live exactly until March 8, 2019. The corresponding post was posted on the Coinhive blog, which states the following: …
Read More »Wendy’s agrees to pay $50 million.
WENDY’S AGREES TO PAY $50M TO SETTLE DATA BREACH CLAIMS Wendy’s American chain of fast-food restaurants agreed to pay $50 million in a suit from a group of banks. Financial institutions demanded to make up for the losses caused by the need to provide brand-new cards as an outcome of …
Read More »Xiaomi M365 scooters can be hacked and managed remotely
Xiaomi M365 electric scooters are vulnerable – the security problem in these vehicles was discovered by expert Reni Idan from Zimperium, a company that sells exploits. The gap is so serious that it can allow an attacker to remotely control electric scooters – suddenly slow down or accelerate the vehicle. …
Read More »Microsoft has eliminated 0-day in Internet Explorer & Exchange Server
Microsoft has released a regular monthly set of patches, eliminating fairly serious security problems. First of all, we are talking about a 0-day vulnerability in Internet Explorer, which is actively exploited by hackers. Secondly, the updates eliminate the breach revealed last month in the Exchange Server, for the use of …
Read More »620 million accounts from 16 different sites was found in Dark Web.
On the Dark Web sites, data of 617 million accounts were discovered, which were stolen from 16 different websites. Vendors require $ 20,000 in Bitcoins for them, you can buy merged data at the Dream Market site. Information on user accounts of the following Internet services is available: Dubsmash (162 …
Read More »Apple threatens to remove iPhone apps caught recording user activity
Apple has delivered an ultimatum to application developers who are hiding the screens of device owners on iOS. Now, developers must either reveal part of this code to users, or completely remove it from applications. If none of these requirements are met, the corporation has promised to remove all these …
Read More »Which cyber threats are the most widespread according to the recent survey
Cybercrime has developed over the course of a few recent years, this means that it has become more far-reaching and devastating. This is largely due to the improvements to the internet and other computer networking technologies: the internet has now made cybercrime knowledge less complex, and that knowledge can now …
Read More »Data Protection basis for everyone
This guide explains the effect and purpose of each principle that relates to data protection. The independent authority of the UK was formulated to promote openness and preserve information rights by the public bodies and guarantee individuals’ data privacy. If you are entitled to a daily responsibility for data protection …
Read More »