Mobile Security

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17…

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to…

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains were not protected against bitsquatting and intercepted windows.com traffic. The…

Netherlands police posted warnings on hacker forums

The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of…

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity experts and published statistics on bug bounty programs for 2020.…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

Xhelper malware continues to infect Android devices. Moreover, the Xhelper…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic…

Airports use vulnerable sites

97 of the 100 largest airports use vulnerable sites and web applications

Specialists from the Swiss company ImmuniWeb conducted an analysis of…

Government hackers attacked often

Government hackers attacked companies more often in 2019

Organizations are more likely to become victims of state-sponsored cybercriminals.…

Greta Thunberg in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the…

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

On January 14, 2020, Microsoft stopped supporting Windows 7 for…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ:…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers…

Cyberbullying

What is Cyberbullying: How to Prevent It

Cyberbullying (or cyberharassment) is bullying that happens online over digital…

Why PC Security Software Can’t Be Free?

Why PC Security Software Can’t Be Free?

We live in the age of computers, a world on…