-
in Cyber Security News Mozilla promises hyper-secure and super-fast Firefox with a new feature.
The new Firefox security architecture is ready.
by
Johnny G
For the moment, Site Isolation is available in the Nightly edition and Firefox beta, with manual activation. The new Firefox security architecture is ready. Mozilla has made it available in the Nightly edition and the beta release. With the browser failing to break out of its marginal role in other areas, developers focus on security […]
-
in Cyber Security News Internet Explorer 11 will retire next summer.
Microsoft's web services and applications no longer support the outdated browser.
by
Staff
12 ViewsInternet Explorer 11 has just over a year to go before Microsoft retires the browser next summer. On June 15, 2022, Microsoft will say goodbye to Internet Explorer 11, and with it the complete browser family that once saw better days, Microsoft says in a blog post. Microsoft's web services and applications no longer support […]
-
in Cyber Security News Cybersecurity mitigation spending has exceeded $150 billion this past year.
The sector will grow by 12.5 percent worldwide to reach $150.4 billion in 2021.
by
Johnny G
20 ViewsCybersecurity mitigation spending has exceeded $150 billion this past year, which is the highest in history. There is a significant proportion of CIOs who have invested the time and money in making their company's cybersecurity better this year! According to the latest forecast from market analyst firm Gartner, spending on information security technologies and services […]
-
in Hardware News Unfortunately, the IFA 2021 exhibition has been canceled.
by
Staff
17 ViewsUnfortunately, the IFA 2021 exhibition has been canceled. In mid-April, many people felt the need to sit down and take a deep breath after hearing the news that Europe's largest tech exhibition will be held in early September this year despite the pandemic. Of course, the organizers have declared that they intend to introduce strict […]
-
in Cyber Security News Chrome Makes It Easier To Reset Leaked Passwords
Thanks to the new feature, security can be restored with a few taps.
by
Johnny G
22 ViewsAt the recent Google I/O conference, the search giant unveils a series of new features, including a password-changing solution for Chrome, notable for its security and convenience. With the new feature, if Chrome's built-in password manager detects that passwords used on certain websites may have been leaked, Google will automatically offer a quick replacement when […]
-
in Hardware News Apple may be developing a mighty 40 core processor
Apple may equip the future Mac Pro with a notably more powerful processor than before
by
Staff
22 ViewsApple may be developing a 40 core processor, which will be the heart of the most powerful Mac Pro up to date. According to Bloomberg, Apple may equip the future Mac Pro with a notably more powerful processor than before. When the announcement was made that apple would be developing its own processor for Macs, […]
-
in Cyber Security News, Networking The Internet gets faster with Wi-Fi 6 and 5G
Higher capacity, lower latency, and higher efficiency
by
Staff
27 ViewsTechnology continues to evolve rapidly, and we are doing our best to keep up with the latest trends. Therefore, we will increase the number of devices in our mobile and wireless networks. The increase in traffic and the demand for better performance have driven us to evolve and find better and more efficient ways to […]
-
in Hardware News, Networking Global 5G smartphone sales rise in 2021, and Apple is on top.
Apple's 5G-enabled phones have been selling pretty well and now account for 30% of the market.
by
Johnny G
33 ViewsLast October, Apple launched its first 5G-compatible smartphones: the iPhone 12 mini, iPhone 12, iPhone 12 Pro, and iPhone 12 Pro Max. The super-fast mobile network is enjoying massive popularity worldwide, and it's no surprise that they have catapulted to the top of the 5G global market. According to the latest numbers, Apple's 5G-enabled phones […]
-
in Cyber Security News Why Social Engineering is Still a Big Problem in 2021
Hackers use this method to access sensitive information by manipulating the user into willingly giving up the data.Â
by
Staff
188 ViewsSocial engineering is one of the most commonly used methods of stealing information from individuals and businesses alike. This is a form of cyberattack that is usually difficult for a user to recognize because it mostly relies on human interaction rather than computer code. The most important thing to remember about this method of attack […]
-
in Cyber Security News Coalition Against Apple TaxÂ
by
Staff
97 ViewsAn industry coalition is organized by developers and studios that object to specific terms of Apple's App Store. The founders of the App Fairness coalition include Epic Games, Spotify, and Deezer, among others. Companies object to some aspects of Apple's app marketplace, the App Store, are objecting to some elements of its mandatory […]
-
in Cyber Security News Internal data theft reported at Shopify.
One of the largest e-commerce platforms, Canadian Shopify, reported a data breach involving 200 webshops and its customers.Â
by
Staff
193 ViewsOne of the largest e-commerce platforms, Canadian Shopify, reported a data breach involving 200 webshops and its customers. An unspecified number of customers' data may have been compromised after two internal employees from Shopify, one of the largest e-commerce platforms, tried to steal the user databases and transaction records of about 200 webshops. According to […]
-
in Antivirus News, Cyber Security News Google is building a much-needed accelerator into Chrome, and you can try it out right now.
by
Staff
685 ViewsDespite its popularity, Google Chrome has a severe flaw: it still uses a lot of memory, and opening up a dozen pages on your machine can be painfully slow. A new function wants to change this. However we look at it, Google Chrome is the world's most popular browser, and it has a pretty big […]
-
in Cyber Security News Top 3 Cyber Threats Of 2018
VPNFilter, Spectre and Meltdown, Coinhive
by
Staff
333 Views2018 saw the emergence of new malware, ransomware and other innovative ways of exploiting vulnerabilities in cyber systems. Here a few of the cyber threats that defined the year. VPNFilter VPNFilter is a malware program which is believed to have been developed by Fancy Bear APT Group. The malware has been hiding in a number […]
-
in Antivirus News, Cyber Security News Improving Cyber Security With The Help Of Artificial Intelligence
AI is the most promising solution to better IT security in 2019
by
Staff
479 ViewsArtificial Intelligence is one of the most popular buzzwords of the past decade. The government is particularly keen to find out how they can use it to shore up their own cybersecurity and the Internal Revenue Service recently put in a request for more information on how AI can help them. They want to know […]
-
in Cyber Security News Cyber Security Firm Report That Monero-Mining Malware is Evolving
KingMiner is a malware program that hijacks a host computer and diverts the computer’s processing power
by
Staff
288 ViewsKingMiner is a malware program that hijacks a host computer and diverts the computer's processing power towards mining a cryptocurrency called Monero. This malware infects Windows Servers and uses several ingenious methods to avoid detection. KingMiner was first detected back in June, and new ways were developed to detect its presence, but reports from Check […]
-
in Cyber Security News Insiders Pose The Greatest Risk To Company's Cyber Security
Recent reports claim that malicious insiders account for 27% of all cybercrime
by
Staff
507 ViewsEmployees are a company's weakest link when it comes to cybersecurity. A certain amount of employee negligence, which is when an employee is unaware of how his/her careless actions leave a company vulnerable to attack, is unavoidable but those risks can be mitigated. Some reports claim that malicious insiders account for 27% of all cybercrime. […]
-
in Antivirus News Hackers Exploiting Microsoft Office Vulnerabilities Increased This Year.
The number of users attacked by malicious Microsoft Office documents is up 400%, compared to the same period of 2017
by
Staff
482 ViewsSoftware exploiting Microsoft Office vulnerabilities leads the list of cyber incidents for the first quarter of this year. The number of users attacked by malicious Microsoft Office documents is up 400%, compared to the same period of 2017, according to the latest Kaspersky Lab report. Also, such attacks based on software vulnerabilities are powerful because […]
-
in Antivirus News New Ransomware Pretends You Are Under Investigation by The Government.
The FBI is now warning about a new type of ransomware.
by
Staff
627 ViewsRansomware is a nasty malware where criminals take control of your computer and force you to pay a ransom to regain access to your data. The new twist, however, is that the criminals make it look like the government is coming after you. The pop-up messages can be quite scary at first claiming that the […]
-
in Antivirus News A 21-Year-Old Hacker is Heading to Jail for Selling Malware and Operating a Massive Botnet
by
Staff
1.2k ViewsA young hacker in the UK was sentenced to two years in prison for launching DDoS attacks against high-profile companies and selling hacking tools in the dark web. The 21-year-old youngster from Liverpool orchestrated coordinated attacks against some well-known brands including Google and Skype. The hacker ran a massive botnet with about seven thousand infected […]
-
in Antivirus News Cryptocurrency Mining Malware Takes The Crown as The Most Dangerous Trojan In 2018
by
Staff
943 ViewsEvery month, ESET compiles the most dangerous computer viruses worldwide to find out what malware is most likely to endanger users' computers. The latest list shows a new kind of virus is leading in the last few weeks. #1 JS/CoinMiner Trojans at the top of the podium, it is malicious a script that can be […]