6.5 C
New York
Thursday, January 20, 2022
Home Software IT Security

IT Security

The 38 file extensions that will be banned in Outlook

From Microsoft they want to extend the number of prohibited extensions in Outlook. This is due to the danger it can pose to users. Of course, this...

Microsoft releases “Patch Tuesday” Windows 10 1511

Microsoft launches a series of optional updates taking advantage of the "Patch Tuesday". Updates that reach all versions of Windows 10 with the exception of...

Two fake adblockers amassed 1.6m users before Google removed them from the Chrome Web Store

For years and years the official Chrome extension store has had the same problem: it is packed with fraudulent plugins, clones of popular extensions that are almost...

With iOS 13, Apple extends Webauthn via NFC functionality on the iPhone

With iOS 13, Apple opens the radio interface NFC of the iPhone and as a result, NFC-enabled Fido sticks can now be used with...

Skidmap: a new malware that infects Linux and generates cryptocurrency

Trend Micro researchers have discovered a new malware that affects Linux and deals with cryptocurrency mining. In other words, it leverages the computing power of the victim's computer to...

US Treasury Department accuses Lazarus, Bluenoroff and Andariel for ransomware attacks

Lazarus, Bluenoroff and Andariel. These are the three groups of hackers believed to be close to the North Korean government and accused by the...

Deepfake: we can no longer trust the voice

First they came with viruses, and they took away the security on our PC. Then came the worms, and they took away the security in...

How Google discovered zero-day bugs that Apple patched on iOS 12.1.4

The important thing about updates to an operating system (anyone, not just iOS) is not so much the new features or access to new...

Google: privacy and advertising can coexist

The Privacy Sandbox initiative announced by Google calls on all players in the online world to build a new World Wide Web. Ensure adequate privacy...

How phishing the most common form of cyber-attacks is tricking our brains

Why phishing is so effective and how people not recognizing deceptions depending on factors such as emotional intelligence, and even the personality of the...

Apple: Jailbreak for iOS 12.4 accidentally possible

Apple has indirectly jailbreaked iOS 12.4. The gap has actually been closed with iOS 12.3, but again it is possible with iOS 12.4. A security expert has released a...

A Newly Identified Chinese APT Group Spying On State

At Black Hat, security company FireEye presented information on the spying and other activities of a newly identified APT group. APT 41 is the name...
- Advertisment -

Most Read

Binge-watching TV increases the risk of serious blood clots by 35%, says new study

"Being physically active does not eliminate the increased risk of blood clots associated with prolonged TV watching," warn scientists.

Common Air Pollutants Threaten Butterflies and Bees’ Ability to Find Flowers

The study found up to 70% fewer pollinators, up to 90% fewer flower visits and an overall pollination reduction of up to...

Women’s sports face greater misogynistic attitude from male football fans

A new study published today claims that openly misogynistic attitudes toward women's sport may be common among male football enthusiasts.

Named food that increases the risk of stroke by 41%

Stroke is a leading cause of death worldwide, claiming the lives of millions of people every year. Those who do not succumb to...