Monday, October 19, 13:34

LATEST NEWS

System breach exposes Kleenheat customer data

Australian-based gas company Kleenheat has warned some of its customers of data breaches, which may ...

US Election: Candidates manipulate voters via email!

Politicians who are candidates for the upcoming US elections use psychological tricks and "dark" patterns in their emails ...

Google Chrome and Edge create random debug.log logs

An error in the latest version of Chrome and other Chromium-based browsers causes random ...

TikTok: Announced bug bounty program to detect vulnerabilities

The company behind the popular video sharing application TikTok announced last week that it has launched a public bug ...

Windows 10: Unlock God Mode and see all Settings

Windows 10 comes with the Control Panel and Settings, but the modern application of Settings has a peculiarity, ...

FOLLOW US

41,044SupportersLike
193FollowersFollow
5,184FollowersFollow
1,980SubscribersSubscribe
00:03:15

iPhone 12 vs. iPhone 12 Pro: Which is Better?

At first glance, the iPhone 12 and iPhone 12 Pro are quite similar phones. Both have OLED screens ...
00:02:00

Ubisoft - Crytek: Ransomware Attack on Top Gaming Companies!

A ransomware gang known as "Egregor" has leaked data that it claims stole from the internal networks of two ...
00:02:05

Iranian hackers will "hit" universities at the beginning of the new academic year

Malwarebytes issued a warning yesterday according to which Iranian hackers who have carried out a series of attacks on numerous universities, plan to ...

Hackers gain access to US electoral systems

Hackers have infiltrated US government networks. and have access to electoral systems, according to a report by the FBI and ...
00:02:07

Scammers are taking advantage of Amazon Prime Day to deceive shoppers

Security experts warn of a major phishing campaign aimed at taking advantage of Amazon Prime Day that ...

Microsoft: Releases emergency updates to fix RCE vulnerabilities

Microsoft has released emergency security updates to address two vulnerabilities that allow remote code execution (RCE) and affect Microsoft ...

Ransomware: Your business will never be the same again after an attack

A ransomware attack can harm an organization in many ways - from stopping being able to function ...

Foxtons suffered data breach, according to a newspaper

According to a newspaper report, Foxtons allegedly fell victim to data breach, which led to the deactivation of the MyFoxtons website ...

Google: Warned of 33.000 attacks by state hackers

During the first three quarters of 2020, Google sent over 33.000 alerts to users to warn them about phishing ...

Hackers use Basecamp for phishing and malware attacks

Phishing attacks have begun exploiting Basecamp in an attempt to distribute malware and steal credentials. The Basecamp ...

DDoS attack disrupts the operation of schools in Massachusetts!

Distance learning in schools in Massachusetts has been suspended following a DDoS attack. Sandwich Public Schools faced for a week ...

US Election: Candidates manipulate voters via email!

The politicians who are candidates for the upcoming US elections use psychological tricks and "dark" patterns in their emails to ...

Windows 10: Unlock God Mode and see all Settings

Windows 10 comes with the Control Panel and Settings, but the modern application of Settings has a peculiarity, the basic ...

Google "kills" Hangouts and pushes users to Chat

Google has announced plans to move Google Hangouts users to Google Chat next year. It also offers the ...

COSMOTE: The official announcement of the company for the cyber attack

COSMOTE MOBILE TELECOMMUNICATIONS SA informs that during the control of its systems, an unauthorized detection was detected ...

ScanWatch: The watch that can do an electrocardiogram

The Withings smartwatch, ScanWatch, is the first to offer a complete range of health monitoring tools on a watch.

TUXEDO: Announces two new Linux Gaming Laptops

Today, TUXEDO is one of the best manufacturers of computers with Linux. In addition to the large ...

Lenovo ThinkPad X1 Carbon: Released with Default Fedora 32

At the end of April 2020, Lenovo announced its cooperation with the development team of ...

Top search engines and browsers to protect your data

Many popular browsers and search engines can help you protect your data and ...

The best note-taking apps for the iPad Pro!

Although Apple provides its own Notes app on iPadOS, this is for simple and basic use only. There are...

The best keyboards for 2020! Which will you choose?

COVID-19 has forced most people to work from home. The companies, in order to take the necessary security measures, reduced to ...

Instagram: How to change your profile fonts

While Instagram lets you use nine different fonts in your stories, you're stuck with the boring sans serif. See how ...

Microsoft Outlook: How to edit emails you receive from third parties?

The subject and text of an email we receive is usually the sender's business. He decides what ...

How to download your own videos from YouTube

YouTube makes it easy to upload videos. Downloading them is another story. See how you can download any video you have ...

Apple Watch: How do you delete notifications from your "smart" watch?

The Apple Watch, the "smart" watch presented by Apple in 2014, is a device that has untied the hands of many ...

How to disable auto-correct on iPhone and iPad

Are you tired of your iPhone or iPad "correcting" your typographical errors even when you have written the ...