Tuesday, October 27, 00:05
Labels detection

Tag: detection

6 ways your location can be traced through your iPhone!

Your iPhone can be configured to show your location in real time to anyone. Also indicates your location ...

Wearable Apple and Fitbit devices will detect patients with COVID-19!

Stanford University is trying to turn wearable devices, such as the Apple Watch and Fitbit health watch, into a ...

Corono: Contact detection applications are not secure unless Bluetooth vulnerabilities are repaired

As more governments turn to app detection contacts to help with their efforts to curb the corona outbreak, experts ...

Mailto ransomware: Uses Windows Explorer to avoid detection

Security investigators have discovered that the new Mailto ransomware (NetWalker) inserts malicious code into the Windows Explorer process to avoid detection. This ransomware was detected ...

Play Protect: Block 1,9 billion malicious apps in 2019

Google Play Protect, is a malware protection system that is pre-installed on the official Android ...

Seoul: Installation of cameras with AI software for crime detection

According to the North Korean government, the country's capital, Seoul, will be equipped with cameras equipped with artificial intelligence (AI) software ...

The Iranian hacking team APT33 has set up its own VPN network

According to Trend Micro researchers, a state-owned hacking team in Iran has built its own private VPN network, which it uses for ...

New backdoor mimics popular software and avoids crawling

Platinum's APT team has come to the fore again after developing a new backdoor that uses smart techniques not to be detected. Researchers have identified ...

New application allows tokens and Crypto Keys to be detected on GitHub

Coding crypto projects pose several risks. One of them is stealing your private keys from hackers. Shhgit is a web ...

Albanian gangs use cryptocurrencies for money laundering

UK police are particularly worried as 'famous' Albanian gangs, involved in cocaine circuits, are now using cryptocurrencies to ...

Most Read

00:01:52

US: Sanctions on a Russian institute for the development of Triton malware!

The US Treasury Department announced at the end of last week sanctions for a Russian research institute, which is allegedly involved ...

How to customize notifications for specific emails in Outlook

Your inbox may be flooded with junk emails. Sometimes, though, you really need to know when a particular message will arrive ...

Biomedical cyber attack: Hackers send phishing emails

Biomedical cyber attack: Hackers send phishing emails A cyber attack is underway that targets corporate users from many companies in Greece, with emails ...

How to control the brightness of your iPhone lens

It is probably no surprise to any iPhone owner that they can use the LED flash on the back of your iPhone as ...