The most common types of malware on Android devices July 22, 2020 292 Researchers say that advertising programs such as Ads Blocker are the most common types of malware on Android devices, yet…
Remote Code Execution Vulnerability in Zoom Client for Windows July 12, 2020 280 Earlier this week a security researcher shared a remote code execution "0day" vulnerability in Zoom Client for Windows with our…
A privacy vulnerability in macOS that gives hackers access to files July 2, 2020 302 Developer Jeff Johnson has discovered a privacy vulnerability in macOS that gives hackers access to files for a Safari user.
CBC Code – Cryptography (Cipher Block Chaining) June 26, 2020 2,857 Introduction : Symmetric algorithm cryptography uses the same key for the coding and decoding processes; this key is most often…
Facial recognition: an algorithm accusing an African American mistake June 25, 2020 297 Studies published by ACLU and the American Institute of Standards and Technology (NIST) highlight the fact that facial recognition systems…
What is encryption and why should it be used? June 24, 2020 287 What is encryption and why should it be used? Encryption is a security measure designed to protect sensitive information from…
Windows 10 cumulative updates prevent applications from running June 15, 2020 450 The cumulative Windows 10 updates that Microsoft released on June 9 for all users, have caused problems with peripherals, most…
Samsung announces Galaxy S20 Tactical Edition May 21, 2020 323 Samsung has announced a new version of Galaxy S20 is (Galaxy S20 Tactical Edition), which is a military smartphone ready…
EasyJet admits nine million customers hacked May 20, 2020 593 EasyJet has admitted that a “highly sophisticated cyber-attack” has affected approximately nine million customers. It said email addresses and…
US President Donald Trump extends Huawei’s ban to May 2021 May 14, 2020 332 US President Donald Trump extended until May 2021 the executive order signed in May 2019, in which US companies were…