Google integrates iOS tools into two-factor authentication of your account

Satoshi Nakamoto January 16, 2020

Apparently, the use of a competitor's third party technology is not such an incredible step for many companies to develop their own and their services…

You Can Easily Grab TikTok Account With the Official App

Robert Knight January 10, 2020

CheckPoint experts have found not too dangerous vulnerabilities in the mobile application TikTok, which, however, can be combined so that there is a threat of…

Top 7 Cyber Security Threats to Watch Out For

Satoshi Nakamoto December 25, 2019

While it might seem obvious to some, many might wonder: why even bother making a list of the most important cyber security threats? Experts certainly…

Insulting comments in Instagram

Robert Knight December 18, 2019

Earlier this year one of the most popular Instagram applications launched a new feature. Its main task is to analyze written comments and warn the…

New Linux error allows hacking into encrypted VPN connections

Satoshi Nakamoto December 10, 2019

A group of cyber security research workers has revealed a brand new severe vulnerability impacting many Linux and also Unix-like systems, including FreeBSD, OpenBSD, Mac-OS,…

Large ASP.NET provider was attacked by an encryption programm

Robert Knight November 12, 2019

SmarterASP.NET, a major provider of ASP.NET services to more than 440,000 customers, was hit by a ransomware attack last weekend. As a result, all data on…

Facebook Announces New Measures To Protect the Integrity During Elections

Satoshi Nakamoto November 5, 2019

On October 21, 2019, Facebook announced measures to "stop abuses and interference during the elections". The U.S. firm plans to hold the next elections in…

Untitled Goose Game Has a Critical Vulnerability

Robert Knight October 28, 2019

Pulse Security consultant Denis Anzakovich discovered a critical vulnerability in the popular Untitled Goose Game. According to Andzakovich, the problem allows to introduce malicious code…