Android: 52 security vulnerabilities identified by Google

It was during its monthly security bulletin that Google exposed several dozen “high” or “critical” security…

Web crooks create scams around Covid-19

Riding on fear of the virus, scammers are using old techniques to make the most of…

This is how we can effectively curb data leakage

In our world transitioning to online operations, the most vulnerable point of companies, the user account…

LastPass is still the king of password managers

A comprehensive test has shown which password management software offers the best service. CNET has tested…

The Safari browser has been vulnerable for months, but Apple is just flattening

The biggest problem is not that the app could cause a data leak, but that Apple…

Apple is no longer a favorite of phishers

But let’s not have any illusions: those who use Apple products are not safe from phishing…

Canon made a huge mistake, losing all the customer photos stored in the cloud

Canon’s cloud storage was shut down for several days, and after the restart it turned out…

TikTok reportedly collected data illegally for a year on Android

The Wall Street Journal has published the results of an investigation that will not help TikTok’s…

A one-piece Office document can force Macs to their knees

A former NSA researcher has found a way to trick Apple’s security system using surprisingly simple…

Two-factor identification does not stop cybercriminals either

Attackers use advanced control techniques to deceive. Abnormal Security research shows that despite the proliferation of…