The Safari browser has been vulnerable for months, but Apple is just flattening

The biggest problem is not that the app could cause a data leak, but that Apple…

Apple is no longer a favorite of phishers

But let’s not have any illusions: those who use Apple products are not safe from phishing…

Canon made a huge mistake, losing all the customer photos stored in the cloud

Canon’s cloud storage was shut down for several days, and after the restart it turned out…

TikTok reportedly collected data illegally for a year on Android

The Wall Street Journal has published the results of an investigation that will not help TikTok’s…

A one-piece Office document can force Macs to their knees

A former NSA researcher has found a way to trick Apple’s security system using surprisingly simple…

Two-factor identification does not stop cybercriminals either

Attackers use advanced control techniques to deceive. Abnormal Security research shows that despite the proliferation of…

10 basic internet security tips

“I’ve never had a computer virus before!”, “It’s just a link, I click on it, what…

Intel: future Tiger Lake CPUs exposed by data leak

A hacker embarrassed Intel by posting no less than 20 GB of confidential data, covered by…

VPN credentials of more than 900 companies published by hackers

A list of identifiers and other sensitive data concerning the Pulse Secure VPNs of more than…

Cybercriminals continue to see COVID-19 as a good opportunity

The number of phishing attempts related in some way to the pandemic increased dramatically during the…