Monday, November 30, 2020


Hackers can use ordinary light bulbs to spy

Can use a standard incandescent light to intercept calls at a distance of 25 meters. As if it wasn't bad enough that the email, computer and mobile are vulnerable to...

German hacker created gigantic botnet to download anime

By exploiting a vulnerability in D-Link's firmware, a man named Stefan was able to access tens of thousands of network devices over eight years. According to a new report from...

The new Trojan Eventbot spies on your banking apps

In the long term, the new tax program could become one of the biggest threats to our mobile phones. Researchers at security company Cybereason are warning of Eventbot, a new...

Epic Games security feature: No two-factor authentication – no free games

If you want to have this week's free games on the Epic Games Store in the coming weeks, you must enable two-factor authentication on your account. But then you...

Nintendo accounts hacked – time to turn on 2-step verification

Some of the hijacked accounts are then used to buy V-Bucks in Fortnite. Over the past month, several Nintendo Switch owners have reported that their accounts have been hacked, Zdnet...

500,000 Zoom Accounts leaked – sold cheaply on hacker forums

Over half a million accounts from video conferencing service Zoom are available for sale on hackers' forums and the so-called dark web. Another example of the problem of reused...

Cloudflare updates the safety for children in home schooling

DNS provider Cloudflare releases a new service designed for families with children who, in corona times, attend school from home. The service protects against malicious code and bad sites. Many...

Darkhotel used VPN deficiency to hack Chinese authorities

Security company Qihoo 360 suspects that they are looking for information on how the Chinese government handled the corona virus. A group of hackers is suspected of carrying out a...

Patch Firefox! Two critical bugs in the wild

Mozilla patches two critical bugs in Firefox that could cause attackers to run arbitrary code on the victims' computers. The Firefox browser is pulled with two critical vulnerabilities that are...

Hackers attack Microsoft SQL Server in large campaign

Currently, between 2,000 and 3,000 computers are infected daily. The purpose is first and foremost to extract the crypto currency Vollar. According to Israeli security company Guardicore Labs, a group...


Translate »