Thousands of devices, especially those with Android technology and Qualcomm microprocessors, could be exposed to potentially serious vulnerabilities and data theft. The cybersecurity company Check Point has discovered a critical vulnerability in Qualcomm processors, which affects almost half of the world's smartphones and can cause data leakage or information and payment credentials theft. The company has warned that the vulnerability is present in TrustZone, a security extension...

Read More

Ring, a subsidiary of Amazon and specializing in domestic security services, has admitted that it collaborates with 407 police stations in the United States to provide them with access to user’s security cameras.   In 2018, the Amazon company closed one of its many seemingly infallible investments: Ring, the start-up dedicated to commercialize surveillance cameras that allow its buyers to contemplate in real time what is happening...

Read More

Passwords are used to verify a user only provide a very basic level of protection. It is a weak mechanism. Users who do not master the secrets of informatics do not always choose the best passwords.   A survey made by the National Cyber Security Center (NCCS) of UK examined the passwords of hacked accounts all over the world. This survey revealed that the hacked accounts had passwords...

Read More

Cyber attacks are one of the biggest threats for companies right now. They affect States, societies, companies, and people the same. Because of this, cyber security measures are now a priority, mainly in those companies or businesses which fully rely on the Internet to run their operations.   – Malware: The fact that malware, which comes from malicious software, is first in the cyber attack ranking should not...

Read More