Multi-factor authentication is now one of the most effective access security protocols. This protects access and also allows you to connect without fear of phishing attempts. Especially when you want to connect via another device. The application of dual-factor authentication is extended across several financial sectors. From banking to social networks to administrative utilities. This … Continue reading A malware that steals the dual-factor authentication code
The information fell over the last week. Users of Google's cloud storage service, the Google Cloud, are exposed to potential cyberattacks. The reason: a security flaw that would allow cyber criminals to easily spread malware on the Drive. This article will also interest you: A computer virus for data theft on the cloud As we … Continue reading Google Drive users exposed to hackers through security breach
According to security experts at the Mountain View giant, hackers of Chinese and Iranian origin have tried several times to hack personalities and employees linked to the various candidates of the U.S. elections. "A group of Chinese hackers targeted Biden campaign employees, and an Iranian group targeted trump campaign employees," Shane Huntley, head of Google's … Continue reading When U.S. Presidential Elections Become Target of Chinese and Iranian Hackers
According to Checkpoint Software Technologies Ltd, the company that specializes in providing computer security solutions, the coronavirus pandemic has been a springboard for cyber-mallening activities even for the past 4 months. To believe that the theme is not about to run out of steam anytime soon. Indeed, Checkpoint has observed in recent weeks a sharp … Continue reading Hackers continue to profit from coronavirus
Zoom is a video conferencing application that has recently been very successful. The containment and explosion of telecommuting have made this application quite popular at the expense of its direct competitors such as Skype and Microsoft Teams. However this success did not really last because the application was bombed and in several scandals security problems. … Continue reading Zoom: Can we trust him today?