Phishing is the hackers' preferred hacking method

According to a study conducted by Microsoft, the preferred technique of cybercriminals is phishing still called phishing. As you already know, this method of hacking involves influencing Google's search for the purpose of writing users to fake sites resembling official sites, with the aim of being able to steal some personal information about them. We … Continue reading Phishing is the hackers' preferred hacking method

Google and Amazon voice assistants vulnerable to attack

Over the past week, computer security researchers have discovered a security flaw that enabled Alexa and Google home to hack, voice assistants of both digital giants Amazon and Google. With this flaw it would be possible for all hackers, to record conversations of users of its assistants. Google and Amazon have been informed by the … Continue reading Google and Amazon voice assistants vulnerable to attack

Site map

Please find the titles of the articles below Titles “Before you click”: a French company specializing in cybersecurity “Computer security incident” “Skip-2.0” security flaw discovered on Microsoft SQL-Server SGBD “Symlink race” flaws discovered in 28 antivirus security solutions “Zoombombing”: Online courses, new targets of computer attacks $1.34 million for an infected laptop $10 million ransom … Continue reading Site map