VPNs are driving the rise of cybercrime in the country, authorities said. India’s Standing Parliamentary Home Affairs Committee has asked the government to block VPN services in the country. The committee representatives referred to the fact that this service is a technological problem and contributes to the growth of cybercrime...
Cream Finance will reimburse users for stolen ETH and AMP through protocol fees. The developers of Cream Finance’s DeFi protocol, which was recently hacked, are planning to compensate users affected by the hacker attack. The creators of the project will allocate 20% of the collected transaction fees for damages. The...
When you turn on safe mode, the system will restrict the user from insults and hate. A new security mode for users was introduced by the social network Twitter. From now on, comments containing objectionable language and insults will be deleted, and their authors will go to the block. This...
The exact timeline for when the update will be offered may vary. Windows 10 Test Edition 21H2, released to members of the Windows Insider Program, has a new Windows Update notification. The message says whether the computer system is ready to install the new Windows 11 operating system. This was...
The collector paid $ 335,000 for the NFT from the anonymous artist Banksy. The authenticity of the work was doubted The hacker returned $ 336,000 to a British non-fungible token collector (NFT) after selling him a fake NFT by anonymous artist Banksy, according to the BBC. Non-fungible token collector (NFT)...
A prototype of the technology that allows you to hide malicious software (software) in the memory of a video card was sold at a hacker forum. According to the BleepingComputer portal, hackers have developed a method for placing and storing malicious code in the memory of a video card, as...
Copyright holders believe that VPN services are responsible for copyright infringement. A group of independent film companies has filed a lawsuit in federal court in Virginia (USA) against four VPN providers (Surfshark, VPN Unlimited, Zenmate and ExpressVPN), which they accused of widespread copyright infringement, writes TorrentFreak. In particular, the plaintiffs...
Private Compute Core will keep user data separate from all applications and services. Google experts intend to implement machine learning and artificial intelligence models in Android devices in order to protect user data. With the release of Android 12, experts have unveiled Private Compute Core. Private Compute Core currently supports...
We need to establish principles that guarantee the right of people to their own thoughts and protect them from interference. Neurotechnology is a promising area that attracts the attention of both the public and investors. Used properly, neurotechnology can be of immense value, such as helping to understand and treat...
Modern PCs will be the first to be able to upgrade to a new version of the OS. Microsoft specialists announced the release date of the Windows 11 operating system is October 5, 2021. A free upgrade to Windows 11 will be available for select Windows 10 PC systems (ready...
Tech giants have warned that the new law threatens the safety of users. The South Korean authorities were the first in the world to legally ban Apple and Google from restricting the choice of payment systems for developers of mobile applications and digital services. The developers got the right to...
The issue stems from a lack of rolling code used in keyless entry systems to protect against replay attacks Keyless entry capability has become a standard feature in virtually all modern vehicles, forcing attackers to change their approach to vehicle hacking. To prevent cyberattacks, automakers implement various protective mechanisms, however,...
Hackers use legitimate services that allow users to share part of their Internet connection for other devices. Cybercriminals have recently begun using their victims’ internet connections to secretly generate illegal income after being infected with malware. According to researchers from Cisco Talos, proxyware is becoming more common in cybercrime. Proxyware...
CISA recommends using multi-factor authentication to protect any account. In June of this year, the US Cyber and Infrastructure Security Agency (CISA) launched a new project called Bad Practices, which is a catalog of discouraged cybersecurity practices, methods and configurations. At first, the list included only two entries, but in...
The Blacktech APT group is suspected of organizing the hack. The attackers who hacked the Fujitsu ProjectWEB SaaS platform this spring were interested in information related to the Tokyo Summer Olympics and nuclear power plants, the Japanese newspaper Asahi Shimbun reported, citing government officials. Recall that in May this year,...